END USER SERVICE AGREEMENT
THIS END USER SERVICE AGREEMENT (“AGREEMENT”) IS A LEGAL AGREEMENT BETWEEN YOU (THE “CUSTOMER”) AND THREATSTOP, INC. (“THREATSTOP”) AND GOVERNS THE USE OF THE THREATSTOP SERVICES. IF CUSTOMER REGISTERS FOR A FREE TRIAL VERSION OF THE THREATSTOP SERVICES, THIS AGREEMENT WILL ALSO GOVERN SUCH FREE TRIAL. BY CLICKING THE “I AGREE” BUTTON INDICATING YOUR ACCEPTANCE OF THIS AGREEMENT OR BY EXECUTING AN ORDER FORM THAT REFERENCES THIS AGREEMENT, YOU AGREE TO ALL OF THE TERMS OF THIS AGREEMENT. IF YOU ARE ENTERING INTO THIS AGREEMENT ON BEHALF OF A COMPANY OR OTHER LEGAL ENTITY, YOU REPRESENT THAT YOU HAVE THE AUTHORITY TO BIND SUCH ENTITY AND ITS AFFILIATES TO THESE TERMS AND CONDITIONS, IN WHICH CASE THE TERMS “YOU”, “YOUR” OR “CUSTOMER” SHALL REFER TO SUCH ENTITY AND ITS AFFILIATES. IF YOU DO NOT HAVE SUCH AUTHORITY, OR IF YOU DO NOT AGREE WITH THE TERMS AND CONDITIONS OF THIS AGREEMENT, YOU MUST NOT ACCEPT THIS AGREEMENT AND MAY NOT USE THE THREATSTOP SERVICES.
This Agreement was last updated on [September 21st, 2021].
“Affiliate” means an entity which directly or indirectly controls. is Controlled by, or is under common Control with that party. For these purposes, an entity shall be treated as being controlled by another if that other entity has fifty percent (50%) or more of the votes in such entity, is able to direct its affairs and/or to control the composition of its board of directors or equivalent body.
“Confidential Information” has the meaning set forth in Section 9.
“Control” (including the terms controlling, controlled by and under common control with) means the possession, directly or indirectly, of the power to direct or cause the direction of the management and operating policies of an entity through the ownership of voting securities (more than fifty percent (50%) of an entity’s voting or equity securities or the maximum allowed by law), contract, voting trust or otherwise.
“Customer” means the person or entity ordering the ThreatSTOP Service and entering into this Agreement, including its Affiliates, provided all such entities ordering or using the ThreatSTOP Service have agreed to be bound by the terms and conditions of this Agreement.
“Customer Data” mean all text, files, data, output, programs, files, information, or other information or material, including without limitation, event data such as firewall logs, IP addresses, domain names, name servers, and system information that Customer provides in conjunction with the ThreatSTOP Service.
“Customer Equipment” means Customer’s computer hardware, software and network infrastructure used to access the ThreatSTOP Service.
“Designated Site” shall mean the specific location of Customer’s business designated in the Order Form, or if none is specified, Customer’s principal business location;
“Documentation” means the online help files and other content relating to use of the ThreatSTOP Service made available by ThreatSTOP on the ThreatSTOP's website.
“Effective Date” means the date Customer accepts and enters into this Agreement.
“Force Majeure” means causes beyond either party’s reasonable control, including but not limited to fire, flood, earthquake, explosion, labor dispute, act of God, equipment failure, riot or civil disturbance, war, acts of terror, any government law, or regulation, court order, power outages or failures or delays resulting from third party service providers, or denial of service attacks.
“Initial Term” means the initial one year license term, commencing on the Effective Date.
“Licensed Software” means the Software and Software Updates.
“Order Form” means the ordering document for the ThreatSTOP Service, including any addenda thereto, entered into between ThreatSTOP and Customer, or a Reseller and Customer, as applicable, that specifies the Customer Equipment and subscription type for which the ThreatSTOP Service is purchased by Customer, any limitations to the features of the ThreatSTOP Service provided, and the ThreatSTOP Service Fees for the Initial Term. Order Forms must be approved by ThreatSTOP in order to be valid and shall be deemed incorporated herein by reference.
“Reseller” means the authorized third party reseller from whom Customer has ordered the ThreatSTOP Service, if Customer is not ordering the ThreatStop Service directly from ThreatSTOP.
“Software” means the object code form of the ThreatSTOP software products, including without limitation scripts, made available through the ThreatSTOP Service under this Agreement.
