IBM Security Trusteer Malware Protection (Apex)
|
|
- Suzan Horton
- 6 years ago
- Views:
Transcription
1 Service Description 1. Cloud Service IBM Security Trusteer Malware Protection (Apex) The Cloud Service offering, is described below and is specified in an Order Document for the selected entitled offerings. The Order Document will consist of the Quotation that is provided and the Proof of Entitlement (PoE) you will receive confirming the start date and term of the Cloud Services and when invoicing will commence. IBM offers these services as stand alone services or as additional services: IBM Security Trusteer Apex Advanced Malware Protection IBM Security Trusteer Apex Advanced Malware Protection Premium Support IBM Security Trusteer Apex Advanced Malware Protection Local Manager IBM Security Trusteer Apex Advanced Malware Protection Local Manager Premium Support Any additional IBM Cloud Services subscription for the base subscriptions above that is not listed herein, either currently available or under development, is not considered an update and must be granted separately. 1.1 Definitions "Trusteer Splash" refers to the splash that is provided to the Client based on available splash templates. "Content" means information, software, and data, including, without limitation, any Personal Data, hypertext markup language files, scripts, programs, recordings, sound, music, graphics, images, applets, or servlets that are created, provided, uploaded, or transferred by Client and any user authorized by Client. "Personal Data" means any information that can be used to identify a specific individual, such as name, address, home address, or phone number that is provided to Trusteer to store, process, or transfer on Client's behalf. 1.2 IBM Security Trusteer Apex Advanced Malware Protection IBM Security Trusteer Malware Advanced Protection ("Trusteer Apex") aims to protect corporate endpoints from advanced threats by applying multiple layers of protection to identify and block malicious attacks on employees' endpoints, without prior knowledge of the attack. IBM Security Trusteer Apex Advanced Malware Protection follows the threat lifecycle and applies integrated multilayered defense to break the cyber-attack chain in multiple places. The combined defense layers aim to preempt attempts to compromise the endpoint with advanced malware or to steal end user credentials. IBM Security Trusteer Apex Advanced Malware Protection employs the following layers of protection, including: Corporate credentials protection: Alert and help prevent credentials phishing and unauthorized credential reuse on non-corporate sites. Exploit chain disruption: Help protect against malware infections resulting from exploitation of known and unknown zero-day application vulnerabilities. Lockdown for Java: Help protect against high-risk actions by malicious Java applications. Malicious communication prevention: Help prevent malware from establishing communication channels with the attacker and block data exfiltration. Cloud-based file inspection: Identify and help prevent execution of known malicious file by inspecting them against a repository that consolidates over 20 anti-virus engines. Trusteer Apex includes the following: a. Trusteer Apex Software Suite: Access and use of the software, known as IBM Security Trusteer Apex Advanced Malware Protection software suite, is made available to download onto Client's Authorized Users' desktops or laptops solely for Client's internal business operations purposes, provided that Client deploys the Trusteer Apex software suite to no more than the maximum number of Authorized Users, as such i (12/2014) Page 1 of 8
2 number is specified in the Order Document. If applicable (in the event of Trusteer Splash deployment), Client must reproduce all copyright notices and other legends of ownership on each copy, or partial copy, of the IBM Security Trusteer Apex Advanced Malware Protection Software Suite. b. Trusteer Management Application ("TMA"): The TMA is made available on the IBM Security Trusteer cloud-hosted environment, through which the Client (and unlimited number of its authorized personnel) can (i) receive event data reporting and risk assessments, (ii) view, configure, and set security policies and policies relating to reporting of the events data, (iii) if applicable, configure the manner in which the IBM Security Trusteer Apex Advanced Malware Protection software suite operates, and (iv) control the installation and distribution of downloads and upgrades to the IBM Security Trusteer Apex Advanced Malware Protection software suite as received from the TMA. c. Web Script: If applicable, for access on a website for the purposes of accessing or using the IBM Cloud Services. d. Events data: The Client can use the TMA to receive events data generated from the IBM Security Trusteer Apex Advanced Malware Protection software suite. e. Trusteer Splash: If applicable, the Trusteer Splash marketing platform identifies and markets the IBM Security Trusteer Apex Advanced Malware Protection software suite to Client's Authorized Users. f. Trademark and Marketing Licenses: Client may agree to provide its trademarks, logos or icons for use in connection with the TMA and only for utilization with the Trusteer Splash and for display in the Trusteer Apex Advanced Malware Protection software suite or on the landing pages hosted by IBM. Any use of its provided trademarks, logos, or icons will be in accordance with IBM's reasonable policies regarding advertising and trademark usage. g. For avoidance of doubt, this license grant does not include the right to deploy IBM Security Trusteer Apex Advanced Malware Protection software suite on mobile devices. h. Any module of IBM Security Trusteer Apex Advanced Malware Protection not listed herein, either currently available or under development, is not considered an update and must be licensed separately. i. IBM Security Trusteer Apex Advanced Malware Protection is owned by IBM or an IBM supplier, and is copyrighted and licensed, not sold. Client may not 1) use, copy, modify, or distribute IBM Security Trusteer Apex Advanced Malware Protection except as expressly permitted in this Service Description; 2) reverse assemble, reverse compile, otherwise translate, or reverse engineer IBM Security Trusteer Apex Advanced Malware Protection, except as expressly permitted by law without the possibility of contractual waiver; or 3) sublicense, rent, or lease the IBM Security Trusteer Apex Advanced Malware Protection, except as provided herein. j. Client agrees to create, retain, and provide to IBM and its auditors accurate written records, system tool outputs, and other system information sufficient to provide auditable verification that Client's use of IBM Security Trusteer Apex Advanced Malware Protection is in compliance with terms of this Service Description. 