1. Acceptance of Terms
You agree to these terms by deploying, using, or purchasing EntOS software. This license is strictly for government, military, or enterprise customers.
Unauthorized use by consumer users voids all security certifications and warranties. Any breach constitutes cause for immediate termination.
2. Intellect Property Rights
Unless explicitly stated otherwise, all software, security protocols, and encryption systems remain the sole property of EntOS Systems, Inc.
You are granted a limited, non-transferable license to use EntOS software for authorized enterprise and government security operations.
3. Security Compliance
All users must maintain NIST Cybersecurity Framework compliance. This includes regular audits, cryptographic key rotation, and access policy reviews.
Failure to maintain Common Criteria EAL 7 baseline security is grounds for license revocation without prior notice.
4. Legal Compliance
All systems must adhere to the following: FISMA, HIPAA, NISTIR 7966, NISTIR 8259, ISO 27001, CMMC 2.0, and other mandatory federal security standards in your jurisdiction.
Users must notify EntOS immediately of any cybersecurity incident affecting system integrity or data confidentiality.
5. Governance
Users are responsible for ensuring compliance with the Digital Millennium Copyright Act, Export Controls (EAR/ITAR), and all relevant data sovereignty laws.
The system must never be used for mass surveillance, political control, or other purposes violating the Uptime Institute Tier IV security bylaws.
6. Audit Obligations
EntOS reserves the right to audit any deployed system to verify compliance with these terms. This includes remote integrity verification audits at any time.
You must maintain audit logs for all security events for at least two years for regulatory inspections.