{"component": "clause", "props": {"groups": [{"size": 57, "snippet": "Before onboarding Subprocessors, Google conducts an audit of the security and privacy practices of Subprocessors to ensure Subprocessors provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once Google has assessed the risks presented by the Subprocessor then, subject always to the requirements set out in Section 11.3 (Requirements for Subprocessor Engagement), the Subprocessor is required to enter into appropriate security, confidentiality and privacy contract terms.", "samples": [{"hash": "6Ik1TLNulVG", "uri": "/contracts/6Ik1TLNulVG#subprocessor-security", "label": "Data Processing Agreement", "score": 32.7871055603, "published": true}, {"hash": "6Da4P8ptcwA", "uri": "/contracts/6Da4P8ptcwA#subprocessor-security", "label": "Data Processing Agreement", "score": 32.7871055603, "published": true}, {"hash": "iNsbsF65fI2", "uri": "/contracts/iNsbsF65fI2#subprocessor-security", "label": "Data Processing Agreement", "score": 31.2049064636, "published": true}], "snippet_links": [{"key": "security-and-privacy-practices", "type": "definition", "offset": [65, 95]}, {"key": "to-ensure", "type": "clause", "offset": [113, 122]}, {"key": "provide-a", "type": "definition", "offset": [137, 146]}, {"key": "access-to-data", "type": "clause", "offset": [198, 212]}, {"key": "the-scope-of-the-services", "type": "clause", "offset": [217, 242]}, {"key": "to-provide", "type": "clause", "offset": [260, 270]}, {"key": "the-risks", "type": "clause", "offset": [297, 306]}, {"key": "presented-by", "type": "definition", "offset": [307, 319]}, {"key": "subject-always-to", "type": "clause", "offset": [343, 360]}, {"key": "the-requirements", "type": "clause", "offset": [361, 377]}, {"key": "set-out", "type": "definition", "offset": [378, 385]}, {"key": "section-113", "type": "clause", "offset": [389, 401]}, {"key": "requirements-for-subprocessor-engagement", "type": "clause", "offset": [403, 443]}, {"key": "to-enter", "type": "definition", "offset": [475, 483]}, {"key": "contract-terms", "type": "definition", "offset": [539, 553]}], "hash": "160338380caa3458f11416388f6b96c2", "id": 1}, {"size": 2, "snippet": "Before onboarding Subprocessors, Google conducts an audit of the security and privacy practices of Subprocessors to ensure Subprocessors provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once Google has assessed the risks presented by the Subprocessor, then subject to the requirements described in Section 11.3 (Requirements for Subprocessor Engagement), the Subprocessor is required to enter into appropriate security, confidentiality and privacy contract terms. Appendix 3: Speci c Privacy Laws The terms in each subsection of this Appendix 3 apply only where the corresponding law applies to the processing of Customer Personal Data. European Data Protection Law", "samples": [{"hash": "lbndFn4ESfh", "uri": "/contracts/lbndFn4ESfh#subprocessor-security", "label": "Google Workspace for Education Terms of Service", "score": 34.8300933838, "published": true}, {"hash": "ctXsuUIQNiv", "uri": "/contracts/ctXsuUIQNiv#subprocessor-security", "label": "Google Cloud Platform Terms of Service for G Cloud 14", "score": 