“Software Updates” means the object code form of the updates, modifications, or new releases of the Software that ThreatSTOP generally makes available via the ThreatSTOP's website at no additional charge to its customers who are current in payment of ThreatSTOP Service Fees. Software Updates may be used in accordance with the terms and restrictions relating to Software hereunder. Software Updates do not include products, modules or options that are designated by ThreatSTOP as new products, modules or options for which ThreatSTOP charges a separate fee.
“Term” means the Initial Term and any renewal Term, or with respect to the free trial version of the ThreatSTOP Service, the free trial period agreed to by ThreatSTOP at the time of registration.
“ThreatSTOP Service” means the products and services that are ordered by Customer under a free trial or an Order Form and made available by ThreatSTOP online through its website, including (i) the DNS services, device management services, and event reporting services made available by ThreatSTOP through its website for remote use by ThreatSTOP's customers; and (ii) the service by which the Licensed Software hosted on servers controlled by ThreatSTOP, and as applicable, its designees, and the services referenced in (i) above, are made available by ThreatSTOP through its website for remote use by ThreatSTOP's customers.
“ThreatSTOP Service Fees” mean the fees paid by Customer to ThreatSTOP or to Reseller, as applicable, for the right to access and use the ThreatSTOP Services during the Term.
2. LICENSE GRANT. Subject to the terms of this Agreement, during the Term, ThreatSTOP hereby grants Customer a limited term, non-sublicensable, non-transferable, and non-exclusive license to access and use the ThreatSTOP Service, including the Licensed Software as made available by ThreatSTOP through the ThreatSTOP Service, in accordance with the Documentation solely for Customer’s internal business purposes. Authorized users include Customer employees and Customer subcontractors, agents, and consultants provided such subcontractors, agents, and consultants use the ThreatSTOP Service solely for Customer’s own internal business purposes in accordance with this Agreement. Internal business purposes means the use must be for Customer’s own internal NETWORK and not for the benefit of any third party, except as expressly permitted in a separate written addendum to this Agreement signed by each party. ThreatSTOP reserves the right to modify the features, functionality or other aspects of the ThreatSTOP Service from time to time, provided that ThreatSTOP will not modify the ThreatSTOP Service in a manner that would have a significant adverse affect on Customer’s use of the ThreatSTOP Service without providing reasonable advance notice to Customer. ThreatSTOP may set certain additional limits and restrictions on use for Customers of the free trial version of the ThreatSTOP Service at any time, at ThreatSTOP’s discretion.
3. LICENSE RESTRICTIONS. Customer hereby acknowledges and agrees that it shall not use the Licensed Software or the ThreatSTOP Service for any purpose other than the purpose for which ThreatSTOP has developed the Licensed Software and ThreatSTOP Service, and that it shall use the Licensed Software and the ThreatSTOP Service in accordance with all applicable laws, rules, and regulations, including without limitation all export control laws and regulations. Except as expressly permitted by this Agreement, Customer shall not, nor permit anyone else to: (i) use or permit the Licensed Software or ThreatSTOP Service to be used in connection with providing any services to any third party, processing data or other information on behalf of any third party, or for any virtualization, facility management, service provider, service bureau, time-sharing, software as a service, cloud or other similar technology, service or arrangement, whether or not over a network or on a hosted basis, including in connection with the internet or any web hosting, wide area network (WAN), or virtual private network (VPN), where the Licensed Software or ThreatSTOP Service are used or operated for the benefit of a third party; (ii) copy all or any portion of the Licensed Software or ThreatSTOP Service; (iii) decompile, disassemble or otherwise reverse engineer (except to the extent expressly permitted by applicable law, notwithstanding a contractual obligation to the contrary) the Licensed Software or the ThreatSTOP Service, or any portion thereof, or determine or attempt to determine any source code, algorithms, methods, or techniques used or embodied in the Licensed Software or ThreatSTOP Service or any portion thereof; (iv) modify, translate, or create any derivative works based upon the Licensed Software or the ThreatSTOP Service; (v) distribute, disclose, market, rent, lease, assign, sublicense, pledge, or otherwise transfer the Licensed Software or ThreatSTOP Service, in whole or in part, to any third party; (vi) remove or alter any copyright, trademark, or other proprietary notices, legends, symbols, or labels appearing on or in the Licensed Software or the ThreatSTOP Service; (vii) perform, or release the results of, benchmark tests or other comparisons of the Licensed Software or the ThreatSTOP Service with other software or materials; (viii) access the Licensed Software or the ThreatSTOP Service from, or transfer the Licensed Software or ThreatSTOP Service to, any devices other than the Customer Equipment or to any site other than the Designated Site; (ix) incorporate the Licensed Software or ThreatSTOP Service or any portion thereof into any other compilations, materials, products, or services, or use the Licensed Software or ThreatSTOP Service for production purposes; or (x) use the Licensed Software or ThreatSTOP Service for any purpose other than in accordance with the terms and conditions of this Agreement. In the event of any violation of this Section 2, ThreatSTOP may immediately terminate this Agreement, and shall be entitled to equitable relief in accordance with Section 9.3.
