Service Description. MaaS360 (SaaS) 1. Cloud Service. 1.1 IBM MaaS360 (SaaS)

Similar documents
IBM Cloud Service Description: Watson Analytics

IBM Case Manager on Cloud

IBM Security Intelligence on Cloud

IBM MaaS360 (SaaS) 1.1 IBM MaaS360 Mobile Device Management (SaaS) and IBM MaaS360 Mobile Device Management (SaaS) Step up for existing customers

IBM Sterling B2B Services File Transfer Service

IBM WebSphere Cast Iron Live

IBM Emptoris Managed Cloud Delivery

IBM Security Trusteer Malware Protection (Apex)

Service Description. IBM Aspera Files. 1. Cloud Service. 1.1 IBM Aspera Files Personal Edition. 1.2 IBM Aspera Files Business Edition

IBM Commerce Insights

IBM Resilient Incident Response Platform On Cloud

IBM Resilient Incident Response Platform On Cloud

IBM Partner Engagement Manager

IBM Silverpop Engage SMS

IBM PureApplication Service

IBM Content Manager OnDemand on Cloud

IBM Emptoris Managed Cloud Delivery

IBM Emptoris Managed Cloud Delivery

IBM Case Manager on Cloud

IBM Sterling B2B Services

IBM Watson Analytics

IBM Silverpop Engage SMS

IBM App Connect Professional

IBM Cloud Video Streaming

IBM Aspera on Cloud. The Standard Edition of this Cloud Service is available on a subscription basis. It includes:

IBM dashdb for Analytics

IBM Resilient Incident Response Platform On Cloud

IBM Cloud Service Description: IBM SmartCloud for Social Business

IBM Cloud Identity Service

IBM IoT Connected Vehicle Insights

IBM Security Trusteer Fraud Protection

IBM dashdb Enterprise

IBM App Connect Enterprise on IBM Cloud

Service Description. IBM DB2 on Cloud. 1. Cloud Service Description. 1.1 DB2 on Cloud. 1.2 IBM Bluemix

IBM Incentive Compensation Management on Cloud

Updated December 12, Chapter 10 Service Description IBM Cloud for Government

IBM Watson Campaign Automation SMS

IBM IoT Connection Service

Service Description. IBM Marketing Cloud. 1. Cloud Service. 1.1 IBM Marketing Cloud Standard

IBM Partner Engagement Manager

IBM Watson Analytics for Social Media

IBM Silverpop Engage SMS

IBM Fraud Risk Assessment Add-Ons for IBM i2

IBM Terms of Use SaaS Specific Offering Terms. IBM DB2 on Cloud. 1. IBM SaaS. 2. Charge Metrics

IBM Sterling B2B Services

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights

Service Description. IBM DB2 on Cloud. 1. Cloud Service. 1.1 IBM DB2 on Cloud Standard Small. 1.2 IBM DB2 on Cloud Standard Medium

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites

Data Security and Privacy Principles IBM Cloud Services

Emsi Privacy Shield Policy

"PPS" is Private Practice Software as developed and produced by Rushcliff Ltd.

SAFE-BioPharma RAS Privacy Policy

Saba Hosted Customer Privacy Policy

The Common Controls Framework BY ADOBE

Document Cloud (including Adobe Sign) Additional Terms of Use. Last updated June 5, Replaces all prior versions.

Privacy Policy. Effective date: 21 May 2018

1.2 Participant means a third party who interacts with the Services as a result of that party s relationship with or connection to you.

Service Description VMware Workspace ONE

IBM Algo Risk Content on Cloud

Privacy Policy Effective May 25 th 2018

OSIsoft PI Cloud Services Privacy Statement

ETSY.COM - PRIVACY POLICY

PRIVACY POLICY QUICK GUIDE TO CONTENTS

Privacy Policy... 1 EU-U.S. Privacy Shield Policy... 2

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

Beam Technologies Inc. Privacy Policy

VERSION 1.3 MAY 1, 2018 SNOWFLY PRIVACY POLICY SNOWFLY PERFORMANCE INC. P.O. BOX 95254, SOUTH JORDAN, UT

Weather Company Alerts for Engagement

IBM Managed Security Services for Security

Service Level Agreement for Microsoft Online Services

1 Privacy Statement INDEX

Data Processing Amendment to Google Apps Enterprise Agreement

IBM Silverpop Engage

IBM Application Security on Cloud

Bring Your Own Device

Privacy Policy V2.0.1

TechTarget, Inc. Privacy Policy

Automate sharing. Empower users. Retain control. Utilizes our purposebuilt cloud, not public shared clouds

