{"component": "clause", "props": {"groups": [{"snippet": "1. HOSTED ONLINE ACCESS Contractor shall deliver a hosted online access solution that uses HTTP and standard internet technologies to provide web-based access to the oblique aerial imagery acquired by the LAR-IAC and under perpetual license from Pictometry International Corp. Contractor will host and make the Oblique Images available to LAR-IAC participants through their hosted online access product. Contractor shall make best effort to ensure solution will be available 99.9% of the time. If County determines availability is not acceptable, Contractor shall allow termination of this subscription. The solution shall allow access to all prior LAR-IAC Oblique Images (2003, 2006, 2008, 2011, 2014, and 2017) under perpetual license from Pictometry. The solution will include the following capabilities:\na. LAR-IAC Master Account\n1. Create/delete/update sub-organizations within the LAR-IAC project.\n2. Create/delete/update users both within its organization and within sub- organizations.\n3. Upload and manage GIS layers that shall be stored within the contractor\u2019s computer systems, and displayed on the oblique imagery in the hosted solution.", "snippet_links": [{"key": "online-access", "type": "definition", "offset": [10, 23]}, {"key": "contractor-shall", "type": "clause", "offset": [24, 40]}, {"key": "to-provide", "type": "clause", "offset": [131, 141]}, {"key": "access-to-the", "type": "clause", "offset": [152, 165]}, {"key": "perpetual-license", "type": "clause", "offset": [223, 240]}, {"key": "contractor-will", "type": "clause", "offset": [277, 292]}, {"key": "available-to", "type": "definition", "offset": [326, 338]}, {"key": "access-product", "type": "definition", "offset": [388, 402]}, {"key": "best-effort", "type": "definition", "offset": [426, 437]}, {"key": "to-ensure", "type": "clause", "offset": [438, 447]}, {"key": "not-acceptable", "type": "clause", "offset": [531, 545]}, {"key": "termination-of-this", "type": "clause", "offset": [570, 589]}, {"key": "the-solution", "type": "definition", "offset": [604, 616]}, {"key": "allow-access", "type": "clause", "offset": [623, 635]}, {"key": "master-account", "type": "definition", "offset": [819, 833]}, {"key": "organization-and", "type": "clause", "offset": [950, 966]}, {"key": "the-contractor", "type": "definition", "offset": [1054, 1068]}, {"key": "computer-systems", "type": "clause", "offset": [1071, 1087]}, {"key": "hosted-solution", "type": "clause", "offset": [1133, 1148]}], "size": 1, "samples": [{"hash": "5uVWDM35oUz", "uri": "/contracts/5uVWDM35oUz#hosted-software", "label": "Agreement for Digital Aerial Data", "score": 26.5920600891, "published": true}], "hash": "01a65da0d6656fc53b28f91809287942", "id": 6}, {"snippet": "2.12.1 We licence and allow certain of our authorised business partners to provide some of our software to customers using a hosting environment. By hosting environment we mean software installed on our own (or our authorised business partner\u2019s) computers that your Authorised Users may access and use through the Internet. Where you access the Software via a hosting environment, you are responsible for maintaining your own access to the Internet to allow your Authorised Users to access the Software. You also agree that due to the nature of using software in this way there may be times when your Authorised Users are unable to access and use the Software (for example due to maintenance or circumstances beyond our control). Separate agreements may also relate to our Software where it is used in this way and your use of the Software will be subject to that separate agreement. If this agreement and any separate agreement conflict in any way, then the separate agreement will be applicable on that particular issue.