Zum Inhalt springen

Third Party Legal Notices for

Merlin

This Aptean product may contain third party software for which Aptean is required to provide attribution ("Third Party Programs"). Some of the Third Party Programs are available under open source or free software licenses. The License Agreement accompanying the Licensed Software does not alter any rights or obligations you may have under those source or free software licenses. This document or appendix contains proprietary notices for the Third Party Programs and the licenses for the Third Party Programs, where applicable. The following copyright statements and licenses apply to various open source software components (or portions thereof) that are distributed with the Licensed Software.


Portions of this Aptean product contain the following components:

The following are covered under the Apache 2.0 license:

  • ACRA. Copyright © Kevin Gaudin

  • Amazon MWS. Copyright © 2009-2020 Amazon.com, Inc. or its affiliates.

  • Amazon SP-API. Copyright © 2023, Amazon.com Services LLC.

  • Docker. Copyright © 2022 Docker Inc. All rights reserved

  • jasmine-spec-reporter. Copyright © Bastien Caudan

  • log4net. Copyright © Apache Software Foundation. All Rights Reserved.

  • RestSharp. Copyright © .NET Foundation and Contributors

  • rxjs. Copyright © 2014-2018 Google, Inc., RxJS Team Members and Contributors

  • Sentry. Copyright © 2023 All Rights Reserved | Sentry Copyright Inc

  • typescript. Copyright © Microsoft Corp.

Apache License Version 2.0, January 2004 http://www.apache.org/licenses/ TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION 1. Definitions. "License" shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9 of this document. "Licensor" shall mean the copyright owner or entity authorized by the copyright owner that is granting the License. "Legal Entity" shall mean the union of the acting entity and all other entities that control, are controlled by, or are under common control with that entity. For the purposes of this definition, "control" means (i) the power, direct or indirect, to cause the direction or management of such entity, whether by contract or otherwise, or (ii) ownership of fifty percent (50%) or more of the outstanding shares, or (iii) beneficial ownership of such entity. "You" (or "Your") shall mean an individual or Legal Entity exercising permissions granted by this License. "Source" form shall mean the preferred form for making modifications, including but not limited to software source code, documentation source, and configuration files. "Object" form shall mean any form resulting from mechanical transformation or translation of a Source form, including but not limited to compiled object code, generated documentation, and conversions to other media types. "Work" shall mean the work of authorship, whether in Source or Object form, made available under the License, as indicated by a copyright notice that is included in or attached to the work (an example is provided in the Appendix below). "Derivative Works" shall mean any work, whether in Source or Object form, that is based on (or derived from) the Work and for which the editorial revisions, annotations, elaborations, or other modifications represent, as a whole, an original work of authorship. For the purposes of this License, Derivative Works shall not include works that remain separable from, or merely link (or bind by name) to the interfaces of, the Work and Derivative Works thereof. "Contribution" shall mean any work of authorship, including the original version of the Work and any modifications or additions to that Work or Derivative Works thereof, that is intentionally submitted to Licensor for inclusion in the Work by the copyright owner or by an individual or Legal Entity authorized to submit on behalf of the copyright owner. For the purposes of this definition, "submitted" means any form of electronic, verbal, or written communication sent to the Licensor or its representatives, including but not limited to communication on electronic mailing lists, source code control systems, and issue tracking systems that are managed by, or on behalf of, the Licensor for the purpose of discussing and improving the Work, but excluding communication that is conspicuously marked or otherwise designated in writing by the copyright owner as "Not a Contribution." "Contributor" shall mean Licensor and any individual or Legal Entity on behalf of whom a Contribution has been received by Licensor and subsequently incorporated within the Work. 2. Grant of Copyright License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare Derivative Works of, publicly display, publicly perform, sublicense, and distribute the Work and such Derivative Works in Source or Object form. 3. Grant of Patent License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable (except as stated in this section) patent license to make, have made, use, offer to sell, sell, import, and otherwise transfer the Work, where such license applies only to those patent claims licensable by such Contributor that are necessarily infringed by their Contribution(s) alone or by combination of their Contribution(s) with the Work to which such Contribution(s) was submitted. If You institute patent litigation against any entity (including a cross-claim or counterclaim in a lawsuit) alleging that the Work or a Contribution incorporated within the Work constitutes direct or contributory patent infringement, then any patent licenses granted to You under this License for that Work shall terminate as of the date such litigation is filed. 4. Redistribution. You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium, with or without modifications, and in Source or Object form, provided that You meet the following conditions: (a) You must give any other recipients of the Work or Derivative Works a copy of this License; and

(b) You must cause any modified files to carry prominent notices stating that You changed the files; and

(c) You must retain, in the Source form of any Derivative Works that You distribute, all copyright, patent, trademark, and attribution notices from the Source form of the Work, excluding those notices that do not pertain to any part of the Derivative Works; and

(d) If the Work includes a "NOTICE" text file as part of its distribution, then any Derivative Works that You distribute must include a readable copy of the attribution notices contained within such NOTICE file, excluding those notices that do not pertain to any part of the Derivative Works, in at least one of the following places: within a NOTICE text file distributed as part of the Derivative Works; within the Source form or documentation, if provided along with the Derivative Works; or, within a display generated by the Derivative Works, if and wherever such third-party notices normally appear. The contents of the NOTICE file are for informational purposes only and do not modify the License. You may add Your own attribution notices within Derivative Works that You distribute, alongside or as an addendum to the NOTICE text from the Work, provided that such additional attribution notices cannot be construed as modifying the License. You may add Your own copyright statement to Your modifications and may provide additional or different license terms and conditions for use, reproduction, or distribution of Your modifications, or for any such Derivative Works as a whole, provided Your use, reproduction, and distribution of the Work otherwise complies with the conditions stated in this License.

5. Submission of Contributions. Unless You explicitly state otherwise, any Contribution intentionally submitted for inclusion in the Work by You to the Licensor shall be under the terms and conditions of this License, without any additional terms or conditions. Notwithstanding the above, nothing herein shall supersede or modify the terms of any separate license agreement you may have executed with Licensor regarding such Contributions. 6. Trademarks. This License does not grant permission to use the trade names, trademarks, service marks, or product names of the Licensor, except as required for reasonable and customary use in describing the origin of the Work and reproducing the content of the NOTICE file. 7. Disclaimer of Warranty. Unless required by applicable law or agreed to in writing, Licensor provides the Work (and each Contributor provides its Contributions) on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, without limitation, any warranties or conditions of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You are solely responsible for determining the appropriateness of using or redistributing the Work and assume any risks associated with Your exercise of permissions under this License. 8. Limitation of Liability. In no event and under no legal theory, whether in tort (including negligence), contract, or otherwise, unless required by applicable law (such as deliberate and grossly negligent acts) or agreed to in writing, shall any Contributor be liable to You for damages, including any direct, indirect, special, incidental, or consequential damages of any character arising as a result of this License or out of the use or inability to use the Work (including but not limited to damages for loss of goodwill, work stoppage, computer failure or malfunction, or any and all other commercial damages or losses), even if such Contributor has been advised of the possibility of such damages. 9. Accepting Warranty or Additional Liability. While redistributing the Work or Derivative Works thereof, You may choose to offer, and charge a fee for, acceptance of support, warranty, indemnity, or other liability obligations and/or rights consistent with this License. However, in accepting such obligations, You may act only on Your own behalf and on Your sole responsibility, not on behalf of any other Contributor, and only if You agree to indemnify, defend, and hold each Contributor harmless for any liability incurred by, or claims asserted against, such Contributor by reason of your accepting any such warranty or additional liability.


The following are covered under the MIT license:

  • ICSharpCode. Copyright © 2000-2018 SharpZipLib Contributors

  • OpenNETCF. Copyright © Authors and contributors

  • Docsify. Copyright © 2016 - present Docsify Contributors (https://github.com/docsifyjs/docsify/graphs/contributors)

  • Angular. Copyright © 2023 Google LLC.

  • Fontawesome. Copyright © 2018 Fonticons, Inc. and contributors

  • Swimlane. Copyright © 2017 Swimlane

  • Bootstrap. Copyright © 2011-2023 The Bootstrap Authors

  • Express. Copyright © 2009-2014 TJ Holowaychuk <tj@vision-media.ca>, Copyright © 2013-2014 Roman Shtylman <shtylman+expressjs@gmail.com>, Copyright © 2014-2015 Douglas Christopher Wilson doug@somethingdoug.com

  • jasmine-core. Copyright © 2008-2019 Pivotal Labs

  • karma. Copyright © 2011-2021 Google, Inc.

  • karma-mocha-reporter. Copyright © 2013-2016 Litixsoft GmbH info@litixsoft.de

  • leaflet.markercluster. Copyright © 2012 David Leaver

  • ng2-dragula. Copyright © 2015-2016 Dmitriy Shekhovtsov <valorkin@gmail.com>, Copyright © 2015-2016 Valor Software, Copyright © 2015-2016 Nathan Walker <NathanWalker>

  • ngx-mat-select-search. Copyright © 2018 Bithost GmbH

  • papaparse. Copyright © 2015 Matthew Holt

  • pell. Copyright © Jared Reich

  • ts-node. Copyright © 2014 Blake Embrey (hello@blakeembrey.com)

  • zone.js. Copyright © 2010-2022 Google LLC. https://angular.io/license

Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.


The following are covered under the 2-Clause BSD license:

  • leaflet. Copyright © 2010-2022, Volodymyr Agafonkin; Copyright © 2010-2011, CloudMade. All rights reserved.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.

2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.


The following are covered under the Zero-Clause BSD (0BSD) license:

  • tslib. Copyright © Microsoft Corporation.

Permission to use, copy, modify, and/or distribute this software for any purpose with or without fee is hereby granted.

THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.


