“Account” means any accounts or instances created by or on behalf of Customer within the Services.
“Affiliate(s)” means, with respect to a Party, any entity that directly or indirectly controls, is controlled by,or is under common control with such Party, whereby “control” (including, with correlative meaning, the terms “controlled by” and “under common control”) means the possession, directly or indirectly, of the power to direct, or cause the direction of the management and policies of such person, whether through the ownership of voting securities, by contract, or otherwise.
“API” means the application programming interfaces developed, made available, and enabled by Provider that permit Customers to access certain functionality provided by the Services, including without limitation, any interface that enables the interaction with the Service(s) automatically through HTTP requests and the Provider application development API that enables the integration of the Service(s) with other web applications.
“Applicable Data Protection Law(s)” means the laws and regulations of the United States (including the California Privacy Rights Act (the “CPRA”), the European Union, the European Economic Area and their member states, Switzerland and the United Kingdom (including the General Data Protection Regulation or GDPR and any applicable national laws made under it where Customer is established in the European Economic Area), the Swiss Federal Act of 19 June 1992 on Data Protection, and the Brazilian General Data Protection Law (LGPD), all as may be amended or superseded.
“Applicable Law(s)” means all applicable local, state, federal, and international laws, rules, and regulations, including, without limitation, those related to data privacy and data transfer.
“Authorized User” means Customer’s employees, consultants, Contractors, and agents (i) who are authorized by Customer to access the Services on behalf of Customer under the rights granted to Customer pursuant to this Agreement and (ii) in the case of SaaS Services, for whom a unique user name and password to access to the Services has been provisioned per the terms and conditions of this Agreement. Where Customer has purchased the right to white label the Licensed Software or SaaS Services and allow Customer’s customer(s) to access the same, “Authorized User” shall include Customer’s customer(s) for whom Customer has purchased Users as specified on the Order Form.
“Confidential Information” means all information disclosed by one Party to the other Party that is marked confidential or which a reasonable person would understand to be confidential or proprietary given the nature of the information and circumstances of disclosure and includes, without limitation: any non-public information regarding Provider’s or Customer’s business, products and services (including, without limitation, the discovery, invention, research, improvement, development, marketing or sale thereof as well as templates, scorecards, modules, coaching cards, rubrics and the like), pricing, financial data, models and information, business and marketing plans, customer information, business opportunities, plans for development of future products, unreleased versions of products, know-how, technology, the Services, the Software, and the API. Notwithstanding the foregoing, Confidential Information shall not include information that: (a) was already known to the receiving Party at the time of disclosure by the disclosing Party without an obligation of confidentiality; (b) was or is obtained by the receiving Party from a third party not known by the receiving Party to be under an obligation of confidentiality with respect to such information; (c) is or becomes generally available to the public other than by violation of this Agreement or another valid agreement between the Parties; or (d) was or is independently developed by the receiving Party without use of the disclosing Party’s Confidential Information.
“Contractor” means an independent contractor or consultant of a Party.
“Customer Data” means all content and data, including without limitation any Personal Data, technical material, customer records, or other materials submitted by or on behalf of Customer and which remains in Provider’s possession and control for further processing. “Customer Data” does not include Feedback.
“Customer Environment” means the computing environment (excluding any software provided by Provider) separately procured, prepared or maintained by Customer for the access and use of the products and Services.
“Defect” means a material non-conformance within the Warranty period that Provider can replicate or Customer can duplicate to Provider.
“Derivative Works” means a revision, enhancement, modification, translation, abridgment, condensation or expansion of any Provider IP.
“Documentation” means any written or electronic documentation, images, video, text, or sounds specifying the functionalities of the Services provided or made available by Provider to Customer or Users through the Site.
“DPA” means the Data Processing Agreement incorporated at Section 7(c) of this Agreement.
“Effective Date” means the effective date designated on the relevant Order referencing this Agreement.
“Error” means a failure of the products or services provided by Provider to substantially conform to the Documentation that Provider can replicate or Customer can duplicate.
“Error Correction” means revisions, modifications, alterations, and additions to the products or services provided by Provider to Customer as bug fixes or workarounds, each to resolve Errors.