\n2.12.2 If you have purchased a licence from your supplier to access our Software using its hosting environment, then your supplier (not us) is fully responsible for your access or inability to access our Software in this way and any related services that it provides.", "snippet_links": [{"key": "business-partners", "type": "definition", "offset": [54, 71]}, {"key": "to-provide", "type": "clause", "offset": [72, 82]}, {"key": "our-software", "type": "definition", "offset": [91, 103]}, {"key": "hosting-environment", "type": "definition", "offset": [125, 144]}, {"key": "authorised-users-may", "type": "clause", "offset": [266, 286]}, {"key": "access-and-use", "type": "definition", "offset": [287, 301]}, {"key": "you-are-responsible", "type": "clause", "offset": [381, 400]}, {"key": "access-to-the-internet", "type": "definition", "offset": [426, 448]}, {"key": "nature-of", "type": "clause", "offset": [535, 544]}, {"key": "use-the-software", "type": "definition", "offset": [643, 659]}, {"key": "for-example", "type": "clause", "offset": [661, 672]}, {"key": "circumstances-beyond-our-control", "type": "clause", "offset": [695, 727]}, {"key": "separate-agreements", "type": "clause", "offset": [730, 749]}, {"key": "relate-to", "type": "definition", "offset": [759, 768]}, {"key": "your-use-of-the-software", "type": "clause", "offset": [815, 839]}, {"key": "subject-to", "type": "clause", "offset": [848, 858]}, {"key": "this-agreement", "type": "clause", "offset": [887, 901]}, {"key": "agreement-conflict", "type": "clause", "offset": [919, 937]}, {"key": "your-supplier", "type": "definition", "offset": [1067, 1080]}, {"key": "your-access", "type": "clause", "offset": [1188, 1199]}, {"key": "inability-to", "type": "clause", "offset": [1203, 1215]}, {"key": "related-services", "type": "definition", "offset": [1256, 1272]}], "size": 8, "samples": [{"hash": "2kwxkir3Pk9", "uri": "/contracts/2kwxkir3Pk9#hosted-software", "label": "Software Licence Agreement", "score": 31.6319351196, "published": true}, {"hash": "hoLuk3rMGBJ", "uri": "/contracts/hoLuk3rMGBJ#hosted-software", "label": "Software Licence Agreement", "score": 30.0196266174, "published": true}, {"hash": "jTS1N2faorS", "uri": "/contracts/jTS1N2faorS#hosted-software", "label": "Software License Agreement", "score": 24.1875419617, "published": true}], "hash": "a032ea24dec3892419b7cf36944e0f59", "id": 1}, {"snippet": "The Software will be hosted by Frog, the Customer will:\n7.1 ensure that each End User shall keep a secure password for his use of the Hosting Services and On-Line Documentation and that each End User shall keep his/her password confidential; and\n7.2 only issue passwords which give administrative access to the Software and Hosting Services to appropriate End Users.\n1 Data Processing\n1.1 Through reference to the applicable Data Protection Laws, it is agreed that:\n1.1.1 the Customer is the Controller of all Personal Data required to fulfil the Agreement, and\n1.1.2 Frog is the Processor of all Personal Data required to fulfil the Agreement\n1.1.3 where the Customer configures the Associated Products to Process Personal Data in addition to the Personal Data required in Appendix 2, the Customer shall assume the role of Processor for that data\n1.2 Both parties shall:\n1.2.1 ensure that appropriate technical and organisational measures are in place to safeguard Customer Personal Data against accidental or unlawful loss, alteration, unauthorised disclosure or access\n1.2.2 ensure that procedures are in place to notify the other party in reasonable time of any Data Incident relating to the Customer Personal Data being processed in the Associated Products as part of this Agreement. This notification shall include, to the extent possible, details of the Data Incident including steps taken to mitigate the potential risks and steps the notifying party would recommend that the other party takes to address the Data Incident\n1.3 Frog shall:\n1.3.1 comply with all applicable Data Protection Laws in the Processing of Customer Personal Data; and\n1.3.2 only process Personal Data in accordance with Appendix 2; and\n1.3.3 not Process customer Personal Data other than on the relevant Customer\u2019s written instruction unless Processing is required by Applicable Laws to which Frog is subject, in which case Frog shall inform the Customer of that legal requirement before the Processing of the Personal Data.