4. OWNERSHIP. ThreatSTOP (or its licensors) retains all ownership of patent, copyright, trademark and other intellectual property rights in the ThreatSTOP Service and Licensed Software, including without limitation any derivative work of the Licensed Software or ThreatSTOP Service or portions thereof. Except as otherwise expressly granted in this Agreement, no license, right or interest in any ThreatSTOP or ThreatSTOP licensor trademark, copyright, trade name or service mark is granted hereunder. There are no implied rights and all other rights not expressly granted herein are reserved. Customer agrees to take any action reasonably requested by ThreatSTOP to evidence, maintain, enforce, or defend the foregoing. Customer shall not take any action to jeopardize, encumber, limit, or interfere in any manner with ThreatSTOP’s or its licensors’ ownership of and rights with respect to the Licensed Software or any derivative work thereof. Customer retains all copyright, trademark and other intellectual property rights in Customer Data, provided that ThreatSTOP (and if applicable, its employees, consultants and suppliers) may retain and use all Customer Data in the course of the administration, operation, maintenance, monitoring and supporting the Licensed Software and the ThreatSTOP Service. ThreatSTOP may use Customer Data in aggregate form and in a manner that does not identify Customer (“Aggregated Data”) for marketing, improving, modifying and publishing results of, the Licensed Software and the ThreatSTOP Service, as well as for research, network security, forensic analysis, and analytics and may share such Aggregated Data with research organizations and other third party security companies. ThreatSTOP shall have a royalty-free, worldwide, irrevocable, perpetual license to use the Aggregated Data for such purposes and to incorporate into the ThreatSTOP Service any suggestions, enhancement requests, recommendations or other feedback provided by Customer relating to the operation of the ThreatSTOP Service. ThreatSTOP may also provide Customer Data in response to valid legal process, such as subpoenas, search warrants and court orders, or to establish or exercise its legal rights or defend against legal claims both during and after the Term. ThreatSTOP disclaims all responsibility and will not be liable to Customer for any disclosure of such information to any such third party.
5.1 This Section 5 applies in all situation in which Customer pays ThreatSTOP directly. If Customer pays a Reseller for the ThreatSTOP Services, then the charges and billing terms are as stated by the Reseller. The ThreatSTOP Service Fees for the Initial Term are specified on the initial Order Form. The first year’s ThreatSTOP Service Fees are payable in advance. ThreatSTOP Service Fees for subsequent years will be invoiced annually, sixty (60) days in advance of the anniversary of the Effective Date. ThreatSTOP Services Fees for subsequent years are due within thirty (30) days of date of invoice. ThreatSTOP may change or increase the prices it charges Customer for the ThreatSTOP Service at any time after the Initial Term effective thirty (30) days after providing notice to Customer. ThreatSTOP Service Fees are non-cancelable and fees paid are non-refundable. ThreatSTOP may suspend or cancel the ThreatSTOP Service if Customer fails to pay in full on time.
5.2 If Customer provides ThreatSTOP with credit card information for billing, Customer authorize ThreatSTOP to charge such credit card for the ThreatSTOP Service for the Initial Term and any renewal subscription term(s) as set forth in Section 12.1. Such charges shall be made in annually in advance. If the Order Form specifies that payment will be by a method other than a credit card, ThreatSTOP will invoice Customer in advance as set forth in Section 5.1 and Customer will pay such fees pursuant to the terms of this Section 5. Customer is responsible for providing complete and accurate billing and contact information to ThreatSTOP and notifying ThreatSTOP of any changes to such information.
5.3 All fees are payable in US dollars. A finance charge of 1.5% per month, or, if less, the maximum amount allowed by law, may be charged on past due amounts. Customer shall pay any attorneys’ fees, court costs, or other costs incurred in collection of delinquent amounts. All prices set forth in this Agreement are in U.S. Dollars and are exclusive of any applicable taxes. Customer shall pay, indemnify, and hold ThreatSTOP harmless from all import and export duties, customs fees, levies, or imposts, and all sales, use, value added, or other fees, governmental charges, or taxes of any nature (other than U.S. taxes on ThreatSTOP’s income), including penalties and interest, and all government permit or license fees assessed upon or with respect to any products sold, leased, or licensed to Customer and any services rendered to Customer.
