SERVICE DESCRIPTION & ADDITIONAL TERMS AND CONDITIONS VERSIEGELTE CLOUD. Service description & additional terms and conditions VERSIEGELTE CLOUD

Similar documents
GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd

Conceptboard User Agreement for users registered before October 23, 2015.

ICT Security Policy. ~ 1 od 21 ~

General Terms and Conditions (GTCs)

IBM Resilient Incident Response Platform On Cloud

3. As far as the hosting services of WWW INFOTECH are through leased severs of our data centre partners in US and UK through contracts.

Information Security BYOD Procedure

IBM Resilient Incident Response Platform On Cloud

Eco Web Hosting Security and Data Processing Agreement

OCTOSHAPE SDK AND CLIENT LICENSE AGREEMENT (SCLA)

Contract on the use of the myaxa client portal by a company

Version 1/2018. GDPR Processor Security Controls

Employee Security Awareness Training Program

GM Information Security Controls

Licensing Guide. BlackBerry Enterprise Service 12. Version 12.0

ISSP Network Security Plan

Data Privacy Statement for myportal to go

Terms and Conditions between Easy Time Clock, Inc. And Easy Time Clock Client

Sparta Systems TrackWise Solution

Information Security Management Criteria for Our Business Partners

Google Cloud & the General Data Protection Regulation (GDPR)

Chapter 1 General Provisions

TERMS & CONDITIONS OF E-COMMERCE STORE Pricecheck.tools of 29 May 2017

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

General Terms & Conditions (GTC)

General Data Protection Regulation

Sparta Systems TrackWise Digital Solution

BT Assure Cloud Identity Annex to the General Service Schedule

Checklist: Credit Union Information Security and Privacy Policies

Cloud Computing Standard 1.1 INTRODUCTION 2.1 PURPOSE. Effective Date: July 28, 2015

Data protection. 3 April 2018

1.1. Gomilio is a service provided by Activa System Srls (hereinafter referred to as

License Agreement Design Partner

Data Protection Policy

TERMS OF USE of the WEBSITE

Sparta Systems Stratas Solution

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines

First Federal Savings Bank of Mascoutah, IL Agreement and Disclosures

DATA PROCESSING TERMS

Schedule document N4MDM. PUBLIC Node4 limited 31/11/2018. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ

SCHEDULE DOCUMENT N4MDM PUBLIC NODE4 LIMITED 13/07/2017. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ

1. General provisions

SERVICE DESCRIPTION. Population Register Centre s online services

SECURITY & PRIVACY DOCUMENTATION

estatement Disclosure Agreement

IBM Cloud Service Description: Watson Analytics

GDPR AMC SAAS AND HOSTED MODULES. UK version. AMC Consult A/S June 26, 2018 Version 1.10

Acceptable Use Policy

Consumer Online Banking Application

REGULATION BOARD OF EDUCATION FRANKLIN BOROUGH

"PPS" is Private Practice Software as developed and produced by Rushcliff Ltd.

Schedule Identity Services

Data Processing Agreement

IBM Commerce Insights

UNCLASSIFIED. Mimecast UK Archiving Service Description

Terms and Conditions 01 January 2016

COMPUTER & INFORMATION TECHNOLOGY CENTER. Information Transfer Policy

Table of Contents. PCI Information Security Policy

idgard User Manual Section II, Version 1 idgard User Manual

Terms and Conditions of Sale KWHOTEL.COM

Adobe Sign and 21 CFR Part 11

An error will be returned by the services when invalid electronic requests are received.

Z.com Hosting Service Order

Acceptable Use Policy

IBM Connections Cloud

Single Sign-On. Introduction

ROYAL MAIL GROUP ADDRESS MANAGEMENT UNIT PAF DATA END USER TERMS ( End User Terms )

IBM Resilient Incident Response Platform On Cloud

Oracle Data Cloud ( ODC ) Inbound Security Policies

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights

SIMSme Management Cockpit Documentation

RGSL PRIVACY POLICY. Data Controller and Contact Details

Data Processing Agreement DPA

Data Processing Agreement

Acceptable Use Policy

BNetzA therefore requests a BEREC Opinion on the above measures until June 1.

Updated December 12, Chapter 10 Service Description IBM Cloud for Government

Terms and Conditions for Electronic Banking Services (Internet Banking and ELBA business)

St Bernard s Primary School Data Protection Policy

COMMERCIAL BANK OF DUBAI PSC GENERAL CONDITIONS OF ACCESS AND USE OF COMMERCIAL BANK OF DUBAI FACEBOOK BRANCH

FNB ewallet TERMS AND CONDITIONS

GDPR RECRUITMENT POLICY

QNB Bank-ONLINE AGREEMENT

Secure Internet File Transfer (SIFT) HTTPS User Guide. How to send and receive files via HTTPS using SIFT

External Supplier Control Obligations. Cyber Security

GRS Enterprise Synchronization Tool

ACCEPTABLE USE POLICY (AUP) 3W INFRA reserves the right to unilaterally amend the conditions set out in the Acceptable Use Policy (the Policies ).