The following are covered under the GNU LESSER GENERAL PUBLIC LICENSE:

  • psqlODBC. Copyright © 1996-2023 The PostgreSQL Global Development Group

GNU LESSER GENERAL PUBLIC LICENSE Version 3, 29 June 2007 Copyright © 2007 Free Software Foundation, Inc. <https://fsf.org/> Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. This version of the GNU Lesser General Public License incorporates the terms and conditions of version 3 of the GNU General Public License, supplemented by the additional permissions listed below. 0. Additional Definitions. As used herein, “this License” refers to version 3 of the GNU Lesser General Public License, and the “GNU GPL” refers to version 3 of the GNU General Public License. “The Library” refers to a covered work governed by this License, other than an Application or a Combined Work as defined below. An “Application” is any work that makes use of an interface provided by the Library, but which is not otherwise based on the Library. Defining a subclass of a class defined by the Library is deemed a mode of using an interface provided by the Library. A “Combined Work” is a work produced by combining or linking an Application with the Library. The particular version of the Library with which the Combined Work was made is also called the “Linked Version”. The “Minimal Corresponding Source” for a Combined Work means the Corresponding Source for the Combined Work, excluding any source code for portions of the Combined Work that, considered in isolation, are based on the Application, and not on the Linked Version. The “Corresponding Application Code” for a Combined Work means the object code and/or source code for the Application, including any data and utility programs needed for reproducing the Combined Work from the Application, but excluding the System Libraries of the Combined Work. 1. Exception to Section 3 of the GNU GPL. You may convey a covered work under sections 3 and 4 of this License without being bound by section 3 of the GNU GPL. 2. Conveying Modified Versions. If you modify a copy of the Library, and, in your modifications, a facility refers to a function or data to be supplied by an Application that uses the facility (other than as an argument passed when the facility is invoked), then you may convey a copy of the modified version: § a) under this License, provided that you make a good faith effort to ensure that, in the event an Application does not supply the function or data, the facility still operates, and performs whatever part of its purpose remains meaningful, or § b) under the GNU GPL, with none of the additional permissions of this License applicable to that copy. 3. Object Code Incorporating Material from Library Header Files. The object code form of an Application may incorporate material from a header file that is part of the Library. You may convey such object code under terms of your choice, provided that, if the incorporated material is not limited to numerical parameters, data structure layouts and accessors, or small macros, inline functions and templates (ten or fewer lines in length), you do both of the following: § a) Give prominent notice with each copy of the object code that the Library is used in it and that the Library and its use are covered by this License. § b) Accompany the object code with a copy of the GNU GPL and this license document. 4. Combined Works. You may convey a Combined Work under terms of your choice that, taken together, effectively do not restrict modification of the portions of the Library contained in the Combined Work and reverse engineering for debugging such modifications, if you also do each of the following: § a) Give prominent notice with each copy of the Combined Work that the Library is used in it and that the Library and its use are covered by this License. § b) Accompany the Combined Work with a copy of the GNU GPL and this license document. § c) For a Combined Work that displays copyright notices during execution, include the copyright notice for the Library among these notices, as well as a reference directing the user to the copies of the GNU GPL and this license document. § d) Do one of the following: o 0) Convey the Minimal Corresponding Source under the terms of this License, and the Corresponding Application Code in a form suitable for, and under terms that permit, the user to recombine or relink the Application with a modified version of the Linked Version to produce a modified Combined Work, in the manner specified by section 6 of the GNU GPL for conveying Corresponding Source. o 1) Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that (a) uses at run time a copy of the Library already present on the user's computer system, and (b) will operate properly with a modified version of the Library that is interface-compatible with the Linked Version. § e) Provide Installation Information, but only if you would otherwise be required to provide such information under section 6 of the GNU GPL, and only to the extent that such information is necessary to install and execute a modified version of the Combined Work produced by recombining or relinking the Application with a modified version of the Linked Version. (If you use option 4d0, the Installation Information must accompany the Minimal Corresponding Source and Corresponding Application Code. If you use option 4d1, you must provide the Installation Information in the manner specified by section 6 of the GNU GPL for conveying Corresponding Source.) 5. Combined Libraries. You may place library facilities that are a work based on the Library side by side in a single library together with other library facilities that are not Applications and are not covered by this License, and convey such a combined library under terms of your choice, if you do both of the following: § a) Accompany the combined library with a copy of the same work based on the Library, uncombined with any other library facilities, conveyed under the terms of this License. § b) Give prominent notice with the combined library that part of it is a work based on the Library, and explaining where to find the accompanying uncombined form of the same work. 6. Revised Versions of the GNU Lesser General Public License. The Free Software Foundation may publish revised and/or new versions of the GNU Lesser General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number. If the Library as you received it specifies that a certain numbered version of the GNU Lesser General Public License “or any later version” applies to it, you have the option of following the terms and conditions either of that published version or of any later version published by the Free Software Foundation. If the Library as you received it does not specify a version number of the GNU Lesser General Public License, you may choose any version of the GNU Lesser General Public License ever published by the Free Software Foundation. If the Library as you received it specifies that a proxy can decide whether future versions of the GNU Lesser General Public License shall apply, that proxy's public statement of acceptance of any version is permanent authorization for you to choose that version for the Library.


The following are covered under the EBay API LICENSE:

  • ebay SDK. Copyright © 1999—2023 eBay Inc. All rights reserved.

