Data Security Exhibit
Version
Effective
This Data Security Exhibit ("Exhibit") applies in addition to any existing Master Services Agreement, similar subscription agreement, or End User License Agreement (collectively, the "Agreement") between Conga Corporation ("Conga") and the customer that is a party to such Agreement ("Customer"). In the event of any conflict between this Exhibit and the Agreement, this Exhibit shall prevail to the extent of any inconsistency. In the event of any conflict between this Exhibit and any Order executed hereunder, this Exhibit shall prevail to the extent of any inconsistency, except with regard to any provision of any Order that specifically identifies a conflicting provision of this Exhibit and states that the conflicting provision of this Exhibit does not prevail. All capitalized terms, if not otherwise defined herein, shall have the meaning set forth in the Agreement.
Conga may amend this Exhibit from time to time by posting an amended version at its website and sending Customer notice thereof (an email to Customer’s project sponsor shall be deemed sufficient in this case). Such amendment will be deemed accepted and become effective thirty (30) days after such notice (the “Proposed Amendment Date”) unless Customer first gives Conga written notice of rejection of the amendment. In the event of such rejection, this Exhibit will continue under their original provisions, and the amendment will become effective at the start of Customer’s next term following the Proposed Amendment Date. Customer’s continued use of the Subscription Services purchased under the Agreement following the effective date of an amendment will confirm Customer’s consent thereto. This Exhibit may not be amended in any other way except through a written agreement by authorized representatives of each party.
1. Definitions.
“Security Incident” means the reasonable suspicion of, discovery by, or notice to, Customer or Conga that:
(a) Customer Data has been disclosed, accessed or obtained by an unauthorized person;
(b) systems have been compromised; or
(c) a person has threatened the unauthorized disclosure, access to or obtaining of any Customer Data.
“Law(s)” means all laws, regulations, ordinances, rules and orders of any court or government body.
“Personnel” means employees and contractors who perform activities in connection with the handling of Customer Data.
“Personal Information” means information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context.
2. General Obligations.
Conga agrees to maintain a data security program that includes administrative, technical and logical safeguards designed to protect the confidentiality, integrity, and availability of Customer Data and protect it from disclosure, improper alteration, or destruction. The measures implemented and maintained by Conga for the Subscription Services will be subject to annual certification of compliance with ISO 27001 and SOC 2 Type 2 standards.
2.1 Risk Assessment and Treatment.
As part of annual ISO 27001 certification, Conga maintains a risk assessment program pertaining to the treatment and handling of Customer Data that has been approved by management, and communicated to all employees.
2.2 Access Controls.
(a) Conga Personnel’s access to data processing systems is only granted to authenticated users based on a role-based authorization concept using the following measures: Data encryption, individualized password assignment (at least 8 characters, regular automatic expiration), employee ID cards, password-protected screen savers in case of inactivity, intrusion detection systems and intrusion-prevention systems, and regularly updated antivirus and spyware filters in the network and on the individual PCs and mobile devices.
(b) Conga’s provisioning process requires Conga Personnel to change the authentication method upon initial login. Access revocation for Conga Personnel is conducted upon termination or role change. Conga Personnel role changes resulting in additional access require VP or above approval. Conga uses the least privilege model to ensure access is granted on an approved need to perform job functions. Conga reviews access quarterly.
(c) Conga employs managed firewalls to control access and allow only authorized traffic to Conga infrastructure. In addition, Conga employs security controls to manage ingress and egress of data based upon protocol, port, source and destination within the environment. Any traffic not adhering to these strict access controls is discarded at the Internet boundary. Internally at Conga, host-based intrusion detection and monitoring systems are deployed at the server and network layers, respectively.
(d) Customer has the ability to limit access to the Subscription Services to authorized Customer Personnel to prevent unauthorized access to Customer Data, including through the use of multifactor authentication.
(e) Subscription Service access logs are maintained.
2.3 Encryption. All Customer Data, including Personal Data, is encrypted at rest and, in transit, using TLS encryption technology. TLS connections are negotiated for at least 256-bit encryption or stronger.
2.4 Conga Restrictions. Conga will not, except as necessary to perform its obligations set forth in the Agreement:
(a) use or disclose any Customer Data for any purpose other than as is strictly necessary to perform its obligations as set forth in the Agreement;
(b) copy, use, reproduce, display, perform, modify, destroy or transfer any Customer Data or works derived from Customer Data; nor
(c) sell any Customer Data, or anything that includes any Customer Data, to any person.
2.5 Backups. Conga performs daily backups of Customer Data and retains such data for thirty (30) days. However, for Subscription Services hosted on the Salesforce Platform, Conga does not backup Customer Data due to the nature of such Subscription Services and the Salesforce Platform, provided Customer may extract Customer Data from the Salesforce Platform to perform its own backups.
2.6 Physical Security of Data Centers. Buildings are protected with appropriate access control systems, based on a security classification and an appropriately defined access authorization concept. Buildings are secured by access control measures using a card reader system. Depending on the security category, property, buildings or individual areas are secured by additional measures such as special access profiles, separation locks, video surveillance and security personnel. Access rights for authorized persons are granted individually according to defined criteria. This also applies to external persons.
3. Compliance with Laws.
3.1 Regulatory Cooperation. If Conga collects, accesses, receives, stores or otherwise handles any Customer Data that becomes subject to a regulatory inquiry, notification or other action required by all applicable Laws, Conga agrees to assist and cooperate to meet any obligation to the relevant regulatory authority.
3.2 Right of Access. Conga will cooperate with and assist Customer, as necessary, to enable any individual exercising their right of data access, correction, deletion or blocking of Personal Information under any applicable Law.
4. Disclosure by Law.
If Conga is required by any Law to disclose any Customer Data, Conga will:
(a) to the extent permitted by applicable Law, give Customer prior notice of the obligation as soon as practical after becoming aware; and
(b) take all steps to enable Customer an opportunity to prevent or limit the disclosure of the Customer Data.
5. Security Awareness and Training.
(a) Conga has developed a mandatory security awareness and training program for all members of Conga cloud service operations, which includes:
(i) training on how to implement and comply with its information security program; and
(ii) promoting a culture of security awareness through periodic communications from senior management with employees.
(b) All Conga employees are required to complete security and privacy awareness training as part of onboarding and on an ongoing annual basis and must agree to Conga's privacy and confidentiality requirements.
6. Scans and assessments.
6.1 Scans. In order to maintain the security of the Subscription Services, regular network and system scans are performed, including non-intrusive network scans on customer-facing infrastructure.
6.2 Assessments. Conga utilizes external service providers to perform an application vulnerability assessment biannually and application penetration test annually.
6.3 Patching. A software patching process is in place to remedy vulnerabilities in a timely manner based on scans and assessments.
6.4 Results. A summary of the results of the most recent vulnerability assessments will be made available to Customer upon request.
7. Security incidents and response. Conga has a rigorous incident management process for security events that may affect the confidentiality, integrity, or availability of systems or data. If an incident occurs, the security team logs and prioritizes it according to its severity. Events that directly impact customers are assigned the highest priority. This process specifies courses of action, procedures for notification, escalation, mitigation, and documentation. Key staff are trained in forensics and handling evidence in preparation for a Security Incident, including third-party and proprietary tools. To help ensure the swift resolution of Security Incidents, the Conga security team is available 24/7 to all Conga employees. Conga has a response plan that includes procedures to be followed in the event of a Security Incident, including formation of an internal incident response team assessing the risk the incident poses and determining who may be affected, and mitigate additional risk or impact.
(a) Notification. Internal reporting as well as Customer notification in the event of unauthorized disclosure of Customer Data in accordance with the Agreement. Conga will coordinate communication between Conga technical support and the Customer points of contact Conga has on record.
(b) Recordkeeping. Customer Data is managed according to the Agreement (including this Data Security Exhibit).
(c) Audit. Conducting and documenting root cause analysis and remediation plans.
8. Contingency Planning / Disaster Recovery.
(a) Excluding components of the Subscription Services operated by Salesforce.com, Inc., Conga infrastructure and, where applicable, Customer Data, are maintained and stored for the purposes of assuring availability or recoverability in the event of a disaster are maintained on redundant systems with the same data security standards as in production environments. Availability and resilience of systems and services are ensured by isolating critical IT and network components, by providing adequate backup and redundancy systems, using power redundancy systems, and regularly testing of systems and services. Test and live systems are kept completely separated.
(b) The availability of and access to Personal Data in the event of a physical or technical incident shall be restored by taking the following measures: Personal data is stored in RAID systems and integrates redundant systems according to security marking. Systems for uninterruptible power supplies (e. g. UPS, batteries, generators) are used to secure the power supply in the used data centers. Additionally, databases or data centers are mirrored in different physical locations.
(c) Recovery Time Objective (“RTO”) is Conga’s objective for the maximum period of time between Conga’s decision to activate the disaster recovery processes to failover the Subscription Services to a secondary site due to a declared disaster and the point at which our customers can resume production operations at a secondary site. If the decision to failover is made during the period in which an upgrade is in process, the RTO extends to include the time required to complete the upgrade. The RTO is twenty-four (24) hours.
(d) Recovery Point Objective (“RPO”) is the objective for the maximum period of data loss measured as the time from which the first transaction is lost until Conga’s declaration of the disaster. The RPO is one (1) hour. There is no RPO associated with the Subscription Services. However, for Subscription Services hosted on the Salesforce Platform, there is no RPO due to the Subscription Services and the Salesforce Platform.
9. Audit Controls.
Hardware, software and/or procedural mechanisms are maintained to record and examine activity in information systems that contain or use electronic information, including appropriate logs and reports concerning these security requirements.
10. Portable media.
Conga does not store Customer Data on desktops, laptops or other removable storage devices which are housed outside of a secured data center.
11. Secure Disposal.
Upon Customer request, Conga will dispose of tangible property containing Customer Data, using available technology, such that Customer Data cannot be practicably read or reconstructed.
12. Testing. Conga will periodically test and evaluate the key controls and operations against relevant compliance frameworks to validate that they are properly implemented and effective in addressing the threats and risks identified.
13. Monitoring.
Conga will monitor network and production systems, including error logs on servers, disks and security events for any potential problems, including:
(a) reviewing changes affecting systems handling authentication, authorization, and auditing; and
(b) reviewing User and privileged (e.g. administrator) access to Conga production systems.
14. Change and Configuration Management.
Conga has a well-defined System Development Life Cycle (SDLC) methodology that governs the application development and change management process. Conga enforces that the SDLC policies and procedures are reviewed annually and are updated on an as-needed basis to reflect changes in the operating environment. Further, Conga will maintain policies and procedures for managing changes to production systems, applications, and databases, including:
(a) a process for documenting, testing and approving the promotion of changes into production; and
(b) acceptance testing and approval processes specifically related to standard bug fixes, updates, and upgrades made available for the Subscription Services.
15. Background Checks.
Conga shall perform background checks for its employees who will have access to Customer Data. Such background checks shall include:
(a) for all employees, a criminal record search for previous seven years;
(b) for U.S.-based employees, verification of social security number for previous five years; and
(c) verification of eligibility to lawfully work in the United States (or applicable country).
16. HIPAA.
If Conga processes Protected Health Information (“PHI”), as defined in the Health Insurance Portability and Accountability Act (“HIPAA”) and its implementing regulations, as amended, on behalf of Customer, Conga shall, in addition to the obligations set forth in this Agreement, (i) enter into a form of Business Associate Agreement; and (ii) make its internal practices, books and records relating to the use and disclosure of PHI available to the U.S. Department of Health and Human Services, as may be required by HIPAA.
This Data Security Exhibit ("Exhibit") applies in addition to any existing Master Services Agreement, similar subscription agreement, or End User License Agreement (collectively, the "Agreement") between Apttus Corporation ("Conga") and the customer that is a party to such Agreement ("Customer"). In the event of any conflict between this Exhibit and the Agreement, this Exhibit shall prevail to the extent of any inconsistency. In the event of any conflict between this Exhibit and any Order executed hereunder, this Exhibit shall prevail to the extent of any inconsistency, except with regard to any provision of any Order that specifically identifies a conflicting provision of this Exhibit and states that the conflicting provision of this Exhibit does not prevail. All capitalized terms, if not otherwise defined herein, shall have the meaning set forth in the Agreement.
