Stay up to date with Cinch's progress and what we have to offer! Please sign up for our regular updates.
You must scroll through the whole document before you will be able to accept
Master Cloud Services Agreement
This Master Cloud Services Agreement (this “Agreement”) is by and between Cinch Software, LLC (“Cinch,” “we,” or “our”) and you, and, if you are acting on behalf of a business or employer, this Agreement is also with the business or employer on whose behalf you are acting (together, “Customer” or “you”) and applies to the Services (as defined below). This Agreement includes all Services selections and configurations made through the Portal (as defined below), and all expressly referenced exhibits, addendums, attachments and other documents, whether attached directly hereto or referenced online. “Signed,” “Sign,” or “Signing” means that a party has indicated its binding acceptance of this Agreement by clicking “I accept,” “I agree” or an equivalent message, or by using the Portal.
By Signing this Agreement you accept and agree to all of the terms of this Agreement, including the Cinch Online Privacy Policy (available at https://app.cinchsoftware.io/legal/). You represent and warrant that you have all necessary powers to enter into, and bind Customer to, this Agreement.
1.Services
(1) Subject to the terms of this Agreement, you may use the online administrative portal (the “Portal”) to select and manage certain online and support services provided by Cinch (such services, the “Cinch Software”), or products or services made available by certain third party partners that have agreements with Cinch (“Cinch Partners”) and/or by a third party that you choose (“Customer Third Party”). “Third Party Services” means any products or services made available by Cinch Partners or a Customer Third Party. “Services” means, collectively, the Cinch Software and/or any Third Party Services. The Portal may be used to enable, configure, and manage certain Services, which may be subject to service-specific terms or another agreement for services, including third party terms, if applicable.
(2) Some Services and available configurations will vary by region. Services use Cinch-provided online technology solutions by default. At Customer’s election, and subject to the terms of this Agreement, Customer may substitute certain Cinch-provided solutions with Customer Third Party solutions using the Cinch-provided application programming interface (the “Cinch API”). Customer is solely responsible for all use of Third Party Services and for complying with all terms, conditions and policies applicable to such Third Party Services.
(1) If you use any of the following Services, the accompanying additional terms apply to your use thereof. For the avoidance of doubt, other additional terms may be specified in the Portal.
Service | Applicable Terms |
---|---|
Backup as a Service | Backup as a Service Addendum (available in the Customer Center) |
Cloud Services | Service Level Agreement (available in the Customer Center)/td> |
Database as a Service ("DBaaS") | Database as a Service Addendum (available in the Customer Center) |
Desktop as a Service ("DTaaS") | Desktop as a Service Addendum (available in the Customer Center) |
Disaster Recovery as a Service ("DRaaS") | Disaster Recovery as a Service Addendum (available in the Customer Center) |
Infrastructure as a Service (“IaaS”) | Infrastructure as a Service Addendum (available in the Customer Center) |
Microsoft Products and Services | Microsoft Products and Services terms (available in the Customer Center) |
(2) The Security, Privacy and Data Processing Addendum (the “DPA”), available at https://app.cinchsoftware.io/legal, is hereby incorporated into, and made part of, this Agreement.
(3) If Customer is a “Business Associate” pursuant to the Health Insurance Portability and Protection Act of 1996, as amended (“HIPAA”), Customer may elect through the Portal to include the Cinch Business Associate Agreement (the “BAA”) in the Agreement. If Customer makes such election, the BAA, available at https://app.cinchsoftware.io/legal, is hereby incorporated into, and made part of, this Agreement. Such BAA shall apply solely to “protected health information” (as defined by HIPAA) in Cinch’s custody or control.
(4) If Customer “processes” “personal data” (as such terms are defined in “Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation)” (the “GDPR”)) from the European Economic Area, the United Kingdom, or Switzerland as a controller or processor, Customer may configure the Services to include GDPR compliance in the Agreement. If Customer makes such election, the provisions of the DPA applicable to the processing of personal data under the GDPR shall apply to this Agreement. Such provisions shall apply solely to personal data subject to the GDPR in Cinch’s custody or control.
2. Licenses and Ownership
(1) As part of its use of the Services, Customer may provide or make available to Cinch Customer-Provided Materials (as defined in Section 10(d) below). Customer gives Cinch a royalty-free, worldwide, non-exclusive, non-transferable (except in connection with a permitted assignment of this Agreement), non-sublicensable (except to Cinch Partners or Service Providers (as defined in Section 10(e) below)), limited license to reproduce, modify, create derivative works of, transmit, perform, translate, distribute, display, and otherwise use Customer-Provided Materials, in connection with the provision of the Services.
(2) Except as contemplated by this Agreement, Customer reserves all right, title and interest in and to Customer-Provided Materials. Customer is solely responsible for all Customer-Provided Materials.
(1) Cinch or Cinch Partners may provide or make available certain data, information, and other materials (collectively, “Cinch Materials”). Cinch Materials include, without limitation, the Portal, the Cinch API and all Cinch software (in any form), technologies, processes, systems, platforms, techniques, documents, equipment, templates, programs, works of authorship, know-how or any other materials that are owned by or licensed to Cinch including, but not limited to, any modifications or enhancements made to any of the foregoing. During the term of this Agreement or an applicable Service, and so long as Customer pays all applicable fees and other amounts charged by Cinch, Cinch hereby grants Customer a limited, non-transferable and non-sublicensable (except in connection with a permitted assignment of this Agreement), worldwide license to access and use the Services and Cinch Materials solely for its internal business purposes during the applicable Service term and solely in accordance with the terms of this Agreement. Additional terms apply to use of Third Party Services and are available from the applicable third party. Customer may use the Services to provide services to its own customers but may not resell the Services.
(2) Except as expressly provided in this Agreement, Cinch shall retain all right, title, and interest in and to the Services and Cinch Materials and all copies, modifications, and enhancements thereto and improvements thereto.
(1) Customer shall not delete, alter, cover, or distort any copyright, trademark, or other proprietary notice placed by Cinch on or in the Services or Cinch Materials and shall ensure that all such notices are reproduced on all copies thereof.
3. Pricing and Payment
(1) In addition to fees applicable to specific Services, during the term of this Agreement Customer agrees to pay the monthly “Subscription Fee” for access to the Services published in the Portal.
(1) “Pay as you Go” pricing allows you to add, change, and remove Services at any time. You pay only for the resources you select and configure. As you select and configure each Service, the Portal will display current pricing information. You will be billed for a selected Service until you turn it off in the Portal.
(2) Pricing varies for each Service. “Billable Component” means an element of a Service that is billed based on a specified method of calculation. Services may consist of one or more Billable Components. The terms in this Section 3 and Section 4 below may be used in this Agreement, the Portal, or in invoices to calculate Customer’s costs.
Billing Term | Definition |
---|---|
“Bandwidth” | Network capacity between the CinchServices environment and the public Internet using Cinch’s Internet service providers; Bandwidth is consumed when data is either transferred or received by the Customer Service instance |
“Compute” | An allocation of a virtual server resource available to Customer through a Service |
“High-Performance Storage” | Data Storage (as Storage is defined below in this table) provided in whole or in part on solid state Storage devices |
“IP Addresses” | Publicly addressable internet protocol addresses used to provide connectivity from the public Internet |
“Metered Billing” | The cost for a Billable Component of a Service is calculated based on actual use of the Service as measured by the Portal |
“Provision Billing” | The cost for a Billable Component of a Service is calculated based on making a provisioned resource available, regardless of whether it is used |
“Standard Storage” | Data Storage provided on spinning magnetic hard drives |
“Storage” | An allocation of block level storage volumes made available to you through your purchased Service |
“Storage Billing” | The cost for a Billable Component of a Service is calculated based on the amount of Storage made available or actually used, as applicable |
(3) “Billing Period” is the calendar month for which the Service is being billed. If a Service is not provided for a full Billing Period, then the fees for that Billing Period may be prorated (i) from the day the Service was first provided through the end of the Billing Period, or (ii) from the beginning of the Billing Period through the last day in the Billing Period on which the Service was provided, as appropriate. If you make configuration changes to a Service that impact the fees owed for that Service during a Billing Period, then the fees for that Billing Period will be calculated based on the duration that an applicable configuration was effective or the resources consumed by a configuration, as applicable.
4. Services - Reserved Capacity
5. Cinch Marketplace
6. Payments
7. Ordering and Invoicing
8. Taxes
9. Service Terms
(1) We may add, remove, or modify functionality, features, and configurations of the Services, and we may suspend or stop any or all Services altogether. If we choose to suspend or stop providing a Service for customers generally, we will provide notice within the Portal or by email at least 30 days before the effective date of such action.
(1) Cinch will notify you of price increases for the Services and the effective date (the “New Pricing Date”) of the new prices by posting a notice to the Portal or by sending an email to Customer. Price increases for Pay as you Go, and Non-Recurring services will go into effect as of the New Pricing Date. Price increases for Reserved Capacity services will go into effect as of the first renewal after the New Pricing Date.
(1) In providing the Services, Cinch may utilize certain software that it licenses from third parties. From time to time such third parties increase the fees charged to Cinch for such software. In addition to Section 9(b) above, Cinch may from time to time increase the fees it charges to Customer for Customer’s use of such software upon written notice (email sufficing) or posting of such new prices to the Portal.
10. General Services Terms
(1) We reserve the right to modify this Agreement by providing notice to you. We will provide notice of these modifications by posting notice of modifications to this Agreement in the Portal or by email. By continuing to use the Portal after the effective date of the modifications, you agree that you will be subject to the modified Agreement.
(1) If you fail to pay for any Services when payment is due or otherwise breach this Agreement or other applicable terms, we may suspend your use of the Services (with or without notice).
(1) By utilizing Third Party Services, Customer agrees to be bound by any terms and conditions applicable to such Third-Party Services and to comply with any policies applicable to their use. Additionally, if the terms of a Third-Party Service includes any service level agreements then such service level agreements, not any service level agreements provided by Cinch, shall be applicable to such Third Party Service. If Customer utilizes any Cinch-provided Microsoft software or services, Customer agrees to the Microsoft End User License Terms, available at https://app.cinchsoftware.io/legal.
(1) In the event that Customer, its end-users, or a Customer Third Party provide or make available software, code, services, information, content, data or other materials (“Customer-Provided Materials”) to be utilized with the Services, Customer represents and warrants that (i) it has all necessary rights and permissions for its and Cinch’s use of the Customer-Provided Materials, and (ii) it will comply with any third party terms, conditions and/or policies applicable to its use of the Customer-Provided Materials. Customer-Provided Materials are not included in any Cinch-provided warranties or service level commitments.
(1) Cinch may use Cinch Partners, contractors and third-party service providers (together, “Service Providers”) to provide the Cinch Services. Subject to Section 17 below, Cinch shall be responsible for any Service Providers used to provide the Cinch Services to Customer.
(1) Customer and its employees, representatives, and end-users shall comply at all times with Cinch’s Acceptable Use Policy, available at https://app.cinchsoftware.io/legal, as may be amended from time to time. Additionally, Customer may not conduct load testing of the Portal or any Services (such as through the use of automated or manual stress tests) without prior written approval from Cinch, which may be granted, denied, or conditioned at Cinch’s sole and absolute discretion. In addition, Customer and its employees, representatives, and end-users will not use the Services in violation of law or third-party rights, or in a manner that disrupts or may harm Cinch’s or any third party’s facilities or network, or other Cinch customers.
(2) Cinch may suspend or terminate its provision of Services to Customer, or remove or disable access to Customer’s content, data or files with or without notice: (i) in the event of Customer’s material breach of this Agreement, (ii) if Cinch, in its sole and absolute discretion, believes any Customer-Provided Materials or any other content or files are illegal, violate any third party’s copyright, patent, trademark, trade secret, privacy or other third-party proprietary right, or contain or disseminate viruses, spyware or other malware, (iii) if Cinch reasonably believes Customer has violated the Acceptable Use Policy, or (iv) as otherwise necessary to protect Cinch, its products or services, any Third Party Services, or Cinch’s other customers from material harm.