EU Data Protection Agreement

German Data Processing Addendum MailChimp

IBM Silverpop Engage

Privacy Policy. Overview:

Privacy Shield Policy

What can the OnBase Cloud do for you? lbmctech.com

ecare Vault, Inc. Privacy Policy

MaaS360 Secure Productivity Suite

BRING YOUR OWN DEVICE: POLICY CONSIDERATIONS

TB+ 1.5 Billion+ The OnBase Cloud by Hyland 600,000,000+ content stored. pages stored

IBM Connections Cloud

HPE DATA PRIVACY AND SECURITY

GDPR AMC SAAS AND HOSTED MODULES. UK version. AMC Consult A/S June 26, 2018 Version 1.10

BT One Mobile Secure Devices (MobileIron) Schedule to the General Terms

SECURITY & PRIVACY DOCUMENTATION

Customer EU Data Processing Addendum

Weather Company Alerts for Engagement

Google Cloud & the General Data Protection Regulation (GDPR)

PRIVACY COMMITMENT. Information We Collect and How We Use It. Effective Date: July 2, 2018

SERVICE TERMS AND SLA FOR LEASE OF DARK FIBER

HF Markets SA (Pty) Ltd Protection of Personal Information Policy

IBM Information Server on Cloud

Transcription:

Service Description 1. Cloud Service MaaS360 (SaaS) The Cloud Service offering, is described below and is specified in an Order Document for the selected entitled offerings. The Order Document will consist of the Quotation that is provided and the Proof of Entitlement (PoE) you will receive confirming the start date and term of the Cloud Services. 1.1 IBM MaaS360 (SaaS) MaaS360 is an easy-to-use cloud platform with all of the essential functionality for end-to-end management of today s mobile devices including iphones, ipads, Androids, Kindle Fire devices, Windows Phones and BlackBerry smartphones. Following is a short description of the Cloud Service offerings: a. IBM MaaS360 Mobile Device Management (SaaS) and IBM MaaS360 Mobile Device Management (SaaS) Step up for existing IBM MaaS360 customers The core mobility device management (MDM) features includes device enrollment, configuration, security policy management and device actions, such as send message, locate, lock, and wipe. The Advanced MDM features include automated compliance rules, bring your own device (BYOD) privacy settings, and Mobility Intelligence dashboards and reporting. b. IBM MaaS360 Mobile Application Management (SaaS) and IBM MaaS360 Mobile Application Management (SaaS) Step up for existing IBM MaaS360 customers MaaS360 Mobile Application Management provides the ability to add applications and distribute them to supported devices managed by MaaS360. This includes MaaS360 App Catalog, an ondevice application for users to view, install, and be alerted to updated, managed applications. c. IBM MaaS360 Mobile Application Security (SaaS) and IBM MaaS360 Mobile Application Security (SaaS) Step up for existing IBM MaaS360 customers MaaS360 Mobile Application Security provides additional data protection for enterprise applications that use the WorkPlace SDK during development, or for ios apps upload the application (.ipa), provisioning profile, and signing certificate to be automatically integrated. Mobile Application Security integrates the app with the Secure Productivity Suite. This enables single sign on, Intranet access through the Mobile Enterprise Gateway, and enforcement of data security settings. d. IBM MaaS360 Mobile Enterprise Gateway for Apps (SaaS) and IBM MaaS360 Mobile Enterprise Gateway for Apps (SaaS) Step up for existing IBM MaaS360 customer MaaS360 Mobile Enterprise Gateway for Apps provides users outside the enterprise network secure, seamless access to internal application resources without requiring a full-device, VPN connection. e. IBM MaaS360 Mobile Content Management (SaaS) and IBM MaaS360 Mobile Content Management (SaaS) Step up for existing IBM MaaS360 customer MaaS360 Mobile Content Management allows the administrator to add and distribute documents to the supported devices that are managed by MaaS360 MDM. Includes MaaS360 Doc Catalogue, an on-device, password-protected container that provides a secure and simple way for users to access, view, and share documents. It includes seamless access to distributed content and repositories such as SharePoint, Box, and Google Drive. Access to private SharePoint and Windows files shares are available with the MaaS360 Mobile Enterprise Gateway. Documents managed through MaaS360 can be version controlled, audited, and secured through data loss prevention (DLP) policy options, such as require authentication, restrict copy-paste functionality, and block from being opened or shared in other applications. f. IBM MaaS360 Secure Document Sync (SaaS) and IBM MaaS360 Secure Document Sync (SaaS) Step up for existing IBM MaaS360 customers MaaS360 Secure Document Sync provides users with the ability to easily and securely synchronize user content across managed mobile devices. Administrators can ensure that policies, such as restricting cut-copy-paste, and blocking content from being opened or shared in other apps or are in place for user content across devices. Content is stored securely, both in the cloud and on the device, and accessed only through the MaaS360 Doc Catalogue. i126-6741-01 (11/2014) Page 1 of 10