“Fees” means each of the License Fees, Professional Services Fees, Subscription Fees, support fees, hosting fees, and any other fees specified in the Order Form.
“Hosted Environment” means Provider or its third party’s technical environment required to operate and provide access to the relevant Provider service.
“Hosting Services” means the services that the Provider provides to Customer to allow Authorized Users to access and use the Software, including hosting set-up and ongoing services, as described in the Documentation.
“Intellectual Property Rights” means any and all respective patents, inventions, copyrights, trademarks, domain names, trade secrets, know-how and any other intellectual property and/or proprietary rights.
“License Fees” means the fees payable to license the Licensed Software.
“License Metrics” means the permitted volume of use of each of the software, maintenance and/or support services as designated, as defined in the applicable Order.
“Licensed Software” means the software product(s) licensed to the Customer and installed either on the Customer’s premises or equipment or in a hosted environment, in each case as specified in the applicable Order.
“License Term” means the duration of the license use granted by the Provider to the Customer commencing on the date specified in the Order Form and, in the case of non-perpetual licenses, continuing thereafter in accordance with Section 12(a).
“Order Form” or “Order” means the order form incorporating this Agreement specifying the products and services to be provided by Provider to Customer and the Fees to be paid.
“Personal Data” means any information relating to an identified or identifiable natural person (‘data subject’), where such data subject is one who can be identified, directly or indirectly, in particular by reference to an identifier such as name, an identification number, location data, an online identifier or to one or more factors specific to their physical, physiological, mental, economic, cultural or social identity of that natural person and any other data which any Applicable Data Protection Law(s) identify as being personal data.
“Professional Services” means installation, configuration, implementation, training, consulting, project management, and/or other services that the Provider may provide to the Customer.
“Professional Services Fees” means the fees payable for the Professional Services.
“Provider IP” means the Services, the catalog, the catalog data, and any and all intellectual property provided to Customer or any Authorized User in connection with the foregoing. For the avoidance of doubt, Provider IP includes any information, data, or other content derived from Provider’s monitoring of Customer’s access to or use of the Services, including any use by Customer of the catalog data, but does not include Customer Data.
“SaaS” means Software-as-a-Service offerings, as generally known in the industry.
“Security Breach” means the unlawful destruction, loss, alteration, disclosure of, or access to Confidential Information caused by Provider’s breach of its confidentiality obligations set forth in Section 7(a).
“Service(s)” means any products, subscriptions, licenses, and/or services, that Customer orders via an Order referencing this Agreement, including, as applicable, the API, SaaS, Software, Documentation, and Professional Services but specifically excludes Third-Party Services.
“Software” means software provided by the Provider either by download or access through the internet that allows a User to use any functionality in connection with the Services.
“Statement of Work” means any statement of work executed or approved by each Party identifying those Professional Services to be provided by the Provider.
“Subscription Fees” means the fees charged on a per-User basis for the Service(s).
“Subscription Services” means the SaaS or subscription services provided by Provider to Customer under this Agreement via the website specified in the Order Form or any other website notified to Customer by Provider from time to time, as more particularly described in the Documentation.
“Subscription Term” means the period during which Customer has agreed to subscribe to a Service with respect to any individual User starting on the Effective Date and continuing thereafter in accordance with Section 12.
“Support Services” means the maintenance and/or support services (a) provided for Licensed Software offered by the Provider as set out in Section 5 and purchased by the Customer as specified in an Order Form or (b) included with the Subscription Services as more particularly detailed in section 5(c).
“Term” means the License Term and/or the Subscription Term, as the context requires.
“Third-Party Services” means third party products, applications, services, software, networks, systems, directories, websites, databases and information to which a Service links, or which Customer may connect to or enable in conjunction with a Service, including, without limitation, Third-Party Services which may be integrated directly into Customer’s Account by Customer or at Customer’s direction.
“Updates” means periodic improvements or additions to the Licensed Software or Services provided by Provider, including Error Corrections, but excluding any new features or substantial additional functionality.