(1) Unless otherwise expressly stated in this Agreement, Cinch shall provide support services to Customer in accordance with the terms of this paragraph. Cinch shall make commercially reasonable efforts to ensure the Services are operational and available to Customer. Customer shall promptly report any issues with the Services to Cinch through the Portal or other method made available by Cinch. Customer shall include a clear description of the problem and any error message, and any other information that Cinch may reasonably request in order to attempt to resolve the issue. Cinch will respond within twenty-four (24) hours to a request made during its normal support hours (8:30 AM ET to 5:00 PM ET, Monday through Friday excluding holidays recognized in Pennsylvania) to correct a defect or error resulting in a critical loss of functionality and will use diligent efforts to develop a work-around for the defect or error. For all other reported defects, errors and problems, Cinch shall respond within a commercially reasonable time, which may include, for a non-critical error, updating the Services with a bug fix or patch at the time of the scheduled update of the Services. Cinch shall not be responsible for providing support for errors or defects attributable to (i) Customer’s misuse of Services or the Cinch API, or breach of this Agreement, (ii) any modification of Services or the Cinch API by a person other than Cinch or its authorized subcontractors, (iii) Customer’s failure to maintain minimum technology standards for use of the Services as specified by Cinch from time to time, (iv) any Third Party Services, or (v) a Force Majeure Event as provided in Section 20(h) below.
(1) Customer agrees to cooperate with Cinch as reasonably necessary for Cinch to provide the Services in a timely, uninterrupted fashion. Cinch shall not be responsible for any delays, defects, losses, failures, or outages due to Customer’s failure to provide timely assistance or information requested by Cinch.
11. Term and Termination
(1) The term of this Agreement commences on the date you accept this Agreement or, if applicable, this Agreement is Signed by both parties (the “Effective Date”) and shall continue until terminated in accordance with this Agreement.
(1) Either party may terminate this Agreement and all Services provided hereunder (i) upon 90 days written notice to the other party of a material breach if such breach remains uncured at the expiration of such period, or (ii) if the other party becomes the subject of a petition in bankruptcy or any other proceeding relating to insolvency, receivership, liquidation or assignment for the benefit of creditors.
(2) The initial term of this Agreement shall be one (1) year from the Effective Date. Thereafter, this Agreement shall automatically renew for successive one (1) year terms unless either party provides written notice of its desire not to renew at least ninety (90) days prior to the expiration of the then-current term. Notwithstanding anything to the contrary in this Section 11(b)(2), individual Services made available under this Agreement may have a specific term and this Agreement shall remain in effect until the expiration or termination of all Services.
(3) For the avoidance of doubt, neither party may terminate this Agreement except as expressly provided in this Section 11(b) or otherwise in this Agreement.
(1) Upon the expiration or termination of this Agreement or a Service, (i) all applicable licenses and Services shall automatically terminate, and (ii) Customer shall cease use of, and shall remove from its systems, the Cinch API. In no event shall any termination relieve Customer of the obligation to pay any fees and other amounts payable to Cinch for the period prior to the effective date of termination, or otherwise payable under this Agreement. After the expiration or termination of this Agreement or a Service, each party shall return or destroy the other party’s Confidential Information and Cinch shall delete all Customer-Provided Materials and any other content or data associated with the terminated Service(s).
12. Suggestions and Usage Data
13. Survival
Sections 2(a)(2), 2(b)(2), 2(c), 8, 12, 13, 14, 16, 17, 19, and 20 shall survive any termination or expiration of this Agreement, as well as any other provisions that by their nature are intended to survive expiration or termination of this Agreement.
14. Confidentiality
(1) “Confidential Information” means any information of a confidential, proprietary or competitively sensitive nature, or that a reasonable business person would consider confidential, whether marked or unmarked, relating to the disclosing party or its Affiliates (as defined in Section 20(f) below) that is disclosed to or obtained by the receiving party in connection with this Agreement, whether before or after the effective date of this Agreement. Confidential Information of Cinch includes without limitation all Cinch Materials, business partner information, customer information, and employee information, pricing policies, profit margins, operating methods, marketing plans, technology, configurations, system accounts, user IDs, passwords, security plans, measures and settings, disaster recovery or business continuity plans and measures, databases, networks, systems, the results of any Service benchmark test or performance information, and any other non-public information related to Cinch’s business or the Services.
(2) Notwithstanding anything in this Section 14(a) to the contrary, Confidential Information shall not include any information that (a) is or becomes generally known to the public without breach of any obligation owed to the disclosing party, (b) was known to the receiving party prior to its disclosure by the disclosing party without breach of any obligation owed to the disclosing party, (c) is received from a third party without breach of any obligation owed to the disclosing party, or (d) was independently developed by the receiving party.
(1) Except as necessary to perform its obligations under the Agreement, the receiving party shall not disclose such other party’s Confidential Information to any third party. Each party shall exercise the same degree of care with the other party’s Confidential Information as it exercises with its own confidential and proprietary information, and in no event less than a reasonable degree of care. The receiving party shall disclose Confidential Information only to those employees, service providers and agents who have a “need to know” in connection with this Agreement and are subject to written or fiduciary obligations of confidentiality equivalent to those of this Section 14. The receiving party shall not use any Confidential Information except in accordance with this Agreement for the sole purpose of performing its obligations or exercising its rights under this Agreement.
(1) Each party may disclose Confidential Information to comply with any applicable law or regulation, or in response to a lawfully issued subpoena, document request, or court order, provided that the party being required to disclose Confidential Information shall (unless prohibited by applicable law or a law enforcement authority), promptly upon receipt of such a request or court order, give written notice to the other party and provide reasonable assistance to the other party (at the other party’s expense) in seeking an injunction, protective order, or other relief to prevent disclosure. Cinch reserves the right to charge Customer at Cinch’s then-current rate for professional services if Cinch is requested or required to respond to subpoenas and/or document requests with respect to Customer-Provided Materials or other Customer information.
(1) Cinch and Customer acknowledge that the remedy at law for any breach of this Section 14 will be inadequate, and that, upon any such breach or threatened breach, the disclosing party shall be entitled as a matter of right to seek injunctive relief in any court of competent jurisdiction, in equity or otherwise, and to enforce the specific performance of the receiving party’s obligations under these provisions without the necessity of proving the actual damage to the disclosing party or the inadequacy of a legal remedy or posting bond. The rights conferred upon the disclosing party by the preceding sentence shall not be exclusive of, but shall be in addition to, any other rights or remedies which the disclosing party may have at law, in equity or otherwise.
15. Warranties and Disclaimers
(1) Each party represents and warrants that it has all rights and powers necessary to enter into this Agreement.
(1) Cinch warrants that (i) it shall provide all Services in a professional, workmanlike manner with a level of care and skill ordinarily exercised in similar circumstances by providers of the same or similar services; (ii) all Services shall conform materially to the applicable user documentation published by Cinch; and (iii) the Services will comply with all laws generally applicable to Cinch’s business as a technology services provider. As Cinch’s sole liability and Customer’s sole and exclusive remedy for any breach of the foregoing warranties in this Section 15(b), Cinch shall re-perform any defective Services at no additional cost and use diligent efforts to remediate any material non-conformities in the Services within a reasonable time or, if Cinch has failed to remediate any such non-conformity or provide a reasonable workaround within thirty (30) days, Customer may at its option terminate the applicable Service with no additional liability in connection with such Service upon written notice to Cinch. Notwithstanding the foregoing, Cinch shall not be responsible for any defects or non-conformities that arise from (w) Customer’s misuse of Services or Customer-Provided Materials or breach of this Agreement, (x) any modification or configuration of Services or Customer-Provided Materials by a person other than Cinch or its authorized subcontractors, (y) Customer’s failure to maintain minimum technology standards for use of the Services as specified by Cinch from time to time, or (z) an event of Force Majeure (as defined below).
(1) Customer warrants that (i) Customer’s use of the Services and the provision of any Customer-Provided Materials to Cinch hereunder is in accordance with Customer's agreements with its customers and Customer’s privacy policies, if applicable, and all applicable federal, state, local, and foreign laws, statutes, rules and regulations, including without limitation any laws relating to data privacy and data security; (ii) Customer-Provided Materials do not and shall not infringe, misappropriate, or violate any patent, copyright, trademark, trade secret, privacy or other proprietary rights of any third party or constitute libel or defamation; (iii) Customer-Provided Materials will not contain any viruses, spyware, or other malware or malicious code; and (iv) Customer has obtained all permissions and consents required, or Customer otherwise has a sufficient legal basis, for Customer’s use of the Services and provision of Customer-Provided Materials, and Customer will provide Cinch with evidence of any required permission, consent, or other legal basis upon request.
(1) Except as expressly provided in Sections 15(a) and 15(b) above, the Services are provided to Customer “as-is.” Cinch makes no representations or warranties of any kind whatsoever, express or implied, in connection with this Agreement or the Services. Additionally, Cinch disclaims any warranty (i) that the Services will be error free or uninterrupted or that all errors will be corrected, (ii) that the Services will be free of viruses, spyware or other malware or malicious code, (iii) with respect to the security of the Services, or to loss of data, merchantability, accuracy of any information provided, fitness for a particular purpose, title, and non-infringement, and any and all warranties arising from course of dealing or usage of trade, and (iv) for issues arising from inadequate bandwidth at your locations, whether on-site or remote. Cinch is not responsible for issues arising from inadequate bandwidth at Customer’s locations. Cinch has no responsibility whatsoever for any Third-Party Services.
(2) CUSTOMER IS SOLELY RESPONSIBLE FOR SELECTING AND CONFIGURING SERVICES THAT ARE APPROPRIATE TO ITS NEEDS. CINCH SHALL HAVE NO RESPONSIBILITY WHATSOEVER ARISING FROM CUSTOMER’S SELECTIONS AND CONFIGURATIONS.
(3) No advice or information, whether oral or written, obtained from Cinch or elsewhere shall create any warranty not expressly stated in this Section 15.
16. Indemnification
(1) Cinch shall indemnify, defend and hold harmless the Customer and its officers, directors, shareholders, employees, agents, successors and assigns (collectively, the “Customer Indemnified Parties”), from any and all out-of-pocket liabilities, judgments, costs, losses, damages and expenses (including reasonable attorneys’ fees and court costs) (collectively, the “Losses”) arising from any demand, claim, suit, action or other proceeding (“Claim”) brought or threatened by a third party against any of the Customer Indemnified Parties, and relating to, based upon or arising out of or in connection with the (i) gross negligence or willful misconduct of Cinch, or (ii) infringement or misappropriation of any U.S. patent, copyright or other U.S. intellectual property right of any third party by the source code and/or other materials contained in the Cinch Services or the Cinch Materials, except as provided in Section 16(a)(2) below.
(2) Notwithstanding Section 16(a)(1) above, Cinch shall not be responsible to the extent that any alleged infringement or misappropriation arises from (i) alterations made by Customer or third parties to Cinch Software or Cinch Materials, (ii) any specifications, instructions or other information provided by Customer or its representatives, including, but not limited to, Customer-Provided Materials, (iii) breach of this Agreement or improper or unauthorized use of the Cinch Software or Cinch Materials by Customer or any third party obtaining access through Customer, or (iv) combination of the Cinch Software or Cinch Materials with products or services that are not provided by Cinch. In the event that any Cinch Software or Cinch Materials become, or in Cinch’s opinion likely to become, the subject of a claim of infringement or misappropriation, Cinch shall, at its option and expense either: (a) procure for Customer the right to continue to use the Cinch Software or Cinch Materials, or (b) replace or modify the infringing Cinch Software or Cinch Materials to make their use non-infringing without loss of substantial functionality (together, the “Remedial Options”). Notwithstanding the foregoing, if Cinch, in its sole discretion, determines that the Remedial Options are not available to it on commercially reasonable terms, Cinch may, at its option, terminate the provision, or Customer’s use, of the allegedly infringing Cinch Service or Cinch Materials and shall promptly provide a refund of prepaid, unused fees for the terminated Cinch Service or Cinch Materials or a service credit for other Services. This Section 16(a) provides Customer’s sole and exclusive remedy and Cinch’s sole obligation and liability for any intellectual property infringement by the Cinch Software and Cinch Materials.
(1) Customer shall indemnify, defend and hold harmless Cinch and its Affiliates, and its and their respective officers, directors, shareholders, employees, agents, licensors, successors and assigns (collectively, the “Cinch Indemnified Parties”), from any and all out-of-pocket Losses arising from any Claim brought or threatened by a third party against any of the Cinch Indemnified Parties, and relating to, based upon or arising out of or in connection with (i) any gross negligence or willful misconduct on the part of Customer or any of Customer’s employees, (ii) the breach of any representation, warranty or covenant made by Customer in this Agreement, (iii) any products and/or services provided by Customer to its customers, offered by Customer to any prospective customer, or used to provide Customer’s products and/or services, (iv) any Third Party Services, or any materials, information and/or specific instructions provided by Customer to Cinch, including all Customer-Provided Materials, (v) any violation of the Acceptable Use Policy or applicable third-party terms, conditions or policies by Customer or its end-users, or (vi) the use of the Services or any Third Party Services by Customer.