g. IBM MaaS360 Secure Editor (SaaS) and IBM MaaS360 Secure Editor (SaaS) Step up for existing IBM MaaS360 customers MaaS360 Secure Editor is a powerful office suite that allows users to work with business documents while on the go. MaaS360 Secure Editor enables to: Create and edit.doc,.ppt, and.xls files Presentation mode for slides Easily work with email attachments and other files from MaaS360 for ios h. IBM MaaS360 Mobile Enterprise Gateway for Documents (SaaS) and IBM MaaS360 Mobile Enterprise Gateway for Documents (SaaS) Step up for existing IBM MaaS360 customers With MaaS360 Mobile Enterprise Gateway for Docs, organizations can use MaaS360 Mobile Content Management to additionally offer devices outside the enterprise network secure seamless access to internal Connections sites, SharePoint sites, Windows File Shares and other file stores without requiring a full device VPN connection. Use of MaaS360 Mobile Enterprise Gateway for Docs requires also purchasing MaaS360 Mobile Content Management. Supports ios 5.0 and Android 4.0 or above. i. IBM MaaS360 Mobile Email Management (SaaS) and IBM MaaS360 Mobile Email Management (SaaS) Step up for existing IBM MaaS360 customers MaaS360 Mobile Email Management includes key features in support of Microsoft Exchange ActiveSync and Lotus Traveler. Exchange ActiveSync: Provides support for mobile devices connecting to Microsoft Exchange over the ActiveSync protocol. Features include core mobile device management functions, such as the ability to configure devices, create; enforce ActiveSync policies (passcode, block, or allow access to email); and take device actions, such as lock and wipe, and detailed report on device attributes. Lotus Traveler: Provides support for mobile devices that connect to IBM Lotus Notes over the Lotus Traveler protocol. Features include the ability to configure devices, block or allow devices, enforce passcode policies, wipe devices, and develop detailed report on device attributes.. j. IBM MaaS360 Secure Browser (SaaS) and IBM MaaS360 Secure Browser (SaaS) Step up for existing IBM MaaS360 customers MaaS360 Secure Browser is a full-featured web browser to enable secure access to corporate intranet sites and enforce compliance of content policies by defining website filtering and security policies to ensure that users only access approved web content that is based on a number of content categories, such as social networking, explicit, or malware sites. Includes the ability to disable native and third-party web browsers either through application policy or blacklisting when combined with MaaS360 MDM. It allows whitelist exceptions to websites, restrict cookies; copy, paste, and print features; and enable Kiosk mode. k. IBM MaaS360 Mobile Enterprise Gateway for Secure Browser (SaaS) and IBM MaaS360 Mobile Enterprise Gateway for Secure Browser (SaaS) Step up for existing IBM MaaS360 customers MaaS360 Mobile Enterprise Gateway for Secure Browser allows supported devices to access approved internal web sites without requiring a full-device level, VPN connection. l. IBM MaaS360 Enterprise Server Management for BlackBerry (SaaS) and IBM MaaS360 Enterprise Server Management for BlackBerry (SaaS) Step up for existing IBM MaaS360 customers Provides support for BlackBerry Enterprise Server (BES) connected mobile devices by utilizing BlackBerry APIs. Features include remote actions such as send a message, reset passcode, assign BES policy and wipe, as well as detailed reporting on device attributes. Installation of MaaS360 Cloud Extender is required. Available only for devices viewed or managed with MaaS360 through BES 5.0. m. IBM MaaS360 Mobile Expense Management (SaaS) and IBM MaaS360 Mobile Expense Management (SaaS) Step up for existing IBM MaaS360 customers MaaS360 Mobile Expense Management allows the administrator to create data usage policies and assign them to supported devices that are managed by MaaS360, and assign these policies at a i126-6741-01 (11/2014) Page 2 of 10