EBAY DEVELOPERS PROGRAM TERMS OF USE AND API LICENSE AGREEMENT Thank you for your interest in the eBay Developers Program (the “Program”). Through the Program, eBay offers various tools, content, and services (the “Developer Tools”), including certain eBay Application Programming Interfaces (“APIs”), to manage and facilitate the development of applications that use content from and interact with eBay-branded marketplaces around the world. The Program and access to the Developer Tools are provided solely for the purpose of promoting and facilitating access to and use of eBay Services (defined below). If eBay believes you or Your Users are using the Developer Tools in any way that undermines eBay’s business interests, eBay may, at its sole discretion, terminate these Terms, suspend your license to use the APIs, discontinue your participation in the Program, terminate your access to the Developer Tools, and/or reduce your access to all or some APIs. These Terms of Use and API License Agreement (“Terms”) govern your participation in the Program, including your license to use the APIs and take effect as of the earlier of (a) the date you signify your agreement or (b) the date that you first access any Developer Tools or eBay Content (defined below) (the “Effective Date”), These Terms and the Developer Tools will change over time, so please check the eBay Developers Program site periodically to see the latest updates. You are contracting with an eBay company (individually and collectively referred to as "eBay," "we," or "us") determined by your country of residence. For example and as listed in the chart of eBay companies linked above, if you reside in the United States, you are contracting with eBay Inc. You represent and warrant that you are authorized to act on behalf of, and have the authority to bind, the party being issued an Application Key (defined below) to these Terms. You and the party being issued an Application Key are collectively referred to as “you” or “your” in these Terms. DEFINITIONS “Application Key(s)” means the confidential security keys eBay provides to you for your use of the API, including the developer ID, certificate ID, and application ID. “Application” means the software application, website or other interface that you develop, own or operate to interact with the API. “Authorized Use” has the meaning defined in Section 3.1. “eBay Content” means all of the information, data, content, images, and other material stored by and retrieved from eBay. eBay Content does not include information that you obtain independent of eBay. “eBay Logos” has the meaning defined in Section 3.4. “eBay Services” means eBay Sites, including any eBay Content therein, and all other services, applications and tools eBay offers to eBay Users. “eBay Site(s)” means any one or all of the following: ebay.com and all international versions thereof that are owned, operated, and controlled by eBay Inc. or its subsidiaries (for example, ebay.de, ebay.co.uk, ebay.com.au, etc.). “eBay User” means any person who accesses any eBay Service, directly or through the Developer Tools. “eBay User Agreement” means the terms and policies on which eBay offers eBay Services to eBay Users, currently available through a link on the homepage of each eBay Site (for example, the ebay.com User Agreement). “Your Users” means end-users of your Application and anyone who sublicenses your Application. “Personal Information” means any information that directly or indirectly identifies an eBay User that you obtain through your participation in the Program and your use of the Developer Tools, including information that you collect directly from Your Users in connection with your Application, information that is included in eBay Content, or information that you otherwise receive from eBay about Your Users or other eBay Users and their trading activities. DEVELOPERS PROGRAM CONDITIONS Participation in the Program. You may participate in the Program and use the Developer Tools to create and use Applications that access and/or interact with eBay Services consistent with the Authorized Use and these Terms. You agree that you are solely responsible for the Applications that you develop. You agree to provide and maintain accurate contact information and you will inform us promptly of any updates to your contact information. Application Guidelines. Applications that you develop, display or distribute that interact with the API must comply with eBay’s Compatible Application Check requirements, incorporated herein by reference. Additional Certifications. Access to certain APIs, eBay Content and increased API call limits may require special certifications. You may be responsible for any costs associated with such certifications, as well as any modifications necessary for your Application to meet certification criteria. LICENSE FOR DEVELOPER TOOLS Authorized Use. eBay grants you a non-exclusive, non-transferable, and non-sublicensable (except as expressly permitted herein) license to use the Developer Tools solely for the purpose of facilitating your own or Your Users’ use of eBay Services, such use limited to the following (the “Authorized Use”): Enabling your Application to interact with eBay’s databases (for example, the eBay public database and the Sandbox Test Environment); Making limited intermediate copies of eBay Content only as necessary to perform an activity permitted under these Terms. All intermediate copies must be deleted when they are no longer required for the purpose for which they were created; Rearranging or reorganizing eBay Content within your Application consistent with these Terms; Displaying eBay Content consistent with these Terms; and Using, displaying or modifying eBay Content as expressly authorized by Your Users and consistent with these Terms. Application Keys. eBay will provide you with Application Keys that permit you to access eBay’s databases. You may not share or transfer your Application Keys to any third party without eBay’s prior written consent. The Application Keys are the property of eBay and may be revoked at any time by eBay. API Call Limitations. eBay reserves the right to limit the number of periodic API calls you are allowed to make. eBay may temporarily suspend your access to the API if you exceed API call limits. Attempts to circumvent API call limits may result in termination of these Terms, suspension of your license to use the APIs, discontinuance of your participation in the Program, termination of your access to the Developer Tools, and/or reduction of your access to all or some APIs. Unused API calls will not roll over to the next call limit period. Developers Program Logos. eBay grants you a non-exclusive, non-transferable and nonsublicensable license to display certain eBay logos as set forth in the API Logo Usage Requirements, incorporated herein by this reference (“eBay Logos”). eBay may update these requirements from time to time, and you must ensure compliance with current standards. Loyalty Program Badges. eBay grants you a non-exclusive, non-transferable and non-sublicensable license to display certain eBay Loyalty Program Badges as set forth in the eBay Badge Usage Terms, incorporated herein by this reference (“Loyalty Program Badges”). eBay may update these requirements from time to time, and you must ensure compliance with current standards. WORKING WITH THIRD PARTIES Service Providers. You may work with service providers as necessary to facilitate your performance under these Terms but only if you require your service providers to comply with all of the conditions and restrictions of these Terms. You acknowledge and agree that any act or omission by your service provider(s) amounting to a breach of these Terms will be deemed a breach by you. Sublicensing. Except as set forth in this Section 4.2, all license rights (under any applicable intellectual property right) granted to you by eBay are not sub-licensable, transferable or assignable. You may sublicense your right to display the eBay Content and the API Logos to Your Users solely to enable them to display eBay Content and the API Logos on their computer screens or websites through your Application; provided that: You will not disclose your Application Keys to Your Users. All API calls initiated by Your Users will be made through your Application Keys. All API calls initiated by Your Users will count towards your maximum permitted API calls. Your Users will have no programmatic control over the API. You will enter into a binding agreement with each of Your Users that includes the following terms: (1) Your Users will be bound by these Terms; (2) eBay will be a third-party beneficiary to such agreement; (3) such sublicense is terminable at any time. Breach by Your Users. As a third-party beneficiary to all sublicenses pursuant to these Terms, eBay will have the right, in its sole discretion, to directly enforce any term of the sublicense agreement against Your Users, including termination. You acknowledge and agree that any act or omission by Your Users amounting to a breach of these Terms will be deemed a breach by you. OWNERSHIP. As between eBay and you, except for the limited licenses granted by these Terms: (i) eBay retains all rights, title and interest in and to all intellectual property rights embodied in or associated with the Developer Tools, eBay Services, eBay Content, eBay Logos, and any content created or derived therefrom; and (ii) you retain all rights, title and interest in and to all intellectual property rights embodied in or associated with your Application, excluding the aforementioned rights in Section 5(i) above owned by or licensed to eBay. There are no implied licenses under these Terms, and any rights not expressly granted to you hereunder are reserved by eBay or its suppliers. You will not take any action inconsistent with eBay’s ownership of the Developer Tools, eBay Services, eBay Content or eBay Logos. COMPETITIVE OR SIMILAR MATERIALS. In no event will eBay be precluded from discussing, reviewing, developing for itself, having developed, acquiring, licensing or developing for third parties, as well as marketing and distributing, materials which are competitive with your Application or other products or services provided by you, irrespective of their similarity to your current products or products that you may develop. TRADEMARK AND COPYRIGHT LICENSE. eBay, in its sole discretion, may use your trade names, trademarks, service marks, logos, and domain names for the purpose of advertising or publicizing your participation in the Program and use of the API. If you submit an Application for inclusion on an eBay Site or to be hosted by eBay, you direct and authorize eBay and its affiliates to host, link to, and otherwise incorporate the Application into eBay Services and to carry out any copying, modification, distribution, internal testing, or other processes eBay deems necessary. EBAY CONTENT Using and Displaying eBay Content. You may use and display eBay Content only within your Application and in accordance with the following guidelines: Authentication. If your Application will enable Your Users to interact with eBay Services in a way that requires sign-in to their eBay accounts (for example, bidding, buying, listing or access to My eBay), you may provide this access only after “Authentication”. Authentication occurs when an eBay User grants your Application access to their eBay Content via an eBay-controlled sign-in and consent page. An “Authenticated User” is an eBay User who has granted such access to your Application. You warrant that Your Users may revoke Authentication at any time for any reason. Public Display. To the extent eBay Content is publicly available within an eBay Service, you may display such eBay Content within your Application to promote eBay and enable Your Users to search and browse listings (“Public Display”), subject to the following restrictions: (1) When the eBay Content is no longer publicly available, you must delete it from your Application. For example, when an eBay User ID is publicly available in connection with a listing on the eBay Site, you may display the eBay User ID through your Application; but if that eBay User ID is no longer viewable in connection with the listing or is otherwise anonymized, you may no longer display the eBay User ID in a Public Display. (2) eBay Content in a Public Display may not be co-mingled or combined with non-eBay Content. For example, all eBay Content in a Public Display must be visually isolated from third-party listings or other non-eBay information. (3) eBay Content that is available only to an eBay User after signing in to the eBay User’s account may only be displayed to that eBay User after Authentication, and such eBay Content may not be used for Public Display without the explicit prior consent of that Authenticated User. Age of Displayed eBay Content. eBay Content displayed within your Application must be kept reasonably up to date. Displayed item listing information may not be more than six (6) hours older than information displayed on the eBay Site, and other eBay Content must be no more than twenty-four (24) hours older than content displayed on the eBay Site. If your displayed item listing is not as current as the listing on the eBay Site, you will disclose on