33.0336990356, "published": true}], "snippet_links": [{"key": "security-and-privacy-practices", "type": "definition", "offset": [65, 95]}, {"key": "to-ensure", "type": "clause", "offset": [113, 122]}, {"key": "provide-a", "type": "definition", "offset": [137, 146]}, {"key": "access-to-data", "type": "clause", "offset": [198, 212]}, {"key": "the-scope-of-the-services", "type": "clause", "offset": [217, 242]}, {"key": "to-provide", "type": "clause", "offset": [260, 270]}, {"key": "the-risks", "type": "clause", "offset": [297, 306]}, {"key": "presented-by", "type": "definition", "offset": [307, 319]}, {"key": "the-requirements", "type": "clause", "offset": [354, 370]}, {"key": "section-113", "type": "clause", "offset": [384, 396]}, {"key": "requirements-for-subprocessor-engagement", "type": "clause", "offset": [398, 438]}, {"key": "to-enter", "type": "definition", "offset": [470, 478]}, {"key": "contract-terms", "type": "definition", "offset": [534, 548]}, {"key": "appendix-3", "type": "definition", "offset": [550, 560]}, {"key": "privacy-laws", "type": "definition", "offset": [570, 582]}, {"key": "the-terms", "type": "definition", "offset": [583, 592]}, {"key": "corresponding-law", "type": "clause", "offset": [652, 669]}, {"key": "applies-to", "type": "clause", "offset": [670, 680]}, {"key": "processing-of-customer-personal-data", "type": "clause", "offset": [685, 721]}, {"key": "european-data-protection-law", "type": "definition", "offset": [723, 751]}], "hash": "83cb8cc494757d6b492b8995980a3f7b", "id": 8}, {"size": 13, "snippet": "Prior to onboarding Subprocessors, the Data Importer conducts an audit of the security and privacy practices of Subprocessors to ensure Subprocessors provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once the Data Importer has assessed the risks presented by the Subprocessor, the Subprocessor is required to enter into appropriate security, confidentiality and privacy contract terms.", "samples": [{"hash": "iPiuki8IZ6N", "uri": "/contracts/iPiuki8IZ6N#subprocessor-security", "label": "Data Processing Agreement", "score": 24.7056808472, "published": true}, {"hash": "dV2JovNeQEs", "uri": "/contracts/dV2JovNeQEs#subprocessor-security", "label": "Data Processing Agreement", "score": 23.8870639801, "published": true}, {"hash": "diFGWzZHvPT", "uri": "/contracts/diFGWzZHvPT#subprocessor-security", "label": "Data Processing Agreement", "score": 23.8665294647, "published": true}], "snippet_links": [{"key": "prior-to", "type": "clause", "offset": [0, 8]}, {"key": "data-importer", "type": "clause", "offset": [39, 52]}, {"key": "security-and-privacy-practices", "type": "definition", "offset": [78, 108]}, {"key": "to-ensure", "type": "clause", "offset": [126, 135]}, {"key": "provide-a", "type": "definition", "offset": [150, 159]}, {"key": "access-to-data", "type": "clause", "offset": [211, 225]}, {"key": "the-scope-of-the-services", "type": "clause", "offset": [230, 255]}, {"key": "to-provide", "type": "clause", "offset": [273, 283]}, {"key": "the-risks", "type": "clause", "offset": [321, 330]}, {"key": "presented-by", "type": "definition", "offset": [331, 343]}, {"key": "to-enter", "type": "definition", "offset": [391, 399]}, {"key": "contract-terms", "type": "definition", "offset": [455, 