IBM Security Trusteer Malware Protection (Apex)

Size: px
Start display at page:

Download "IBM Security Trusteer Malware Protection (Apex)"

Transcription

1 Service Description 1. Cloud Service IBM Security Trusteer Malware Protection (Apex) The Cloud Service offering, is described below and is specified in an Order Document for the selected entitled offerings. The Order Document will consist of the Quotation that is provided and the Proof of Entitlement (PoE) you will receive confirming the start date and term of the Cloud Services and when invoicing will commence. IBM offers these services as stand alone services or as additional services: IBM Security Trusteer Apex Advanced Malware Protection IBM Security Trusteer Apex Advanced Malware Protection Premium Support IBM Security Trusteer Apex Advanced Malware Protection Local Manager IBM Security Trusteer Apex Advanced Malware Protection Local Manager Premium Support Any additional IBM Cloud Services subscription for the base subscriptions above that is not listed herein, either currently available or under development, is not considered an update and must be granted separately. 1.1 Definitions "Trusteer Splash" refers to the splash that is provided to the Client based on available splash templates. "Content" means information, software, and data, including, without limitation, any Personal Data, hypertext markup language files, scripts, programs, recordings, sound, music, graphics, images, applets, or servlets that are created, provided, uploaded, or transferred by Client and any user authorized by Client. "Personal Data" means any information that can be used to identify a specific individual, such as name, address, home address, or phone number that is provided to Trusteer to store, process, or transfer on Client's behalf. 1.2 IBM Security Trusteer Apex Advanced Malware Protection IBM Security Trusteer Malware Advanced Protection ("Trusteer Apex") aims to protect corporate endpoints from advanced threats by applying multiple layers of protection to identify and block malicious attacks on employees' endpoints, without prior knowledge of the attack. IBM Security Trusteer Apex Advanced Malware Protection follows the threat lifecycle and applies integrated multilayered defense to break the cyber-attack chain in multiple places. The combined defense layers aim to preempt attempts to compromise the endpoint with advanced malware or to steal end user credentials. IBM Security Trusteer Apex Advanced Malware Protection employs the following layers of protection, including: Corporate credentials protection: Alert and help prevent credentials phishing and unauthorized credential reuse on non-corporate sites. Exploit chain disruption: Help protect against malware infections resulting from exploitation of known and unknown zero-day application vulnerabilities. Lockdown for Java: Help protect against high-risk actions by malicious Java applications. Malicious communication prevention: Help prevent malware from establishing communication channels with the attacker and block data exfiltration. Cloud-based file inspection: Identify and help prevent execution of known malicious file by inspecting them against a repository that consolidates over 20 anti-virus engines. Trusteer Apex includes the following: a. Trusteer Apex Software Suite: Access and use of the software, known as IBM Security Trusteer Apex Advanced Malware Protection software suite, is made available to download onto Client's Authorized Users' desktops or laptops solely for Client's internal business operations purposes, provided that Client deploys the Trusteer Apex software suite to no more than the maximum number of Authorized Users, as such i (12/2014) Page 1 of 8

2 number is specified in the Order Document. If applicable (in the event of Trusteer Splash deployment), Client must reproduce all copyright notices and other legends of ownership on each copy, or partial copy, of the IBM Security Trusteer Apex Advanced Malware Protection Software Suite. b. Trusteer Management Application ("TMA"): The TMA is made available on the IBM Security Trusteer cloud-hosted environment, through which the Client (and unlimited number of its authorized personnel) can (i) receive event data reporting and risk assessments, (ii) view, configure, and set security policies and policies relating to reporting of the events data, (iii) if applicable, configure the manner in which the IBM Security Trusteer Apex Advanced Malware Protection software suite operates, and (iv) control the installation and distribution of downloads and upgrades to the IBM Security Trusteer Apex Advanced Malware Protection software suite as received from the TMA. c. Web Script: If applicable, for access on a website for the purposes of accessing or using the IBM Cloud Services. d. Events data: The Client can use the TMA to receive events data generated from the IBM Security Trusteer Apex Advanced Malware Protection software suite. e. Trusteer Splash: If applicable, the Trusteer Splash marketing platform identifies and markets the IBM Security Trusteer Apex Advanced Malware Protection software suite to Client's Authorized Users. f. Trademark and Marketing Licenses: Client may agree to provide its trademarks, logos or icons for use in connection with the TMA and only for utilization with the Trusteer Splash and for display in the Trusteer Apex Advanced Malware Protection software suite or on the landing pages hosted by IBM. Any use of its provided trademarks, logos, or icons will be in accordance with IBM's reasonable policies regarding advertising and trademark usage. g. For avoidance of doubt, this license grant does not include the right to deploy IBM Security Trusteer Apex Advanced Malware Protection software suite on mobile devices. h. Any module of IBM Security Trusteer Apex Advanced Malware Protection not listed herein, either currently available or under development, is not considered an update and must be licensed separately. i. IBM Security Trusteer Apex Advanced Malware Protection is owned by IBM or an IBM supplier, and is copyrighted and licensed, not sold. Client may not 1) use, copy, modify, or distribute IBM Security Trusteer Apex Advanced Malware Protection except as expressly permitted in this Service Description; 2) reverse assemble, reverse compile, otherwise translate, or reverse engineer IBM Security Trusteer Apex Advanced Malware Protection, except as expressly permitted by law without the possibility of contractual waiver; or 3) sublicense, rent, or lease the IBM Security Trusteer Apex Advanced Malware Protection, except as provided herein. j. Client agrees to create, retain, and provide to IBM and its auditors accurate written records, system tool outputs, and other system information sufficient to provide auditable verification that Client's use of IBM Security Trusteer Apex Advanced Malware Protection is in compliance with terms of this Service Description. 1.3 IBM Security Trusteer Apex Advanced Malware Protection Local Manager IBM Security Trusteer Apex Advanced Malware Protection Local Manager is an add-on to the IBM Security Trusteer Apex Advanced Malware Protection Cloud Service. This virtual appliance enables organizations to send security event data from Trusteer Apex Advanced Malware Protection Local Manager to IBM QRadar Security SIEM and for other third party SIEM for consolidated cross-product security analysis and forensics. IBM Security Trusteer Apex Advanced Malware Protection Local Manager is deployed on VMware ESXi or VirtualBox. IBM Security Trusteer Apex Advanced Malware Protection Local Manager virtual appliance comes prebundled with Linux operation system. This offering is provided under separate IBM and third party license. i (12/2014) Page 2 of 8