your Application how much older your displayed item listing is than the same listing on the eBay Site. Prohibited Use and Derivation of Information. You must have eBay’s express prior written permission to use, or display eBay Content in any way that enables derivation of, any of the following: Any site-wide statistics across eBay Sites or within any eBay Site; Take-up rates for enhanced listings (for example, gallery, featured, category featured, etc.); Statistics relating to the performance (financial or otherwise) of any eBay Service (for example, gross merchandise sales); Average selling price or gross merchandise sold for any eBay category. Notwithstanding Your Users’ access to and use of their own information, you must have eBay’s express prior written permission to use, or display eBay Content in any way that enables derivation of, the following: Aggregated seller or buyer data (for example, Personal Information); Data relating to the performance of sellers, either individually or in aggregate (for example, performance data related to promotional campaigns, ad placements, or promoted listings); Aggregated data relating to transactions conducted through thirdparty affiliates (for example, off-eBay purchases on social networks, merchants, or other marketplaces enabled through Buy APIs); Data comparing eBay User utilization of eBay Services and the services of any third-party; Information relating to specific eBay Users or types of eBay Users; Conversion, completion or success rates; or Reserve auction information. Displaying Aggregated Content. Unless expressly permitted by eBay, you will not display any web page served by eBay servers in an aggregated display of different web pages in a browser display area (for example, by framing or mirroring). Protecting User Privacy Collecting and Storing Personal Information. Your participation in the Program and your use of the Developer Tools may allow you to collect Personal Information from and about eBay Users. You will delete Personal Information when requested by eBay or by the applicable eBay User, when it is no longer necessary for your Application or when your participation in the Program is terminated. You will not under any circumstances collect or store any eBay User IDs or passwords. Compliance with Privacy Laws. At all times, you will cause your Application and your use of the Developer Tools, eBay Content and Personal Information to comply with all applicable laws, rules, regulations and best practices concerning privacy and data protection. Your Privacy Policy. You must make publicly available, and must abide by, an appropriate privacy policy for your application. Using Your Users’ Personal Information. You warrant as follows: (i) your collection and use of Your Users’ Personal Information will be only as authorized by Your Users; (ii) you will comply with your privacy policy; and (iii) your privacy policy and your privacy practices will comply with all applicable laws, rules and regulations. In all cases, your privacy policy must be consistent with the eBay Privacy Notice (meaning, at a minimum, that you may not process Personal Information in a manner that eBay cannot), which notice is available on each of the eBay Sites (for example, the ebay.com Privacy Notice). Information About Other eBay Users. You may receive information about eBay Users who may not be Your Users (“Other Users”) that is (i) publicly available from eBay; (ii) provided by eBay through the API; or (iii) otherwise obtained by you in connection with your participation in the Program and use of the Developer Tools (“Other User Information”). You may use Other User Information only as strictly necessary to perform activities permitted under these Terms and strictly in compliance with your privacy policy and applicable laws, rules and regulations. Using Other User Information. You will not collect, store, use, disclose or otherwise process Other User Information for any purpose other than facilitating the use of eBay Services as permitted under these Terms. eBay Privacy Notice. Your use of Other User Information will be consistent with the eBay Privacy Notice (meaning, at a minimum, that you will not process Other User Information in a manner that eBay cannot). Public Display of Other User Information. You may engage in the Public Display of Other User Information (for example, eBay listings) only in accordance with Section 8.1(b). Application Testing. The Sandbox Test Environment (the “Sandbox”) is a production environment for testing applications to ensure proper operation with respect API integration. The Sandbox is intended for testing API logic and API behavior only. You may use information made available in the Sandbox for application development and test only. You are responsible for safeguarding your data and the data of your customers. You are prohibited from publishing confidential, personal data, or restrictive data in the Sandbox. You must delete your Application from the Sandbox immediately after testing is completed. DPRA Requirements. Your continued access to the Developer Tools and eBay Content is subject to your compliance with the terms of the eBay Data Protection Requirements Addendum attached as Exhibit A and incorporated herein by reference, as the same may be updated from time to time. Communication. You will not use Personal Information to send or enable sending of unsolicited communications of any type to any eBay Users. You may only communicate with Your Users, or send communications initiated by and on behalf of Your Users to Other Users, to promote and facilitate access to and use of eBay Services. RESTRICTED ACTIVITIES. Notwithstanding any rights expressly granted under these Terms, you may not use or access (nor facilitate or enable others to use or access) eBay Services, including the Developer Tools, in any way which may, directly or indirectly, undermine eBay’s business interests without eBay’s prior written consent. For example, you will not, and you will not facilitate or enable others to: Distribute, publish, or allow access or linking to eBay Services, including the API, from any location or source other than your Application. Enable or permit the disclosure of eBay Content other than as authorized under these Terms. Use eBay Content to determine or verify eBay User identities or user profiles. Use eBay Content with the intent to design, build, promote or augment any service competitive to eBay Services. Display eBay Content relating to the performance of any eBay Service relative to the performance of any third-party service (for example, sales volume, velocity, etc.). Use eBay Content, either alone or in combination with third-party information, to suggest or model prices for items listed on eBay Sites. Use eBay Services to promote or engage in seller arbitrage (for example, automatically repricing eBay listings in response to price changes on competitor sites, automatically ordering sold items from competitor sites, and posting tracking information to eBay when items purchased from competitor sites are shipped). Sell, rent, trade, distribute, lease (or otherwise commercialize), copy, store or modify eBay Content, other than for the purposes allowed by these Terms. Enable eBay Users to set or change eBay User preferences, registration preferences or privacy preferences for the eBay Site with your Application, notwithstanding listing preferences, item cross-promotion preferences or preferences that customize end-of-auction emails. Collect, use and/or otherwise process Personal Information of any eBay User other than as provided in these Terms. Modify, decompile, reverse engineer or otherwise alter the Developer Tools or eBay Content. Knowingly create an Application that may be used to violate these Terms, the eBay User Agreement, any other eBay policy or applicable laws, rules or regulations. Use the API in a manner that exceeds reasonable request volume, constitutes excessive or abusive usage or otherwise fails to comply or is inconsistent with any part of the eBay Developer Documentation, incorporated herein by this reference. Have your Application or your use of eBay Services, including your use of the Developer Tools: (i) be false, inaccurate or misleading; (ii) infringe on any third party's copyright, patent, trademark, trade secret or other property rights or rights of publicity or privacy; (iii) violate any law, statute, ordinance, contract, regulation or generally accepted practice in all relevant jurisdictions (including without limitation those governing trade and export, financial services, consumer protection, unfair competition, antidiscrimination or false advertising); (iv) be defamatory, trade libelous, threatening or harassing; (v) contain or distribute any malware or other computer programming routines that may damage, detrimentally interfere with, surreptitiously intercept or expropriate any system or data; or (vi) create liability for eBay or cause eBay to lose (in whole or in part) the services of eBay’s ISPs or other suppliers. Have your Application introduce to eBay Services or any third party systems, any information, code or other content that (i) is illegal; (ii) is abusive; (iii) is harmful to or interferes with eBay Services or systems of any other entity, or the use thereof; (iii) infringes, misappropriates or otherwise violates the intellectual property, privacy or other proprietary rights of any party, including eBay; (v) creates a security risk or vulnerability; or (vi) attempts to do any of the foregoing. Provide any inaccurate data or information to eBay, or provide data or information to eBay without having all of the rights necessary to provide such data or information to eBay and for eBay to use it. Misrepresent or mask your identity in providing information as part of the registration process or as part of your continuing use of the APIs or during the application check process. Using Buyer Demand Data in any manner other than for the expressed purpose of constructing or editing of a listing. EBAY POLICIES. You and your Application will comply with the eBay User Agreement, which is incorporated into these Terms by reference. In the event of a conflict between these Terms and the eBay User Agreement regarding your participation in the Program and use of the Developer Tools, these Terms will control. MODIFICATIONS Modification of the Developer Tools, Sites and Services. eBay may modify the Developer Tools, API call limits, its databases, any eBay Service, or any of the benefits and/or features provided in connection with your use of the Developer Tools at any time with or without notice to you. Modifications may affect your Application and may require you to make changes to your Application at your own cost to continue to be compatible with or interface with the API or other eBay Services. Modification of these Terms. eBay may amend these Terms at any time by posting the amended Terms to the eBay Developers Program site. eBay may also send you notice of the amended terms via email. Except where stated otherwise, all amended terms will be effective thirty (30) days after they are posted or emailed to you. IF ANY MODIFICATION IS UNACCEPTABLE TO YOU, YOUR ONLY RECOURSE IS TO TERMINATE THESE TERMS IN ACCORDANCE WITH THESE TERMS, BEFORE THE EFFECTIVE DATE OF THE AMENDMENT(S). YOUR USE OF THE DEVELOPER TOOLS AFTER THE DATE ON WHICH CHANGES TAKE EFFECT WILL CONSTITUTE YOUR ACCEPTANCE OF SUCH CHANGES. These Terms may not otherwise be amended except through mutual written agreement (not including email) by you and an eBay representative who intends to amend these Terms and is duly authorized to agree to such an amendment. MONITORING AND ENFORCEMENT Right to Monitor and Audit. You agree that eBay may monitor or audit your Application or activities relating to your use of Developer Tools. At eBay’s request, you will provide eBay free access to use your Application for the purpose of monitoring or auditing your Application. You will not seek to block or otherwise interfere with the monitoring or audit, and eBay may use technical means to overcome any methods you may use to block or interfere with such monitoring. Audits may include requests for documents and information and visits to your facilities. Remedy for Breach. If eBay, in its sole discretion, believes that you or your service providers have breached these Terms, or that you or your service providers have engaged in fraudulent activity, eBay may take any and all steps it deems appropriate, including suspending your license to use the APIs, discontinuing your participation in the Program, terminating your access to the Developer Tools, and/or reducing your access to all or some APIs. Corrective Action. In addition to any other available remedies, eBay may, at its sole discretion, seek specific performance, injunctive relief or attorneys' fees. eBay reserves the right to take other corrective action as eBay sees fit in the event that eBay receives complaints from eBay Users about your Application or your actions. AVAILABILITY, SECURITY AND STABILITY eBay makes no guarantees with respect to the availability or uptime of the Developer Tools or any other eBay Services. eBay may conduct maintenance on or stop providing any of the Developer Tools or other eBay Services at any time, with or