1. Definitions
"Agreement" means these Terms of Service and License Agreement.
"Company," "we," "us," or "our" means KyotoTech LLC (合同会社KyotoTech), a Japanese limited liability company registered in Kyoto, Japan.
"Customer," "you," or "your" means the individual or legal entity that purchases or uses the Software.
"Software" means the SaQura Cryptography Library, including all updates, modifications, and documentation.
"License Key" means the alphanumeric code provided to activate the Software (format: TIER-XXXX-XXXX-XXXX-XXXX).
"Hardware ID" means a cryptographic hash of hardware identifiers used for license binding.
"Standard License" means a license bound to specific hardware (development machines).
"Distribution License" means a license for embedding in distributed applications with unlimited end-user activations.
"Encryption Keys" means cryptographic keys generated by the Customer using the Software.
2. Acceptance of Terms
By downloading, installing, activating, or using the Software, you agree to be bound by this Agreement.
If you are entering into this Agreement on behalf of a company or other legal entity, you represent that you have the authority to bind such entity.
If you do not agree to these terms, do not download, install, or use the Software.
Age Requirement
You must be at least 18 years old, or the age of legal majority in your jurisdiction, to enter into this Agreement. If you are under 18, you may only use the Software with the involvement and consent of a parent or legal guardian.
3. License Grant
Grant of License
Subject to the terms of this Agreement and payment of applicable fees, we grant you a non-exclusive, non-transferable, revocable license to use the Software in accordance with your purchased license tier.
License Tiers & Features
| Feature |
Free |
Basic |
Standard |
Pro |
Enterprise |
| RSA Encryption | Limited* | Full | Full | Full | Full |
| Password Hashing | Limited* | Full | Full | Full | Full |
| Digital Signatures | Limited* | Full | Full | Full | Full |
| AES-256 Encryption | - | - | Full | Full | Full |
| Quantum-Safe Encryption | - | - | - | Full | Full |
| Output Watermark | Yes | No | No | No | No |
| Data Size Limit | 100 bytes | Unlimited | Unlimited | Unlimited | Unlimited |
| Machine Activations | N/A | 1 | 2 | 3 | Custom |
| Support Response | Community | 72 hours | 48 hours | 24 hours | 4 hours |
* Limited = 100 byte limit with watermark
Standard License
- Limited to the number of developer machines (build servers, development workstations) specified in your tier
- Hardware-bound activation required
- Not transferable between machines without deactivation
Distribution License
- Unlimited end-user activations for your distributed applications
- No hardware binding for end users
- Must be embedded in your compiled application
- Not for redistribution as a standalone library
- Offline signature validation (no server calls required)
View Pricing & Purchase →
4. Restrictions
You may NOT:
- Redistribute, sublicense, rent, lease, or lend the Software separately from your compiled application
- Reverse engineer, decompile, disassemble, or attempt to derive the source code of the Software, except to the extent permitted by applicable law
- Remove, alter, or obscure any copyright, trademark, or other proprietary notices
- Share License Keys with third parties or use License Keys obtained from unauthorized sources
- Use the Software to develop competing cryptography products
- Use the Software in any application that violates applicable laws, including but not limited to:
- Applications designed for illegal surveillance
- Malware, ransomware, or other malicious software
- Applications that facilitate terrorism or money laundering
- Circumvent or attempt to circumvent license validation mechanisms
- Use automated systems to generate multiple Hardware IDs for a single machine
5. Export Control Compliance
IMPORTANT: CRYPTOGRAPHIC SOFTWARE EXPORT REGULATIONS
The Software contains cryptographic technology that may be subject to export controls under the Wassenaar Arrangement and national implementations thereof.
Japan Export Controls
Export from Japan is subject to the Foreign Exchange and Foreign Trade Act (外国為替及び外国貿易法) and Export Trade Control Order. The Ministry of Economy, Trade and Industry (METI) regulates the export of cryptographic products.
Customer Responsibility
You are solely responsible for compliance with all applicable export control laws and regulations in your jurisdiction. You represent and warrant that:
- You will not export or re-export the Software to any country, entity, or person prohibited by applicable export control laws
- You are not located in, under the control of, or a national or resident of any country subject to comprehensive sanctions
- You will not use the Software for any purpose prohibited by applicable export control laws, including but not limited to the development of nuclear, chemical, or biological weapons
Indemnification for Export Violations
You agree to indemnify and hold harmless the Company from any claims, damages, or penalties arising from your violation of export control laws.
6. Intellectual Property
Ownership
The Software, including all intellectual property rights therein, is and shall remain the exclusive property of KyotoTech LLC.
No Transfer
This Agreement does not transfer to you any ownership or intellectual property rights in the Software.