device, group, or global level and configure alert thresholds and messaging for both in network and roaming data usage. n. IBM MaaS360 Advanced Mobile Management Suite (SaaS) and IBM MaaS360 Advanced Mobile Management Suite (SaaS) Step up for existing IBM MaaS360 customers Suite/Bundle of products including MaaS360 Mobile Device Management, MaaS360 Mobile Application Management, MaaS360 Content Cloud, and MaaS360 Mobile Expense Management. o. IBM MaaS360 Secure Productivity Suite (SaaS) and IBM MaaS360 Secure Productivity Suite (SaaS) Step up for existing IBM MaaS360 customers Suite/Bundle of products including MaaS360 Secure Mail, MaaS360 Mobile Application Management, MaaS360 Mobile Application Security, MaaS360 Content Cloud, and MaaS360 Secure Browser.. p. IBM MaaS360 Secure Mail (SaaS) and IBM MaaS360 Secure Mail (SaaS) Step up for existing IBM MaaS360 customers MaaS360 Secure Mail provides a separate and secure office productivity application for users to access and manage email, calendar, and contacts with the ability to control emails and attachments to prevent data leakage by restricting the ability to forward or move content to other applications, to enforce authentication, restrict cut-copy-paste, and lock down email attachments for view only. q. IBM MaaS360 Mobile Enterprise Gateway Suite (SaaS) and IBM MaaS360 Mobile Enterprise Gateway Suite (SaaS) Step up for existing IBM MaaS360 customers MaaS360 Mobile Enterprise Gateway Suite allows supported apps on ios and Android to securely and seamless communicate back to resources on the company's internal network. r. IBM MaaS360 Secure Document Sharing Suite (SaaS) and IBM MaaS360 Secure Document Sharing Suite (SaaS) Step up for existing IBM MaaS360 customers Suite/Bundle of products including MaaS360 Mobile Content Management, MaaS360 Secure Editor, SaaS360 Secure Document Sync, and MaaS360 Content Cloud. s. IBM MaaS360 Mobile Threat Management (SaaS) MaaS360 Mobile Threat Management provides enhanced mobile security with mobile malware detection and advanced jailbreak/root detection. With MaaS360 Mobile Threat Management, you will be able to set and manage compliance policies around detected malware and other security vulnerabilities. t. IBM MaaS360 Content Service (SaaS) MaaS360 Content Service (SaaS) provides users with the ability to upload application packages and documents to MaaS360's Content Distribution system. Clients with MaaS360 Content Service will also need to purchase at least one entitlement of both MaaS360 Content Service Storage (SaaS) and MaaS360 Content Service Bandwidth (SaaS). u. IBM MaaS360 Content Service Storage (SaaS) MaaS360 Content Service Storage (SaaS) provides users the ability to purchase a total amount of data storage available for use with the MaaS360 Content Service (SaaS). v. IBM MaaS360 Content Service Bandwidth (SaaS) MaaS360 Content Service Bandwidth (SaaS) provides users the ability to purchase the total amount of bandwidth available for use with the MaaS360 Content Service (SaaS). 2. Security Description 2.1 Security Policies IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure. 2.2 Access Control Access to client data, if required, is allowed only by authorized IBM support representatives according to principles of segregation of duties. IBM staff use two factor authentication to an intermediate gateway i126-6741-01 (11/2014) Page 3 of 10