3 1.4 Restrictions For avoidance of doubt, Client will not market or otherwise recommend to use and download the IBM Security Trusteer Apex Advanced Malware Protection software suite to any person, except as provided in this Service Description, or use the IBM Security Trusteer Apex Advanced Malware Protection software suite for any other purpose other than for Client's internal business operations or its users' use, as any other use requires a different entitlement. 1.5 Possible Conflicts There may be conflicts between the IBM Security Trusteer Apex Advanced Malware Protection software suite and certain third party security products. Known conflicts and resolutions are posted on the support site currently located at Trusteer may update the location and content of the support site from time to time. 1.6 Premium Support Client is entitled to Premium Support only for IBM Cloud Services for which Client has subscribed to the associated Premium Support offering. 1.7 Deployment of IBM Security Trusteer Malware Protection (Apex) Client's base subscription includes required setup and initial deployment activities, including initial onetime provisioning and configuration. Additional services may be contracted for an additional charge under a separate agreement. 2. Security Description 2.1 Lawful Use and Consent Authorization to Collect and Process Data The IBM Cloud Services are designed to help Client improve its security environment and data. The IBM Cloud Services will collect information from Authorized Users that alone or in combination may be considered Personal Information in some jurisdictions. Collected data may include user IP address, user ID, security events, user name and address provided for the purpose of contacting IBM for Client support, Client Affiliation, visits to protected Applications and phishing sites, and files and data collected remotely by IBM personnel to inspect suspected malware, malicious activity, or malfunction. Data collection and processing practices may be updated to improve the functionality of the IBM Cloud Services. A document with a full description of the data collection and processing practices is updated as needed and is available to Client upon request. Client authorizes IBM to collect this information and process it in accordance with the Cross Border Transfers (Section 2.2). Informed Consent from Data Subjects Use of the IBM Cloud Services may implicate various laws or regulations. The IBM Cloud Services may be used only for lawful purposes and in a lawful manner. Client agrees to use the IBM Cloud Services pursuant to, and assumes all responsibility for complying with, applicable laws, regulations and policies. Client agrees that it has obtained or will obtain any fully informed consents, permissions, or licenses necessary to enable lawful use of the IBM Cloud Services and to permit collection and processing of the information by IBM as Client's data processor through the IBM Cloud Services. 2.2 Cross Border Transfers Client agrees that IBM may process the Content, including any Personal Data as identified in section 1.10 above, under relevant laws and requirements across a country border to processors and sub-processors in the following countries outside of the European Economic Area and countries considered by the European Commission to have adequate levels of security: the USA. 2.3 EU Data Privacy If Client makes Personal Data available to IBM Cloud Services in the EU Member States, Iceland, Liechtenstein, Norway, or Switzerland, or if Client has Eligible Participants or Client Devices in those countries, then Client as the sole controller appoints IBM as a processor to process (as those terms are defined in EU Directive 95/46/EC) Personal Data. IBM will only process such Personal Data to the extent required to make the IBM Cloud Services available in accordance with IBM's published descriptions of IBM Cloud Services and Client agrees that any such processing is in accordance with Client's instructions. If IBM makes a change to the way it processes or secures Personal Data as part of IBM i (12/2014) Page 3 of 8

4 Cloud Services and the change causes Client to be noncompliant with data protection laws applicable to it, Client may terminate the current Subscription Period for the affected IBM Cloud Services, by providing written notice to IBM within thirty (30) days of IBM's notification of the change to Client. Client agrees that IBM may process Content including any Personal Data across a country border to the following processors and sub-processors: Name of Processor / Subprocessor Role (Data Processor or Subprocessor) Location The IBM contracting entity Processor As stated on the order document Amazon Web Services LLC Sub-processor 410 Terry Ave N Seattle, WA, United States Connectria Corp. Sub-processor Olive Blvd., Suite 300 St. Louis, MO United States IBM Israel Ltd. Sub-processor 94 Derech Em-Hamoshavot Petach-Tikva Israel IBM Corp. Sub-processor 1 New Orchard Rd, Armonk, NY United States Client agrees that IBM may, on notice, vary this list of country locations when it reasonably determines it necessary for the provision of the Cloud Services. When IBM's US-EU and Swiss-EU Safe Harbor Frameworks do not apply to a transfer of EEA or Swiss Personal Data, the parties or their relevant affiliates may enter into separate standard unmodified EU Model Clause agreements in their corresponding roles pursuant to EC Decision 2010/87/EU with optional clauses removed. All disputes or liability arising under these agreements, even if entered into by affiliates, will be treated by the parties as if the dispute or liability arose between them under the terms of this Agreement. 2.4 Security Policies IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure. 2.5 Access Control Access to client data, if required, is allowed only by authorized IBM support representatives according to principles of segregation of duties. IBM staff use two-factor authentication to an intermediate "gateway" management host. 2.6 Activity Logging IBM maintains logs of its activity for systems, applications, data repositories, middleware and network infrastructure devices that are capable of and configured for logging activity. To minimize the possibility of tampering and to enable central analysis, alerting and reporting, logs are analyzed in real-time and via periodic analysis reports to detect anomalous behavior. Operations staff is alerted to 24x Physical Security IBM maintains physical security standards designed to restrict unauthorized physical access to IBM data centers. Only limited access points exist into the data centers, which are controlled by two-factor authentication and monitored by surveillance cameras. Access is allowed only to authorized staff that have approved access. Operations staff verifies the approval and issues an access badge granting the necessary access. Employees issued such badges must surrender other access badges and can only possess the data center access badge for the duration of their activity. Usage of badges is logged. Non- IBM visitors are registered upon entering on premises and are escorted when they are on the premises. Delivery areas and loading docks and other points where unauthorized persons may enter the premises are controlled and isolated. i (12/2014) Page 4 of 8