\n1.3.4 maintain Cyber Essentials certification to help ensure the effectiveness of the Supplier\u2019s Security Measures\n1.3.5 take appropriate steps to ensure compliance with the Security Measures by its employees, contractors and Sub-Processors to the extent applicable to their scope of performance. Frog shall notify The Customer by issuing the updated version if there are significant changes to the Security Measures during the contract term.\n1.3.6 inform the Customer if any instructions received from the Customer are thought to infringe the relevant Data Protection Legislation\n1.3.7 maintain records to support compliance with the data protection obligations that are relevant to this agreement\n1.4 The Customer shall:\n1.4.1 instruct Frog (and authorises Frog to instruct each Sub-processor) to process Customer Personal Data to the extent required to deliver the services provided as part of the Agreement.\n1.4.2 ensure that Frog\u2019s use of the Customer Personal Data in accordance with this Agreement shall not put Frog in breach of any Data Protection Laws;\n1.4.3 not do or omit to do anything which places Frog in breach of any Data Protection Laws;\n1.4.4 at all times be responsible for the integrity, quality and legality of the Personal Data provided by the Customer to Frog (or on its behalf). Frog is under no duty to investigate the completeness, accuracy or sufficiency of the Personal Data provided to it by (or on behalf of) the Customer;\n1.4.5 be solely responsible for making appropriate use of the Services to ensure a level of security appropriate to the risk in respect of Personal Data it processes.\n1.5 Appendix 2 sets out certain information regarding the Contracted Processors' Processing of the Customer Personal Data as required by article 28(3) of the GDPR.\n1.6 In the event of any loss or damage to Customer Data, the Customer's sole and exclusive remedy shall be for Frog to use reasonable commercial endeavours to restore the lost or damaged Customer Data from the latest back-up of such Customer Data maintained by (i) Frog to the extent that such Customer Data is held by Frog through the provision of Hosting Services; and/or", "snippet_links": [{"key": "the-customer-will", "type": "clause", "offset": [37, 54]}, {"key": "user-shall", "type": "definition", "offset": [81, 91]}, {"key": "services-and", "type": "clause", "offset": [142, 154]}, {"key": "access-to-the-software", "type": "clause", "offset": [297, 319]}, {"key": "to-appropriate", "type": "clause", "offset": [341, 355]}, {"key": "end-users", "type": "definition", "offset": [356, 365]}, {"key": "data-processing", "type": "clause", "offset": [369, 384]}, {"key": "reference-to", "type": "definition", "offset": [397, 409]}, {"key": "applicable-data-protection-laws", "type": "definition", "offset": [414, 445]}, {"key": "it-is-agreed-that", "type": "clause", "offset": [447, 464]}, {"key": "the-controller", "type": "clause", "offset": [488, 502]}, {"key": "data-required", "type": "clause", "offset": [519, 532]}, {"key": "the-processor", "type": "clause", "offset": [576, 589]}, {"key": "where-the-customer", "type": "clause", "offset": [650, 668]}, {"key": "associated-products", "type": "definition", "offset": [684, 703]}, {"key": "process-personal-data", "type": "definition", "offset": [707, 728]}, {"key": "in-addition-to-the", "type": "clause", "offset": [729, 747]}, {"key": "appendix-2", "type": "definition", "offset": [774, 784]}, {"key": "the-customer-shall", "type": "clause", "offset": [786, 804]}, {"key": "both-parties", "type": "definition", "offset": [852, 