6. CUSTOMER EQUIPMENT. ThreatSTOP is not responsible for (i) obtaining and maintaining any Customer Equipment or any ancillary third party services needed by Customer to connect to or access the ThreatSTOP Service; (ii) paying any of Customer’s third-party access charges (e.g., kiosk, ISP, telecommunications) incurred by Customer to access and use the ThreatSTOP Service; or (iii) ensuring that the Customer Equipment and any third party services of Customer are compatible with the ThreatSTOP Service and comply with all configuration requirements set forth in the Documentation.
7. INTELLECTUAL PROPERTY INFRINGEMENT.
7.1 ThreatSTOP shall defend any action brought against Customer to the extent it is based on a third party claim that use by Customer of the Licensed Software as furnished hereunder, which use is in accordance with the terms and conditions of this Agreement, directly infringes any valid United States patent, copyright, or trade secret. ThreatSTOP shall pay any liabilities, costs, damages, and expenses (including reasonable attorney’s fees) finally awarded against Customer in such action that are attributable to such claim, provided: (a) Customer notifies ThreatSTOP in writing of any such claim within twenty (20) days of learning of such claim; (b) ThreatSTOP has sole control of the defense and all related settlement negotiations; and (c) Customer cooperates with ThreatSTOP, at ThreatSTOP’s expense, in defending or settling such claim (provided that ThreatSTOP shall not enter into any settlement or other compromise that materially adversely affects Customer without Customer’s written approval, not to be unreasonably withheld, delayed, or conditioned). In addition to the foregoing, Customer agrees to promptly notify ThreatSTOP of any known or suspected infringement or misappropriation of ThreatSTOP’s proprietary rights of which Customer becomes aware. Should the Licensed Software or the ThreatSTOP Service become, or be likely to become in ThreatSTOP’s opinion, the subject of any claim of infringement, ThreatSTOP may, at its option: (i) procure for Customer the right to continue using the potentially infringing materials; (ii) replace or modify the potentially infringing materials to make them non-infringing; or (iii) terminate this Agreement.
7.2 ThreatSTOP shall have no liability for, and Customer shall indemnify, defend, and hold ThreatSTOP harmless from and against, any claim based upon: (i) the use, operation, or combination of the Licensed Software or the ThreatSTOP Service with non-ThreatSTOP programs, data, equipment, or documentation if liability would have been avoided but for such use, operation, or combination; (ii) use of other than the then-current, unaltered version of the Licensed Software or ThreatSTOP Service; (iii) Customer’s activities after ThreatSTOP has notified Customer that ThreatSTOP believes such activities may result in infringement; (iv) any modifications to or markings of the Licensed Software or the ThreatSTOP Service that are not specifically authorized in writing by ThreatSTOP; (v) any third party software; (vi) any Customer Data or other Customer materials; or (vii) Customer’s breach or alleged breach of this Agreement. Customer shall pay any liabilities, costs, damages, and expenses (including reasonable attorney’s fees) awarded against ThreatSTOP in such action that are attributable to such claim provided: (x) ThreatSTOP notifies Customer in writing of any such claim within twenty (20) days of learning of such claim; (y) Customer has sole control of the defense and all related settlement negotiations (provided that Customer shall not enter into any settlement or other compromise that materially adversely affects ThreatSTOP without ThreatSTOP's written approval, which shall not be unreasonably withheld, delayed, or conditioned); and (iii) ThreatSTOP cooperates with Customer, at Customer’s expense, in defending or settling such claim. This Section 7 states the entire liability of ThreatSTOP and the exclusive remedy of Customer with respect to infringement of any intellectual property or other rights, whether under theory of warranty, indemnity, or otherwise.
8. ADDITIONAL RESPONSIBILITIES.
- 1 Customer is responsible for (i) all Customer Data that Customer uploads, posts, transmits, or otherwise disseminates using the ThreatSTOP Service; (ii) maintaining secure access to the ThreatSTOP Service; (iii) maintaining reasonable security mechanism with respect to issuance of username and password information; (iv) any and all activities that occur under Customer’s ThreatSTOP Service account; (v) properly configuring the ThreatSTOP Service in accordance with the Documentation; and (vi) using the ThreatSTOP Service solely for lawful purposes and in compliance with all applicable laws. Customer will notify ThreatSTOP immediately of any unauthorized use of Customer’s ThreatSTOP Service account or any other breach of security regarding Customer’s ThreatSTOP Service account.