1.3 IBM Security Trusteer Apex Advanced Malware Protection Local Manager IBM Security Trusteer Apex Advanced Malware Protection Local Manager is an add-on to the IBM Security Trusteer Apex Advanced Malware Protection Cloud Service. This virtual appliance enables organizations to send security event data from Trusteer Apex Advanced Malware Protection Local Manager to IBM QRadar Security SIEM and for other third party SIEM for consolidated cross-product security analysis and forensics. IBM Security Trusteer Apex Advanced Malware Protection Local Manager is deployed on VMware ESXi or VirtualBox. IBM Security Trusteer Apex Advanced Malware Protection Local Manager virtual appliance comes prebundled with Linux operation system. This offering is provided under separate IBM and third party license. i (12/2014) Page 2 of 8
3 1.4 Restrictions For avoidance of doubt, Client will not market or otherwise recommend to use and download the IBM Security Trusteer Apex Advanced Malware Protection software suite to any person, except as provided in this Service Description, or use the IBM Security Trusteer Apex Advanced Malware Protection software suite for any other purpose other than for Client's internal business operations or its users' use, as any other use requires a different entitlement. 1.5 Possible Conflicts There may be conflicts between the IBM Security Trusteer Apex Advanced Malware Protection software suite and certain third party security products. Known conflicts and resolutions are posted on the support site currently located at Trusteer may update the location and content of the support site from time to time. 1.6 Premium Support Client is entitled to Premium Support only for IBM Cloud Services for which Client has subscribed to the associated Premium Support offering. 1.7 Deployment of IBM Security Trusteer Malware Protection (Apex) Client's base subscription includes required setup and initial deployment activities, including initial onetime provisioning and configuration. Additional services may be contracted for an additional charge under a separate agreement. 2. Security Description 2.1 Lawful Use and Consent Authorization to Collect and Process Data The IBM Cloud Services are designed to help Client improve its security environment and data. The IBM Cloud Services will collect information from Authorized Users that alone or in combination may be considered Personal Information in some jurisdictions. Collected data may include user IP address, user ID, security events, user name and address provided for the purpose of contacting IBM for Client support, Client Affiliation, visits to protected Applications and phishing sites, and files and data collected remotely by IBM personnel to inspect suspected malware, malicious activity, or malfunction. Data collection and processing practices may be updated to improve the functionality of the IBM Cloud Services. A document with a full description of the data collection and processing practices is updated as needed and is available to Client upon request. Client authorizes IBM to collect this information and process it in accordance with the Cross Border Transfers (Section 2.2). Informed Consent from Data Subjects Use of the IBM Cloud Services may implicate various laws or regulations. The IBM Cloud Services may be used only for lawful purposes and in a lawful manner. Client agrees to use the IBM Cloud Services pursuant to, and assumes all responsibility for complying with, applicable laws, regulations and policies. Client agrees that it has obtained or will obtain any fully informed consents, permissions, or licenses necessary to enable lawful use of the IBM Cloud Services and to permit collection and processing of the information by IBM as Client's data processor through the IBM Cloud Services. 2.2 Cross Border Transfers Client agrees that IBM may process the Content, including any Personal Data as identified in section 1.10 above, under relevant laws and requirements across a country border to processors and sub-processors in the following countries outside of the European Economic Area and countries considered by the European Commission to have adequate levels of security: the USA. 2.3 EU Data Privacy If Client makes Personal Data available to IBM Cloud Services in the EU Member States, Iceland, Liechtenstein, Norway, or Switzerland, or if Client has Eligible Participants or Client Devices in those countries, then Client as the sole controller appoints IBM as a processor to process (as those terms are defined in EU Directive 95/46/EC) Personal Data. IBM will only process such Personal Data to the extent required to make the IBM Cloud Services available in accordance with IBM's published descriptions of IBM Cloud Services and Client agrees that any such processing is in accordance with Client's instructions. If IBM makes a change to the way it processes or secures Personal Data as part of IBM i (12/2014) Page 3 of 8
4 Cloud Services and the change causes Client to be noncompliant with data protection laws applicable to it, Client may terminate the current Subscription Period for the affected IBM Cloud Services, by providing written notice to IBM within thirty (30) days of IBM's notification of the change to Client. Client agrees that IBM may process Content including any Personal Data across a country border to the following processors and sub-processors: Name of Processor / Subprocessor Role (Data Processor or Subprocessor) Location The IBM contracting entity Processor As stated on the order document Amazon Web Services LLC Sub-processor 410 Terry Ave N Seattle, WA, United States Connectria Corp. Sub-processor Olive Blvd., Suite 300 St. Louis, MO United States IBM Israel Ltd. Sub-processor 94 Derech Em-Hamoshavot Petach-Tikva Israel IBM Corp. Sub-processor 1 New Orchard Rd, Armonk, NY United States Client agrees that IBM may, on notice, vary this list of country locations when it reasonably determines it necessary for the provision of the Cloud Services. When IBM's US-EU and Swiss-EU Safe Harbor Frameworks do not apply to a transfer of EEA or Swiss Personal Data, the parties or their relevant affiliates may enter into separate standard unmodified EU Model Clause agreements in their corresponding roles pursuant to EC Decision 2010/87/EU with optional clauses removed. All disputes or liability arising under these agreements, even if entered into by affiliates, will be treated by the parties as if the dispute or liability arose between them under the terms of this Agreement. 