“User” means an individual authorized to use the Licensed Software and/or the Service(s) through the Customer’s Account as an agent, manager, team leader, administrator or any other role as identified through a unique login.
“Version” means the software configuration identified by a numeric representation, whether left or right of a decimal place.
“Website” means www.revalizesoftware.com or such other URL, mobile or localized versions thereof owned or operated by Provider as provided in the Order Form.
“White Label” means to present the Licensed Software or Services under the Customer’s own brand, conditional on prominently displaying the phrase “powered by Revalize” on each page of the Licensed Software.
Customer may order any Professional Services from Provider for an additional fee determined by the applicable Order and/or Statement of Work. Subject to the payment of all applicable fees for such Professional Services, Provider will deliver such Services in accordance with the terms and conditions of this Agreement as well as the applicable Order and/or Statement of Work. With respect to any installation, configuration, integration, project management, and other services by and between a Customer Environment and the products and services provided by Provider hereunder, Provider agrees to perform those services to the extent specified in an Order and/or Statement of Work. Customer must provide all necessary information, access, workspace, computing resources, and other services and support materials as reasonably required by the Provider to perform its duties in a timely manner.
Customer-specific delays which prevent the Provider from fulfilling its obligations under a Statement of Work will impact the delivery timeline. Examples of typical sources or Customer-specific delays include but are not limited to: unavailability (for any reason) of Customer personnel scheduled to work with Provider; changes in priorities for Customer projects; delays in content delivery; delays in making available the appropriate environments (such as development, staging, or production environments needed by the project; or unavailability of required software resources. Delays in receiving information, resources, or decisions from the Customer could impact Provider’s ability to deliver per the project schedule and timelines may need to be adjusted. All Professional Services provided on a time and material basis are per person unless otherwise specified, and charged hourly or daily as indicated in the applicable Order and/or Statement of Work. Customer may request changes or additions to the Professional Services being provided hereunder by making a written request to the Provider. If the Provider deems the changes feasible, Provider will provide a quote for any increase or decrease in the cost or time required for the performance of the Professional Services, as amended. Once the parties agree to the modified scope and related Professional Services Fees, the parties will enter into an Order and/or Statement of Work reflecting the changes. Provider shall not be obligated to perform any revised or additional Professional Services unless and until an Order and/or Statement of Work is executed by both parties.
Not Used.
(a) The data importer has the controller’s general authorisation for the engagement of sub- processor(s) from an agreed list. The data importer shall specifically inform the controller in writing of any intended changes to that list through the addition or replacement of sub- processors at least 15 days in advance, thereby giving the controller sufficient time to be able to object to such changes prior to the engagement of the sub-processor(s). The data importer shall provide the controller with the information necessary to enable the controller to exercise its right to object. The data importer shall inform the data exporter of the engagement of the sub-processor(s).
(b) Where the data importer engages a sub-processor to carry out specific processing activities (on behalf of the controller), it shall do so by way of a written contract that provides for, in substance, the same data protection obligations as those binding the data importer under these Clauses, including in terms of third-party beneficiary rights for data subjects. The Parties agree that, by complying with this Clause, the data importer fulfils its obligations under Clause 8.8. The data importer shall ensure that the sub-processor complies with the obligations to which the data importer is subject pursuant to these Clauses.
(c) The data importer shall provide, at the data exporter’s or controller’s request, a copy of such a sub-processor agreement and any subsequent amendments. To the extent necessary to protect business secrets or other confidential information, including personal data, the data importer may redact the text of the agreement prior to sharing a copy.
(d) The data importer shall remain fully responsible to the data exporter for the performance of the sub-processor’s obligations under its contract with the data importer. The data importer shall notify the data exporter of any failure by the sub-processor to fulfil its obligations under that contract.
(e) The data importer shall agree a third-party beneficiary clause with the sub-processor whereby – in the event the data importer has factually disappeared, ceased to exist in law or has become insolvent – the data exporter shall have the right to terminate the sub- processor contract and to instruct the sub-processor to erase or return the personal data.
These Clauses shall be governed by the law of one of the EU Member States, provided such law allows for third-party beneficiary rights. The Parties agree that this shall be the law of Ireland.