(1) Promptly after receipt by a party (the “Indemnified Party”) of notice of the commencement or threatened commencement of any action or proceeding involving a claim for which such Indemnified Party will seek indemnification pursuant to this Section 16, such Indemnified Party shall notify the other party (the “Indemnifying Party”) of such claim in writing. No failure to so notify an Indemnifying Party shall relieve it of its obligations under this Agreement except to the extent that it can demonstrate material damages or prejudice attributable to such failure. Within ten (10) days following receipt of written notice from the Indemnified Party relating to any Claim, but not later than fifteen (15) days before the date on which any response to a complaint or summons is due, the Indemnifying Party shall notify the Indemnified Party in writing if the Indemnifying Party elects to assume control of the defense and settlement of that Claim (a “Notice of Election”).
(2) If the Indemnifying Party delivers a Notice of Election relating to any Claim within the required notice period, the Indemnifying Party shall be entitled to have sole control over the defense and settlement of such Claim; provided that (A) the Indemnified Party shall be entitled to participate in the defense of such Claim and to employ counsel at its own expense to assist in the handling of such Claim, and (B) the Indemnifying Party shall obtain the prior written approval of the Indemnified Party before entering into any settlement of such Claim. The Indemnifying Party shall not be required to indemnify the Indemnified Party for any amount paid or payable by the Indemnified Party in the defense or settlement of any Claim for which the Indemnifying Party has delivered a timely Notice of Election and has commenced and diligently pursued the defense of such Claim if such amount was agreed to without the written consent of the Indemnifying Party.
(3) If the Indemnifying Party does not deliver a Notice of Election relating to any Claim within the required notice period, the Indemnified Party shall have the right to defend and settle the Claim in such manner as it may deem appropriate, at the cost and expense of the Indemnifying Party. The Indemnifying Party shall promptly reimburse the Indemnified Party for all such costs and expenses including but not limited to any and all out-of-pocket Losses and reasonable counsel fees.
17. Limitation of Liability
(1) Customer agrees that Cinch’s maximum, aggregate liability under this Agreement, for any and all claims, damages and causes of action and regardless of the form of action (including, but not limited to, breach of contract, tort or any other legal or equitable theory), shall be limited to Customer’s actual direct damages in an amount not to exceed the lesser of (i) $25,000, or (ii) the total amount paid to Cinch by Customer under this Agreement for the Services to which any such claims or damages relate during the three (3) month period immediately preceding the date of the latest claim.
(2) Under no circumstances shall Cinch be liable to Customer or any third party, for special, incidental, exemplary, punitive, multiple, consequential or indirect damages (including, but not limited to, damages for loss of goodwill or business profits, loss of revenue, work stoppage, data loss, business interruption or computer failure or malfunction), whether such damages are alleged in tort, contract or otherwise, even if Cinch has been advised of the possibility of such damages and even if a remedy fails of its essential purpose. Cinch is not liable for the costs of data recovery or substitute goods or services. Cinch and Customer acknowledge that the limitations of liability contained in this Section 17 are a material part of the Agreement and the allocation of risk between the parties on which Cinch’s pricing depends.
18. Audits
19. Non-Solicit
20. General Provisions
(1) The parties are independent contractors. This Agreement does not create a partnership, franchise, joint venture, agency, fiduciary or employment relationship between the parties.
(1) There are no third-party beneficiaries to this Agreement.
(1) Except as otherwise specified in this Agreement, all notices, permissions and approvals hereunder shall be in writing and shall be deemed to have been given upon: (i) personal delivery, (ii) upon delivery by first class mail with delivery confirmation, or (iii) upon delivery by nationally known overnight courier with delivery confirmation. Notices to Cinch shall be addressed to the attention of CEO, Cinch Software, LLC, 4259 West Swamp Road, Suite 301, Doylestown, PA, 18902. All notices to Customer shall be addressed to the then-current address provided by Customer in the Portal. Either party may change its notice address by providing notice to the other party in accordance with this Section 20(c). Cinch may also change its notice address by providing updated information in the Portal.
(1) No failure or delay by either party in exercising any right under this Agreement shall constitute a waiver of that right.
(1) In the event that any provision of this Agreement is found to be invalid or unenforceable by a court of competent jurisdiction, all other terms of this Agreement shall remain in full force and effect.
(1) This Agreement may not assigned, in whole or in part, by either party without the prior written consent of the other party; provided, however, that either party may assign this Agreement, upon written notice to the other party, (i) to any successor to substantially all its business or assets by merger, reorganization, combination, consolidation, purchase of assets or otherwise, or to any party acquiring substantially all of the assets or business of the business unit of such party to which this Agreement relates, or (ii) to an Affiliate. “Affiliate” means any entity directly or indirectly controlling, controlled by or under common control with a party, where “control” of an entity means ownership or the ability to direct the voting of at least fifty percent (50%) of the equity voting interests in such entity.
(1) This Agreement shall be governed by, and construed in accordance with, the laws of the Commonwealth of Pennsylvania, without regard to its conflicts of laws principles. The parties agree that the United Nations Convention on Contracts for the International Sale of Goods will not apply to this Agreement. The parties hereby consent to the exclusive personal and subject matter jurisdiction and venue of the federal and state courts sitting in the Eastern District of Pennsylvania in any dispute arising under this Agreement.
(1) Except for Customer’s payment obligations under this Agreement, including economic hardship or insufficiency of funds even if caused by an event listed in this Section 20(h), neither party will be liable for any failure or delay in performance under this Agreement which might be due in whole or in part, directly or indirectly, to any contingency, or cause of, any nature beyond the reasonable control of such party (individually and collectively, a “Force Majeure Event”). Force Majeure Events include, but are not limited to, fire, explosion, earthquake, storm, flood or other weather or natural disaster, unavailability or failures of necessary utilities or communications services (including the Internet) or raw materials, power outage, strike, lockout, unavailability of components, acts or omissions of common carriers, any act by a third party, act of war, act of terrorism, insurrection, riot, act of God or a public enemy, public health emergency, any act of government or other public authorities including, any law, ordinance, act, order, regulation, decree, or instructions of government or other public authorities, or judgment or decree of a court of competent jurisdiction (not arising out of breach by such party of this Agreement). For the avoidance of doubt, Cinch is not responsible for any internet connection or bandwidth, including connection speeds, that it has not provided and is not otherwise under its control. If, however, a party’s performance is prevented for ninety (90) days or more, then the other party will be entitled to terminate this Agreement on written notice to the party suffering the Force Majeure Event at any time prior to resumption of performance by the party suffering the Force Majeure Event.
(1) This Agreement, including all selections and configurations made through the Portal, all exhibits, addendums, attachments and other documents, whether attached directly hereto or referenced online, and Cinch-accepted requests for Services made through the Portal, constitutes the entire agreement between the parties and supersedes all prior and contemporaneous agreements, proposals or representations, written or oral, concerning its subject matter. Except as expressly provided in this Agreement, no modification, amendment, or waiver of any provision of this Agreement shall be effective unless it is in writing and Signed or accepted electronically by the party against which the modification, waiver or amendment is sought to be enforced. Notwithstanding any language to the contrary therein, no terms or conditions stated in a Customer purchase order or in any other Customer-provided documentation shall be incorporated into or form any part of this Agreement, and all such terms or conditions shall be null and void.
21. Conflicts
(1) Business Associate Agreement;
(2) Standard Contractual Clauses;
(3) Security, Privacy and Data Processing Addendum;
(4) the body of the Master Cloud Services Agreement;
(5) Service Level Addendum;
(6) Infrastructure as a Service Addendum;
(7) Infrastructure Management and Monitoring Addendum;
(8) Hosting Addendum;
(9) Desktop as a Service Addendum;
(10) Disaster Recovery as a Service Addendum;
(11) Backup as a Service Addendum;
(12) Helpdesk Addendum;
(13) any other Cinch configurations, selections, Cinch-accepted requests, exhibits, addendums or documents referenced directly or indirectly by the Agreement; and
(14) any third-party terms and conditions.
By signing below, I affirm that (i) I am an agent of Customer, (ii) I am authorized to sign on Customer's behalf, and (iii) Customer agrees to be bound by the terms and conditions of this Order and the Agreement.
You must scroll through the whole document before you will be able to accept
Privacy Policy
Last updated: May 5, 2020
This Privacy Policy describes the data collection, use, and disclosure practices of Cinch Software LLC, a Pennsylvania limited liability company, with offices at 4259 West Swamp Road, Suite 301, Doylestown, PA 18902 (“Cinch,” “we,” “our,” or “us”) with respect to cinchsoftware.io, and other websites, online features, and applications owned or controlled by Cinch and that post a link to this Privacy Policy (collectively, the “Services”).
This Privacy Policy applies to information Cinch collects through the Services from visitors and customers, as well as other information provided to us online or offline by third parties, when we associate that information with customers or users of the Services. However, it does not apply to information collected from our employees, contractors, or vendors. It also does not apply to information that you ask us to share with third parties or is collected by Online Tool Providers (as further described below) or to the end-users of our customers. You acknowledge and agree that Cinch is not responsible for the data collection or use practices of any other Services user or third party utilized in providing the Services.
This Privacy Policy describes, among other things:
1. Consent
By accessing or using the Services, you consent to this Privacy Policy. If you do not agree with this Privacy Policy, please do not access or use the Services. Information gathered through the Services may be transferred, used, and stored in the United States or in other countries where our service providers or we are located. If you use the Services, you agree to the transfer, use, and storage of your Personal Information (as defined below) in those countries. The data protection and other laws of the United States and other countries might not be as comprehensive as those in your country. You agree that all transactions relating to the Services or Cinch are deemed to occur in the United States, where our servers are located.
2. Collection of Your Personal and Other Information
When you register for, or use our Services, we collect Personal Information. By “Personal Information” we mean information that can identify or reasonably be linked to an individual, such as:
We also collect user experience recordings, which include a graphical representation of your interactions with the Services, including mouse movements, page scrolling, and information you type (including Personal Information). We use these recordings to help us understand how users interact with our Services and to design a better user experience for you.
You may choose not to provide Personal Information, but this may prevent you from receiving certain features of the Services.
We also collect non-Personal Information relating to the Services, that is, information that does not personally identify an individual. The non-Personal Information we collect includes how you interact with the Services, information generally collected or “logged” by Internet websites or Internet services when accessed or used by users, and information about your web browser or device accessing or using the Services.
Examples of the non-Personal Information we collect are:
We will not use non-Personal Information to try to identify you, and if we associate any non-Personal Information with information that personally identifies you, then we will treat it as Personal Information. As discussed in more detail below, we sometimes use cookies and other automatic information gathering technologies to gather non-Personal Information.
Information collected by the Services may be collected by us or one of our Service Providers or Online Tool Providers.
3. Use of Your Information
We may use the information we collect to:
4. Disclosure of Your Information
We may disclose your Personal Information to third parties as described below.
We may disclose Personal Information to provide the Services, or when you authorize or instruct us to do so, for example when you use the Services to submit content or profile information. We may also disclose Personal Information and non-Personal Information to Service Providers. By “Service Providers” we mean companies, agents, contractors, service providers, or others engaged to perform functions on our behalf (such as processing of payments, provision of data storage, hosting of our website, marketing of our products and services, and conducting audits). When we use a Service Provider, we require that the Service Provider use and disclose the Personal Information and non-Personal Information received from us only to provide their services to us or as required by applicable law.
We may also disclose Personal Information and non-Personal Information to Online Tool Providers. By “Online Tool Provider” we mean a licensor of software that we include in, or use with, the Services, including an API or SDK, that provides a specialized function or service to us and that requires the transmission of Personal Information and/or non-Personal Information to the Online Tool Provider. Online Tool Providers may have the right to use Personal Information and non-Personal Information about you for their own business purposes. Use and disclosure of Personal Information and non-Personal Information by an Online Tool Provider is described in its privacy policy. See Section 5 below for some of the key Online Tool Providers we use.
We may partner with advertisers to provide you with special offers, or to advertise products or services to you. If you redeem or respond to an offer, we may provide your Personal Information to the advertising partner, including your name, email address, gender, and [year of birth]. If you answer questions or fill out surveys from an advertiser, we may share information with that advertiser. The advertising partner’s privacy policy will govern their use of your information, which may include marketing of other products or services to you. You should read each advertiser’s privacy policy before providing information to that advertiser.