2.4 Security Policies IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure. 2.5 Access Control Access to client data, if required, is allowed only by authorized IBM support representatives according to principles of segregation of duties. IBM staff use two-factor authentication to an intermediate "gateway" management host. 2.6 Activity Logging IBM maintains logs of its activity for systems, applications, data repositories, middleware and network infrastructure devices that are capable of and configured for logging activity. To minimize the possibility of tampering and to enable central analysis, alerting and reporting, logs are analyzed in real-time and via periodic analysis reports to detect anomalous behavior. Operations staff is alerted to 24x Physical Security IBM maintains physical security standards designed to restrict unauthorized physical access to IBM data centers. Only limited access points exist into the data centers, which are controlled by two-factor authentication and monitored by surveillance cameras. Access is allowed only to authorized staff that have approved access. Operations staff verifies the approval and issues an access badge granting the necessary access. Employees issued such badges must surrender other access badges and can only possess the data center access badge for the duration of their activity. Usage of badges is logged. Non- IBM visitors are registered upon entering on premises and are escorted when they are on the premises. Delivery areas and loading docks and other points where unauthorized persons may enter the premises are controlled and isolated. i (12/2014) Page 4 of 8
5 2.8 Compliance IBM certifies its privacy practices annually as consistent with the U.S. Department of Commerce's Safe Harbor Principles: Notice, Choice, Onward Transfer, Access and Accuracy, Security, and Oversight/Enforcement. IBM performs industry standard SSAE 16 audits (or their equivalent) annually in production data centers. IBM reviews security and privacy-related activities for compliance with IBM's business requirements. Assessments and audits are conducted regularly by IBM to confirm compliance with its information security policies. IBM employees and vendor employees complete workforce security and awareness training annually. Personnel are reminded of their job objectives and their responsibility to meet ethical business conduct, confidentiality, and IBM's security obligations annually. 3. Service Level Commitment IBM provides the following availability service level agreement ("SLA") for the Cloud Service. You understand that the SLA does not constitute a warranty to you. 3.1 Definitions a. "Availability Credit" means the remedy IBM will provide for a validated Claim. The Availability Credit will be applied in the form of a credit or discount against a future invoice of subscription charges for the Cloud Service. b. "Claim" means a claim you submit to IBM pursuant to the SLA that a Service Level has not been met during a Contracted Month. c. "Contracted Month" means each full month during the term measured from 12:00 a.m. Eastern US time on the first day of the month through 11:59 p.m. Eastern US time on the last day of the month. d. "Downtime" means a period of time during which production system processing for the Cloud Service has stopped and your users are unable to use all aspects of the Cloud Service for which they have permissions. Downtime does not include the period of time when the Cloud Service is not available because of: (1) a scheduled or announced maintenance outage; (2) Events or causes beyond IBM's control (e.g., natural disaster, internet outages, emergency maintenance, etc.); (3) problems with your applications, equipment or data, or a third party's applications, equipment or data; (4) your failure to adhere to required system configurations and supported platforms for accessing the Cloud Service; or (5) IBM's compliance with any designs, specifications, or instructions that you provide to IBM or a third party provides to IBM on your behalf. e. "Event" means a circumstance or set of circumstances taken together, resulting in a failure to meet a Service Level. f. "Service Level" means the standard set forth below by which IBM measures the level of service it provides in this SLA. 3.2 Availability Credits a. To submit a Claim, you must log a Severity 1 support ticket (as defined below in the Technical Support section) for each Event with the IBM technical support help desk, within twenty-four (24) hours of your first becoming aware that the Event has impacted your use of the Cloud Service. You must provide all necessary information about the Event and reasonably assist IBM with the diagnosis and resolution of the Event. b. You must submit your Claim for an Availability Credit no later than three (3) business days after the end of the Contracted Month in which the Claim arose. c. Availability Credits are based on the duration of the Downtime measured from the time you report that you were first impacted by the Downtime. For each valid Claim, IBM will apply the highest applicable Availability Credit based on the achieved Service Level during each Contracted Month, as shown in the table below. IBM will not be liable for multiple Availability Credits for the same Event in the same Contracted Month. i (12/2014) Page 5 of 8