864]}, {"key": "appropriate-technical-and-organisational-measures", "type": "definition", "offset": [890, 939]}, {"key": "in-place", "type": "clause", "offset": [944, 952]}, {"key": "unauthorised-disclosure", "type": "clause", "offset": [1038, 1061]}, {"key": "notify-the", "type": "clause", "offset": [1117, 1127]}, {"key": "other-party", "type": "clause", "offset": [1128, 1139]}, {"key": "reasonable-time", "type": "clause", "offset": [1143, 1158]}, {"key": "data-incident", "type": "definition", "offset": [1166, 1179]}, {"key": "relating-to", "type": "definition", "offset": [1180, 1191]}, {"key": "to-the-extent", "type": "clause", "offset": [1322, 1335]}, {"key": "the-data", "type": "clause", "offset": [1357, 1365]}, {"key": "steps-taken", "type": "clause", "offset": [1385, 1396]}, {"key": "to-mitigate", "type": "definition", "offset": [1397, 1408]}, {"key": "potential-risks", "type": "definition", "offset": [1413, 1428]}, {"key": "notifying-party", "type": "clause", "offset": [1443, 1458]}, {"key": "comply-with", "type": "clause", "offset": [1553, 1564]}, {"key": "processing-of-customer-personal-data", "type": "clause", "offset": [1608, 1644]}, {"key": "with-appendix", "type": "clause", "offset": [1697, 1710]}, {"key": "relevant-customer", "type": "definition", "offset": [1777, 1794]}, {"key": "written-instruction", "type": "clause", "offset": [1797, 1816]}, {"key": "applicable-laws", "type": "definition", "offset": [1850, 1865]}, {"key": "legal-requirement", "type": "clause", "offset": [1945, 1962]}, {"key": "processing-of-the-personal-data", "type": "clause", "offset": [1974, 2005]}, {"key": "cyber-essentials-certification", "type": "clause", "offset": [2022, 2052]}, {"key": "the-supplier", "type": "clause", "offset": [2089, 2101]}, {"key": "security-measures", "type": "definition", "offset": [2104, 2121]}, {"key": "the-security", "type": "clause", "offset": [2177, 2189]}, {"key": "applicable-to", "type": "definition", "offset": [2262, 2275]}, {"key": "scope-of-performance", "type": "clause", "offset": [2282, 2302]}, {"key": "updated-version", "type": "definition", "offset": [2350, 2365]}, {"key": "changes-to-the", "type": "definition", "offset": [2391, 2405]}, {"key": "contract-term", "type": "definition", "offset": [2435, 2448]}, {"key": "relevant-data-protection-legislation", "type": "definition", "offset": [2551, 2587]}, {"key": "maintain-records", "type": "clause", "offset": [2594, 2610]}, {"key": "data-protection-obligations", "type": "clause", "offset": [2642, 2669]}, {"key": "to-this-agreement", "type": "clause", "offset": [2688, 2705]}, {"key": "the-services-provided", "type": "clause", "offset": [2871, 2892]}, {"key": "part-of-the-agreement", "type": "clause", "offset": [2896, 2917]}, {"key": "of-the-customer", "type": "clause", "offset": [2948, 2963]}, {"key": "breach-of-any", "type": "clause", "offset": [3034, 3047]}, {"key": "at-all-times", "type": "definition", "offset": [3169, 3181]}, {"key": "responsible-for", "type": "clause", "offset": [3185, 3200]}, {"key": "personal-data-provided", "type": "clause", "offset": [3244, 3266]}, {"key": "by-the-customer", "type": "clause", "offset": [3267, 3282]}, {"key": "no-duty-to-investigate", "type": "clause", "offset": [3325, 3347]}, {"key": "on-behalf-of", "type": "definition", "offset": [3433, 3445]}, {"key": "use-of-the-services", "type": "clause", "offset": [3512, 3531]}, {"key": "in-respect-of", "type": "definition", "offset": [3586, 3599]}, {"key": "information-regarding", "type": "clause", "offset": [3660, 3681]}, {"key": "the-contracted", "type": "definition", "offset": [3682, 3696]}, {"key": "as-required-by", "type": "clause", "offset": [3750, 3764]}, {"key": "the-gdpr", "type": "definition", "offset": [3782, 3790]}, {"key": "in-the-event-of", "type": "clause", "offset": [3796, 3811]}, {"key": "loss-or-damage", "type": "clause", "offset": [3816, 3830]}, {"key": "customer-data", "type": "clause", "offset": [3834, 3847]}, {"key": "sole-and-exclusive-remedy", "type": "clause", "offset": [3864, 