INFORMATION SECURITY-SECURITY INCIDENT RESPONSE

Avaya Equinox Meetings Online

Description of the TÜV NORD CERT certification procedure GMP+ FC (Feed Certification scheme) of GMP+ International B.V. (NL)

The simplified guide to. HIPAA compliance

NGV Telephone & Broadband Application Form

Quick Start Guide. BlackBerry Workspaces app for Android. Version 5.0

Data Processor Agreement

BKK CENTRE FOR BUDAPEST TRANSPORT PRIVATE LIMITED COMPANY. PRIVACY POLICY on the BKK Online Shop sales

Box Competitive Sheet January 2014

Individual Agreement. commissioned processing

Tularosa Communications, Inc. (TCI) General Service Terms and Conditions

AMENDMENT FORM FOR AMERICAN EXPRESS CORPORATE GREEN CARD COMPANY CLIENTS POWER(S) OF ATTORNEY

By accessing your Congressional Federal Credit Union account(s) electronically with the use of Online Banking through a personal computer or any other

Transcription:

Service description & additional terms and conditions VERSIEGELTE CLOUD Last revised: March 19, 2018 Page 1 of 10

PUBLICATION DETAILS Published by Telekom Deutschland GmbH Landgrabenweg 151 53227 Bonn WEEE-Reg.-Nr. DE60800328 hereinafter referred to as Telekom https://www.telekom.de/compulsory-statement Copyright 2017 All rights reserved, including those of partial reproduction, electronic or photomechanical reproduction, and evaluation by data processing methods. Page 2 of 10

Contents Publication details... 2 1 Introduction... 3 2 Services provided by Telekom... 4 2.1 Provision of the service... 4 2.2 Operation, service, service quality... 4 2.3 Operation... 4 2.4 Service... 4 2.5 Service quality... 4 2.6 Functions... 5 2.7 General functions of Versiegelte Cloud... 5 2.8 Access to project rooms... 5 2.9 Security... 5 2.10 Privacy boxes... 6 2.11 Productivity tool... 6 2.12 Optional services... 6 2.13 Audit-proof data rooms... 6 2.14 Additional users and storage... 7 2.15 Two-factor authentication... 7 2.16 Changes in favor of the customer... 7 3 Services to be provided by the customer... 7 4 Commercial conditions, contract termination... 8 5 Data collection on the contract's expiry date... 8 6 Glossary... 9 1 Introduction Versiegelte Cloud consists of Telekom providing the customer with an SaaS solution in the form of virtual project spaces (privacy boxes and data rooms) along with sealed communication options. The solution makes it possible for a number of users authorized to use the project rooms to meet in these spaces to exchange documents and information, and to work together on projects. Versiegelte Cloud technology includes automated key management, thereby preventing access by unauthorized persons. While its security standard is very high, the system is nevertheless very easy to use. Page 3 of 10

2 Services provided by Telekom 2.1 Provision of the service The customer can choose from a range of service packages. A given package consists of a number of full licenses, guest licenses, and memory blocks. The type of license defines the range of functions allocated to a given user. Please see the glossary for details. When the customer places its order, it receives an activation link by e-mail. The service is available from the moment when the administrator named by the customer receives the e-mail with the activation link (date of provision). The customer then uses this link to complete the registration process independently. As part of the process, the administrator named by the customer selects a user name (administrator ID) and password that only he/she knows. Telekom does not save this user name and password. For security reasons, Telekom does not receive these details and is unable to reconstruct them. In other words, Telekom has no means of resetting the administrator's user name and password. The customer cannot access its account without these details, so the administrator should store his/her ID, password, and PUK (password unlocking key) in a secret and very secure location. The customer or its administrator can create other users who complete their own registration in turn. Details about the given roles and rights are available in the glossary. 2.2 Operation, service, service quality 2.3 Operation Telekom provides the customer with access to the Versiegelte Cloud as an SAAS. The solution is operated from a data center located in Germany. 2.4 Service The customer can address their support requests concerning Versiegelte Cloud functions and disruptions directly to the Telekom support team (service desk). This service is available Monday to Friday, from 8:00 a.m. to 8:00 p.m. (excl. public holidays for all of Germany). The support team can help clarify issues relating to how to use the service. However, they cannot function as administrators and access customer data, as they have no access to data in the Versiegelte Cloud for security reasons. 2.5 Service quality The following service parameters apply to the Versiegelte Cloud : Objective Availability Operating hours Values/timeframe There is no minimum availability. Telekom will work to ensure that restrictions on availability are kept to a minimum. Monday Sunday, 24/7, excl. maintenance windows Page 4 of 10

