While Malwarebytes observed a relative plateau in the overall volume of threat detections in 2019, our telemetry showed a clear trend toward industrialization. From an increase in enterprise-focused threats to diversification of sophisticated hacking, evasion, and stealth techniques to aggressive adware aimed at Androids, the 2019 threat landscape was shaped by a cybercrime industry that was all grown up. No further review by the Office of General Counsel or Security and Compliance is required at this time.It was the last year of the 2010s, and cybercriminals let the world know they meant business.
Based on the results of the assessment, university personnel can accept the terms of the agreement by clicking the "I Agree" button during the software installation. “Software Licensing Management has reviewed this Clickwrap Agreement and has completed a risk assessment of the terms, use and security of the software. For example, most click-wraps provide for mandatory arbitration and indemnification, and subject us to the law of states other than North Carolina or, in some cases, the laws of other nations.” The major problem we see with these agreements is that they commonly contain provisions that are prohibited by North Carolina law or policy. Under University contracting policy, these agreements may only be entered into by someone who has authority to enter into a contract binding the University. Under recent court decisions it has become clear that click-wrap agreements are legal and binding contracts and therefore are subject to the University contracting policy. “These types of agreements require a user to click "I agree" or “I accept” before the software or hardware can be installed. UNCG’s Office of the General Counsel has done extensive reviews on ‘clickwrap’ software of which Malwarebytes meets this description.
For purposes of this Agreement, “Execute” and “Execution” means to load, install, and run the Software locally on a single Computer in order to benefit from its functionality as designed by Malwarebytes."
You may not run the Software on a network, but must install it only on the individual Computer(s) you are licensed for and run it locally on those Computers. You may not transfer the Software to a different user, except that once installed onto a Computer, the Software may be operated by any person directly using the Computer (i.e., not remotely), provided that that person resides in, or is a guest in, your household and that you are responsible for each such person’s operation of the Software.
If you are using a free version of the Software, then conditioned upon your compliance with the terms and conditions of this Agreement, Malwarebytes grants you a non-exclusive and non-transferable license to Execute (as defined herein) a single copy of the Software solely in executable form on a single computer or virtual machine (a “Computer”), solely for your personal, non-commercial purposes (i.e., not on Computers used in a business). It was determined that even though the university provides a free service to members of the UA community, the fact that we are an educational institution puts us under Malwarebytes’ corporate licensing requirements for which we would have to pay licensing fees. UA HISTORICAL OVERVIEW OF MALWAREBYTES USEįirst identified as a possible licensing issue by the 24/7 IT Support Center back in 2009 due to an uptick in tickets indicating an increase in use, a review of the acceptable use requirements (EULA) for Malwarebytes was conducted. Software licensing compliance issues warrant further review as to how the University of Arizona will move forward on whether to obtain licensing for campus. The Software Licensing Review Committee (SLRC) met on 13 February 2015 to further discuss the direction of pursuing Malwarebytes for campus.
Faculty, students, and staff who use their own personal computers can continue to download the free version but cannot do so on UA owned computers. The Software Licensing Review Committee decided that the Office of the CIO would purchase a limited number of licenses for the 24/7 IT Support Center staff, Office of Student Computing Resources (OSCR) Labs, and for Campus IT partners who need to troubleshoot malware issues.