3889]}, {"key": "lost-or-damaged", "type": "clause", "offset": [3963, 3978]}, {"key": "provision-of-hosting-services", "type": "clause", "offset": [4128, 4157]}], "size": 4, "samples": [{"hash": "ba6lbNen8MQ", "uri": "/contracts/ba6lbNen8MQ#hosted-software", "label": "Software and Services Agreement", "score": 32.3413925171, "published": true}], "hash": "3b02ca86b339affda678839e7b80f245", "id": 2}, {"snippet": "The Software will be hosted by Frog, the Customer will:\n7.1 ensure that each End User shall keep a secure password for his use of the Hosting Services and On-Line Documentation and that each End User shall keep his/her password confidential; and\n7.2 only issue passwords which give administrative access to the Software and Hosting Services to appropriate End Users.", "snippet_links": [{"key": "the-customer-will", "type": "clause", "offset": [37, 54]}, {"key": "user-shall", "type": "definition", "offset": [81, 91]}, {"key": "services-and", "type": "clause", "offset": [142, 154]}, {"key": "access-to-the-software", "type": "clause", "offset": [297, 319]}, {"key": "to-appropriate", "type": "clause", "offset": [341, 355]}, {"key": "end-users", "type": "definition", "offset": [356, 365]}], "size": 3, "samples": [{"hash": "3pzSShwb2vf", "uri": "/contracts/3pzSShwb2vf#hosted-software", "label": "Terms and Conditions", "score": 35.2096748352, "published": true}, {"hash": "hM6WeWpxidy", "uri": "/contracts/hM6WeWpxidy#hosted-software", "label": "Terms and Conditions", "score": 35.0618591309, "published": true}], "hash": "86a9616b245171a246119337169c05a6", "id": 3}, {"snippet": "The element of the \u2587\u2587\u2587\u2587\u2587 Application that runs on remote servers.", "snippet_links": [{"key": "the-\u2587", "type": "clause", "offset": [15, 20]}], "size": 2, "samples": [{"hash": "eT1eYiBBbrt", "uri": "/contracts/eT1eYiBBbrt#hosted-software", "label": "Terms and Conditions", "score": 29.3394870758, "published": true}, {"hash": "3HWNyg2m9fC", "uri": "/contracts/3HWNyg2m9fC#hosted-software", "label": "Data Processing Agreement", "score": 26.011636734, "published": true}], "hash": "118350609a43120a7760f3e37be76f52", "id": 4}, {"snippet": "The Service Provider must ensure the Hosted Software is available for at least the following minimum availability percentage: [Insert description of Hosted Software] [Insert Availability] [Insert measurement period such as \u201cmonthly\u201d] The availability of the Hosted Software will be calculated as the number of available hours during the measurement period, divided by the total number of hours during the measurement period.", "snippet_links": [{"key": "the-service-provider-must", "type": "clause", "offset": [0, 25]}, {"key": "availability-percentage", "type": "definition", "offset": [101, 124]}, {"key": "description-of", "type": "definition", "offset": [134, 148]}, {"key": "availability-of", "type": "clause", "offset": [238, 253]}, {"key": "available-hours", "type": "definition", "offset": [310, 325]}, {"key": "during-the-measurement-period", "type": "clause", "offset": [326, 355]}, {"key": "divided-by", "type": "clause", "offset": [357, 367]}, {"key": "total-number-of-hours", "type": "clause", "offset": [372, 393]}], "size": 1, "samples": [{"hash": "4kCnAvbmWNj", "uri": "/contracts/4kCnAvbmWNj#hosted-software", "label": "Master Services Agreement", "score": 25.6954135895, "published": true}], "hash": "4377422365a535ead01b1eda1f5e50fe", "id": 5}, {"snippet": "A fully operational, stable and up to date Version of the Software that Contractor will make accessible to County via the Internet and that is installed on the Hosting Servers.", "snippet_links": [{"key": "fully-operational", "type": "definition", "offset": [2, 19]}, {"key": "up-to-date", "type": "definition", "offset": [32, 42]}, {"key": "the-software", "type": "clause", "offset": [54, 66]}, {"key": "contractor-will", "type": "clause", "offset": [72, 