Skip to content

Veritas License Agreement

The licensee undertakes to comply with the conditions set out in the end user licensing agreement and the product rights document provided in or in conjunction with the corresponding licensed software (hereafter referred to as “LAE”). This agreement is complementary to the ECJ and, in the event of a conflict between this agreement and the ECJ, this agreement will be monitored. Please note that Veritas products that were released prior to January 29, 2016 may contain a Symantec brand. When new versions of the products are released, Veritas will update the branding in the Veritas brand image product. While end-user licensing agreements and other product brands may refer to “Symantec,” all of these references are considered important and all related rights and obligations apply to Veritas. To avoid any doubt, please note for customers who download, install or use Veritas software in Australia, New Zealand or the Pacific Islands, your Veritas licensee is Veritas Storage (Singapore) Pte Ltd. The product material is available at www.veritas.com/support/en_US.html. Veritas offers may contain third-party materials that are subject to a separate license. These documents are indicated in a third-party message document published at the bottom of this website and/or contained in the ReadMe file or in the documentation of the corresponding offer.

This CLE applies to all Veritas Cluster Server Windows 5.1.x licenses acquired on or after May 23, 2011. The licensee maintains specific business documents on the use of the licensed software for a period of three (3) years after the end of this contract. At Veritas` request, the licensee provided Veritas with a report attesting to the destruction of licensed software in accordance with Section 3. The provisions relating to licensing restrictions, confidentiality, auditing, exclusion of guarantees and general provisions of Section 8 also apply after the expiry of the evaluation or termination period for this agreement. Each party must use the same care, but no less than an appropriate level of diligence to prevent the unauthorized use, dissemination or publication of confidential information used by that party to protect its own confidential information of a similar nature.