5 2.8 Compliance IBM certifies its privacy practices annually as consistent with the U.S. Department of Commerce's Safe Harbor Principles: Notice, Choice, Onward Transfer, Access and Accuracy, Security, and Oversight/Enforcement. IBM performs industry standard SSAE 16 audits (or their equivalent) annually in production data centers. IBM reviews security and privacy-related activities for compliance with IBM's business requirements. Assessments and audits are conducted regularly by IBM to confirm compliance with its information security policies. IBM employees and vendor employees complete workforce security and awareness training annually. Personnel are reminded of their job objectives and their responsibility to meet ethical business conduct, confidentiality, and IBM's security obligations annually. 3. Service Level Commitment IBM provides the following availability service level agreement ("SLA") for the Cloud Service. You understand that the SLA does not constitute a warranty to you. 3.1 Definitions a. "Availability Credit" means the remedy IBM will provide for a validated Claim. The Availability Credit will be applied in the form of a credit or discount against a future invoice of subscription charges for the Cloud Service. b. "Claim" means a claim you submit to IBM pursuant to the SLA that a Service Level has not been met during a Contracted Month. c. "Contracted Month" means each full month during the term measured from 12:00 a.m. Eastern US time on the first day of the month through 11:59 p.m. Eastern US time on the last day of the month. d. "Downtime" means a period of time during which production system processing for the Cloud Service has stopped and your users are unable to use all aspects of the Cloud Service for which they have permissions. Downtime does not include the period of time when the Cloud Service is not available because of: (1) a scheduled or announced maintenance outage; (2) Events or causes beyond IBM's control (e.g., natural disaster, internet outages, emergency maintenance, etc.); (3) problems with your applications, equipment or data, or a third party's applications, equipment or data; (4) your failure to adhere to required system configurations and supported platforms for accessing the Cloud Service; or (5) IBM's compliance with any designs, specifications, or instructions that you provide to IBM or a third party provides to IBM on your behalf. e. "Event" means a circumstance or set of circumstances taken together, resulting in a failure to meet a Service Level. f. "Service Level" means the standard set forth below by which IBM measures the level of service it provides in this SLA. 3.2 Availability Credits a. To submit a Claim, you must log a Severity 1 support ticket (as defined below in the Technical Support section) for each Event with the IBM technical support help desk, within twenty-four (24) hours of your first becoming aware that the Event has impacted your use of the Cloud Service. You must provide all necessary information about the Event and reasonably assist IBM with the diagnosis and resolution of the Event. b. You must submit your Claim for an Availability Credit no later than three (3) business days after the end of the Contracted Month in which the Claim arose. c. Availability Credits are based on the duration of the Downtime measured from the time you report that you were first impacted by the Downtime. For each valid Claim, IBM will apply the highest applicable Availability Credit based on the achieved Service Level during each Contracted Month, as shown in the table below. IBM will not be liable for multiple Availability Credits for the same Event in the same Contracted Month. i (12/2014) Page 5 of 8

6 d. The total Availability Credits awarded with respect to any Contracted Month shall not, under any circumstance, exceed 10 percent (10%) of one twelfth (1/12th) of the annual charge paid by you to IBM for the Cloud Service. 3.3 Service Levels Availability of the Cloud Service during a Contracted Month Availability during a Contracted Month Availability Credit (% of Monthly Subscription Fee for Contracted Month that is the subject of a Claim) <99.5% 2% <98.0% 5% <96.0% 10% Availability, expressed as a percentage, is calculated as: (a) the total number of minutes in a Contracted Month minus (b) the total number of minutes of Downtime in a Contracted Month, divided by (c) the total number of minutes in a Contracted Month. Example: 250 minutes total Downtime during Contracted Month 43,200 total minutes in a 30 day Contracted Month minutes Downtime = 42,950 minutes 43,200 total minutes = 2% Availability Credit for 99.4% Achieved Service Level during the Contracted Month 3.4 Other information about this SLA This SLA is made available only to IBM's clients and does not apply to claims made by your users, guests, participants and permitted invitees of the Cloud Service or to any beta or trial services that IBM provides. The SLA only applies to the Cloud Services that are in production use. It does not apply to nonproduction environments, including but not limited to test, disaster recovery, quality assurance, or development. The SLA only applies if Client has not breached any material obligations under the Cloud Service Agreement, including without limitation, breach of any payment obligations. 4. Entitlement and Billing Information 4.1 Charge Metrics The Cloud Services are made available under one of the following charge metrics as specified in the Order Document: a. Authorized User is a unit of measure by which the IBM Cloud Services can be obtained. Client must obtain separate, dedicated entitlements for each unique Authorized User given access to the IBM Cloud Services in any manner directly or indirectly (for example: via a multiplexing program, device, or application server) through any means. Sufficient entitlements must be obtained to cover the number of Authorized Users given access to the IBM Cloud Services during the measurement period specified in Client's Order Document. b. Instance is a unit of measure by which the IBM Cloud Services can be obtained. An Instance is access to a specific configuration of the IBM Cloud Services. Sufficient entitlements must be obtained for each Instance of the IBM Cloud Services made available to access and use during the measurement period specified in Client's Order Document. 4.2 Charges and Billing The amount payable for the Cloud Service is specified in an Order Document. 4.3 Partial Month Charges The partial month charge is a pro-rated daily rate. The partial month charges are calculated based on the remaining days of the partial month starting on the date you are notified by IBM that your access to the Cloud Service offering is available. 5. Compliance and Auditing Access to the IBM Security Trusteer Malware Protection Cloud Services is subject to a maximum quantity of Authorized Users or Instances as specified in the Order Document. Client is responsible for ensuring i (12/2014) Page 6 of 8

