aboutsummaryrefslogtreecommitdiff
path: root/addons.mozilla.org-fsd/get-data/build/json/current_versions
diff options
context:
space:
mode:
Diffstat (limited to 'addons.mozilla.org-fsd/get-data/build/json/current_versions')
-rw-r--r--addons.mozilla.org-fsd/get-data/build/json/current_versions/1865.json1
-rw-r--r--addons.mozilla.org-fsd/get-data/build/json/current_versions/3006.json1
-rw-r--r--addons.mozilla.org-fsd/get-data/build/json/current_versions/431482.json1
-rw-r--r--addons.mozilla.org-fsd/get-data/build/json/current_versions/473816.json1
-rw-r--r--addons.mozilla.org-fsd/get-data/build/json/current_versions/607454.json1
-rw-r--r--addons.mozilla.org-fsd/get-data/build/json/current_versions/735601.json1
-rw-r--r--addons.mozilla.org-fsd/get-data/build/json/current_versions/9609.json1
7 files changed, 7 insertions, 0 deletions
diff --git a/addons.mozilla.org-fsd/get-data/build/json/current_versions/1865.json b/addons.mozilla.org-fsd/get-data/build/json/current_versions/1865.json
new file mode 100644
index 0000000..e7c7604
--- /dev/null
+++ b/addons.mozilla.org-fsd/get-data/build/json/current_versions/1865.json
@@ -0,0 +1 @@
+{"id":2443022,"channel":"listed","compatibility":{"android":{"max":"*","min":"52.0"},"firefox":{"max":"*","min":"52.0"}},"edit_url":"https://addons.mozilla.org/en-US/developers/addon/ublock-origin/versions/2443022","files":[{"id":985780,"created":"2018-06-13T10:06:05Z","hash":"sha256:8d90d501d5470024957cabbe37880ec6a5988d05d3d05e14b4e008e2cce2f9af","is_restart_required":false,"is_webextension":true,"is_mozilla_signed_extension":false,"platform":"all","size":2224679,"status":"public","url":"https://addons.mozilla.org/firefox/downloads/file/985780/ublock_origin-1.16.10-an+fx.xpi?src=","permissions":["contextMenus","privacy","storage","tabs","webNavigation","webRequest","webRequestBlocking","<all_urls>","http://*/*","https://*/*","file://*/*"]}],"is_strict_compatibility_enabled":false,"license":{"id":6,"name":{"el":"GNU General Public License, έκδοση 3.0","vi":"Giấy phép Công cộng GNU, phiên bản 3.0","ca":"Llicència GPL (General Public License) de GNU, version 3.0","it":"Licenza GNU General Public License, versione 3.0","cs":"GNU General Public License, verze 3.0","eu":"GNU General Public License, 3.0 bertsioa","id":"GNU General Public License, versi 3.0","es":"Licencia pública GNU, versión 3.0","ru":"GNU General Public License, версия 3.0","nl":"GNU General Public License, versie 3.0","pl":"General Public Licence, wersja 3.0","de":"GNU General Public License, Version 3.0","en-US":"GNU General Public License, version 3.0","fa":"مجوز عمومی کلی گنو، نسخهٔ ۳٫۰","ja":"GNU General Public License バージョン 3.0","pt-PT":"GNU General Public License, versão 3.0","zh-TW":"GNU General Public License,版本 3.0","sq":"Leje e Përgjithshme Publike GNU, version 3.0","ga-IE":"GNU General Public License, leagan 3.0","sk":"GNU General Public License, verzia 3.0","zh-CN":"GNU 通用公共授权,版本 3.0","uk":"GNU General Public License, версія 3.0"},"text":{"en-US":"GNU GENERAL PUBLIC LICENSE\n Version 3, 29 June 2007\n\n Copyright (C) 2007 Free Software Foundation, Inc. &lt;http: fsf.org=\"\"&gt;\n Everyone is permitted to copy and distribute verbatim copies\n of this license document, but changing it is not allowed.\n\n Preamble\n\n The GNU General Public License is a free, copyleft license for\nsoftware and other kinds of works.\n\n The licenses for most software and other practical works are designed\nto take away your freedom to share and change the works. By contrast,\nthe GNU General Public License is intended to guarantee your freedom to\nshare and change all versions of a program--to make sure it remains free\nsoftware for all its users. We, the Free Software Foundation, use the\nGNU General Public License for most of our software; it applies also to\nany other work released this way by its authors. You can apply it to\nyour programs, too.\n\n When we speak of free software, we are referring to freedom, not\nprice. Our General Public Licenses are designed to make sure that you\nhave the freedom to distribute copies of free software (and charge for\nthem if you wish), that you receive source code or can get it if you\nwant it, that you can change the software or use pieces of it in new\nfree programs, and that you know you can do these things.\n\n To protect your rights, we need to prevent others from denying you\nthese rights or asking you to surrender the rights. Therefore, you have\ncertain responsibilities if you distribute copies of the software, or if\nyou modify it: responsibilities to respect the freedom of others.\n\n For example, if you distribute copies of such a program, whether\ngratis or for a fee, you must pass on to the recipients the same\nfreedoms that you received. You must make sure that they, too, receive\nor can get the source code. And you must show them these terms so they\nknow their rights.\n\n Developers that use the GNU GPL protect your rights with two steps:\n(1) assert copyright on the software, and (2) offer you this License\ngiving you legal permission to copy, distribute and/or modify it.\n\n For the developers' and authors' protection, the GPL clearly explains\nthat there is no warranty for this free software. For both users' and\nauthors' sake, the GPL requires that modified versions be marked as\nchanged, so that their problems will not be attributed erroneously to\nauthors of previous versions.\n\n Some devices are designed to deny users access to install or run\nmodified versions of the software inside them, although the manufacturer\ncan do so. This is fundamentally incompatible with the aim of\nprotecting users' freedom to change the software. The systematic\npattern of such abuse occurs in the area of products for individuals to\nuse, which is precisely where it is most unacceptable. Therefore, we\nhave designed this version of the GPL to prohibit the practice for those\nproducts. If such problems arise substantially in other domains, we\nstand ready to extend this provision to those domains in future versions\nof the GPL, as needed to protect the freedom of users.\n\n Finally, every program is threatened constantly by software patents.\nStates should not allow patents to restrict development and use of\nsoftware on general-purpose computers, but in those that do, we wish to\navoid the special danger that patents applied to a free program could\nmake it effectively proprietary. To prevent this, the GPL assures that\npatents cannot be used to render the program non-free.\n\n The precise terms and conditions for copying, distribution and\nmodification follow.\n\n TERMS AND CONDITIONS\n\n 0. Definitions.\n\n \"This License\" refers to version 3 of the GNU General Public License.\n\n \"Copyright\" also means copyright-like laws that apply to other kinds of\nworks, such as semiconductor masks.\n\n \"The Program\" refers to any copyrightable work licensed under this\nLicense. Each licensee is addressed as \"you\". \"Licensees\" and\n\"recipients\" may be individuals or organizations.\n\n To \"modify\" a work means to copy from or adapt all or part of the work\nin a fashion requiring copyright permission, other than the making of an\nexact copy. The resulting work is called a \"modified version\" of the\nearlier work or a work \"based on\" the earlier work.\n\n A \"covered work\" means either the unmodified Program or a work based\non the Program.\n\n To \"propagate\" a work means to do anything with it that, without\npermission, would make you directly or secondarily liable for\ninfringement under applicable copyright law, except executing it on a\ncomputer or modifying a private copy. Propagation includes copying,\ndistribution (with or without modification), making available to the\npublic, and in some countries other activities as well.\n\n To \"convey\" a work means any kind of propagation that enables other\nparties to make or receive copies. Mere interaction with a user through\na computer network, with no transfer of a copy, is not conveying.\n\n An interactive user interface displays \"Appropriate Legal Notices\"\nto the extent that it includes a convenient and prominently visible\nfeature that (1) displays an appropriate copyright notice, and (2)\ntells the user that there is no warranty for the work (except to the\nextent that warranties are provided), that licensees may convey the\nwork under this License, and how to view a copy of this License. If\nthe interface presents a list of user commands or options, such as a\nmenu, a prominent item in the list meets this criterion.\n\n 1. Source Code.\n\n The \"source code\" for a work means the preferred form of the work\nfor making modifications to it. \"Object code\" means any non-source\nform of a work.\n\n A \"Standard Interface\" means an interface that either is an official\nstandard defined by a recognized standards body, or, in the case of\ninterfaces specified for a particular programming language, one that\nis widely used among developers working in that language.\n\n The \"System Libraries\" of an executable work include anything, other\nthan the work as a whole, that (a) is included in the normal form of\npackaging a Major Component, but which is not part of that Major\nComponent, and (b) serves only to enable use of the work with that\nMajor Component, or to implement a Standard Interface for which an\nimplementation is available to the public in source code form. A\n\"Major Component\", in this context, means a major essential component\n(kernel, window system, and so on) of the specific operating system\n(if any) on which the executable work runs, or a compiler used to\nproduce the work, or an object code interpreter used to run it.\n\n The \"Corresponding Source\" for a work in object code form means all\nthe source code needed to generate, install, and (for an executable\nwork) run the object code and to modify the work, including scripts to\ncontrol those activities. However, it does not include the work's\nSystem Libraries, or general-purpose tools or generally available free\nprograms which are used unmodified in performing those activities but\nwhich are not part of the work. For example, Corresponding Source\nincludes interface definition files associated with source files for\nthe work, and the source code for shared libraries and dynamically\nlinked subprograms that the work is specifically designed to require,\nsuch as by intimate data communication or control flow between those\nsubprograms and other parts of the work.\n\n The Corresponding Source need not include anything that users\ncan regenerate automatically from other parts of the Corresponding\nSource.\n\n The Corresponding Source for a work in source code form is that\nsame work.\n\n 2. Basic Permissions.\n\n All rights granted under this License are granted for the term of\ncopyright on the Program, and are irrevocable provided the stated\nconditions are met. This License explicitly affirms your unlimited\npermission to run the unmodified Program. The output from running a\ncovered work is covered by this License only if the output, given its\ncontent, constitutes a covered work. This License acknowledges your\nrights of fair use or other equivalent, as provided by copyright law.\n\n You may make, run and propagate covered works that you do not\nconvey, without conditions so long as your license otherwise remains\nin force. You may convey covered works to others for the sole purpose\nof having them make modifications exclusively for you, or provide you\nwith facilities for running those works, provided that you comply with\nthe terms of this License in conveying all material for which you do\nnot control copyright. Those thus making or running the covered works\nfor you must do so exclusively on your behalf, under your direction\nand control, on terms that prohibit them from making any copies of\nyour copyrighted material outside their relationship with you.\n\n Conveying under any other circumstances is permitted solely under\nthe conditions stated below. Sublicensing is not allowed; section 10\nmakes it unnecessary.\n\n 3. Protecting Users' Legal Rights From Anti-Circumvention Law.\n\n No covered work shall be deemed part of an effective technological\nmeasure under any applicable law fulfilling obligations under article\n11 of the WIPO copyright treaty adopted on 20 December 1996, or\nsimilar laws prohibiting or restricting circumvention of such\nmeasures.\n\n When you convey a covered work, you waive any legal power to forbid\ncircumvention of technological measures to the extent such circumvention\nis effected by exercising rights under this License with respect to\nthe covered work, and you disclaim any intention to limit operation or\nmodification of the work as a means of enforcing, against the work's\nusers, your or third parties' legal rights to forbid circumvention of\ntechnological measures.\n\n 4. Conveying Verbatim Copies.\n\n You may convey verbatim copies of the Program's source code as you\nreceive it, in any medium, provided that you conspicuously and\nappropriately publish on each copy an appropriate copyright notice;\nkeep intact all notices stating that this License and any\nnon-permissive terms added in accord with section 7 apply to the code;\nkeep intact all notices of the absence of any warranty; and give all\nrecipients a copy of this License along with the Program.\n\n You may charge any price or no price for each copy that you convey,\nand you may offer support or warranty protection for a fee.\n\n 5. Conveying Modified Source Versions.\n\n You may convey a work based on the Program, or the modifications to\nproduce it from the Program, in the form of source code under the\nterms of section 4, provided that you also meet all of these conditions:\n\n a) The work must carry prominent notices stating that you modified\n it, and giving a relevant date.\n\n b) The work must carry prominent notices stating that it is\n released under this License and any conditions added under section\n 7. This requirement modifies the requirement in section 4 to\n \"keep intact all notices\".\n\n c) You must license the entire work, as a whole, under this\n License to anyone who comes into possession of a copy. This\n License will therefore apply, along with any applicable section 7\n additional terms, to the whole of the work, and all its parts,\n regardless of how they are packaged. This License gives no\n permission to license the work in any other way, but it does not\n invalidate such permission if you have separately received it.\n\n d) If the work has interactive user interfaces, each must display\n Appropriate Legal Notices; however, if the Program has interactive\n interfaces that do not display Appropriate Legal Notices, your\n work need not make them do so.\n\n A compilation of a covered work with other separate and independent\nworks, which are not by their nature extensions of the covered work,\nand which are not combined with it such as to form a larger program,\nin or on a volume of a storage or distribution medium, is called an\n\"aggregate\" if the compilation and its resulting copyright are not\nused to limit the access or legal rights of the compilation's users\nbeyond what the individual works permit. Inclusion of a covered work\nin an aggregate does not cause this License to apply to the other\nparts of the aggregate.\n\n 6. Conveying Non-Source Forms.\n\n You may convey a covered work in object code form under the terms\nof sections 4 and 5, provided that you also convey the\nmachine-readable Corresponding Source under the terms of this License,\nin one of these ways:\n\n a) Convey the object code in, or embodied in, a physical product\n (including a physical distribution medium), accompanied by the\n Corresponding Source fixed on a durable physical medium\n customarily used for software interchange.\n\n b) Convey the object code in, or embodied in, a physical product\n (including a physical distribution medium), accompanied by a\n written offer, valid for at least three years and valid for as\n long as you offer spare parts or customer support for that product\n model, to give anyone who possesses the object code either (1) a\n copy of the Corresponding Source for all the software in the\n product that is covered by this License, on a durable physical\n medium customarily used for software interchange, for a price no\n more than your reasonable cost of physically performing this\n conveying of source, or (2) access to copy the\n Corresponding Source from a network server at no charge.\n\n c) Convey individual copies of the object code with a copy of the\n written offer to provide the Corresponding Source. This\n alternative is allowed only occasionally and noncommercially, and\n only if you received the object code with such an offer, in accord\n with subsection 6b.\n\n d) Convey the object code by offering access from a designated\n place (gratis or for a charge), and offer equivalent access to the\n Corresponding Source in the same way through the same place at no\n further charge. You need not require recipients to copy the\n Corresponding Source along with the object code. If the place to\n copy the object code is a network server, the Corresponding Source\n may be on a different server (operated by you or a third party)\n that supports equivalent copying facilities, provided you maintain\n clear directions next to the object code saying where to find the\n Corresponding Source. Regardless of what server hosts the\n Corresponding Source, you remain obligated to ensure that it is\n available for as long as needed to satisfy these requirements.\n\n e) Convey the object code using peer-to-peer transmission, provided\n you inform other peers where the object code and Corresponding\n Source of the work are being offered to the general public at no\n charge under subsection 6d.\n\n A separable portion of the object code, whose source code is excluded\nfrom the Corresponding Source as a System Library, need not be\nincluded in conveying the object code work.\n\n A \"User Product\" is either (1) a \"consumer product\", which means any\ntangible personal property which is normally used for personal, family,\nor household purposes, or (2) anything designed or sold for incorporation\ninto a dwelling. In determining whether a product is a consumer product,\ndoubtful cases shall be resolved in favor of coverage. For a particular\nproduct received by a particular user, \"normally used\" refers to a\ntypical or common use of that class of product, regardless of the status\nof the particular user or of the way in which the particular user\nactually uses, or expects or is expected to use, the product. A product\nis a consumer product regardless of whether the product has substantial\ncommercial, industrial or non-consumer uses, unless such uses represent\nthe only significant mode of use of the product.\n\n \"Installation Information\" for a User Product means any methods,\nprocedures, authorization keys, or other information required to install\nand execute modified versions of a covered work in that User Product from\na modified version of its Corresponding Source. The information must\nsuffice to ensure that the continued functioning of the modified object\ncode is in no case prevented or interfered with solely because\nmodification has been made.