Conga may amend this Exhibit from time to time by posting an amended version at its website and sending Customer notice thereof (an email to Customer’s project sponsor shall be deemed sufficient in this case). Such amendment will be deemed accepted and become effective thirty (30) days after such notice (the “Proposed Amendment Date”) unless Customer first gives Conga written notice of rejection of the amendment. In the event of such rejection, this Exhibit will continue under their original provisions, and the amendment will become effective at the start of Customer’s next term following the Proposed Amendment Date. Customer’s continued use of the Subscription Services purchased under the Agreement following the effective date of an amendment will confirm Customer’s consent thereto. This Exhibit may not be amended in any other way except through a written agreement by authorized representatives of each party.
1. Definitions.
“Security Incident” means the reasonable suspicion of, discovery by, or notice to, Customer or Conga that:
(a) Customer Data has been disclosed, accessed or obtained by an unauthorized person;
(b) systems have been compromised; or
(c) a person has threatened the unauthorized disclosure, access to or obtaining of any Customer Data.
“Law(s)” means all laws, regulations, ordinances, rules and orders of any court or government body.
“Personnel” means employees and contractors who perform activities in connection with the handling of Customer Data.
“Personal Information” means information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context.
2. General Obligations.
Conga agrees to maintain a data security program that includes administrative, technical and logical safeguards designed to protect the confidentiality, integrity, and availability of Customer Data and protect it from disclosure, improper alteration, or destruction. The measures implemented and maintained by Conga for the Subscription Services will be subject to annual certification of compliance with ISO 27001 and SOC 2 Type 2 standards.
2.1 Risk Assessment and Treatment.
As part of annual ISO 27001 certification, Conga maintains a risk assessment program pertaining to the treatment and handling of Customer Data that has been approved by management, and communicated to all employees.
2.2 Access Controls.
(a) Conga Personnel’s access to data processing systems is only granted to authenticated users based on a role-based authorization concept using the following measures: Data encryption, individualized password assignment (at least 8 characters, regular automatic expiration), employee ID cards, password-protected screen savers in case of inactivity, intrusion detection systems and intrusion-prevention systems, and regularly updated antivirus and spyware filters in the network and on the individual PCs and mobile devices.
(b) Conga’s provisioning process requires Conga Personnel to change the authentication method upon initial login. Access revocation for Conga Personnel is conducted upon termination or role change. Conga Personnel role changes resulting in additional access require VP or above approval. Conga uses the least privilege model to ensure access is granted on an approved need to perform job functions. Conga reviews access quarterly.
(c) Conga employs managed firewalls to control access and allow only authorized traffic to Conga infrastructure. In addition, Conga employs security controls to manage ingress and egress of data based upon protocol, port, source and destination within the environment. Any traffic not adhering to these strict access controls is discarded at the Internet boundary. Internally at Conga, host-based intrusion detection and monitoring systems are deployed at the server and network layers, respectively.
(d) Customer has the ability to limit access to the Subscription Services to authorized Customer Personnel to prevent unauthorized access to Customer Data, including through the use of multifactor authentication.
(e) Subscription Service access logs are maintained.
2.3 Encryption. All Customer Data, including Personal Data, is encrypted at rest and, in transit, using TLS encryption technology. TLS connections are negotiated for at least 256-bit encryption or stronger.
2.4 Conga Restrictions. Conga will not, except as necessary to perform its obligations set forth in the Agreement:
(a) use or disclose any Customer Data for any purpose other than as is strictly necessary to perform its obligations as set forth in the Agreement;
(b) copy, use, reproduce, display, perform, modify, destroy or transfer any Customer Data or works derived from Customer Data; nor
(c) sell any Customer Data, or anything that includes any Customer Data, to any person.
2.5 Backups. Conga performs daily backups of Customer Data and retains such data for thirty (30) days. However, for Subscription Services hosted on the Salesforce Platform, Conga does not backup Customer Data due to the nature of such Subscription Services and the Salesforce Platform, provided Customer may extract Customer Data from the Salesforce Platform to perform its own backups.
2.6 Physical Security of Data Centers. Buildings are protected with appropriate access control systems, based on a security classification and an appropriately defined access authorization concept. Buildings are secured by access control measures using a card reader system. Depending on the security category, property, buildings or individual areas are secured by additional measures such as special access profiles, separation locks, video surveillance and security personnel. Access rights for authorized persons are granted individually according to defined criteria. This also applies to external persons.
3. Compliance with Laws.
3.1 Regulatory Cooperation. If Conga collects, accesses, receives, stores or otherwise handles any Customer Data that becomes subject to a regulatory inquiry, notification or other action required by all applicable Laws, Conga agrees to assist and cooperate to meet any obligation to the relevant regulatory authority.
3.2 Right of Access. Conga will cooperate with and assist Customer, as necessary, to enable any individual exercising their right of data access, correction, deletion or blocking of Personal Information under any applicable Law.
4. Disclosure by Law.
If Conga is required by any Law to disclose any Customer Data, Conga will:
(a) to the extent permitted by applicable Law, give Customer prior notice of the obligation as soon as practical after becoming aware; and
(b) take all steps to enable Customer an opportunity to prevent or limit the disclosure of the Customer Data.
5. Security Awareness and Training.
(a) Conga has developed a mandatory security awareness and training program for all members of Conga cloud service operations, which includes:
(i) training on how to implement and comply with its information security program; and
(ii) promoting a culture of security awareness through periodic communications from senior management with employees.
(b) All Conga employees are required to complete security and privacy awareness training as part of onboarding and on an ongoing annual basis and must agree to Conga's privacy and confidentiality requirements.
6. Scans and assessments.
6.1 Scans. In order to maintain the security of the Subscription Services, regular network and system scans are performed, including non-intrusive network scans on customer-facing infrastructure.
6.2 Assessments. Conga utilizes external service providers to perform an application vulnerability assessment biannually and application penetration test annually.
6.3 Patching. A software patching process is in place to remedy vulnerabilities in a timely manner based on scans and assessments.
6.4 Results. A summary of the results of the most recent vulnerability assessments will be made available to Customer upon request.
7. Security incidents and response. Conga has a rigorous incident management process for security events that may affect the confidentiality, integrity, or availability of systems or data. If an incident occurs, the security team logs and prioritizes it according to its severity. Events that directly impact customers are assigned the highest priority. This process specifies courses of action, procedures for notification, escalation, mitigation, and documentation. Key staff are trained in forensics and handling evidence in preparation for a Security Incident, including third-party and proprietary tools. To help ensure the swift resolution of Security Incidents, the Conga security team is available 24/7 to all Conga employees. Conga has a response plan that includes procedures to be followed in the event of a Security Incident, including formation of an internal incident response team assessing the risk the incident poses and determining who may be affected, and mitigate additional risk or impact.
(a) Notification. Internal reporting as well as Customer notification in the event of unauthorized disclosure of Customer Data in accordance with the Agreement. Conga will coordinate communication between Conga technical support and the Customer points of contact Conga has on record.
(b) Recordkeeping. Customer Data is managed according to the Agreement (including this Data Security Exhibit).
(c) Audit. Conducting and documenting root cause analysis and remediation plans.
8. Contingency Planning / Disaster Recovery.
(a) Excluding components of the Subscription Services operated by Salesforce.com, Inc., Conga infrastructure and, where applicable, Customer Data, are maintained and stored for the purposes of assuring availability or recoverability in the event of a disaster are maintained on redundant systems with the same data security standards as in production environments. Availability and resilience of systems and services are ensured by isolating critical IT and network components, by providing adequate backup and redundancy systems, using power redundancy systems, and regularly testing of systems and services. Test and live systems are kept completely separated.
(b) The availability of and access to Personal Data in the event of a physical or technical incident shall be restored by taking the following measures: Personal data is stored in RAID systems and integrates redundant systems according to security marking. Systems for uninterruptible power supplies (e. g. UPS, batteries, generators) are used to secure the power supply in the used data centers. Additionally, databases or data centers are mirrored in different physical locations.
(c) Recovery Time Objective (“RTO”) is Conga’s objective for the maximum period of time between Conga’s decision to activate the disaster recovery processes to failover the Subscription Services to a secondary site due to a declared disaster and the point at which our customers can resume production operations at a secondary site. If the decision to failover is made during the period in which an upgrade is in process, the RTO extends to include the time required to complete the upgrade. The RTO is twenty-four (24) hours.
(d) Recovery Point Objective (“RPO”) is the objective for the maximum period of data loss measured as the time from which the first transaction is lost until Conga’s declaration of the disaster. The RPO is one (1) hour. There is no RPO associated with the Subscription Services. However, for Subscription Services hosted on the Salesforce Platform, there is no RPO due to the Subscription Services and the Salesforce Platform.
9. Audit Controls.
Hardware, software and/or procedural mechanisms are maintained to record and examine activity in information systems that contain or use electronic information, including appropriate logs and reports concerning these security requirements.
10. Portable media.
Conga does not store Customer Data on desktops, laptops or other removable storage devices which are housed outside of a secured data center.
11. Secure Disposal.
Upon Customer request, Conga will dispose of tangible property containing Customer Data, using available technology, such that Customer Data cannot be practicably read or reconstructed.
12. Testing. Conga will periodically test and evaluate the key controls and operations against relevant compliance frameworks to validate that they are properly implemented and effective in addressing the threats and risks identified.
13. Monitoring.
Conga will monitor network and production systems, including error logs on servers, disks and security events for any potential problems, including:
(a) reviewing changes affecting systems handling authentication, authorization, and auditing; and
(b) reviewing User and privileged (e.g. administrator) access to Conga production systems.
14. Change and Configuration Management.
Conga has a well-defined System Development Life Cycle (SDLC) methodology that governs the application development and change management process. Conga enforces that the SDLC policies and procedures are reviewed annually and are updated on an as-needed basis to reflect changes in the operating environment. Further, Conga will maintain policies and procedures for managing changes to production systems, applications, and databases, including:
(a) a process for documenting, testing and approving the promotion of changes into production; and
(b) acceptance testing and approval processes specifically related to standard bug fixes, updates, and upgrades made available for the Subscription Services.
15. Background Checks.
Conga shall perform background checks for its employees who will have access to Customer Data. Such background checks shall include:
(a) for all employees, a criminal record search for previous seven years;
(b) for U.S.-based employees, verification of social security number for previous five years; and
(c) verification of eligibility to lawfully work in the United States (or applicable country).
16. HIPAA.
If Conga processes Protected Health Information (“PHI”), as defined in the Health Insurance Portability and Accountability Act (“HIPAA”) and its implementing regulations, as amended, on behalf of Customer, Conga shall, in addition to the obligations set forth in this Agreement, (i) enter into a form of Business Associate Agreement; and (ii) make its internal practices, books and records relating to the use and disclosure of PHI available to the U.S. Department of Health and Human Services, as may be required by HIPAA.
This Data Security Exhibit ("Exhibit") applies in addition to any existing Master Services Agreement, similar subscription agreement, or End User License Agreement (collectively, the "Agreement") between Apttus Corporation ("Conga") and the customer that is a party to such Agreement ("Customer"). In the event of any conflict between this Exhibit and the Agreement, this Exhibit shall prevail to the extent of any inconsistency. In the event of any conflict between this Exhibit and any Order executed hereunder, this Exhibit shall prevail to the extent of any inconsistency, except with regard to any provision of any Order that specifically identifies a conflicting provision of this Exhibit and states that the conflicting provision of this Exhibit does not prevail. All capitalized terms, if not otherwise defined herein, shall have the meaning set forth in the Agreement.
Conga may amend this Exhibit from time to time by posting an amended version at its website and sending Customer notice thereof (an email to Customer’s project sponsor shall be deemed sufficient in this case). Such amendment will be deemed accepted and become effective thirty (30) days after such notice (the “Proposed Amendment Date”) unless Customer first gives Conga written notice of rejection of the amendment. In the event of such rejection, this Exhibit will continue under their original provisions, and the amendment will become effective at the start of Customer’s next term following the Proposed Amendment Date. Customer’s continued use of the services purchased hereunder following the effective date of an amendment will confirm Customer’s consent thereto. This Exhibit may not be amended in any other way except through a written agreement by authorized representatives of each party.
1. Definitions.
“Security Incident” means the reasonable suspicion of, discovery by, or notice to, Customer or Conga that:
(a) Customer Data has been disclosed, accessed or obtained by an unauthorized person;
(b) systems have been compromised; or
(c) a person has threatened the unauthorized disclosure, access to or obtaining of any Customer Data.