6 d. The total Availability Credits awarded with respect to any Contracted Month shall not, under any circumstance, exceed 10 percent (10%) of one twelfth (1/12th) of the annual charge paid by you to IBM for the Cloud Service. 3.3 Service Levels Availability of the Cloud Service during a Contracted Month Availability during a Contracted Month Availability Credit (% of Monthly Subscription Fee for Contracted Month that is the subject of a Claim) <99.5% 2% <98.0% 5% <96.0% 10% Availability, expressed as a percentage, is calculated as: (a) the total number of minutes in a Contracted Month minus (b) the total number of minutes of Downtime in a Contracted Month, divided by (c) the total number of minutes in a Contracted Month. Example: 250 minutes total Downtime during Contracted Month 43,200 total minutes in a 30 day Contracted Month minutes Downtime = 42,950 minutes 43,200 total minutes = 2% Availability Credit for 99.4% Achieved Service Level during the Contracted Month 3.4 Other information about this SLA This SLA is made available only to IBM's clients and does not apply to claims made by your users, guests, participants and permitted invitees of the Cloud Service or to any beta or trial services that IBM provides. The SLA only applies to the Cloud Services that are in production use. It does not apply to nonproduction environments, including but not limited to test, disaster recovery, quality assurance, or development. The SLA only applies if Client has not breached any material obligations under the Cloud Service Agreement, including without limitation, breach of any payment obligations. 4. Entitlement and Billing Information 4.1 Charge Metrics The Cloud Services are made available under one of the following charge metrics as specified in the Order Document: a. Authorized User is a unit of measure by which the IBM Cloud Services can be obtained. Client must obtain separate, dedicated entitlements for each unique Authorized User given access to the IBM Cloud Services in any manner directly or indirectly (for example: via a multiplexing program, device, or application server) through any means. Sufficient entitlements must be obtained to cover the number of Authorized Users given access to the IBM Cloud Services during the measurement period specified in Client's Order Document. b. Instance is a unit of measure by which the IBM Cloud Services can be obtained. An Instance is access to a specific configuration of the IBM Cloud Services. Sufficient entitlements must be obtained for each Instance of the IBM Cloud Services made available to access and use during the measurement period specified in Client's Order Document. 4.2 Charges and Billing The amount payable for the Cloud Service is specified in an Order Document. 4.3 Partial Month Charges The partial month charge is a pro-rated daily rate. The partial month charges are calculated based on the remaining days of the partial month starting on the date you are notified by IBM that your access to the Cloud Service offering is available. 5. Compliance and Auditing Access to the IBM Security Trusteer Malware Protection Cloud Services is subject to a maximum quantity of Authorized Users or Instances as specified in the Order Document. Client is responsible for ensuring i (12/2014) Page 6 of 8
7 that their number of Authorized Users or Instances does not exceed the maximum quantity as specified in the Order Document. An audit may be conducted to verify compliance with maximum quantity of Authorized Users or Instances. 6. Term and Renewal Options 6.1 Term The term of the Cloud Service begins on the date that IBM notifies you that you have access to the Cloud Service, as described in the Order Document. The PoE portion of the Order Document will confirm the exact date of the start and end of the term. You are permitted to increase your level of use of the Cloud Service during the term by contacting IBM or your IBM Business Partner. We will confirm the increased level of usage in the Order Document. 6.2 Cloud Services Term Renewal Options Your Order Document will set forth whether the Cloud Service will renew at the end of the term, by designating the term as one of the following: Automatic Renewal If your Order Document states that your renewal is automatic, you may terminate the expiring Cloud Service term by written request, at least ninety (90) days prior to the expiration date of the term that is set forth in the Order Document. If IBM or your IBM Business Partner does not receive such termination notice by the expiration date, the expiring term will be automatically renewed for either a one year term or the same duration as the original term as set forth in the PoE Continuous Billing When the Order Document states that your billing is continuous, you will continue to have access to the Cloud Service following the end of your term and will be billed for the usage of the Cloud Service on a continuous basis. To discontinue use of the Cloud Service and stop the continuous billing process, you must provide IBM or your IBM Business Partner with ninety (90) days written notice requesting that your Cloud Service be cancelled. Upon cancellation of your access, you will be billed for any outstanding access charges through the month in which the cancellation took effect Renewal Required When the Order Document states that your renewal type is "terminate", the Cloud Service will terminate at the end of the term and your access to the Cloud Service will be removed. To continue to use the Cloud Service beyond the end date, you must place an order with your IBM sales representative or IBM Business Partner to purchase a new subscription term. 7. Technical Support Technical Support for the IBM Cloud Service is to a Client and its Authorized Users to assist in their use of the IBM Cloud Services. Standard Support is included in the subscription of all offerings. For each IBM Cloud Services offering, a Premium Support subscription is available for an additional charge. Standard Support: 8AM-5PM local time support. Client's Authorized Users can submit support tickets electronically, as detailed in the Software as a Service [SaaS] Support Handbook. Clients can access Client Support Portal for notifications, documents, case reports and FAQs at: For support options and details access the Support Handbook: 01.ibm.com/software/support/handbook.html. Premium Support: 24x7 support for all severities. Clients can reach support directly via phone. Client's Authorized Users can submit support tickets electronically, as detailed in the Software as a Service [SaaS] Support Handbook. i (12/2014) Page 7 of 8