- 2 If Customer ordered the ThreatSTOP Service through a Reseller, Customer shall contact such Reseller for all support for the ThreatSTOP Service. If Customer contracts ThreatSTOP for support services that Customer should have sought from a Reseller, ThreatSTOP will refer the Customer to its Reseller to provide such support. If Customer ordered or is ordering the ThreatSTOP Service directly from ThreatSTOP, ThreatSTOP shall provide support for the ThreatSTOP Service to Customer at no additional charge in accordance with the support guidelines set forth in the Documentation, the User Interface, and on ThreatSTOP’s public website. Notwithstanding the foregoing, no support services are provided for free trial versions of the ThreatSTOP Service.
- 3 ThreatSTOP will use commercially reasonable efforts to make the ThreatSTOP Service available 24 hours a day, 7 days a week, except for: (a) planned downtime (of which ThreatSTOP will give at least 8 hours notice via the ThreatSTOP Service and which ThreatSTOP will schedule to the extent practicable during the weekend hours from 6:00 p.m. Friday to 3:00 a.m. Monday Pacific Time), or (b) any unavailability resulting from an event of Force Majeure.
9.1 “Confidential Information” includes, without limitation, the Documentation, Licensed Software, ThreatSTOP Service and results of ThreatSTOP Service comparative performance benchmarks, passwords provided to Customer for ThreatSTOP Service access, Customer Data, information related to past, present or future research, development or business affairs, any proprietary products, materials or methodologies, and any other information that which by its nature is normally and reasonably considered confidential or provides the disclosing party with a competitive advantage. Confidential Information other than that described in the preceding sentence, shall be marked as confidential or proprietary or, if disclosed verbally, shall be identified as confidential or proprietary at the time of disclosure. The receiving party shall protect the disclosing party’s Confidential Information with the same degree of care that it regularly uses to protect its own Confidential Information from unauthorized use or disclosure, but in no event less than a reasonable degree of care. The receiving party shall use the Confidential Information only for the limited purpose of performing its obligations under this Agreement. Confidential Information shall not be provided or disclosed to anyone except those employees or contractors of the receiving party with a need to know in connection with the exercise of the receiving party’s rights or obligations under this Agreement who agree to be bound by these terms. Confidential Information and any and all authorized copies thereof shall remain the property of the disclosing party and shall be destroyed or returned if requested by the disclosing party.
9.2 Notwithstanding any provision contained in this Agreement, neither party shall be required to maintain in confidence any of the following: (i) information that, at the time of disclosure to the receiving party, is in the public domain; (ii) information that, after disclosure, becomes part of the public domain without restriction, except by breach of this Agreement; (iii) information that was in the receiving party’s possession at the time of disclosure, and which was not acquired, directly or indirectly, from the disclosing party; (iv) information that the receiving party can demonstrate resulted from its own research and development, independent of and without reference to disclosure from the disclosing party; (v) information that the receiving party receives from third parties, provided such information was not obtained by such third parties from the disclosing party on a confidential basis; or (vi) information that is produced in compliance with applicable law or a court order, provided the other party is given reasonable notice of such law or order and an opportunity to attempt to preclude or limit such production.
9.3 Customer acknowledges and agrees that due to the unique nature of ThreatSTOP’s Confidential Information, there can be no adequate remedy at law to compensate ThreatSTOP for the breach of this Section 9 or of Sections 2, 3, or 4; that any such breach will allow Customer or third parties to compete unfairly with ThreatSTOP resulting in irreparable harm to ThreatSTOP that would be difficult to measure; and, therefore, that upon any such breach or threat thereof, ThreatSTOP shall be entitled to injunctive and other appropriate equitable relief (without the necessity of proving actual damages or of posting a bond), in addition to whatever remedies it may have at law, hereunder, or otherwise.
10. NO WARRANTIES. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, THE LICENSED SOFTWARE AND THREATSTOP SERVICE ARE PROVIDED “AS IS”, AND THREATSTOP DOES NOT MAKE, AND HEREBY DISCLAIMS, ANY AND ALL WARRANTIES, WHETHER EXPRESS, IMPLIED, OR STATUTORY, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE RELATED TO THE LICENSED SOFTWARE AND THREATSTOP SERVICE AND CUSTOMER’S USE OR INABILITY TO USE THEM, THE RESULTS OF THEIR USE AND THIS AGREEMENT. This disclaimer shall apply even if the express warranty set forth above fails of its essential purpose.
11. LIMITATION OF LIABILITY.
11.1 EXCEPT (I) WITH RESPECT TO SECTION 7 (INFRINGEMENT INDEMNITY), OR (II) FOR DAMAGES RELATED TO CLAIMS BASED ON A BREACH OF ITS OBLIGATIONS SET FORTH IN SECTION 9 (CONFIDENTIALITY), THREATSTOP’ LIABILITY UNDER THIS AGREEMENT SHALL IN NO EVENT EXCEED THE THREATSTOP SERVICE FEES PAID BY CUSTOMER FOR THE THREATSTOP SERVICE DURING THE TWELVE (12) MONTHS PRECEDING THE EVENT THAT RESULTED IN SUCH CLAIM.