“Law(s)” means all laws, regulations, ordinances, rules and orders of any court or government body.
“Personnel” means employees and contractors who perform activities in connection with the handling of Customer Data.
“Personal Information” is information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context.
2. General Obligations.
Conga agrees to maintain a comprehensive data security program that contains administrative, technical and logical safeguards designed to protect the confidentiality, integrity, and availability of Customer Data and protect it from disclosure, improper alteration, or destruction. The measures implemented and maintained by Conga for the Subscription Services will be subject to annual certification of compliance with ISO 27001.
2.1 Risk Assessment and Treatment.
As part of an annual ISO 27001 certification, Conga maintains a risk assessment program pertaining to the treatment and handling of Customer Data that has been approved by management, and has been communicated to all employees.
2.2 Access Controls.
(a) Customer has the ability to limit access to the Subscription Services to authorized Personnel to prevent unauthorized access to Customer Data.
(b) Subscription Services access logs are maintained.
(c) The Subscription Services support identity verification, including multi-factor authentication.
2.3 Encryption. All Customer Data is encrypted while "in transit".
2.4 Conga Restrictions. Conga will not, except as necessary to perform its obligations set forth in the Agreement:
(a) use or disclose any Customer Data for any purpose other than as is strictly necessary to perform its obligations as set forth in the Agreement;
(b) copy, use, reproduce, display, perform, modify, destroy or transfer any Customer Data or works derived from Customer Data; nor
(c) sell any Customer Data, or anything that includes any Data, to any person.
2.5 Backups.
(a) Conga does not backup Customer Data due to the nature of the Subscription Services and the SFDC platform, but Customer may extract Customer Data from the SFDC platform to perform its own backups.
2.6 Physical Security of Data Centers shall include:
(a) restricted access and visitor logs;
(b) electronic controlled access system; and
(c) CCTV on sensitive areas, unless prohibited by law.
3. Compliance with Laws.
3.1 Regulatory Cooperation. If Conga collects, accesses, receives, stores or otherwise handles any Customer Data that becomes subject to a regulatory inquiry, notification or other action required by all applicable Laws, Conga agrees to assist and cooperate to meet any obligation to the relevant regulatory authority.
3.2 Right of Access. Conga will cooperate with and assist Customer, as necessary, to enable any individual exercising their right of data access, correction, deletion or blocking of Personal Information under any applicable Law.
4. Disclosure by Law.
If Conga is required by any Law to disclose any Customer Data, Conga will:
(a) to the extent permitted by applicable Law, give Customer prior notice of the obligation as soon as practical after becoming aware; and
(b) take all steps to enable Customer an opportunity to prevent or limit the disclosure of the Customer Data.
5. Security Awareness and Training.
Conga has developed a mandatory security awareness and training program for all members of Conga cloud service operations, which includes:
(a) training on how to implement and comply with its Information Security Program; and
(b) promoting a culture of security awareness through periodic communications from senior management with employees.
6. Scans and assessments.
6.1 Scans. In order to maintain the security of the Subscription Services, regular network and system scans are performed, including non-intrusive network scans on customer-facing infrastructure.
6.2 Assessments. Conga utilizes external service providers to perform an application vulnerability assessment biannually.
6.3 Patching. A software patching process is in place to remedy vulnerabilities in a timely manner based on scans and assessments.
6.4 Summary. A summary of the results of the most recent vulnerability assessments will be made available to Customer upon request.
7. Security incidents and response. Conga has a response plan that includes procedures to be followed in the event of a Security Incident, including:
(a) Formation of an internal incident response team assessing the risk the incident poses and determining who may be affected, and mitigate additional risk or impact;
(b) Notification. Internal reporting as well as Customer notification in the event of unauthorized disclosure of Customer Data in accordance with the Agreement;
(c) Recordkeeping. Customer Data is managed according to the Agreement (including this Data Security Exhibit).
(d) Audit. Conducting and documenting root cause analysis and remediation plans.
8. Contingency Planning / Disaster Recovery.
Excluding components of the Subscription Services operated by SFDC, Conga infrastructure and, where applicable, Customer Data maintained and stored for the purposes of assuring availability or recoverability in the event of a disaster are maintained on redundant systems with the same data security standards as in production environments.
(a) Recovery Time Objective (“RTO”) is Conga’s objective for the maximum period of time between Conga’s decision to activate the disaster recovery processes to failover the Subscription Services to a secondary site due to a declared disaster and the point at which our customers may resume production operations at a secondary site. If the decision to failover is made during the period in which an upgrade is in process, the RTO extends to include the time required to complete the upgrade. The RTO is 24 hours.
(b) Recovery Point Objective (“RPO”) is the objective for the maximum period of data loss measured as the time from which the first transaction is lost until Conga’s declaration of the disaster. There is no RPO associated with the Subscription Services.
9. Audit Controls.
Hardware, software and/or procedural mechanisms are maintained to record and examine activity in information systems that contain or use electronic information, including appropriate logs and reports concerning these security requirements.
10. Portable media.
Conga does not store Customer Data on desktops, laptops or other removable storage devices which are housed outside of a secured data center.
11. Secure Disposal.
Upon Customer request, Conga will dispose of tangible property containing Customer Data, using available technology, such that Customer Data cannot be practicably read or reconstructed.
12. Testing. Conga will periodically test and evaluate the key controls and operations against relevant compliance frameworks to validate that they are properly implemented and effective in addressing the threats and risks identified.
13. Monitoring.
Conga will monitor network and production systems, including error logs on servers, disks and security events for any potential problems, including:
(a) reviewing changes affecting systems handling authentication, authorization; and
(b) reviewing User and privileged (e.g. administrator) access to Conga production systems.
14. Change and Configuration Management.
Conga will maintain policies and procedures for managing changes to production systems, applications, and databases, including:
(a) a process for documenting, testing and approving the promotion of changes into production; and
(b) acceptance testing and approval processes specifically related to standard bug fixes, updates, and upgrades made available for the Subscription Services.
15. Background Checks.
Conga shall perform background checks for its employees who will have access to Customer Data. Such background checks shall include:
(a) for all employees, a criminal record search for previous seven years;
(b) for U.S.-based employees, verification of social security number for previous five years; and
(c) verification of eligibility to lawfully work in the United States (or applicable country).
16. HIPAA.
If Conga processes Protected Health Information (“PHI”), as defined in the Health Insurance Portability and Accountability Act (“HIPAA”) and its implementing regulations, as amended, on behalf of Customer, Conga shall, in addition to the obligations set forth in this Agreement, (i) enter into a form of Business Associate Agreement; and (ii) make its internal practices, books and records relating to the use and disclosure of PHI available to the U.S. Department of Health and Human Services, as may be required by HIPAA.
17. PCI DSS (Payment Card Industry Data Security Standard).
If Conga will process any payment card information from or on behalf of Customer, the following terms apply: Conga shall at all times comply with the then-current PCI DSS and any similar data security standards that may be imposed by federal, state or local law. Conga will have an annual assessment performed by a qualified security assessor certified by the PCI Security Standards Council. Upon request by Customer, Conga will provide Customer with a PCI Attestation of Compliance or such other documentation as reasonably requested by Customer to evidence Conga’s continuing compliance.
This Data Security Exhibit ("Exhibit") applies in addition to any existing Master Services Agreement, similar subscription agreement, or End User License Agreement (collectively, the "Agreement") between Apttus Corporation ("Conga") and the customer that is a party to such Agreement ("Customer"). In the event of any conflict between this Exhibit and the Agreement, this Exhibit shall prevail to the extent of any inconsistency. In the event of any conflict between this Exhibit and any Order executed hereunder, this Exhibit shall prevail to the extent of any inconsistency, except with regard to any provision of any Order that specifically identifies a conflicting provision of this Exhibit and states that the conflicting provision of this Exhibit does not prevail. All capitalized terms, if not otherwise defined herein, shall have the meaning set forth in the Agreement.
Conga may amend this Exhibit from time to time by posting an amended version at its website and sending Customer notice thereof (an email to Customer’s project sponsor shall be deemed sufficient in this case). Such amendment will be deemed accepted and become effective thirty (30) days after such notice (the “Proposed Amendment Date”) unless Customer first gives Conga written notice of rejection of the amendment. In the event of such rejection, this Exhibit will continue under their original provisions, and the amendment will become effective at the start of Customer’s next term following the Proposed Amendment Date. Customer’s continued use of the services purchased hereunder following the effective date of an amendment will confirm Customer’s consent thereto. This Exhibit may not be amended in any other way except through a written agreement by authorized representatives of each party.
1. Definitions.
“Security Incident” means the reasonable suspicion of, discovery by, or notice to, Customer or Conga that:
(a) Customer Data has been disclosed, accessed or obtained by an unauthorized person;
(b) systems have been compromised; or
(c) a person has threatened the unauthorized disclosure, access to or obtaining of any Customer Data.
“Law(s)” means all laws, regulations, ordinances, rules and orders of any court or government body.
“Personnel” means employees and contractors who perform activities in connection with the handling of Customer Data.
“Personal Information” is information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context.
2. General Obligations.
Conga agrees to maintain a comprehensive data security program that contains administrative, technical and logical safeguards designed to protect the confidentiality, integrity, and availability of Customer Data and protect it from disclosure, improper alteration, or destruction. The measures implemented and maintained by Conga for the Subscription Services will be subject to annual certification of compliance with ISO 27001.
2.1 Risk Assessment and Treatment.
As part of an annual ISO 27001 certification, Conga maintains a risk assessment program pertaining to the treatment and handling of Customer Data that has been approved by management, and has been communicated to all employees.
2.2 Access Controls.
(a) Customer has the ability to limit access to the Subscription Services to authorized Personnel to prevent unauthorized access to Customer Data.
(b) Subscription Services access logs are maintained.
(c) The Subscription Services support identity verification, including multi-factor authentication.
2.3 Encryption. All Customer Data is encrypted while "in transit".
2.4 Conga Restrictions. Conga will not, except as necessary to perform its obligations set forth in the Agreement:
(a) use or disclose any Customer Data for any purpose other than as is strictly necessary to perform its obligations as set forth in the Agreement;
(b) copy, use, reproduce, display, perform, modify, destroy or transfer any Customer Data or works derived from Customer Data; nor
(c) sell any Customer Data, or anything that includes any Data, to any person.
2.5 Backups.
(a) Conga does not backup Customer Data due to the nature of the Subscription Services and the SFDC platform, but Customer may extract Customer Data from the SFDC platform to perform its own backups.
2.6 Physical Security of Data Centers shall include:
(a) restricted access and visitor logs;
(b) electronic controlled access system; and
(c) CCTV on sensitive areas, unless prohibited by law.
3. Compliance with Laws.
3.1 Regulatory Cooperation. If Conga collects, accesses, receives, stores or otherwise handles any Customer Data that becomes subject to a regulatory inquiry, notification or other action required by all applicable Laws, Conga agrees to assist and cooperate to meet any obligation to the relevant regulatory authority.
3.2 Right of Access. Conga will cooperate with and assist Customer, as necessary, to enable any individual exercising their right of data access, correction, deletion or blocking of Personal Information under any applicable Law.
4. Disclosure by Law.
If Conga is required by any Law to disclose any Customer Data, Conga will:
(a) to the extent permitted by applicable Law, give Customer prior notice of the obligation as soon as practical after becoming aware; and
(b) take all steps to enable Customer an opportunity to prevent or limit the disclosure of the Customer Data.
5. Security Awareness and Training.
Conga has developed a mandatory security awareness and training program for all members of Conga cloud service operations, which includes:
(a) training on how to implement and comply with its Information Security Program; and
(b) promoting a culture of security awareness through periodic communications from senior management with employees.
6. Scans and assessments.
6.1 Scans. In order to maintain the security of the Subscription Services, regular network and system scans are performed, including non-intrusive network scans on customer-facing infrastructure.
6.2 Assessments. Conga utilizes external service providers to perform an application vulnerability assessment biannually.
6.3 Patching. A software patching process is in place to remedy vulnerabilities in a timely manner based on scans and assessments.
6.4 Summary. A summary of the results of the most recent vulnerability assessments will be made available to Customer upon request.