8 Clients can access Client Support Portal for notifications, documents, case reports and FAQs at: For support options and details access the Support Handbook: 01.ibm.com/software/support/handbook.html. 8. Safe Harbor Compliance IBM Cloud Services specified in this Service Description are included in Trusteer, LLC. (IBM Subsidiary) US-EU Safe Harbor certification. Both IBM and Trusteer abide by the U.S. EU Safe Harbor Framework as set forth by the United States Department of Commerce regarding the collection, use and retention of information collected from the European Union. For more information about Safe Harbor or to access IBM's certification statement, go to 9. Enabling Software This Cloud Service offering may include enabling software. You may use the enabling software only in association with your use of the Cloud Service for the length of the term of the Cloud Service. To the extent that the enabling software contains sample code, you have the additional right to make derivative works of the sample code and use them consistent with this grant. The enabling software is provided subject to the SLA, if any, as a component of the Cloud Service, and is subject to the applicable license agreement(s). 10. Additional Information 10.1 Tracking Technologies You are aware and agree that IBM may, as part of the normal operation and support of the IBM Cloud Services, collect personal information from you (your employees and contractors) related to the use of the IBM Cloud Services, through tracking and other technologies. IBM does so to gather usage statistics and information about effectiveness of our Cloud Services to improve user experience and/or tailor interactions with you. You confirm that you will obtain or have obtained consent to allow IBM to process the collected personal information for the above purpose within IBM, other IBM companies and their subcontractors, wherever we and our subcontractors do business, in compliance with applicable law. IBM will comply with requests from your employees and contractors to access, update, correct or delete their collected personal information Derived Benefit Locations Where applicable, taxes are based upon the location(s) you identify as receiving benefit of the Cloud Services. IBM will apply taxes based upon the business address listed when ordering a Cloud Service as the primary benefit location unless you provide additional information to IBM. You are responsible for keeping such information current and providing any changes to IBM No Personal Health Information The Cloud Service is not designed to comply with HIPAA and may not be used for the transmission or storage of any Personal Health Information. i (12/2014) Page 8 of 8
IBM Cloud Service Description: Watson Analytics
IBM Cloud Services Agreement IBM Cloud Service Description: Watson Analytics The following is the Service Description for your Order: 1. Cloud Service The Cloud Service offering is described below, portions
More informationIBM Security Intelligence on Cloud
Service Description IBM Security Intelligence on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients
More informationIBM Case Manager on Cloud
Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients of the
More informationIBM Security Trusteer Fraud Protection
Service Description 1. Cloud Service IBM Security Trusteer Fraud Protection The Cloud Service offering, is described below and is specified in an Order Document for the selected entitled offerings. The
More informationIBM Emptoris Managed Cloud Delivery
Service Description IBM Emptoris Managed Cloud Delivery The following is the Service Description for your Order: 1. Cloud Service The Cloud Service offering, is described below and is specified in an Order
More informationIBM Sterling B2B Services File Transfer Service
Service Description IBM Sterling B2B Services File Transfer Service This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients
More informationIBM WebSphere Cast Iron Live
IBM Terms of Use SaaS Specific Offering Terms IBM WebSphere Cast Iron Live The Terms of Use ( ToU ) is composed of this IBM Terms of Use - SaaS Specific Offering Terms ( SaaS Specific Offering Terms )
More informationIBM Silverpop Engage SMS
IBM Terms of Use SaaS Specific Offering Terms IBM Silverpop Engage SMS The Terms of Use ( ToU ) is composed of this IBM Terms of Use - SaaS Specific Offering Terms ( SaaS Specific Offering Terms ) and
More informationIBM Emptoris Managed Cloud Delivery
Service Description IBM Emptoris Managed Cloud Delivery This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of
More informationIBM Emptoris Managed Cloud Delivery
Service Description IBM Emptoris Managed Cloud Delivery This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of
More informationIBM Commerce Insights
Service Description IBM Commerce Insights This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud Service.
More informationService Description. MaaS360 (SaaS) 1. Cloud Service. 1.1 IBM MaaS360 (SaaS)
Service Description 1. Cloud Service MaaS360 (SaaS) The Cloud Service offering, is described below and is specified in an Order Document for the selected entitled offerings. The Order Document will consist
More informationIBM Partner Engagement Manager
Service Description IBM Partner Engagement Manager This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud
More informationIBM Resilient Incident Response Platform On Cloud
Service Description IBM Resilient Incident Response Platform On Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized
More informationIBM Resilient Incident Response Platform On Cloud
Service Description IBM Resilient Incident Response Platform On Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and
More informationService Description. IBM Aspera Files. 1. Cloud Service. 1.1 IBM Aspera Files Personal Edition. 1.2 IBM Aspera Files Business Edition
Service Description IBM Aspera Files This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud Service.
More informationIBM PureApplication Service
Service Description IBM PureApplication Service This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud
More informationIBM Fraud Risk Assessment Add-Ons for IBM i2
Service Description IBM Fraud Risk Assessment Add-Ons for IBM i2 This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized users
More informationIBM Cloud Identity Service
IBM Terms of Use SaaS Specific Offering Terms IBM Cloud Identity Service The Terms of Use ( ToU ) is composed of this IBM Terms of Use - SaaS Specific Offering Terms ( SaaS Specific Offering Terms ) and
More informationIBM Sterling B2B Services
Service Description IBM Sterling B2B Services This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud
More informationIBM Silverpop Engage SMS
Service Description IBM Silverpop Engage SMS This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud Service.