\n\n If you convey an object code work under this section in, or with, or\nspecifically for use in, a User Product, and the conveying occurs as\npart of a transaction in which the right of possession and use of the\nUser Product is transferred to the recipient in perpetuity or for a\nfixed term (regardless of how the transaction is characterized), the\nCorresponding Source conveyed under this section must be accompanied\nby the Installation Information. But this requirement does not apply\nif neither you nor any third party retains the ability to install\nmodified object code on the User Product (for example, the work has\nbeen installed in ROM).\n\n The requirement to provide Installation Information does not include a\nrequirement to continue to provide support service, warranty, or updates\nfor a work that has been modified or installed by the recipient, or for\nthe User Product in which it has been modified or installed. Access to a\nnetwork may be denied when the modification itself materially and\nadversely affects the operation of the network or violates the rules and\nprotocols for communication across the network.\n\n Corresponding Source conveyed, and Installation Information provided,\nin accord with this section must be in a format that is publicly\ndocumented (and with an implementation available to the public in\nsource code form), and must require no special password or key for\nunpacking, reading or copying.\n\n 7. Additional Terms.\n\n \"Additional permissions\" are terms that supplement the terms of this\nLicense by making exceptions from one or more of its conditions.\nAdditional permissions that are applicable to the entire Program shall\nbe treated as though they were included in this License, to the extent\nthat they are valid under applicable law. If additional permissions\napply only to part of the Program, that part may be used separately\nunder those permissions, but the entire Program remains governed by\nthis License without regard to the additional permissions.\n\n When you convey a copy of a covered work, you may at your option\nremove any additional permissions from that copy, or from any part of\nit. (Additional permissions may be written to require their own\nremoval in certain cases when you modify the work.) You may place\nadditional permissions on material, added by you to a covered work,\nfor which you have or can give appropriate copyright permission.\n\n Notwithstanding any other provision of this License, for material you\nadd to a covered work, you may (if authorized by the copyright holders of\nthat material) supplement the terms of this License with terms:\n\n a) Disclaiming warranty or limiting liability differently from the\n terms of sections 15 and 16 of this License; or\n\n b) Requiring preservation of specified reasonable legal notices or\n author attributions in that material or in the Appropriate Legal\n Notices displayed by works containing it; or\n\n c) Prohibiting misrepresentation of the origin of that material, or\n requiring that modified versions of such material be marked in\n reasonable ways as different from the original version; or\n\n d) Limiting the use for publicity purposes of names of licensors or\n authors of the material; or\n\n e) Declining to grant rights under trademark law for use of some\n trade names, trademarks, or service marks; or\n\n f) Requiring indemnification of licensors and authors of that\n material by anyone who conveys the material (or modified versions of\n it) with contractual assumptions of liability to the recipient, for\n any liability that these contractual assumptions directly impose on\n those licensors and authors.\n\n All other non-permissive additional terms are considered \"further\nrestrictions\" within the meaning of section 10. If the Program as you\nreceived it, or any part of it, contains a notice stating that it is\ngoverned by this License along with a term that is a further\nrestriction, you may remove that term. If a license document contains\na further restriction but permits relicensing or conveying under this\nLicense, you may add to a covered work material governed by the terms\nof that license document, provided that the further restriction does\nnot survive such relicensing or conveying.\n\n If you add terms to a covered work in accord with this section, you\nmust place, in the relevant source files, a statement of the\nadditional terms that apply to those files, or a notice indicating\nwhere to find the applicable terms.\n\n Additional terms, permissive or non-permissive, may be stated in the\nform of a separately written license, or stated as exceptions;\nthe above requirements apply either way.\n\n 8. Termination.\n\n You may not propagate or modify a covered work except as expressly\nprovided under this License. Any attempt otherwise to propagate or\nmodify it is void, and will automatically terminate your rights under\nthis License (including any patent licenses granted under the third\nparagraph of section 11).\n\n However, if you cease all violation of this License, then your\nlicense from a particular copyright holder is reinstated (a)\nprovisionally, unless and until the copyright holder explicitly and\nfinally terminates your license, and (b) permanently, if the copyright\nholder fails to notify you of the violation by some reasonable means\nprior to 60 days after the cessation.\n\n Moreover, your license from a particular copyright holder is\nreinstated permanently if the copyright holder notifies you of the\nviolation by some reasonable means, this is the first time you have\nreceived notice of violation of this License (for any work) from that\ncopyright holder, and you cure the violation prior to 30 days after\nyour receipt of the notice.\n\n Termination of your rights under this section does not terminate the\nlicenses of parties who have received copies or rights from you under\nthis License. If your rights have been terminated and not permanently\nreinstated, you do not qualify to receive new licenses for the same\nmaterial under section 10.\n\n 9. Acceptance Not Required for Having Copies.\n\n You are not required to accept this License in order to receive or\nrun a copy of the Program. Ancillary propagation of a covered work\noccurring solely as a consequence of using peer-to-peer transmission\nto receive a copy likewise does not require acceptance. However,\nnothing other than this License grants you permission to propagate or\nmodify any covered work. These actions infringe copyright if you do\nnot accept this License. Therefore, by modifying or propagating a\ncovered work, you indicate your acceptance of this License to do so.\n\n 10. Automatic Licensing of Downstream Recipients.\n\n Each time you convey a covered work, the recipient automatically\nreceives a license from the original licensors, to run, modify and\npropagate that work, subject to this License. You are not responsible\nfor enforcing compliance by third parties with this License.\n\n An \"entity transaction\" is a transaction transferring control of an\norganization, or substantially all assets of one, or subdividing an\norganization, or merging organizations. If propagation of a covered\nwork results from an entity transaction, each party to that\ntransaction who receives a copy of the work also receives whatever\nlicenses to the work the party's predecessor in interest had or could\ngive under the previous paragraph, plus a right to possession of the\nCorresponding Source of the work from the predecessor in interest, if\nthe predecessor has it or can get it with reasonable efforts.\n\n You may not impose any further restrictions on the exercise of the\nrights granted or affirmed under this License. For example, you may\nnot impose a license fee, royalty, or other charge for exercise of\nrights granted under this License, and you may not initiate litigation\n(including a cross-claim or counterclaim in a lawsuit) alleging that\nany patent claim is infringed by making, using, selling, offering for\nsale, or importing the Program or any portion of it.\n\n 11. Patents.\n\n A \"contributor\" is a copyright holder who authorizes use under this\nLicense of the Program or a work on which the Program is based. The\nwork thus licensed is called the contributor's \"contributor version\".\n\n A contributor's \"essential patent claims\" are all patent claims\nowned or controlled by the contributor, whether already acquired or\nhereafter acquired, that would be infringed by some manner, permitted\nby this License, of making, using, or selling its contributor version,\nbut do not include claims that would be infringed only as a\nconsequence of further modification of the contributor version. For\npurposes of this definition, \"control\" includes the right to grant\npatent sublicenses in a manner consistent with the requirements of\nthis License.\n\n Each contributor grants you a non-exclusive, worldwide, royalty-free\npatent license under the contributor's essential patent claims, to\nmake, use, sell, offer for sale, import and otherwise run, modify and\npropagate the contents of its contributor version.\n\n In the following three paragraphs, a \"patent license\" is any express\nagreement or commitment, however denominated, not to enforce a patent\n(such as an express permission to practice a patent or covenant not to\nsue for patent infringement). To \"grant\" such a patent license to a\nparty means to make such an agreement or commitment not to enforce a\npatent against the party.\n\n If you convey a covered work, knowingly relying on a patent license,\nand the Corresponding Source of the work is not available for anyone\nto copy, free of charge and under the terms of this License, through a\npublicly available network server or other readily accessible means,\nthen you must either (1) cause the Corresponding Source to be so\navailable, or (2) arrange to deprive yourself of the benefit of the\npatent license for this particular work, or (3) arrange, in a manner\nconsistent with the requirements of this License, to extend the patent\nlicense to downstream recipients. \"Knowingly relying\" means you have\nactual knowledge that, but for the patent license, your conveying the\ncovered work in a country, or your recipient's use of the covered work\nin a country, would infringe one or more identifiable patents in that\ncountry that you have reason to believe are valid.\n\n If, pursuant to or in connection with a single transaction or\narrangement, you convey, or propagate by procuring conveyance of, a\ncovered work, and grant a patent license to some of the parties\nreceiving the covered work authorizing them to use, propagate, modify\nor convey a specific copy of the covered work, then the patent license\nyou grant is automatically extended to all recipients of the covered\nwork and works based on it.\n\n A patent license is \"discriminatory\" if it does not include within\nthe scope of its coverage, prohibits the exercise of, or is\nconditioned on the non-exercise of one or more of the rights that are\nspecifically granted under this License. You may not convey a covered\nwork if you are a party to an arrangement with a third party that is\nin the business of distributing software, under which you make payment\nto the third party based on the extent of your activity of conveying\nthe work, and under which the third party grants, to any of the\nparties who would receive the covered work from you, a discriminatory\npatent license (a) in connection with copies of the covered work\nconveyed by you (or copies made from those copies), or (b) primarily\nfor and in connection with specific products or compilations that\ncontain the covered work, unless you entered into that arrangement,\nor that patent license was granted, prior to 28 March 2007.\n\n Nothing in this License shall be construed as excluding or limiting\nany implied license or other defenses to infringement that may\notherwise be available to you under applicable patent law.\n\n 12. No Surrender of Others' Freedom.\n\n If conditions are imposed on you (whether by court order, agreement or\notherwise) that contradict the conditions of this License, they do not\nexcuse you from the conditions of this License. If you cannot convey a\ncovered work so as to satisfy simultaneously your obligations under this\nLicense and any other pertinent obligations, then as a consequence you may\nnot convey it at all. For example, if you agree to terms that obligate you\nto collect a royalty for further conveying from those to whom you convey\nthe Program, the only way you could satisfy both those terms and this\nLicense would be to refrain entirely from conveying the Program.\n\n 13. Use with the GNU Affero General Public License.\n\n Notwithstanding any other provision of this License, you have\npermission to link or combine any covered work with a work licensed\nunder version 3 of the GNU Affero General Public License into a single\ncombined work, and to convey the resulting work. The terms of this\nLicense will continue to apply to the part which is the covered work,\nbut the special requirements of the GNU Affero General Public License,\nsection 13, concerning interaction through a network will apply to the\ncombination as such.\n\n 14. Revised Versions of this License.\n\n The Free Software Foundation may publish revised and/or new versions of\nthe GNU General Public License from time to time. Such new versions will\nbe similar in spirit to the present version, but may differ in detail to\naddress new problems or concerns.\n\n Each version is given a distinguishing version number. If the\nProgram specifies that a certain numbered version of the GNU General\nPublic License \"or any later version\" applies to it, you have the\noption of following the terms and conditions either of that numbered\nversion or of any later version published by the Free Software\nFoundation. If the Program does not specify a version number of the\nGNU General Public License, you may choose any version ever published\nby the Free Software Foundation.\n\n If the Program specifies that a proxy can decide which future\nversions of the GNU General Public License can be used, that proxy's\npublic statement of acceptance of a version permanently authorizes you\nto choose that version for the Program.\n\n Later license versions may give you additional or different\npermissions. However, no additional obligations are imposed on any\nauthor or copyright holder as a result of your choosing to follow a\nlater version.\n\n 15. Disclaimer of Warranty.\n\n THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY\nAPPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT\nHOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM \"AS IS\" WITHOUT WARRANTY\nOF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,\nTHE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\nPURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM\nIS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF\nALL NECESSARY SERVICING, REPAIR OR CORRECTION.\n\n 16. Limitation of Liability.\n\n IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING\nWILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS\nTHE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY\nGENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE\nUSE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF\nDATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD\nPARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),\nEVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF\nSUCH DAMAGES.\n\n 17. Interpretation of Sections 15 and 16.\n\n If the disclaimer of warranty and limitation of liability provided\nabove cannot be given local legal effect according to their terms,\nreviewing courts shall apply local law that most closely approximates\nan absolute waiver of all civil liability in connection with the\nProgram, unless a warranty or assumption of liability accompanies a\ncopy of the Program in return for a fee.\n\n END OF TERMS AND CONDITIONS\n\n How to Apply These Terms to Your New Programs\n\n If you develop a new program, and you want it to be of the greatest\npossible use to the public, the best way to achieve this is to make it\nfree software which everyone can redistribute and change under these terms.\n\n To do so, attach the following notices to the program. It is safest\nto attach them to the start of each source file to most effectively\nstate the exclusion of warranty; and each file should have at least\nthe \"copyright\" line and a pointer to where the full notice is found.\n\n &lt;one a=\"\" and=\"\" brief=\"\" does.=\"\" give=\"\" idea=\"\" it=\"\" line=\"\" name=\"\" of=\"\" program's=\"\" the=\"\" to=\"\" what=\"\"&gt;\n Copyright (C) &lt;year&gt; &lt;name author=\"\" of=\"\"&gt;\n\n This program is free software: you can redistribute it and/or modify\n it under the terms of the GNU General Public License as published by\n the Free Software Foundation, either version 3 of the License, or\n (at your option) any later version.\n\n This program is distributed in the hope that it will be useful,\n but WITHOUT ANY WARRANTY; without even the implied warranty of\n MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n GNU General Public License for more details.\n\n You should have received a copy of the GNU General Public License\n along with this program. If not, see &lt;http: licenses=\"\" www.gnu.org=\"\"&gt;.\n\nAlso add information on how to contact you by electronic and paper mail.\n\n If the program does terminal interaction, make it output a short\nnotice like this when it starts in an interactive mode:\n\n &lt;program&gt; Copyright (C) &lt;year&gt; &lt;name author=\"\" of=\"\"&gt;\n This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.\n This is free software, and you are welcome to redistribute it\n under certain conditions; type `show c' for details.\n\nThe hypothetical commands `show w' and `show c' should show the appropriate\nparts of the General Public License. Of course, your program's commands\nmight be different; for a GUI interface, you would use an \"about box\".\n\n You should also get your employer (if you work as a programmer) or school,\nif any, to sign a \"copyright disclaimer\" for the program, if necessary.\nFor more information on this, and how to apply and follow the GNU GPL, see\n&lt;http: licenses=\"\" www.gnu.org=\"\"&gt;.\n\n The GNU General Public License does not permit incorporating your program\ninto proprietary programs. If your program is a subroutine library, you\nmay consider it more useful to permit linking proprietary applications with\nthe library. If this is what you want to do, use the GNU Lesser General\nPublic License instead of this License. But first, please read\n&lt;http: philosophy=\"\" why-not-lgpl.html=\"\" www.gnu.org=\"\"&gt;.\n&lt;/http:&gt;&lt;/http:&gt;&lt;/name&gt;&lt;/year&gt;&lt;/program&gt;&lt;/http:&gt;&lt;/name&gt;&lt;/year&gt;&lt;/one&gt;&lt;/http:&gt;"},"url":"http://www.gnu.org/licenses/gpl-3.0.html"},"release_notes":{"en-US":"See <a rel=\"nofollow\" href=\"https://outgoing.prod.mozaws.net/v1/d8e24d11ac1fc68348e5fbb65e4f57979d59c68943c5cc4c36e9a9024b8ec792/https%3A//github.com/gorhill/uBlock/releases/tag/1.16.10\">release notes</a>.\n\n<b>Closed as fixed:</b>\n\n<ul><li><a rel=\"nofollow\" href=\"https://outgoing.prod.mozaws.net/v1/95b2614c36c87f9a4775d8f79959ecedd20f84d23c94e8543ff599e251d92515/https%3A//github.com/uBlockOrigin/uBlock-issues/issues/42\">HTML filters occasionally lost effectiveness</a></li><li><a rel=\"nofollow\" href=\"https://outgoing.prod.mozaws.net/v1/87e167283c9887381fb71d23b336855cad48772d2c238c89fdd995fd4ed9140b/https%3A//github.com/gorhill/uBlock/pull/3723\">Round hour up to nearest day</a></li></ul>\n<a rel=\"nofollow\" href=\"https://outgoing.prod.mozaws.net/v1/d718c7420eb95fd907910b4f3e16560ee796cacd69d489a79ac420f45b0130b1/https%3A//github.com/gorhill/uBlock/compare/1.16.8...1.16.10\">Commits history since 1.16.8</a>."},"reviewed":null,"url":"https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/versions/1.16.10","version":"1.16.10"} \ No newline at end of file