without notice to you. eBay may change the method of access to the Developer Tools at any time. In the event of degradation or instability of eBay’s systems or an emergency, eBay may, in its sole discretion, temporarily suspend your access to the Developer Tools or other eBay Services. DISCLAIMER OF WARRANTIES & LIMITATION OF LIABILITY SOME JURISDICTIONS DO NOT ALLOW CERTAIN WARRANTY DISCLAIMERS OR LIMITATIONS ON LIABILITY. ONLY DISCLAIMERS OR LIMITATIONS THAT ARE LAWFUL IN THE APPLICABLE JURISDICTION WILL APPLY TO YOU, AND EBAY’S LIABILITY WILL BE LIMITED TO THE MAXIMUM EXTENT PERMITTED BY LAW. EXCEPT AS EXPRESSLY STATED HEREIN, EBAY DISCLAIMS ALL WARRANTIES AND CONDITIONS, EXPRESS, IMPLIED OR STATUTORY, INCLUDING WITHOUT LIMITATION THE IMPLIED WARRANTIES OF TITLE, NON-INFRINGEMENT, MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. ALL EBAY SERVICES PROVIDED BY EBAY HEREUNDER ARE PROVIDED “AS IS” AND “AS AVAILABLE” AND EBAY DOES NOT REPRESENT OR WARRANT THAT ANY EBAY SERVICES, INCLUDING THE DEVELOPER TOOLS, WILL OPERATE SECURELY OR WITHOUT INTERRUPTION. YOU ACKNOWLEDGE THAT YOU HAVE NOT ENTERED INTO THESE TERMS IN RELIANCE UPON ANY WARRANTY OR REPRESENTATION EXCEPT THOSE SPECIFICALLY SET FORTH HEREIN. EBAY WILL HAVE NO DIRECT, CONSEQUENTIAL, SPECIAL, INDIRECT, EXEMPLARY, PUNITIVE, OR OTHER LIABILITY WHETHER IN CONTRACT, TORT OR ANY OTHER LEGAL THEORY, UNDER THESE TERMS, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH LIABILITY AND NOTWITHSTANDING ANY FAILURE OF ESSENTIAL PURPOSE OF ANY LIMITED REMEDY. IN THE EVENT THAT THE ABOVE IS NOT ENFORCEABLE, EBAY'S AGGREGATE LIABILITY UNDER THESE TERMS IS LIMITED TO AMOUNTS PAID OR PAYABLE TO EBAY BY YOU FOR THE DEVELOPER TOOLS IN THE MONTH PRECEDING THE CLAIM. IN THE EVENT THAT THE FORMER LIMITATION OF LIABILITY IS HELD UNENFORCEABLE BY A COMPETENT COURT, EBAY’S AGGREGATE LIABILITY IS IN ANY CASE LIMITED TO $25,000. INDEMNIFICATION. You will indemnify, defend and hold eBay, its employees, agents, consultants, subsidiaries, partners, affiliates, and licensors harmless against any and all claims, costs, losses, damages, liabilities, judgments and expenses (including reasonable fees of attorneys and other professionals) (collectively, “Claims”) that may arise from or are related to (i) use of the Developer Tools; (ii) the development, maintenance, use and contents of your Application, including but not limited to any infringement of any third-party proprietary rights; and (iii) your negligence or willful misconduct. eBay will: (i) give you prompt written notice of any Claim; provided, however, that failure to provide such notice shall not relieve you of your liabilities or obligations hereunder, except solely to the extent of any material prejudice as a direct result of such failure; (ii) cooperate with you, at your sole cost and expense, in connection with the defense and settlement of the Claim; and (iii) permit you to select counsel and to control the defense and settlement of the Claim; provided that you may not settle any Claim or take any other action to the extent such settlement or other action would materially adversely impact eBay’s rights, obligations or business operations without eBay’s prior written consent. eBay, at its cost and expense, may participate in the defense of the Claim through counsel of its own choosing. Notwithstanding the foregoing, if you fail to assume the defense of any Claim within thirty (30) calendar days after you receive a request for indemnification under this Section 15, eBay shall control its own defense and follow such course of action as it reasonably deems necessary to protect its interests and you shall fully indemnify eBay for all costs (including attorneys’ fees and settlement payments) reasonably incurred in such course of action. TERM AND TERMINATION Termination. EBAY RESERVES THE RIGHT TO TERMINATE THESE TERMS AND SUSPEND OR DISCONTINUE YOUR PARTICIPATION IN THE PROGRAM AND YOUR ACCESS TO THE DEVELOPER TOOLS, INCLUDING YOUR LICENSE TO USE THE API, OR ANY PORTION OR FEATURE THEREOF, FOR ANY OR NO REASON AND AT ANY TIME WITH OR WITHOUT NOTICE TO YOU AND WITHOUT LIABILITY TO YOU. If you wish to terminate these Terms, you must email a termination notice to ebaydevelopersprogram@ebay.com. Any other methods used by you to terminate these Terms will be void and will not result in a termination. Your termination notice will be effective when it is received by eBay. Effect of Termination. Upon the termination of these Terms, you will immediately stop using the APIs. Your Application Keys will be revoked and all licenses granted hereunder will terminate. You will destroy all intermediate copies of eBay Content and Personal Information in your possession within ten (10) days after termination and you will provide written proof of destruction to eBay upon eBay’s request. Survival. The following Sections will survive any termination of these Terms: [1] Definitions, [5] Ownership, [6] Competitive or Similar Materials, [7] Trademark and Copyright License, [8] eBay Content, [9] Restricted Activities, [10] eBay Policies, [14] Disclaimer of Warranties & Limitation of Liability, [15] Indemnification, [16.2] Effect of Termination, [17] Confidentiality, [18] Publicity, and [20] Miscellaneous. CONFIDENTIALITY. “Confidential Information” includes all information eBay provides to you under these Terms, including without limitation, Developer Tools, eBay Content, Personal Information and Application Keys. You will not use or disclose Confidential Information other than as required to perform under and as permitted by these Terms. Your confidentiality obligations will survive the termination of these Terms. You acknowledge that monetary damages may not be a sufficient remedy for unauthorized use or disclosure of Confidential Information and that eBay will be entitled (without waiving any other rights or remedies) to such injunctive or equitable relief as may be deemed proper by a court of competent jurisdiction, without obligation to post any bond. Any information you provide to eBay hereunder is considered by eBay to be non-confidential. You acknowledge and agree that you have no expectation that such information will be held confidential by eBay, and that eBay has no duty, express or implied, to pay any compensation for the disclosure or use of any such information. PUBLICITY. Absent the prior written approval of eBay, you will not directly or indirectly issue or permit the issuance of any public statement concerning any aspect of the eBay Developers Program. You permit eBay to make public statements about your use of the Developer Tools and/or participation in the eBay Developers Program. LAW AND VENUE. The rights and obligations of you and eBay shall be governed by, and these Terms shall be construed and enforced in accordance with, the Laws of the State of California, excluding its conflict of laws rules to the extent such rules would apply the Law of another jurisdiction. The Parties consent to the jurisdiction of all federal and state courts in California, and agree that venue shall lie exclusively in Santa Clara County, California. MISCELLANEOUS. You acknowledge and agree that these Terms constitute the entire agreement between you and eBay (the “parties”) and supersede all prior understandings and agreements of the parties. Any notices to eBay must be sent to our corporate headquarters address as set forth in the eBay User Agreement via first class or air mail or overnight courier, and is deemed given upon receipt. A waiver of any default is not a waiver of any subsequent default. Unenforceable provisions will be modified to reflect the parties' intention, and remaining provisions of these Terms will remain in full effect. Neither party may assign these Terms without the prior express written permission of the other party. Notwithstanding the foregoing, your consent shall not be required for eBay’s assignment or transfer (1) due to operation of law; or (2) to an entity that acquires substantially all of eBay’s stock, assets or business; or (3) to a related entity (e.g., parent or subsidiary of parent). You and eBay are independent contractors and nothing in these Terms creates a partnership, agency, joint venture, or employer-employee relationship between eBay and you. There are no third-party beneficiaries to these Terms. Exhibit A: eBay Data Protection Requirements Addendum Purpose and Scope: This Data Protection Requirements Addendum (the “DPRA”) reflects your commitment to abide by Applicable Law concerning the Processing of the eBay Data (defined below) contained within eBay Content and Personal Information. This DPRA prescribes the minimum data protection and information security standards that you, your agents and assigns must meet and maintain in order to protect eBay Data from unauthorized use, access, disclosure, theft, manipulation, reproduction, a Security Breach or otherwise during the term of the eBay Developers Program Terms of Use and API License Agreement (“Terms”) and for any period thereafter during which you, your agents or assigns has possession of or access to any eBay Content or Personal Information, is incorporated into the Terms by this reference, and is effective as of the Effective Date of the Terms. Your ongoing adherence to a Security Program (defined in Section 3.1 below) based on an Industry Recognized Framework is a condition to you doing business with eBay. Capitalized terms used but not defined herein shall have the meaning set forth in the Terms. Definitions: “Applicable Law” means any applicable data protection, privacy, or information security laws, codes, and regulations or other binding restrictions governing Processing of eBay Data. “Cardholder Information” means credit or debit card information regulated by the Payment Card Industry Security Council. “Data Centers” means locations at which you provide data Processing or transmission functions in support of your Application. Data Centers can be owned by you or by a third party. “Data Controller” means the party that determines the purposes of the Processing of Personal Data. “Data Processor” means the party that Processes Personal Data on behalf of, and under the instruction of, the Data Controller. “Data Subject” means the identified or identifiable person who is the subject of Personal Data. “eBay Data” means data or information (regardless of form, e.g., electronic, paper copy, etc.) transmitted through the eBay API(s) or otherwise provided by or on behalf of eBay to you. eBay Data may be classified as: “Confidential Data”: Information that is intended only for a limited audience within eBay or whose release would likely have an adverse financial or reputational effect on eBay, eBay customers, or eBay clients. Examples include, but are not limited to: customer or client customer individual names, email addresses, physical addresses and any other information that correlates to a person, software source code, customer personal contact information, customer email addresses, etc.; or “Personal Data”: data or information that makes a natural person identified or identifiable or is a numerical, physical, physiological, cultural, economic, mental or other factor of identity relating to an identified or identifiable person. eBay Data specifically excludes data classified by eBay as “Restricted Data,” which includes highly sensitive or regulated information that is intended only for a limited audience within eBay or whose release would likely have a material adverse financial or reputational effect on eBay or any Data Subject. Examples include but are not limited to: (i) Government issued identification numbers for specific countries (e.g., USA Social Security number; Germany Shufa ID, Canada Social Insurance number, driver’s license number; state identification number); (ii) Bank account numbers and related bank wire transfer financial information; and (iii) customer date of birth. You agree that you will not attempt to access, receive, transmit, Process or store any “Restricted Data” with the exception of Payment Card Industry (PCI) regulated data pursuant to Section 11 if authorized by the cardholder. “Incident” means any impairment to the security of eBay Data, including, but not limited to: any (i) alleged or confirmed misuse of eBay Data; or (ii) unauthorized access to or attempt to access eBay Data. “Industry Standard Encryption Algorithms and Key Strengths” means encryption should at least meet the following standard encryption algorithm (note: The algorithm and key strengths may change depending upon the new and most up-to-date industry standard encryption practice): Symmetric encryption: AES (≥ 128-bit); Asymmetric encryption: RSA (≥ 2048-bit); Hashing: SHA-2 (≥ 224-bit) with “salt” shall be added to the input string prior to encoding to ensure that the same password text chosen by different users will yield different encodings. “Industry Recognized Framework” means a global industry recognized information security management system (“ISMS”), such as ISMS standard ISO/IEC 27001:2013 and ISO/IEC 27002:2013 – Information technology – Security techniques – Information security management systems – Requirements, as published by the International Organization for Standardization and the International Electrotechnical Commission (“ISO 27001”) or equivalent