Data Exporter | |
---|---|
Name | Customer as identified in the Agreement |
Address | As detailed in the Agreement |
Contact person name, position and contact details | As detailed in the Agreement |
Activities relevant to the data transferred under these Clauses | Receipt of services under the Agreement |
Signature and date | By entering into the Agreement, data exporter is deemed to have signed these Standard Contractual Clauses incorporated herein as of the effective date of the Agreement. |
Role (controller/processor) | Controller |
Data importer(s): [Identity and contact details of the data importer(s), including any contact person with responsibility for data protection]
Data Importer | |
---|---|
Name | Provider as identified in the Agreement, being Revalize, Inc or such subsidiary thereof as identified in the Agreement |
Address | As detailed in the Agreement |
Contact person name, position and contact details | Kristen Shaheen, General Counsel & Chief Privacy Officer, Revalize, Inc, [email protected] |
Activities relevant to the data transferred under these Clauses | Provision of services under the Agreement |
Signature and date | By entering into the Agreement, data exporter is deemed to have signed these Standard Contractual Clauses incorporated herein as of the effective date of the Agreement. |
Role (controller/processor) | Processor |
Categories of data subjects whose personal data is transferred | Employees, clients, customers and suppliers of Customer. Employees or contractors of Customer who contact Provider’s technical support facilities. |
Categories of personal data transferred |
Customer’s employee categories: name, title, department, ID number, system usage, email address, job title, login credentials and/or contact telephone number. Customer’s end-user or consumer categories: name, email address, contact telephone number, account number. Additional Categories of Personal Data may be provided by Customer either as part of a Support request or through Customer’s use of Hosted Subscription Services. |
Sensitive data transferred (if applicable) and applied restrictions or safeguards that fully take into consideration the nature of the data and risks involved such as for instance strict purpose limitation, access restrictions (including access only for staff having followed specialised training), keeping a record of access to the data, restrictions for onward transfers or additional security measures. | Not applicable. |
The frequency of the transfer (eg. whether the data is transferred on a one-off or continuous basis) |
Support & Professional Services: Personal Data is processed only for as long as is necessary to provide the particular Support and/or Professional Services. Subscription Services: Personal Data is stored for the duration of the Services and is deleted or returned to Customer as set out in the data processing agreement or as otherwise amended or deleted by Customer during the Term. |
Nature of the processing | Provider may Process Personal Data as necessary to perform the Services, including where applicable for hosting and storage; backup and disaster recovery; service change management; issue resolution; applying new product or system versions, patches, updates and upgrades; monitoring and testing system use and performance; IT security purposes including incident management; maintenance and performance of technical support systems and IT infrastructure; and migration,implementation,configuration and performance testing. |
Purpose(s) of the data transfer and further processing |
Support may be provided by Provider in accordance with Provider’s Support Plan. When providing Support, Provider may be required by Customer to Process Personal Data. Provider may access and/or receive Personal Data when providing Support. Personal Data is not accessed and/or received in every Support case because some errors can be analyzed and rectified without such access if the background to the error is known. Depending on the issue, Provider or third-party vendors may provide Support and therefore an international transfer of Personal Data may occur. If, as part of an Order, Customer requires Provider to perform Professional Services to assist in deployment of the product during the term, then Provider may be required by Customer to Process Personal Data as part of that engagement. Customer will upload data to the Hosted Subscription Services in order to maximize the functionality of the product. Some of the data which may be uploaded to the Hosted Subscription Services may include Personal Data. Provider will store (either directly or using a third party Subprocessor as noted below) all data uploaded into the Hosted Subscription Services on behalf of Customer in accordance with the terms and conditions of service underthe Agreement as mutually agreed to by the Parties. Customer will determine how and why the product will be used to its benefit which may include the frequent or infrequent use of Personal Data. Customer acknowledges that in relation to these Processing operations, Provider has no control over the submission of Data Subject’s Personal Data and that the design of the data to be submitted to Provider’s Hosted Subscription Services is at all times under the control of Customer. Except for the storage of the data within the Hosted Subscription Services (and the provision of Support, if applicable, described above), Provider is not involved in any Processing activities associated with this use of the product. If, as part of an Order, Customer requires Provider to perform Professional Services to assist in deployment of the product or application managed services during the Term, then Provider may be required by Customer to Process Personal Data for those purposes. |