diff --git a/addons.mozilla.org-fsd/get-data/build/json/current_versions/3006.json b/addons.mozilla.org-fsd/get-data/build/json/current_versions/3006.json
new file mode 100644
index 0000000..0a57c89
--- /dev/null
+++ b/addons.mozilla.org-fsd/get-data/build/json/current_versions/3006.json
@@ -0,0 +1 @@
+{"id":2219752,"channel":"listed","compatibility":{"firefox":{"max":"*","min":"57.0"}},"edit_url":"https://addons.mozilla.org/en-US/developers/addon/easyscreenshot/versions/2219752","files":[{"id":760843,"created":"2017-11-06T08:59:34Z","hash":"sha256:f36fa9be9da13b88853365bb91baef8556dd009b3e94d7652a178d94a04f91fd","is_restart_required":false,"is_webextension":true,"is_mozilla_signed_extension":false,"platform":"linux","size":97289,"status":"public","url":"https://addons.mozilla.org/firefox/downloads/file/760843/addon-3.57-an+fx-linux.xpi?src=","permissions":["<all_urls>","clipboardWrite","downloads","notifications","storage","*://*/*"]},{"id":760844,"created":"2017-11-06T08:59:35Z","hash":"sha256:ed13aaceef6611330ef825f3887eb1f02f92f7397a5e71ac40cca6f77e2e9dce","is_restart_required":false,"is_webextension":true,"is_mozilla_signed_extension":false,"platform":"mac","size":97290,"status":"public","url":"https://addons.mozilla.org/firefox/downloads/file/760844/addon-3.57-an+fx-mac.xpi?src=","permissions":["<all_urls>","clipboardWrite","downloads","notifications","storage","*://*/*"]},{"id":760845,"created":"2017-11-06T08:59:35Z","hash":"sha256:38bb5f796399b2c7bafcfe44bdb3125e8006270c85194fafddaeacc01315fcba","is_restart_required":false,"is_webextension":true,"is_mozilla_signed_extension":false,"platform":"windows","size":97288,"status":"public","url":"https://addons.mozilla.org/firefox/downloads/file/760845/addon-3.57-an+fx-windows.xpi?src=","permissions":["<all_urls>","clipboardWrite","downloads","notifications","storage","*://*/*"]}],"is_strict_compatibility_enabled":false,"license":{"id":3338,"name":{"en-US":"Mozilla Public License, version 2.0"},"text":{"en-US":"This Source Code Form is subject to the terms of the Mozilla Public License, v. 2.0. If a copy of the MPL was not distributed with this file, You can obtain one at <a rel=\"nofollow\" href=\"https://outgoing.prod.mozaws.net/v1/cfa1520767b4bc45590e23d48de7bec652c237ee0ad206608dfa16f2a0e21c8d/http%3A//mozilla.org/MPL/2.0/\">http://mozilla.org/MPL/2.0/</a>."},"url":"http://www.mozilla.org/MPL/2.0/"},"release_notes":null,"reviewed":null,"url":"https://addons.mozilla.org/en-US/firefox/addon/easyscreenshot/versions/3.57","version":"3.57"} \ No newline at end of file
diff --git a/addons.mozilla.org-fsd/get-data/build/json/current_versions/431482.json b/addons.mozilla.org-fsd/get-data/build/json/current_versions/431482.json
new file mode 100644
index 0000000..81b4000
--- /dev/null
+++ b/addons.mozilla.org-fsd/get-data/build/json/current_versions/431482.json
@@ -0,0 +1 @@
+{"id":2443931,"channel":"listed","compatibility":{"android":{"max":"*","min":"50.0"},"firefox":{"max":"*","min":"50.0"}},"edit_url":"https://addons.mozilla.org/en-US/developers/addon/cisco-webex-extension/versions/2443931","files":[{"id":986670,"created":"2018-06-14T08:49:49Z","hash":"sha256:b7c239d882e59ee1df89958475787dd080cfc9c40db3a9dc8bfe09f7c2b03968","is_restart_required":false,"is_webextension":true,"is_mozilla_signed_extension":false,"platform":"linux","size":40073,"status":"public","url":"https://addons.mozilla.org/firefox/downloads/file/986670/cisco_webex_extension-1.1.0-an+fx-linux.xpi?src=","permissions":["*://*.webex.com/*","*://*.qa.webex.com/*","*://*.webex.com.cn/*","nativeMessaging","https://*/*/cwcsf-nativemsg-iframe-43c85c0d-d633-af5e-c056-32dc7efc570b.html","https://*/cwcsf-nativemsg-iframe-43c85c0d-d633-af5e-c056-32dc7efc570b.html"]},{"id":986671,"created":"2018-06-14T08:49:49Z","hash":"sha256:c12f279dd09753160895ff8768fc0e5b1c5484abf0a9379849d03a5e1a5834ee","is_restart_required":false,"is_webextension":true,"is_mozilla_signed_extension":false,"platform":"mac","size":40071,"status":"public","url":"https://addons.mozilla.org/firefox/downloads/file/986671/cisco_webex_extension-1.1.0-an+fx-mac.xpi?src=","permissions":["*://*.webex.com/*","*://*.qa.webex.com/*","*://*.webex.com.cn/*","nativeMessaging","https://*/*/cwcsf-nativemsg-iframe-43c85c0d-d633-af5e-c056-32dc7efc570b.html","https://*/cwcsf-nativemsg-iframe-43c85c0d-d633-af5e-c056-32dc7efc570b.html"]},{"id":986672,"created":"2018-06-14T08:49:49Z","hash":"sha256:78d707f9bc45673e3e46128cfbed6d0cf798f1372a9bbc3358be03053afbe644","is_restart_required":false,"is_webextension":true,"is_mozilla_signed_extension":false,"platform":"windows","size":40074,"status":"public","url":"https://addons.mozilla.org/firefox/downloads/file/986672/cisco_webex_extension-1.1.0-an+fx-windows.xpi?src=","permissions":["*://*.webex.com/*","*://*.qa.webex.com/*","*://*.webex.com.cn/*","nativeMessaging","https://*/*/cwcsf-nativemsg-iframe-43c85c0d-d633-af5e-c056-32dc7efc570b.html","https://*/cwcsf-nativemsg-iframe-43c85c0d-d633-af5e-c056-32dc7efc570b.html"]}],"is_strict_compatibility_enabled":false,"license":{"id":3338,"name":{"en-US":"Mozilla Public License, version 2.0"},"text":{"en-US":"This Source Code Form is subject to the terms of the Mozilla Public License, v. 2.0. If a copy of the MPL was not distributed with this file, You can obtain one at <a rel=\"nofollow\" href=\"https://outgoing.prod.mozaws.net/v1/cfa1520767b4bc45590e23d48de7bec652c237ee0ad206608dfa16f2a0e21c8d/http%3A//mozilla.org/MPL/2.0/\">http://mozilla.org/MPL/2.0/</a>."},"url":"http://www.mozilla.org/MPL/2.0/"},"release_notes":{"en-US":"Changed the description."},"reviewed":null,"url":"https://addons.mozilla.org/en-US/firefox/addon/cisco-webex-extension/versions/1.1.0","version":"1.1.0"} \ No newline at end of file
diff --git a/addons.mozilla.org-fsd/get-data/build/json/current_versions/473816.json b/addons.mozilla.org-fsd/get-data/build/json/current_versions/473816.json
new file mode 100644
index 0000000..87cc150
--- /dev/null
+++ b/addons.mozilla.org-fsd/get-data/build/json/current_versions/473816.json
@@ -0,0 +1 @@
+{"id":2388500,"channel":"listed","compatibility":{"android":{"max":"*","min":"55.0"},"firefox":{"max":"*","min":"52.0"}},"edit_url":"https://addons.mozilla.org/en-US/developers/addon/ghostery/versions/2388500","files":[{"id":930533,"created":"2018-04-19T21:35:20Z","hash":"sha256:271b7f70a365287be67145a00904de4b9c7fe420b0773b50e4f22318674ef1a5","is_restart_required":false,"is_webextension":true,"is_mozilla_signed_extension":false,"platform":"all","size":3533078,"status":"public","url":"https://addons.mozilla.org/firefox/downloads/file/930533/ghostery_privacy_ad_blocker-8.1.2-an+fx.xpi?src=","permissions":["webNavigation","webRequest","webRequestBlocking","cookies","tabs","http://*/*","https://*/*","storage","https://www.ghostery.com/*","https://apps.ghostery.com/*","https://staging-apps.ghostery.com/*","https://gcache.ghostery.com/*","https://staging-gcache.ghostery.com/*","https://signon.ghostery.com/*","https://signon.ghosterystage.com/*","https://account.ghostery.com/*","https://account.ghosterystage.com/*"]}],"is_strict_compatibility_enabled":false,"license":{"id":3338,"name":{"en-US":"Mozilla Public License, version 2.0"},"text":{"en-US":"This Source Code Form is subject to the terms of the Mozilla Public License, v. 2.0. If a copy of the MPL was not distributed with this file, You can obtain one at <a rel=\"nofollow\" href=\"https://outgoing.prod.mozaws.net/v1/cfa1520767b4bc45590e23d48de7bec652c237ee0ad206608dfa16f2a0e21c8d/http%3A//mozilla.org/MPL/2.0/\">http://mozilla.org/MPL/2.0/</a>."},"url":"http://www.mozilla.org/MPL/2.0/"},"release_notes":{"en-US":"### GHOSTERY 8.1.2 (April 19, 2018)\n\n+ Remove WebSocket filter scheme support for older versions of Chrome and FF\n+ Fix Human Web endpoint URLs\n\nPlease see <a rel=\"nofollow\" href=\"https://outgoing.prod.mozaws.net/v1/5277464bd43165ef3eef75e974a9f744ed017fa7456636e204729b82b4125343/https%3A//github.com/ghostery/ghostery-extension/releases/\">https://github.com/ghostery/ghostery-extension/releases/</a>"},"reviewed":null,"url":"https://addons.mozilla.org/en-US/firefox/addon/ghostery/versions/8.1.2","version":"8.1.2"} \ No newline at end of file
diff --git a/addons.mozilla.org-fsd/get-data/build/json/current_versions/607454.json b/addons.mozilla.org-fsd/get-data/build/json/current_versions/607454.json
new file mode 100644
index 0000000..856ac6c
--- /dev/null
+++ b/addons.mozilla.org-fsd/get-data/build/json/current_versions/607454.json
@@ -0,0 +1 @@
+{"id":2435113,"channel":"listed","compatibility":{"firefox":{"max":"*","min":"57.0a1"}},"edit_url":"https://addons.mozilla.org/en-US/developers/addon/video-downloadhelper/versions/2435113","files":[{"id":977764,"created":"2018-06-05T09:23:06Z","hash":"sha256:ec0810b29ae61086caaf494eafb5bdbcf3565ff2f1245c102c55bc995af85b2f","is_restart_required":false,"is_webextension":true,"is_mozilla_signed_extension":false,"platform":"all","size":713208,"status":"public","url":"https://addons.mozilla.org/firefox/downloads/file/977764/video_downloadhelper-7.3.1-an+fx.xpi?src=","permissions":["tabs","contextMenus","nativeMessaging","<all_urls>","webRequest","webRequestBlocking","downloads","clipboardWrite","webNavigation","notifications","storage","cookies","menus","*://*.downloadhelper.net/*"]}],"is_strict_compatibility_enabled":false,"license":{"id":839,"name":{"en-US":"Custom License"},"text":{"en-US":"You are free to use Video DownloadHelper with any of the applications or services offered by Mozilla. All Other Rights Reserved."},"url":"https://addons.mozilla.org/en-US/firefox/addon/video-downloadhelper/license/7.3.1"},"release_notes":{"en-US":"Video DownloadHelper 7.3.1 brings a number of improvements and fixes that have been requested or reported by our users.\n\nSome of those fixes are located in the add-on itself, some had to be made in the companion application (the external application that is to be installed along with the extension in order to provide the necessary capabilities removed from Firefox Quantum v57). As a consequence, Video DownloadHelper 7.3.1 will request you to update the companion app to version 1.2.2.\n\nWe understand that updating this companion application is a bit tedious if you compare to how smoothly the add-on updates, and we try to keep this requirement as seldom as possible. But in this case, we had no other choice. We apologize in advance.\n\nChanges from 7.3.0\n\n Fix: gallery downloads failure through CoApp 1.2.2 requirement\n\nChanges from 7.2.2\n\n Fix: SaveAs dialogs closing unexpectedly when request CoApp downloads\n Fix: downloads of big (&gt;2GB) files failing with error invalid typed array length\n Fix: YouTube file names are now taken in priority from the video metadata and not the page title that produces a \"- Youtube\" trailing\n Fix: requesting a Download &amp; Convert operation from a DASH streaming to an audio-only format caused the action to be stalled at 50%\n Improvement: in order to minimize the impact of Video DownloadHelper to the user experience, whenever the extension opens a tab and the user closes it, the original tab is restored\n Improvement: DASH downloads are now of much better quality with an improved management of video synchronisation frames\n Improvement: videos from Tumblr now display a proper thumbnail\n Fix: some running downloads did appear amongst other detected videos and not in the in the running section\n Improvement: SaveAs dialogs now sorts file names in a case-insensitive way\n CoApp: Converter is now based on ffmpeg 4.0\n CoApp: Comodo IceDragon browser support\n CoApp: include libbz2 library that is missing by default in Fedora and some other Linux distributions\n CoApp: include libnuma library that is missing by default in GenToo and some other Linux distributions\n CoApp: on Fedora and some other Linux distributions, the companion app manifests are now correctly installed to directory /usr/lib64"},"reviewed":null,"url":"https://addons.mozilla.org/en-US/firefox/addon/video-downloadhelper/versions/7.3.1","version":"7.3.1"} \ No newline at end of file
diff --git a/addons.mozilla.org-fsd/get-data/build/json/current_versions/735601.json b/addons.mozilla.org-fsd/get-data/build/json/current_versions/735601.json
new file mode 100644
index 0000000..58f7a31
--- /dev/null
+++ b/addons.mozilla.org-fsd/get-data/build/json/current_versions/735601.json
@@ -0,0 +1 @@
+{"id":2418301,"channel":"listed","compatibility":{"android":{"max":"*","min":"48.0"},"firefox":{"max":"*","min":"48.0"}},"edit_url":"https://addons.mozilla.org/en-US/developers/addon/avast-online-security/versions/2418301","files":[{"id":960897,"created":"2018-05-18T09:40:01Z","hash":"sha256:1067d15f229752fbcc672aad826d74e96f2b406313b87f632d35af912194d553","is_restart_required":false,"is_webextension":true,"is_mozilla_signed_extension":false,"platform":"all","size":789048,"status":"public","url":"https://addons.mozilla.org/firefox/downloads/file/960897/avast_online_security-18.3.24-an+fx.xpi?src=","permissions":["storage","cookies","*://*.avast.com/*","http://*/*","https://*/*","tabs","webNavigation","webRequest","webRequestBlocking","activeTab","<all_urls>"]}],"is_strict_compatibility_enabled":false,"license":{"id":7278,"name":{"en-US":"EULA"},"text":{"en-US":"END USER LICENSE AGREEMENT\n\nPlease read the terms and conditions of this End User License Agreement (“Agreement”) carefully before you use the Solution (as defined below). This is a legally binding contract. By assenting electronically, or installing the Solution or using the Solution, you accept all the terms and conditions of this Agreement on behalf of yourself and any entity or individual you represent or for whose Device you acquire the Solution (collectively “you”). If you do not agree with the terms and conditions of this Agreement, do not continue the installation process, do not use the Solution and delete or destroy all copies of the Solution in your possession or control.\n\nThis Agreement relates to your use of certain software or services, including any Updates (each, a “Solution”) in connection with which you are accepting this Agreement, and any related Documentation. In this Agreement, “Vendor” means the entity identified here as providing the Solution to you; “Documentation” means any user manuals and instructions provided with the Solution; and “Applicable Conditions” means collectively the Subscription Term together with the types of Devices, Permitted Number of Devices, other transaction terms, conditions and documents you accepted when you acquired the Solution (including any terms and conditions of sale), and any distribution agreement, reseller agreement, partner agreement or other agreement between you and Vendor or other member of Vendor Group, as well as the other limitations described by Section 2 and the Documentation.\n\nPlease note that this Agreement comes in two parts. Sections 1 through 12 of this Agreement apply to all Solutions, including those listed below. Section 13 sets out additional terms and conditions affecting specific Solutions or categories of Solutions, including Third Party Software, Services and other Products (Section 13.1); Managed Service Provider Licenses (Section 13.2); Browser Cleanup (Section 13.3); WiFi Finder (Section 13.4); Avast Family Shield (Section 13.5); Mobile Apps (Section 13.6); Technician Edition (Section 13.7); Assurance Plan (Section 13.8); Premium Technical Support (Section 13.9); Remote Access; Assistance Software (Section 13.10); Avast Driver Updater (Section 13.11), CloudCare SWG or CloudCare UTM (Section 13.12), and certain HideMyAss! services (Section 13.13). This Agreement supersedes and replaces any other agreement you previously entered into with respect to a prior version of the Solution.\n\nVendor may amend this Agreement at any time by notice provided to you in accordance with this Agreement, and your continued use of any affected Solution at any point at least 30 days after the notice date will constitute your acceptance of the amendment of this Agreement. Vendor may require that you accept the amended Agreement in order to continue using any affected Solution you have previously acquired. If you decline to accept the amended Agreement, Vendor may terminate your use of such affected Solution, in which case you may obtain a refund for the portion of the subscription fee you have paid for the unexpired or unused portion of the Subscription Term by following the instructions found here.\n\n1. LICENSE\nVendor grants to you a non-exclusive license to use the Solution and the Documentation for the agreed period indicated in the Applicable Conditions, including any extensions or renewals of the agreed period (the “Subscription Term”), provided that you agree to the terms and conditions of this Agreement.\n\n2. PERMITTED USE OF THE SOLUTION\n2.1. You may use the Solution on, or to support, up to the agreed number (the “Permitted Number of Devices”) of mobile phones, smartphones, tablets, mobile network appliances, other mobile devices (each, a “Mobile Device”), personal computers, Internet-connected devices, or other device compatible with the Solution (each, including each Mobile Device, a “Device”) indicated in the Applicable Conditions exclusively:\n\n2.1.1. In the case of Solutions that Vendor designates for corporate, commercial or business use (each, a “Business Solution”), by you or your affiliates (those entities controlling you, controlled by you or under common control with you) for internal business purposes. In the event of any such use of the Business Solution by your affiliate, you are responsible for your affiliate’s compliance with this Agreement, and a breach by your affiliate will be deemed a breach by you. Any obligations of Vendor under this Agreement will be owed solely to you and not your affiliates that use the Business Solution under the terms and conditions of this Agreement.\n\n2.1.2. In the case of all other Solutions (each, a “Consumer Solution”), by a natural person, or members of his household for personal, noncommercial purposes. For the avoidance of doubt, no Consumer Solution is provided or licensed for use by any: (i) natural person for commercial purposes; or (ii) business, company, government entity, nongovernmental organization or other not-for-profit entity, or educational institution.\n\n2.2. You may make one backup copy of the Solution.\n\n2.3. Provided the Solution is configured for network use, you may use the Solution on one or more file servers or virtual machines for use on a single local area network for only one (but not more than one) of the following purposes:\n\n2.3.1. Permanent installation of the Solution onto hard disks or other storage devices for up to the Permitted Number of Devices; or\n\n2.3.2. Use of the Solution over such single local area network, provided the number of different Devices on which the Solution is used does not exceed the Permitted Number of Devices; or\n\n2.3.3. If the Applicable Conditions grant you the right to use the Solution in providing MSP Services, use of the Solution as described in Section 13.7.