7. Security incidents and response. Conga has a response plan that includes procedures to be followed in the event of a Security Incident, including:
(a) Formation of an internal incident response team assessing the risk the incident poses and determining who may be affected, and mitigate additional risk or impact;
(b) Notification. Internal reporting as well as Customer notification in the event of unauthorized disclosure of Customer Data in accordance with the Agreement;
(c) Recordkeeping. Customer Data is managed according to the Agreement (including this Data Security Exhibit).
(d) Audit. Conducting and documenting root cause analysis and remediation plans.
8. Contingency Planning / Disaster Recovery.
Excluding components of the Subscription Services operated by SFDC, Conga infrastructure and, where applicable, Customer Data maintained and stored for the purposes of assuring availability or recoverability in the event of a disaster is maintained with the same data security standards as in production environments.
(a) Recovery Time Objective (“RTO”) is Conga’s objective for the maximum period of time between Conga’s decision to activate the disaster recovery processes to failover the Subscription Services to a secondary site due to a declared disaster and the point at which our customers may resume production operations at a secondary site. If the decision to failover is made during the period in which an upgrade is in process, the RTO extends to include the time required to complete the upgrade. The RTO is 24 hours.
(b) Recovery Point Objective (“RPO”) is the objective for the maximum period of data loss measured as the time from which the first transaction is lost until Conga’s declaration of the disaster. There is no RPO associated with the Subscription Services.
9. Audit Controls.
Hardware, software and/or procedural mechanisms are maintained to record and examine activity in information systems that contain or use electronic information, including appropriate logs and reports concerning these security requirements.
10. Portable media.
Conga does not store Customer Data on desktops, laptops or other removable storage devices which are housed outside of a secured data center.
11. Secure Disposal.
Upon Customer request, Conga will dispose of tangible property containing Customer Data, using available technology, such that Customer Data cannot be practicably read or reconstructed.
12. Testing. Conga will periodically test and evaluate the key controls and operations against relevant compliance frameworks to validate that they are properly implemented and effective in addressing the threats and risks identified.
13. Monitoring.
Conga will monitor network and production systems, including error logs on servers, disks and security events for any potential problems, including:
(a) reviewing changes affecting systems handling authentication, authorization; and
(b) reviewing User and privileged (e.g. administrator) access to Conga production systems.
14. Change and Configuration Management.
Conga will maintain policies and procedures for managing changes to production systems, applications, and databases, including:
(a) a process for documenting, testing and approving the promotion of changes into production; and
(b) acceptance testing and approval processes specifically related to standard bug fixes, updates, and upgrades made available for the Subscription Services.
15. Background Checks.
Conga shall perform background checks for its employees who will have access to Customer Data. Such background checks shall include:
(a) for all employees, a criminal record search for previous seven years;
(b) for U.S.-based employees, verification of social security number for previous five years; and
(c) verification of eligibility to lawfully work in the United States (or applicable country).
16. HIPAA.
If Conga processes Protected Health Information (“PHI”), as defined in the Health Insurance Portability and Accountability Act (“HIPAA”) and its implementing regulations, as amended, on behalf of Customer, Conga shall, in addition to the obligations set forth in this Agreement, (i) enter into a form of Business Associate Agreement; and (ii) make its internal practices, books and records relating to the use and disclosure of PHI available to the U.S. Department of Health and Human Services, as may be required by HIPAA.
17. PCI DSS (Payment Card Industry Data Security Standard).
If Conga will process any payment card information from or on behalf of Customer, the following terms apply: Conga shall at all times comply with the then-current PCI DSS and any similar data security standards that may be imposed by federal, state or local law. Conga will have an annual assessment performed by a qualified security assessor certified by the PCI Security Standards Council. Upon request by Customer, Conga will provide Customer with a PCI Attestation of Compliance or such other documentation as reasonably requested by Customer to evidence Conga’s continuing compliance.
This Data Security Exhibit ("Exhibit") applies in addition to any existing Master Subscription Services Agreement or End User License Agreement (collectively, the "Agreement") between Apttus Corporation ("Apttus") and the customer that is a party to such Agreement ("Customer"). In the event of any conflict between this Exhibit and the Agreement, this Exhibit shall prevail to the extent of any inconsistency. In the event of any conflict between this Exhibit and any Order executed hereunder, this Exhibit shall prevail to the extent of any inconsistency, except with regard to any provision of any Order that specifically identifies a conflicting provision of this Exhibit and states that the conflicting provision of this Exhibit does not prevail. All capitalized terms, if not otherwise defined herein, shall have the meaning set forth in the Agreement.
Apttus may amend this Exhibit from time to time by posting an amended version at its website and sending Customer notice thereof (an email to Customer’s project sponsor shall be deemed sufficient in this case). Such amendment will be deemed accepted and become effective thirty (30) days after such notice (the “Proposed Amendment Date”) unless Customer first gives Apttus written notice of rejection of the amendment. In the event of such rejection, this Exhibit will continue under their original provisions, and the amendment will become effective at the start of Customer’s next term following the Proposed Amendment Date. Customer’s continued use of the services purchased hereunder following the effective date of an amendment will confirm Customer’s consent thereto. This Exhibit may not be amended in any other way except through a written agreement by authorized representatives of each party.
1. Definitions.
“Security Incident” means the reasonable suspicion of, discovery by, or notice to, Customer or Apttus that:
(a) Customer Data has been disclosed, accessed or obtained by an unauthorized person;
(b) systems have been compromised; or
(c) a person has threatened the unauthorized disclosure, access to or obtaining of any Customer Data.
“Law(s)” means all laws, regulations, ordinances, rules and orders of any court or government body.
“Personnel” means employees and contractors who perform activities in connection with the handling of Customer Data.
“Personal Information” is information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context.
2. General Obligations.
Apttus agrees to maintain a comprehensive data security program that contains administrative, technical and logical safeguards designed to protect the confidentiality, integrity, and availability of Customer Data and protect it from disclosure, improper alteration, or destruction. The measures implemented and maintained by Apttus for the Service will be subject to annual certification of compliance with ISO 27001.
2.1 Risk Assessment and Treatment.
As part of an annual ISO 27001 certification, Apttus maintains a risk assessment program pertaining to the treatment and handling of Customer Data that has been approved by management, and has been communicated to all employees.
2.2 Access Controls.
(a) Cusotmer has the ability to limit access to the Subscription Services to authorized Personnel to prevent unauthorized access to Customer Data.
(b) Subscription Service access logs are maintained.
(c) The Subscription Service supports identity verification, including multi-factor authentication.
2.3 Encryption. All Customer Data is encrypted while "in transit".
2.4 Apttus Restrictions. Apttus will not, except as necessary to perform its obligations set forth in the Agreement:
(a) use or disclose any Customer Data for any purpose other than as is strictly necessary to perform its obligations as set forth in the Agreement;
(b) copy, use, reproduce, display, perform, modify, destroy or transfer any Customer Data or works derived from Customer Data; nor
(c) sell any Customer Data, or anything that includes any Data, to any person.
2.5 Backups.
(a) Apttus does not backup Customer Data due to the nature of the Subscription Services and the SFDC platform, but Customer may extract Customer Data from the SFDC platform to perform its own backups.
2.6 Physical Security of Data Centers shall include:
(a) restricted access and visitor logs;
(b) electronic controlled access system; and
(c) CCTV on sensitive areas, unless prohibited by law.
3. Compliance with Laws.
3.1 Regulatory Cooperation. If Apttus collects, accesses, receives, stores or otherwise handles any Customer Data that becomes subject to a regulatory inquiry, notification or other action required by all applicable Laws, Apttus agrees to assist and cooperate to meet any obligation to the relevant regulatory authority.
3.2 Right of Access. Apttus will cooperate with and assist Customer, as necessary, to enable any individual exercising their right of data access, correction, deletion or blocking of Personal Information under any applicable Law.
4. Disclosure by Law.
If Apttus is required by any Law to disclose any Customer Data, Apttus will:
(a) to the extent permitted by applicable Law, give Customer prior notice of the obligation as soon as practical after becoming aware; and
(b) take all steps to enable Customer an opportunity to prevent or limit the disclosure of the Customer Data.
5. Security Awareness and Training.
Apttus has developed a mandatory security awareness and training program for all members of Apttus cloud service operations, which includes:
(a) training on how to implement and comply with its Information Security Program; and
(b) promoting a culture of security awareness through periodic communications from senior management with employees.
6. Scans and assessments.
6.1 Scans. In order to maintain the security of the Subscription Services, regular network and system scans are performed, including non-intrusive network scans on customer-facing infrastructure.
6.2 Assessments. Apttus utilizes external service providers to perform an application vulnerability assessment biannually.
6.3 Patching. A software patching process is in place to remedy vulnerabilities in a timely manner based on scans and assessments.
6.4 Summary. A summary of the results of the most recent vulnerability assessments will be made available to Customer upon request.
7. Security incidents and response. Apttus has a response plan that includes procedures to be followed in the event of a Security Incident, including:
(a) Formation of an internal incident response team assessing the risk the incident poses and determining who may be affected, and mitigate additional risk or impact;
(b) Notification. Internal reporting as well as Customer notification in the event of unauthorized disclosure of Customer Data in accordance with the Agreement;
(c) Recordkeeping. Customer Data is managed according to the Agreement (including this Data Security Exhibit).
(d) Audit. Conducting and documenting root cause analysis and remediation plans.
(d) Audit. Conducting and documenting root cause analysis and remediation plans.
8. Contingency Planning / Disaster Recovery.
Excluding components of the Subscription Services operated by SFDC, Apttus infrastructure and, where applicable, Customer Data maintained and stored for the purposes of assuring availability or recoverability in the event of a disaster is maintained with the same data security standards as in production environments.
(a) Recovery Time Objective (“RTO”) is Apttus’ objective for the maximum period of time between Apttus’ decision to activate the disaster recovery processes to failover the Subscription Services to a secondary site due to a declared disaster and the point at which our customers may resume production operations at a secondary site. If the decision to failover is made during the period in which an upgrade is in process, the RTO extends to include the time required to complete the upgrade. The RTO is 24 hours.
(b) Recovery Point Objective (“RPO”) is the objective for the maximum period of data loss measured as the time from which the first transaction is lost until Apttus’ declaration of the disaster. There is no RPO associated with the Subscription Services.
9. Audit Controls.
Hardware, software and/or procedural mechanisms are maintained to record and examine activity in information systems that contain or use electronic information, including appropriate logs and reports concerning these security requirements.
10. Portable media.
Apttus does not store Customer Data on desktops, laptops or other removable storage devices which are housed outside of a secured data center.
11. Secure Disposal.
Upon Customer request, Apttus will dispose of tangible property containing Customer Data, using available technology, such that Customer Data cannot be practicably read or reconstructed.
12. Testing. Apttus will periodically test and evaluate the key controls and operations against relevant compliance frameworks to validate that they are properly implemented and effective in addressing the threats and risks identified.
13. Monitoring.
Apttus will monitor network and production systems, including error logs on servers, disks and security events for any potential problems, including:
(a) reviewing changes affecting systems handling authentication, authorization; and
(b) reviewing User and privileged (e.g. administrator) access to Apttus production systems.
14. Change and Configuration Management.
Apttus will maintain policies and procedures for managing changes to production systems, applications, and databases, including:
(a) a process for documenting, testing and approving the promotion of changes into production; and
(b) acceptance testing and approval processes specifically related to standard bug fixes, updates, and upgrades made available for the Subscription Services.
15. Background Checks.
Apttus shall perform background checks for its employees who will have access to Customer Data. Such background checks shall include:
(a) for all employees, a criminal record search for previous seven years;
(b) for U.S.-based employees, verification of social security number for previous five years; and
(c) verification of eligibility to lawfully work in the United States (or applicable country).
16. HIPAA.
If Apttus processes Protected Health Information (“PHI”), as defined in the Health Insurance Portability and Accountability Act (“HIPAA”) and its implementing regulations, as amended, on behalf of Customer, Apttus shall, in addition to the obligations set forth in this Agreement, (i) enter into a form of Business Associate Agreement; and (ii) make its internal practices, books and records relating to the use and disclosure of PHI available to the U.S. Department of Health and Human Services, as may be required by HIPAA.
17. PCI DSS (Payment Card Industry Data Security Standard).
If Apttus will process any payment card information from or on behalf of Customer, the following terms apply: Apttus shall at all times comply with the then-current PCI DSS and any similar data security standards that may be imposed by federal, state or local law. Apttus will have an annual assessment performed by a qualified security assessor certified by the PCI Security Standards Council. Upon request by Customer, Apttus will provide Customer with a PCI Attestation of Compliance or such other documentation as reasonably requested by Customer to evidence Apttus’ continuing compliance.