Disruption notification by e-mail Disruption notification via service desk Monday Sunday, 24/7 Monday - Friday (excl. public holidays for all of Germany) 8:00 a.m. to 8:00 p.m. 2.6 Functions 2.7 General functions of Versiegelte Cloud Versiegelte Cloud is a web service that protects and simplifies digital communication and collaboration between the customer and its partners. The customer and authorized users can do the following: Create virtual project rooms Exchange documents in the virtual project rooms Work on documents together Exchange information Chat A multi-level rights management system is part of the service. This system can be used to define what users are authorized to perform what actions. Details are available in the user manual that customers can access as part of Versiegelte Cloud help function. 2.8 Access to project rooms Access to the project rooms via the internet (app or browser) is encrypted. Smartphones operating either Android or ios can be used for access via mobile end devices. The customer's users download the app themselves from the Google Play Store or the Apple App Store, depending on their operating system. The customer can negotiate with Telekom to agree other, customized access options. 2.9 Security Patented sealed cloud technology is used in Europe, the USA and China. It takes into account the technical and operational conditions and ensures that the data added by the customer remains inaccessible (known as the computer center's "technical seal"). The technological solution is designed in such a manner that the computer center operator cannot access any customer data. This technology protects the data during processing. Telekom has no access to the keys. Telekom employees can only access the application server again when it no longer contains any information. The data is encrypted right from the moment that the customer transfers it to the computer center that hosts the data. Page 5 of 10

Only the customer and its users are responsible for protecting the usage rights, access rights and passwords allocated to the administrator and users. Only the customer and its users are responsible for ensuring that these details are not forwarded to unauthorized users. Responsibility for accessing, changing, or downloading data stored by the customer in the project room, and responsibility for issuing authorization lie with the customer's users, i.e. with the customer's administrator at first and then with anyone receiving authorization from him/her. 2.10 Privacy boxes The customer can create its own storage sites for files of all kinds and notifications in privacy boxes. Only the user and other users that he/she invites thanks to his/her authorizations can access these storage spaces. 2.11 Productivity tool The productivity tool is a means of automatically synchronizing the privacy boxes in Versiegelte Cloud and the file system on a given user's local hard drive. The function is part of the user's Windows Explorer. The user can use this tool to lock documents with a single click and so prevent other users from modifying them. Users can also exclude certain privacy boxes from the synchronization process. 2.12 Optional services In the case of a separate order, the following optional services are provided for an additional charge. 2.13 Audit-proof data rooms Audit-proof data rooms are privacy boxes with special functions. The contain a logbook that can be used for documenting the user's actions (uploads, downloads, document views, deleting, etc.) and for undertaking steps to prevent documents from being dissemination (watermark, etc.). The following functions for strengthening protection against document dissemination are in place for the data rooms. When a user downloads a file, the system adds a watermark that provides information about the user's name and when (date and time) the download occurred (only for PDFs). Document usage can be restricted to on-screen viewing only (only for PDFs). An alarm is triggered if a user exceeds his/her number of permitted downloads during a specified period, i.e. the system registers irregular user activity and displays this in the logbook. The above-mentioned functions help to make it more difficult to disseminate documents, but they cannot completely prevent it. For operational reasons, there is a delay of a few minutes between an action and its registration in the logbook. The logbook normally lists every action, but in very specific technical conditions, information about a given action can be mislaid. Every privacy box can be transformed into a data room. Page 6 of 10

2.14 Additional users and storage The customer can add additional full licenses, guest licenses, and more storage to every service package. 2.15 Two-factor authentication To enhance log-in security, it is possible to activate a two-factor authentication process. In this case, logging in requires not just the customer's specific password, but it also needs a PIN which the user receives by text message (for a fee). 2.16 Changes in favor of the customer Telekom reserves the right to make unilateral changes to the service and to reduce charges in favor of the customer. The customer agrees to these adjustments in advance when signing the agreement. In an exception from the requirement to communicate in writing, Telekom informs the customer by e-mail. The new documents issued this way replace existing documents. 3 Services to be provided by the customer The customer undertakes to perform all duties to cooperate required for the proper provision of services and, in particular, the following ones at no charge, in good time, and to the extent required. a. The customer assures that it will not store any content on the contractual storage space and make available online, if the provision, publication, or use of such content violates applicable laws or third-party rights this applies in particular to defamatory, hatredinciting, or extreme right-wing content. The customer ensures that it has the rights to save and edit its data in the project room. b. The customer refrains from actions that could endanger or disrupt the services of third parties or to Telekom's infrastructure (e.g. due to a DDoS attack). In such a situation, Telekom is entitled to deactivate the service concerned, without prior notification of the customer, until the risk or impairment has been remedied. This also applies if the customer uses, saves on the contractual storage space, or in any other way makes accessible any content that contains malicious codes or other malware. Further claims by Telekom shall not be affected by such a situation. Telekom provides the customer with information about relevant incidents and measures to the greatest extent possible. c. The customer is responsible for checking and ensuring compliance with any and all legal provisions, laws, regulations, and industry-specific provisions that are relevant and applicable in connection with the use of the service. This particularly also includes compliance with confidentiality obligations, for example those resulting from a professional activity. The customer confirms that data of relevance to confidentiality or persons will only be stored where there is an effective approval. d. The customer's users are obligated to exchange data solely in a manner compliant with the usage and acknowledgement of standards in line with the internet http/https protocol. The customer may only use interfaces recognized as standard or defined by Telekom. Exceptions require written consent. Page 7 of 10