\n\n2.4. YOUR USE OF THE SOLUTION OTHER THAN AS EXPRESSLY AUTHORIZED BY SECTION 2 OF THIS AGREEMENT, OR ANY RESALE OR FURTHER DISTRIBUTION OF THE SOLUTION, CONSTITUTES A MATERIAL BREACH OF THIS AGREEMENT AND MAY VIOLATE APPLICABLE COPYRIGHT LAWS.\n\n3. UPDATES\nVendor, from time to time during the Subscription Term and without your separate permission or consent, may from time to time deploy an upgrade or update of, or replacement for, any Solution (“Update”), and as a result of any such deployment you may not be able to use the applicable Solution or Device (or certain functions of the Device) until any such Update is fully installed or activated. Each Update will be deemed to form a part of the “Solution” for all purposes under this Agreement. Updates may include both additions to, and removals of, any particular features or functionality offered by a Solution or may replace it entirely, and Vendor will determine the content, features and functionality of the updated Solution in its sole discretion. Vendor is not required to offer you the option to decline or delay Updates but, in any event, you may need to download and permit installation or activation of all available Updates to obtain maximum benefit from the Solution. Vendor may stop providing support for a Solution until you have accepted and installed or activated all Updates. Vendor in its sole discretion will determine when and if Updates are appropriate and has no obligation to make any Updates available to you. Vendor in its sole discretion may stop providing Updates for any version of the Solution other than the most current version, or Updates supporting use of the Solution in connection with any versions of operating systems, email programs, browser programs and other software with which the Solution is designed to operate.\n\n4. OWNERSHIP RIGHTS\n4.1. The Solutions and Documentation are the intellectual property of Vendor and are protected by applicable copyright laws, international treaty provisions and other applicable laws of the country in which the Solution is being used. The structure, organization and computer code of the Solution are valuable trade secrets and confidential information of Vendor. To the extent you provide any comments or suggestions about the Solution to Vendor, you grant Vendor the right and license to retain and use any such comments or suggestions for any purpose in its current or future products or services, without further compensation to you and without your approval of such retention or use.\n\n4.2. Except as stated in this Agreement, your possession, use of a Solution does not grant you any rights or title to any intellectual property rights in the Solution or Documentation. All rights to the Solution and Documentation, including all associated copyrights, patents, trade secret rights, trademarks and other intellectual property rights, are reserved by Vendor.\n\n5. RESTRICTIONS\n5.1. You may not copy or use the Solution or the Documentation except as set forth in Section 2 of this Agreement. You may not, and may not permit any third party to:\n\n5.1.1. use any authorization code, license number, username/password combination or other activation code or number supplied by Vendor in connection with any Solution (“Activation Code”) on, or for, more than the number of Devices specified by the Applicable Conditions;\n\n5.1.2. disclose any Activation Code to any party other than Vendor or Vendor’s designated representatives;\n\n5.1.3. except as expressly authorized by law: (i) reverse engineer, disassemble, decompile, translate, reconstruct, transform or extract any Solution or any portion of the Solution (including any related malware signatures and malware detection routines); or (ii) change, modify or otherwise alter any Solution (including any related malware signatures and malware detection routines);\n\n5.1.4. except as authorized by a distribution agreement, reseller agreement or other agreement between you and Vendor or other member of Vendor Group, publish, resell, distribute, broadcast, transmit, communicate, transfer, pledge, rent, share or sublicense any Solution;\n\n5.1.5. except as expressly authorized by this Agreement (including Sections 13.2, 13.5 and 13.7), the Applicable Conditions or another agreement between you and Vendor or other member of Vendor Group, use any Solution to manage the facilities of a third party or grant any third party access to or use of any Solution on a service bureau, timesharing, subscription service or application service provider or other similar basis;\n\n5.1.6. use any Solution to provide or build a product or service that competes with the Solution;\n\n5.1.7. use or attempt to use any Solution to: (i) upload, download, stream, transmit, copy or store any information, data, or materials, or engage or assist in any activity that may: (A) infringe the intellectual property rights or other rights of any third party; (B) contain any unlawful, harmful, threatening, abusive, defamatory or otherwise objectionable material of any kind, (C) harm or attempt to harm others; (D) have the potential to incite or produce conduct that is unlawful, harmful, threatening, abusive, harassing, tortious, defamatory, libelous, vulgar, obscene, invasive of another's privacy, hateful, or racially, ethnically, religiously or sexually discriminatory or otherwise objectionable; (E) promote or provide instructional information about illegal activities, promote physical harm or injury against any group or individual, or promote any act of cruelty to animals; (F) impersonate any person or entity or otherwise misrepresent your affiliation with a person or entity; or (G) assist any fraud, deception or theft; or (H) damage, disable or impair the operation of, or gain or attempt to gain unauthorized access, receipt, use, copying, alteration or destruction of or to, any property, Devices, software, services, networks or data by any means, including by hacking, phishing, spoofing or seeking to circumvent or defeat any firewalls, password protection or other information security protections or controls of whatever nature; (ii) in any way violate any applicable local, national or international law or regulation; (iii) forge headers or otherwise manipulate identifiers in order to disguise the origin of any content transmitted through the use of the Solution; (iv) upload, post, email or otherwise transmit any unsolicited or unauthorized advertising, promotional materials, “junk mail,” “spam,” “chain letters,” or “pyramid schemes”; or (v) collect or store personal data without the knowledge and express consent of the data subject;\n\n5.1.8. damage, disable or impair the operation of, or gain or attempt to gain unauthorized access to, any Solution or to any property, Devices, software, services, networks or data connected to, or inter-operating with, such Solution, or to any content or data stored, accessed or delivered through such Solution, by any means, including by hacking, phishing, spoofing or seeking to circumvent or defeat any firewalls, password protection or other information security protections or controls of whatever nature;\n\n5.1.9. test or benchmark, or disclose or publish testing or benchmark results, for any Solution without Vendor’s prior written consent; or\n\n5.1.10. defeat or circumvent, attempt to defeat or circumvent, or authorize or assist any third party in defeating or circumventing controls on the use of copies of any Solution; or\n\n5.1.11. violate Vendor’s policy governing acceptable use of its Solutions (the “Acceptable Use Policy”), which you can find here. If and to the extent this Agreement and the Acceptable Use Policy conflict, the more restrictive provision will govern.\n\n5.2. Certain Solutions may grant you or another user administrative privileges that, among other things, may allow the administrator to monitor other Devices and/or the status of Solutions deployed on other Devices, including for example Subscription Term status, Solution messages, and Updates. You represent and warrant that you will exercise such administrative privileges only with respect to Devices and Solutions for which you are duly authorized and for no other purpose. You also represent and warrant to Vendor that: (i) you have all the requisite authority to accept this Agreement, and install and/or use the Solution on the Devices, on behalf of any owners and users of those administered Devices; and (ii) you hereby accept this Agreement for and on behalf of: (A) any such owners and users of those administered Devices; and (B) yourself.\n\n5.3. Certain Solutions may enable you to publish or share publicly with others, content you have generated or obtained from other sources (“User Content”). You retain any and all intellectual property rights you already hold under applicable law in User Content you publish or share through the Solution, subject to the rights, licenses, and other terms of this Agreement, including any underlying rights of others in any User Content that you may use or modify. You grant to each member of the Vendor Group, a non-exclusive, unrestricted, unconditional, unlimited, worldwide, irrevocable, perpetual, and royalty-free right and license to use, copy, record, distribute, reproduce, disclose, sell, re-sell, sublicense (through multiple levels), modify, adapt, display, publicly perform, transmit, publish, broadcast, translate, make derivative works of, and otherwise exploit in any manner whatsoever, all or any portion of the User Content you publish or share through a Solution (and derivative works thereof), solely for the purpose of providing the Solutions to you under this Agreement. Each time you publish or share any User Content, you represent and warrant to each member of the Vendor Group that you are at least the age of majority in the state or jurisdiction in which you reside and are the parent or legal guardian, or have all proper consents from the parent or legal guardian, of any minor who is depicted in or contributed to any User Content you publish or share, and that, in regard to that User Content: (i) you are the sole author and owner of the intellectual property and other rights to the User Content, or you have a lawful right to publish and share the User Content and grant each member of the Vendor Group the right to use it as described in this Section 5.3, all without any obligation being imposed on any member of the Vendor Group to obtain the consent of any third party and without creating any obligation or liability whatsoever for any member of Vendor Group; (ii) the User Content is accurate; (iii) the User Content does not and, as to each member of the Vendor Group’s permitted uses and exploitation set forth in this Agreement, will not infringe any intellectual property or other right of any third party; and (iv) the User Content will not violate this Agreement or cause injury or harm to any person.\n\n6. LIMITED WARRANTY; DISCLAIMER AND EXCLUSION OF LIABILITY\n6.1. Subject to the remainder of this Section 6, Vendor warrants to you that the Solution will perform, or will be performed, substantially in accordance with the Documentation for a period of 30 days following your initial acquisition of the Solution. To make a warranty claim, you must follow the instructions provided by the source from which you acquired the Solution. If the Solution does not perform substantially in accordance with the Documentation, the entire and exclusive liability of each member of the Vendor Group and each Vendor Partner, and your sole and exclusive remedy, in respect of such warranty will be limited to, at Vendor’s option, to either: (i) replacement of the Solution; or (ii) return of the Solution to obtain a refund for the portion of the subscription fee you have paid for the unexpired or unused portion of the Subscription Term. This warranty applies only to the Solution as originally delivered, and does not apply to: (i) any Updates; (ii) any defects caused by the combination, operation or use of the Solution with: (A) software, hardware or other materials not provided by Vendor; or (B) Devices, software, or other materials that do not conform to Vendor requirements set forth in the Documentation.\n\n6.2. EXCEPT AS STATED IN SECTION 6.1 OF THIS AGREEMENT, MEMBERS OF THE VENDOR GROUP AND VENDOR PARTNERS DO NOT WARRANT THE PERFORMANCE OR RESULTS YOU MAY OBTAIN BY USING ANY SOLUTION OR DOCUMENTATION. EXCEPT AS STATED IN SECTION 6.1 OF THIS AGREEMENT, THE SOLUTION IS PROVIDED “AS IS” AND MEMBERS OF THE VENDOR GROUP AND VENDOR PARTNERS MAKE NO EXPRESS OR IMPLIED WARRANTIES OR CONDITIONS AND, TO THE MAXIMUM EXTENT PERMITTED BY LAW, DISCLAIM ANY AND ALL WARRANTIES AND CONDITIONS IMPLIED BY STATUTE, COMMON LAW, JURISPRUDENCE OR OTHER THEORIES OF LAW, INCLUDING IMPLIED WARRANTIES OR CONDITIONS OF NONINFRINGEMENT OF THIRD PARTY RIGHTS, TITLE, MERCHANTABILITY, SUITABLE QUALITY OR FITNESS FOR ANY PARTICULAR PURPOSE. VENDOR DOES NOT WARRANT THAT THE OPERATION OF ANY SOLUTION WILL BE UNINTERRUPTED OR ERROR FREE, THAT ANY SOLUTION WILL WORK PROPERLY ON ANY GIVEN DEVICE OR WITH ANY PARTICULAR CONFIGURATION OF HARDWARE AND/OR SOFTWARE, OR THAT ANY SOLUTION WILL PROVIDE COMPLETE PROTECTION FOR THE INTEGRITY OF SELECTED DATA, INFORMATION OR CONTENT STORED OR TRANSMITTED VIA THE INTERNET.\n\n6.3. NOTWITHSTANDING ANY OTHER PROVISION OF THIS AGREEMENT, ANY SOLUTION PROVIDED TO YOU WITHOUT FEES (INCLUDING ANY SOLUTION PROVIDED AS A “FREE,” “TRIAL” OR “BETA” SOLUTION) IS PROVIDED ON AN “AS IS”, “WITH ALL FAULTS,” AND “AS AVAILABLE” BASIS, WITHOUT ANY WARRANTY OF ANY KIND AND WITHOUT SUPPORT OR OTHER SERVICES BY VENDOR.\n\n6.4. TO THE FULL EXTENT PERMITTED BY LAW, IN NO EVENT WILL VENDOR OR ANY COMPANY THAT CONTROLS, IS CONTROLLED BY OR IS UNDER COMMON CONTROL WITH VENDOR (COLLECTIVELY, THE “VENDOR GROUP”) OR THEIR RESPECTIVE AGENTS, LICENSORS, REPRESENTATIVES, SUPPLIERS, DISTRIBUTORS, RESELLERS, WIRELESS CARRIERS OVER WHOSE NETWORK OR SYSTEMS ANY SOLUTION IS PROVIDED, OR ANY OTHER BUSINESS PARTNER OF ANY MEMBER OF THE VENDOR GROUP (COLLECTIVELY, THE “VENDOR PARTNERS”) BE LIABLE TO YOU OR ANY THIRD PARTY FOR:\n\n6.4.1. ANY INDIRECT, CONSEQUENTIAL, INCIDENTAL, PUNITIVE, SPECIAL OR EXEMPLARY DAMAGES OR LOSSES WHATSOEVER, WITHOUT REGARD TO CAUSE OR THEORY OF LIABILITY;\n\n6.4.2. ANY DAMAGES FOR ANY LOSS OF BUSINESS, PROFITS OR REVENUE, LOSS OF PRIVACY, LOSS OF USE OF ANY DEVICE OR SOLUTION (INCLUDING THE SOLUTION), WASTED EXPENDITURE, COSTS OF PROCURING SUBSTITUTE OR REPLACEMENT GOODS, SERVICES OR DIGITAL PRODUCTS, BUSINESS INTERRUPTION, ANY UNAUTHORIZED DISCLOSURE OR LOSS (INCLUDING ANY CORRUPTION, DEGRADATION OR UNAVAILABILITY) OF ANY DATA OR INFORMATION OF ANY NATURE (WHETHER OR NOT ANY OF THE FOREGOING LOSSES, DAMAGES, COSTS OR EXPENDITURE ARE DIRECT OR INDIRECT LOSSES OR DAMAGES); OR\n\n6.4.3. ANY OTHER PECUNIARY OR NONPECUNIARY LOSS OR DAMAGE ARISING OUT OF THIS AGREEMENT OR ANY SOLUTION PROVIDED HEREUNDER;\n\nEVEN IF SUCH MEMBER OF THE VENDOR GROUP OR VENDOR PARTNER HAS BEEN ADVISED OF THE POSSIBILITY OF ANY SUCH LOSS OR DAMAGE. NOTWITHSTANDING ANYTHING TO THE CONTRARY IN THIS AGREEMENT OR OTHERWISE, NO MEMBER OF THE VENDOR GROUP OR ANY VENDOR PARTNER WILL BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY LOSS OR DAMAGE (WHETHER DIRECT OR INDIRECT) FOR ANY UNAUTHORIZED ACCESS TO, OR ANY CORRUPTION, DEGRADATION, UNAVAILABILITY, ERASURE, THEFT, DESTRUCTION, ALTERATION, DISCLOSURE OR LOSS OF ANY DATA, INFORMATION OR CONTENT TRANSMITTED, RECEIVED OR STORED BY OR IN CONNECTION WITH ANY SOLUTION REGARDLESS OF THE CAUSE. TO THE FULL EXTENT PERMITTED BY LAW, IN NO CIRCUMSTANCES WILL ANY MEMBER OF VENDOR GROUP OR ANY VENDOR PARTNER’S TOTAL AGGREGATE LIABILITY FOR ALL LOSS OR DAMAGE TO YOU OR ANY THIRD PARTY ARISING FROM OR RELATING TO ANY SOLUTION, THE SUBSCRIPTION OR THIS AGREEMENT EXCEED THE GREATER OF: (I) FIVE U.S. DOLLARS (US$5.00); AND (II) THE AMOUNT OF THE SUBSCRIPTION FEES YOU HAVE PAID FOR THE IMMEDIATELY PRECEDING 12 MONTHS OF THE SUBSCRIPTION TERM.\n\n6.5. THE EXCLUSIONS AND LIMITATIONS OF LIABILITY OF MEMBERS OF THE VENDOR GROUP AND VENDOR PARTNERS CONTAINED IN THIS AGREEMENT WILL NOT LIMIT OR EXCLUDE THEIR POTENTIAL LIABILITY FOR:\n\n6.5.1. DEATH, PERSONAL INJURY OR FRAUD BEYOND THE EXTENT PERMITTED BY APPLICABLE LAWS; AND\n\n6.5.2. ANY MATTER THAT MAY NOT OTHERWISE BE LIMITED OR EXCLUDED BY APPLICABLE LAWS.\n\n7. PRIVACY; PROCESSING OF PERSONAL AND OTHER INFORMATION\n7.1. You acknowledge and agree that any Solution may communicate automatically with Vendor’s cloud-based technology to function, and to make any Solution and other Vendor products and services more effective. You may withdraw your consent to such communication only by uninstalling and/or deactivating the Solution.\n\n7.2. Vendor processes certain information and data (which may include personally identifiable information and/or personal data) relating to: (i) the user of the Solution and/or any Device on which the Solution is used; (ii) the Solution and/or any Device on which the Solution is used. Vendor’s applicable privacy policy which you can find here describes how Vendor collects, uses and otherwise processes such information and data.\n\n7.3. You authorize Vendor to use, copy, store, and transmit your information and data in order to provide a Solution to you, to develop and improve a Solution, and to implement Vendor’s disaster recovery and business continuity plans.\n\n8. TERMINATION\n8.1. This Agreement will immediately terminate upon your breach of any of your obligations in this Agreement (including any breach of your obligations in Sections 2, 5 or 9, which will result in forfeiture of any rights you may have to receive Updates or to obtain a refund for the portion of the subscription fee you have paid for the unexpired or unused portion of the Subscription Term). Vendor reserves the right to any other remedies available under law in the event your breach of any of your obligations under this Agreement adversely affects any member of the Vendor Group or any Vendor Partner. The exclusions and limitations of liability of members of the Vendor Group and Vendor Partners contained in this Agreement will survive termination of this Agreement.\n\n8.2. Vendor, by notice to you, may immediately terminate this Agreement for convenience at any time with respect to any particular Solution or all Solutions and the entire and exclusive liability of each member of the Vendor Group and each Vendor Partner, and your sole and exclusive remedy, in respect of any such termination will be limited to a refund for the portion of the subscription fees you have paid for the unexpired or unused portion of the Subscription Term. From the effective date of such termination you will no longer be entitled to use any affected Solution and Documentation.\n\n9. U.S. GOVERNMENT RESTRICTED RIGHTS\nAll Solutions qualify as “commercial items,” as that term is defined at 48 C.F.R. 2.101, consisting of “commercial computer software” and “commercial computer software documentation” as such terms are used in 48 C.F.R. 12.212. Consistent with 48 C.F.R. 12.212 and 48 C.F.R. 227.7202-1 through 227.7202-4, all U.S. Government end users acquire such Solutions and related Documentation with only those rights set forth in this Agreement that apply to non-governmental customers. Use of such Solutions and related Documentation constitutes agreement by the U.S. Government entity that the computer software and computer software documentation is commercial, and constitutes acceptance of the rights and restrictions set forth in this Agreement.