This Data Security Exhibit ("Exhibit") applies in addition to any existing Master Subscription Services Agreement or End User License Agreement (collectively, the "Agreement") between Apttus Corporation ("Apttus") and the customer that is a party to such Agreement ("Customer"). In the event of any conflict between this Exhibit and the Agreement, this Exhibit shall prevail to the extent of any inconsistency. In the event of any conflict between this Exhibit and any Order executed hereunder, this Exhibit shall prevail to the extent of any inconsistency, except with regard to any provision of any Order that specifically identifies a conflicting provision of this Exhibit and states that the conflicting provision of this Exhibit does not prevail. All capitalized terms, if not otherwise defined herein, shall have the meaning set forth in the Agreement.
Apttus may amend this Exhibit from time to time by posting an amended version at its website and sending Customer notice thereof (an email to Customer’s project sponsor shall be deemed sufficient in this case). Such amendment will be deemed accepted and become effective thirty (30) days after such notice (the “Proposed Amendment Date”) unless Customer first gives Apttus written notice of rejection of the amendment. In the event of such rejection, this Exhibit will continue under their original provisions, and the amendment will become effective at the start of Customer’s next term following the Proposed Amendment Date. Customer’s continued use of the services purchased hereunder following the effective date of an amendment will confirm Customer’s consent thereto. This Exhibit may not be amended in any other way except through a written agreement by authorized representatives of each party.
1. Definitions.
“Security Incident” means the reasonable suspicion of, discovery by, or notice to, Customer or Apttus that:
(a) Customer Data has been disclosed, accessed or obtained by an unauthorized person;
(b) systems have been compromised; or
(c) a person has threatened the unauthorized disclosure, access to or obtaining of any Customer Data.
“Law(s)” means all laws, regulations, ordinances, rules and orders of any court or government body.
“Personnel” means employees and contractors who perform activities in connection with the handling of Customer Data.
“Personal Information” is information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context.
2. General Obligations.
Apttus agrees to maintain a comprehensive data security program that contains administrative, technical and logical safeguards designed to protect the confidentiality, integrity, and availability of Customer Data and protect it from disclosure, improper alteration, or destruction. The measures implemented and maintained by Apttus for the Service will be subject to annual certification of compliance with ISO 27001.
2.1 Risk Assessment and Treatment.
As part of an annual ISO 27001 certification, Apttus maintains a risk assessment program pertaining to the treatment and handling of Customer Data that has been approved by management, and has been communicated to all employees.
2.2 Access Controls.
(a) Cusotmer has the ability to limit access to the Subscription Services to authorized Personnel to prevent unauthorized access to Customer Data.
(b) Subscription Service access logs are maintained.
(c) The Subscription Service supports identity verification, including multi-factor authentication.
2.3 Encryption. All Customer Data is encrypted while "in transit".
2.4 Apttus Restrictions. Apttus will not, except as necessary to perform its obligations set forth in the Agreement:
(a) use or disclose any Customer Data for any purpose other than as is strictly necessary to perform its obligations as set forth in the Agreement;
(b) copy, use, reproduce, display, perform, modify, destroy or transfer any Customer Data or works derived from Customer Data; nor
(c) sell any Customer Data, or anything that includes any Data, to any person.
2.5 Backups.
(a) Daily backups of all Customer Data is performed for production environments only (does not include sandboxes).
(b) Customer Data backups are retained for thirty (30) days.
2.6 Physical Security of Data Centers shall include:
(a) restricted access and visitor logs;
(b) electronic controlled access system; and
(c) CCTV on sensitive areas, unless prohibited by law.
3. Compliance with Laws.
3.1 Regulatory Cooperation. If Apttus collects, accesses, receives, stores or otherwise handles any Customer Data that becomes subject to a regulatory inquiry, notification or other action required by all applicable Laws, Apttus agrees to assist and cooperate to meet any obligation to the relevant regulatory authority.
3.2 Right of Access. Apttus will cooperate with and assist Customer, as necessary, to enable any individual exercising their right of data access, correction, deletion or blocking of Personal Information under any applicable Law.
4. Disclosure by Law.
If Apttus is required by any Law to disclose any Customer Data, Apttus will:
(a) to the extent permitted by applicable Law, give Customer prior notice of the obligation as soon as practical after becoming aware; and
(b) take all steps to enable Customer an opportunity to prevent or limit the disclosure of the Customer Data.
5. Security Awareness and Training.
Apttus has developed a mandatory security awareness and training program for all members of Apttus cloud service operations, which includes:
(a) training on how to implement and comply with its Information Security Program; and
(b) promoting a culture of security awareness through periodic communications from senior management with employees.
6. Scans and assessments.
6.1 Scans. In order to maintain the security of the Subscription Services, regular network and system scans are performed, including non-intrusive network scans on customer-facing infrastructure.
6.2 Assessments. Apttus utilizes external service providers to perform an application vulnerability assessment biannually.
6.3 Patching. A software patching process is in place to remedy vulnerabilities in a timely manner based on scans and assessments.
6.4 Summary. A summary of the results of the most recent vulnerability assessments will be made available to Customer upon request.
7. Security incidents and response. Apttus has a response plan that includes procedures to be followed in the event of a Security Incident, including:
(a) Formation of an internal incident response team assessing the risk the incident poses and determining who may be affected, and mitigate additional risk or impact;
(b) Notification. Internal reporting as well as Customer notification in the event of unauthorized disclosure of Customer Data in accordance with the Agreement;
(c) Recordkeeping. Customer Data is managed according to the Agreement (including this Data Security Exhibit).
(d) Audit. Conducting and documenting root cause analysis and remediation plans.
(d) Audit. Conducting and documenting root cause analysis and remediation plans.
8. Contingency Planning / Disaster Recovery.
Customer Data stored for the purposes of assuring availability or recoverability in the event of a disaster is maintained with the same data security standards as Customer Data in production environments.
Recovery Time Objective (“RTO”) is Apttus’ objective for the maximum period of time between Apttus’ decision to activate the disaster recovery processes to failover the Subscription Services to a secondary site due to a declared disaster, and the point at which our customers can resume production operations at a secondary site. If the decision to failover is made during the period in which an upgrade is in process, the RTO extends to include the time required to complete the upgrade. The RTO is 24 hours.
Recovery Point Objective (“RPO”) is APTTUS’ objective for the maximum period of data loss measured as the time from which the first transaction is lost until Apttus’ declaration of the disaster. The RPO does not apply to any data loads that are underway when the disaster occurs. The RPO is 4 hours.
9. Audit Controls.
Hardware, software and/or procedural mechanisms are maintained to record and examine activity in information systems that contain or use electronic information, including appropriate logs and reports concerning these security requirements.
10. Portable media.
Apttus does not store Customer Data on desktops, laptops or other removable storage devices which are housed outside of a secured data center.
11. Secure Disposal.
Upon Customer request, Apttus will dispose of tangible property containing Customer Data, using available technology, such that Customer Data cannot be practicably read or reconstructed.
12. Testing. Apttus will periodically test and evaluate the key controls and operations against relevant compliance frameworks to validate that they are properly implemented and effective in addressing the threats and risks identified.
13. Monitoring.
Apttus will monitor network and production systems, including error logs on servers, disks and security events for any potential problems, including:
(a) reviewing changes affecting systems handling authentication, authorization; and
(b) reviewing User and privileged (e.g. administrator) access to Apttus production systems.
14. Change and Configuration Management.
Apttus will maintain policies and procedures for managing changes to production systems, applications, and databases, including:
(a) a process for documenting, testing and approving the promotion of changes into production; and
(b) acceptance testing and approval processes specifically related to standard bug fixes, updates, and upgrades made available for the Subscription Services.
15. Background Checks.
Apttus shall perform background checks for its employees who will have access to Customer Data. Such background checks shall include:
(a) for all employees, a criminal record search for previous seven years;
(b) for U.S.-based employees, verification of social security number for previous five years; and
(c) verification of eligibility to lawfully work in the United States (or applicable country).
16. HIPAA.
If Apttus processes Protected Health Information (“PHI”), as defined in the Health Insurance Portability and Accountability Act (“HIPAA”) and its implementing regulations, as amended, on behalf of Customer, Apttus shall, in addition to the obligations set forth in this Agreement, (i) enter into a form of Business Associate Agreement; and (ii) make its internal practices, books and records relating to the use and disclosure of PHI available to the U.S. Department of Health and Human Services, as may be required by HIPAA.
17. PCI DSS (Payment Card Industry Data Security Standard).
If Apttus will process any payment card information from or on behalf of Customer, the following terms apply: Apttus shall at all times comply with the then-current PCI DSS and any similar data security standards that may be imposed by federal, state or local law. Apttus will have an annual assessment performed by a qualified security assessor certified by the PCI Security Standards Council. Upon request by Customer, Apttus will provide Customer with a PCI Attestation of Compliance or such other documentation as reasonably requested by Customer to evidence Apttus’ continuing compliance.
This Data Security Exhibit ("Exhibit") applies in addition to any existing Master Subscription Services Agreement or End User License Agreement (collectively, the "Agreement") between Apttus Corporation ("Apttus") and the customer that is a party to such Agreement ("Customer"). In the event of any conflict between this Exhibit and the Agreement, this Exhibit shall prevail to the extent of any inconsistency. In the event of any conflict between this Exhibit and any Order executed hereunder, this Exhibit shall prevail to the extent of any inconsistency, except with regard to any provision of any Order that specifically identifies a conflicting provision of this Exhibit and states that the conflicting provision of this Exhibit does not prevail. All capitalized terms, if not otherwise defined herein, shall have the meaning set forth in the Agreement.
Apttus may amend this Exhibit from time to time by posting an amended version at its website and sending Customer notice thereof (an email to Customer’s project sponsor shall be deemed sufficient in this case). Such amendment will be deemed accepted and become effective thirty (30) days after such notice (the “Proposed Amendment Date”) unless Customer first gives Apttus written notice of rejection of the amendment. In the event of such rejection, this Exhibit will continue under their original provisions, and the amendment will become effective at the start of Customer’s next term following the Proposed Amendment Date. Customer’s continued use of the services purchased hereunder following the effective date of an amendment will confirm Customer’s consent thereto. This Exhibit may not be amended in any other way except through a written agreement by authorized representatives of each party.
1. Definitions.
“Security Incident” means the reasonable suspicion of, discovery by, or notice to, Customer or Apttus that:
(a) Customer Data has been disclosed, accessed or obtained by an unauthorized person;
(b) systems have been compromised; or
(c) a person has threatened the unauthorized disclosure, access to or obtaining of any Customer Data.
“Law(s)” means all laws, regulations, ordinances, rules and orders of any court or government body.
“Personnel” means employees and contractors who perform activities in connection with the handling of Customer Data.
“Personal Information” is information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context.
2. General Obligations.
Apttus agrees to maintain a comprehensive data security program that contains administrative, technical and logical safeguards designed to protect the confidentiality, integrity, and availability of Customer Data and protect it from disclosure, improper alteration, or destruction. The measures implemented and maintained by Apttus for the Service will be subject to annual certification of compliance with ISO 27001.
2.1 Risk Assessment and Treatment.
As part of an annual ISO 27001 certification, Apttus maintains a risk assessment program pertaining to the treatment and handling of Customer Data that has been approved by management, and has been communicated to all employees.
2.2 Access Controls.
(a) Cusotmer has the ability to limit access to the Subscription Services to authorized Personnel to prevent unauthorized access to Customer Data.
(b) Subscription Service access logs are maintained.
(c) The Subscription Service supports identity verification, including multi-factor authentication.
2.3 Encryption. All Customer Data is encrypted while "in transit".
2.4 Apttus Restrictions. Apttus will not, except as necessary to perform its obligations set forth in the Agreement:
(a) use or disclose any Customer Data for any purpose other than as is strictly necessary to perform its obligations as set forth in the Agreement;
(b) copy, use, reproduce, display, perform, modify, destroy or transfer any Customer Data or works derived from Customer Data; nor
(c) sell any Customer Data, or anything that includes any Data, to any person.
2.5 Backups.
(a) Daily backups of all Customer Data is performed for production environments only (does not include sandboxes).
(b) Customer Data backups are retained for thirty (30) days.