We may also disclose your Personal Information to third parties when we believe, in good faith and in our sole discretion, that such disclosure is reasonably necessary to (a) enforce or apply the terms and conditions of the Services, including investigation of potential violations thereof, (b) comply with legal or regulatory requirements or an enforceable governmental request, (c) protect the rights, property or safety of us, our users or other third parties, (d) prevent a crime or protect national security, or (e) detect, prevent or otherwise address fraud, security or technical issues.
Finally, we reserve the right to transfer information (including your Personal Information) to a third party in the event of a sale, merger, or transfer of all or substantially all of the assets of our company relating to the Services, or in the unlikely event of a bankruptcy, liquidation, or receivership of our business. We will use commercially reasonable efforts to notify you of such transfer, for example via email or by posting notice on our website.
Lastly, we may also disclose non-Personal Information, aggregated with information about our other users, to our clients, business partners, merchants, advertisers, investors, potential buyers and other third parties if we deem such disclosure, in our sole discretion, to have sound business reasons or justifications.
5. Cookies and Automatic Information Gathering Technologies
Every time you use the Services (e.g., access a Service webpage, navigate to a specific location within the Service mobile app), we collect Personal Information and non-Personal Information (discussed above in Section 2) regarding that use. For example, to improve our Services, we collect how, when, and which parts of the Services or its features you use, which social media platforms you connect to the Services, and when, how, and what you post to the social media platforms through the Service app. Also, we may use your device’s unique identifier (UDID) or other unique identifiers to assist us in collecting and analyzing this data.
To assist us in collecting and storing this non-Personal Information, we may employ a variety of technologies, including “Cookies,” local browser storage, “web beacons,” “tags,” or “pixels.” A “Cookie” is a small amount of data a website operator, or a third party whose content is embedded in that website, may store in your web browser and that the website operator or, as applicable, the third party, can access when you visit the website. A Cookie may also refer to web-browser-based storage provided by Adobe’s Flash plugin (a “Flash Cookie”). A web beacon, tag or pixel is a small, usually-transparent image placed on a web page that allows the operator of that image, which may be the operator of the website you visit or a third party, to read or write a Cookie.
Your operating system and web browser may allow you to erase information stored in Cookies, Flash Cookies, and local browser storage. But if you do so, you may be forced to login to the Services again and you may lose some preferences or settings. You may also be able to set your browser to refuse all website storage or to indicate when it is permitted, but some features of our Services may not function properly without it. We may use Cookies to keep you logged in, save your preferences for the Services, and to collect information about how you use our Services.
More information about managing Cookies is available here. Cookie management tools provided by your browser may not affect Flash Cookies. More information about managing Flash Cookies is available here. To learn how to manage privacy and storage settings for your local browser storage, please refer to the end user documentation for your browser.
An Online Tool Provider may collect information automatically, in which case Personal Information and non-Personal Information it receives are subject to the Online Tool Provider’s privacy policy. Some Online Tool Providers may allow you to opt out of certain collection and/or uses of your information. You can read more here:
Google Analytics
Matomo
LeadFeeder
6. Transparency and Choice; Do Not Track Signals
If you are a customer, you can update your Personal Information by logging into our Customer Portal (https://app.cinchsoftware.io) and changing your Personal Information in the system. If you are not yet a customer, then you may also request access to your Personal Information by sending an email to support@cinchsoftware.io. We will try to locate and provide you with your Personal Information and give you the opportunity to correct this data, if it is inaccurate, or to delete it, at your request. Regardless, we may need to retain it for legal reasons or for legitimate business purposes, including retention in backups. You may also remove any content that you post to the Services using the deletion or removal options within the Service. However, we (and you) are not able to control information that you have already shared with other users or made available to third parties through the Services.
If you need further assistance with removing any content you posted through the Services, you can email us at support@cinchsoftware.io. Removal of your posted content may not ensure complete or comprehensive removal from our computer systems.
We ask individual users to identify themselves and the information requested to be accessed, corrected, or removed before processing such requests, and we may decline to process requests that are unreasonably repetitive or systematic, require disproportionate technical effort, jeopardize the privacy of others, would be extremely impractical (for instance, requests concerning information residing on backups), or relate to information that is not associated with your Personal Information. In any case, where we provide information access and correction, we perform this service free of charge, except if doing so would require a disproportionate effort.
Please be aware that if you request us to delete your Personal Information, you may not be able to continue to use the Services. Also, even if you request that we delete your Personal Information, we may need to retain certain information for a limited period of time to satisfy our legal, audit and/or dispute resolution requirements.
We may use third-party service providers that collect information for interest-based advertising purposes (advertisements that are tailored to your likely interests, based on categories in which you have shown an interest). To learn more about these third parties and the choices they offer users, please visit the Network Advertising Initiative’s choices page or the Digital Advertising Alliance’s choices page. If you are reading this Privacy Policy from a mobile device, you can learn more about the DAA's mobile choices program here.
We support the development and implementation of a standard "do not track" browser feature that provides customers with control over the collection and use of information about their web-browsing activities. Once a standardized "do not track" feature is released, we intend to adhere to the browser settings accordingly.
You can opt out of receiving marketing e-mails from us by clicking on the “unsubscribe” link in the e-mails. Please note that it may take up to ten (10) business days for your opt-out request to be processed. Also, even if you opt out of marketing e-mails, we may continue to send you certain account-related e-mails, such as notices about your account and confirmations of transactions you have requested.
7. Residents of California; Residents of Canada
California Residents
You may have heard of the California Privacy Protection Act which provides certain rights to California (CCPA) residents in connection with their Personal Information. Our Services are not currently subject to the CCPA. However, do provide notice and transparency about our collection and use of Personal Information as described in Privacy Policy.
Residents of Canada
If you have an objection to the use of your Personal Information as described in this Privacy Policy, you may file a complaint by sending an email to [EMAIL]. We will attempt to accommodate your objection or complaint, but you understand that, to the extent you object to our processing of Personal Information that is necessary for us to provide the Services to you, certain features and functionalities of the Services may no longer be available to you. Nothing in this Privacy Policy prejudices your rights to file a complaint with the Office of the Privacy Commissioner of Canada, and/or with any other applicable data protection authorities.
8. Children
The Services are not intended for users under 13 years of age. We do not knowingly collect Personal Information from users under 13 years of age. We do not authorize users under 13 years of age to use the Services.
9. Information Security
We utilize reasonable information security measures to safeguard your Personal Information against unauthorized access, modification, or destruction. For example, we utilize Secure Socket Layer (SSL), Transport Layer Security (TLS), or similar encryption technology when sensitive data is transmitted over the Internet, and use firewalls to help prevent external access into our network. However, no data transmission over the Internet and no method of data storage can be guaranteed to be 100% secure. Therefore, while we strive to use commercially acceptable means to protect your Personal Information, we cannot guarantee its security.
We restrict access to Personal Information in our possession to our employees, Service Providers, and Online Tool Providers who need to know that information in order to operate, develop, improve or support our Services. If we share Personal Information with Service Providers or Online Tool Providers, we require that they also use reasonable information security measures to safeguard your Personal Information and only use your Personal Information for the purposes for which we share it with them.
10. Third Party Websites
Please note that the Services may link or integrate with third-party sites, services or apps. We are not responsible for the privacy or security policies or practices or the content of such third parties. Accordingly, we encourage you to review the privacy and security policies and terms of service of those third parties so that you understand how those websites collect, use, share and protect your information.
11. Changes to this Policy
We may modify or update this Privacy Policy periodically with or without prior notice by posting the updated policy on this page. You can always check the “Last Updated” date at the top of this document to see when the Privacy Policy was last changed. If we make any material changes to this Privacy Policy, we will notify you by reasonable means, which may be by e-mail or posting a notice of the changes on our website prior to the changes becoming effective. We encourage you to check this Privacy Policy from time to time. IF YOU DO NOT AGREE TO CHANGES TO THIS PRIVACY POLICY, YOU MUST STOP USING THE SERVICES AFTER THE EFFECTIVE DATE OF SUCH CHANGES (WHICH IS THE “LAST UPDATED” DATE OF THIS PRIVACY POLICY).
12. Questions
To ask questions about our Privacy Policy or to lodge a complaint, contact us at:
Cinch Software LLC
4259 West Swamp Road
Suite 301
Doylestown, PA 18902 USA
Email: support@cinchsoftware.io
By signing below, I affirm that (i) I am an agent of Customer, (ii) I am authorized to sign on Customer's behalf, and (iii) Customer agrees to be bound by the terms and conditions of this Order and the Agreement.
You must scroll through the whole document before you will be able to accept
Infrastructure Management and Monitoring Services Addendum
This Infrastructure Management and Monitoring Services Addendum (this “Addendum”) is subject to and part of the Cinch Master Cloud and Managed Services Agreement (the “Agreement”) between Cinch Software LLC (“Cinch”) and Customer. Any capitalized terms that are not defined in this Addendum shall have the meanings set forth in the Agreement.
1. Description of Services and Deliverables
This Addendum outlines the Cinch management and monitoring services (“Infrastructure Management Services”), each of which may be purchased by Customer pursuant to one or more Service Orders. Each Service Order will specify the specific Infrastructure Management Services purchased, and the equipment and software (the “Managed Systems”) which Cinch will manage and/or provide services. Customer and Cinch will mutually agree on RACI documentation and final standard operating procedures (“SOPs”) based on Customer-provided standard operating procedures. Customer will cooperate with Cinch as reasonably necessary for Cinch to provide the Infrastructure Management Services in a timely fashion. Cinch shall not be responsible for any delays or failure to meet any service level attributable to Customer’s failure to provide timely assistance or information or Customer’s failure to communicate timeline decisions to Cinch.
2. Service Level Agreement: Cinch will provide certain aspects of the Infrastructure Management System to Customer in accordance with the following service levels (this “SLA”).
Response Time SLA for Remediation Services. Beginning forty-five (45) days after the effective date of the applicable Service Order and continuing for the term thereof, Cinch will respond to issues relating to the Infrastructure Management Services, in accordance with the tables below and based on the priority of the issue. Cinch is not responsible for issues caused by any of the items within the definition of Excluded Downtime (“Excluded Issues”).
SLA | Criteria | Initial Response Commitment Level |
---|---|---|
Response | Initiate response to monitoring system alert | 15 minutes response |
Priority | Status | Action | Time | Escalation |
---|---|---|---|---|
P1 - Critical | Unassigned | Response/Acknowledgement | 15 minutes | NOC Tier 1 |
P1 | Assigned | NOC escalates to Tier 2 | 15 minutes | NOC Tier 2 |
P1 | Assigned | Tier 2 calls Engineer | 30 minutes | Engineering |
P1 | Assigned | Crisis Management Process | 1 hour | CRISIS |
P2 - High | Unassigned | Response/Acknowledgement | 15 minutes | NOC Tier 1 |
P2 | Assigned | NOC escalates to Tier 2 | 1 hour | NOC Tier 2 |
P2 | Assigned | Tier 2 calls Engineer | 4 hours | Engineering |
P3 - Low | Unassigned | Response/Acknowledgement | 15 minutes | NOC Tier 1 |
P2 | Assigned | NOC escalates to Tier 2 | 8 hours | NOC Tier 2 |
P2 | Assigned | Tier 2 calls Engineer | 24 hours | Engineering |
Priority Level | Criteria |
---|---|
Priority 3 | Managed Systems are Available, but with minor operational variances (e.g. bugs) |
Priority 2 | Managed Systems are partially available |
Priority 1 | Managed Systems are completely unavailable |
For each issue responded to in accordance with this Section 3, Cinch will record relevant information in its incident management system and provide access to Customer upon request. In addition, for each calendar month, Cinch will deliver a report to Customer that summarizes all issues in such month, by no later than seven (7) days after the end of such month.
4. Service Level Agreements Remedies
The remedies in Sections 2 and 3 are Customer’s sole and exclusive remedies, and Cinch’s sole liability, for failure to meet the Infrastructure Management Services service levels provided herein.
5. Excluded Issues
Cinch is not required to provide support for Excluded Issues. Cinch may, in its sole discretion, provide support for Excluded Issues, and Customer will pay for all such support at Cinch’s then-standard hourly rate. Cinch is not responsible for Customer’s failure, for any reason, to respond to alerts or incidents escalated by Cinch in accordance with this Addendum or the SOPs.
6. Customer Responsibilities
7. Transition Services
If Customer requests (which must be made before the termination or expiration of the applicable Service Order), then Cinch, for a commercially reasonable period of time (not to exceed thirty (30) days) will provide assistance to Customer in the transfer of Customer’s Managed Systems to a third party or to a Customer site (the “Transition Services”). Such Transition Services will be rendered and paid for by Customer on a time and material basis, plus all reasonable and necessary travel and living expenses. Promptly after Customer’s request (which must be made no later than thirty (30) days after the end of the applicable Service Order), Cinch will provide Customer with all of Customer’s data in Cinch’s possession, at no expense to Customer.