\n\n10. EXPORT CONTROLS\nYou must comply with all applicable U.S. and international laws governing export and re-export of the Solutions, including the U.S. Export Administration Regulations, as well as end-user, end-use and destination restrictions issued by U.S. and other governments. Without derogating from the generality of the foregoing, you represent, warrant and undertake that: (i) you are not a member of any of the denied persons list, unverified list, entity list, specially designated nationals list, debarred list or any other lists published by the U.S. Government; and (ii) you will not use, export or re-export any Solution in, or to, territories, destinations, companies or individuals in violation of U.S. and E.U. embargoes or trade sanctions. You will indemnify, defend and hold each member of the Vendor Group harmless from and against any claim, demand, suit or proceeding, and all damages, liabilities, costs and expenses arising from your failure to comply with this Section 10.\n\n11. BINDING ARBITRATION AGREEMENT AND CLASS ACTION WAIVER\n11.1. This Section 11 applies to any Dispute arising from or related to any Solution, subscription for any Solution or this Agreement, and involving you and Vendor. “Dispute,” for the purposes of this Section 11, means any dispute, action, or other controversy regardless of the particular cause of action(s) asserted (i.e., it encompasses, among any other potential cause of action or legal basis, claims for breach of contract, misrepresentation or fraud, indemnification, tort (including negligence) violation of statute or regulation).\n\n11.2. In the event of a Dispute, you must provide Vendor with a notice of Dispute, which is a written statement of your name, address and contact information, the facts giving rise to the Dispute, and the relief requested by you. You must send any notice of Dispute by email to Vendor at legal@avast.com (stating Subject: Section 11 Notice of Dispute Under EULA).\n\n11.3. ANY PROCEEDINGS TO RESOLVE OR LITIGATE ANY DISPUTE IN ANY FORUM WILL BE CONDUCTED SOLELY ON AN INDIVIDUAL BASIS. YOU WILL NOT SEEK TO HAVE ANY DISPUTE HEARD AS A CLASS ACTION, PRIVATE ATTORNEY GENERAL ACTION, OR IN ANY OTHER PROCEEDING IN WHICH EITHER PARTY ACTS OR PROPOSES TO ACT IN A REPRESENTATIVE CAPACITY. NO ARBITRATION OR PROCEEDING WILL BE COMBINED WITH ANOTHER WITHOUT THE PRIOR WRITTEN CONSENT OF ALL PARTIES TO ALL AFFECTED ARBITRATIONS OR PROCEEDINGS.\n\n11.4. If you and Vendor do not resolve any Dispute by informal negotiation, any other effort to resolve the Dispute will be conducted exclusively by binding arbitration governed by the United States Federal Arbitration Act (“FAA”), 9 U.S.C. § 1 et seq. Except as provided in Section 11.5 below, you are giving up the right to litigate (or participate in litigation as a party or class member) all Disputes in court before a judge or jury. Instead, all Disputes will be resolved before a neutral arbitrator, whose decision will be final except for a limited right to judicial review under the FAA. Any court with jurisdiction over the parties may enforce the arbitrator’s award.\n\n11.5. The arbitration requirement of this Section 11 is subject to the following exceptions:\n\n11.5.1. You may litigate any Dispute in small claims court, in the county or other similar political subdivision in which you reside, if the Dispute meets all requirements to be heard in the small claims court. If you initiate a claim in small claims court, you are responsible for all court costs and fees.\n\n11.5.2. All Disputes concerning any alleged misappropriation of your or Vendor’s intellectual property will be resolved in court.\n\n11.5.3. If you are a consumer and live in the European Union, Norway, Iceland or Lichtenstein, you may be entitled to address your Dispute through an internet platform for online dispute resolution established by the European Commission (the “ODR Platform”). The ODR Platform is intended to facilitate out-of-court resolutions relating to online purchases of goods and services between consumers and traders based in the European Union, Norway, Iceland and Lichtenstein. You will find the ODR Platform by following this link: <a rel=\"nofollow\" href=\"https://outgoing.prod.mozaws.net/v1/c8ca9c086b64f9ca4df00ac434f923a943b7f69a3d47afe8fec778b7c0ffa1a5/http%3A//ec.europa.eu/consumers/odr/\">http://ec.europa.eu/consumers/odr/</a>.\n\n11.6. Any arbitration will be administered by the American Arbitration Association (the “AAA”) in accordance with the AAA’s “Consumer Arbitration Rules” effective September 1, 2014, including the “Costs of Arbitration (Including AAA Administrative Fees)” effective September 1, 2014 (collectively, the “Consumer Procedures”) and will be subject to the following:\n\n11.6.1. The Consumer Procedures provide for certain fees, specifically allocating some to the consumer (you) and others to the business (Vendor). If your claim is US$75,000 or less, Vendor will pay all of those specified fees and costs, including those allocated to the consumer. Vendor does not agree to bear any other costs. If your claim is more than US$75,000, the Consumer Procedures will govern payment.\n\n11.6.2. Except as provided in below, the AAA’s Consumer Procedures will be applied to any Dispute between the parties. However, pursuant to Consumer Arbitration Rule R-1(e), a party may raise the proper application of the Consumer Arbitration Rules to an arbitrator for a final decision. This Agreement governs to the extent it conflicts with the Consumer Procedures. You will commence arbitration only in the county or other similar political subdivision in which you reside. The arbitration proceedings will be conducted by conference call. However, if the proceedings are conducted pursuant to the AAA Consumer Procedures, the arbitrator(s) will have the discretionary authority to require a face-to-face hearing upon the request of a party.\n\n11.6.3. You and the Vendor agree that the use of the AAA to administer arbitration is not integral to the parties’ agreement to arbitrate Disputes. If the AAA will not or cannot conduct an arbitration, you and Vendor will negotiate in good faith to agree on a sole arbitrator who will resolve the Dispute as provided in the Consumer Procedures. If the parties cannot agree on an arbitrator, a court of competent jurisdiction may appoint an arbitrator, who will follow the AAA’s Consumer Procedures.\n\n11.6.4. If one or more parts of this Section 11 are found to be illegal, invalid or unenforceable as to all or some parts of a Dispute, then, and only in that circumstance, those parts will be severed and the Dispute will be resolved subject to all remaining parts of this Section 11 and all other provisions of this Agreement. If such severance results in all or some parts of a Dispute proceeding in a court of law, exclusive jurisdiction for any such court proceeding will be the courts sitting in the county of New York, New York, U.S. For purposes of any such court proceeding, you consent to, and will not challenge, the New York, New York courts’ personal jurisdiction over you, and you further waive objection based upon improper venue or forum non conveniens and will not seek transfer to another district or jurisdiction.\n\n11.7. Notwithstanding the preceding paragraphs of this Section 11, if you acquired a Solution for other than personal or household use, the arbitration proceedings, including the payment of costs, will be administered in accordance with the AAA’s Commercial Arbitration Rules (the “Commercial Procedures”). The Commercial Procedures are appropriately applied to any Dispute between the parties, and you will not advocate otherwise in any proceeding. However, this Agreement governs to the extent it conflicts with the Commercial Procedures.\n\n12. GENERAL\n12.1. Notice. Vendor may at any time deliver any notice to you via electronic mail, pop-up window, dialog box or other means, even though in some cases you may not receive the notice unless and until you launch a Solution. Any such notice will be deemed delivered on the date Vendor first makes it available through a Solution, irrespective of when you actually receive it.\n\n12.2. Questions About This Agreement. If you have any questions regarding this Agreement or wish to request any information from Vendor, please write to Avast Software s.r.o., Pikrtova 1737/1a, Prague 4, Postal Code 140 00, Czech Republic, e-mail: support@avast.com, tel.: +420 274 005 777 or visit our support page at <a rel=\"nofollow\" href=\"https://outgoing.prod.mozaws.net/v1/8e6bfe232fd216a8ef7a4db57fb61afb9c3a3b3ee4d1d98dba8525ca49bdc10b/http%3A//www.avast.com/support\">www.avast.com/support</a>.\n\n12.3. Separate Agreements. If you acquired two or more Solutions, even in a single transaction, or you acquired subscriptions to any one Solution in multiple transactions, you may have accepted this End User License Agreement multiple times. Although the terms and conditions you accepted may be similar or identical, each time you accepted the terms and conditions of this End User License Agreement you entered into a different and separate agreement between you and the Vendor providing the applicable Solution.\n\n12.4. Entire Agreement. This Agreement constitutes the entire agreement between you and Vendor relating to your use of the Solutions and Documentation. This Agreement supersedes all prior or contemporaneous oral or written communications, proposals, statements, warranties and representations with respect to your installation and/or use of the Solutions or Documentation. Notwithstanding the foregoing, nothing in this Agreement will diminish any rights you may have under existing consumer protection legislation or other applicable laws in your jurisdiction that may not be waived by contract. This Agreement, the Applicable Conditions and the Documentation, to the greatest extent reasonably practicable, will be construed to be consistent with each other, but in the event of a conflict they will govern in the following order of precedence: (i) the Applicable Conditions; (ii) this Agreement; and (iii) the Documentation.\n\n12.5. Interpretation. The headings in this Agreement do not affect its interpretation. The use of any gender includes all genders. The singular includes the plural and vice-versa. Where a word or phrase is defined, its other grammatical forms have a corresponding meaning. The words “includes” and “including” will be construed as followed by the words “without limitation.” Any reference to “use” of any software, Solution or Update by you shall be deemed to include any installation of any such software, Solution or Update by you (unless the context otherwise requires). This Agreement was originally prepared in the English language. Although Vendor may provide one or more translated versions of this Agreement for your convenience, the English language version of this Agreement will be the governing version of this Agreement in the case of any conflict or discrepancy. In the event that an ambiguity or question of intent or interpretation arises, in any judicial proceeding or otherwise, the terms of this Agreement will be construed as having been drafted jointly by the parties, and no presumption or burden of proof will arise favoring or disfavoring any party by virtue of the authorship of any provisions of this Agreement.\n\n12.6. Severability. If any provision of this Agreement is held to be illegal, invalid or unenforceable under any applicable laws, it shall to that extent be deemed not to form part of this Agreement but the remainder of this Agreement will remain valid and enforceable to the greatest extent permitted by applicable law.\n\n12.7. Impossibility. Vendor will not be liable for any failure or delay in performance, due in whole or in part, to utility failures (including power), failure of the internet, failure of telecommunications or information technology services, failure of telecommunications or information technology equipment, strikes or other labor disturbances (including without limitation a strike or other labor disturbance arising in respect of any members of the Vendor Group or any Vendor Partners), acts of war or terror, denial of service attacks or other information technology attacks or breaches affecting any member of the Vendor Group or any Vendor Partner, floods, sabotage, fire, other natural disasters or Acts of God, or any other cause beyond any member of Vendor Group or Vendor Partner’s reasonable control.\n\n12.8. Waiver. The failure of either party to insist upon the strict performance of any of the terms, conditions and provisions of this Agreement shall not be construed as a waiver or relinquishment of future compliance with this Agreement, and the terms, conditions and provisions of this Agreement shall remain in full force and effect. No waiver of any term or condition of this Agreement on the part of either party shall be effective for any purpose whatsoever unless such waiver is in writing and signed by such party. The waiver by either party of a breach of any provision of this Agreement by the other party shall not be construed as a continuing waiver of such breach or as a waiver of other breaches of the same or of other provisions of this Agreement.\n\n12.9. Assignment. You may not assign your rights or obligations under this Agreement without the prior written consent of Vendor. Vendor may assign this Agreement at any time in its sole discretion without any prior written consent by you.\n\n12.10. No Third Party Beneficiaries. Nothing in this Agreement, express or implied, is intended to or will confer upon any person other than you, members of the Vendor Group and Vendor Partners, any right, benefit or remedy of any nature whatsoever under or by reason of this Agreement. No person other than you, Vendor and members of the Vendor Group may bring a cause of action pursuant to this Agreement. Vendor will be entitled (but not obligated) to enforce any rights, remedies, limitations and exclusions of liability, and legal defenses of any member of Vendor Group or Vendor Partner under this Agreement, including any rights and remedies for any loss, damage or claim suffered or incurred by any member of Vendor Group or Vendor Partner: (i) arising from or in connection with any failure by you to comply with any term or condition of this Agreement; or (ii) you are required to indemnify under this Agreement. No such loss, damage or claim will be deemed excluded as indirect, consequential or incidental loss or damage under Section 6.4.1 as a result of such loss, damage or claim having been suffered or incurred by another member of Vendor Group or Vendor Partner rather than by Vendor.\n\n12.11. Governing Law. The governing law of this Agreement will be the substantive law of the State of New York, U.S. This Agreement will not be governed by the United Nations Convention on Contracts for the International Sales of Goods, the application of which is expressly excluded.\n\n12.12. Internet connection. Certain Solutions may require an active and stable connection to the Internet in order to function. It is therefore your responsibility to ensure that you have at all times an active and stable Internet connection.\n\n12.13. Product names. Vendor from time to time may change the name of a Solution, or change the name or logo applied to the Solution to the name or logo of another member of the Vendor Group or a Vendor Partner. These changes do not alter your subscription for any Solution, the Subscription Term or this Agreement, and do not give you any right to terminate your subscription for a Solution, the Subscription Term or this Agreement.\n\n13. SPECIAL TERMS\nThe following special terms apply to certain Solutions. If these special terms conflict with the remainder of the Agreement, these special terms will govern and take precedence with respect to the applicable Solutions.\n\n13.1. Third Party Software, Services and Other Products. Some Solutions offer you the opportunity to acquire software, services and other products supplied by third parties. You acknowledge that the applicable third party is solely responsible for its offerings and Vendor makes no representations or warranties concerning those offerings and accepts no liability with respect to them, and if you acquire or use any of these third party offerings, the offerings and your use of them will be governed by any license agreements, terms of use, privacy policies and/or other terms and conditions required by the third party.\n\n13.2. Managed Service Provider Licenses. This Section 13.2 applies: (i) to the extent the Applicable Conditions authorize you to use CloudCare, Managed Workplace, Avast Business Services, CCleaner Business Edition, or other Solutions in providing MSP Services to third parties; and (ii) to all licenses to use CCleaner Cloud for Business.\n\n13.2.1. As used in this Section 13.2:\n\n(a) “Avast Business Service” means HD Services and/or NOC Services as the context requires.\n\n(b) “Customer” means a third party to whom you provide or wish to provide MSP Services.\n\n(c) “HD Services” means the helpdesk services Vendor or its third party supplier provides to you for the benefit of one or more Customers, in each case as described in the Documentation as Vendor may modify the same from time to time.\n\n(d) “MSP Services” means the managed service you provide your Customers using the Solutions (including, as applicable, any Avast Business Service).\n\n(e) “NOC Services” means remote Device monitoring and management services Vendor or its third party supplier provides to you for the benefit of one or more Customers, in each case as described in the Documentation as Vendor may modify the same from time to time.\n\n(f) “Service Agreement” means an agreement between you and a Customer that, among other things, clearly describes the services you have agreed to provide the Customer.\n\n13.2.2. Vendor, subject to the provisions of this Agreement, grants you a limited, non-exclusive, non-transferable license (with no rights to sublicense) during the Subscription Term to use the relevant Solutions (including as applicable Avast Business Services, CCleaner Business Edition or CCleaner Cloud for Business) to provide MSP Services to your Customers.\n\n13.2.3. Vendor, subject to the terms and conditions of this Agreement, will provide you with Solutions (including as applicable Avast Business Services, CCleaner Business Edition or CCleaner Cloud for Business) for the benefit of your Customers.\n\n13.2.4. You, subject to the terms and conditions of this Agreement, will:\n\n(a) Require that: (i) each Customer (including you, to the extent applicable) receiving a Solution execute or otherwise bind itself to the then-current version of this Agreement; and (ii) each Customer to whom you have agreed to provide Solutions execute or otherwise bind itself to a Service Agreement. Without limiting the foregoing, you may accept the Vendor’s End User License Agreement on the Customer’s behalf only to the extent the Customer has expressly authorized you to do so in the Service Agreement or otherwise. The Service Agreement will: (i) contain provisions at least as protective of Vendor Group’s interests as this Agreement; and (ii) expressly authorize you and Vendor Group to reproduce, transmit, store and process the Customer’s data and information in connection with the operation and performance of any Solution.