information security standard as mutually agreed upon by eBay and you. “Processing” or “Processes” means any operation or set of operations which is performed upon eBay Personal Data, whether by automatic means or not, including but not limited to collection, recording, organization, structuring, storage, adaptation, alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure or destruction. “Security Breach” means a compromise of the systems in which eBay Data has been accessed or acquired by one or more unauthorized parties, or you or eBay reasonably suspects that such a breach of security may have occurred, or any act that violates any Applicable Law. For the avoidance of doubt, “a compromise of the systems” includes, but is not limited to: misuse, loss, destruction, unauthorized access, collection, retention, storage, or transfer. “Sub-Processor” means any of your Affiliates, agents or assigns that Processes eBay Personal Data subject to the Terms, and any unaffiliated Data Processor engaged by you or by your Affiliates. Security Management: Scope and Contents. You will develop, implement, maintain and enforce a written information privacy and security program (“Security Program”) that (i) aligns with an Industry Recognized Framework; (ii) includes administrative, technical and physical safeguards reasonably designed to protect the confidentiality, integrity and availability of eBay Data; (iii) is appropriate to the nature, size and complexity of your business operations; and (iv) complies with any Applicable Laws that are applicable for the geographic region in which you do business. Security Program Changes. You will provide details of any major changes to your Security Program that may adversely affect the security of any eBay Data. Such details must be communicated in writing to the eBay Security Operations Center (as provided in Section 8 below) within ten (10) business days prior to the effectiveness of any changes. Security Officer. You will designate a senior employee to be responsible for overseeing and carrying out your Security Program and for communicating with eBay on information security matters (the “Security Officer”). Upon eBay’s request, the Security Officer will provide eBay with the contact information of one or more your representatives who will be available to discuss any security concerns (e.g., discovered vulnerability, exposed risk, reported concern) with eBay and to communicate the level of risk associated with such concerns and any remediation thereof. Your representative must be available during normal business hours. Any changes to the contact information of the Security Officer or designated representatives must be communicated to the eBay Security Operations Center (as provided in Section 8 below) within twenty-four (24) hours via e-mail or telephone. Training. You certify that your personnel will be provided with a clear understanding of procedures and controls reasonably necessary to comply with this DPRA prior to their being granted access to eBay Data. Your personnel will, upon hiring, and at least annually thereafter, participate in security awareness training. This training will cover, at a minimum, your security policies, including acceptable use, password protection, data classification, incident reporting, the repercussions of violations, and brief overviews of Applicable Law. You will also provide training regarding data privacy and protection if you or your personnel accesses eBay Personal Data. Due Diligence over Subcontractors. You will maintain a security process to conduct appropriate due diligence prior to utilizing subcontractors, including Sub-Processors, to provide any services under the Terms. You will assess the security capabilities of any such subcontractors on an annual basis to ensure subcontractor’s ability to comply with this DPRA and the Terms. The due diligence process will provide for the identification and resolution of significant security issues prior to engaging a subcontractor, written information security requirements that oblige subcontractor to adhere to your key information security policies and standards within all contracts, and for the identification and resolution of any security issues. You will maintain subcontractor audit reports, subcontractor information security controls, and/or any assessment work for a minimum of three (3) years from the date of the assessment. Logical Security: General. The logical security processes in this Section 4 apply to all of your systems or your agents’ or your assigns’ systems and supporting networks used to provide services under the Terms and on which eBay Data is accessed, Processed, stored, transferred or maintained. Systems Access Control and Network Access Control. Access Controls. You certify that you employ access control mechanisms that prevent unauthorized access to eBay Data; limit access to your personnel with a business need to know; follow the principle of least privilege allowing access to only the information and resources that are necessary under the terms of the Terms; and have the capability of detecting, logging, and reporting access to the system or network or attempts to breach security of the system or network. Additionally: You will revoke your personnel’s access to physical locations, systems, and applications that contain or Process eBay Data within twenty-four (24) hours of the cessation of such personnel’s need to access the system(s) or application(s); All personnel must have an individual account that authenticates that individual’s access to eBay Data. You will not allow sharing of accounts; and Access controls and passwords must be configured in accordance with industry standards and best practices. Passwords will be hashed with industry standard algorithms per Section 9 below. Regular Review of Access Controls. You will maintain a process to review access controls on a minimum annual basis for all of your systems that contain eBay Data, including any system that, via any form of communication interface, can connect to the system on which eBay Data is stored. These access processes and the process to establish and delete individual accounts will be documented in, and will be in compliance with your security policies and standards referenced in Section 3.1 above. You will maintain the same processes of review and validation for any third party hosted systems you use that contain eBay Data Remote Access Authentication. You will configure remote access to all networks storing, transmitting, or containing eBay Data to require two-factor authentication for such access by your Personnel. Telecommunication and Network Security Firewalls. You will deploy reasonably appropriate firewall technology in the operation of your sites. Traffic between eBay and you will be protected and authenticated by industry standard cryptographic technologies. Firewall Maintenance. At a minimum, you will review firewall rule sets annually to ensure that legacy rules are removed and active rules are configured correctly. Intrusion Detection and Prevention. You will deploy intrusion detection or preferably prevention systems (NIDS/NIPS) in order to generate, monitor, and respond to alerts which could indicate potential compromise of the network and/or host. Log Management. You shall deploy a log management solution and retain logs produced by firewalls and intrusion detection systems for a minimum period of one (1) year. Network Segmentation. You shall establish and maintain appropriate network segmentation, including the use of virtual local area networks (VLANS) where appropriate, to restrict network access to systems storing eBay Data. You will proxy all connections from public networks into the your internal network using DMZ or equivalent. You will not allow direct connections from public networks into any network segment storing eBay Data. Wireless Security. If you deploy a wireless network, you will configure and maintain the use, configuration and management of wireless networks to meet the following: Physical Access – All wireless devices shall be protected using appropriate physical controls to minimize the risk of theft, unauthorized use, or damage; Network Access – Network access to wireless networks should be restricted only to those authorized; Access points shall be segmented from an internal, wired LAN using a gateway device; The service set identifier (SSID), administrator user ID, password and encryption keys shall be changed from the default value; Encryption of all wireless connections will be enabled using Industry Standard Encryption Algorithms (i.e. WPA2/WPA with 802.1X authentication and AES encryption). WEP should never be used; If supported, auditing features on wireless devices shall be enabled and resulting logs shall be reviewed periodically by designated staff or a wireless intrusion prevention system. Logs should be retained for ninety (90) days or longer; and SNMP shall be disabled if not required for network management purposes. If SNMP is required for network management purposes, SNMP will be read-only with appropriate access controls that prohibit wireless devices from requesting and retrieving information and all default community strings will be changed. You will maintain a program to detect rogue access points at least quarterly to ensure that only authorized wireless access points are in place. If you have not deployed a wireless solution, you are still required to conduct this quarterly audit to ensure that user-deployed wireless access points are not in use. Malicious Code Protection. All workstations and servers will run the current version of industry standard anti-virus software with the most recent updates available on each workstation or server. Virus definitions must be updated within twenty-four (24) hours of release by the anti-virus software vendor. You will configure this equipment and have supporting policies to prohibit users from disabling anti-virus software, altering security configurations, or disabling other protective measures put in place to ensure the safety of eBay’s or your computing environment. Systems Development and Maintenance: Documentation and Training. You must maintain documentation on overall system, network, and application architecture, data flows, process flows, and security functionality for all applications that process or store any eBay Data. You must employ documented secure programming guidelines, standards, and protocols in the development of applications that process or store any eBay Data. You shall be responsible for verifying that all development staff have been successfully trained in secure programming techniques. You should be trained on all current application vulnerabilities, including, but not limited to OWASP Top 10, WASC TCv2, and the CWE-25. You should know how to recognize these issues and how to remediate them. Change Management. You will employ an effective, documented change management program with respect to services provided under the Terms as an integral part of your security profile. This includes logically or physically separate environments from production for all development and testing. No eBay Data will be transmitted, stored or Processed in a non-production environment. 5.3 Vulnerability Management and Application Security Assessments. You must run internal and external network vulnerability scans at least quarterly and after any material change in the network configuration (e.g., new system component installations, changes in network topology, firewall rule modifications, or product upgrades). Vulnerabilities identified and rated as high risk by you will be remediated within ninety (90) days of discovery. For all Internet-facing applications that collect, transmit or display eBay Data, you agree to conduct an application security assessment review to identify common security vulnerabilities as identified by industry-recognized organizations (e.g., OWASP Top 10 Vulnerabilities; CWE/SANS Top 25 vulnerabilities) annually or for all major releases, whichever occurs first. The scope of the security assessment will primarily focus on application security, including, but not limited to, a penetration test of the application, as well as a code review. At a minimum, it will cover the OWASP Top 10 vulnerabilities (https://www.owasp.org). For all mobile applications (i.e. running on Android, Blackberry, iOS, Windows Phone) that collect, transmit or display eBay Data, you agree to conduct an application security assessment review to identify and remediate industry-recognized vulnerabilities specific to mobile applications. You should utilize a qualified third party to conduct the application security assessments. You may conduct the security assessment review yourself, provided that your personnel performing the review are sufficiently trained, follow industry standard best practices, and the assessment process is reviewed and approved by eBay. Vulnerabilities identified and rated as high risk by you will be remediated within ninety (90) days of discovery. Patch Management. You will patch all workstations and servers with all current operating system, database and application patches deployed in your computing environment according to a schedule predicated on the criticality of the patch. You must perform appropriate steps