By signing below, I affirm that (i) I am an agent of Customer, (ii) I am authorized to sign on Customer's behalf, and (iii) Customer agrees to be bound by the terms and conditions of this Order and the Agreement.
You must scroll through the whole document before you will be able to accept
Backup as a Service Addendum
This Backup as a Service Addendum (this “Addendum”) is subject to and part of the Cinch Master Cloud and Managed Services Agreement (the “Agreement”) between Cinch Data Solutions LLC (“Cinch”) and Customer. Any capitalized terms that are not defined in this Addendum shall have the meanings set forth in the Agreement.
1. Description of Services
1.1. Cinch offers cloud-based Customer-managed backup and recovery services (“Recovery Services”) designed to Customer’s backed-up Cinch Cloud and on-premise data and systems. This Addendum outlines the terms and conditions for the Recovery Services which may be selected and configured by Customer through the Cinch Portal. Additionally, Cinch and Customer will mutually agree to a Service Order and applicable RACI chart. Customer will configure the specific backup policies, including the Customer equipment and systems to be backed up (“Protected Systems ”), the Recovery Point Objective, and Recovery Time Objective. The “Recovery Point Objective” or “RPO” is the point in time from which data can be restored from Protected Systems (e.g., all data older than three days old). The “Recovery Time Objective” or “RTO” is the period of time it will take to restore the data from Protected Systems (e.g., within twenty-four hours).
1.2. CUSTOMER IS SOLELY RESPONSIBLE FOR SELECTING AND CONFIGURING RECOVERY SERVICES, INCLUDING SELECTING PROTECTED SYSTEMS, THAT ARE APPROPRIATE TO ITS NEEDS. Cinch SHALL HAVE NO RESPONSIBILITY WHATSOEVER FOR CUSTOMER’S SELECTIONS AND CONFIGURATIONS.
1.3. The Recovery Services back up and replicate Protected Systems to the Cinch cloud. When requested by Customer, Cinch will restore the Protected Systems back to client control and managed infrastructure.
This service option may be configured by Customer, including the following options:
Feature | Function |
---|---|
Redundancy of the backup service | The backup can be maintained at two separate locations. |
Automatic replication | New backups on your primary storage location are mirrored to an offsite vault. |
Flexible replication policies | Replication can be scheduled or run on demand. |
End-to-end encryption | Backup data remains encrypted during transmission to Cinch and in storage. |
Efficient processing | Block-level delta processing technology replicates only new and changed data blocks. Compression and bandwidth throttling minimize network traffic. |
Bandwidth throttling | Set bandwidth throttling policy to reduce use of network at specific days or times of day. |
1.4. Customer can choose an RTO of 4-hours or 24-hours. All you need is a computer and an Internet connection to remotely access your recovered systems and data from our secure, purpose-built cloud.
1.5. Cinch Backup Service Operations
1.5.1. Service Options
1.5.2. Local Back-up and Management
These components will allow you to back-up locally in your data center and have Cinch manage to ensure the solution is performing consistently and as expected.
1.5.3. Replicated Back-up to the Cloud
If subscribed and contracted with Cinch, Cinch can provide Veeam or Commvault as a backup engine that operates at the hypervisor level and enables protection of both physical and individual virtual machines and their associated virtual machine disk(s).
1.6 Fee Schedule
In the event you subscribe to the Cinch Cloud for recovery purposes, the following fee schedule will be applicable:
2. Monitoring & Management with Service Levels
2.1 Monitoring System: Cinch will use system monitoring tools (the “Monitoring Systems”) to monitor the Managed Systems. Cinch will use an incident management system to automatically create incident tickets and track the management of those incidents.
2.2 Proactive Management: Cinch will provide the Infrastructure Management Services identified in the applicable Service Order, for the Managed Systems specified in the applicable Service Order. The Infrastructure Management Services may include:
2.3 Performance Tracking/Reporting: Cinch will regularly monitor and analyze the performance and utilization data from Managed Systems, to identify trends and tuning opportunities with respect to Managed Systems. That data will be shared with Customer on an ad hoc basis, and on a monthly management report, which reviews the service level status and service support delivery of Managed Systems. As reasonably requested by Customer, Cinch will provide reports regarding the performance, capacity, availability, and incidents for of all Managed Systems. Cinch and Customer will also meet as reasonably requested by Customer to review the status of the account.
2.4 Remediation Services: For incidents that have been detected and reported to Cinch by the Monitoring Systems (“Incidents”), Cinch will provide the first level response. Cinch will provide this response in accordance with a Customer-provided run book, which has been reviewed and accepted by Cinch (not to be unreasonably withheld, conditioned, or delayed). Customer hereby authorizes Cinch to open support tickets for Customer with Customer’s internal escalation resources and/or third parties required for resolution (including, but not limited to, manufacturers, service providers, and telecommunications carriers). Cinch will work to remediate Incidents, as set forth in the applicable Service Order and the SOPs. Customer may engage Cinch to manage the troubleshooting and resolution of other issues, on a time and materials basis or as part of an established retainer based Service, in either case as set forth in one or more SOWs.
2.5 Standard Operating Procedures: The SOPs will contain prioritization levels associated with specific events, business requirements, and other management and support criteria designated by Customer. The SOPs will specify the prioritization definitions outlined in Help Desk Procedures, the SOPs will govern the escalation and issue management process.
2.6 Periodic Review Meetings: The Cinch employee that is dedicated to managing Customer’s account (“Account Manager”) may from time to time meet with stakeholders from Customer and other members of the Cinch support team to review reports, identify meaningful trends, and to discuss the priorities and concerns of all parties. These meetings are designed to last from one to two hours, and may be held at Customer’s location, by telephone, and/or as otherwise mutually agreed by the parties.
2.7 Infrastructure as a Service: All hardware provided by Cinch that is not sold or leased to Customer pursuant to a Service Order, is the sole property of Cinch and will remain so for the Term.
2.8 Equipment Location Use and Repair: If Cinch-provided Managed Systems are located other than at a Cinch-owned or Cinch-managed location (collectively, “Off-Premises Cinch Equipment”), then Customer agrees to the terms and conditions of subsections 1(h) and 1(i). Customer will maintain and use Off-Premises Cinch Equipment only at the location shown on the applicable Service Order. Customer agrees that it will not move Off-Premises Cinch Equipment from that location without the advanced written approval of Cinch. Customer is solely responsible for maintaining all Off-Premises Cinch Equipment in good repair and proper working order. Customer is solely responsible for maintaining a safe and sufficient operating environment and protecting all Off-Premises Cinch Equipment from damage of any kind whatsoever. Customer will continue to make all required payments to Cinch in the event of any loss, damage or destruction of any Off-Premises Cinch Equipment, including if such equipment is rendered inoperable or is completely destroyed. Customer will not modify, or make alterations or attachments to any Off-Premises Cinch Equipment without prior written authorization from Cinch. Customer acknowledges and warrants that Cinch or its agents shall have the right to inspect any Off-Premises Cinch Equipment during Customer’s normal business hours without notice to Customer at such Off-Premises Cinch Equipment’s current location. Customer will cooperate with Cinch or its agents as necessary to complete regular maintenance and repair activities of Off-Premises Cinch Equipment. Upon termination or expiration of the applicable Service Order, Customer will return all Off-Premises Cinch Equipment to Cinch in substantially the same condition as when such equipment was provided to Customer, normal wear and tear expected. Customer acknowledges and agrees that Cinch will invoice Customer, and Customer will pay, for all repairs or replacements to Off-Premises Cinch Equipment.
2.9 Insurance: During the Term, Customer will procure and maintain property insurance covering all Off-Premises Cinch Equipment at Customer’s sole expense, naming Cinch or its designee as the sole loss payee, for the full replacement value of the Off-Premises Cinch Equipment, and general liability insurance listing Cinch or its designee as an additionally insured. Customer will furnish Cinch with proof of insurance upon request. If Customer is unwilling or unable to provide proof of insurance, Cinch will procure such insurance for the Off-Premises Cinch Equipment and add the cost of such insurance to the amounts due from Customer under this agreement. All changes to such insurance must disclosed in writing to Cinch within thirty (30) days of Customer becoming aware of such changes. Customer hereby irrevocably appoints Cinch as its attorney-in-fact to make claim for, receive payment of and execute and endorse all documents, checks or drafts for loss or damage under any insurance policy insuring the Off-Premises Cinch Equipment.
3 Service Level Agreement. Cinch will provide certain aspects of the Infrastructure Management System to Customer in accordance with the following Service Level Agreement (this “SLA”).
3.1 System Availability
3.2 Monitoring System. In each calendar month during the Term, the Percent Available for the Monitoring Systems will be 99.99%.
3.3 Response Time SLA for Remediation Services. Beginning forty-five (45) days after the Acceptance Date and continuing for the Term, Cinch will respond to issues relating to the Infrastructure Management Services, in accordance with the tables below and based on the priority of the issue. Cinch is not responsible for issues caused by any of the items within the definition of Excluded Downtime (“Excluded Issues”).
SLA | Criteria | Initial Response Commitment Level |
---|---|---|
Response | Initiate response to monitoring system alert | < 15 minutes response |
In a calendar month where Cinch fails to initially respond to an issue within the Initial Response Commitment Level above, Customer will give Cinch written notice thereof no later than ten (10) business days after the end of such calendar month. Cinch will investigate such failure promptly after its receipt of notice.
3.4 Incident Management and Escalation SLA. Cinch will acknowledge and escalate issues reported by the Monitoring Systems, in accordance with the following table.
Priority | Status | Action | Time | Escalation |
---|---|---|---|---|
P1 - Critical | Unassigned | Response/Acknowledgement | 15 minutes | NOC Tier 1 |
P1 | Assigned | NOC escalates to Tier 2 | 15 minutes | NOC Tier 2 |
P1 | Assigned | Tier 2 calls Engineer | 30 minutes | Engineering |
P1 | Assigned | Crisis Management Process | 1 hour | CRISIS |
P2 - High | Unassigned | Response/Acknowledgement | 15 minutes | NOC Tier 1 |
P2 | Assigned | NOC escalates to Tier 2 | 1 hour | NOC Tier 2 |
P2 | Assigned | Tier 2 calls Engineer | 4 hours | Engineering |
P3 - Low | Unassigned | Response/Acknowledgement | 15 minutes | NOC Tier 1 |
P2 | Assigned | NOC escalates to Tier 2 | 8 hours | NOC Tier 2 |
P2 | Assigned | Tier 2 calls Engineer | 24 hours | Engineering |
Priority Level | Criteria |
---|---|
Priority 3 | Managed Systems are Available, but with minor operational variances (e.g. bugs) |
Priority 2 | Managed Systems are partially available |
Priority 1 | Managed Systems are completely unavailable |
3.5 Knowledge Management SLA
For each issue responded to in accordance with this Section 3, Cinch will record relevant information in its incident management system and provide access to Customer upon request. In addition, for each calendar month, Cinch will deliver a report to Customer that summarizes all issues in such month, by no later than seven (7) days after the end of such month.
In a calendar month where Cinch fails to perform its obligations in this Section 3.5, Customer will give Cinch written notice thereof no later than ten (10) business days after the end of such calendar month. Cinch will investigate such failure promptly after its receipt of notice.
3.6 Excluded Issues
Cinch is not required to provide support for Excluded Issues. Cinch may, in its sole discretion, provide support for Excluded Issues, and Customer will pay for all such support at Cinch’s then-standard hourly rate. Cinch is not responsible for Customer’s failure, for any reason, to respond to alerts or incidents escalated by Cinch in accordance with this Exhibit.
3.7 Customer Responsibilities
Customer alone is responsible for:
3.8 Transition Services
If Customer requests (which must be made before the termination or expiration of the applicable Service Order), then Cinch, for a commercially reasonable period of time (not to exceed thirty (30) days) will provide assistance to Customer in the transfer of Customer’s Managed Systems to a third party or to a Customer site (the “Transition Services”). Such Transition Services will be rendered and paid for by Customer on a time and material basis, plus all reasonable and necessary travel and living expenses. Promptly after Customer’s request (which must be made no later than thirty (30) days after the end of the applicable Service Order), Cinch will provide Customer with all of Customer’s data in Cinch’s possession, at no expense to Customer.
By signing below, I affirm that (i) I am an agent of Customer, (ii) I am authorized to sign on Customer's behalf, and (iii) Customer agrees to be bound by the terms and conditions of this Order and the Agreement.