469]}], "hash": "3d65bdd1a51dfdbfc985930da246079f", "id": 2}, {"size": 4, "snippet": "Prior to onboarding subprocessors, Airship conducts a selection process to evaluate the subprocessors\u2019 security, privacy, data protection, and confidentiality practices and to assess that subprocessors provide a level of security, data protection, and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Where applicable, Airship enters into data protection agreements providing equivalent obligations as those required from Airship as set forth in the Airship Data Processing Addendum. Subprocessors are re-authorized upon contract renewal or on an annual basis.", "samples": [{"hash": "jtafxQBFb9R", "uri": "/contracts/jtafxQBFb9R#subprocessor-security", "label": "Data Processing Addendum", "score": 34.211971283, "published": true}, {"hash": "647IZHhyBaX", "uri": "/contracts/647IZHhyBaX#subprocessor-security", "label": "Data Processing Addendum", "score": 33.9285888672, "published": true}, {"hash": "kik5oHtpuMq", "uri": "/contracts/kik5oHtpuMq#subprocessor-security", "label": "Data Processing Addendum", "score": 33.7862434387, "published": true}], "snippet_links": [{"key": "prior-to", "type": "clause", "offset": [0, 8]}, {"key": "selection-process", "type": "definition", "offset": [54, 71]}, {"key": "confidentiality-practices", "type": "clause", "offset": [143, 168]}, {"key": "provide-a", "type": "definition", "offset": [202, 211]}, {"key": "access-to-data", "type": "clause", "offset": [281, 295]}, {"key": "the-scope-of-the-services", "type": "clause", "offset": [300, 325]}, {"key": "to-provide", "type": "clause", "offset": [343, 353]}, {"key": "where-applicable", "type": "clause", "offset": [355, 371]}, {"key": "data-protection-agreements", "type": "clause", "offset": [393, 419]}, {"key": "equivalent-obligations", "type": "definition", "offset": [430, 452]}, {"key": "data-processing-addendum", "type": "definition", "offset": [512, 536]}, {"key": "contract-renewal", "type": "clause", "offset": [575, 591]}, {"key": "annual-basis", "type": "definition", "offset": [601, 613]}], "hash": "ae4865b4b336376b7fd5a5242fb5b1bf", "id": 5}, {"size": 4, "snippet": "Before onboarding Subprocessors, Bitrix24 conducts an audit of the security and privacy practices of Sub-processors to ensure Sub-processors provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once Bitrix24 has assessed the risks presented by the Sub-processor then, subject always to the requirements set out in Section 7 the Sub-processor is required to enter into appropriate security, confidentiality and privacy contract terms.", "samples": [{"hash": "bUz4Vt1Waso", "uri": "/contracts/bUz4Vt1Waso#subprocessor-security", "label": "Data Processing Agreement", "score": 27.043806076, "published": true}, {"hash": "bFOAXydN3xY", "uri": "/contracts/bFOAXydN3xY#subprocessor-security", "label": "Data Processing Agreement", "score": 26.9958934784, "published": true}, {"hash": "hAp880gz85u", "uri": "/contracts/hAp880gz85u#subprocessor-security", "label": "Data Processing Agreement", "score": 26.4948673248, "published": true}], "snippet_links": [{"key": "security-and-privacy-practices", "type": "definition", "offset": [67, 97]}, {"key": "to-ensure", "type": "clause", "offset": [116, 