87]}, {"key": "the-internet", "type": "clause", "offset": [118, 130]}, {"key": "hosting-servers", "type": "definition", "offset": [160, 175]}], "size": 1, "samples": [{"hash": "8V5W2tIFZe8", "uri": "/contracts/8V5W2tIFZe8#hosted-software", "label": "Software License Agreement", "score": 29.1942920685, "published": true}], "hash": "74fc9d74d827132528f0320605c76410", "id": 7}, {"snippet": "the Software indicated as hosted on the Contract Information Sheet. Intellectual Property Rights: patents, utility models, rights to inventions, copyright and related rights, trade marks and service marks, trade names and domain names, rights in get-up, goodwill and the right to \u2587\u2587\u2587 for passing off or unfair competition, rights in designs, rights in computer software, database rights, rights to preserve the confidentiality of information (including know-how and trade secrets) and any other intellectual property rights, including all applications for (and rights to apply for and be granted), renewals or extensions of, and rights to claim priority from, such rights and all similar or equivalent rights or forms of protection which subsist or will subsist, now or in the future, in any part of the world. Licence: any licence or other agreement between us in respect of the licensing of all or any part of the Software. Non-Critical Fault: any reproducible fault in the Software other than a Critical Fault. Services: includes the Standard Support Service, the Updating Service and (if appropriate) the Hosting Service.", "snippet_links": [{"key": "the-software", "type": "clause", "offset": [0, 12]}, {"key": "contract-information-sheet", "type": "definition", "offset": [40, 66]}, {"key": "utility-models", "type": "clause", "offset": [107, 121]}, {"key": "rights-to-inventions", "type": "clause", "offset": [123, 143]}, {"key": "copyright-and-related-rights", "type": "clause", "offset": [145, 173]}, {"key": "trade-marks", "type": "clause", "offset": [175, 186]}, {"key": "service-marks", "type": "clause", "offset": [191, 204]}, {"key": "trade-names", "type": "clause", "offset": [206, 217]}, {"key": "domain-names", "type": "clause", "offset": [222, 234]}, {"key": "right-to", "type": "definition", "offset": [271, 279]}, {"key": "passing-off", "type": "clause", "offset": [288, 299]}, {"key": "unfair-competition", "type": "clause", "offset": [303, 321]}, {"key": "rights-in-computer-software", "type": "clause", "offset": [342, 369]}, {"key": "database-rights", "type": "definition", "offset": [371, 386]}, {"key": "confidentiality-of-information", "type": "clause", "offset": [411, 441]}, {"key": "how-and-trade-secrets", "type": "clause", "offset": [458, 479]}, {"key": "other-intellectual-property-rights", "type": "definition", "offset": [489, 523]}, {"key": "applications-for", "type": "clause", "offset": [539, 555]}, {"key": "and-rights", "type": "clause", "offset": [557, 567]}, {"key": "to-apply", "type": "clause", "offset": [568, 576]}, {"key": "renewals-or-extensions", "type": "clause", "offset": [598, 620]}, {"key": "such-rights", "type": "definition", "offset": [660, 671]}, {"key": "equivalent-rights", "type": "clause", "offset": [691, 708]}, {"key": "the-future", "type": "clause", "offset": [773, 783]}, {"key": "the-world", "type": "definition", "offset": [800, 809]}, {"key": "agreement-between", "type": "clause", "offset": [841, 858]}, {"key": "in-respect-of", "type": "definition", "offset": [862, 875]}, {"key": "critical-fault", "type": "definition", "offset": [930, 944]}, {"key": "standard-support-service", "type": "definition", "offset": [1037, 1061]}, {"key": "updating-service", "type": "clause", "offset": [1067, 1083]}, {"key": "hosting-service", "type": "clause", "offset": [1109, 1124]}], "size": 1, "samples": [{"hash": "8rDyaePKvuM", "uri": "/contracts/8rDyaePKvuM#hosted-software", "label": "Technical Support, Service & Hosting Agreement", "score": 24.4113616943, "published": true}], "hash": "6ef9c19ee42cb2cdbce762ffb9663cd7", "id": 