e. The customer declares that it agrees to exchange information by e-mail and will always provide a current e-mail address. The customer is aware and authorizes that essential information for service provision, such as access data, information on modifications to the services and the legal conditions, etc., shall only be sent by e-mail. f. The customer is obligated to back up its data at adequate intervals and in a suitable form on other systems of its own so that such data can be recovered at a reasonable cost. Telekom does not back up data. For this reason, the customer should, in its own interests, transfer its data to other systems in a suitable form by the contract's expiry date at the latest. 4 Commercial conditions, contract termination The customer books a basic package that contains a certain number of full and guest licenses in addition to memory blocks. At a later date, the customer can book additional full and guest licenses or options mentioned above for a separate fee. For an additional fee, the customer can book additional storage for its package (optional service). The storage volume (plus storage volume booked as an optional addition) is available for use by all of the customer's privacy boxes or data rooms. The contract is concluded for a term of one month, authoritatively for the beginning of the month term is the date of registration. The fixed term is automatically extended by one month if neither party terminates the contract at least one month before the authoritative fixed term is due to expire (by the customer via cloud-portal per button in the area of contract management or by Telekom by sending an e-mail to the given e-mail address of the customer). The customer can change in each case to the end of the fixed term between the offered packages. The general terms and conditions of Telekom Deutschland GmbH are valid for IT achievements, available under https://cloud.telekom.de/agb as well as on the website https://cloud.telekom.de/magenta-security/versiegelte-cloud available price sheet. 5 Data collection on the contract's expiry date The customer is responsible for remotely transferring its data from the project room to another means of storage at its disposal when the contract expires. In its own interests, the customer should therefore select the termination date in such a manner that it still has time to collect data while the contract is still in force. All data within the Versiegelte Cloud is deleted when the contract expires. Page 8 of 10

6 Glossary SaaS DDoS Privacy box Software as a Service Distributed Denial of Service Confidential project workspace with file storage, notes, and chat functions. Privacy boxes behave like network drives. Access does not require software to be installed. Instead, it uses all modern browsers or WebDAV, Windows client, or mobile apps (ios, Android). Only users invited by the box's creator have access to a box. Data room A data room has the same features as a privacy box but has additional functions as well, e.g. logbook and anti-dissemination protection. Project room Superordinate term for the data room/s and privacy box/es used by the customer. Full license A licenses allocated to a member of the customer's workforce. User rights: o Creating privacy boxes (currently up to 2,000 boxes per package) o Uploading and downloading documents o Writing notes, chatting o Issuing guest licenses Full license with administrator role The first user automatically has the role of administrator for the entire term. Every full license can contain the administrator role. We recommend naming two additional administrators along with the registering (i.e. initial) administrator. The administrator assumes additional administrative functions. User rights: o o Issuing additional administrator roles Issuing full and guest licenses (i.e. allocating booked full and guest licenses to employees or people outside the company) Page 9 of 10

Guest license One-off readonly access (free) User Guest licenses are intended for external users. They can be assigned on a permanent or temporary basis. After 30 days of inactivity, temporary licenses lapse and are sent back to the pool of guest licenses. Guest license users can made into members of privacy boxes or be invited to become members. User rights: o Uploading and downloading documents o Writing notes, chatting Guest license users cannot create privacy boxes or invite other guests One-off read-only access can only be issued by the owner of the project room in question. Authorization is issued via a link that can be protected with a passcode. This option makes it possible to download documents without a guest license, i.e. free of charge. By sending someone the link and passcode, the sender provides access to the project room in question. For this reason, Telekom bears no responsibility if the person receiving access data for read-only access forwards this information to unauthorized persons. This term covers all users in general: Users with administrative role Users with full licenses Users with guest licenses Users with one-off read-only access Page 10 of 10