7 that their number of Authorized Users or Instances does not exceed the maximum quantity as specified in the Order Document. An audit may be conducted to verify compliance with maximum quantity of Authorized Users or Instances. 6. Term and Renewal Options 6.1 Term The term of the Cloud Service begins on the date that IBM notifies you that you have access to the Cloud Service, as described in the Order Document. The PoE portion of the Order Document will confirm the exact date of the start and end of the term. You are permitted to increase your level of use of the Cloud Service during the term by contacting IBM or your IBM Business Partner. We will confirm the increased level of usage in the Order Document. 6.2 Cloud Services Term Renewal Options Your Order Document will set forth whether the Cloud Service will renew at the end of the term, by designating the term as one of the following: Automatic Renewal If your Order Document states that your renewal is automatic, you may terminate the expiring Cloud Service term by written request, at least ninety (90) days prior to the expiration date of the term that is set forth in the Order Document. If IBM or your IBM Business Partner does not receive such termination notice by the expiration date, the expiring term will be automatically renewed for either a one year term or the same duration as the original term as set forth in the PoE Continuous Billing When the Order Document states that your billing is continuous, you will continue to have access to the Cloud Service following the end of your term and will be billed for the usage of the Cloud Service on a continuous basis. To discontinue use of the Cloud Service and stop the continuous billing process, you must provide IBM or your IBM Business Partner with ninety (90) days written notice requesting that your Cloud Service be cancelled. Upon cancellation of your access, you will be billed for any outstanding access charges through the month in which the cancellation took effect Renewal Required When the Order Document states that your renewal type is "terminate", the Cloud Service will terminate at the end of the term and your access to the Cloud Service will be removed. To continue to use the Cloud Service beyond the end date, you must place an order with your IBM sales representative or IBM Business Partner to purchase a new subscription term. 7. Technical Support Technical Support for the IBM Cloud Service is to a Client and its Authorized Users to assist in their use of the IBM Cloud Services. Standard Support is included in the subscription of all offerings. For each IBM Cloud Services offering, a Premium Support subscription is available for an additional charge. Standard Support: 8AM-5PM local time support. Client's Authorized Users can submit support tickets electronically, as detailed in the Software as a Service [SaaS] Support Handbook. Clients can access Client Support Portal for notifications, documents, case reports and FAQs at: For support options and details access the Support Handbook: 01.ibm.com/software/support/handbook.html. Premium Support: 24x7 support for all severities. Clients can reach support directly via phone. Client's Authorized Users can submit support tickets electronically, as detailed in the Software as a Service [SaaS] Support Handbook. i (12/2014) Page 7 of 8

8 Clients can access Client Support Portal for notifications, documents, case reports and FAQs at: For support options and details access the Support Handbook: 01.ibm.com/software/support/handbook.html. 8. Safe Harbor Compliance IBM Cloud Services specified in this Service Description are included in Trusteer, LLC. (IBM Subsidiary) US-EU Safe Harbor certification. Both IBM and Trusteer abide by the U.S. EU Safe Harbor Framework as set forth by the United States Department of Commerce regarding the collection, use and retention of information collected from the European Union. For more information about Safe Harbor or to access IBM's certification statement, go to 9. Enabling Software This Cloud Service offering may include enabling software. You may use the enabling software only in association with your use of the Cloud Service for the length of the term of the Cloud Service. To the extent that the enabling software contains sample code, you have the additional right to make derivative works of the sample code and use them consistent with this grant. The enabling software is provided subject to the SLA, if any, as a component of the Cloud Service, and is subject to the applicable license agreement(s). 10. Additional Information 10.1 Tracking Technologies You are aware and agree that IBM may, as part of the normal operation and support of the IBM Cloud Services, collect personal information from you (your employees and contractors) related to the use of the IBM Cloud Services, through tracking and other technologies. IBM does so to gather usage statistics and information about effectiveness of our Cloud Services to improve user experience and/or tailor interactions with you. You confirm that you will obtain or have obtained consent to allow IBM to process the collected personal information for the above purpose within IBM, other IBM companies and their subcontractors, wherever we and our subcontractors do business, in compliance with applicable law. IBM will comply with requests from your employees and contractors to access, update, correct or delete their collected personal information Derived Benefit Locations Where applicable, taxes are based upon the location(s) you identify as receiving benefit of the Cloud Services. IBM will apply taxes based upon the business address listed when ordering a Cloud Service as the primary benefit location unless you provide additional information to IBM. You are responsible for keeping such information current and providing any changes to IBM No Personal Health Information The Cloud Service is not designed to comply with HIPAA and may not be used for the transmission or storage of any Personal Health Information. i (12/2014) Page 8 of 8

IBM Cloud Service Description: Watson Analytics

IBM Cloud Service Description: Watson Analytics IBM Cloud Services Agreement IBM Cloud Service Description: Watson Analytics The following is the Service Description for your Order: 1. Cloud Service The Cloud Service offering is described below, portions

More information

IBM Security Intelligence on Cloud

IBM Security Intelligence on Cloud Service Description IBM Security Intelligence on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients

More information

IBM Case Manager on Cloud

IBM Case Manager on Cloud Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients of the

More information

IBM Security Trusteer Fraud Protection

IBM Security Trusteer Fraud Protection Service Description 1. Cloud Service IBM Security Trusteer Fraud Protection The Cloud Service offering, is described below and is specified in an Order Document for the selected entitled offerings. The