2.6 Physical Security of Data Centers shall include:
(a) restricted access and visitor logs;
(b) electronic controlled access system; and
(c) CCTV on sensitive areas, unless prohibited by law.
3. Compliance with Laws.
3.1 Regulatory Cooperation. If Apttus collects, accesses, receives, stores or otherwise handles any Customer Data that becomes subject to a regulatory inquiry, notification or other action required by all applicable Laws, Apttus agrees to assist and cooperate to meet any obligation to the relevant regulatory authority.
3.2 Right of Access. Apttus will cooperate with and assist Customer, as necessary, to enable any individual exercising their right of data access, correction, deletion or blocking of Personal Information under any applicable Law.
4. Disclosure by Law.
If Apttus is required by any Law to disclose any Customer Data, Apttus will:
(a) to the extent permitted by applicable Law, give Customer prior notice of the obligation as soon as practical after becoming aware; and
(b) take all steps to enable Customer an opportunity to prevent or limit the disclosure of the Customer Data.
5. Security Awareness and Training.
Apttus has developed a mandatory security awareness and training program for all members of Apttus cloud service operations, which includes:
(a) training on how to implement and comply with its Information Security Program; and
(b) promoting a culture of security awareness through periodic communications from senior management with employees.
6. Scans and assessments.
6.1 Scans. In order to maintain the security of the Subscription Services, regular network and system scans are performed, including non-intrusive network scans on customer-facing infrastructure.
6.2 Assessments. Apttus utilizes external service providers to perform an application vulnerability assessment biannually.
6.3 Patching. A software patching process is in place to remedy vulnerabilities in a timely manner based on scans and assessments.
6.4 Summary. A summary of the results of the most recent vulnerability assessments will be made available to Customer upon request.
8. Security incidents and response. Apttus has a response plan that includes procedures to be followed in the event of a Security Incident, including:
(a) Formation of an internal incident response team assessing the risk the incident poses and determining who may be affected, and mitigate additional risk or impact;
(b) Notification. Internal reporting as well as Customer notification in the event of unauthorized disclosure of Customer Data in accordance with the Agreement;
(c) Recordkeeping. Customer Data is managed according to the Agreement (including this Data Security Exhibit).
(d) Audit. Conducting and documenting root cause analysis and remediation plans.
(d) Audit. Conducting and documenting root cause analysis and remediation plans.
9. Contingency Planning / Disaster Recovery.
Customer Data stored for the purposes of assuring availability or recoverability in the event of a disaster is maintained with the same data security standards as Customer Data in production environments.
Recovery Time Objective (“RTO”) is Apttus’ objective for the maximum period of time between Apttus’ decision to activate the disaster recovery processes to failover the Subscription Services to a secondary site due to a declared disaster, and the point at which our customers can resume production operations at a secondary site. If the decision to failover is made during the period in which an upgrade is in process, the RTO extends to include the time required to complete the upgrade. The RTO is 24 hours.
Recovery Point Objective (“RPO”) is APTTUS’ objective for the maximum period of data loss measured as the time from which the first transaction is lost until Apttus’ declaration of the disaster. The RPO does not apply to any data loads that are underway when the disaster occurs. The RPO is 4 hours.
10. Audit Controls.
Hardware, software and/or procedural mechanisms are maintained to record and examine activity in information systems that contain or use electronic information, including appropriate logs and reports concerning these security requirements.
11. Portable media.
Apttus does not store Customer Data on desktops, laptops or other removable storage devices which are housed outside of a secured data center.
12. Secure Disposal.
Upon Customer request, Apttus will dispose of tangible property containing Customer Data, using available technology, such that Customer Data cannot be practicably read or reconstructed.
13. Testing. Apttus will periodically test and evaluate the key controls and operations against relevant compliance frameworks to validate that they are properly implemented and effective in addressing the threats and risks identified.
14. Monitoring.
Apttus will monitor network and production systems, including error logs on servers, disks and security events for any potential problems, including:
(a) reviewing changes affecting systems handling authentication, authorization; and
(b) reviewing User and privileged (e.g. administrator) access to Apttus production systems.
15. Change and Configuration Management.
Apttus will maintain policies and procedures for managing changes to production systems, applications, and databases, including:
(a) a process for documenting, testing and approving the promotion of changes into production; and
(b) acceptance testing and approval processes specifically related to standard bug fixes, updates, and upgrades made available for the Subscription Services.
16. Background Checks.
Apttus shall perform background checks for its employees who will have access to Customer Data. Such background checks shall include:
(a) for all employees, a criminal record search for previous seven years;
(b) for U.S.-based employees, verification of social security number for previous five years; and
(c) verification of eligibility to lawfully work in the United States (or applicable country).
17. HIPAA.
If Apttus processes Protected Health Information (“PHI”), as defined in the Health Insurance Portability and Accountability Act (“HIPAA”) and its implementing regulations, as amended, on behalf of Customer, Apttus shall, in addition to the obligations set forth in this Agreement, (i) enter into a form of Business Associate Agreement; and (ii) make its internal practices, books and records relating to the use and disclosure of PHI available to the U.S. Department of Health and Human Services, as may be required by HIPAA.
18. PCI DSS (Payment Card Industry Data Security Standard).
If Apttus will process any payment card information from or on behalf of Customer, the following terms apply: Apttus shall at all times comply with the then-current PCI DSS and any similar data security standards that may be imposed by federal, state or local law. Apttus will have an annual assessment performed by a qualified security assessor certified by the PCI Security Standards Council. Upon request by Customer, Apttus will provide Customer with a PCI Attestation of Compliance or such other documentation as reasonably requested by Customer to evidence Apttus’ continuing compliance.
This Data Security Exhibit ("Exhibit") applies in addition to any existing Master Subscription Services Agreement or End User License Agreement (collectively, the "Agreement") between Apttus Corporation ("Apttus") and the customer that is a party to such Agreement ("Customer"). In the event of any conflict between this Exhibit and the Agreement, this Exhibit shall prevail to the extent of any inconsistency. In the event of any conflict between this Exhibit and any Order executed hereunder, this Exhibit shall prevail to the extent of any inconsistency, except with regard to any provision of any Order that specifically identifies a conflicting provision of this Exhibit and states that the conflicting provision of this Exhibit does not prevail. All capitalized terms, if not otherwise defined herein, shall have the meaning set forth in the Agreement.
Apttus may amend this Exhibit from time to time by posting an amended version at its website and sending Customer notice thereof (an email to Customer’s project sponsor shall be deemed sufficient in this case). Such amendment will be deemed accepted and become effective thirty (30) days after such notice (the “Proposed Amendment Date”) unless Customer first gives Apttus written notice of rejection of the amendment. In the event of such rejection, this Exhibit will continue under their original provisions, and the amendment will become effective at the start of Customer’s next term following the Proposed Amendment Date. Customer’s continued use of the services purchased hereunder following the effective date of an amendment will confirm Customer’s consent thereto. This Exhibit may not be amended in any other way except through a written agreement by authorized representatives of each party.
1. Definitions.
“Data Incident” means the reasonable suspicion of, discovery by, or notice to, Customer or Apttus that:
(a) Customer Data has been or is likely to be accessed or obtained by an unauthorized person;
(b) systems have been or are likely to be compromised or vulnerable; or
(c) a person has threatened the unauthorized access to or obtaining of any Customer Data.
“Law(s)” means all laws, regulations, ordinances, rules and orders of any court or government body.
“Personnel” means employees and contractors who perform activities in connection with the handling of Customer Data.
“Personal Information” means is information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context.
2. General Obligations.
Apttus agrees to maintain a comprehensive data security program that contains administrative, technical and logical safeguards designed to protect the confidentiality, integrity, and availability of Customer Data and protect it from disclosure, improper alteration, or destruction. The measures implemented and maintained by Apttus for the Service will be subject to annual certification of compliance with ISO 27001.
2.1 Risk Assessment and Treatment.
Apttus will maintain a risk assessment program that has been approved by management, communicated to employees, and has an owner to maintains and reviews the program.
2.2 Access Controls.
(a) Apttus will limit access to the Subscription Services to authorized Personnel; and prevent unauthorized access to Customer Data.
(b) Apttus will maintain activity logs for system access.
(c) Apttus will perform strict identity verification, including multi-factor authentication, for physical access to any data center in which Customer Data is stored or processed.
(d) Access to Customer Data will be at the sole discretion of Customer.
2.3 Encryption. All Customer Data will be transmitted continuously encrypted throughout a data stream.
2.4 Apttus Restrictions. Apttus will not, except as necessary to perform its obligations set forth in the Agreement:
(a) use or disclose any Customer Data for any purpose other than as is strictly necessary to perform its obligations as set forth in the Agreement;
(b) copy, use, reproduce, display, perform, modify, destroy or transfer any Customer Data or works derived from Customer Data;
(c) sell any Customer Data, or anything that includes any Data, to any person;
(d) disclose any Customer Data to a person (including a third party) located outside the country in which you collected, accessed, received or stored it, without our prior written consent; and
(e) use any real or live Customer Data for any kind of testing.
2.5 Backups.
(a) Apttus will perform a backup of all Customer Data in production environment only (does not include sandboxes).
(b) Apttus will encrypt the transmission of Customer Data on backups with AES with a key length of 128 bits or stronger.
(c) Apttus will retain the Customer Data backup for thirty (30) days.
2.6 Physical Security. Apttus shall maintain a physical security program, which shall include:
(a) restricted access and logs kept at all times;
(b) electronic controlled access system; and
(c) CCTV on sensitive areas, unless otherwise required by law.
3. Compliance with Laws.
3.1 Regulatory Cooperation. If Apttus collects, accesses, receives, stores or otherwise handles any Customer Data subject to a regulatory inquiry, notification or other action required by all applicable Laws, Apttus agrees to assist and cooperate to meet any obligation to the relevant regulatory authority. In addition, Apttus shall process all data in accordance with the Data Processing Addendum.
3.2 Right of Access. Apttus will cooperate with and assist Customer, as necessary, to enable any individual exercising their right of data access, correction, deletion or blocking of Personal Information under any applicable Law.
4. Disclosure by Law.
If Apttus is required by any Law to disclose any Customer Data, Apttus will:
(a) to the extent permitted by applicable Law, give Customer prior notice of the obligation as soon as practical after becoming aware; and
(b) take all steps to enable Customer an opportunity to prevent or limit the disclosure of the Customer Data.
5. Compliance with Industry Best Practice.
Apttus shall maintain a security program, materially in accordance with industry standards, in connection with the collection, access, receipt, storage or other handling of Customer Data.
Apttus shall follow Open Web Application Security Project (OWASP) guidelines for application development.
6. Security Awareness and Training.
Apttus has developed a mandatory security awareness and training program for all members of Apttus cloud service operations, which includes:
(a) training on how to implement and comply with its Information Security Program; and
(b) promoting a culture of security awareness through periodic communications from senior management with employees.
7. Scans and assessments.
7.1 Scans. In order to maintain the security of the Subscription Services, Apttus will perform regular network and system scans, including non-intrusive network scans on web-facing infrastructure.
7.2 Assessments. Apttus will utilize external service providers (a) to perform an application vulnerability assessment after each major release and (b) to perform network vulnerability assessments quarterly. Apttus will also regularly perform self-vulnerability assessments.
7.3 Patching. Apttus shall implement a security patching process to repairs systems in a timely manner based on such scans and assessments.
7.4 Summary. A summary of the results of the most recent vulnerability assessments will be made available to Customer upon request.
8. Security incidents and response.
8.1 Action following a Security Incident. Apttus will develop a security incident response plan that includes procedures to be followed in the event of any security breach of Customer Data or any security breach of any application or system directly associated with the accessing, processing, storage, communication or transmission of Customer Data, including:
(a) formation of an internal incident response team with a response leader; and
(b) assessing the risk the incident poses and determining who may be affected.
8.2 Communication. Apttus shall adhere to its established process as pertains to:
8.2.1 Notification. Internal reporting as well as Customer notification in the event of unauthorized disclosure of Customer Data in accordance with the Agreement;
8.2.2 Recordkeeping. Customer data are managed according to the Agreement (including this Data Security Exhibit).
8.2.3 Audit. Conducting and documenting root cause analysis and remediation plans.
8.3 Data Incident Notices. Incident notification will be to Customer according to its provided contact information. Customer is responsible for providing and keeping that contact information up to date.