11.2 EXCEPT (I) WITH RESPECT TO SECTION 7 (INFRINGEMENT INDEMNITY); (II) DAMAGES RELATED TO CLAIMS BASED ON EITHER PARTY’S BREACH OF ITS OBLIGATIONS SET FORTH IN SECTION 9 (CONFIDENTIALITY); OR (III) DAMAGES RELATED TO EITHER PARTY’S UNAUTHORIZED USE, DISTRIBUTION, OR DISCLOSURE OF THE OTHER PARTY’S INTELLECTUAL PROPERTY, IN NO EVENT SHALL EITHER PARTY BE LIABLE FOR INCIDENTAL, SPECIAL, CONSEQUENTIAL OR PUNITIVE DAMAGES, INCLUDING BUT NOT LIMITED TO DAMAGES FOR LOSS OR INACCURACY OF DATA, LOSS OF PROFITS OR REVENUE, BUSINESS INTERRUPTION, HOWEVER ARISING, EVEN IF IT HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
12. TERM AND TERMINATION.
12.1 This Agreement is effective upon the Effective Date and unless sooner terminated by either party in accordance with this Section 12, shall remain effective for the Initial Term, and shall automatically renew for successive one-year terms unless either party gives the other notice of non-renewal within sixty (60) days prior to the end of the then-current term.
12.2 Notwithstanding the foregoing, this Agreement may be terminated by either party immediately upon written notice if the other party: (i) becomes insolvent or ceases doing business for a period greater than ninety (90) days; or (ii) materially breaches any of its obligations under this Agreement and fails to cure such breach within thirty (30) days following written notice to such party. Additionally, ThreatSTOP may terminate this Agreement upon thirty (30) days written notice to Customer in the event that ThreatSTOP has not received payment for the ThreatSTOP Service provided to Customer for the then-current term, regardless of whether Customer has made payment to a Reseller.
12.3 Solely with respect to the free trial version of the ThreatSTOP Service, the ThreatSTOP Service is made available to Customer on a trial basis free of charge until the earlier of (a) the end of the free trial period for which Customer registered or is registering to use the ThreatSTOP Service, or (b) the start date of any paid ThreatSTOP Service ordered by Customer. This Agreement may be terminated with respect to the free trial version of the ThreatSTOP Service by either party at any time without cause upon 7 days prior written notice, or immediately by ThreatSTOP if Customer is in material breach of this Agreement.
12.4 The provisions of Sections 1 (Definitions), 3 (License Restrictions), 4 (Ownership), 5 (Fees), 7 (Intellectual Property Infringement), 8.1 (Customer Responsibilities), 9 (Confidentiality), 10 (No Warranties), 11 (Limitation of Liability), 12.4 (Survival) and any other term that by its nature ought to survive termination will survive the expiration or termination of this Agreement.
12.5 Upon the effective date of termination of this Agreement: (i) ThreatSTOP will immediately cease providing the ThreatSTOP Service to Customer; (ii) Customer’s license to use the ThreatSTOP Service, and the Licensed Software through the ThreatSTOP Service will cease; (iii) any and all payment obligations of Customer incurred prior to the date of termination will immediately become due; and (iv) within thirty (30) days of such termination each party will return all copies of Confidential Information of the other party in its possession, except as permitted by this Agreement or required to comply with any applicable legal or accounting record keeping requirement.
13.1 As defined in FAR section 2.101, DFAR section 252.227-7014(a)(1) and DFAR section 252.227-7014(a)(5) or otherwise, the Licensed Software and Documentation provided in connection with this Agreement are “commercial items,” “commercial computer software” and/or “commercial computer software documentation.” Consistent with DFAR section 227.7202, FAR section 12.212 and other sections, any use, modification, reproduction, release, performance, display, disclosure or distribution thereof by or for the U.S. Government shall be governed solely by the terms of this Agreement and shall be prohibited except to the extent expressly permitted by the terms of this Agreement. Any technical data provided that is not covered by the above provisions shall be deemed “technical data-commercial items” pursuant to DFAR section 227.7015(a). Any use, modification, reproduction, release, performance, display or disclosure of such technical data shall be governed by the terms of DFAR section 227.7015(b).
13.2 The parties may issue one or more mutually agreed upon press releases at mutually agreed times. ThreatSTOP may include Customer’s name and logo in on its website and in customer lists and marketing materials.
13.3 This Agreement, including the Order Forms, and other addenda thereto, represents the complete agreement regarding the subject matter of this Agreement and supersedes all prior and contemporaneous agreements, understandings, negotiations and discussions, whether oral or written, of the parties.