More information

IBM Emptoris Managed Cloud Delivery

IBM Emptoris Managed Cloud Delivery Service Description IBM Emptoris Managed Cloud Delivery The following is the Service Description for your Order: 1. Cloud Service The Cloud Service offering, is described below and is specified in an Order

More information

IBM Sterling B2B Services File Transfer Service

IBM Sterling B2B Services File Transfer Service Service Description IBM Sterling B2B Services File Transfer Service This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients

More information

IBM WebSphere Cast Iron Live

IBM WebSphere Cast Iron Live IBM Terms of Use SaaS Specific Offering Terms IBM WebSphere Cast Iron Live The Terms of Use ( ToU ) is composed of this IBM Terms of Use - SaaS Specific Offering Terms ( SaaS Specific Offering Terms )

More information

IBM Silverpop Engage SMS

IBM Silverpop Engage SMS IBM Terms of Use SaaS Specific Offering Terms IBM Silverpop Engage SMS The Terms of Use ( ToU ) is composed of this IBM Terms of Use - SaaS Specific Offering Terms ( SaaS Specific Offering Terms ) and

More information

IBM Emptoris Managed Cloud Delivery

IBM Emptoris Managed Cloud Delivery Service Description IBM Emptoris Managed Cloud Delivery This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of

More information

IBM Emptoris Managed Cloud Delivery

IBM Emptoris Managed Cloud Delivery Service Description IBM Emptoris Managed Cloud Delivery This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of

More information

IBM Commerce Insights

IBM Commerce Insights Service Description IBM Commerce Insights This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud Service.

More information

Service Description. MaaS360 (SaaS) 1. Cloud Service. 1.1 IBM MaaS360 (SaaS)

Service Description. MaaS360 (SaaS) 1. Cloud Service. 1.1 IBM MaaS360 (SaaS) Service Description 1. Cloud Service MaaS360 (SaaS) The Cloud Service offering, is described below and is specified in an Order Document for the selected entitled offerings. The Order Document will consist

More information

IBM Partner Engagement Manager

IBM Partner Engagement Manager Service Description IBM Partner Engagement Manager This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud

More information

IBM Resilient Incident Response Platform On Cloud

IBM Resilient Incident Response Platform On Cloud Service Description IBM Resilient Incident Response Platform On Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized

More information

IBM Resilient Incident Response Platform On Cloud

IBM Resilient Incident Response Platform On Cloud Service Description IBM Resilient Incident Response Platform On Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and

More information

Service Description. IBM Aspera Files. 1. Cloud Service. 1.1 IBM Aspera Files Personal Edition. 1.2 IBM Aspera Files Business Edition

Service Description. IBM Aspera Files. 1. Cloud Service. 1.1 IBM Aspera Files Personal Edition. 1.2 IBM Aspera Files Business Edition Service Description IBM Aspera Files This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud Service.

More information

IBM PureApplication Service

IBM PureApplication Service Service Description IBM PureApplication Service This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud

More information

IBM Fraud Risk Assessment Add-Ons for IBM i2

IBM Fraud Risk Assessment Add-Ons for IBM i2 Service Description IBM Fraud Risk Assessment Add-Ons for IBM i2 This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized users

More information

IBM Cloud Identity Service

IBM Cloud Identity Service IBM Terms of Use SaaS Specific Offering Terms IBM Cloud Identity Service The Terms of Use ( ToU ) is composed of this IBM Terms of Use - SaaS Specific Offering Terms ( SaaS Specific Offering Terms ) and

More information

IBM Sterling B2B Services

IBM Sterling B2B Services Service Description IBM Sterling B2B Services This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud

More information

IBM Silverpop Engage SMS

IBM Silverpop Engage SMS Service Description IBM Silverpop Engage SMS This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud Service.

More information

IBM Case Manager on Cloud

IBM Case Manager on Cloud Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud

More information

IBM Resilient Incident Response Platform On Cloud

IBM Resilient Incident Response Platform On Cloud Service Description IBM Resilient Incident Response Platform On Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized

More information

IBM Incentive Compensation Management on Cloud

IBM Incentive Compensation Management on Cloud Service Description IBM Incentive Compensation Management on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients

More information

IBM MaaS360 (SaaS) 1.1 IBM MaaS360 Mobile Device Management (SaaS) and IBM MaaS360 Mobile Device Management (SaaS) Step up for existing customers

IBM MaaS360 (SaaS) 1.1 IBM MaaS360 Mobile Device Management (SaaS) and IBM MaaS360 Mobile Device Management (SaaS) Step up for existing customers Service Description IBM MaaS360 (SaaS) This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud Service.

More information

IBM Watson Analytics for Social Media

IBM Watson Analytics for Social Media Service Description IBM Watson Analytics for Social Media This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of

More information

IBM Content Manager OnDemand on Cloud

IBM Content Manager OnDemand on Cloud Service Description IBM Content Manager OnDemand on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of

More information

IBM App Connect Professional

IBM App Connect Professional Service Description IBM App Connect Professional This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud

More information

IBM App Connect Enterprise on IBM Cloud

IBM App Connect Enterprise on IBM Cloud Service Description IBM App Connect Enterprise on IBM Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized users and

More information

Updated December 12, Chapter 10 Service Description IBM Cloud for Government

Updated December 12, Chapter 10 Service Description IBM Cloud for Government Updated December 12, 2018 Chapter 10 Service Description IBM Cloud for Government IBM Cloud for Government This Service Description describes IBM s Cloud for Government available to Clients under the Federal

More information

IBM Watson Analytics

IBM Watson Analytics Service Description IBM Watson Analytics This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients of the Cloud

More information

IBM Aspera on Cloud. The Standard Edition of this Cloud Service is available on a subscription basis. It includes:

IBM Aspera on Cloud. The Standard Edition of this Cloud Service is available on a subscription basis. It includes: Service Description IBM Aspera on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized users and recipients of the Cloud

More information

IBM IoT Connected Vehicle Insights

IBM IoT Connected Vehicle Insights Service Description IBM IoT Connected Vehicle Insights This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized users and recipients

More information

Data Security and Privacy Principles IBM Cloud Services

Data Security and Privacy Principles IBM Cloud Services Data Security and Privacy Principles IBM Cloud Services 2 Data Security and Privacy Principles: IBM Cloud Services Contents 2 Overview 2 Governance 3 Security Policies 3 Access, Intervention, Transfer

More information

IBM IoT Connection Service

IBM IoT Connection Service Service Description IBM IoT Connection Service This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized users and recipients of

More information

IBM dashdb for Analytics

IBM dashdb for Analytics Service Description IBM dashdb for Analytics This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud Service.

More information

IBM Partner Engagement Manager

IBM Partner Engagement Manager Service Description IBM Partner Engagement Manager This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized users and recipients

More information

"PPS" is Private Practice Software as developed and produced by Rushcliff Ltd.

PPS is Private Practice Software as developed and produced by Rushcliff Ltd. Rushcliff Ltd Data Processing Agreement This Data Processing Agreement ( DPA ) forms part of the main terms of use of PPS, PPS Express, PPS Online booking, any other Rushcliff products or services and

More information

XO SITE SECURITY SERVICES

XO SITE SECURITY SERVICES XO SITE SECURITY SERVICES 1.0 Product and Services 1.1 Product Description. XO Site Security (the "Service") is a managed security service which uses Premises-based, multi-threat sensing Customer Premises

More information

HPE DATA PRIVACY AND SECURITY

HPE DATA PRIVACY AND SECURITY ARUBA, a Hewlett Packard Enterprise company, product services ( Services ) This Data Privacy and Security Agreement ("DPSA") Schedule governs the privacy and security of Personal Data by HPE in connection

More information

Service Description. IBM DB2 on Cloud. 1. Cloud Service Description. 1.1 DB2 on Cloud. 1.2 IBM Bluemix

Service Description. IBM DB2 on Cloud. 1. Cloud Service Description. 1.1 DB2 on Cloud. 1.2 IBM Bluemix Service Description 1. Cloud Service Description IBM DB2 on Cloud This Service Description describes the Cloud Service IBM provides to Client, including DB2 on Cloud and the Bluemix application development

More information

IBM Sterling B2B Services

IBM Sterling B2B Services Service Description IBM Sterling B2B Services This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized users and recipients of

More information

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights Secure Messaging Mobile App Privacy Policy Privacy Policy Highlights For ease of review, Everbridge provides these Privacy Policy highlights, which cover certain aspects of our Privacy Policy. Please review

More information

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd GDPR Processor Security Controls GDPR Toolkit Version 1 Datagator Ltd Implementation Guidance (The header page and this section must be removed from final version of the document) Purpose of this document

More information

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Solution Pack Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Subject Governing Agreement DXC Services Requirements Agreement between DXC and Customer including DXC

More information

IBM Watson Campaign Automation SMS

IBM Watson Campaign Automation SMS Service Description IBM Watson Campaign Automation SMS This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized users and recipients

More information

IBM Cloud Service Description: IBM SmartCloud for Social Business

IBM Cloud Service Description: IBM SmartCloud for Social Business IBM Cloud Services Agreement IBM Cloud Service Description: IBM for Social Business The following is the Service Description for your Order: 1. Cloud Service Descriptions The following are Cloud Service

More information

Data Processing Agreement for Oracle Cloud Services

Data Processing Agreement for Oracle Cloud Services Data Processing Agreement for Oracle Cloud Services Version January 12, 2018 1. Scope, Order of Precedence and Term 1.1 This data processing agreement (the Data Processing Agreement ) applies to Oracle

More information

IBM Cloud Video Streaming

IBM Cloud Video Streaming Service Description IBM Cloud Video Streaming This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud

More information

IBM dashdb Enterprise

IBM dashdb Enterprise Service Description IBM dashdb Enterprise This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud Service.

More information

SERVICE TERMS AND SLA FOR LEASE OF DARK FIBER

SERVICE TERMS AND SLA FOR LEASE OF DARK FIBER SERVICE TERMS AND SLA FOR LEASE OF DARK FIBER Dark Fiber Lease. These are the service terms and service level agreement for the lease of Global Crossing Dark Fiber which apply to the provision of Dark

More information

GDPR AMC SAAS AND HOSTED MODULES. UK version. AMC Consult A/S June 26, 2018 Version 1.10

GDPR AMC SAAS AND HOSTED MODULES. UK version. AMC Consult A/S June 26, 2018 Version 1.10 GDPR AMC SAAS AND HOSTED MODULES UK version AMC Consult A/S June 26, 2018 Version 1.10 INDEX 1 Signatures...3 2 General...4 3 Definitions...5 4 Scoping...6 4.1 In scope...6 5 Responsibilities of the data

More information

Managed Security Services - Endpoint Managed Security on Cloud

Managed Security Services - Endpoint Managed Security on Cloud Services Description Managed Security Services - Endpoint Managed Security on Cloud The services described herein are governed by the terms and conditions of the agreement specified in the Order Document

More information

IBM Silverpop Engage

IBM Silverpop Engage IBM Terms of Use SaaS Specific Offering Terms IBM Silverpop Engage The Terms of Use ( ToU ) is composed of this IBM Terms of Use - SaaS Specific Offering Terms ( SaaS Specific Offering Terms ) and a document

More information

Saba Hosted Customer Privacy Policy

Saba Hosted Customer Privacy Policy Saba Hosted Customer Privacy Policy Last Revised 23 May 2018 1. Introduction Saba is committed to protecting information which can be used to directly or indirectly identify an individual ( personal data