125]}, {"key": "provide-a", "type": "definition", "offset": [141, 150]}, {"key": "access-to-data", "type": "clause", "offset": [202, 216]}, {"key": "the-scope-of-the-services", "type": "clause", "offset": [221, 246]}, {"key": "to-provide", "type": "clause", "offset": [264, 274]}, {"key": "the-risks", "type": "clause", "offset": [303, 312]}, {"key": "presented-by", "type": "definition", "offset": [313, 325]}, {"key": "the-sub", "type": "clause", "offset": [326, 333]}, {"key": "subject-always-to", "type": "clause", "offset": [350, 367]}, {"key": "the-requirements", "type": "clause", "offset": [368, 384]}, {"key": "set-out", "type": "definition", "offset": [385, 392]}, {"key": "section-7", "type": "definition", "offset": [396, 405]}, {"key": "to-enter", "type": "definition", "offset": [436, 444]}, {"key": "contract-terms", "type": "definition", "offset": [500, 514]}], "hash": "f76d162badc0798dbfbce0539176f480", "id": 4}, {"size": 10, "snippet": "Before using a Subprocessor, 4me conducts an audit of the security and privacy practices of the Subprocessor to ensure the Subprocessor provides a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once 4me has assessed the risks presented by the Subprocessor, then subject always to the requirements set out in Section 5 (Subprocessing) of this Data Processing Addendum, the Subprocessor is required to enter into appropriate security, confidentiality and privacy contract terms.", "samples": [{"hash": "36IpJ9tBDL5", "uri": "/contracts/36IpJ9tBDL5#subprocessor-security", "label": "Data Processing Addendum", "score": 27.5420951843, "published": true}, {"hash": "8HZ39aC01BU", "uri": "/contracts/8HZ39aC01BU#subprocessor-security", "label": "Data Processing Addendum", "score": 27.516084671, "published": true}, {"hash": "4Lzinr1gMHo", "uri": "/contracts/4Lzinr1gMHo#subprocessor-security", "label": "Data Processing Addendum", "score": 27.3956203461, "published": true}], "snippet_links": [{"key": "security-and-privacy-practices", "type": "definition", "offset": [58, 88]}, {"key": "to-ensure", "type": "clause", "offset": [109, 118]}, {"key": "access-to-data", "type": "clause", "offset": [198, 212]}, {"key": "the-scope-of-the-services", "type": "clause", "offset": [217, 242]}, {"key": "to-provide", "type": "clause", "offset": [260, 270]}, {"key": "the-risks", "type": "clause", "offset": [294, 303]}, {"key": "presented-by", "type": "definition", "offset": [304, 316]}, {"key": "subject-always-to", "type": "clause", "offset": [340, 357]}, {"key": "the-requirements", "type": "clause", "offset": [358, 374]}, {"key": "set-out", "type": "definition", "offset": [375, 382]}, {"key": "section-5", "type": "clause", "offset": [386, 395]}, {"key": "data-processing-addendum", "type": "definition", "offset": [420, 444]}, {"key": "to-enter", "type": "definition", "offset": [475, 483]}, {"key": "contract-terms", "type": "definition", "offset": [539, 553]}], "hash": "2c3585c1578f077bc657f463e2288f5d", "id": 3}, {"size": 3, "snippet": "Before onboarding Subprocessors, IT Farm conducts an audit of the security and privacy practices of Subprocessors to ensure Subprocessors provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once IT Farm has assessed the risks presented by the Subprocessor, then subject