Laserfiche WebLink
Exhibit D <br /> Innovative Interfaces Incorporated <br /> Hosting Services <br /> Terms and Conditions <br /> These Hosting Services Terms and Conditions ("Hosting Terms") apply to the License Agreement if, and <br /> only to the extent that, Hosting Services are identified on the Pricing Exhibit to the License Agreement as a <br /> purchased service. Unless otherwise specified, capitalized terms in these Hosting Terms have the same meaning <br /> as those in the GTCs. The terms set forth herein supplement, but do not replace or modify, the GTCs. <br /> 1. Hosting Services. The following terms apply for all purposes to Client's license to and use of the <br /> Software under the Agreement. <br /> 2. Hosting Solution. Innovative offers clients a standard cloud-based hosting option (the"Standard Plan"). <br /> The table below sets forth the features of the Standard Plan. This option provides industry-leading security and <br /> monitoring at a SOC 1/SOC 2 Type 2/ISO 27001-audited datacenter by a top-tier cloud hosting provider(the <br /> "Hosting Provider"),with the flexibility to meet clients' data storage, data recovery, and information security policy <br /> requirements. To meet clients' global hosting needs, Innovative offers hosting options in datacenters located in <br /> the United States, Canada, United Kingdom, Ireland, Australia and the Asia-Pacific region, however, Innovative <br /> reserves the right to increase, decrease and/or relocate its datacenters at anytime. <br /> Feature Standard <br /> 24x7 infrastructure monitoring ✓ <br /> Dedicated production environment ✓ <br /> 99.9%guaranteed infrastructure uptime** ✓ <br /> Dedicated public IP address and custom URL ✓ <br /> Operating system installation and management ✓ <br /> Library software installation and upgrades ✓ <br /> Data backups Daily <br /> Archive data backup retention 30 days <br /> 3. Hosting Solution System Configuration.The hosting systems are configured to meet the solution <br /> requirements as per the Hosting Terms set forth on the Pricing Exhibit to the License Agreement. <br /> 4. Security Controls. <br /> a. Generally. Subject to the terms of the Agreement, Innovative implements industry-recognized <br /> best practices to prevent the unintended or malicious loss, destruction or alteration of Client's data resident in the <br /> Software. <br /> b. Network Systems Audit Logging. All firewall logon activity and password changes are logged, <br /> monitored, controlled and audited. All intrusion detection and firewall log monitoring is done through services <br /> provided by Innovative and those pertinent log files and configuration files are retained for ninety (90) days and <br /> can be made available upon request for audit and problem resolution, as may be required. <br /> c. Network Monitoring. All network systems and servers are monitored 24/7/365. Innovative will <br /> monitor its systems for security breaches, violations and suspicious (questionable) activity. This includes <br /> suspicious external activity(including, without limitation, unauthorized probes, scans or break-in attempts) and <br /> suspicious internal activity(including, without limitation, unauthorized system administrator access, unauthorized <br /> changes to its system or network, system or network misuse or program information theft or mishandling). <br /> Innovative will notify Client as soon as reasonably possible of any known security breaches or suspicious <br /> activities involving Client's production data or environment, including, without limitation, unauthorized access and <br /> service attacks, e.g., denial of service attacks. <br /> Page 16 of 17 <br />