The period for which the personal data will be retained, or, if that is not possible, the criteria used to determine that period | For as long as necessary to perform the Services. |
For transfers to (sub-) processors, also specify subject matter, nature and duration of the processing | The Provider may transfer Personal Data to sub-processor(s) for the purposes of performing the Services for such period as is necessary for such performance. |
Identify the competent supervisory authority/ies in accordance with Clause 13
European Economic Area: The State Commissioner for Data Protection and Freedom of Information in Baden-Württemberg
(https://www.baden-wuerttemberg.datenschutz.de)
Switzerland:
The Swiss Federal Data Protection Authority
(https://www.edoeb.admin.ch/edoeb/en/home.html)
United Kingdom:
The Information Commissioner’s Office (ICO) (https://ico.org.uk/)
Technical Measures to Ensure Security of Processing | Description |
---|---|
1. Inventory and Control of Hardware Assets | Actively manage all hardware devices on the network so that only authorised devices are given access, and unauthorised and unmanaged devices are found and prevented from gaining access. |
2. Inventory and Control of Software Assets | Actively manage all software on the network so that only authorised software is installed and can execute, and that unauthorised and unmanaged software is found and prevented from installation or execution. |
3. Continuous Vulnerability Management | Continuously acquire, assess, and take action on new information in order to identify vulnerabilities, remediate, and minimize the window of opportunity for attackers. |
4. Controlled Use of Administrative Privileges | Maintain processes and tools to track, control, prevent, and correct the use, assignment, and configuration of administrative privileges on computers, networks, applications, and data. |
5. Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers | Implement and manage the security configuration of mobile devices, laptops, servers, and workstations using a configuration management and change control process in order to prevent attackers from exploiting vulnerable services and settings. |
6. Maintenance, Monitoring, and Analysis of Audit Logs | Collect, manage, and analyse audit and security logs of events that could help detect, understand, or recover from a possible attack. |
7. Email and Web Browser Protections | Deploy automated controls to minimise the attack surface and the opportunities for attackers to manipulate human behaviour through their interaction with web browsers and email systems or content. |
8. Malware Defenses | Control the installation, spread, and execution of malicious code at multiple points in the enterprise, while optimising the use of automation to enable rapid updating of defense, data gathering, and corrective action. |
9. Limitation and Control of Network Ports, Protocols, and Services | Manage (track, control, correct) the ongoing operational use of ports, protocols, services, and applications on networked devices in order to minimise windows of vulnerability and exposure available to attackers. |
10. Data Recovery Capabilities | Maintain processes and tools to properly back up personal data with a proven methodology to ensure the confidentiality, integrity, availability, and recoverability of that data. |
11. Secure Configuration for Network Devices, such as Firewalls, Routers, and Switches | Implement and manage the security configuration of network infrastructure devices using a configuration management and change control process in order to prevent attackers from exploiting vulnerable services and settings. |
12. Boundary Defenses | Detect, prevent, and correct the flow of information transferring networks of different trust levels with a focus on personal data. |
13. Data Protection | Maintain processes and tools used to prevent data exfiltration, mitigate the effects of exfiltrated data, and ensure the confidentiality and integrity of personal data. |
14. Controlled Access Based on the Need to Know | Maintain processes and tools to track, control, prevent, and correct secure access to critical or controlled assets (e.g. information, resources, systems) according to the formal determination of which persons, computers, and applications have a need and right to access these critical or controlled assets based on an approved classification. |
15. Wireless Access Control | Maintain processes and tools to track, control, prevent, and correct the secure use of wireless local area networks (WLANs), access points, and wireless client systems. |