to help ensure patches do not compromise the security of the information resources being patched. All emergency or critical rated patches must be applied as soon as possible but at no time will exceed thirty (30) days from the date of release. Email Security: If you are sending emails to eBay customers, appropriate email identity solutions, including but not limited to DKIM, SPF, and DMARC, will be utilized. If you utilize eBay-owned domain names to send emails, you will adhere to the eBay Email Security requirements, provided upon request. eBay Security Assessments and Audits: You shall, upon reasonable notice, allow your data Processing facilities, procedures and documentation to be inspected by eBay (or its designee) in order to ascertain compliance with Applicable Law, this DPRA, or any agreements between you and eBay. You shall fully cooperate with audit requests by providing eBay access to relevant knowledgeable personnel, physical premises, documentation, infrastructure, and application software. Incident Response and Notification Procedures: You will maintain an Incident response function capable of identifying, mitigating the effects of, and preventing the recurrence of Incidents. Upon discovering or otherwise becoming aware of an Incident that may put eBay Data at risk (“Security Breach”), you shall take all reasonable measures to mitigate the harmful effects of the Incident. You shall also notify eBay of the Security Breach as soon as practicable, but in no event later than 24 hours after the Security Breach. Notice to eBay shall be written to DL-eBaySecurity-Report@ebay.com and shall include: (i) the identification of the eBay Data which has been, or is reasonably believed to have been, used, accessed, acquired or disclosed during the incident; (ii) a description of what happened, including the date of the incident and the date of discovery of the incident, if known; (iii) the scope of the incident, including a description of the type of eBay Data involved in the incident; (iv) a description of your response to the incident, including steps you have taken to mitigate the harm caused by the incident; and (v) other information as eBay may reasonably request. You must ensure that affected third parties are notified of the Security Breach, at eBay’s sole discretion, either by notifying such third parties after eBay has reviewed and approved the language and method of notice, or by enabling eBay to notify such third parties itself. You agree to cover the costs of any such notification, including reimbursing eBay for any reasonable costs such as to provide credit monitoring to affected Data Subjects. You will retain all data related to known and reported Incidents or investigations indefinitely or until eBay notifies you that the image is no longer needed. Upon eBay’s request, you will permit eBay or its third party auditor to review and verify relevant video surveillance records, access logs and data pertaining to any Incident investigation. Upon conclusion of investigative, corrective, and remedial actions with respect to an Incident, you will prepare and deliver to eBay a final report that describes in detail: (i) the extent of the Incident; (ii) the eBay Data disclosed, destroyed, or otherwise compromised or altered; (iii) all supporting evidence, including, but not limited to, system, network, and application logs; (iv) all corrective and remedial actions completed; and (v) all efforts taken to mitigate the risks of further Incidents. Storage, Handling, and Disposal: Data Segregation. You will physically or logically separate and segregate eBay Data from your other clients’ data. Electronic Form Data. You will utilize Industry Standard Encryption Algorithms and Key Strengths (as defined in the “Definitions” section of this DPRA) to encrypt the following: All eBay Data that is in electronic form while in transit over all public wired networks (e.g., Internet) and all wireless networks. Passwords will be hashed with irreversible industry standard algorithms with randomly generated “salt” added to the input string prior to encoding to ensure that the same password text chosen by different users will yield different encodings. The randomly generated salt should be at least as long as the output of the hash function. Any mobile devices used outside of a Data Center (e.g., laptop, desktop tablet) to perform any services under the Terms. Data Centers. To the extent you are operating a Data Center or utilizing a Third Party Data Center, you will comply with physical security controls outlined in one or more of the following industry standards: ISO 27001, SSAE 16 or ISAE 3402, or PCI-DSS. Data Retention. Except where prohibited by law, upon the earliest to occur of: (i) the termination of the Terms; (ii) such time when eBay Data is no longer required for the purposes of the Terms; (iii) upon written request from eBay or an applicable data subject, or (iv) such time that your data retention period has exceeded industry best practices for the time/duration/age of the eBay Data: You will promptly remove the eBay Data from your environment and destroy it within a reasonable timeframe, but in no case longer than thirty (30) days thereafter, All media used to store eBay Data will be sanitized or destroyed as required in the “Destruction of Data” Section 9.5, and You will provide eBay with a written certification regarding such removal, destruction, and/or cleaning upon request. Destruction of Data. You will dispose of eBay Data at such time as outlined in the “Data Retention” Section 9.4. eBay Data should be disposed of in a method that prevents any recovery of the data in accordance with industry best practices for shredding of physical documents and wiping of electronic media (e.g. current version of NIST SP 800-88). You will destroy any equipment containing eBay Data that is damaged or non-functional. All eBay Data must be rendered unreadable and unrecoverable regardless of the form (physical or electronic). Ownership; Use: You acknowledge and agree that you have no ownership of, or right to use, eBay Data other than as expressly permitted under the Terms or as authorized by eBay in writing. For the avoidance of doubt, you have no right to copy, use, reproduce, display, perform, modify or transfer eBay Data or any derivative works thereof, except as expressly provided in the Terms or as expressly authorized by eBay in writing. You acknowledge and agree that you will not use (or permit any third party to use) the eBay Data for any use other than as expressly provided in the Terms. Payment Card Industry (“PCI”) Compliance: Section 11 applies whenever you are “PCI Relevant.” “PCI Relevant” means you will be transmitting, Processing, handling, accessing, maintaining, or storing credit or debit card information regulated by the Payment Card Industry Security Council (“Cardholder Information”) in the course of providing Services under the Terms. You will validate your compliance with the Payment Card Industry Data Security Standard (“PCI-DSS”) according to the standards set forth by the PCI Security Standards Council, including completion of any required assessments. If you will be transferring, Processing and/or storing credit card account information, you must provide audit evidence that they comply with the PCI-DSS prior to accessing relevant eBay API(s). You will maintain such compliance at all times during the term of the Terms. This requirement will survive the duration of the Terms until you return, destroy, or cause the destruction of any and all Cardholder Information in your possession, custody, or control. You will provide eBay with evidence of full compliance with the PCI-DSS upon request. Survival: Your obligations and eBay’s rights under this DPRA shall become effective on the Effective Date of the Terms and will continue in effect so long as you possess eBay Data. Conflict: If and to the extent language in this DPRA conflicts with the Terms, this DPRA shall control. Processing of Personal Data: The following additional terms shall apply to the Processing of Personal Data by you: Processing Instructions: You shall Process Personal Data only to deliver services in accordance with the Terms and/or eBay’s written instructions. For the avoidance of doubt, eBay’s written instructions for the Processing of Personal Data shall comply with Applicable Law. In the event you reasonably believe there is a conflict amongst Applicable Law or that eBay’s instructions conflict with any Applicable Law, you will inform eBay immediately and shall cooperate in good faith to resolve the conflict and achieve the goals of such instruction. Use of Sub-Processors: Contractual Privity. Your obligations under this DPRA shall apply to Sub-Processors. You are authorized to use Sub-Processors, provided that you represent and warrant that any approved SubProcessor is contractually bound to meet all data protection obligations required by the Terms, eBay’s Processing instructions, and by Applicable Law. Proof of these contractual obligations, in which commercially sensitive terms may be redacted, shall be provided to eBay promptly upon request. In the event that eBay reasonably believes a Sub-Processor Processes eBay Personal Data without having entered into a contractual agreement with you containing data protection obligations required by the Terms, eBay’s Processing instructions or by Applicable Law, eBay will promptly inform you and you shall cooperate in good faith to resolve the conflict and achieve the goals of such instruction. List Maintenance. You shall maintain a list of all Sub-Processors you have engaged to Process eBay Personal Data. Where required by law, you shall (i) inform eBay of any intended changes concerning the addition or replacement of Sub-Processors with access to eBay Personal Data and give eBay the opportunity to object to such changes, and (ii) obtain the prior written consent of eBay before entering into any such agreement (unless expressly waived in a written agreement). Organizational, Technical, and Physical Safeguards. You must restrict through organizational, technical, and physical safeguards the Sub-Processor’s access to eBay Personal Data to that which is only strictly necessary to perform its subcontracted Processing services to you (which shall be consistent with the Processing Instructions issued to you by eBay). Additionally, you will prohibit through organizational, technical and physical safeguards the Sub-Processor from Processing eBay Personal Data for any other purpose. Sub-Processors must similarly implement appropriate organizational, technical and physical measures to ensure that the Processing of eBay Data occurs in strict accordance with the Terms, eBay’s Processing instructions and Applicable Law and Regulations. Sub-Processor Liability. You shall remain liable for any act or omission of a Sub-Processor that does not comply with the Terms, any Processing instructions or the requirements of Applicable Law. Transfer of Personal Data: You shall not cause or permit any Personal Data to be transferred across borders in breach of Applicable Law. Cross-border transfers of Personal Data subject to legal restrictions by Applicable Law shall require eBay’s prior written consent. For the avoidance of doubt, this transfer restriction does not pertain to eBay personnel access to Personal Data. Limitation on Disclosure of Personal Data: To the extent legally permitted, you shall immediately notify eBay in writing upon receipt of an order, demand, or document purporting to request, demand or compel the production of Personal Data to any third party. You shall not disclose Personal Data to the third party without providing eBay at least forty-eight (48) hours’ notice, so that eBay may, at its own expense, exercise such rights as it may have under Applicable Law to prevent or limit such disclosure. Notwithstanding the foregoing, you will exercise commercially reasonable efforts to prevent and limit any such disclosure and to otherwise preserve the confidentiality of Personal Data; additionally, you will cooperate with eBay with respect to any action taken pursuant to such order, demand, or other document request, including to obtain an appropriate protective order or other reliable assurance that confidential treatment will be accorded to Personal Data. Compliance with Applicable Law: You shall Process Personal Data in accordance with Applicable Law. You represent and warrant that you will maintain privacy policies sufficient to protect the Personal Data and compliant with the Applicable Law. Liability and Indemnification: You shall be liable for any of your acts and/or omissions relating to the obligations in this DPRA that result in a Security Breach of eBay’s Personal Data. You shall indemnify, defend and hold eBay harmless from and against all liabilities, costs, damages, claims and expenses relating to Security Breaches that araise from or in connection with your breach of your obligations stated in this DPRA. Personal Data transmitted to eBay: Prior to sharing any Personal Data with eBay, you shall ensure that Data Subjects are appropriately notified of and have consented to eBay’s privacy practices. You warrant that you have a legitimate basis and adequate title to collect and share Personal Data with eBay.