9. Contingency Planning / Disaster Recovery.
Customer Data stored for the purposes of assuring availability or recoverability in the event of a disaster is maintained with the same data security standards as Customer Data in production environments.
Recovery Time Objective (“RTO”) is Apttus’ objective for the maximum period of time between Apttus’ decision to activate the disaster recovery processes to failover the Subscription Services to a secondary site due to a declared disaster, and the point at which our customers can resume production operations at a secondary site. If the decision to failover is made during the period in which an upgrade is in process, the RTO extends to include the time required to complete the upgrade. The RTO is 24 hours.
Recovery Point Objective (“RPO”) is APTTUS’ objective for the maximum period of data loss measured as the time from which the first transaction is lost until Apttus’ declaration of the disaster. The RPO does not apply to any data loads that are underway when the disaster occurs. The RPO is 4 hours.
10. Audit Controls.
Apttus maintains hardware, software and/or procedural mechanisms that record and examine activity in information systems that contain or use electronic information, including appropriate logs and reports concerning these security requirements.
11. Portable media.
Apttus does not store Customer Data on desktops, laptops or other removable storage devices which are housed outside of a secured data center.
12. Secure Disposal.
Apttus maintains policies and procedures regarding the disposal of tangible property containing Customer Data, considering available technology so that Customer Data cannot be practicably read or reconstructed.
13. Testing. Apttus will maintain regularly testing of the key controls, certifications, systems and procedures; of its information security program to validate that they are properly implemented and effective in addressing the threats and risks identified. Certifications may change over time to keep up with industry standards.
14. Monitoring.
Apttus will monitor network and production systems, including error logs on servers, disks and security events for any potential problems, including:
(a) reviewing changes affecting systems handling authentication, authorization, and auditing;
(b) reviewing privileged access to Apttus production systems; and
(c) the performance of network vulnerability assessments and penetration testing on a regular basis.
15. Change and Configuration Management.
Apttus will maintain policies and procedures for managing changes to production systems, applications, and databases, including:
(a) a process for documenting, testing and approving the promotion of changes into production;
(b) acceptance testing and approval processes specifically related to standard bug fixes, updates, and upgrades made available for the Subscription Services;
(c) a process for Apttus to utilize a third party to conduct web application level security assessments. These assessments generally include testing for:
(i) cross-site request forgery;
(ii) improper input handling (e.g. cross-site scripting, SQL injection, XML injection, cross-site flashing); and
(iii) insufficient authentication and authorization.
16. Background Checks.
Apttus shall perform background checks for its employees who will have access to Customer Data. Such background checks shall include:
(a) for all employees, a criminal record search for previous seven years;
(b) for U.S.-based employees, verification of social security number for previous five years; and
(c) verification of eligibility to lawfully work in the United States (or applicable country).
17. HIPAA.
If Apttus processes Protected Health Information (“PHI”), as defined in the Health Insurance Portability and Accountability Act (“HIPAA”) and its implementing regulations, as amended, on behalf of Customer, Apttus shall, in addition to the obligations set forth in this Agreement, (i) enter into a form of business associate agreement; and (ii) make its internal practices, books and records relating to the use and disclosure of PHI available to the U.S. Department of Health and Human Services, as may be required by HIPAA.
18. PCI DSS.
If Apttus will process any payment card information from or on behalf of Customer, the following terms apply: Apttus shall at all times comply with the then-current PCI DSS and any similar data security standards that may be imposed by federal, state or local law. Apttus will have an annual assessment performed by a qualified security assessor certified by the PCI Security Standards Council. Upon request by Customer, Apttus will provide Customer with a PCI Attestation of Compliance or such other documentation as reasonably requested by Customer to evidence Apttus’ continuing compliance.
This Data Security Exhibit ("Exhibit") applies in addition to any existing Master Subscription Services Agreement or End User License Agreement (collectively, the "Agreement") between Apttus Corporation ("Apttus") and the customer that is a party to such Agreement ("Customer"). In the event of any conflict between this Exhibit and the Agreement, this Exhibit shall prevail to the extent of any inconsistency. In the event of any conflict between this Exhibit and any Order executed hereunder, this Exhibit shall prevail to the extent of any inconsistency, except with regard to any provision of any Order that specifically identifies a conflicting provision of this Exhibit and states that the conflicting provision of this Exhibit does not prevail. All capitalized terms, if not otherwise defined herein, shall have the meaning set forth in the Agreement.
Apttus may amend this Exhibit from time to time by posting an amended version at its website and sending Customer notice thereof (an email to Customer’s project sponsor shall be deemed sufficient in this case). Such amendment will be deemed accepted and become effective thirty (30) days after such notice (the “Proposed Amendment Date”) unless Customer first gives Apttus written notice of rejection of the amendment. In the event of such rejection, this Exhibit will continue under their original provisions, and the amendment will become effective at the start of Customer’s next term following the Proposed Amendment Date. Customer’s continued use of the services purchased hereunder following the effective date of an amendment will confirm Customer’s consent thereto. This Exhibit may not be amended in any other way except through a written agreement by authorized representatives of each party.
1. Definitions.
“Data Incident” means the reasonable suspicion of, discovery by, or notice to, Customer or Apttus that:
- Customer Data has been or is likely to be accessed or obtained by an unauthorized person;
- systems have been or are likely to be compromised or vulnerable; or
- a person has threatened the unauthorized access to or obtaining of any Customer Data.
“Law(s)” means all laws, regulations, ordinances, rules and orders of any court or government body.
“Personnel” means employees and contractors who perform activities in connection with the handling of Customer Data.
“Personal Information” means is information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context.
“Sensitive Data” means any data, document, code, information, or Personal Information that Apttus collects, accesses, receives, stores or otherwise handles under the Agreement for which Customer notifies Apttus in writing as being “sensitive” prior to that collection, access, receipt, storage or other handling.
“Systems” means the systems, network, facilities, processes, infrastructure and security controls that Apttus uses to provide the Subscription Services.
2. General Obligations.
Apttus agrees to maintain a comprehensive data security program that contains administrative, technical and logical safeguards designed to protect the confidentiality, integrity, and availability of Customer Data and protect it from disclosure, improper alteration, or destruction. The measures implemented and maintained by Apttusfor the Service will be subject to annual certification of compliance with ISO 27001.
2.1 Risk Assessment and Treatment.
Apttuswill maintain a risk assessment program that has been approved by management, communicated to employees, and has an owner to maintains and reviews the program.
2.2 Access Controls.
Apttus will limit access to the Subscription Servicesto authorized Personnel; and prevent unauthorized access to Customer Data.
Apttus will maintain activity logs for system access.
Apttus will perform strict identity verification, including multi-factor authentication, for physical access to any data center in which Customer Data is stored or processed.
Access to Customer Data will be at the sole discretion of Customer.
2.3 Encryption. All Customer Data will be transmitted continuously encrypted throughout a data stream.
2.4 Apttus Restrictions. Apttus will not, except as necessary to perform its obligations set forth in the Agreement:
- use or disclose any Customer Data for any purpose other than as is strictly necessary to perform its obligations as set forth in the Agreement:
- copy, use, reproduce, display, perform, modify, destroy or transfer any Customer Data or works derived from Customer Data;
- sell any Customer Data, or anything that includes any Data, to any person;
- disclose any Customer Data to a person (including a third party) located outside the country in which you collected, accessed, received or stored it, without our prior written consent;
- use any real or live Customer Data for any kind of testing.
2.5 Backups.
Apttus will perform a full backup of all Customer Data at least daily.
Apttus will encrypt the transmission of Customer Data on backups with AES with a key length of 128 bits or stronger.
Apttus will retain the Customer Data backup for thirty (30) days.
2.6 Physical Security. Apttus shall maintain a physical security program, which shall include:
- restricted access and logs kept at all times;
- electronic controlled access system; and
- CCTV on sensitive areas, unless otherwise required by law.
3. Compliance with Laws.
3.1 Regulatory Cooperation. If Apttus collects, accesses, receives, stores or otherwise handles any Customer Data subject to a regulatory inquiry, notification or other action required by all applicable Laws, Apttus agrees to assist and cooperate to meet any obligation to the relevant regulatory authority. In addition, Apttus shall process all data in accordance with the Data Processing Addendum.
3.2 Right of Access. Apttus will cooperate with and assist Customer, as necessary, to enable any individual exercising their right of data access, correction, deletion or blocking of Personal Information under any applicable Law.
4. Disclosure by Law.
If Apttus is required by any Law to disclose any Customer Data, Apttus will:
- to the extent permitted by applicable Law, give Customer prior notice of the obligation as soon as practical after becoming aware; and
- take all steps to enable Customer an opportunity to prevent or limit the disclosure of the Customer Data.
5. Compliance with Industry Best Practice.
Apttusshall maintain a security program, materially in accordance with industry standards, in connection with the collection, access, receipt, storage or other handling of Customer Data.
Apttus shall follow Open Web Application Security Project (OWASP) guidelines for application development.
6. Security Awareness and Training.
Apttus has developed a mandatory security awareness and training program for all members of Apttus cloud service operations, which includes:
- training on how to implement and comply with its Information Security Program; and
- promoting a culture of security awareness through periodic communications from senior management with employees.
7. Scans and assessments.
7.1 Scans. In order to maintain the security of the Subscription Services, Apttuswill perform regular network and system scans, including non-intrusive network scans on web-facing infrastructure.
7.2 Assessments. Apttus will utilize external service providers (a) to perform an application vulnerability assessment after each major release and (b) to perform network vulnerability assessments quarterly. APTTUS will also regularly perform self-vulnerability assessments.
7.3 Patching. Apttus shall implement a security patching process to repairs systems in a timely manner based on such scans and assessments.
7.4 Summary. A summary of the results of the most recent vulnerability assessments will be made available to Customer upon request.
8. Security incidents and response.
8.1 Action following a Security Incident. Apttus will develop a security incident response plan that includes procedures to be followed in the event of any security breach of Customer Data or any security breach of any application or system directly associated with the accessing, processing, storage, communication or transmission of Customer Data, including:
- formation of an internal incident response team with a response leader; and
- assessing the risk the incident poses and determining who may be affected.
8.2 Communication. Apttus shall adhere to its established process as pertains to:
- Notification. Internal reporting as well as Customer notification in the event of unauthorized disclosure of Customer Data in accordance with the Agreement;
- Recordkeeping. Customer data are managed according to the Agreement (including this Data Security Exhibit).
- Audit. Conducting and documenting root cause analysis and remediation plans.
8.3 Data Incident Notices. Incident notification will be to Customer according to its provided contact information. Customer is responsible for providing and keeping that contact information up to date.
9. Contingency Planning / Disaster Recovery.
Customer Data stored for the purposes of assuring availability or recoverability in the event of a disaster is maintained with the same data security standards as Customer Data in production environments.
- Recovery Time Objective (“RTO”) is Apttus’ objective for the maximum period of time between Apttus’ decision to activate the disaster recovery processes to failover the Subscription Servicesto a secondary site due to a declared disaster, and the point at which our customers can resume production operations at a secondary site. If the decision to failover is made during the period in which an upgrade is in process, the RTO extends to include the time required to complete the upgrade. The RTO is 24 hours.
- Recovery Point Objective (“RPO”) is APTTUS’ objective for the maximum period of data loss measured as the time from which the first transaction is lost until Apttus’ declaration of the disaster. The RPO does not apply to any data loads that are underway when the disaster occurs. The RPO is 4 hours.
10. Audit Controls.
Apttus maintains hardware, software and/or procedural mechanisms that record and examine activity in information systems that contain or use electronic information, including appropriate logs and reports concerning these security requirements.
11. Portable media.
Apttus does not store Customer Data on desktops, laptops or other removable storage devices which are housed outside of a secured data center.
12. Secure Disposal.
Apttus maintains policies and procedures regarding the disposal of tangible property containing Customer Data, considering available technology so that Customer Data cannot be practicably read or reconstructed.
13. Testing. Apttus will maintain regularly testing of the key controls, certifications, systems and procedures; of its information security program to validate that they are properly implemented and effective in addressing the threats and risks identified. Certifications may change over time to keep up with industry standards.
14. Monitoring.
Apttus will monitor network and production systems, including error logs on servers, disks and security events for any potential problems, including:
- reviewing changes affecting systems handling authentication, authorization, and auditing;
- reviewing privileged access to Apttus production systems; and
- the performance of network vulnerability assessments and penetration testing on a regular basis.