management host. All connections are encrypted channels when accessing client data. All access to client data and transfer of data into or out of the hosting environment is logged. WIFI use is prohibited within the IBM data centers that support this Cloud Service. 2.3 Service Integrity & Availability Modifications to operating systems and application software are governed by IBM s change management process. Changes to firewall rules are also governed by the change management process and are reviewed by the IBM security staff before implementation. IBM monitors the data center 24x7. Internal and external vulnerability scanning is regularly conducted by authorized administrators and third party vendors to help detect and resolve potential system security exposures. Malware detection (antivirus, intrusion detection, vulnerability scanning, and intrusion prevention) systems are used in all IBM data centers. IBM s data center services support a variety of information delivery protocols for transmission of data over public networks. Examples include HTTPS/SFTP/FTPS/S/MIME and site-to-site VPN. Backup data intended for off-site storage is encrypted prior to transport. 2.4 Activity Logging IBM maintains logs of its activity for systems, applications, data repositories, middleware and network infrastructure devices that are capable of and configured for logging activity. To minimize the possibility of tampering and to enable central analysis, alerting and reporting, activity logging is done in real-time to central log repositories. Data is signed to prevent tampering. Logs are analyzed in real-time and via periodic analysis reports to detect anomalous behavior. Operations staff is alerted to anomalies and contacts a 24x7 on-call security specialist when needed. 2.5 Physical Security IBM maintains physical security standards designed to restrict unauthorized physical access to IBM data centers. Only limited access points exist into the data centers, which are controlled by two-factor authentication and monitored by surveillance cameras. Access is allowed only to authorized staff that have approved access. Operations staff verifies the approval and issues an access badge granting the necessary access. Employees issued such badges must surrender other access badges and can only possess the data center access badge for the duration of their activity. Usage of badges is logged. Non- IBM visitors are registered upon entering on premises and are escorted when they are on the premises. Delivery areas and loading docks and other points where unauthorized persons may enter the premises are controlled and isolated. 2.6 Compliance IBM certifies its privacy practices annually as consistent with the U.S. Department of Commerce s Safe Harbor Principles: Notice, Choice, Onward Transfer, Access and Accuracy, Security, and Oversight/Enforcement. IBM performs industry standard SSAE 16 audits (or their equivalent) annually in production data centers. IBM reviews security and privacy-related activities for compliance with IBM s business requirements. Assessments and audits are conducted regularly by IBM to confirm compliance with its information security policies. IBM employees and vendor employees complete workforce security and awareness training annually. Personnel are reminded of their job objectives and their responsibility to meet ethical business conduct, confidentiality, and IBM s security obligations annually. 2.7 Cross Border Transfers You agree that IBM may process the content, including any personal data, under relevant laws and requirements across a country border to processors and sub-processors in the following countries outside of the European Economic Area and countries considered by the European Commission to have adequate levels of security: the USA; and other countries: India, Singapore, Hong Kong (China.) 2.8 EU Data Privacy If you make personal data available to IBM Cloud Services in the EU Member States, Iceland, Liechtenstein, Norway, or Switzerland, or if You have authorized users or devices in those countries, then you as the sole controller appoint IBM as a processor to process (as those terms are defined in EU Directive 95/46/EC) Personal Data. IBM will only process such personal data to the extent required to make the IBM Cloud Services offering available in accordance with IBM s published descriptions of IBM Cloud Services and you agree that any such processing is in accordance with your instructions. You agree that IBM may process content including any personal data across a country border to the following processors and sub-processors: i126-6741-01 (11/2014) Page 4 of 10

Name of Processor/Subprocessor Role (Data Processor or Subprocessor) Location The IBM Contracting Entity Processor As stated on the Order Document Amazon Web Services, LLC Sub-processor 410 Terry Ave. N Seattle, WA 98109, USA IBM Corporation Sub-processor 1 New Orchard Rd. Armonk, NY 10504, USA I Fiberlink Communications Corporation, an IBM company Sub-processor 1787 Sentry Pkwy West, Bldg 18, Ste 200 Blue Bell, PA 19422, USA Fiberlink Software Private Limited, an IBM company Sub-processor #99/100 Prestige Towers Residency Road Bangalore 560 025 India IBM India Private Limited Sub-processor No. 12, Subramanya Arcade Bannerghatta Road, Bangalore 560029 India Equinix LLC Sub-processor 1950 Stemmons Freeway Suite 1039A Dallas, TX 75207, USA Softlayer Technologies, Inc., an IBM company Softlayer Technologies, Inc., an IBM company Sub-processor Sub-processor 29A International Business Park East Jurong, 139964 Singapore Tseung Kwan O Industrial Estate Hong Kong You agree that IBM may, on notice, vary this list of country locations when it reasonably determines it necessary for the provision of the Cloud Services. 2.9 Safe Harbor Compliance The Cloud Services are included in Fiberlink Communications Corporation (IBM Subsidiary) US-EU Safe Harbor certification. Both IBM and Fiberlink abide by the U.S. - EU Safe Harbor Framework as set forth by the United States Department of Commerce regarding the collection, use and retention of information collected from the European Union. For more information about Safe Harbor or to access Fiberlink s certification statement, go to http://www.export.gov/safeharbor/. When IBM's US-EU Safe Harbor Framework does not apply to a transfer of EEA Personal Data, the parties or their relevant affiliates may enter into separate standard unmodified EU Model Clause agreements in their corresponding roles pursuant to EC Decision 2010/87/EU with optional clauses removed. All disputes or liability arising under these agreements, even if entered into by affiliates, will be treated by the parties as if the dispute or liability arose between them under the terms of this Agreement. 3. Service Level Commitment IBM provides the following availability service level agreement ( SLA ) for the Cloud Service. This SLA does not apply to Enabling Software. You understand that the SLA does not constitute a warranty to you. 3.1 Definitions a. "Availability Credit" means the remedy IBM will provide for a validated Claim. The Availability Credit will be applied in the form of a credit or discount against a future invoice of subscription charges for the Cloud Service. b. Claim means a claim you submit to IBM pursuant to the SLA that a Service Level has not been met during a Contracted Month. i126-6741-01 (11/2014) Page 5 of 10

