UTS Vault Enterprise Logo UTS Vault Enterprise
  • Features
  • Security
  • Pricing
  • Support
  • Privacy
  • Terms
← Back to Home

Terms and Conditions

1. License Agreement

By using UTS Vault Enterprise ("the Software"), you agree to be bound by these Terms and Conditions. If you do not agree to these terms, please do not use the Software.

1.1 License Grant

Subject to your compliance with these Terms, we grant you a limited, non-exclusive, non-transferable license to use the Software for your personal or commercial use on devices you own or control.

1.2 License Restrictions

  • You may not copy, modify, distribute, sell, or lease any part of the Software.
  • You may not reverse engineer, decompile, or disassemble the Software.
  • You may not remove any proprietary notices or labels on the Software.
  • You may not use the Software for any illegal purpose.

2. Activation and License Terms

2.1 Trial Period

The Software is provided with a trial period. During the trial period, you may use the Software with limited features. The trial period expires after a specified number of days or operations, whichever comes first.

2.2 License Activation

To continue using the Software after the trial period, you must purchase and activate a valid license. License activation requires a valid activation key, which is verified online.

2.3 License Validity

  • Each license is valid for a single user on multiple devices owned by that user.
  • License activation is tied to your device. You may activate the license on multiple devices you own.
  • Licenses are non-transferable except as explicitly permitted by us.
  • Refunds are available within 30 days of purchase if you are not satisfied with the Software.

2.4 License Revocation

We reserve the right to revoke your license if you violate these Terms, use the Software illegally, or engage in fraudulent activity.

3. Software Features and Services

3.1 File Encryption and Timestamping

The Software provides local file encryption and optional cryptographic timestamping services. Files are encrypted locally on your device and are never uploaded to our servers.

3.2 Password Generator

The Password Generator creates cryptographically secure passwords. Generated passwords are never stored or transmitted. Only cryptographic hashes may be stored for proof-of-generation purposes.

3.3 Password Manager

The Password Manager uses zero-knowledge encryption. Your master password and plaintext credentials never leave your device. Encrypted vault data may be synchronized to cloud storage you configure.

3.4 Biometric Authentication

When available, the Software may use biometric authentication (e.g., Touch ID, Face ID) to unlock the application. Biometric data is stored locally on your device and is never transmitted to us.

3.5 Service Availability

We strive to provide reliable service but do not guarantee uninterrupted or error-free operation. Some features require internet connectivity for license verification and cloud synchronization.

4. User Responsibilities

4.1 Security

  • You are responsible for maintaining the security of your encryption keys and master passwords.
  • You are responsible for backing up your encrypted files and vault data.
  • You must use strong master passwords and keep them secure.
  • You must protect your activation keys and license information.

4.2 Data Loss

We are not responsible for any loss of data, files, or passwords. The Software operates on a zero-knowledge basis, meaning we cannot recover lost encryption keys, master passwords, or encrypted data.

4.3 Acceptable Use

You agree to use the Software only for lawful purposes and in accordance with these Terms. You may not use the Software to:

  • Violate any applicable laws or regulations
  • Infringe on the rights of others
  • Transmit malicious code or malware
  • Attempt to gain unauthorized access to systems or data

5. Intellectual Property

The Software, including its code, design, graphics, and documentation, is protected by copyright, trademark, and other intellectual property laws. All rights not expressly granted are reserved.

You retain ownership of your encrypted files, passwords, and data. We do not claim any rights to your data or content.

6. Privacy

Your privacy is important to us. Please review our Privacy Policy, which is incorporated into these Terms by reference, to understand how we collect, use, and protect your information.

Key privacy principles:

  • We do not collect or store your plaintext passwords, encryption keys, or file contents
  • We collect minimal data necessary for license verification and service operation
  • All encryption and cryptographic operations happen locally on your device
  • Only cryptographic hashes are transmitted to our servers for timestamping services

7. Disclaimers and Limitations of Liability

7.1 No Warranties

THE SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT.

7.2 Limitation of Liability

TO THE MAXIMUM EXTENT PERMITTED BY LAW, WE SHALL NOT BE LIABLE FOR ANY INDIRECT, INCIDENTAL, SPECIAL, CONSEQUENTIAL, OR PUNITIVE DAMAGES, INCLUDING BUT NOT LIMITED TO LOSS OF DATA, LOSS OF PROFITS, OR BUSINESS INTERRUPTION, ARISING OUT OF OR RELATING TO YOUR USE OF THE SOFTWARE.

7.3 Maximum Liability

OUR TOTAL LIABILITY SHALL NOT EXCEED THE AMOUNT YOU PAID FOR THE SOFTWARE LICENSE, IF ANY.

8. Indemnification

You agree to indemnify, defend, and hold harmless us and our officers, directors, employees, and agents from and against any claims, liabilities, damages, losses, costs, or expenses (including reasonable attorneys' fees) arising out of or relating to your use of the Software or violation of these Terms.

9. Termination

9.1 Termination by You

You may stop using the Software at any time. Uninstalling the Software will remove it from your device, but encrypted files and data stored on your device will remain.

9.2 Termination by Us

We may terminate or suspend your license and access to the Software at any time, with or without notice, for any reason, including if you violate these Terms.

9.3 Effect of Termination

Upon termination, your right to use the Software will immediately cease. Sections of these Terms that by their nature should survive termination shall survive, including but not limited to Sections 5 (Intellectual Property), 7 (Disclaimers), and 8 (Indemnification).

10. Changes to Terms

We reserve the right to modify these Terms at any time. We will notify you of material changes by posting the updated Terms in the Software or on our website. Your continued use of the Software after such modifications constitutes your acceptance of the updated Terms.

If you do not agree to the modified Terms, you must stop using the Software.

11. Governing Law and Dispute Resolution

These Terms shall be governed by and construed in accordance with the laws of [Jurisdiction], without regard to its conflict of law provisions.

Any disputes arising out of or relating to these Terms or the Software shall be resolved through binding arbitration in accordance with the rules of [Arbitration Organization], except where prohibited by law.

12. Contact Information

If you have any questions about these Terms, please contact us at:

  • Email: support@kaanuluer.com
  • Website: https://www.kaanuluer.com/uts

Last Updated:

By using UTS Vault Enterprise, you acknowledge that you have read, understood, and agree to be bound by these Terms and Conditions.

UTS Vault Enterprise UTS Vault Enterprise

Enterprise-grade password management and encryption software. Built with security-first principles.

Product

  • Features
  • Security
  • Pricing

Legal

  • Privacy Policy
  • Terms & Conditions

Support

  • Contact Us
  • Support

© 2025 UTS Enterprise. All rights reserved.