16. Account Monitoring and Control | Actively manage the life cycle of system and application accounts, their creation, use, dormancy, and deletion in order to minimise opportunities for unauthorised, inappropriate, or nefarious use. |
1. Implement a Comprehensive Information Security Programme | Through the implementation of a Comprehensive Information Security Programme (CISP), maintain various administrative safeguards to protect personal data. These measures are designed to ensure: security, confidentiality and integrity of personal data protection against unauthorized access to or use of (stored) personal data in a manner that creates a substantial risk of identity theft or fraud that employees, contractors, consultants, temporaries, and other workers who have access to personal data only process such data on instructions from the data controller. |
2. Implement a Security Awareness and Training Programme | For all functional roles (prioritizing those mission critical to the business, its security, and the protection of personal data), identify the specific knowledge, skills and abilities needed to support the protection and defense of personal data; develop and execute an integrated plan to assess, identify gaps, and remediate through policy, organisational planning, training, and awareness programmes. |
3. Application Software Security | Manage the security life cycle of all in-house developed and acquired software in order to prevent, detect, and correct security weaknesses. |
4. Incident Response and Management | Protect the organisation's information, including personal data, as well as its reputation, by developing and implementing an incident response infrastructure (e.g., plans, defined roles, training, communications, management oversight, retainers, and insurance) for quickly discovering an attack and then effectively containing the damage, eradicating the attacker's presence, and restoring the integrity of the organisation’s network and systems. |
5. Security and Privacy Assessments, Penetration Tests, and Red Team Exercises | Test the overall strength of the organisation’s defense (the technology, processes, and people) by simulating the objectives and actions of an attacker; as well as, assess and validate the controls, policies, and procedures of the organisation’s privacy and personal data protections. |
6. Physical Security and Entry Control | Require that all facilities meet the highest level of data protection standards possible, and reasonable, under the circumstances relevant to the facility and the data it contains, process, or transmits. |
The controller has authorised the use of the following sub-processors: please see the list at https://revalizesoftware.com/legal
Start Date | The commencement date of the Agreement. | |
---|---|---|
The Parties | Exporter (who sends the Restricted Transfer) | Importer (who receives the Restricted Transfer) |
Parties' details | Customer as identified in the Agreement | Provider as identified in the Agreement |
Trading name (if different): | Trading name (if different): | |
As identified in the Agreement | As identified in the Agreement | |
Official registration number (if any) (company number or similar identifier): As identified in the Agreement | Official registration number (if any) (company number or similar identifier): As identified in the Agreement | |
Key contacts | Full name (optional): | Full name (optional): Kristen Shaheen |
Job title: As identified in the Agreement | Job title: General Counsel & Chief Privacy Officer | |
Contact details including email: As identified in the Agreement | Contact details including email: [email protected] | |
Signature (if required for the purposes of Section 2) |
Addendum EU SCCs | [X] The version of the Approved EU SCCs, which this Addendum is appended to, detailed below, including the Appendix Information. Date: date of the Agreement Reference (if any): Other identifier (if any): OR The Approved EU SCCs, including the Appendix Information and with only the following modules, clauses or optional provisions of the Approved EU SCCs brought into effect for the purposes of this Addendum.] | |||||
---|---|---|---|---|---|---|
Module | Module in operation | Clause 7 (Docking Clause) | Clause 11 (Option) | Clause 9a (Prior Authorisation or General Authorisation) | Clause 9a (Time period) | Is personal data received from the Importer combined with personal data collected by the Exporter? |
1 | ||||||
2 | ||||||
3 | ||||||
4 |
Annex 1A: List of Parties: |
Annex 1B: Description of Transfer: |
Annex II: Technical and organisational measures including technical and organisational measures to ensure the security of the data: |
Annex III: List of Sub processors (Modules 2 and 3 only): |
Ending this Addendum when the Approved Addendum changes |
Which Parties may end this Addendum as set out in Section 19: [X] Importer [X] Exporter [ ] Neither Party |
Mandatory Clauses | Part 2: Mandatory Clauses of the Approved Addendum, being the template Addendum B.1.0 issued by the ICO and laid before Parliament in accordance with section 119A of the Data Protection Act 2018 on 2 February 2022, as it is revised under Section 18 of those Mandatory Clauses. |