13.4 This Agreement may be amended only by a written document executed by a duly authorized representative of each party. No purchase order, other ordering document or any hand written or typewritten text which purports to modify or supplement the printed text of this Agreement or any Order Form shall add to or vary the terms of this Agreement unless signed by authorized representatives of each party. However, to the extent of any conflict or inconsistency between the provisions in the body of this Agreement and any Order Form, the terms of such Order Form shall prevail; provided, however, that an Order Form submitted through a Reseller must be pre-approved by ThreatSTOP in writing.
13.5 If any provision of this Agreement is held to be unenforceable, such provision shall be reformed only to the extent necessary to make the remainder of the Agreement enforceable.
13.6 Except as otherwise specified in this Agreement, all notices, permissions and approvals hereunder shall be in writing and shall be deemed to have been given upon: (i) personal delivery, (ii) the second business day after mailing, (iii) the second business day after sending by confirmed facsimile, or (iv) the first business day after sending by email (provided email shall not be sufficient for notices of termination or an indemnifiable claim). Billing-related notices to Customer shall be addressed to the relevant billing contact designated by Customer. All other notices to Customer shall be addressed to the relevant system administrator designated by Customer when registering for the ThreatSTOP Service. All notices to ThreatSTOP shall be addressed to ThreatSTOP Inc., 2720 Loker Ave W., Suite G., Carlsbad, CA, 92010, attention “Legal Department.”
13.7 No waiver by either party hereto of any breach of any provision herein shall constitute waiver of any other provision nor shall such waiver constitute consent that the breach may continue or that any other breach will be waived. Unless stated otherwise in this Agreement, the remedies provided are cumulative, and are in addition to any other remedies available at law or equity.
13.8 The parties hereto are and shall remain independent contractors. Nothing herein shall be deemed to establish a partnership, joint venture, or agency relationship between the parties.
13.9 Neither party shall assign or transfer this Agreement or any of its rights or obligations hereunder without the prior written consent of the other, which consent shall not be unreasonably withheld, and any attempt to do so without such consent will be void; provided, however, that either party may assign its rights and obligations hereunder in connection with any transaction involving the merger, acquisition or consolidation of the assigning party or the sale of all or substantially all of its assets without the consent of the other party. This Agreement shall inure to the benefit of and bind successors and permitted assigns of the parties.
13.10 This Agreement, and performance or breach hereunder, shall be governed by and interpreted in accordance with the laws of the State of California, without regard to choice or conflicts of law rules. Any controversy or claim arising out of or relating to this Agreement, or the breach thereof, shall be settled by binding arbitration conducted in San Diego County, California in accordance with the rules of the American Arbitration Association, and judgment upon the award rendered may be entered in any court having jurisdiction. The arbitrator may award costs and reasonable attorneys' fees to the prevailing party. This Agreement shall not be governed by the United Nations Convention on Contracts for the International Sale of Goods, the application of which is hereby expressly excluded.
13.11 Customer shall abide, and contractually require all authorized users to abide, by all applicable export laws and regulations in its use of the Licensed Software and the ThreatSTOP Service. None of the Licensed Software, and no part of the ThreatSTOP Service, may be downloaded, used to provide services or otherwise exported or re-exported (a) into any country for which the United States has a trade embargo or that is prohibited under the United States Export Administration Regulations, as well as the People’s Republic of China, or (b) to anyone on the U.S. Treasury Department’s list of Specially Designated Nationals or the U.S. Commerce Department’s Table of Denial Orders. Customer represents and warrants that it is not located in, under the control of, or a national or resident of any such country or on any such list.
This Addendum (“Addendum”) is a legal agreement between you (“Customer”) and ThreatSTOP, Inc. (“ThreatSTOP”) and supplements the End User Service Agreement (“Agreement”) regarding Customer's use of ThreatSTOP's service via Community Account (defined below).
** Note: If you do not have a ThreatSTOP Community Account, this Addendum does not apply.
- Supremacy of Addendum. Customer and ThreatSTOP hereby agree that, to the extent a conflict exists between this Addendum and the Agreement, the terms of this Addendum shall prevail. All other terms and conditions of the Agreement shall remain in full force and effect. The terms defined in the Agreement and used in this Addendum shall have the same respective meanings as set forth in the Agreement, unless otherwise defined in this Addendum. All references to the Agreement shall refer to the Agreement as amended by this Addendum.
- Definition. Section 1 of the Agreement (“Definitions”) is hereby amended by adding the following: “Community Account” means any account designated as “Community” by ThreatSTOP.