You must scroll through the whole document before you will be able to accept
Help Desk and Command Center Operations Addendum
This Help Desk and Command Center Operations Addendum (this “Addendum”) is subject to and part of the Cinch Master Cloud and Managed Services Agreement (the “Agreement”) between Cinch Data Solutions LLC (“Cinch”) and Customer. Any capitalized terms that are not defined in this Addendum shall have the meanings set forth in the Agreement. Cinch shall provide the applicable help desk services to Customer as provided in an applicable Service Order Signed by both parties (the “Help Desk Services”).
I. General
1. Performance Tracking/Reporting: Cinch shall provide a monthly management report of request statuses and service support delivery. Report metrics will be mutually agreed upon by Customer and Cinch and documented as part of the finalized standard operating procedures and RACI document.
2. Support Tiers.
3. Reporting Guidelines:
4. Tier 1 Help Desk Support Services: The Help Desk Services include support for Cinch-supported desktop software, remote user connectivity, password administration, and desktop hardware. This Help Desk Services are available Monday to Friday, 7AM to 7PM (“Support Hours”), unless otherwise agreed upon in the applicable Service Order.
5. Tier 2 Command Center Operation Support Services: Tier 2 support may manage strategic partners and manufacturers reasonably determined by Cinch. Tier 2 support is available to resolve issues that Tier 1 cannot resolve within the initial resolution SLA. Cinch resources providing Tier 2 support will also determine whether issues need to be escalated to Tier 3 and for managing follow-up with Customer. Tier 2 support is available 24/7/365.
6. Tier 3 Engineering Support Services: Tier 3 support is available 24/7/365. These engineers will be engaged to provide support as needed as reasonably determined by Cinch.
7. Standard Operating Procedures: Customer will cooperate with Cinch as reasonably necessary for Cinch to provide the Help Desk Services in a timely fashion. Cinch shall not be responsible for any delays or failure to meet any service level attributable to Customer’s failure to provide timely assistance or information or Customer’s failure to communicate timeline decisions to Cinch. Prioritization levels associated with specific events, business requirements, and other criteria designated by Customer will be mutually agreed upon in “Standard Operating Procedures” and maintained in the Cinch system. The Standard Operating Procedures will clearly communicate the prioritization matrix, which will be mutually agreed upon by Customer and Cinch that governs the escalation and issue management process. Supported application and hardware lists will be maintained and mutually agreed upon with the Standard Operating Procedures. Response Center request system configuration and call flow are defined with escalation and communication policies as well.
8. Non-Supported Technologies: Cinch may at its discretion provide support for devices, software and other technologies that are not part of Cinch’s standard support offerings. Such support, if provided, is made on a commercially reasonable effort basis and the service levels described in this Addendum shall not apply to such support.
9. Modifications: This Addendum, including the service levels below, is subject to modifications in response to changes in technology services and support needs. Modifications will be agreed upon in writing by both Cinch and Customer and may be included in a Service Order.
II. Service Level Agreement
1. Response SLA and Incident Management SLA for Help Desk Services
“Initial Response” means an initial acknowledgment of the request and a commencement of evaluation or resolution.
Priority | Status | Action | Time | Escalation |
---|---|---|---|---|
P1 - Critical | Unassigned | Response/Acknowledgement | 15 minutes | Help Desk |
P1 | Assigned | Help Desk escalates to Tier 2 | 15 minutes | NOC Tier 2 |
P1 | Assigned | Tier 2 calls Engineer | 30 minutes | Engineering |
P1 | Assigned | Crisis Management Process | 1 hour | CRISIS |
P2 - High | Unassigned | Response/Acknowledgement | 15 minutes | Help Desk |
P2 | Assigned | Help Desk escalates to Tier 2 | 1 hour | NOC Tier 2 |
P2 | Assigned | Tier 2 calls Engineer | 4 hours | Engineering |
P3 - Low | Unassigned | Response/Acknowledgement | 15 minutes | Help Desk |
P2 | Assigned | Help Desk escalates to Tier 2 | 8 hours | NOC Tier 2 |
P2 | Assigned | Tier 2 calls Engineer | 24 hours | Engineering |
Priority Definitions
Priority Level | Criteria |
---|---|
Priority 3 | Minor adverse impact to end user use of product. For example, the issue impacts only 1 user or is not replicable. |
Priority 2 | Use of product is severely impaired or degraded preventing major functions from being performed by end user. |
Priority 1 | Unplanned Service Interruptions and/or any circumstance where the end user is unable to access or use the product or when significant and substantial adverse operational impact occurs preventing any useful work from being done for multiple users. |
2. Knowledge Management SLA
Will ensure that historical information is captured and accessible to support the resolution of both existing and future incidents in accordance with the following:
Criteria | Commitment Level | |
---|---|---|
Knowledge Management | Ticket information updates | 100% |
Knowledge Management | Monthly Management report will be delivered each month. | 100% |
III. Customer Responsibilities
1. Customer is solely responsible for:
2. Customer will not use Services for illegal conduct or interfere with or disrupt other network users and services.
3. Customer must adhere to the Cinch Acceptable Use Policy.
By signing below, I affirm that (i) I am an agent of Customer, (ii) I am authorized to sign on Customer's behalf, and (iii) Customer agrees to be bound by the terms and conditions of this Order and the Agreement.
You must scroll through the whole document before you will be able to accept
Disaster Recovery as a Service Addendum
This Disaster Recovery as a Service Addendum (this “Addendum”) is subject to and part of the Cinch Master Cloud and Managed Services Agreement (the “Agreement”) between Cinch Software LLC (“Cinch”) and Customer. Any capitalized terms that are not defined in this Addendum shall have the meanings set forth in the Agreement.
1. Description of Services
This service option may be configured by Customer, including the following options:
Feature | Function |
---|---|
Automatic replication | New backups on your primary storage location are mirrored to an offsite vault. |
Flexible replication policies | Replication can be scheduled or run on demand. |
End-to-end encryption | Backup data remains encrypted during transmission to Cinch and in storage. |
Efficient processing | Block-level delta processing technology replicates only new and changed data blocks. Compression and bandwidth throttling minimize network traffic. |
Bandwidth throttling | Set bandwidth throttling policy to reduce use of network at specific days or times of day. |
Auto failover (not available for all technology selections) | If the primary system goes down, an IT administrator can access or activate the Cinch Cloud system and restore data to and from it. This system can be automated to require no human intervention. |
2. Cinch DRaaS Service Operations
(1) Disaster Recovery-as-a-Service offering is operated and managed by Cinch:
(2) You are responsible for:
(1) Benefits include:
3. Monitoring & Management with Service Levels
(1) Monitoring Dashboard/Portal and Business Views: Cinch will provide Customer with access to a dashboard and management portal (“Customer Portal”) through which Customer may access incident ticketing information, reports, and trending data with respect to Managed Systems.
(2) Monitoring Services: Cinch’s proactive
Monitoring Systems and Customer Portal will
be available as set forth in this Addendum. The Monitoring Systems collect
and evaluate
availability and performance statistics from Managed Systems and present
those
statistics to Customer via the Customer Portal. In addition to monitoring
up/down status
of each device with a Managed System, the Monitoring System monitors the
critical
application attributes that are identified in cooperation with Customer and
set forth a
Service Order.
(3) Incident Management: Cinch will manage the collection, communication, and escalation of incidents arising as a result of alerts received from the Monitoring System, in accordance with the written standard operating procedures (the “SOPs”) agreed upon with Customer in writing and the terms and conditions defined in this document.
(1) Preventative Maintenances: Cinch will perform appropriate preventative maintenance tasks on Managed Systems. The tasks may include services such as log review, job monitoring, and replication job monitoring, disk defragmentation, virtualization configuration analysis and adjustments, each as further defined in an SOP.
(2) Health Checks: Health checks are a technical assessment of Customer’s existing physical and virtual Managed Systems to ensure that you continue to achieve optimal levels of performance and efficiency. Health checks maximize the return on your investments and provide a proactive, in-depth understanding of the performance level across your network, servers, storage systems, and backup systems. Cinch staff will provide daily health checks in accordance with the applicable SOP to ensure that all critical components of your environment are physically inspected and affirmed operational by one of its team members.
4. Service Level Agreement
(1) “Available” or “Availability” means the time (in minutes) that the system being measured could establish a network connection and that its material features and functions are up, running, and operationally functional. "Excluded Downtime" means the time (in minutes) that the system being measured is not Available, to the extent caused by (A) Customer-provided hardware, software, or other equipment not provided by or certified by Cinch; (B) Customer-provided or Customer-leased local area networks or ISP connections; (C) modifications made by Customer without Cinch’s prior written approval; (D) use of the system by Customer, its employees, agents, or contractors, in ways not authorized by this Addendum; (E) Maintenance Downtime, as defined below; (F) Customer’s failure to use sufficient, redundant power sources or Internet connectivity; (G) a Force Majeure event as herein or (H) any other system outside of Cinch’s control. “Maintenance Downtime” means scheduled repairs, maintenance, upgrades, or deployments related to Cinch’s equipment, network, or facility, and other events agreed upon in advance by Cinch and Customer. “Total Minutes” shall mean the number of minutes in the applicable calendar month.
“Percent Available” will be calculated as follows: ((Availability / (Total Minutes – Excluded Downtime)) x 100).
(1) In each calendar month during the Term, the Percent Available for the Monitoring Systems will be 99.99%.
(1) In each calendar month during the Term, the Percent Available for the Customer Portal will be 99.99%.
(1) In each calendar month during the Term, the Percent Available for the network within the locations used to store Managed Systems (“Data Center”) will be 99.99%.
(1) In each calendar month during the Term, the Percent Available for each Redundant Device managed by Cinch will be 99.99%.
(1) In each calendar month during the Term, the Percent Available for each Non-Redundant Device managed by Cinch will be 50.00%.
(1) Customer may require Cinch to manage or support hardware and/or software products for which Cinch does not typically provide support as part of the Infrastructure Management Services (collectively, “Non-Standard Equipment”). Cinch shall not be responsible under this SLA or this Addendum for the Availability or functionality of any Non-Standard Equipment, and Customer shall not be eligible for credits under this SLA for the failure of any Non-Standard Equipment.
(1) Cinch shall use commercially reasonable efforts to secure: (i) the Data Centers and networks contained therein; and (ii) Managed Systems (including testing and deploying security patches and fixes, where appropriate).
(1) In a calendar month where Cinch fails to meet any expressly stated service level commitment in this Section 4, Customer will give Cinch written notice thereof no later than ten (10) business days after the end of such calendar month. Cinch will investigate such failure promptly after its receipt of notice.
5. Response Time SLA for Remediation Services
(1) Cinch will initially respond to issues reported by the Monitoring Systems, in accordance with the following table.
SLA | Criteria | Initial Response Commitment Level |
---|---|---|
Response | Initiate response to monitoring system alert | < 15 minutes response |
(2) In a calendar month where Cinch fails to initially respond to an issue within the Initial Response Commitment Level above, Customer will give Cinch written notice thereof no later than ten (10) business days after the end of such calendar month. Cinch will investigate such failure promptly after its receipt of notice.
(1) Cinch will acknowledge and escalate issues reported by the Monitoring Systems, in accordance with the following table.
Priority | Status | Action | Time | Escalation |
---|---|---|---|---|
P1 - Critical | Unassigned | Response/Acknowledgement | 15 minutes | NOC Tier 1 |
P1 | Assigned | NOC escalates to Tier 2 | 15 minutes | NOC Tier 2 |
P1 | Assigned | Tier 2 calls Engineer | 30 minutes | Engineering |
P1 | Assigned | Crisis Management Process | 1 hour | CRISIS |
P2 - High | Unassigned | Response/Acknowledgement | 15 minutes | NOC Tier 1 |
P2 | Assigned | NOC escalates to Tier 2 | 1 hour | NOC Tier 2 |
P2 | Assigned | Tier 2 calls Engineer | 4 hours | Engineering |
P3 - Low | Unassigned | Response/Acknowledgement | 15 minutes | NOC Tier 1 |
P2 | Assigned | NOC escalates to Tier 2 | 8 hours | NOC Tier 2 |
P2 | Assigned | Tier 2 calls Engineer | 24 hours | Engineering |
(2) In a calendar month where Cinch fails to acknowledge or escalate an issue within the time set forth above, Customer will give Cinch written notice thereof no later than ten (10) business days after the end of such calendar month. Cinch will investigate such failure promptly after its receipt of notice.