to the requirements set out in Section 11.3 (Requirements for Subprocessor Engagement) of these Terms, the Subprocessor is required to enter into appropriate security, confidentiality and privacy contract terms.", "samples": [{"hash": "hnONycaI8Ym", "uri": "/contracts/hnONycaI8Ym#subprocessor-security", "label": "Data Processing Agreement", "score": 32.9349212646, "published": true}, {"hash": "4K6iymlUEFb", "uri": "/contracts/4K6iymlUEFb#subprocessor-security", "label": "Data Processing Agreement", "score": 26.4414787292, "published": true}, {"hash": "c81jEeqFXSf", "uri": "/contracts/c81jEeqFXSf#subprocessor-security", "label": "Data Processing Agreement", "score": 25.7570152283, "published": true}], "snippet_links": [{"key": "security-and-privacy-practices", "type": "definition", "offset": [66, 96]}, {"key": "to-ensure", "type": "clause", "offset": [114, 123]}, {"key": "provide-a", "type": "definition", "offset": [138, 147]}, {"key": "access-to-data", "type": "clause", "offset": [199, 213]}, {"key": "the-scope-of-the-services", "type": "clause", "offset": [218, 243]}, {"key": "to-provide", "type": "clause", "offset": [261, 271]}, {"key": "the-risks", "type": "clause", "offset": [299, 308]}, {"key": "presented-by", "type": "definition", "offset": [309, 321]}, {"key": "the-requirements", "type": "clause", "offset": [356, 372]}, {"key": "set-out", "type": "definition", "offset": [373, 380]}, {"key": "section-113", "type": "clause", "offset": [384, 396]}, {"key": "requirements-for-subprocessor-engagement", "type": "clause", "offset": [398, 438]}, {"key": "these-terms", "type": "clause", "offset": [443, 454]}, {"key": "to-enter", "type": "definition", "offset": [485, 493]}, {"key": "contract-terms", "type": "definition", "offset": [549, 563]}], "hash": "48cc656afcc87b59cc5abd91e060b511", "id": 6}, {"size": 3, "snippet": "Before onboarding Subprocessors, Google conducts an audit of the security and privacy practices of Subprocessors to ensure Subprocessors provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once Google has assessed the risks presented by the Subprocessor, then subject to the requirements described in Section 11.3 (Requirements for Subprocessor Engagement) of this Addendum, the Subprocessor is required to enter into appropriate security, confidentiality and privacy contract terms. June 30, 2022 (/terms/data-processing-addendum/index-20220630) September 24, 2021 (/terms/data-processing-terms/index-20210924) August 19, 2020 (/terms/data-processing-terms/index-20200819) Digital Millennium Copyright Act The Digital Millennium Copyright Act It's Googlc's policQ to \u00edcspo\u2b72d to clca\u00ed \u2b72oticcs or allcgcd copQ\u00edigkt i\u2b72r\u00edi\u2b72gcmc\u2b72t. O\"\u00ed \u00edcspo\u2b72sc to tkcsc \u2b72oticcs maQ i\u2b72cl\"dc \u00edcmo:i\u2b72g o\u00ed disabli\u2b72g acccss to matc\u00edial claimcd to bc tkc s\"bjcct or i\u2b72r\u00edi\u2b72gi\u2b72g acti:itQ a\u2b72d/o\u00ed tc\u00edmi\u2b72ati\u2b72g s\"bsc\u00edibc\u00eds. Ir wc takc actio\u2b72 i\u2b72 \u00edcspo\u2b72sc to a \u2b72oticc, wc maQ t\u00edQ to \u2b72otirQ tkc allcgcd i\u2b72r\u00edi\u2b72gc\u00ed o\u00ed tkc opc\u00edato\u00ed or tkc arrcctcd sitc. Wc maQ also doc\"mc\u2b72t \u2b72oticcs or allcgcd