15. Change and Configuration Management.
Apttus will maintain policies and procedures for managing changes to production systems, applications, and databases, including:
- a process for documenting, testing and approving the promotion of changes into production;
- acceptance testing and approval processes specifically related to standard bug fixes, updates, and upgrades made available for the Subscription Services;
- a process for Apttus to utilize a third party to conduct web application level security assessments. These assessments generally include testing for:
- cross-site request forgery;
- improper input handling (e.g. cross-site scripting, SQL injection, XML injection, cross-site flashing); and
- insufficient authentication and authorization.
16. Background Checks.
Apttus shall perform background checks for its employees who will have access to Customer Data. Such background checks shall include:
- for all employees, a criminal record search for previous seven years;
- for U.S.-based employees, verification of social security number for previous five years; and
- verification of eligibility to lawfully work in the United States (or applicable country).
17. HIPAA.
If Apttus processes Protected Health Information (“PHI”), as defined in the Health Insurance Portability and Accountability Act (“HIPAA”) and its implementing regulations, as amended, on behalf of Customer, Apttus shall, in addition to the obligations set forth in this Agreement, (i) enter into a form of business associate agreement; and (ii) make its internal practices, books and records relating to the use and disclosure of PHI available to the U.S. Department of Health and Human Services, as may be required by HIPAA.
18. PCI DSS.
If Apttus will process any payment card information from or on behalf of Customer, the following terms apply: Apttus shall at all times comply with the then-current PCI DSS and any similar data security standards that may be imposed by federal, state or local law. Apttus will have an annual assessment performed by a qualified security assessor certified by the PCI Security Standards Council. Upon request by Customer, Apttus will provide Customer with a PCI Attestation of Compliance or such other documentation as reasonably requested by Customer to evidence Apttus’ continuing compliance.
This Data Security Exhibit ("Exhibit") applies in addition to any existing Master Subscription Services Agreement or End User License Agreement (collectively, the "Agreement") between Apttus Corporation ("Apttus") and the customer that is a party to such Agreement ("Customer"). In the event of any conflict between this Exhibit and the Agreement, this Exhibit shall prevail to the extent of any inconsistency. In the event of any conflict between this Exhibit and any Order executed hereunder, this Exhibit shall prevail to the extent of any inconsistency, except with regard to any provision of any Order that specifically identifies a conflicting provision of this Exhibit and states that the conflicting provision of this Exhibit does not prevail. All capitalized terms, if not otherwise defined herein, shall have the meaning set forth in the Agreement.
Apttus may amend this Exhibit from time to time by posting an amended version at its website and sending Customer notice thereof (an email to Customer’s project sponsor shall be deemed sufficient in this case). Such amendment will be deemed accepted and become effective thirty (30) days after such notice (the “Proposed Amendment Date”) unless Customer first gives Apttus written notice of rejection of the amendment. In the event of such rejection, this Exhibit will continue under their original provisions, and the amendment will become effective at the start of Customer’s next term following the Proposed Amendment Date. Customer’s continued use of the services purchased hereunder following the effective date of an amendment will confirm Customer’s consent thereto. This Exhibit may not be amended in any other way except through a written agreement by authorized representatives of each party.
1. Definitions.
“Data Incident” means the reasonable suspicion of, discovery by, or notice to, Customer or Apttus that:
- Customer Data has been or is likely to be accessed or obtained by an unauthorized person;
- systems have been or are likely to be compromised or vulnerable; or
- a person has threatened the unauthorized access to or obtaining of any Customer Data.
“Law(s)” means all laws, regulations, ordinances, rules and orders of any court or government body.
“Personnel” means employees and contractors who perform activities in connection with the handling of Customer Data.
“Personal Information” means is information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context.
“Sensitive Data” means any data, document, code, information, or Personal Information that Apttus collects, accesses, receives, stores or otherwise handles under the Agreement for which Customer notifies Apttus in writing as being “sensitive” prior to that collection, access, receipt, storage or other handling.
“Systems” means the systems, network, facilities, processes, infrastructure and security controls that Apttus uses to provide the Subscription Services.
2. General Obligations.
Apttus agrees to maintain a comprehensive data security program that contains administrative, technical and logical safeguards designed to protect the confidentiality, integrity, and availability of Customer Data and protect it from disclosure, improper alteration, or destruction. The measures implemented and maintained by Apttusfor the Service will be subject to annual certification of compliance with ISO 27001.
2.1 Risk Assessment and Treatment.
Apttuswill maintain a risk assessment program that has been approved by management, communicated to employees, and has an owner to maintains and reviews the program.
2.2 Access Controls.
Apttus will limit access to the Subscription Servicesto authorized Personnel; and prevent unauthorized access to Customer Data.
Apttus will maintain activity logs for system access.
Apttus will perform strict identity verification, including multi-factor authentication, for physical access to any data center in which Customer Data is stored or processed.
Access to Customer Data will be at the sole discretion of Customer.
2.3 Encryption. All Customer Data will be transmitted continuously encrypted throughout a data stream.
2.4 Apttus Restrictions. Apttus will not, except as necessary to perform its obligations set forth in the Agreement:
- use or disclose any Customer Data for any purpose other than as is strictly necessary to perform its obligations as set forth in the Agreement:
- copy, use, reproduce, display, perform, modify, destroy or transfer any Customer Data or works derived from Customer Data;
- sell any Customer Data, or anything that includes any Data, to any person;
- disclose any Customer Data to a person (including a third party) located outside the country in which you collected, accessed, received or stored it, without our prior written consent;
- use any real or live Customer Data for any kind of testing.
2.5 Backups.
Apttus will perform a full backup of all Customer Data at least daily.
Apttus will encrypt the transmission of Customer Data on backups with AES with a key length of 128 bits or stronger.
Apttus will retain the Customer Data backup for thirty (30) days.
2.6 Physical Security. Apttus shall maintain a physical security program, which shall include:
- restricted access and logs kept at all times;
- electronic controlled access system; and
- CCTV on sensitive areas, unless otherwise required by law.
3. Compliance with Laws.
3.1 Regulatory Cooperation. If Apttus collects, accesses, receives, stores or otherwise handles any Customer Data subject to a regulatory inquiry, notification or other action required by all applicable Laws, Apttus agrees to assist and cooperate to meet any obligation to the relevant regulatory authority. In addition, Apttus shall process all data in accordance with the Data Processing Addendum.
3.2 Right of Access. Apttus will cooperate with and assist Customer, as necessary, to enable any individual exercising their right of data access, correction, deletion or blocking of Personal Information under any applicable Law.
4. Disclosure by Law.
If Apttus is required by any Law to disclose any Customer Data, Apttus will:
- to the extent permitted by applicable Law, give Customer prior notice of the obligation as soon as practical after becoming aware; and
- take all steps to enable Customer an opportunity to prevent or limit the disclosure of the Customer Data.
5. Compliance with Industry Best Practice.
Apttusshall maintain a security program, materially in accordance with industry standards, in connection with the collection, access, receipt, storage or other handling of Customer Data.
Apttus shall follow Open Web Application Security Project (OWASP) guidelines for application development.
6. Security Awareness and Training.
Apttus has developed a mandatory security awareness and training program for all members of Apttus cloud service operations, which includes:
- training on how to implement and comply with its Information Security Program; and
- promoting a culture of security awareness through periodic communications from senior management with employees.
7. Scans and assessments.
7.1 Scans. In order to maintain the security of the Subscription Services, Apttuswill perform regular network and system scans, including non-intrusive network scans on web-facing infrastructure.
7.2 Assessments. Apttus will utilize external service providers (a) to perform an application vulnerability assessment after each major release and (b) to perform network vulnerability assessments quarterly. APTTUS will also regularly perform self-vulnerability assessments.
7.3 Patching. Apttus shall implement a security patching process to repairs systems in a timely manner based on such scans and assessments.
7.4 Summary. A summary of the results of the most recent vulnerability assessments will be made available to Customer upon request.
8. Security incidents and response.
8.1 Action following a Security Incident. Apttus will develop a security incident response plan that includes procedures to be followed in the event of any security breach of Customer Data or any security breach of any application or system directly associated with the accessing, processing, storage, communication or transmission of Customer Data, including:
- formation of an internal incident response team with a response leader; and
- assessing the risk the incident poses and determining who may be affected.
8.2 Communication. Apttus shall adhere to its established process as pertains to:
- Notification. Internal reporting as well as Customer notification in the event of unauthorized disclosure of Customer Data in accordance with the Agreement;
- Recordkeeping. Customer data are managed according to the Agreement (including this Data Security Exhibit).
- Audit. Conducting and documenting root cause analysis and remediation plans.
8.3 Data Incident Notices. Incident notification will be to Customer according to its provided contact information. Customer is responsible for providing and keeping that contact information up to date.
9. Contingency Planning / Disaster Recovery.
Customer Data stored for the purposes of assuring availability or recoverability in the event of a disaster is maintained with the same data security standards as Customer Data in production environments.
- Recovery Time Objective (“RTO”) is Apttus’ objective for the maximum period of time between Apttus’ decision to activate the disaster recovery processes to failover the Subscription Servicesto a secondary site due to a declared disaster, and the point at which our customers can resume production operations at a secondary site. If the decision to failover is made during the period in which an upgrade is in process, the RTO extends to include the time required to complete the upgrade. The RTO is 24 hours.
- Recovery Point Objective (“RPO”) is APTTUS’ objective for the maximum period of data loss measured as the time from which the first transaction is lost until Apttus’ declaration of the disaster. The RPO does not apply to any data loads that are underway when the disaster occurs. The RPO is 4 hours.
10. Audit Controls.
Apttus maintains hardware, software and/or procedural mechanisms that record and examine activity in information systems that contain or use electronic information, including appropriate logs and reports concerning these security requirements.
11. Portable media.
Apttus does not store Customer Data on desktops, laptops or other removable storage devices which are housed outside of a secured data center.
12. Secure Disposal.
Apttus maintains policies and procedures regarding the disposal of tangible property containing Customer Data, considering available technology so that Customer Data cannot be practicably read or reconstructed.
13. Testing. Apttus will maintain regularly testing of the key controls, certifications, systems and procedures; of its information security program to validate that they are properly implemented and effective in addressing the threats and risks identified. Certifications may change over time to keep up with industry standards.
14. Monitoring.
Apttus will monitor network and production systems, including error logs on servers, disks and security events for any potential problems, including:
- reviewing changes affecting systems handling authentication, authorization, and auditing;
- reviewing privileged access to Apttus production systems; and
- the performance of network vulnerability assessments and penetration testing on a regular basis.
15. Change and Configuration Management.
Apttus will maintain policies and procedures for managing changes to production systems, applications, and databases, including:
- a process for documenting, testing and approving the promotion of changes into production;
- acceptance testing and approval processes specifically related to standard bug fixes, updates, and upgrades made available for the Subscription Services;
- a process for Apttus to utilize a third party to conduct web application level security assessments. These assessments generally include testing for:
- cross-site request forgery;
- improper input handling (e.g. cross-site scripting, SQL injection, XML injection, cross-site flashing); and
- insufficient authentication and authorization.
16. Background Checks.
Apttus shall perform background checks for its employees who will have access to Customer Data. Such background checks shall include:
- for all employees, a criminal record search for previous seven years;
- for U.S.-based employees, verification of social security number for previous five years; and
- verification of eligibility to lawfully work in the United States (or applicable country).
17. HIPAA.
If Apttus processes Protected Health Information (“PHI”), as defined in the Health Insurance Portability and Accountability Act (“HIPAA”) and its implementing regulations, as amended, on behalf of Customer, Apttus shall, in addition to the obligations set forth in this Agreement, (i) enter into a form of business associate agreement; and (ii) make its internal practices, books and records relating to the use and disclosure of PHI available to the U.S. Department of Health and Human Services, as may be required by HIPAA.
18. PCI DSS.
If Apttus will process any payment card information from or on behalf of Customer, the following terms apply: Apttus shall at all times comply with the then-current PCI DSS and any similar data security standards that may be imposed by federal, state or local law. Apttus will have an annual assessment performed by a qualified security assessor certified by the PCI Security Standards Council. Upon request by Customer, Apttus will provide Customer with a PCI Attestation of Compliance or such other documentation as reasonably requested by Customer to evidence Apttus’ continuing compliance.