c. "Contracted Month" means each full month during the term measured from 12:00 a.m. Eastern US time on the first day of the month through 11:59 p.m. Eastern US time on the last day of the month. d. Downtime means a period of time during which production system processing for the Cloud Service has stopped and your users are unable to use all aspects of the Cloud Service for which they have permissions. Downtime does not include the period of time when the Cloud Service is not available because of: (1) a scheduled or announced maintenance outage; (2) Events or causes beyond IBM s control (e.g., natural disaster, internet outages, emergency maintenance, etc.); (3) problems with your applications, equipment or data, or a third party s applications, equipment or data; (4) your failure to adhere to required system configurations and supported platforms for accessing the Cloud Service; or (5) IBM s compliance with any designs, specifications, or instructions that you provide to IBM or a third party provides to IBM on your behalf. e. Event means a circumstance or set of circumstances taken together, resulting in a failure to meet a Service Level. f. Service Level means the standard set forth below by which IBM measures the level of service it provides in this SLA. 3.2 Availability Credits a. To submit a Claim, you must log a Severity 1 support ticket (as defined below in the Technical Support section) for each Event with the IBM technical support help desk, within twenty-four (24) hours of your first becoming aware that the Event has impacted your use of the Cloud Service. You must provide all necessary information about the Event and reasonably assist IBM with the diagnosis and resolution of the Event. b. You must submit your Claim for an Availability Credit no later than three (3) business days after the end of the Contracted Month in which the Claim arose. c. Availability Credits are based on the duration of the Downtime measured from the time you report that you were first impacted by the Downtime. For each valid Claim, IBM will apply the highest applicable Availability Credit based on the achieved Service Level during each Contracted Month, as shown in the table below. IBM will not be liable for multiple Availability Credits for the same Event in the same Contracted Month. d. The total Availability Credits awarded with respect to any Contracted Month shall not, under any circumstance, exceed 10 percent (10%) of one twelfth (1/12 th ) of the annual charge paid by you to IBM for the Cloud Service. 3.3 Service Levels Availability of the Cloud Service during a Contracted Month Availability during a Contracted Month Availability Credit (% of Monthly Subscription Fee for Contracted Month which is the subject of a Claim) Less than 99.8% 2% Less than 98.8% 5% Less than 95.0% 10% Availability, expressed as a percentage, is calculated as: (a) the total number of minutes in a Contracted Month minus (b) the total number of minutes of Downtime in a Contracted Month, divided by (c) the total number of minutes in a Contracted Month. Example: 500 minutes total Downtime during Contracted Month 43,200 total minutes in a 30 day Contracted Month - 500 minutes Downtime = 42,700 minutes 43,200 total minutes in a 30 day Contracted Month = 2% Availability Credit for 99.0% availability during the Contracted Month i126-6741-01 (11/2014) Page 6 of 10

