IRIS C2 Systems provides licenses for IRIS C2 (hereinafter "Software") exclusively for lawful research and ethical penetration testing. The Software is a professional-grade tool designed only for users with substantial technical expertise. IRIS C2 Systems does not support or endorse the use of the Software for illegal activities. Users are responsible for determining the suitability of the Software for their needs, and IRIS C2 Systems disclaims responsibility for any other tools or exploits used alongside the Software. IRIS C2 Systems reserves the right to cancel the license if it is found to be used for unlawful activities. Please ensure you read through, understand, and agree with these terms before purchasing or downloading IRIS C2.
IRIS C2 (the "Software Product" or "Software") and accompanying documentation, modules is provided as a limited license and not sold. This Software Product is protected by copyright laws and treaties, as well as laws and treaties related to other forms of intellectual property. IRIS C2 Systems owns the intellectual property rights in the Software Product. The Licensee's ("you" or "your") license to download, use, copy, or change the Software Product is subject to these rights and all the terms and conditions of this agreement.
YOU ACCEPT AND AGREE TO BE BOUND BY THE TERMS OF THIS AGREEMENT BY DOWNLOADING THE SOFTWARE PRODUCT OR BY INSTALLING, USING, OR COPYING THE SOFTWARE PRODUCT. IF YOU ARE ENTERING INTO THIS AGREEMENT ON BEHALF OF A COMPANY OR OTHER LEGAL ENTITY, YOU REPRESENT THAT YOU HAVE THE AUTHORITY TO BIND SUCH ENTITY TO THIS AGREEMENT. YOU MUST AGREE TO ALL OF THE TERMS OF THIS AGREEMENT BEFORE YOU WILL BE ALLOWED TO USE THE SOFTWARE PRODUCT. IF YOU DO NOT AGREE TO ALL OF THE TERMS OF THIS AGREEMENT, YOU MUST NOT INSTALL, USE, OR COPY THE SOFTWARE PRODUCT.
The Software and its accompanying documentation are provided under a limited license (one year default, unless defined in the purchase order or invoice), not sold. All rights in the Software, including intellectual property, belong to IRIS C2 Systems. Users ("Licensee") are granted a non-exclusive, non-transferable right to use the Software for the duration specified at purchase, typically one year for a single user per license key. The Licensee may not use the Software for any purposes other than lawful penetration testing. A user is allowed to host a maximum of two servers ("IRIS Server"), with operators connecting to the server also requiring valid licenses.
Licensees are entitled to receive updates during the license term at no additional cost. The Licensee agrees not to distribute any Software components, updates, or derivative works to third parties, including but not limited to anti-virus vendors for reverse engineering, building detections, or duplicating the features.
Support is available via email and dedicated support channels for the licensed term. IRIS C2 Systems is not responsible for supporting third-party software or dependencies used with IRIS C2. IRIS C2 Systems shall provide the Licensee with clear and timely notification of any software version reaching its end-of-life (EOL) status, at least six (6) months before to the cessation of maintenance and support.
The Licensee may not transfer, assign, sell, or sublicense the Software without the express written consent of IRIS C2 Systems. Additionally, reverse engineering, disassembly, or any attempt to access the source code of the Software is strictly prohibited. Any tampering with the Software will result in its deactivation, and IRIS C2 Systems will not provide support for tampered Software.
You may not modify the Software Product or create any derivative work of the Software Product or its accompanying documentation. Derivative works include but are not limited to translations. You may not alter any files or libraries in any portion of the Software Product.
The software product is being provided "as is" and unless otherwise explicitly agreed to in writing by IRIS C2 Systems, IRIS C2 Systems makes no other warranties, express or implied, in fact, or in law, including, but not limited to, any implied warranties of merchantability or fitness for a particular purpose other than as outlined in this agreement or the limited warranty documents provided with the software product.
The licensee warrants that the software product will be used by a technical and skilled user and will be used ethically for authorized penetration testing and simulation purposes. Users are solely responsible for determining whether the Software meets their operational needs and security requirements. The Software Product will function by the documentation and any other specifications or requirements mutually agreed upon by the Parties. The Software Product and related support services shall be delivered professionally, adhering to the highest industry standards and in full compliance with all applicable laws.