More informationIBM Case Manager on Cloud
Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud
More informationIBM Resilient Incident Response Platform On Cloud
Service Description IBM Resilient Incident Response Platform On Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized
More informationIBM Incentive Compensation Management on Cloud
Service Description IBM Incentive Compensation Management on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients
More informationIBM MaaS360 (SaaS) 1.1 IBM MaaS360 Mobile Device Management (SaaS) and IBM MaaS360 Mobile Device Management (SaaS) Step up for existing customers
Service Description IBM MaaS360 (SaaS) This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud Service.
More informationIBM Watson Analytics for Social Media
Service Description IBM Watson Analytics for Social Media This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of
More informationIBM Content Manager OnDemand on Cloud
Service Description IBM Content Manager OnDemand on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of
More informationIBM App Connect Professional
Service Description IBM App Connect Professional This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud
More informationIBM App Connect Enterprise on IBM Cloud
Service Description IBM App Connect Enterprise on IBM Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized users and
More informationUpdated December 12, Chapter 10 Service Description IBM Cloud for Government
Updated December 12, 2018 Chapter 10 Service Description IBM Cloud for Government IBM Cloud for Government This Service Description describes IBM s Cloud for Government available to Clients under the Federal
More informationIBM Watson Analytics
Service Description IBM Watson Analytics This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients of the Cloud
More informationIBM Aspera on Cloud. The Standard Edition of this Cloud Service is available on a subscription basis. It includes:
Service Description IBM Aspera on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized users and recipients of the Cloud
More informationIBM IoT Connected Vehicle Insights
Service Description IBM IoT Connected Vehicle Insights This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized users and recipients
More informationData Security and Privacy Principles IBM Cloud Services
Data Security and Privacy Principles IBM Cloud Services 2 Data Security and Privacy Principles: IBM Cloud Services Contents 2 Overview 2 Governance 3 Security Policies 3 Access, Intervention, Transfer
More informationIBM IoT Connection Service
Service Description IBM IoT Connection Service This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized users and recipients of
More informationIBM dashdb for Analytics
Service Description IBM dashdb for Analytics This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud Service.
More informationIBM Partner Engagement Manager
Service Description IBM Partner Engagement Manager This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized users and recipients
More information"PPS" is Private Practice Software as developed and produced by Rushcliff Ltd.
Rushcliff Ltd Data Processing Agreement This Data Processing Agreement ( DPA ) forms part of the main terms of use of PPS, PPS Express, PPS Online booking, any other Rushcliff products or services and
More informationXO SITE SECURITY SERVICES
XO SITE SECURITY SERVICES 1.0 Product and Services 1.1 Product Description. XO Site Security (the "Service") is a managed security service which uses Premises-based, multi-threat sensing Customer Premises
More informationHPE DATA PRIVACY AND SECURITY
ARUBA, a Hewlett Packard Enterprise company, product services ( Services ) This Data Privacy and Security Agreement ("DPSA") Schedule governs the privacy and security of Personal Data by HPE in connection
More informationService Description. IBM DB2 on Cloud. 1. Cloud Service Description. 1.1 DB2 on Cloud. 1.2 IBM Bluemix
Service Description 1. Cloud Service Description IBM DB2 on Cloud This Service Description describes the Cloud Service IBM provides to Client, including DB2 on Cloud and the Bluemix application development
More informationIBM Sterling B2B Services
Service Description IBM Sterling B2B Services This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized users and recipients of
More informationSecure Messaging Mobile App Privacy Policy. Privacy Policy Highlights
Secure Messaging Mobile App Privacy Policy Privacy Policy Highlights For ease of review, Everbridge provides these Privacy Policy highlights, which cover certain aspects of our Privacy Policy. Please review
More informationGDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd
GDPR Processor Security Controls GDPR Toolkit Version 1 Datagator Ltd Implementation Guidance (The header page and this section must be removed from final version of the document) Purpose of this document
More informationSolution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites
Solution Pack Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Subject Governing Agreement DXC Services Requirements Agreement between DXC and Customer including DXC
More informationIBM Watson Campaign Automation SMS
Service Description IBM Watson Campaign Automation SMS This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized users and recipients
More informationIBM Cloud Service Description: IBM SmartCloud for Social Business
IBM Cloud Services Agreement IBM Cloud Service Description: IBM for Social Business The following is the Service Description for your Order: 1. Cloud Service Descriptions The following are Cloud Service
More informationData Processing Agreement for Oracle Cloud Services
Data Processing Agreement for Oracle Cloud Services Version January 12, 2018 1. Scope, Order of Precedence and Term 1.1 This data processing agreement (the Data Processing Agreement ) applies to Oracle
More informationIBM Cloud Video Streaming
Service Description IBM Cloud Video Streaming This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud
More informationIBM dashdb Enterprise
Service Description IBM dashdb Enterprise This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud Service.