The following are covered under the Server Side Public License (SSPL) v1:

  • MongoDB. Copyright © 2018 MongoDB, Inc.

Server Side Public License VERSION 1, OCTOBER 16, 2018 Copyright © 2018 MongoDB, Inc. Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. TERMS AND CONDITIONS 0. Definitions. “This License” refers to Server Side Public License. “Copyright” also means copyright-like laws that apply to other kinds of works, such as semiconductor masks. “The Program” refers to any copyrightable work licensed under this License. Each licensee is addressed as “you”. “Licensees” and “recipients” may be individuals or organizations. To “modify” a work means to copy from or adapt all or part of the work in a fashion requiring copyright permission, other than the making of an exact copy. The resulting work is called a “modified version” of the earlier work or a work “based on” the earlier work. A “covered work” means either the unmodified Program or a work based on the Program. To “propagate” a work means to do anything with it that, without permission, would make you directly or secondarily liable for infringement under applicable copyright law, except executing it on a computer or modifying a private copy. Propagation includes copying, distribution (with or without modification), making available to the public, and in some countries other activities as well. To “convey” a work means any kind of propagation that enables other parties to make or receive copies. Mere interaction with a user through a computer network, with no transfer of a copy, is not conveying. An interactive user interface displays “Appropriate Legal Notices” to the extent that it includes a convenient and prominently visible feature that (1) displays an appropriate copyright notice, and (2) tells the user that there is no warranty for the work (except to the extent that warranties are provided), that licensees may convey the work under this License, and how to view a copy of this License. If the interface presents a list of user commands or options, such as a menu, a prominent item in the list meets this criterion. 1. Source Code. The “source code” for a work means the preferred form of the work for making modifications to it. “Object code” means any non-source form of a work. A “Standard Interface” means an interface that either is an official standard defined by a recognized standards body, or, in the case of interfaces specified for a particular programming language, one that is widely used among developers working in that language. The “System Libraries” of an executable work include anything, other than the work as a whole, that (a) is included in the normal form of packaging a Major Component, but which is not part of that Major Component, and (b) serves only to enable use of the work with that Major Component, or to implement a Standard Interface for which an implementation is available to the public in source code form. A “Major Component”, in this context, means a major essential component (kernel, window system, and so on) of the specific operating system (if any) on which the executable work runs, or a compiler used to produce the work, or an object code interpreter used to run it. The “Corresponding Source” for a work in object code form means all the source code needed to generate, install, and (for an executable work) run the object code and to modify the work, including scripts to control those activities. However, it does not include the work's System Libraries, or general-purpose tools or generally available free programs which are used unmodified in performing those activities but which are not part of the work. For example, Corresponding Source includes interface definition files associated with source files for the work, and the source code for shared libraries and dynamically linked subprograms that the work is specifically designed to require, such as by intimate data communication or control flow between those subprograms and other parts of the work. The Corresponding Source need not include anything that users can regenerate automatically from other parts of the Corresponding Source. The Corresponding Source for a work in source code form is that same work. 2. Basic Permissions. All rights granted under this License are granted for the term of copyright on the Program, and are irrevocable provided the stated conditions are met. This License explicitly affirms your unlimited permission to run the unmodified Program, subject to section 13. The output from running a covered work is covered by this License only if the output, given its content, constitutes a covered work. This License acknowledges your rights of fair use or other equivalent, as provided by copyright law. Subject to section 13, you may make, run and propagate covered works that you do not convey, without conditions so long as your license otherwise remains in force. You may convey covered works to others for the sole purpose of having them make modifications exclusively for you, or provide you with facilities for running those works, provided that you comply with the terms of this License in conveying all material for which you do not control copyright. Those thus making or running the covered works for you must do so exclusively on your behalf, under your direction and control, on terms that prohibit them from making any copies of your copyrighted material outside their relationship with you. Conveying under any other circumstances is permitted solely under the conditions stated below. Sublicensing is not allowed; section 10 makes it unnecessary. 3. Protecting Users' Legal Rights From Anti-Circumvention Law. No covered work shall be deemed part of an effective technological measure under any applicable law fulfilling obligations under article 11 of the WIPO copyright treaty adopted on 20 December 1996, or similar laws prohibiting or restricting circumvention of such measures. When you convey a covered work, you waive any legal power to forbid circumvention of technological measures to the extent such circumvention is effected by exercising rights under this License with respect to the covered work, and you disclaim any intention to limit operation or modification of the work as a means of enforcing, against the work's users, your or third parties' legal rights to forbid circumvention of technological measures. 4. Conveying Verbatim Copies. You may convey verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice; keep intact all notices stating that this License and any non-permissive terms added in accord with section 7 apply to the code; keep intact all notices of the absence of any warranty; and give all recipients a copy of this License along with the Program. You may charge any price or no price for each copy that you convey, and you may offer support or warranty protection for a fee. 5. Conveying Modified Source Versions. You may convey a work based on the Program, or the modifications to produce it from the Program, in the form of source code under the terms of section 4, provided that you also meet all of these conditions: a) The work must carry prominent notices stating that you modified it, and giving a relevant date. b) The work must carry prominent notices stating that it is released under this License and any conditions added under section 7. This requirement modifies the requirement in section 4 to “keep intact all notices”. c) You must license the entire work, as a whole, under this License to anyone who comes into possession of a copy. This License will therefore apply, along with any applicable section 7 additional terms, to the whole of the work, and all its parts, regardless of how they are packaged. This License gives no permission to license the work in any other way, but it does not invalidate such permission if you have separately received it. d) If the work has interactive user interfaces, each must display Appropriate Legal Notices; however, if the Program has interactive interfaces that do not display Appropriate Legal Notices, your work need not make them do so. A compilation of a covered work with other separate and independent works, which are not by their nature extensions of the covered work, and which are not combined with it such as to form a larger program, in or on a volume of a storage or distribution medium, is called an “aggregate” if the compilation and its resulting copyright are not used to limit the access or legal rights of the compilation's users beyond what the individual works permit. Inclusion of a covered work in an aggregate does not cause this License to apply to the other parts of the aggregate. 6. Conveying Non-Source Forms. You may convey a covered work in object code form under the terms of sections 4 and 5, provided that you also convey the machine-readable Corresponding Source under the terms of this License, in one of these ways: a) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by the Corresponding Source fixed on a durable physical medium customarily used for software interchange. b) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by a written offer, valid for at least three years and valid for as long as you offer spare parts or customer support for that product model, to give anyone who possesses the object code either (1) a copy of the Corresponding Source for all the software in the product that is covered by this License, on a durable physical medium customarily used for software interchange, for a price no more than your reasonable cost of physically performing this conveying of source, or (2) access to copy the Corresponding Source from a network server at no charge. c) Convey individual copies of the object code with a copy of the written offer to provide the Corresponding Source. This alternative is allowed only occasionally and noncommercially, and only if you received the object code with such an offer, in accord with subsection 6b. d) Convey the object code by offering access from a designated place (gratis or for a charge), and offer equivalent access to the Corresponding Source in the same way through the same place at no further charge. You need not require recipients to copy the Corresponding Source along with the object code. If the place to copy the object code is a network server, the Corresponding Source may be on a different server (operated by you or a third party) that supports equivalent copying facilities, provided you maintain clear directions next to the object code saying where to find the Corresponding Source. Regardless of what server hosts the Corresponding Source, you remain obligated to ensure that it is available for as long as needed to satisfy these requirements. e) Convey the object code using peer-to-peer transmission, provided you inform other peers where the object code and Corresponding Source of the work are being offered to the general public at no charge under subsection 6d. A separable portion of the object code, whose source code is excluded from the Corresponding Source as a System Library, need not be included in conveying the object code work. A “User Product” is either (1) a “consumer product”, which means any tangible personal property which is normally used for personal, family, or household purposes, or (2) anything designed or sold for incorporation into a dwelling. In determining whether a product is a consumer product, doubtful cases shall be resolved in favor of coverage. For a particular product received by a particular user, “normally used” refers to a typical or common use of that class of product, regardless of the status of the particular user or of the way in which the particular user actually uses, or expects or is expected to use, the product. A product is a consumer product regardless of whether the product has substantial commercial, industrial or non-consumer uses, unless such uses represent the only significant mode of use of the product. “Installation Information” for a User Product means any methods, procedures, authorization keys, or other information required to install and execute modified versions of a covered work in that User Product from a modified version of its Corresponding Source. The information must suffice to ensure that the continued functioning of the modified object code is in no case prevented or interfered with solely because modification has been made. If you convey an object code work under this section in, or with, or specifically for use in, a User Product, and the conveying occurs as part of a transaction in which the right of possession and use of the User Product is transferred to the recipient in perpetuity or for a fixed term (regardless of how the transaction is characterized), the Corresponding Source conveyed under this section must be accompanied by the Installation Information. But this requirement does not apply if neither you nor any third party retains the ability to install modified object code on the User Product (for example, the work has been installed in ROM). The requirement to provide Installation Information does not include a requirement to continue to provide support service, warranty, or updates for a work that has been modified or installed by the recipient, or for the User Product in which it has been modified or installed. Access to a network may be denied when the modification itself materially and adversely affects the operation of the network or violates the rules and protocols for communication across the network. Corresponding Source conveyed, and Installation Information provided, in accord with this section must be in a format that is publicly documented (and with an implementation available to the public in source code form), and must require no special password or key for unpacking, reading or copying. 7. Additional Terms. “Additional permissions” are terms that supplement the terms of this License by making exceptions from one or more of its conditions. Additional permissions that are applicable to the entire Program shall be treated as though they were included in this License, to the extent that they are valid under applicable law. If additional permissions apply only to part of the Program, that part may be used separately under those permissions, but the entire Program remains governed by this License without regard to the additional permissions. When you convey a copy of a covered work, you may at your option remove any additional permissions from that copy, or from any part of it. (Additional permissions may be written to require their own removal in certain cases when you modify the work.) You may place additional permissions on material, added by you to a covered work, for which you have or can give appropriate copyright permission. Notwithstanding any other provision of this License, for material you add to a covered work, you may (if authorized by the copyright holders of that material) supplement the terms of this License with terms: a) Disclaiming warranty or limiting liability differently from the terms of sections 15 and 16 of this License; or b) Requiring preservation of specified reasonable legal notices or author attributions in that material or in the Appropriate Legal Notices displayed by works containing it; or c) Prohibiting misrepresentation of the origin of that material, or requiring that modified versions of such material be marked in reasonable ways as different from the original version; or d) Limiting the use for publicity purposes of names of licensors or authors of the material; or e) Declining to grant rights under trademark law for use of some trade names, trademarks, or service marks; or f) Requiring indemnification of licensors and authors of that material by anyone who conveys the material (or modified versions of it) with contractual assumptions of liability to the recipient, for any liability that these contractual assumptions directly impose on those licensors and authors. All other non-permissive additional terms are considered “further restrictions” within the meaning of section 10. If the Program as you received it, or any part of it, contains a notice stating that it is governed by this License along with a term that is a further restriction, you may remove that term. If a license document contains a further restriction but permits relicensing or conveying under this License, you may add to a covered work material governed by the terms of that license document, provided that the further restriction does not survive such relicensing or conveying. If you add terms to a covered work in accord with this section, you must place, in the relevant source files, a statement of the additional terms that apply to those files, or a notice indicating where to find the applicable terms. Additional terms, permissive or non-permissive, may be stated in the form of a separately written license, or stated as exceptions; the above requirements apply either way. 8. Termination. You may not propagate or modify a covered work except as expressly provided under this License. Any attempt otherwise to propagate or modify it is void, and will automatically terminate your rights under this License (including any patent licenses granted under the third paragraph of section 11). However, if you cease all violation of this License, then your license from a particular copyright holder is reinstated (a) provisionally, unless and until the copyright holder explicitly and finally terminates your license, and (b) permanently, if the copyright holder fails to notify you of the violation by some reasonable means prior to 60 days after the cessation. Moreover, your license from a particular copyright holder is reinstated permanently if the copyright holder notifies you of the violation by some reasonable means, this is the first time you have received notice of violation of this License (for any work) from that copyright holder, and you cure the violation prior to 30 days after your receipt of the notice. Termination of your rights under this section does not terminate the licenses of parties who have received copies or rights from you under this License. If your rights have been terminated and not permanently reinstated, you do not qualify to receive new licenses for the same material under section 10. 9. Acceptance Not Required for Having Copies. You are not required to accept this License in order to receive or run a copy of the Program. Ancillary propagation of a covered work occurring solely as a consequence of using peer-to-peer transmission to receive a copy likewise does not require acceptance. However, nothing other than this License grants you permission to propagate or modify any covered work. These actions infringe copyright if you do not accept this License. Therefore, by modifying or propagating a covered work, you indicate your acceptance of this License to do so. 10. Automatic Licensing of Downstream Recipients. Each time you convey a covered work, the recipient automatically receives a license from the original licensors, to run, modify and propagate that work, subject to this License. You are not responsible for enforcing compliance by third parties with this License. An “entity transaction” is a transaction transferring control of an organization, or substantially all assets of one, or subdividing an organization, or merging organizations. If propagation of a covered work results from an entity transaction, each party to that transaction who receives a copy of the work also receives whatever licenses to the work the party's predecessor in interest had or could give under the previous paragraph, plus a right to possession of the Corresponding Source of the work from the predecessor in interest, if the predecessor has it or can get it with reasonable efforts. You may not impose any further restrictions on the exercise of the rights granted or affirmed under this License. For example, you may not impose a license fee, royalty, or other charge for exercise of rights granted under this License, and you may not initiate litigation (including a cross-claim or counterclaim in a lawsuit) alleging that any patent claim is infringed by making, using, selling, offering for sale, or importing the Program or any portion of it. 11. Patents. A “contributor” is a copyright holder who authorizes use under this License of the Program or a work on which the Program is based. The work thus licensed is called the contributor's “contributor version”. A contributor's “essential patent claims” are all patent claims owned or controlled by the contributor, whether already acquired or hereafter acquired, that would be infringed by some manner, permitted by this License, of making, using, or selling its contributor version, but do not include claims that would be infringed only as a consequence of further modification of the contributor version. For purposes of this definition, “control” includes the right to grant patent sublicenses in a manner consistent with the requirements of this License. Each contributor grants you a non-exclusive, worldwide, royalty-free patent license under the contributor's essential patent claims, to make, use, sell, offer for sale, import and otherwise run, modify and propagate the contents of its contributor version. In the following three paragraphs, a “patent license” is any express agreement or commitment, however denominated, not to enforce a patent (such as an express permission to practice a patent or covenant not to sue for patent infringement). To “grant” such a patent license to a party means to make such an agreement or commitment not to enforce a patent against the party. If you convey a covered work, knowingly relying on a patent license, and the Corresponding Source of the work is not available for anyone to copy, free of charge and under the terms of this License, through a publicly available network server or other readily accessible means, then you must either (1) cause the Corresponding Source to be so available, or (2) arrange to deprive yourself of the benefit of the patent license for this particular work, or (3) arrange, in a manner consistent with the requirements of this License, to extend the patent license to downstream recipients. “Knowingly relying” means you have actual knowledge that, but for the patent license, your conveying the covered work in a country, or your recipient's use of the covered work in a country, would infringe one or more identifiable patents in that country that you have reason to believe are valid. If, pursuant to or in connection with a single transaction or arrangement, you convey, or propagate by procuring conveyance of, a covered work, and grant a patent license to some of the parties receiving the covered work authorizing them to use, propagate, modify or convey a specific copy of the covered work, then the patent license you grant is automatically extended to all recipients of the covered work and works based on it. A patent license is “discriminatory” if it does not include within the scope of its coverage, prohibits the exercise of, or is conditioned on the non-exercise of one or more of the rights that are specifically granted under this License. You may not convey a covered work if you are a party to an arrangement with a third party that is in the business of distributing software, under which you make payment to the third party based on the extent of your activity of conveying the work, and under which the third party grants, to any of the parties who would receive the covered work from you, a discriminatory patent license (a) in connection with copies of the covered work conveyed by you (or copies made from those copies), or (b) primarily for and in connection with specific products or compilations that contain the covered work, unless you entered into that arrangement, or that patent license was granted, prior to 28 March 2007. Nothing in this License shall be construed as excluding or limiting any implied license or other defenses to infringement that may otherwise be available to you under applicable patent law. 12. No Surrender of Others' Freedom. If conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot use, propagate or convey a covered work so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not use, propagate or convey it at all. For example, if you agree to terms that obligate you to collect a royalty for further conveying from those to whom you convey the Program, the only way you could satisfy both those terms and this License would be to refrain entirely from conveying the Program. 13. Offering the Program as a Service. If you make the functionality of the Program or a modified version available to third parties as a service, you must make the Service Source Code available via network download to everyone at no charge, under the terms of this License. Making the functionality of the Program or modified version available to third parties as a service includes, without limitation, enabling third parties to interact with the functionality of the Program or modified version remotely through a computer network, offering a service the value of which entirely or primarily derives from the value of the Program or modified version, or offering a service that accomplishes for users the primary purpose of the Program or modified version. “Service Source Code” means the Corresponding Source for the Program or the modified version, and the Corresponding Source for all programs that you use to make the Program or modified version available as a service, including, without limitation, management software, user interfaces, application program interfaces, automation software, monitoring software, backup software, storage software and hosting software, all such that a user could run an instance of the service using the Service Source Code you make available. 14. Revised Versions of this License. MongoDB, Inc. may publish revised and/or new versions of the Server Side Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number. If the Program specifies that a certain numbered version of the Server Side Public License “or any later version” applies to it, you have the option of following the terms and conditions either of that numbered version or of any later version published by MongoDB, Inc. If the Program does not specify a version number of the Server Side Public License, you may choose any version ever published by MongoDB, Inc. If the Program specifies that a proxy can decide which future versions of the Server Side Public License can be used, that proxy's public statement of acceptance of a version permanently authorizes you to choose that version for the Program. Later license versions may give you additional or different permissions. However, no additional obligations are imposed on any author or copyright holder as a result of your choosing to follow a later version. 15. Disclaimer of Warranty. THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 16. Limitation of Liability. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. 17. Interpretation of Sections 15 and 16. If the disclaimer of warranty and limitation of liability provided above cannot be given local legal effect according to their terms, reviewing courts shall apply local law that most closely approximates an absolute waiver of all civil liability in connection with the Program, unless a warranty or assumption of liability accompanies a copy of the Program in return for a fee. END OF TERMS AND CONDITIONS