3.4 Other information about this SLA This SLA is made available only to IBM s clients and does not apply to claims made by your users, guests, participants and permitted invitees of the Cloud Service or to any beta or trial services that IBM provides. The SLA only applies to the Cloud Services that are in production use. It does not apply to non-production environments, including but not limited to test, disaster recovery, quality assurance, or development. 4. Entitlement and Billing Information 4.1 Charge Metrics The Cloud Services are made available under one of the following charge metrics as specified in the Order Document: a. Authorized User is a unit of measure by which the Cloud Service can be obtained. You must obtain separate, dedicated entitlements for each unique Authorized User given access to the Cloud Service in any manner directly or indirectly (for example: via a multiplexing program, device, or application server) through any means. Sufficient entitlements must be obtained to cover the number of Authorized Users given access to the Cloud Service during the measurement period specified in your Order Document. b. Gigabyte is a unit of measure by which the Cloud Service can be obtained. A Gigabyte is defined as 2 to the 30th power bytes of data (1,073,741,824 bytes). Sufficient entitlements must be obtained to cover the total number of Gigabytes processed by the Cloud Service during the measurement period specified in your Order Document. c. Managed Client Device is a unit of measure by which the Cloud Service can be obtained. A Client Device is a single user computing device or special purpose sensor or telemetry device that requests the execution of or receives for execution a set of commands, procedures, or applications from or provides data to another computer system that is typically referred to as a server or is otherwise managed by the server. Multiple Client Devices may share access to a common server. A Client Device may have some processing capability or be programmable to allow a user to do work. You must obtain Managed Client Device entitlements for every Client Device managed by the Cloud Service during the measurement period specified in your Order Document. 4.2 Charges & Billing The amount payable for the Cloud Service is specified in an Order Document. 4.3 Partial Month Charges The partial month charge is a pro-rated daily rate. The partial month charges are calculated based on the remaining days of the partial month starting on the date you are notified by IBM that your access to the Cloud Service offering is available 4.4 Overage Charges If your actual usage of the Cloud Service during the measurement period exceeds the entitlement stated on the PoE portion of the Order Document, then you will be invoiced for the overage, as set forth in the Order Document 5. Term and Renewal Options 5.1 Term The term of the Cloud Service begins on the date that IBM notifies you that you have access to the Cloud Service, as described in the Order Document. The PoE portion of the Order Document will confirm the exact date of the start and end of the term. You are permitted to increase your level of use of the Cloud Service during the term by contacting IBM or your IBM Business Partner. We will confirm the increased level of usage in the Order Document 5.2 Cloud Services Term Renewal Options Your Order Document will set forth whether the Cloud Service will renew at the end of the term, by designating the term as one of the following: 5.2.1 Automatic Renewal If your Order Document states that your renewal is automatic, you may terminate the expiring Cloud Service term by written request, at least ninety (90) days prior to the expiration date of the term that is set i126-6741-01 (11/2014) Page 7 of 10

forth in the Order Document. If IBM or your IBM Business Partner does not receive such termination notice by the expiration date, the expiring term will be automatically renewed for either a one year term or the same duration as the original term as set forth in the PoE. THE RENEWAL ENTITLEMENT QUANTITY WILL BE EQUAL TO THE GREATER OF THE ORIGINAL ORDER QUANTITY OR THE MONTHLY REPORTED USAGE FOR THE MONTH PRIOR TO GENERATION OF THE RENEWAL INVOICE UNLESS IBM RECEIVES A NOTIFICATION SPECIFYING A DIFFERENT ENTITLEMENT QUANTITY. THE RENEWAL ENTITLEMENT QUANTITY FOR STEP UP OFFERING WILL BE EQUAL TO THE ORIGINAL ORDER QUANTITY. 5.2.2 Continuous Billing When the Order Document states that your billing is continuous, you will continue to have access to the Cloud Service following the end of your term and will be billed for the usage of the Cloud Service on a continuous basis. To discontinue use of the Cloud Service and stop the continuous billing process, you must provide IBM or your IBM Business Partner with ninety (90) days written notice requesting that your Cloud Service be cancelled. Upon cancellation of your access, you will be billed for any outstanding access charges through the month in which the cancellation took effect. 5.2.3 Renewal Required When the Order Document states that your renewal type is terminate, the Cloud Service will terminate at the end of the term and your access to the Cloud Service will be removed. To continue to use the Cloud Service beyond the end date, you must place an order with your IBM sales representative or IBM Business Partner to purchase a new subscription term. 6. Technical Support Technical support for IBM MaaS360 SaaS is structured 2 nd level support to a customer s Operation team, not End User support and is available during the subscription period. Support is provided through multiple channels; 24 x 7. Information regarding support of the Cloud Service solution can be found on the offering portal. Expected Responsiveness targets: S Severity Definition e v e r i t y 1 Critical business impact/service down: Business critical functionality is inoperable or critical interface has failed. This usually applies to a production environment and indicates an inability to access services resulting in a critical impact on operations. This condition requires an immediate solution. 2 High business impact: A service business feature or function of the service is severely restricted in its use or you are in jeopardy of missing business deadlines. 3 Medium business impact: Indicates the service or functionality is usable and it is not a critical impact on operations. Initial Response Time Objectives 30 Minutes 24x7 1 business hour 2 business hours 4 Low business impact: An inquiry or non-technical request 3 business hours 7. Enabling Software Response Time Coverage 24 x 7 24 x 7 24 x 7 This Cloud Service offering may include enabling software. You may use the enabling software only in association with your use of the Cloud Service for the length of the term of the Cloud Service. To the extent that the enabling software contains sample code, you have the additional right to make derivative works of the sample code and use them consistent with this grant. The enabling software is provided as a component of the Cloud Service and is subject to the applicable license agreement(s). i126-6741-01 (11/2014) Page 8 of 10