\n\n(b) As between Vendor and you, be solely responsible for: (i) performing your obligations under the Service Agreement; (ii) ensuring that you and all Customers comply with all applicable laws concerning the monitoring of employees and other third parties and their respective Devices; (iii) performing the tasks and obligation assigned to you and Customers by the Agreement, Applicable Conditions and Documentation; and (iv) on the expiration or termination of the applicable Service Agreement, terminating provision of any Solution and removing or causing the Customer to remove or deactivate any Solution from any Devices on which it is used.\n\n13.3. Browser Cleanup. When you use Browser Clean Up add-on (“BCU”), you authorize BCU to change your existing browser setting to the new browser setting.\n\n13.4. WiFi Finder. WiFi Finder enables its users to assist other users to obtain internet access through sharing of data about WiFi networks. If you opt to share data about WiFi networks with other users, you are solely responsible for ensuring that you are not violating any third party rights relating to such WiFi networks or any data you share. Members of Vendor Group accept no responsibility or liability for your compliance with terms and conditions applicable to the use of any WiFi networks or any data you share.\n\n13.5. Avast Family Shield.\n\n13.5.1. Avast Family Shield is intended for personal, noncommercial use by parents to protect their children, by legal guardians to protect their wards, or by adults to protect other adults from whom they have received fully informed consent. You must not use Avast Family Shield other than as intended, and members of Vendor Group accept no responsibility or liability for any unauthorized or illegal use.\n\n13.5.2. By using Avast Family Shield, you represent and warrant that: (i) you are 18 years of age or older; and (ii) you have the authority to, and hereby consent to, the collection of data for any person that you include in your Avast Family Shield account, including any persons under 13 years old. You acknowledge that members of Vendor Group will collect, use and disclose geographic location and other information necessary to enable the operation and delivery of the Avast Family Shield features.\n\n13.5.3. You acknowledge that: (i) results you may obtain from Avast Family Shield, including data and messaging, may not be accurate, timely or reliable; (ii) some content you consider objectionable or want to be blocked may not always be blocked by Avast Family Shield; (iii) Avast Family Shield may sometimes block content that you may consider acceptable; and (iv) because third party content can change without notice, Vendor cannot guarantee that its categories of content and content filters will always stay current with changes in third party content. If you believe Avast Family Shield is misclassifying a site or service, please contact Vendor by e-mail at familyshieldhelp@avast.com.\n\n13.6. Mobile Apps. This Section 13.6 applies to any Solution intended for use on Mobile Devices.\n\n13.6.1. For any Solution downloaded from Google Play (<a rel=\"nofollow\" href=\"https://outgoing.prod.mozaws.net/v1/be423aa3b958325f5c4435ef9f7b98078b9315f7ef6c9dbe7eef2768413606e4/http%3A//play.google.com\">http://play.google.com</a>), the license granted by this Agreement is in lieu of any rights to use a Solution that would otherwise be granted by the default terms for applications downloaded from the Google Play Store.\n\n13.6.2. For any Solution downloaded from the Apple App Store, the following terms apply:\n\n(a) The licenses granted by this Agreement are limited to a non-transferable license to use the Solution on any iPhone, iPod Touch or other Apple-powered Device that you own or control and as permitted by the Usage Rules set forth in the Apple App Stores Terms of Service, available online at <a rel=\"nofollow\" href=\"https://outgoing.prod.mozaws.net/v1/a50a88735f6e48b83e0f35edc7a69a0cf2dfcc8be49bae119d5c9c827ca508a1/http%3A//www.apple.com/legal/internet-services/itunes/us/terms.html\">http://www.apple.com/legal/internet-services/itunes/us/terms.html</a> or through such sites and other means made available to you by Apple.\n\n(b) This Agreement is concluded solely between the parties, and not with Apple. Vendor, not Apple, is solely responsible for the Solution and the content of such Solution.\n\n(c) Apple has no obligation whatsoever to furnish any maintenance and support services with respect to the Solution.\n\n(d) If the Solution fails to conform to any applicable warranty, you may notify Apple, and Apple will refund the purchase price for the Solution to you. To the maximum extent permitted by applicable law, Apple will have no other warranty obligation whatsoever with respect to the Solution, and that, as between you, Vendor and Apple, any other claims, losses, liabilities, damages, costs or expenses attributable to any failure to conform to any warranty will be Vendor’s sole responsibility.\n\n(e) Vendor, not Apple, is responsible for addressing any claims by you or any third party relating to the Solution or your possession and/or use of that Solution, including: (i) product liability claims; (ii) any claim that the Solution fails to conform to any applicable legal or regulatory requirement; and (iii) claims arising under consumer protection or similar legislation.\n\n(f) In the event of any third party claim that the Solution or your possession and use of that Solution infringes that third party’s intellectual property rights, Vendor, not Apple, will be solely responsible for the investigation, defense, settlement and discharge of any such intellectual property infringement claim.\n\n(g) You must comply with any applicable third party terms when using the Solution. For example, for a VOIP Solution, you must not violate your wireless data service agreement when using the Solution.\n\n(h) Apple and Apple’s subsidiaries are third party beneficiaries of this Agreement and, on your acceptance of the terms and conditions of this Agreement, Apple will have the right (and will be deemed to have accepted the right) to enforce this Agreement against you as a third party beneficiary.\n\n13.6.3. For Solutions downloaded from the Amazon Appstore, Amazon may designate certain customer terms of use for the Amazon Appstore as “Default EULA Terms.” Those Default EULA Terms will apply to your use of Solutions you purchase through the Amazon Appstore. The Default EULA Terms will specify, among other things, that Vendor is the licensor of the Solution and Amazon is not a party to this Agreement. If there are any conflicts between the Default EULA Terms and this Agreement, then to the extent of such conflict the Default EULA Terms will govern and take precedence. Amazon does not have any responsibility or liability related to compliance or non-compliance by Vendor or you with the Default EULA Terms.\n\n13.7. Technician Edition. This Section 13.7 applies to the extent you have purchased the Technician Edition of a Solution. You may permit the number of technicians specified by the Applicable Conditions to use the Solution to perform optimization services and repairs to Devices owned by third parties. Each technician may install the Solution on only one third party Device at any given time, and must remove the Solution from the Device before returning control of the Device to the owner.\n\n13.8. Assurance Plan. This Section 13.8 applies to Assurance Plans.\n\n13.8.1. “Assurance Plan” means a service under which Vendor’s technician (an “Associate”), in exchange for a separate subscription fee, will assist you to remove viruses or other malware that infects your protected Device during the Subscription Term. Assurance Plans are sold together with certain Vendor antivirus Solutions or other security Solutions (each, a “Security Solution”), and supplement the protections offered by the Security Solution.\n\n13.8.2. If you request Vendor’s assistance under the Assurance Plan, and if you and your Device qualify for assistance under Section 13.8.3, Vendor will use commercially reasonable efforts to assist you to remove the viruses or other malware affecting your Device. You hereby acknowledge, accept and agree that Vendor’s efforts may not be enough to remove certain viruses or other malware from your Device, and that Vendor, in the course of providing service, may alter, delete or corrupt data on your Device, change Device settings, or otherwise interfere with the proper operation of your Device.\n\n13.8.3. The Assurance Plan covers: (i) only the Device for which you purchased the related Security Solution, and may not be transferred to another Device; and (ii) only viruses and other malware infecting the Device during the Subscription Term, after you downloaded and installed the Security Solution on the Device, and while the Security Solution was running with up-to-date malware definitions. Vendor may terminate the Assurance Plan without notice if it determines in its sole business judgment that you have requested or received service under the Assurance Plan for a Device not covered by the Assurance Plan, transferred or attempted to transfer the Assurance Plan to another person or entity, or otherwise breached the terms of the Assurance Plan.\n\n13.8.4. Vendor, in providing assistance under the Assurance Plan, may require remote access to your Device, and/or may require that you install Assistance Software, in which case you acknowledge and agree that that Section 13.10 applies. If you cannot or do not provide remote access to your Device and/or you cannot or do not download and install the Assistance Software on the Device or follow Vendor’s or Associate’s other instructions, or if Vendor determines your Device does not qualify for support under the Assurance Plan, Vendor will not provide service under the Assurance Plan. Vendor may (but is not required to) refer you to a service under which Vendor or its subcontractor, for a fee, will provide assistance.\n\n13.9. Premium Technical Support. This Section 13.9 applies to Avast Total Care, AVG Premium Tech Support and other technical support services (each, “Premium Technical Support”) that Vendor sells separately from its software Solutions, and through which Vendor may help you install, configure or troubleshoot any of a variety of software products and/or equipment or systems, including a PC, Mac, tablet, mobile phone or any other personal computing device, wireless router, cable modem or other router, printer, digital camera, media player, Smart TV and DVD/Blu-Ray player.\n\n13.9.1. The Associate, in providing Premium Technical Support, will use commercially reasonable efforts to assist you with the problems you are experiencing but, due to the variety and the complexity of technologies available on the market, the Associate may not be able to resolve your issues. This may include, for example, problems that arise as a result of software or hardware errors not yet resolved by the manufacturer, or problems related to the equipment configuration that makes it impossible or unreasonably difficult for the Associate to properly diagnose and solve the issue. As a result, you hereby acknowledge and agree that Vendor’s efforts may not be enough to solve the issues you identify, or that those issues will not be solved in a timely manner.\n\n13.9.2. The Associate, in providing Premium Technical Support, may require remote access to your Device, and/or may require that you install Assistance Software, in which case you acknowledge and agree that that Section 13.10 applies. If you cannot or do not provide remote access to your Device and/or you cannot or do not download and install the Assistance Software on the Device or follow Vendor’s or Associate’s other instructions, or if Vendor determines your Device does not qualify for support under the Premium Technical Support subscription, Vendor will not provide Premium Technical Support.\n\n13.10. Remote Access; Assistance Software\n\n13.10.1. Remote Access. Vendor or an Associate, when providing services under the Assurance Plan, as part of Premium Technical Support or in connection with other services, may need to remotely connect to, and take control of, your equipment in order to resolve the issues that you are experiencing. In connection with this remote connection session:\n\n(a) The Associate may need to run various scripts on your equipment, make changes to its configuration, install and uninstall software, and make other changes to the equipment and/or software settings of such equipment as may be necessary to address your issues. You understand that the Associate may, but is not obligated to, install and remove various proprietary or third party software tools where the Associate deems it necessary to assist you with the issues that you are experiencing. Elements of such software are protected by law, including copyright.\n\n(b) You acknowledge and agree that, by authorizing the Associate to establish a remote connection session, you grant Vendor (and partners and contractors acting on Vendor’s behalf) full or limited access to your equipment, software and network (depending on your equipment, software and network configuration), and authorize Vendor to make such modifications as described above or as otherwise advised by the Associate during delivery of the Solution. You acknowledge and agree that the Associate, or you acting on the Associate’s direction may alter, delete or corrupt software or data on your equipment, change equipment, software or network settings, or otherwise interfere with the proper operation of your equipment, software or network.\n\n(c) You acknowledge and agree that the Associate may have access to any information stored on your Device. Associates are trained not to access more information than necessary to resolve the issues for which you are requesting the Associate’s support. You must nevertheless remain in front of your Device screen to observe the actions of the Associate while he or she delivers the Solution on your Device. You will have the opportunity to end the live support session at any time by advising the Associate or disconnecting the remote connection session.\n\n13.10.2. Assistance Software.\n\n(a) Vendor or an Associate, as a condition to providing services under the Assurance Plan, Premium Technical Support or other services, may instruct you to download and install on the Device a software program (the “Assistance Software”) allowing the Associate to gain remote access to your Device, gather information about the Device and its operations, diagnose and repair the problem, and change Device settings. You may also need to follow other instructions given by the Vendor or an Associate.\n\n(b) If you or an Associate install Assistance Software on a Device, that Assistance Software:\n\n(i) May require that you activate it on your Device. If you do not complete the activation process within the period of time requested by the Associate or as prompted by the Assistance Software, the Assistance Software may cease to function until the activation is complete.\n\n(ii) May communicate with Vendor’s (or its partner’s or contractor’s) servers on a regular basis to: (i) ensure that you receive all the services and software you are eligible to as part of your Solution; (ii) enable you to promptly launch a chat session with an Associate as part of your Solution; or (iii) give you access to certain self-service tools as part of your Solution.\n\n(iii) May by default constantly run on your Device and perform various background tasks that help maintain your Device in working condition. When running, it may collect various data regarding your Device, including its technical specifications, information regarding its operating system, downloaded and/or installed software, updates and upgrades, the availability and the status of your security software, backups and firewalls, various unique identifiers, system and software error messages, network connections status, connected peripherals and other connected devices, and similar such information and data. This information helps Vendor to prevent many common issues that you may be experiencing, and also to quickly identify problems for which you may be requesting Vendor’s support.\n\n13.11. Avast Driver Updater\n\n13.11.1. Avast Driver Updater is intended for use on a Device that is a single physical computer, and not a “virtual machine” in which a shared computing resource emulates the functions of several dedicated physical computers. Avast Driver Updater will not be as effective when used on a virtual machine rather than a physical computer.\n\n13.11.2. Avast Driver Updater relies on manufacturer-provided data in device driver installation files, including release dates, to provide information displayed by the Solution in scan results. MEMBERS OF THE VENDOR GROUP AND VENDOR PARTNERS DO NOT WARRANT OR REPRESENT THAT ANY DEVICE DRIVER PROVIDED BY THE SOLUTION WILL BE THE LATEST, OR ANY PARTICULAR VERSION, OF SUCH DEVICE DRIVER NOTWITHSTANDING ANY DIFFERENT OR CONTRARY INFORMATION PROVIDED BY THE SOLUTION.\n\n13.12. CloudCare SWG and CloudCare UTM\n\n13.12.1. As used in this Section 13.12:\n\n(a) “Aggregated Data” means data: (i) anonymized, and not identifiable to any individual person or entity; (ii) combined with the data of other users of CloudCare SWG or CloudCare UTM, and/or additional data sources; and (iii) presented in a manner by which individual users of CloudCare SWG or CloudCare UTM may not be identified.\n\n(b) “DNS Transaction” means a recursive DNS query you send through your use of CloudCare SWG.\n\n(c) “Seat” means a subscription for an individual that accesses the Internet in connection with CloudCare SWG or CloudCare UTM, as further described by Section 13.12.5. A Seat may only be transferred from one such individual to another such individual if the original individual is no longer permitted to access, and does not access, the Internet in connection with CloudCare SWG or CloudCare UTM.\n\n(d) “Transaction” means an HTTP or HTTPS request sent to, or by, you through your use of CloudCare UTM.\n\n13.12.2. You must not, from any Device protected by CloudCare SWG or CloudCare UTM: (i) send spam or otherwise duplicative or unsolicited messages in violation of any applicable laws; (ii) send infringing, obscene, threatening, libelous, or illegal material; (iii) access blocked services in violation of any applicable laws; or (iv) run automated queries to Internet URLs.\n\n13.12.3. You acknowledge and agree that: (i) in order for Vendor to provide CloudCare SWG or CloudCare UTM, you must forward your Internet traffic to Vendor via valid forwarding mechanisms that allow for automatic fail-over (i.e. DNS, PAC, IPSEC, GRE tunnels or an appropriate Vendor Solution); (ii) you are responsible for supplying Vendor with any technical data and other information Vendor may reasonably request from time to time; (iii) Vendor Group and Vendor Partners may use the malware, spam, botnets, or other information derived from your use of CloudCare SWG or CloudCare UTM for the purposes of: (1) maintaining, improving and/or analyzing CloudCare SWG or CloudCare UTM; (2) complying with any legal or contractual requirements; or (3) making malicious or unwanted content anonymously available to Vendor Partners for the purpose of further developing and enhancing CloudCare SWG or CloudCare UTM; and (iv) Vendor Group and Vendor Partners may develop and commercialize benchmarks and measures based on Aggregated Data.\n\n13.12.4. Vendor Group and Vendor Partners reserve the right to manage bandwidth or route traffic across the Internet in a commercially optimal way, provided such actions do not compromise Vendor’s obligations with respect to CloudCare SWG or CloudCare UTM. Vendor or a Vendor Partner (as applicable) may suspend your access to, or download of, CloudCare SWG or CloudCare UTM in the event your use of these Solutions represents an imminent threat to any network of Vendor Group or a Vendor Partner, or if required to comply with applicable laws. In such circumstances, Vendor or Vendor Partner (as applicable) will: (i) suspend CloudCare SWG or CloudCare UTM only to the extent reasonably necessary to prevent any harm to any network of Vendor Group or Vendor Partners (for example, blocking offending "},"url":"https://addons.mozilla.org/en-US/firefox/addon/avast-online-security/license/18.3.24"},"release_notes":null,"reviewed":"2018-05-18T09:45:09Z","url":"https://addons.mozilla.org/en-US/firefox/addon/avast-online-security/versions/18.3.24","version":"18.3.24"} \ No newline at end of file