More informationSERVICE TERMS AND SLA FOR LEASE OF DARK FIBER
SERVICE TERMS AND SLA FOR LEASE OF DARK FIBER Dark Fiber Lease. These are the service terms and service level agreement for the lease of Global Crossing Dark Fiber which apply to the provision of Dark
More informationGDPR AMC SAAS AND HOSTED MODULES. UK version. AMC Consult A/S June 26, 2018 Version 1.10
GDPR AMC SAAS AND HOSTED MODULES UK version AMC Consult A/S June 26, 2018 Version 1.10 INDEX 1 Signatures...3 2 General...4 3 Definitions...5 4 Scoping...6 4.1 In scope...6 5 Responsibilities of the data
More informationManaged Security Services - Endpoint Managed Security on Cloud
Services Description Managed Security Services - Endpoint Managed Security on Cloud The services described herein are governed by the terms and conditions of the agreement specified in the Order Document
More informationIBM Silverpop Engage
IBM Terms of Use SaaS Specific Offering Terms IBM Silverpop Engage The Terms of Use ( ToU ) is composed of this IBM Terms of Use - SaaS Specific Offering Terms ( SaaS Specific Offering Terms ) and a document
More informationSaba Hosted Customer Privacy Policy
Saba Hosted Customer Privacy Policy Last Revised 23 May 2018 1. Introduction Saba is committed to protecting information which can be used to directly or indirectly identify an individual ( personal data
More informationOSIsoft PI Cloud Services Privacy Statement
OSIsoft PI Cloud Services Privacy Statement Last updated: December 2016 Scope This notice applies to the use of those services and any other OSIsoft services that display or link to this notice. These
More informationService Level Agreement for Microsoft Online Services
Service Level Agreement for Microsoft Online Services Last updated on: January 1, 2015 1. Introduction. This Service Level Agreement for Microsoft Online Services (this SLA ) is made by Microsoft in connection
More informationData Processing Amendment to Google Apps Enterprise Agreement
Data Processing Amendment to Google Apps Enterprise Agreement The Customer agreeing to these terms ( Customer ) and Google Inc., Google Ireland, or Google Asia Pacific Pte. Ltd. (as applicable, Google
More informationIBM Algo Risk Content on Cloud
Service Description IBM Algo Risk Content on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized users and recipients
More informationDocument Cloud (including Adobe Sign) Additional Terms of Use. Last updated June 5, Replaces all prior versions.
Document Cloud (including Adobe Sign) Additional Terms of Use Last updated June 5, 2018. Replaces all prior versions. These Additional Terms govern your use of Document Cloud (including Adobe Sign) and
More informationIBM Silverpop Engage SMS
IBM Terms of Use SaaS Specific Offering Terms IBM Silverpop Engage SMS The Terms of Use ( ToU ) is composed of this IBM Terms of Use - SaaS Specific Offering Terms ( SaaS Specific Offering Terms ) and
More informationSECURITY & PRIVACY DOCUMENTATION
Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive
More informationEmsi Privacy Shield Policy
Emsi Privacy Shield Policy Scope The Emsi Privacy Shield Policy ( Policy ) applies to the collection and processing of Personal Data that Emsi obtains from Data Subjects located in the European Union (
More informationService Description VMware Workspace ONE
VMware Workspace ONE Last Updated: 05 April 2018 The product described in this Service Description is protected by U.S. and international copyright and intellectual property laws. The product described
More informationEU Data Protection Agreement
EU Data Protection Agreement This Data Protection Agreement ("Agreement") is entered into by and between TechTarget, Inc., a Delaware corporation with a principle place of business at 275 Grove Street,
More informationSLA for Virtual Machines
SLA for Virtual Machines Updated: 05/2017 For all Virtual Machines that have two or more instances deployed in the same Availability Set, we guarantee you will have Virtual Machine Connectivity to at least
More informationDATA PROCESSING TERMS
DATA PROCESSING TERMS Safetica Technologies s.r.o. These Data Processing Terms (hereinafter the Terms ) govern the rights and obligations between the Software User (hereinafter the User ) and Safetica
More informationVersion v November 2015
Service Description HPE Project and Portfolio Management on Software-as-a- Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Project and
More informationGerman Data Processing Addendum MailChimp
Customer EU Data Processing Addendum This Data Processing Addendum ("DPA"), forms part of the Agreement between The Rocket Science Group LLC d/b/a MailChimp ("MailChimp") and CK Coaching Köln ("Customer")
More informationIBM Managed Security Services for Security
Service Description 1. Scope of Services IBM Managed Security Services for E-mail Security IBM Managed Security Services for E-mail Security (called MSS for E-mail Security ) may include: a. E-mail Antivirus
More informationCustomer EU Data Processing Addendum
From: MailChimp Legal Team To: TC - Info - Heart of the City Subject: MailChimp Data Processing Addendum Date: 10 May 2018 13:15:11 Attachments: ATT00001.png Customer EU Data Processing Addendum This Data
More informationADIENT VENDOR SECURITY STANDARD
Contents 1. Scope and General Considerations... 1 2. Definitions... 1 3. Governance... 2 3.1 Personnel... 2 3.2 Sub-Contractors... 2 3.3. Development of Applications... 2 4. Technical and Organizational
More informationGoogle Cloud & the General Data Protection Regulation (GDPR)
Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to
More informationPRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) CUSTOM APN ATTACHMENT
PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) CUSTOM APN ATTACHMENT Last Revised: 12/20/17 1. Private Mobile Connection - Custom APN. Pursuant to the terms and conditions of
More information1.2 Participant means a third party who interacts with the Services as a result of that party s relationship with or connection to you.