Priority Definitions
Priority Level | Criteria |
---|---|
Priority 3 | Managed Systems is not Available, but with minor operational variances (e.g.,bugs). |
Priority 2 | Managed systems are partially unavailable |
Priority 1 | Managed Systems are completely unavailable |
(1) For each issue responded to in accordance with this Section 5, Cinch will record relevant information in its incident management system and provide access to Customer upon request. In addition, for each calendar month, Cinch will deliver a report to Customer that summarizes all issues in such month.
(2) In a calendar month where Cinch fails to perform its obligations in this subsection, Customer will give Cinch written notice thereof no later than ten (10) business days after the end of such calendar month. Cinch will investigate such failure promptly after its receipt of notice.
6. Excluded Issues
Cinch is not required to provide support for Excluded Issues. Cinch may, in its sole discretion, provide support for Excluded Issues, and Customer will pay for all such support at Cinch’s then-standard hourly rate. Cinch is not responsible for Customer’s failure, for any reason, to respond to alerts or incidents escalated by Cinch in accordance with this Addendum.
7. Customer Responsibilities
Customer alone is responsible for:
(1) Designating a qualified liaison between itself and Cinch.
(2) Providing Cinch with the names of persons (and alternates) responsible for technical, administrative, and contact matters.
(3) Obtaining licenses and complying the terms thereof for all software utilized on Customer’s equipment and environments.
(4) All communications with Customer’s end users, whether for technical support, business relations or any other purpose; and
(5) If applicable, providing Cinch with a list of end users for service and/or support.
8. Transition Services
If Customer requests (which must be made before the termination or expiration of the applicable Service Order), then Cinch, for a commercially reasonable period of time (not to exceed thirty (30) days) will provide assistance to Customer in the transfer of Customer’s Managed Systems to a third party or to a Customer site (the “Transition Services”). Such Transition Services will be rendered by Cinch and paid for by Customer on a time and material basis, plus all reasonable and necessary travel and living expenses. Promptly after Customer’s request (which must be made no later than thirty (30) days after the end of the applicable Service Order), Cinch will provide Customer with all of Customer’s data in Cinch’s possession, at no expense to Customer.
By signing below, I affirm that (i) I am an agent of Customer, (ii) I am authorized to sign on Customer's behalf, and (iii) Customer agrees to be bound by the terms and conditions of this Order and the Agreement.
You must scroll through the whole document before you will be able to accept
Infrastructure as a Service Addendum
This Infrastructure as a Service Addendum (this “Addendum”) is subject to and part of the Cinch Master Cloud and Managed Services Agreement (the “Agreement”) between Cinch Software LLC (“Cinch”) and Customer. Any capitalized terms that are not defined in this Addendum shall have the meanings set forth in the Agreement.
1. Description of Services
The “Private Cloud” Service provides Customer with a single-tenant cloud with dedicated physical servers, a dedicated network for Internet traffic, dedicated storage volumes, and a dedicated cloud management instance. Infrastructure capacity may be allocated to a single data center or multiple data centers at your option.
The “Virtual Private Cloud” provides a multi-tenant virtual cloud with logically isolated resources on shared physical infrastructure, configured as a single virtual data center with networking resources. Each VPC is fully encrypted and isolated from other customer environments.
2. Service Provisioning
Cinch will:
(1) Provide the resources (such as physical servers, physical storage, and physical network devices) needed to provide the IaaS Services.
(2) Provide network bandwidth in accordance with the applicable Service Offering.
(3) Provide resource pools (memory, processing, primary storage, and networking) with the applicable Service Offering
(4) Create Cinch and/or other user accounts and set default system preferences; and
(5) Create and configure applicable virtual server templates, as further described below.
Cinch will:
(1) Install and configure custom or third-party applications and operating systems on deployed virtual machines; and
(2) Deploy and maintain on-premises and other resources for disaster recovery with the applicable Service Offering
3. Data Recovery
Cinch will provide the following services with respect to Data Recovery:
(1) Data protection, such as routine backups, for cloud infrastructure, including top-layer management and user-management interfaces owned and operated by Cinch.
(2) Data and infrastructure restoration for the cloud infrastructure, including top-layer management and user-management interfaces owned and operated by Cinch.
(3) Data protection, such as routine backups, for the data and content accessed or stored on Cinch virtual machine’s or storage devices, configuration settings, etc.
(4) Data, content, virtual machine, and configuration restorations for assets accessed or stored with Cinch.
Customer will:
(1) Be responsible for backing up applications and their own systems
(2) Be responsible for securing access to Systems
(3) Be responsible for providing anti-virus and malware technologies
(4) Be responsible for deploying and maintain disaster recovery services with Cinch or another provider of disaster recovery solution.
4. Monitoring
Cinch will provide the following services with respect to Monitoring:
(1) Monitoring Cinch Cloud infrastructure, infrastructure networks, top-layer management and user-management interfaces, and computing, storage, and network hardware for availability, capacity, and performance.
Customer will:
(1) Be responsible for monitoring their own Application, systems, and servers
(2) Be responsible for Monitoring the assets deployed or managed by Customer, including, but not limited to virtual machines, operating systems, applications, specific network configurations, operating system, or application vulnerabilities
5. Templates
Customers will also have access to Cinch-provided operating system templates to the extent that:
(1) Published templates cannot be accessed from the Service Catalog
(2) Published templates cannot be instantiated without modification
(3) Published templates cause errors at first run time
(4) There are substantial hangs or excessive delays in the retrieval of a template from the Service Catalog
The configuration of a published template affects the virtual machine’s interaction with the hypervisor
Time synchronization issues (NTP) exist
Customer will:
(1) Be responsible for licensing and consumption of 3rd party software
(2) Be responsible for maintaining accurate recording for reporting of consumption of 3rd party licensing
6. Virtual Server Deployment Templates
Cinch will provide a catalog of supported virtual server deployment
templates that
you may deploy into your Cinch environments for Private Cloud and Virtual
Public
Cloud. Cinch will maintain and update these templates from time to time.
Templates
that are provided by Cinch may be removed at any time. Customer is
responsible for
selecting, deploying, and configuring templates appropriate to its needs,
and for
activating related licenses, and maintaining compliance with such license
terms.
b. In order to comply with Cinch’s legal obligations to its third-party
licensors,
Customer will not be permitted to export, download, or remove certain
templates or any
installed forms of certain templates for installation or use outside of the
IaaS Service
Offering. Customer may implement or import virtual server deployment
templates if it has
sufficient legal rights to deploy and use the software and information
contained in such
templates
7. Networking Services
The Cinch Platform includes the following network services as a part of the core cloud subscription:
(1) Network Address Translation (NAT): Separate controls for Source and Destination IP addresses, as well as port translation.
(2) Dynamic Host Configuration Protocol (DHCP): Configuration of IP pools, gateways, DNS servers, and search domains.
(3) Firewall: Our Firewall Management service provides 24x7 firewall administration, and response to security and device health events.
(4) Site-to-Site Virtual Private Network (VPN): Uses standardized IPsec protocol settings to interoperate with all major VPN vendors.
(5) Static Routing: Static routes for destination subnets or hosts.
(6) Dynamic Routing: Supported protocols include OSPF and BGP. This feature is available when customer subscribes to Direct Connect offering.
(7) Blended Internet with BGP.
8. Tools
Clients will also have access to Cinch-provided Tools, including:
(1) Cinch Tools Installation and Configuration
(2) Cinch Tools for optimization
(3) Performance tuning as it relates to Cinch tools and drivers
Customers are responsible for the following:
(1) Your organization, virtual data center, or organization network administration, configuration, and modification.
(2) User-deployed and configured assets such as virtual machines, custom developed or third-party applications, custom or user-deployed operating systems, network configuration settings, and user accounts.
(3) Operating system administration including the operating system itself or any features or components contained within it.
(4) Performance of user-deployed virtual machines, custom or third-party applications, your databases, operating systems imported or customized by you, or other assets deployed and administered by you that are unrelated to services provided by Cinch.
9. Change Management
Cinch will:
(1) Maintain processes and procedures to intended to ensure the health and availability of the Cinch Cloud and infrastructure in the Cinch Area (as defined in Section 10 below); and
(2) Maintain processes and procedures to release new code versions, hot fixes, and service packs related to the Cinch Cloud components in the Cinch Area.
Customer is responsible for:
(1) Custom or third-party applications, databases, and administration of the Customer Area (as defined in Section 4 above); and
(2) Administration of self-service features, up to the highest permission levels granted to you, including but not limited to virtual machine and network functions, backup administration, user configuration and role management, general account management.
10. Security
“Cinch Area” means the areas of the Cinch infrastructure and systems for which Cinch has sole administrative control. “Customer Area” means the portions of the systems where Customer assumes full or partial control, permission, or access to modify an environment.
Cinch will use commercially reasonable technical and organizational measures designed to provide the following:
(1) Physical security measures intended to protect Cinch’s data centers from physical security breaches.
(2) Information security measures intended to protect the Cinch Area.
(3) Network security measures intended to protect the Cinch Area.
(4) Monitoring for potential security events in the Cinch Area; and
(5) Patching and vulnerability management of the systems Cinch uses to deliver the IaaS environment, including the application of patches it deems critical for the target systems. Cinch will perform routine vulnerability scans of the Cinch Area intended to identify critical risk areas for the systems it uses to deliver the IaaS service. Critical vulnerabilities will be addressed in a commercially reasonable manner.
Customer is responsible for:
(1) Information security measures to protect the networks, information systems, data, content or applications in the Customer Area, including without limitation any patching, security fixes, encryption, access controls, roles and permissions granted to Customer’s internal, external, or third-party users;
(2) Network security measures to protect the networks, including software defined networks, within the Customer Area, including measures such as maintaining effective firewall rules, exposing communication ports only as necessary to conduct business, preventing and promiscuous access.
(3) Monitoring for potential security events in the Customer Area.
(4) Security monitoring and response for the Customer Area, including detecting, classifying, and remediating all security events in the Customer Area, through the use of such measures as vulnerability scanning tools or monitoring tools, or that are required for Customer’s compliance or certification program; and
(5) Identifying and remediating compromised virtual environments within the Customer Area and resolving all related issues. Cinch reserves the right to suspend all or any portion of the Service Offerings if compromised environments are detected by Cinch to protect Cinch’s infrastructure and business operations.
Customer is required to utilize a reputable anti-virus program to protect the Customer Area, which must be running, up to date, and properly configured.
11. Offline Data Transfer Service
Offline Data Transfer is an optional data migration service for the purpose of transferring large numbers of virtual machines, virtual apps, or templates from your local private environments to the Cinch Cloud. These migration capabilities support onboarding to the Cinch platform, export from the Service Offering, and synchronization of templates between the Cinch platform and Customer’s on-premises data centers.
Cinch will provide:
(1) A physical storage device shipped to Customer; and
(2) After the device is received back by Cinch, the transfer of data from the device into Customer’s Service Offerings.
Customer is responsible for:
(1) Following the documentation accompanying the storage device.
(2) Returning the storage device by Customer’s preferred carrier at Customer’s expense to Cinch within 45 calendar days from Cinch’s date of shipment.
(3) Backing-up and encrypting any data, applications, virtual machines, or other content transmitted via the service.
Cinch will not be responsible for any data loss or any other loss or damage that may occur as a result your use of the Offline Data Transfer service. If any Cinch storage device is not received by Cinch in equivalent working condition within 45 days from Cinch’s date of shipment, Customer will pay Cinch a replacement fee for any such storage device plus any shipping and handling charges, as each will be assessed by Cinch. Customer’s use of the Offline Data Transfer service is entirely at Customer’s own risk.
12. Direct Connect
Direct Connect is an optional dedicated networking link that helps connect remote customer data centers, and those in the same facility as Cinch, to customer instances in Cinch environments. Direct Connect enables customers to leverage high-output and low-latency connections provided by a network service provider. The dedicated connection circuit will consist of the Direct Connect service (which is provided by Cinch) and the network connection and service from the customer site into the Cinch data center (which is provided by your chosen network service provider, who must have a point of presence in the relevant Cinch data center).
There will be separate network connection fees, for which you are responsible, assessed by your network service provider, and/or Cinch.
The network service provider will provide you networking services and will assess separate fees under separate service contract terms. These separate fees and terms must be managed with your chosen network service provider, which is separate from your relationship with Cinch.
As part of this service, Cinch will:
(1) Provision, manage and support the Cinch side of the connection
(2) Coordinate with your selected network service provider to ensure successful circuit provisioning and connection from your Cinch instance to the network service provider’s point of presence in the relevant Cinch data center(s).