Feedback
If you provide feedback, suggestions, or ideas regarding the Software, you grant us a perpetual, irrevocable, royalty-free license to use such feedback for any purpose.
Trademarks
"SaQura" and "KyotoTech" are trademarks of KyotoTech LLC. You may not use these trademarks without our prior written consent, except as reasonably necessary to identify the Software in your application.
7. Encryption Key Management Disclaimer
⚠️ CRITICAL WARNING - READ CAREFULLY ⚠️
Customer Responsibility
YOU ARE SOLELY AND EXCLUSIVELY RESPONSIBLE FOR:
- The generation, storage, backup, and management of all Encryption Keys created using the Software
- Implementing appropriate key management policies and procedures
- Maintaining secure backups of all Encryption Keys
- Maintaining backups of your original unencrypted data
No Key Storage by Company
KYOTOTECH LLC DOES NOT STORE, HAVE ACCESS TO, OR MAINTAIN COPIES OF YOUR ENCRYPTION KEYS. We have no technical capability to recover lost Encryption Keys.
No Key Recovery
THERE IS NO KEY RECOVERY SERVICE. If you lose, forget, or otherwise become unable to access your Encryption Keys:
- YOUR ENCRYPTED DATA WILL BE PERMANENTLY AND IRREVERSIBLY INACCESSIBLE
- KyotoTech LLC CANNOT AND WILL NOT recover your data under any circumstances
- You will have NO LEGAL RECOURSE against KyotoTech LLC for such data loss
BY USING THE SOFTWARE, YOU ACKNOWLEDGE THAT YOU HAVE READ, UNDERSTOOD, AND ACCEPTED THE RISKS DESCRIBED IN THIS SECTION.
Recommended Best Practices
- Use a professional key management system or hardware security module (HSM)
- Implement key rotation policies
- Store encrypted backups of keys in geographically separate, secure locations
- Document key management procedures
- Regularly test key recovery procedures
- Maintain unencrypted backups of critical data in secure storage
8. Warranty Disclaimer
"AS IS" Basis
THE SOFTWARE IS PROVIDED "AS IS" AND "AS AVAILABLE" WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED.
Disclaimer of Warranties
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, KYOTOTECH LLC EXPRESSLY DISCLAIMS ALL WARRANTIES, INCLUDING BUT NOT LIMITED TO:
- IMPLIED WARRANTIES OF MERCHANTABILITY
- FITNESS FOR A PARTICULAR PURPOSE
- NON-INFRINGEMENT
- ACCURACY, RELIABILITY, OR COMPLETENESS
- THAT THE SOFTWARE WILL BE UNINTERRUPTED, SECURE, OR ERROR-FREE
- THAT DEFECTS WILL BE CORRECTED
- THAT THE SOFTWARE IS FREE OF VIRUSES OR OTHER HARMFUL COMPONENTS
Cryptographic Security
WE DO NOT WARRANT THAT:
- The cryptographic algorithms implemented in the Software are or will remain secure against all attacks
- The Software is suitable for protecting data of any particular sensitivity level
- The Software complies with any specific security standards or certifications
- Quantum-safe algorithms will remain secure against future quantum computer advances
Professional Advice
The Software is not a substitute for professional security audits, penetration testing, or consultation with qualified security professionals.
9. Limitation of Liability
Exclusion of Damages
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, IN NO EVENT SHALL KYOTOTECH LLC, ITS DIRECTORS, EMPLOYEES, AGENTS, OR AFFILIATES BE LIABLE FOR:
- ANY INDIRECT, INCIDENTAL, SPECIAL, CONSEQUENTIAL, OR PUNITIVE DAMAGES
- LOSS OF DATA, INCLUDING DATA THAT BECOMES INACCESSIBLE DUE TO LOST ENCRYPTION KEYS
- LOSS OF PROFITS, REVENUE, OR BUSINESS OPPORTUNITIES
- BUSINESS INTERRUPTION
- COST OF PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES
- SECURITY BREACHES OR UNAUTHORIZED ACCESS TO YOUR DATA
- ANY DAMAGES RESULTING FROM YOUR FAILURE TO PROPERLY MANAGE ENCRYPTION KEYS
ARISING OUT OF OR IN CONNECTION WITH THIS AGREEMENT OR THE USE OF THE SOFTWARE, EVEN IF WE HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Liability Cap
IF, NOTWITHSTANDING THE FOREGOING, KYOTOTECH LLC IS FOUND LIABLE, OUR TOTAL AGGREGATE LIABILITY SHALL NOT EXCEED THE GREATER OF:
- THE AMOUNT YOU PAID FOR THE SOFTWARE LICENSE IN THE TWELVE (12) MONTHS PRECEDING THE CLAIM; OR
- ONE HUNDRED US DOLLARS (USD $100)
Exceptions
THE LIMITATIONS IN THIS SECTION SHALL NOT APPLY TO:
- LIABILITY ARISING FROM OUR GROSS NEGLIGENCE (重過失) OR WILLFUL MISCONDUCT (故意)
- LIABILITY THAT CANNOT BE EXCLUDED UNDER APPLICABLE LAW
- YOUR INDEMNIFICATION OBLIGATIONS UNDER THIS AGREEMENT
Japan Consumer Contract Act
If you are a consumer as defined under Japan's Consumer Contract Act (消費者契約法), certain limitations may not apply to the extent prohibited by that Act.