- License Grant. Section 2 of the Agreement (“License Grant”) is hereby amended by adding the following:
Subject to the terms of the Agreement and this Addendum, during the Term, Customer is not charged with any fee for use of the ThreatSTOP Service via Customer's Community Account.
- License Restrictions. Section 3 of the Agreement (“License Restrictions”) is hereby amended by adding the following:
Customer shall use the ThreatSTOP Services via Customer's Community Account only in accordance with the terms to be specified by ThreatSTOP for use of the ThreatSTOP Services via the Community Account (“Community Account Terms”), available here. The Community Account Terms may include restriction of use of the ThreatSTOP Services as to number and type of devices, policy element choices, number of custom lists, reporting and support and may be changed by ThreatSTOP from time to time.
- Additional Responsibilities. Section 8 of the Agreement (“Additional Responsibility”) is hereby amended by adding the following at the end of Section 8.1:
Customer shall provide logs or any other data relating to the Customer's use of ThreatSTOP Services via its Community Account as required by ThreatSTOP (“Community Account Logs”). ThreatSTOP has a right to use the Community Account Logs for any purpose including but not limited to contribution to ThreatSTOP's database of threat intelligence data used for ThreatSTOP Services available to other customers. Notwithstanding Section 4 (“Ownership”) of the Agreement, all Community Account Logs shall belong to ThreatSTOP and Customer does not have right to object to ThreatSTOP's use, storage, amendment, or any other types of use of the Uploaded Data.
DHS AIS ADDENDUM TO END USER SERVICE AGREEMENT
This Addendum (“Addendum”) is a legal agreement between you (“Customer”) and ThreatSTOP, Inc. (“ThreatSTOP”) and supplements the End User Service Agreement (“Agreement”) regarding Customer's use of U.S. Department of Homeland Security (DHS) Automated Indicator Sharing (AIS) Targets (defined below) via ThreatSTOP's service.
** Note: If you do not have access to DHS AIS Targets via ThreatSTOP, this Addendum does not apply.
- Supremacy of Addendum.Customer and ThreatSTOP hereby agree that, to the extent a conflict exists between this Addendum and the Agreement, the terms of this Addendum shall prevail. All other terms and conditions of the Agreement shall remain in full force and effect. The terms defined in the Agreement and used in this Addendum shall have the same respective meanings as set forth in the Agreement, unless otherwise defined in this Addendum. All references to the Agreement shall refer to the Agreement as amended by this Addendum.
- Section 1 of the Agreement (“Definitions”) is hereby amended by adding the following:
“DHS AIS Targets” means the ThreatSTOP policy elements designated as “Targets” containing data obtained from DHS via the AIS initiative.
- License Grant. Section 2 of the Agreement (“License Grant”) is hereby amended by adding the following:
Subject to the terms of the Agreement and this Addendum, during the Term, Customer is permitted to use DHS AIS Targets via ThreatSTOP Services.
- License Restrictions.Section 3 of the Agreement (“License Restrictions”) is hereby amended by adding the following:
Customer shall use DHS AIS Targets via ThreatSTOP Services only in accordance with the terms to be specified by ThreatSTOP for use of DHS AIS Targets via ThreatSTOP Services (“DHS AIS Terms”), available here. The DHS AIS Terms may include restriction of use of the DHS AIS Targets and the data contained therein as to data sharing restrictions and TLP Handling Levels and may be changed by ThreatSTOP from time to time.
- Additional Responsibilities. Section 8 of the Agreement (“Additional Responsibility”) is hereby amended by adding the following at the end of Section 8.1:
- Confidentiality. Section 9 of the Agreement (“Confidentiality”) is hereby amended by adding the following at the end of Section 9.1:
- Term and Termination: Section 12.2 of the Agreement is hereby changed to the following:
“12.2 Notwithstanding the foregoing, this Agreement may be terminated by either party immediately upon written notice if the other party: (i) becomes insolvent or ceases doing business for a period greater than ninety (90) days; or (ii) materially breaches any of its obligations under this Agreement and fails to cure such breach within thirty (30) days following written notice to such party. Additionally, ThreatSTOP may terminate access to DHS AIS targets immediately if, in ThreatSTOP’s sole estimation, or upon notification to ThreatSTOP by NCCIC or DHS, the Additional Responsibilities (Section 5) or Confidentiality (Section 6) terms of the DHS AIS Addendum to this Agreement is breached by Customer. Furthermore, ThreatSTOP may terminate this Agreement upon thirty (30) days written notice to Customer in the event that ThreatSTOP has not received payment for the ThreatSTOP Service provided to Customer for the then-current term, regardless of whether Customer has made payment to a Reseller.”