8. Additional Information 8.1 Step up Limitation For Cloud Service offerings designated as Step up for existing Customers ( Step up SaaS ), customer must have previously or simultaneously acquired appropriate license entitlements to the associated IBM program as identified in the name of the Step up SaaS offering. For example, Customer who purchases IBM MaaS360 Mobile Device Management (SaaS) Step up for existing Customers must have licensed entitlements to the associated IBM program of IBM MaaS360. Customer s entitlements to the Step up SaaS cannot exceed Customer s entitlements to the associated IBM program. When acquiring Step up SaaS, Customer may not use the same associated IBM program license entitlements within their on-premise installed environment as well as with the Step up SaaS entitlements. For example, if Customer has 250 Managed Client Device entitlements to the associated IBM program and chooses to purchase 100 Step up SaaS Managed Client Device entitlements, Customer can manage 100 Step up SaaS Managed Client Devices from the Cloud Service environment and 150 Managed Client Devices from the software installed on-premise. Customer represents they have acquired the applicable (1) license entitlements and (2) Subscription and Support for the associated IBM program(s). During the Subscription Period of the Step up SaaS, Customer must maintain current Subscription and Support for the IBM program entitlements used in conjunction with the Step up SaaS entitlements. In the event either Customer s license to use the associated IBM program(s) or Customer s Subscription and Support for the associated IBM program(s) is terminated, Customer s right to use the Step Up SaaS will terminate. 8.2 Cookies Customer agrees that IBM may use cookies and tracking technologies to collect personally identifiable information in gathering usage statistics and information designed to help improve user experience and/or to tailor interactions with users in accordance with http://www-01.ibm.com/software/info/productprivacy/index.html 8.3 Derived Benefit Locations Where applicable, taxes are based upon the location(s) you identify as receiving benefit of the Cloud Services. IBM will apply taxes based upon the business address listed when ordering a Cloud Service as the primary benefit location unless you provide additional information to IBM. You are responsible for keeping such information current and providing any changes to IBM. 8.4 No Personal Health Information The Cloud Service is not designed to comply with HIPAA and may not be used for the transmission or storage of any Personal Health Information. 8.5 Normative Data Notwithstanding anything to the contrary, for normative research, analysis, demonstration and reporting purposes only, IBM may retain and use in aggregated and anonymous format (i.e., so that you or your authorized users cannot be identified as the source of the data and so that personally identifiable information allowing identification of you or your authorized users is removed) data reflecting your authorized users individual experiences with the Cloud Services. 8.6 Lawful Use and Consent 8.6.1 Authorization to Collect and Process Data The Cloud Service is designed to provision, manage, secure, monitor and control mobile devices. The Cloud Service will collect information from users and devices who are authorized by you to interact with the Cloud Service for which you have subscribed. The Cloud Service collects information that alone or in combination may be considered Personal Information in some jurisdictions. Collected data may include authorized user name, telephone number, registered email address and device location, userid and secure browsing history, information about end user device hardware, software and settings, and information generated by the device. You authorize IBM to collect, process, and use this information in accordance with the terms of this Service Description. i126-6741-01 (11/2014) Page 9 of 10

8.6.2 Informed Consent from Data Subjects Use of the Cloud Service may implicate various laws and regulations. The Cloud Service may be used only for lawful purposes and in a lawful manner. You agree to use the Cloud Service pursuant to, and assume all responsibility for complying with, applicable laws, regulations, and policies. You agree that you have obtained or will obtain any fully informed consents, permissions, or licenses necessary to enable lawful use of the Cloud Services and to permit collection and processing of the information by IBM as your data processor through the Cloud Service. You hereby authorize IBM to obtain fully informed consents necessary to enable lawful use of the Cloud Service and to collect and process the information as described in the end user license agreement available at http://www.ibm.com/software/sla/sladb.nsf/. 8.7 Data Retention IBM will delete any collected information, which may include Personal Information, within six (6) months of expiration or termination of this Service Description, except for that which is required to be retained according to applicable law, rule or regulation. In such case, IBM will retain the collected information for the duration required by such applicable law, rule or regulation. i126-6741-01 (11/2014) Page 10 of 10