8}, {"snippet": "Checkout (OTC) \u2013 Checkout (OTC) is the NICS proprietary web-based application that will act as the interface for the Subscriber to input certain data, including name, address, and credit card information, necessary to process a payment. TPE - TPE is the NICS proprietary payment engine that will act as the middleware between Checkout (OTC) and the credit card authorization network to obtain authorization and settlement of funds from the End-Users card issuing bank. Web-based Reporting/Administration Tools \u2013 NICS will assign Subscriber secure access to real-time online reporting tools for the purposes of issuing refunds, order research, daily and monthly reporting, and accounts reconciliation.", "snippet_links": [{"key": "the-interface", "type": "clause", "offset": [95, 108]}, {"key": "the-subscriber", "type": "definition", "offset": [113, 127]}, {"key": "certain-data", "type": "clause", "offset": [137, 149]}, {"key": "credit-card-information", "type": "definition", "offset": [180, 203]}, {"key": "process-a", "type": "definition", "offset": [218, 227]}, {"key": "credit-card-authorization", "type": "clause", "offset": [349, 374]}, {"key": "settlement-of-funds", "type": "clause", "offset": [411, 430]}, {"key": "issuing-bank", "type": "definition", "offset": [455, 467]}, {"key": "administration-tools", "type": "clause", "offset": [489, 509]}, {"key": "access-to", "type": "definition", "offset": [547, 556]}, {"key": "reporting-tools", "type": "definition", "offset": [574, 589]}, {"key": "for-the-purposes-of", "type": "clause", "offset": [590, 609]}, {"key": "monthly-reporting", "type": "clause", "offset": [653, 670]}], "size": 1, "samples": [{"hash": "4utfiXWtDNF", "uri": "/contracts/4utfiXWtDNF#hosted-software", "label": "Master Subscription Agreement", "score": 30.1592311859, "published": true}], "hash": "df3914ec4a1a1157f7ee3cb1d32fbae2", "id": 9}, {"snippet": "If the Form includes Hosted Software, Informatica grants to Customer, for the Evaluation Period, a non-exclusive non-transferable revocable right to authorize Users to access and process data with those Hosted Software solely and exclusively for the purpose of Customer\u2019s evaluation of the Software.", "snippet_links": [{"key": "to-customer", "type": "clause", "offset": [57, 68]}, {"key": "evaluation-period", "type": "clause", "offset": [78, 95]}, {"key": "a-non", "type": "clause", "offset": [97, 102]}, {"key": "right-to", "type": "definition", "offset": [140, 148]}, {"key": "solely-and-exclusively", "type": "definition", "offset": [219, 241]}, {"key": "of-customer", "type": "clause", "offset": [258, 269]}, {"key": "the-software", "type": "clause", "offset": [286, 298]}], "size": 1, "samples": [{"hash": "ePTKTLn3kd5", "uri": "/contracts/ePTKTLn3kd5#hosted-software", "label": "Evaluation Agreement", "score": 23.6324443817, "published": true}], "hash": "1aad3bfa0b45ce6c986c1fdf9d3bf352", "id": 10}], "next_curs": "ClgSUmoVc35sYXdpbnNpZGVyY29udHJhY3RzcjQLEhZDbGF1c2VTbmlwcGV0R3JvdXBfdjU2Ihhob3N0ZWQtc29mdHdhcmUjMDAwMDAwMGEMogECZW4YACAA", "clause": {"parents": [["general", "GENERAL"], ["the-software", "The Software"], ["remote-access", "Remote Access"], ["implementation-assumptions", "Implementation Assumptions"], ["detailed-description-of-services", "DETAILED DESCRIPTION OF SERVICES"]], "title": "Hosted Software", "children": [["security", "Security"], ["", ""], ["content", "Content"], ["delivery", "Delivery"], ["license", "License"]], "size": 36, "id": "hosted-software", "related": [["embedded-software", "Embedded Software", "Embedded Software"], ["server-software", "Server Software", "Server Software"], ["antivirus-software", "Antivirus software", "Antivirus software"], ["licensed-software", "Licensed Software", "Licensed Software"], ["software-updates", "Software Updates", "Software Updates"]], "related_snippets": [], "updated": "2025-07-24T06:48:57+00:00"}, "json": true, "cursor": ""}}