13. P2P Connections
Cinch will work with your carrier, or our carrier to provide P2P connections from your infrastructure to the Cinch cloud.
You will be responsible for:
(1) Contracting with a network service provider for all private network service connectivity unless you have agreed to have Cinch manage the service.
(2) Complying with all applicable terms and conditions of the network service provider
(3) Providing all applicable network service provider circuit information to Cinch Support that is required for provisioning completion.
(4) Cinch will not be responsible for any network connectivity outage that occurs on the network service provider’s side of the connection. Cinch’s Global Privacy Addendum applies in respect of data processed on Cinch infrastructure controlled by Cinch but not the network connection and service provided by your chosen network service provider
14. Metered Usage
Metered Usage components for Virtual Private Cloud, such as Bandwidth and third-party licenses are available for consumption in excess of subscription levels at any time within the Service Order Form. You are obligated to pay for such Metered Usage components at the then-current rates published by Cinch. Such charges will be billed by Cinch as agreed upon. A list of Metered Usage components is provided in Appendix A.
Capacity may be added via the Change Request Form or Service Order Form
All Private & Public Cloud On-Demand and SaaS components are considered metered usage.
By signing below, I affirm that (i) I am an agent of Customer, (ii) I am authorized to sign on Customer's behalf, and (iii) Customer agrees to be bound by the terms and conditions of this Order and the Agreement.
You must scroll through the whole document before you will be able to accept
Business Associate Agreement
This Business Associate Agreement (“BAA”) is an addendum to the Master Cloud and Managed Services Agreement (or equivalent) (the “Agreement”) between Cinch Software LLC (“Cinch” or “Business Associate”) and Customer. Any capitalized terms that are not defined in this BAA shall have the meanings set forth in the Agreement, the Security, Privacy, and Data Processing Addendum (the “Security Addendum”), or HIPAA (as defined in the Definitions section below), respectively. For purposes of this BAA, Customer also means “Covered Entity.” The parties acknowledge that Customer may be a covered entity (as defined by HIPAA) or a business associate (as defined by HIPAA) acting on behalf of a covered entity. Covered Entity and Business Associate mutually agree to the terms of this BAA to comply with the HIPAA Rules (as defined below).
1. This BAA will be applicable only:
Definitions
Term | Definition |
---|---|
Breach | “Breach” has the same meaning as the term “Breach” in 45 CFR 164.402. |
HIPAA | “HIPAA” means the Health Insurance Portability and Accountability Act of 1996, as amended by Subtitle D of the Health Information Technology for Economic and Clinical Health Act, Title XIII of Division A and Title IV of Division B of the American Recovery and Reinvestment Act of 2009 (Pub. L. No. 111-5) (the “HITECH Act”) and the federal regulations (“HIPAA Rules”) published at 45 CFR parts 160 and 164. |
Individual | “Individual” has the same meaning as the term “Individual” in 45 CFR 160.103 and includes a person who qualifies as a personal representative in accordance with 45 CFR 164.502(g) or other applicable law. |
Protected Health Information | “Protected Health Information” has the same meaning as that term as defined in 45 CFR 160.103, but limited to information created, received, maintained, or transmitted by Business Associate on behalf of Covered Entity. |
Secure | “Secure” means to render unusable, unreadable, or indecipherable to unauthorized individuals using a technology or methodology specified by the Secretary in the guidance issued under section 13402(h)(2) of the HITECH Act. |
Successful Security Incident | “Successful Security Incident” means any Security Incident (as defined in 45 CFR 164.304) that results in the unauthorized use, unauthorized access, unauthorized disclosure, unauthorized modification or unauthorized destruction of electronic Protected Health Information Processed directly in the Cinch Infrastructure. |
2. Obligations of Business Associate with respect to Use and Disclosure of Protected Health Information
3. Covered Entity Obligations
4. Security of Protected Health Information
5. Permitted Uses and Disclosures of Protected Health Information.
6. Term and Termination
7. Miscellaneous
By signing below, I affirm that (i) I am an agent of Customer, (ii) I am authorized to sign on Customer's behalf, and (iii) Customer agrees to be bound by the terms and conditions of this Order and the Agreement.
You must scroll through the whole document before you will be able to accept
Standard Contractual Clauses
These Standard Contractual Clauses are subject to and part of the Security, Privacy, and Data Processing Addendum to the Cinch Master Cloud and Managed Services Agreement (the “Agreement”) between Cinch Software LLC (“Cinch”) and Customer. Any capitalized terms that are not defined in this Addendum shall have the meanings set forth in the Agreement.
For the purposes of Article 26(2) of Directive 95/46/EC for the transfer of personal data to processors established in third countries which do not ensure an adequate level of data protection
Name of the data exporting organization:
Address: Customer’s address specified in the Agreement.
Tel.: Customer’s telephone number specified in the
Agreement;
Fax: Customer’s fax number specified in the
Agreement;
E-mail: Customer’s email address specified in the
Agreement
Other information needed to identify the organization: Customer’s jurisdiction of formation specified in the Agreement
(the data exporter)
And
Name of the data importing organization: Cinch Software, LLC
Address: 4259 West Swamp Road, Suite 301, Doylestown, PA 18902, U.S.A.
Tel.:484.235.5143
Fax:
E-mail:info@cinchsoftware.io
Other information needed to identify the organization: Pennsylvania limited liability company
(the data importer)
each a ‘party’; together ‘the parties’,
HAVE AGREED on the following Contractual Clauses (the Clauses) in order to adduce adequate safeguards with respect to the protection of privacy and fundamental rights and freedoms of individuals for the transfer by the data exporter to the data importer of the personal data specified in Appendix 1.
Clause 1
Definitions
For the purposes of the Clauses:
Term | Definitions |
---|---|
Personal Data Special Categories of Data Process/Processing Controller Processor Data Subject Supervisory Authority |
'personal data', 'special categories of data', 'process/processing', 'controller', 'processor', 'data subject' and 'supervisory authority' shall have the same meaning as in Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data; |
The Data Exporter | 'the data exporter' means the controller who transfers the personal data; |
The Data Importer | 'the data importer' means the processor who agrees to receive from the data exporter personal data intended for processing on his behalf after the transfer in accordance with his instructions and the terms of the Clauses and who is not subject to a third country's system ensuring adequate protection within the meaning of Article 25(1) of Directive 95/46/EC; |
The Sub Processor | 'the sub processor' means any processor engaged by the data importer or by any other sub processor of the data importer who agrees to receive from the data importer or from any other sub processor of the data importer personal data exclusively intended for processing activities to be carried out on behalf of the data exporter after the transfer in accordance with his instructions, the terms of the Clauses and the terms of the written subcontract; |
The Applicable Data Protection Law | 'the applicable data protection law' means the legislation protecting the fundamental rights and freedoms of individuals and, in particular, their right to privacy with respect to the processing of personal data applicable to a data controller in the Member State in which the data exporter is established; |
Technical and Organizational Security Measures | 'technical and organizational security measures' means those measures aimed at protecting personal data against accidental or unlawful destruction or accidental loss, alteration, unauthorized disclosure or access, in particular where the processing involves the transmission of data over a network, and against all other unlawful forms of processing. |
Clause 2
Details of the Transfer
Clause 3
Third-party Beneficiary Clause
Clause 4
Obligations of the Data Exporter
The data exporter agrees and warrants:
Clause 5
Obligations of the Data Importer
The data importer agrees and warrants:
(1) any legally binding request for disclosure of the personal data by a law enforcement authority unless otherwise prohibited, such as a prohibition under criminal law to preserve the confidentiality of a law enforcement investigation,
(2) any accidental or unauthorized access, and
(3) any request received directly from the data subjects without responding to that request, unless it has been otherwise authorized to do so;
Clause 6
Liability
Clause 7
Mediation and Jurisdiction
Clause 8
Cooperation with Supervisory Authorities
Clause 9
Governing Law
Clause 10
Variation of the Contract
Clause 11
Sub processing
Clause 12
Obligation after the termination of personal data processing services
By signing below, I affirm that (i) I am an agent of Customer, (ii) I am authorized to sign on Customer's behalf, and (iii) Customer agrees to be bound by the terms and conditions of this Order and the Agreement.
You must scroll through the whole document before you will be able to accept
Colocation Services Addendum
This Colocation Services Addendum (this “Addendum”) is subject to and part of the Cinch Master Cloud and Managed Services Agreement (the “Agreement”) between Cinch Software LLC (“Cinch”) and Customer. Any capitalized terms that are not defined in this Addendum shall have the meanings set forth in the Agreement.
1. Description of Services
2. Cinch Responsibilities
(1) Cinch is responsible for supplying one (1) cabinet in Customer’s Environment.
(2) Cinch is responsible for supplying any and all hardware and software specified in the applicable Service Order (“Cinch-Provided Systems”). Cinch shall configure the Cinch-Provided Systems and notify Customer (email sufficing) that such Cinch-Provided Systems are ready for production use, as defined in the applicable Service Order or as otherwise agreed upon by Customer and Cinch in writing. Cinch certifies that it has all rights necessary for it to provide Customer with the Cinch-Provided Systems, provided that Customer only uses such systems in accordance with the Agreement, this Addendum, and the Cinch Acceptable Use Policy, available at https://assets.cinchsoftware.io/content/legal/acceptable_use_policy.pdf.
(1) As specified in a Service Order, Cinch will provide Customer with Connectivity (measured in megabits per second (“Mbps”)), redundant providers (“Committed Bandwidth”), and burstable capacity for the Customer's Environment. Bandwidth utilization measurements (measured in Mbps) are taken once every minute on Customer’s inbound and outbound traffic at the border router for Customer’s Environment and recorded over a one calendar month period. The aggregate inbound and outbound traffic volumes are compared, and the lesser of the two is discarded (the greater of the two is the “Monthly Traffic Flow”). The top five percent (5%) of measurements of the Monthly Traffic Flow are then discarded, leaving ninety-five percent (95%) of the Monthly Traffic Flow remaining. The next highest measurement becomes the billable utilization for the entire month (the “Actual Utilization”). If the Actual Utilization exceeds the Committed Bandwidth, Cinch will bill Customer the difference at the base commit rate per Mbps (calculated by dividing the Committed Bandwidth by the fee paid for it). If the Customer consistently (i.e., exceeds its Committed Bandwidth, then, upon Cinch’s reasonable request, the parties shall negotiate and reach mutual agreement on a new Committed Bandwidth.
(2) If specified in a Service Order, Customer will initially be provided with a “/28” block of Internet protocol (“IP”) address/licenses, for its use pursuant to the Agreement. Subject to the terms of this Addendum, Cinch may provision additional IP addresses for use by Customer. Additionally, Cinch may, in its reasonable discretion, withdraw IP addresses from Customer if they are underutilized, or as otherwise necessary to efficiently operate its network.
3. Security
4. Environmental Controls
5. Administrative Services and Tools
6. Colocation and Colocation Services
7. Monitoring and Management
8. Other Cinch-Provided Resources
9. Customer Obligations
10. Terms and Conditions
(1) The products and services Customer provides.
(2) The number of IP addresses Customer is currently using.
(3) The number of new hosts Customer will be adding in the following 12 months.
11. Service Level Agreement
(1) This Service Level Agreement (“SLA”) describes the performance and availability of the Power and Connectivity to Customer’s Environment. Through built-in redundancy and proactive monitoring, Cinch strives to achieve 99.99% Availability (as defined below).
(2) “Available” or “Availability” means the time (in minutes) that the system being measured, the Power or Connectivity, as applicable, is up, running, and operationally functional. "Excluded Downtime" means the time (in minutes) that the system being measured is not Available, to the extent caused by:
(3) “Percent Available” will be calculated as follows: ((Availability / (Total Minutes – Excluded Downtime)) x 100). b. In a calendar month where Cinch fails to meet any expressly stated service level commitment in this Section 11, Customer will give Cinch written notice thereof no later than ten (10) business days after the end of such calendar month. Cinch will investigate such failure promptly after its receipt of notice. If confirmed (in Cinch’s good faith and reasonable discretion), then Cinch will apply a credit of 5% of the fees paid by Customer to Cinch for the Colocation Services for such month to Customer’s next invoice.
12. Reporting Problems
Phone: 484-679-2324
Email: support@cinchsoftware.io
Use the Cinch Help Desk web interface to open a request
(1) Name, company name, and contact information
(2) Priority customer assigns to the event
(3) Description of the issue
By signing below, I affirm that (i) I am an agent of Customer, (ii) I am authorized to sign on Customer's behalf, and (iii) Customer agrees to be bound by the terms and conditions of this Order and the Agreement.