diff --git a/addons.mozilla.org-fsd/get-data/build/json/current_versions/9609.json b/addons.mozilla.org-fsd/get-data/build/json/current_versions/9609.json
new file mode 100644
index 0000000..f6c393c
--- /dev/null
+++ b/addons.mozilla.org-fsd/get-data/build/json/current_versions/9609.json
@@ -0,0 +1 @@
+{"id":2422447,"channel":"listed","compatibility":{"android":{"max":"*","min":"52.0"},"firefox":{"max":"*","min":"52.0"}},"edit_url":"https://addons.mozilla.org/en-US/developers/addon/adblock-for-firefox/versions/2422447","files":[{"id":965135,"created":"2018-05-22T20:30:08Z","hash":"sha256:1aaab0aab832cd1af465c48b2662c1decba290052521350beb81fce1809b9aaf","is_restart_required":false,"is_webextension":true,"is_mozilla_signed_extension":false,"platform":"all","size":1654708,"status":"public","url":"https://addons.mozilla.org/firefox/downloads/file/965135/adblock_for_firefox-3.14.0-an+fx.xpi?src=","permissions":["http://*/*","https://*/*","contextMenus","tabs","idle","webRequest","webRequestBlocking","webNavigation","storage","notifications","*://*.mail.live.com/*","*://*.mastertoons.com/*","*://*.getadblock.com/*","*://*.mobilmania.cz/*","*://*.zive.cz/*","*://*.doupe.cz/*","*://*.e15.cz/*","*://*.sportrevue.cz/*","*://*.autorevue.cz/*","*://*.pornhub.com/*","*://*.facebook.com/*"]}],"is_strict_compatibility_enabled":false,"license":{"id":6,"name":{"el":"GNU General Public License, έκδοση 3.0","vi":"Giấy phép Công cộng GNU, phiên bản 3.0","ca":"Llicència GPL (General Public License) de GNU, version 3.0","it":"Licenza GNU General Public License, versione 3.0","cs":"GNU General Public License, verze 3.0","eu":"GNU General Public License, 3.0 bertsioa","id":"GNU General Public License, versi 3.0","es":"Licencia pública GNU, versión 3.0","ru":"GNU General Public License, версия 3.0","nl":"GNU General Public License, versie 3.0","pl":"General Public Licence, wersja 3.0","de":"GNU General Public License, Version 3.0","en-US":"GNU General Public License, version 3.0","fa":"مجوز عمومی کلی گنو، نسخهٔ ۳٫۰","ja":"GNU General Public License バージョン 3.0","pt-PT":"GNU General Public License, versão 3.0","zh-TW":"GNU General Public License,版本 3.0","sq":"Leje e Përgjithshme Publike GNU, version 3.0","ga-IE":"GNU General Public License, leagan 3.0","sk":"GNU General Public License, verzia 3.0","zh-CN":"GNU 通用公共授权,版本 3.0","uk":"GNU General Public License, версія 3.0"},"text":{"en-US":"GNU GENERAL PUBLIC LICENSE\n Version 3, 29 June 2007\n\n Copyright (C) 2007 Free Software Foundation, Inc. &lt;http: fsf.org=\"\"&gt;\n Everyone is permitted to copy and distribute verbatim copies\n of this license document, but changing it is not allowed.\n\n Preamble\n\n The GNU General Public License is a free, copyleft license for\nsoftware and other kinds of works.\n\n The licenses for most software and other practical works are designed\nto take away your freedom to share and change the works. By contrast,\nthe GNU General Public License is intended to guarantee your freedom to\nshare and change all versions of a program--to make sure it remains free\nsoftware for all its users. We, the Free Software Foundation, use the\nGNU General Public License for most of our software; it applies also to\nany other work released this way by its authors. You can apply it to\nyour programs, too.\n\n When we speak of free software, we are referring to freedom, not\nprice. Our General Public Licenses are designed to make sure that you\nhave the freedom to distribute copies of free software (and charge for\nthem if you wish), that you receive source code or can get it if you\nwant it, that you can change the software or use pieces of it in new\nfree programs, and that you know you can do these things.\n\n To protect your rights, we need to prevent others from denying you\nthese rights or asking you to surrender the rights. Therefore, you have\ncertain responsibilities if you distribute copies of the software, or if\nyou modify it: responsibilities to respect the freedom of others.\n\n For example, if you distribute copies of such a program, whether\ngratis or for a fee, you must pass on to the recipients the same\nfreedoms that you received. You must make sure that they, too, receive\nor can get the source code. And you must show them these terms so they\nknow their rights.\n\n Developers that use the GNU GPL protect your rights with two steps:\n(1) assert copyright on the software, and (2) offer you this License\ngiving you legal permission to copy, distribute and/or modify it.\n\n For the developers' and authors' protection, the GPL clearly explains\nthat there is no warranty for this free software. For both users' and\nauthors' sake, the GPL requires that modified versions be marked as\nchanged, so that their problems will not be attributed erroneously to\nauthors of previous versions.\n\n Some devices are designed to deny users access to install or run\nmodified versions of the software inside them, although the manufacturer\ncan do so. This is fundamentally incompatible with the aim of\nprotecting users' freedom to change the software. The systematic\npattern of such abuse occurs in the area of products for individuals to\nuse, which is precisely where it is most unacceptable. Therefore, we\nhave designed this version of the GPL to prohibit the practice for those\nproducts. If such problems arise substantially in other domains, we\nstand ready to extend this provision to those domains in future versions\nof the GPL, as needed to protect the freedom of users.\n\n Finally, every program is threatened constantly by software patents.\nStates should not allow patents to restrict development and use of\nsoftware on general-purpose computers, but in those that do, we wish to\navoid the special danger that patents applied to a free program could\nmake it effectively proprietary. To prevent this, the GPL assures that\npatents cannot be used to render the program non-free.\n\n The precise terms and conditions for copying, distribution and\nmodification follow.\n\n TERMS AND CONDITIONS\n\n 0. Definitions.\n\n \"This License\" refers to version 3 of the GNU General Public License.\n\n \"Copyright\" also means copyright-like laws that apply to other kinds of\nworks, such as semiconductor masks.\n\n \"The Program\" refers to any copyrightable work licensed under this\nLicense. Each licensee is addressed as \"you\". \"Licensees\" and\n\"recipients\" may be individuals or organizations.\n\n To \"modify\" a work means to copy from or adapt all or part of the work\nin a fashion requiring copyright permission, other than the making of an\nexact copy. The resulting work is called a \"modified version\" of the\nearlier work or a work \"based on\" the earlier work.\n\n A \"covered work\" means either the unmodified Program or a work based\non the Program.\n\n To \"propagate\" a work means to do anything with it that, without\npermission, would make you directly or secondarily liable for\ninfringement under applicable copyright law, except executing it on a\ncomputer or modifying a private copy. Propagation includes copying,\ndistribution (with or without modification), making available to the\npublic, and in some countries other activities as well.\n\n To \"convey\" a work means any kind of propagation that enables other\nparties to make or receive copies. Mere interaction with a user through\na computer network, with no transfer of a copy, is not conveying.\n\n An interactive user interface displays \"Appropriate Legal Notices\"\nto the extent that it includes a convenient and prominently visible\nfeature that (1) displays an appropriate copyright notice, and (2)\ntells the user that there is no warranty for the work (except to the\nextent that warranties are provided), that licensees may convey the\nwork under this License, and how to view a copy of this License. If\nthe interface presents a list of user commands or options, such as a\nmenu, a prominent item in the list meets this criterion.\n\n 1. Source Code.\n\n The \"source code\" for a work means the preferred form of the work\nfor making modifications to it. \"Object code\" means any non-source\nform of a work.\n\n A \"Standard Interface\" means an interface that either is an official\nstandard defined by a recognized standards body, or, in the case of\ninterfaces specified for a particular programming language, one that\nis widely used among developers working in that language.\n\n The \"System Libraries\" of an executable work include anything, other\nthan the work as a whole, that (a) is included in the normal form of\npackaging a Major Component, but which is not part of that Major\nComponent, and (b) serves only to enable use of the work with that\nMajor Component, or to implement a Standard Interface for which an\nimplementation is available to the public in source code form. A\n\"Major Component\", in this context, means a major essential component\n(kernel, window system, and so on) of the specific operating system\n(if any) on which the executable work runs, or a compiler used to\nproduce the work, or an object code interpreter used to run it.\n\n The \"Corresponding Source\" for a work in object code form means all\nthe source code needed to generate, install, and (for an executable\nwork) run the object code and to modify the work, including scripts to\ncontrol those activities. However, it does not include the work's\nSystem Libraries, or general-purpose tools or generally available free\nprograms which are used unmodified in performing those activities but\nwhich are not part of the work. For example, Corresponding Source\nincludes interface definition files associated with source files for\nthe work, and the source code for shared libraries and dynamically\nlinked subprograms that the work is specifically designed to require,\nsuch as by intimate data communication or control flow between those\nsubprograms and other parts of the work.\n\n The Corresponding Source need not include anything that users\ncan regenerate automatically from other parts of the Corresponding\nSource.\n\n The Corresponding Source for a work in source code form is that\nsame work.\n\n 2. Basic Permissions.\n\n All rights granted under this License are granted for the term of\ncopyright on the Program, and are irrevocable provided the stated\nconditions are met. This License explicitly affirms your unlimited\npermission to run the unmodified Program. The output from running a\ncovered work is covered by this License only if the output, given its\ncontent, constitutes a covered work. This License acknowledges your\nrights of fair use or other equivalent, as provided by copyright law.\n\n You may make, run and propagate covered works that you do not\nconvey, without conditions so long as your license otherwise remains\nin force. You may convey covered works to others for the sole purpose\nof having them make modifications exclusively for you, or provide you\nwith facilities for running those works, provided that you comply with\nthe terms of this License in conveying all material for which you do\nnot control copyright. Those thus making or running the covered works\nfor you must do so exclusively on your behalf, under your direction\nand control, on terms that prohibit them from making any copies of\nyour copyrighted material outside their relationship with you.\n\n Conveying under any other circumstances is permitted solely under\nthe conditions stated below. Sublicensing is not allowed; section 10\nmakes it unnecessary.\n\n 3. Protecting Users' Legal Rights From Anti-Circumvention Law.\n\n No covered work shall be deemed part of an effective technological\nmeasure under any applicable law fulfilling obligations under article\n11 of the WIPO copyright treaty adopted on 20 December 1996, or\nsimilar laws prohibiting or restricting circumvention of such\nmeasures.\n\n When you convey a covered work, you waive any legal power to forbid\ncircumvention of technological measures to the extent such circumvention\nis effected by exercising rights under this License with respect to\nthe covered work, and you disclaim any intention to limit operation or\nmodification of the work as a means of enforcing, against the work's\nusers, your or third parties' legal rights to forbid circumvention of\ntechnological measures.\n\n 4. Conveying Verbatim Copies.\n\n You may convey verbatim copies of the Program's source code as you\nreceive it, in any medium, provided that you conspicuously and\nappropriately publish on each copy an appropriate copyright notice;\nkeep intact all notices stating that this License and any\nnon-permissive terms added in accord with section 7 apply to the code;\nkeep intact all notices of the absence of any warranty; and give all\nrecipients a copy of this License along with the Program.\n\n You may charge any price or no price for each copy that you convey,\nand you may offer support or warranty protection for a fee.\n\n 5. Conveying Modified Source Versions.\n\n You may convey a work based on the Program, or the modifications to\nproduce it from the Program, in the form of source code under the\nterms of section 4, provided that you also meet all of these conditions:\n\n a) The work must carry prominent notices stating that you modified\n it, and giving a relevant date.\n\n b) The work must carry prominent notices stating that it is\n released under this License and any conditions added under section\n 7. This requirement modifies the requirement in section 4 to\n \"keep intact all notices\".\n\n c) You must license the entire work, as a whole, under this\n License to anyone who comes into possession of a copy. This\n License will therefore apply, along with any applicable section 7\n additional terms, to the whole of the work, and all its parts,\n regardless of how they are packaged. This License gives no\n permission to license the work in any other way, but it does not\n invalidate such permission if you have separately received it.\n\n d) If the work has interactive user interfaces, each must display\n Appropriate Legal Notices; however, if the Program has interactive\n interfaces that do not display Appropriate Legal Notices, your\n work need not make them do so.\n\n A compilation of a covered work with other separate and independent\nworks, which are not by their nature extensions of the covered work,\nand which are not combined with it such as to form a larger program,\nin or on a volume of a storage or distribution medium, is called an\n\"aggregate\" if the compilation and its resulting copyright are not\nused to limit the access or legal rights of the compilation's users\nbeyond what the individual works permit. Inclusion of a covered work\nin an aggregate does not cause this License to apply to the other\nparts of the aggregate.\n\n 6. Conveying Non-Source Forms.\n\n You may convey a covered work in object code form under the terms\nof sections 4 and 5, provided that you also convey the\nmachine-readable Corresponding Source under the terms of this License,\nin one of these ways:\n\n a) Convey the object code in, or embodied in, a physical product\n (including a physical distribution medium), accompanied by the\n Corresponding Source fixed on a durable physical medium\n customarily used for software interchange.\n\n b) Convey the object code in, or embodied in, a physical product\n (including a physical distribution medium), accompanied by a\n written offer, valid for at least three years and valid for as\n long as you offer spare parts or customer support for that product\n model, to give anyone who possesses the object code either (1) a\n copy of the Corresponding Source for all the software in the\n product that is covered by this License, on a durable physical\n medium customarily used for software interchange, for a price no\n more than your reasonable cost of physically performing this\n conveying of source, or (2) access to copy the\n Corresponding Source from a network server at no charge.\n\n c) Convey individual copies of the object code with a copy of the\n written offer to provide the Corresponding Source. This\n alternative is allowed only occasionally and noncommercially, and\n only if you received the object code with such an offer, in accord\n with subsection 6b.\n\n d) Convey the object code by offering access from a designated\n place (gratis or for a charge), and offer equivalent access to the\n Corresponding Source in the same way through the same place at no\n further charge. You need not require recipients to copy the\n Corresponding Source along with the object code. If the place to\n copy the object code is a network server, the Corresponding Source\n may be on a different server (operated by you or a third party)\n that supports equivalent copying facilities, provided you maintain\n clear directions next to the object code saying where to find the\n Corresponding Source. Regardless of what server hosts the\n Corresponding Source, you remain obligated to ensure that it is\n available for as long as needed to satisfy these requirements.\n\n e) Convey the object code using peer-to-peer transmission, provided\n you inform other peers where the object code and Corresponding\n Source of the work are being offered to the general public at no\n charge under subsection 6d.\n\n A separable portion of the object code, whose source code is excluded\nfrom the Corresponding Source as a System Library, need not be\nincluded in conveying the object code work.\n\n A \"User Product\" is either (1) a \"consumer product\", which means any\ntangible personal property which is normally used for personal, family,\nor household purposes, or (2) anything designed or sold for incorporation\ninto a dwelling. In determining whether a product is a consumer product,\ndoubtful cases shall be resolved in favor of coverage. For a particular\nproduct received by a particular user, \"normally used\" refers to a\ntypical or common use of that class of product, regardless of the status\nof the particular user or of the way in which the particular user\nactually uses, or expects or is expected to use, the product. A product\nis a consumer product regardless of whether the product has substantial\ncommercial, industrial or non-consumer uses, unless such uses represent\nthe only significant mode of use of the product.\n\n \"Installation Information\" for a User Product means any methods,\nprocedures, authorization keys, or other information required to install\nand execute modified versions of a covered work in that User Product from\na modified version of its Corresponding Source. The information must\nsuffice to ensure that the continued functioning of the modified object\ncode is in no case prevented or interfered with solely because\nmodification has been made.