Document Cloud (including Adobe Sign) Additional Terms of Use Last updated June 16, 2016. Replaces the prior version in its entirety. Capitalized terms used in these Document Cloud Additional Terms ( Additional
More informationWeather Company Alerts for Engagement
Service Description Weather Company Alerts for Engagement This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized users and recipients
More informationBT Assure Cloud Identity Annex to the General Service Schedule
1 Defined Terms The following definitions apply, in addition to those in the General Terms and Conditions and the General Service Schedule of the Agreement. Administrator means a Customer-authorised person
More informationBeam Technologies Inc. Privacy Policy
Beam Technologies Inc. Privacy Policy Introduction Beam Technologies Inc., Beam Dental Insurance Services LLC, Beam Insurance Administrators LLC, Beam Perks LLC, and Beam Insurance Services LLC, (collectively,
More informationUniversity of Pittsburgh Security Assessment Questionnaire (v1.7)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided
More informationService Description. IBM Marketing Cloud. 1. Cloud Service. 1.1 IBM Marketing Cloud Standard
Service Description IBM Marketing Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud Service.
More informationPrivacy Shield Policy
Privacy Shield Policy Catalyst Repository Systems, Inc. (Catalyst) has adopted this Privacy Shield Policy ("Policy") to establish and maintain an adequate level of Personal Data privacy protection. This
More informationRegistration Agreement
Registration Agreement Grove Technologies, LLC, doing business as GroveSite ( GroveSite ), owns proprietary GroveSite software and related documentation, and operates the GroveSite Platform (as defined
More informationSLA. Service Level Agreement v1.0. Published: September 2014
SLA Service Level Agreement v1.0 Published: September 2014 The information contained in this document represents the current view of Circuit ID on the issues discussed as of the date of publication. Because
More informationIBM Managed Security Services - Vulnerability Scanning
Service Description IBM Managed Security Services - Vulnerability Scanning This Service Description describes the Service IBM provides to Client. 1.1 Service IBM Managed Security Services - Vulnerability
More informationBT Compute Protect Schedule to the General Terms
BT Compute Protect Schedule to the General Terms Contents A note on you... 2 Words defined in the General Terms... 2 Part A The BT Compute Protect Service... 2 1 Service Summary... 2 2 Standard Service
More informationKenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V3.0, MAY 2017 Multiple Layers of Protection Overview Password Salted-Hash Thank you
More informationDell Service Level Agreement for Microsoft Online Services
Dell Service Level Agreement for Microsoft Online Services 1. Introduction. This Dell Service Level Agreement for Microsoft Online Services (this SLA ) is made by DELL PRODUCTS L.P., A TEXAS LIMITED PARTNERSHIP,
More informationSDL Privacy Policy Cloud Services
SDL Privacy Policy Cloud Services Software-As-A-Service Products Version 11-04-2017 v1.4 SDL plc Globe House Clivemont Road, Maidenhead SL6 7DY England www.sdl.com SDL Tridion Infrastructure Summary This
More informationHIGHSOFT SOLUTIONS AS STANDARD LICENSE TERMS AND CONDITIONS 2.2
HIGHSOFT SOLUTIONS AS STANDARD LICENSE TERMS AND CONDITIONS 2.2 1. Definitions: Agreement shall mean the standard terms and conditions in this document; Confidential Information shall mean any and all
More informationWORKSHARE SECURITY OVERVIEW
WORKSHARE SECURITY OVERVIEW April 2016 COMPANY INFORMATION Workshare Security Overview Workshare Ltd. (UK) 20 Fashion Street London E1 6PX UK Workshare Website: www.workshare.com Workshare Inc. (USA) 625
More informationClearswift Managed Security Service for
Clearswift Managed Security Service for Email Service Description Revision 1.0 Copyright Published by Clearswift Ltd. 1995 2019 Clearswift Ltd. All rights reserved. The materials contained herein are the
More informationEpicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017)
Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017) GENERAL TERMS & INFORMATION A. GENERAL TERMS & DEFINITIONS 1. This Services Specification
More informationThe Common Controls Framework BY ADOBE
The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.
More informationWeather Company Alerts for Engagement
Service Description Weather Company Alerts for Engagement This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized users and recipients
More information1 Privacy Statement INDEX
INDEX 1 Privacy Statement Mphasis is committed to protecting the personal information of its customers, employees, suppliers, contractors and business associates. Personal information includes data related
More informationSupplementary Terms and Conditions
IBM Deutschland GmbH Supplementary Terms and Conditions for IBM Enterprise Services Version: January 2016 1. Subject These Supplementary Terms and Conditions for IBM Enterprise Services (hereinafter referred
More informationEco Web Hosting Security and Data Processing Agreement
1 of 7 24-May-18, 11:50 AM Eco Web Hosting Security and Data Processing Agreement Updated 19th May 2018 1. Introduction 1.1 The customer agreeing to these terms ( The Customer ), and Eco Web Hosting, have
More informationData Protection and GDPR
Data Protection and GDPR At DPDgroup UK Ltd (DPD & DPD Local) we take data protection seriously and have updated all our relevant policies and documents to ensure we meet the requirements of GDPR. We have
More informationProducts: Software, content and digital materials distributed via the Vuzix App Store.
Vuzix Publisher Distribution Agreement By uploading or otherwise making available applications or any other materials via the Vuzix App Store, you (on behalf of yourself or the business you represent)
More informationVersion v November 2015
Service Description HPE Quality Center Enterprise on Software-as-a-Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Quality Center Enterprise
More information