Essential Purpose
YOU ACKNOWLEDGE THAT THE LIMITATIONS IN THIS SECTION ARE AN ESSENTIAL BASIS OF THE BARGAIN AND REFLECT A REASONABLE ALLOCATION OF RISK.
10. Indemnification
You agree to indemnify, defend, and hold harmless KyotoTech LLC, its directors, employees, and agents from and against any and all claims, damages, losses, liabilities, costs, and expenses (including reasonable attorneys' fees) arising from or related to:
- Your use of the Software
- Your violation of this Agreement
- Your violation of any applicable law, including export control laws
- Any claim that your application infringes third-party intellectual property rights
- Your failure to properly manage Encryption Keys
- Any data breach or security incident involving your systems
11. Term and Termination
Term
This Agreement is effective from the date you first use the Software and continues until terminated.
Subscription Term
Paid licenses are valid for the subscription period specified at purchase (typically one year).
Termination by You
You may terminate this Agreement at any time by:
- Ceasing all use of the Software
- Destroying all copies of the Software in your possession
- Deactivating your license(s)
Termination by Us
We may terminate this Agreement immediately if:
- You breach any term of this Agreement
- You fail to pay applicable license fees
- You become subject to bankruptcy or insolvency proceedings
- Continuing the license would violate applicable law
Effect of Termination
Upon termination:
- All licenses granted hereunder immediately terminate
- You must cease all use of the Software
- You must destroy all copies of the Software
- Sections 6 (IP), 7 (Key Disclaimer), 8 (Warranty), 9 (Liability), 10 (Indemnification), and 13 (Governing Law) survive termination
No Refunds
License fees are non-refundable except as required by applicable law or expressly stated at the time of purchase.
12. Modifications to Agreement
Right to Modify
We reserve the right to modify this Agreement at any time.
Notice
We will provide notice of material changes by:
- Posting the updated Agreement on our website
- Updating the "Effective Date" at the top of this Agreement
- For significant changes, sending email notice to the address associated with your license
Acceptance
Your continued use of the Software after the effective date of any modifications constitutes acceptance of the modified Agreement.
Rejection
If you do not agree to the modified Agreement, you must stop using the Software and terminate this Agreement.
13. Governing Law and Dispute Resolution
Governing Law
This Agreement shall be governed by and construed in accordance with the laws of Japan, without regard to its conflict of law principles.
Jurisdiction
Any dispute arising out of or relating to this Agreement shall be subject to the exclusive jurisdiction of the Kyoto District Court (京都地方裁判所) as the court of first instance.
Force Majeure
Neither party shall be liable for any failure or delay in performance due to circumstances beyond its reasonable control, including but not limited to acts of God, natural disasters, war, terrorism, civil unrest, government actions, epidemics, pandemics, power outages, internet disruptions, or cyberattacks affecting critical infrastructure.
14. General Provisions
Entire Agreement
This Agreement constitutes the entire agreement between you and KyotoTech LLC regarding the Software and supersedes all prior agreements.
Severability
If any provision of this Agreement is found to be invalid or unenforceable, the remaining provisions shall continue in full force and effect.
Waiver
Our failure to enforce any provision of this Agreement shall not constitute a waiver of that provision.
Assignment
You may not assign this Agreement without our prior written consent. We may assign this Agreement without restriction.
No Agency
Nothing in this Agreement creates any agency, partnership, or joint venture relationship.
Notices
Notices to us should be sent to: support@kyototech.co.jp or our registered address. Notices to you will be sent to the email address associated with your license.
15. Contact Information
Company Information
KyotoTech LLC (合同会社KyotoTech)
〒612-8083 京都市伏見区京町2丁目237-202
Kyoto, Japan
Contact
Resources
Version History
| Version |
Date |
Changes |
| 2.0 | December 31, 2025 | Major update: Added export controls, expanded liability limitations, indemnification, force majeure |
| 1.0 | December 30, 2025 | Initial release |