The above safeguards and remedies are extinguished for hardware products that are damaged or can no longer be used by one or more of the following components: (1) incorrect or inadequate maintenance by persons other than authorized Check Point or Check Point agents, (2) software or interfaces provided by someone other than Check Point; (3) Changes, modifications or additions of material products by personnel who have not been certified by the authorized agents of Check Point or Check Point to perform such acts, or other unauthorized repairs, facilities or openings or other causes that are not controlled by Check Point, 4) inappropriate refusal to accept technical notification programs of modification (5) negligence on the part of a person other than the authorized agent of Check Point or CheckPoint , 6) abuse, abuse, accident, electrical irregularity, theft, vandalism, fire, water or any other hazard, (7) damage caused by containment and/or exploitation outside the environmental specifications of material products, (8) modification or connection of material products to other systems, devices or devices (except those specially authorized by Check Point) without prior authorization from Check Point or (9) any use inconsistent with the instructions provided with the material product. The warranty period will not be extended if Check Point repairs or replaces a guaranteed product or part. Check Point may change the availability of limited hardware guarantees at its sole discretion, but the changes are not retroactive. 2.2 Default user restrictions. If you are a standard user, the products are allowed for you only to be used by you in order to provide policy administration to your own operations. If so, you can reproduce the downloaded or installed product only for the purpose of connecting with a duly licensed Check Point product, in accordance with the functionality, as described in the accompanying document for which you paid the fee charged to Check Point and only within the defined limits of your product license for which you acquired and made available to users, depending on the limited, maximum allowed, authorized number of users, computer instances (i.e. a computer unit assigned by an instance of an operating system) or copies of the product (if the case may be the case) that can be used and installed at any given time. No product or part of this product may be used by or in this market, resold, leased or distributed by another party. This licensing agreement (the “contract”) is an agreement between you (both the person who installs the product and any legal person in whose name that person acts) (hereafter “you” or “yours”) and Check Point Software Technologies Ltd. (`Check Point`). “third-party software” refers to all software provided by third parties and included in the product.
Registration volume licensing orders are first checked by a Provantage license specialist to verify completeness and authorization. Eligible orders are then processed by one of Check`s authorized distributors. Please note that distributors need several days to process certain license orders. “conceded configuration”: if applicable, as stated in the license key, the choice of functions and the maximum number of users, devices or nodes (an internal device with an IP address) on the network`s trusted page or trying to go through the firewall, and the number of cores or the specified maximum throughput capacity or the code or other hardware or software specifications generated from the main installation, as you stated in your command or request for a key. If the product you purchased does not contain a license key, the licensed configuration is the minimum configuration allowed for the product by Check Point, on which the royalty is based.