More information

OSIsoft PI Cloud Services Privacy Statement

OSIsoft PI Cloud Services Privacy Statement OSIsoft PI Cloud Services Privacy Statement Last updated: December 2016 Scope This notice applies to the use of those services and any other OSIsoft services that display or link to this notice. These

More information

Service Level Agreement for Microsoft Online Services

Service Level Agreement for Microsoft Online Services Service Level Agreement for Microsoft Online Services Last updated on: January 1, 2015 1. Introduction. This Service Level Agreement for Microsoft Online Services (this SLA ) is made by Microsoft in connection

More information

Data Processing Amendment to Google Apps Enterprise Agreement

Data Processing Amendment to Google Apps Enterprise Agreement Data Processing Amendment to Google Apps Enterprise Agreement The Customer agreeing to these terms ( Customer ) and Google Inc., Google Ireland, or Google Asia Pacific Pte. Ltd. (as applicable, Google

More information

IBM Algo Risk Content on Cloud

IBM Algo Risk Content on Cloud Service Description IBM Algo Risk Content on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized users and recipients

More information

Document Cloud (including Adobe Sign) Additional Terms of Use. Last updated June 5, Replaces all prior versions.

Document Cloud (including Adobe Sign) Additional Terms of Use. Last updated June 5, Replaces all prior versions. Document Cloud (including Adobe Sign) Additional Terms of Use Last updated June 5, 2018. Replaces all prior versions. These Additional Terms govern your use of Document Cloud (including Adobe Sign) and

More information

IBM Silverpop Engage SMS

IBM Silverpop Engage SMS IBM Terms of Use SaaS Specific Offering Terms IBM Silverpop Engage SMS The Terms of Use ( ToU ) is composed of this IBM Terms of Use - SaaS Specific Offering Terms ( SaaS Specific Offering Terms ) and

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

Emsi Privacy Shield Policy

Emsi Privacy Shield Policy Emsi Privacy Shield Policy Scope The Emsi Privacy Shield Policy ( Policy ) applies to the collection and processing of Personal Data that Emsi obtains from Data Subjects located in the European Union (

More information

Service Description VMware Workspace ONE

Service Description VMware Workspace ONE VMware Workspace ONE Last Updated: 05 April 2018 The product described in this Service Description is protected by U.S. and international copyright and intellectual property laws. The product described

More information

EU Data Protection Agreement

EU Data Protection Agreement EU Data Protection Agreement This Data Protection Agreement ("Agreement") is entered into by and between TechTarget, Inc., a Delaware corporation with a principle place of business at 275 Grove Street,

More information

SLA for Virtual Machines

SLA for Virtual Machines SLA for Virtual Machines Updated: 05/2017 For all Virtual Machines that have two or more instances deployed in the same Availability Set, we guarantee you will have Virtual Machine Connectivity to at least

More information

DATA PROCESSING TERMS

DATA PROCESSING TERMS DATA PROCESSING TERMS Safetica Technologies s.r.o. These Data Processing Terms (hereinafter the Terms ) govern the rights and obligations between the Software User (hereinafter the User ) and Safetica

More information

Version v November 2015

Version v November 2015 Service Description HPE Project and Portfolio Management on Software-as-a- Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Project and

More information

German Data Processing Addendum MailChimp

German Data Processing Addendum MailChimp Customer EU Data Processing Addendum This Data Processing Addendum ("DPA"), forms part of the Agreement between The Rocket Science Group LLC d/b/a MailChimp ("MailChimp") and CK Coaching Köln ("Customer")

More information

IBM Managed Security Services for Security

IBM Managed Security Services for  Security Service Description 1. Scope of Services IBM Managed Security Services for E-mail Security IBM Managed Security Services for E-mail Security (called MSS for E-mail Security ) may include: a. E-mail Antivirus

More information

Customer EU Data Processing Addendum

Customer EU Data Processing Addendum From: MailChimp Legal Team To: TC - Info - Heart of the City Subject: MailChimp Data Processing Addendum Date: 10 May 2018 13:15:11 Attachments: ATT00001.png Customer EU Data Processing Addendum This Data

More information

ADIENT VENDOR SECURITY STANDARD

ADIENT VENDOR SECURITY STANDARD Contents 1. Scope and General Considerations... 1 2. Definitions... 1 3. Governance... 2 3.1 Personnel... 2 3.2 Sub-Contractors... 2 3.3. Development of Applications... 2 4. Technical and Organizational

More information

Google Cloud & the General Data Protection Regulation (GDPR)

Google Cloud & the General Data Protection Regulation (GDPR) Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to

More information

PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) CUSTOM APN ATTACHMENT

PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) CUSTOM APN ATTACHMENT PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) CUSTOM APN ATTACHMENT Last Revised: 12/20/17 1. Private Mobile Connection - Custom APN. Pursuant to the terms and conditions of

More information

1.2 Participant means a third party who interacts with the Services as a result of that party s relationship with or connection to you.

1.2 Participant means a third party who interacts with the Services as a result of that party s relationship with or connection to you. Document Cloud (including Adobe Sign) Additional Terms of Use Last updated June 16, 2016. Replaces the prior version in its entirety. Capitalized terms used in these Document Cloud Additional Terms ( Additional

More information

Weather Company Alerts for Engagement

Weather Company Alerts for Engagement Service Description Weather Company Alerts for Engagement This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized users and recipients

More information

BT Assure Cloud Identity Annex to the General Service Schedule

BT Assure Cloud Identity Annex to the General Service Schedule 1 Defined Terms The following definitions apply, in addition to those in the General Terms and Conditions and the General Service Schedule of the Agreement. Administrator means a Customer-authorised person

More information

Beam Technologies Inc. Privacy Policy

Beam Technologies Inc. Privacy Policy Beam Technologies Inc. Privacy Policy Introduction Beam Technologies Inc., Beam Dental Insurance Services LLC, Beam Insurance Administrators LLC, Beam Perks LLC, and Beam Insurance Services LLC, (collectively,

More information

University of Pittsburgh Security Assessment Questionnaire (v1.7)

University of Pittsburgh Security Assessment Questionnaire (v1.7) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided

More information

Service Description. IBM Marketing Cloud. 1. Cloud Service. 1.1 IBM Marketing Cloud Standard

Service Description. IBM Marketing Cloud. 1. Cloud Service. 1.1 IBM Marketing Cloud Standard Service Description IBM Marketing Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud Service.