\n\n If you convey an object code work under this section in, or with, or\nspecifically for use in, a User Product, and the conveying occurs as\npart of a transaction in which the right of possession and use of the\nUser Product is transferred to the recipient in perpetuity or for a\nfixed term (regardless of how the transaction is characterized), the\nCorresponding Source conveyed under this section must be accompanied\nby the Installation Information. But this requirement does not apply\nif neither you nor any third party retains the ability to install\nmodified object code on the User Product (for example, the work has\nbeen installed in ROM).\n\n The requirement to provide Installation Information does not include a\nrequirement to continue to provide support service, warranty, or updates\nfor a work that has been modified or installed by the recipient, or for\nthe User Product in which it has been modified or installed. Access to a\nnetwork may be denied when the modification itself materially and\nadversely affects the operation of the network or violates the rules and\nprotocols for communication across the network.\n\n Corresponding Source conveyed, and Installation Information provided,\nin accord with this section must be in a format that is publicly\ndocumented (and with an implementation available to the public in\nsource code form), and must require no special password or key for\nunpacking, reading or copying.\n\n 7. Additional Terms.\n\n \"Additional permissions\" are terms that supplement the terms of this\nLicense by making exceptions from one or more of its conditions.\nAdditional permissions that are applicable to the entire Program shall\nbe treated as though they were included in this License, to the extent\nthat they are valid under applicable law. If additional permissions\napply only to part of the Program, that part may be used separately\nunder those permissions, but the entire Program remains governed by\nthis License without regard to the additional permissions.\n\n When you convey a copy of a covered work, you may at your option\nremove any additional permissions from that copy, or from any part of\nit. (Additional permissions may be written to require their own\nremoval in certain cases when you modify the work.) You may place\nadditional permissions on material, added by you to a covered work,\nfor which you have or can give appropriate copyright permission.\n\n Notwithstanding any other provision of this License, for material you\nadd to a covered work, you may (if authorized by the copyright holders of\nthat material) supplement the terms of this License with terms:\n\n a) Disclaiming warranty or limiting liability differently from the\n terms of sections 15 and 16 of this License; or\n\n b) Requiring preservation of specified reasonable legal notices or\n author attributions in that material or in the Appropriate Legal\n Notices displayed by works containing it; or\n\n c) Prohibiting misrepresentation of the origin of that material, or\n requiring that modified versions of such material be marked in\n reasonable ways as different from the original version; or\n\n d) Limiting the use for publicity purposes of names of licensors or\n authors of the material; or\n\n e) Declining to grant rights under trademark law for use of some\n trade names, trademarks, or service marks; or\n\n f) Requiring indemnification of licensors and authors of that\n material by anyone who conveys the material (or modified versions of\n it) with contractual assumptions of liability to the recipient, for\n any liability that these contractual assumptions directly impose on\n those licensors and authors.\n\n All other non-permissive additional terms are considered \"further\nrestrictions\" within the meaning of section 10. If the Program as you\nreceived it, or any part of it, contains a notice stating that it is\ngoverned by this License along with a term that is a further\nrestriction, you may remove that term. If a license document contains\na further restriction but permits relicensing or conveying under this\nLicense, you may add to a covered work material governed by the terms\nof that license document, provided that the further restriction does\nnot survive such relicensing or conveying.\n\n If you add terms to a covered work in accord with this section, you\nmust place, in the relevant source files, a statement of the\nadditional terms that apply to those files, or a notice indicating\nwhere to find the applicable terms.\n\n Additional terms, permissive or non-permissive, may be stated in the\nform of a separately written license, or stated as exceptions;\nthe above requirements apply either way.\n\n 8. Termination.\n\n You may not propagate or modify a covered work except as expressly\nprovided under this License. Any attempt otherwise to propagate or\nmodify it is void, and will automatically terminate your rights under\nthis License (including any patent licenses granted under the third\nparagraph of section 11).\n\n However, if you cease all violation of this License, then your\nlicense from a particular copyright holder is reinstated (a)\nprovisionally, unless and until the copyright holder explicitly and\nfinally terminates your license, and (b) permanently, if the copyright\nholder fails to notify you of the violation by some reasonable means\nprior to 60 days after the cessation.\n\n Moreover, your license from a particular copyright holder is\nreinstated permanently if the copyright holder notifies you of the\nviolation by some reasonable means, this is the first time you have\nreceived notice of violation of this License (for any work) from that\ncopyright holder, and you cure the violation prior to 30 days after\nyour receipt of the notice.\n\n Termination of your rights under this section does not terminate the\nlicenses of parties who have received copies or rights from you under\nthis License. If your rights have been terminated and not permanently\nreinstated, you do not qualify to receive new licenses for the same\nmaterial under section 10.\n\n 9. Acceptance Not Required for Having Copies.\n\n You are not required to accept this License in order to receive or\nrun a copy of the Program. Ancillary propagation of a covered work\noccurring solely as a consequence of using peer-to-peer transmission\nto receive a copy likewise does not require acceptance. However,\nnothing other than this License grants you permission to propagate or\nmodify any covered work. These actions infringe copyright if you do\nnot accept this License. Therefore, by modifying or propagating a\ncovered work, you indicate your acceptance of this License to do so.\n\n 10. Automatic Licensing of Downstream Recipients.\n\n Each time you convey a covered work, the recipient automatically\nreceives a license from the original licensors, to run, modify and\npropagate that work, subject to this License. You are not responsible\nfor enforcing compliance by third parties with this License.\n\n An \"entity transaction\" is a transaction transferring control of an\norganization, or substantially all assets of one, or subdividing an\norganization, or merging organizations. If propagation of a covered\nwork results from an entity transaction, each party to that\ntransaction who receives a copy of the work also receives whatever\nlicenses to the work the party's predecessor in interest had or could\ngive under the previous paragraph, plus a right to possession of the\nCorresponding Source of the work from the predecessor in interest, if\nthe predecessor has it or can get it with reasonable efforts.\n\n You may not impose any further restrictions on the exercise of the\nrights granted or affirmed under this License. For example, you may\nnot impose a license fee, royalty, or other charge for exercise of\nrights granted under this License, and you may not initiate litigation\n(including a cross-claim or counterclaim in a lawsuit) alleging that\nany patent claim is infringed by making, using, selling, offering for\nsale, or importing the Program or any portion of it.\n\n 11. Patents.\n\n A \"contributor\" is a copyright holder who authorizes use under this\nLicense of the Program or a work on which the Program is based. The\nwork thus licensed is called the contributor's \"contributor version\".\n\n A contributor's \"essential patent claims\" are all patent claims\nowned or controlled by the contributor, whether already acquired or\nhereafter acquired, that would be infringed by some manner, permitted\nby this License, of making, using, or selling its contributor version,\nbut do not include claims that would be infringed only as a\nconsequence of further modification of the contributor version. For\npurposes of this definition, \"control\" includes the right to grant\npatent sublicenses in a manner consistent with the requirements of\nthis License.\n\n Each contributor grants you a non-exclusive, worldwide, royalty-free\npatent license under the contributor's essential patent claims, to\nmake, use, sell, offer for sale, import and otherwise run, modify and\npropagate the contents of its contributor version.\n\n In the following three paragraphs, a \"patent license\" is any express\nagreement or commitment, however denominated, not to enforce a patent\n(such as an express permission to practice a patent or covenant not to\nsue for patent infringement). To \"grant\" such a patent license to a\nparty means to make such an agreement or commitment not to enforce a\npatent against the party.\n\n If you convey a covered work, knowingly relying on a patent license,\nand the Corresponding Source of the work is not available for anyone\nto copy, free of charge and under the terms of this License, through a\npublicly available network server or other readily accessible means,\nthen you must either (1) cause the Corresponding Source to be so\navailable, or (2) arrange to deprive yourself of the benefit of the\npatent license for this particular work, or (3) arrange, in a manner\nconsistent with the requirements of this License, to extend the patent\nlicense to downstream recipients. \"Knowingly relying\" means you have\nactual knowledge that, but for the patent license, your conveying the\ncovered work in a country, or your recipient's use of the covered work\nin a country, would infringe one or more identifiable patents in that\ncountry that you have reason to believe are valid.\n\n If, pursuant to or in connection with a single transaction or\narrangement, you convey, or propagate by procuring conveyance of, a\ncovered work, and grant a patent license to some of the parties\nreceiving the covered work authorizing them to use, propagate, modify\nor convey a specific copy of the covered work, then the patent license\nyou grant is automatically extended to all recipients of the covered\nwork and works based on it.\n\n A patent license is \"discriminatory\" if it does not include within\nthe scope of its coverage, prohibits the exercise of, or is\nconditioned on the non-exercise of one or more of the rights that are\nspecifically granted under this License. You may not convey a covered\nwork if you are a party to an arrangement with a third party that is\nin the business of distributing software, under which you make payment\nto the third party based on the extent of your activity of conveying\nthe work, and under which the third party grants, to any of the\nparties who would receive the covered work from you, a discriminatory\npatent license (a) in connection with copies of the covered work\nconveyed by you (or copies made from those copies), or (b) primarily\nfor and in connection with specific products or compilations that\ncontain the covered work, unless you entered into that arrangement,\nor that patent license was granted, prior to 28 March 2007.\n\n Nothing in this License shall be construed as excluding or limiting\nany implied license or other defenses to infringement that may\notherwise be available to you under applicable patent law.\n\n 12. No Surrender of Others' Freedom.\n\n If conditions are imposed on you (whether by court order, agreement or\notherwise) that contradict the conditions of this License, they do not\nexcuse you from the conditions of this License. If you cannot convey a\ncovered work so as to satisfy simultaneously your obligations under this\nLicense and any other pertinent obligations, then as a consequence you may\nnot convey it at all. For example, if you agree to terms that obligate you\nto collect a royalty for further conveying from those to whom you convey\nthe Program, the only way you could satisfy both those terms and this\nLicense would be to refrain entirely from conveying the Program.\n\n 13. Use with the GNU Affero General Public License.\n\n Notwithstanding any other provision of this License, you have\npermission to link or combine any covered work with a work licensed\nunder version 3 of the GNU Affero General Public License into a single\ncombined work, and to convey the resulting work. The terms of this\nLicense will continue to apply to the part which is the covered work,\nbut the special requirements of the GNU Affero General Public License,\nsection 13, concerning interaction through a network will apply to the\ncombination as such.\n\n 14. Revised Versions of this License.\n\n The Free Software Foundation may publish revised and/or new versions of\nthe GNU General Public License from time to time. Such new versions will\nbe similar in spirit to the present version, but may differ in detail to\naddress new problems or concerns.\n\n Each version is given a distinguishing version number. If the\nProgram specifies that a certain numbered version of the GNU General\nPublic License \"or any later version\" applies to it, you have the\noption of following the terms and conditions either of that numbered\nversion or of any later version published by the Free Software\nFoundation. If the Program does not specify a version number of the\nGNU General Public License, you may choose any version ever published\nby the Free Software Foundation.\n\n If the Program specifies that a proxy can decide which future\nversions of the GNU General Public License can be used, that proxy's\npublic statement of acceptance of a version permanently authorizes you\nto choose that version for the Program.\n\n Later license versions may give you additional or different\npermissions. However, no additional obligations are imposed on any\nauthor or copyright holder as a result of your choosing to follow a\nlater version.\n\n 15. Disclaimer of Warranty.\n\n THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY\nAPPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT\nHOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM \"AS IS\" WITHOUT WARRANTY\nOF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,\nTHE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\nPURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM\nIS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF\nALL NECESSARY SERVICING, REPAIR OR CORRECTION.\n\n 16. Limitation of Liability.\n\n IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING\nWILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS\nTHE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY\nGENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE\nUSE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF\nDATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD\nPARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),\nEVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF\nSUCH DAMAGES.\n\n 17. Interpretation of Sections 15 and 16.\n\n If the disclaimer of warranty and limitation of liability provided\nabove cannot be given local legal effect according to their terms,\nreviewing courts shall apply local law that most closely approximates\nan absolute waiver of all civil liability in connection with the\nProgram, unless a warranty or assumption of liability accompanies a\ncopy of the Program in return for a fee.\n\n END OF TERMS AND CONDITIONS\n\n How to Apply These Terms to Your New Programs\n\n If you develop a new program, and you want it to be of the greatest\npossible use to the public, the best way to achieve this is to make it\nfree software which everyone can redistribute and change under these terms.\n\n To do so, attach the following notices to the program. It is safest\nto attach them to the start of each source file to most effectively\nstate the exclusion of warranty; and each file should have at least\nthe \"copyright\" line and a pointer to where the full notice is found.\n\n &lt;one a=\"\" and=\"\" brief=\"\" does.=\"\" give=\"\" idea=\"\" it=\"\" line=\"\" name=\"\" of=\"\" program's=\"\" the=\"\" to=\"\" what=\"\"&gt;\n Copyright (C) &lt;year&gt; &lt;name author=\"\" of=\"\"&gt;\n\n This program is free software: you can redistribute it and/or modify\n it under the terms of the GNU General Public License as published by\n the Free Software Foundation, either version 3 of the License, or\n (at your option) any later version.\n\n This program is distributed in the hope that it will be useful,\n but WITHOUT ANY WARRANTY; without even the implied warranty of\n MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n GNU General Public License for more details.\n\n You should have received a copy of the GNU General Public License\n along with this program. If not, see &lt;http: licenses=\"\" www.gnu.org=\"\"&gt;.\n\nAlso add information on how to contact you by electronic and paper mail.\n\n If the program does terminal interaction, make it output a short\nnotice like this when it starts in an interactive mode:\n\n &lt;program&gt; Copyright (C) &lt;year&gt; &lt;name author=\"\" of=\"\"&gt;\n This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.\n This is free software, and you are welcome to redistribute it\n under certain conditions; type `show c' for details.\n\nThe hypothetical commands `show w' and `show c' should show the appropriate\nparts of the General Public License. Of course, your program's commands\nmight be different; for a GUI interface, you would use an \"about box\".\n\n You should also get your employer (if you work as a programmer) or school,\nif any, to sign a \"copyright disclaimer\" for the program, if necessary.\nFor more information on this, and how to apply and follow the GNU GPL, see\n&lt;http: licenses=\"\" www.gnu.org=\"\"&gt;.\n\n The GNU General Public License does not permit incorporating your program\ninto proprietary programs. If your program is a subroutine library, you\nmay consider it more useful to permit linking proprietary applications with\nthe library. If this is what you want to do, use the GNU Lesser General\nPublic License instead of this License. But first, please read\n&lt;http: philosophy=\"\" why-not-lgpl.html=\"\" www.gnu.org=\"\"&gt;.\n&lt;/http:&gt;&lt;/http:&gt;&lt;/name&gt;&lt;/year&gt;&lt;/program&gt;&lt;/http:&gt;&lt;/name&gt;&lt;/year&gt;&lt;/one&gt;&lt;/http:&gt;"},"url":"http://www.gnu.org/licenses/gpl-3.0.html"},"release_notes":{"en-US":"- Updated translations.\n- Show the /update page to let users know what features and fixes have been updated in the last few months."},"reviewed":null,"url":"https://addons.mozilla.org/en-US/firefox/addon/adblock-for-firefox/versions/3.14.0","version":"3.14.0"} \ No newline at end of file