You must determine whether the software product sufficiently meets your requirements for security and uninterruptability. You and only you, bear the sole responsibility and all liability for any loss incurred due to failure of the software product to meet your requirements. IRIS C2 Systems will not, under any circumstances, be responsible or liable for the loss of data on any computer or information storage device. Under no circumstances shall IRIS C2 Systems, its directors, officers, employees, or agents be liable to you or any other party for indirect, consequential, special, incidental, punitive, or exemplary damages of any kind resulting from this agreement, or the furnishing, performance, installation, or use of the software product, whether due to a breach of contract, breach of warranty, negligence of IRIS C2 Systems or any other party, even if IRIS C2 Systems is advised beforehand of the possibility of such damages, and any damages relating to the software product shall be limited to the amount paid for the software product licenses. To the extent that the applicable jurisdiction limits IRIS C2 Systems's ability to disclaim any implied warranties, this disclaimer shall be effective to the maximum extent permitted.
Any claim must be made within the applicable warranty period (default is one year). All limited warranties on the Software Product are granted only to you and are non-transferable. You agree to indemnify and hold IRIS C2 Systems harmless from all claims, judgments, liabilities, expenses, or costs arising from your breach of this Agreement and/or acts or omissions and from any claims of third parties arising out of your use of the Software Products.
The Licensee agrees to indemnify and hold IRIS C2 Systems harmless from any claims, damages, or liabilities arising out of the use of the Software or breach of this Agreement.
This Agreement is governed by the laws of the State of Delaware, United States, without regard to Delaware's conflict or choice of law provisions.
If any provision of this Agreement shall be held to be invalid or unenforceable, the remainder of this Agreement shall remain in full force and effect. To the extent any express or implied restrictions are not permitted by applicable laws, these express or implied restrictions shall remain in force and effect to the maximum extent permitted by such applicable laws.
Licenses subject to this Agreement will be forfeited if you fail to comply with any of the terms of this Agreement or are in breach of this Agreement.
"Confidential Information" means all non-public, confidential or proprietary information, in whatever form or medium, by one party to the other party or its affiliates, or to any of such party's or its affiliates' employees officers, directors, partners, members, shareholders, agents, attorneys, accountants, contractors or advisors, and shall include, but not be limited to, the Software licensed by IRIS C2 Systems to you, information relating to a party's business concepts, non-public or personal information about customers, merchandising methods, ideas, processes, formulas, data programs, know-how, improvements, discoveries, business plans, financial information and compilations, developments, designs, inventions, techniques, marketing plans, strategies, forecasts, potential new product information, budgets, technology, projections, pricing strategies, costs, customer and supplier information, consumer personally identifiable information and all other information defined as a "trade secret" under the laws of the applicable jurisdictions.
IRIS C2 Systems and you agree that the Receiving Party will promptly notify the Disclosing Party of any unauthorized use or disclosure of Confidential Information, or any other breach of this Agreement; and assist the Disclosing Party in every reasonable way to retrieve any Confidential Information that was used or disclosed by the Receiving Party or an employee, agent and representative of the Receiving Party without the Disclosing Party's specific prior written authorization and to mitigate the harm caused by the unauthorized use or disclosure.
IRIS C2 Systems and you agree that the Receiving Party will not be in breach of this section by using or disclosing Confidential Information if the Receiving Party demonstrates that the information used or disclosed (a) is generally available to the public other than as a result of a disclosure by the Receiving Party or an employee, agent and representative of the Receiving Party; (b) was received by the Receiving Party from a third party without any limitations on use or disclosure; or (c) was independently developed by the Receiving Party without use of the Confidential Information.
IRIS C2 Systems and you agree that upon the request of the Disclosing Party, the Receiving Party will (a) promptly return to the Disclosing Party all materials furnished by the Disclosing Party containing Confidential Information, together with all copies and summaries of Confidential Information in the possession or under the control of the Receiving Party, and provide written certification that all such Confidential Information has been returned to the Disclosing Party, or (b) promptly destroy all materials furnished by the Disclosing Party containing Confidential Information, together with all copies and summaries of Confidential Information in the possession or under the control of the Receiving Party, and provide written certification that all such Confidential Information has been destroyed by the Receiving Party.
IRIS C2 Systems and you acknowledge and agree that the remedies available at law for any breach of this Agreement will, by their nature, be inadequate. Accordingly, each Party may obtain injunctive relief or other equitable relief to restrain a breach or threatened breach of this Agreement or to specifically enforce this Agreement, without proving that any monetary damages have been sustained.
This agreement does not create or imply any relationship in agency or partnership between you and IRIS C2 Systems. This Agreement and the terms and conditions contained in this Agreement apply and are binding upon your successors and assignees. This Agreement may be updated from time to time and any changes will be posted on https://irisc2.com. By continuing to access the Software after any changes become effective, you agree to be bound by the revised terms. The failure of IRIS C2 Systems to enforce any right or provision of this Agreement will not be deemed a waiver of such right or provision. In the event that any provision of this Agreement is held to be invalid or unenforceable, the remaining provisions of this Agreement will remain in full force and effect.