More information

Privacy Shield Policy

Privacy Shield Policy Privacy Shield Policy Catalyst Repository Systems, Inc. (Catalyst) has adopted this Privacy Shield Policy ("Policy") to establish and maintain an adequate level of Personal Data privacy protection. This

More information

Registration Agreement

Registration Agreement Registration Agreement Grove Technologies, LLC, doing business as GroveSite ( GroveSite ), owns proprietary GroveSite software and related documentation, and operates the GroveSite Platform (as defined

More information

SLA. Service Level Agreement v1.0. Published: September 2014

SLA. Service Level Agreement v1.0. Published: September 2014 SLA Service Level Agreement v1.0 Published: September 2014 The information contained in this document represents the current view of Circuit ID on the issues discussed as of the date of publication. Because

More information

IBM Managed Security Services - Vulnerability Scanning

IBM Managed Security Services - Vulnerability Scanning Service Description IBM Managed Security Services - Vulnerability Scanning This Service Description describes the Service IBM provides to Client. 1.1 Service IBM Managed Security Services - Vulnerability

More information

BT Compute Protect Schedule to the General Terms

BT Compute Protect Schedule to the General Terms BT Compute Protect Schedule to the General Terms Contents A note on you... 2 Words defined in the General Terms... 2 Part A The BT Compute Protect Service... 2 1 Service Summary... 2 2 Standard Service

More information

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V3.0, MAY 2017 Multiple Layers of Protection Overview Password Salted-Hash Thank you

More information

Dell Service Level Agreement for Microsoft Online Services

Dell Service Level Agreement for Microsoft Online Services Dell Service Level Agreement for Microsoft Online Services 1. Introduction. This Dell Service Level Agreement for Microsoft Online Services (this SLA ) is made by DELL PRODUCTS L.P., A TEXAS LIMITED PARTNERSHIP,

More information

SDL Privacy Policy Cloud Services

SDL Privacy Policy Cloud Services SDL Privacy Policy Cloud Services Software-As-A-Service Products Version 11-04-2017 v1.4 SDL plc Globe House Clivemont Road, Maidenhead SL6 7DY England www.sdl.com SDL Tridion Infrastructure Summary This

More information

HIGHSOFT SOLUTIONS AS STANDARD LICENSE TERMS AND CONDITIONS 2.2

HIGHSOFT SOLUTIONS AS STANDARD LICENSE TERMS AND CONDITIONS 2.2 HIGHSOFT SOLUTIONS AS STANDARD LICENSE TERMS AND CONDITIONS 2.2 1. Definitions: Agreement shall mean the standard terms and conditions in this document; Confidential Information shall mean any and all

More information

WORKSHARE SECURITY OVERVIEW

WORKSHARE SECURITY OVERVIEW WORKSHARE SECURITY OVERVIEW April 2016 COMPANY INFORMATION Workshare Security Overview Workshare Ltd. (UK) 20 Fashion Street London E1 6PX UK Workshare Website: www.workshare.com Workshare Inc. (USA) 625

More information

Clearswift Managed Security Service for

Clearswift Managed Security Service for Clearswift Managed Security Service for Email Service Description Revision 1.0 Copyright Published by Clearswift Ltd. 1995 2019 Clearswift Ltd. All rights reserved. The materials contained herein are the

More information

Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017)

Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017) Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017) GENERAL TERMS & INFORMATION A. GENERAL TERMS & DEFINITIONS 1. This Services Specification

More information

The Common Controls Framework BY ADOBE

The Common Controls Framework BY ADOBE The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.

More information

Weather Company Alerts for Engagement

Weather Company Alerts for Engagement Service Description Weather Company Alerts for Engagement This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized users and recipients

More information

1 Privacy Statement INDEX

1 Privacy Statement INDEX INDEX 1 Privacy Statement Mphasis is committed to protecting the personal information of its customers, employees, suppliers, contractors and business associates. Personal information includes data related

More information

Supplementary Terms and Conditions

Supplementary Terms and Conditions IBM Deutschland GmbH Supplementary Terms and Conditions for IBM Enterprise Services Version: January 2016 1. Subject These Supplementary Terms and Conditions for IBM Enterprise Services (hereinafter referred

More information

Eco Web Hosting Security and Data Processing Agreement

Eco Web Hosting Security and Data Processing Agreement 1 of 7 24-May-18, 11:50 AM Eco Web Hosting Security and Data Processing Agreement Updated 19th May 2018 1. Introduction 1.1 The customer agreeing to these terms ( The Customer ), and Eco Web Hosting, have

More information

Data Protection and GDPR

Data Protection and GDPR Data Protection and GDPR At DPDgroup UK Ltd (DPD & DPD Local) we take data protection seriously and have updated all our relevant policies and documents to ensure we meet the requirements of GDPR. We have

More information

Products: Software, content and digital materials distributed via the Vuzix App Store.

Products: Software, content and digital materials distributed via the Vuzix App Store. Vuzix Publisher Distribution Agreement By uploading or otherwise making available applications or any other materials via the Vuzix App Store, you (on behalf of yourself or the business you represent)

More information

Version v November 2015

Version v November 2015 Service Description HPE Quality Center Enterprise on Software-as-a-Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Quality Center Enterprise

More information