i\u2b72r\u00edi\u2b72gcmc\u2b72t o\u2b72 wkick wc act. Wc maQ ro\u00edwa\u00edd tkc co\u2b72tc\u2b72t i\u2b72 Qo\"\u00ed \u2b72oticc to tkc \u2b72o\u2b72p\u00edorit o\u00edga\u2b72izatio\u2b72 \u1e3a\"mc\u2b72, wkick p\"bliskcs tkcsc \u2b72oticcs artc\u00ed \u00edcmo:i\u2b72g cc\u00edtai\u2b72 pc\u00edso\u2b72al i\u2b72ro\u00edmatio\u2b72. Yo\" ca\u2b72 scc a\u2b72 cxamplc or s\"ck a p\"blicatio\u2b72 kc\u00edc. Io\u00ed p\u00edod\"cts likc Googlc Wcb Sca\u00edck, \u2587\u2587 \u2587\u2587\u2587:idc a li\u2b72k to tkc \u2b72oticc as p\"bliskcd bQ \u1e3a\"mc\u2b72 i\u2b72 placc or tkc \u00edcmo:cd co\u2b72tc\u2b72t. \u013ekis pagc p\u00edo:idcs i\u2b72st\u00ed\"ctio\u2b72s ro\u00ed rili\u2b72g tkc rollowi\u2b72g tQpcs or complai\u2b72ts: I\u2b72r\u00edi\u2b72gcmc\u2b72t Notiricatio\u2b72 Co\"\u2b72tc\u00ed \u2b72otiricatio\u2b72 Infringement Notification \u013eo rilc a \u2b72oticc or i\u2b72r\u00edi\u2b72gcmc\u2b72t witk \"s, plcasc rilc a complai\u2b72t \"si\u2b72g tkc stcps a:ailablc at o\"\u00ed lcgal t\u00edo\"blcskootc\u00ed. BQ sclccti\u2b72g tkc app\u00edop\u00ediatc p\u00edod\"ct, tkc ro\u00edm will p\u00edompt Qo\" to p\u00edo:idc all tkc i\u2b72ro\u00edmatio\u2b72 listcd bclow tkat is \u00edcq\"i\u00edcd to s\"bmit a :alid KMCA complai\u2b72t. Plcasc \u2b72otc tkat Qo\" will bc liablc ro\u00ed damagcs (i\u2b72cl\"di\u2b72g costs a\u2b72d atto\u00ed\u2b72cQs' rccs) ir Qo\" matc\u00ediallQ mis\u00edcp\u00edcsc\u2b72t tkat a p\u00edod\"ct o\u00ed acti:itQ is i\u2b72r\u00edi\u2b72gi\u2b72g Qo\"\u00ed copQ\u00edigkts. I\u2b72dccd, i\u2b72 a past casc (plcasc scc kttp://www.o\u2b72li\u2b72cpolicQ.o\u00edg/actio\u2b72/lcgpolicQ/opg_:_dicbold/ ro\u00ed mo\u00edc i\u2b72ro\u00edmatio\u2b72), a compa\u2b72Q tkat sc\u2b72t a\u2b72 i\u2b72r\u00edi\u2b72gcmc\u2b72t \u2b72otiricatio\u2b72 sccki\u2b72g \u00edcmo:al or o\u2b72li\u2b72c matc\u00edials tkat wc\u00edc p\u00edotcctcd bQ tkc rai\u00ed \"sc doct\u00edi\u2b72c was o\u00eddc\u00edcd to paQ s\"ck costs a\u2b72d atto\u00ed\u2b72cQs rccs. \u013ekc compa\u2b72Q ag\u00edccd to paQ o:c\u00ed $100,000. Acco\u00eddi\u2b72glQ, ir Qo\" a\u00edc \u2b72ot s\"\u00edc wkctkc\u00ed matc\u00edial a:ailablc o\u2b72li\u2b72c i\u2b72r\u00edi\u2b72gcs Qo\"\u00ed copQ\u00edigkt, wc s\"ggcst tkat Qo\" ri\u00edst co\u2b72tact a\u2b72 atto\u00ed\u2b72cQ. Counter notification \u013ekc admi\u2b72ist\u00edato\u00ed or a\u2b72 arrcctcd sitc o\u00ed tkc p\u00edo:idc\u00ed or arrcctcd co\u2b72tc\u2b72t maQ makc a co\"\u2b72tc\u00ed \u2b72otiricatio\u2b72 p\"\u00eds\"a\u2b72t to scctio\u2b72s 512(g)(2) a\u2b72d (\u00ab) or tkc Kigital Millc\u2b72\u2b72i\"m CopQ\u00edigkt Act. Wkc\u2b72 wc \u00edccci:c a co\"\u2b72tc\u00ed \u2b72otiricatio\u2b72, wc maQ \u00edci\u2b72statc tkc matc\u00edial i\u2b72 q\"cstio\u2b72. Plcasc click o\u2b72 tkc \u00edclc:a\u2b72t li\u2b72k bclow ir Qo\" wo\"ld likc to rilc a co\"\u2b72tc\u00ed \u2b72oticc ro\u00ed o\u2b72c or tkc rollowi\u2b72g p\u00edod\"cts: Bloggc\u00ed Wcb Sca\u00edck Ir Qo\"\u00ed iss\"c \u00edclatcs to a p\u00edod\"ct \u2b72ot listcd abo:c, plcasc ri\u2b72d it o\u2b72 o\"\u00ed lcgal t\u00edo\"blcskootc\u00ed a\u2b72d ckoosc tkc \u201cCo\"\u2b72tc\u00ed Noticc\u201d optio\u2b72. Plcasc \u2b72otc tkat Qo\" will bc liablc ro\u00ed damagcs (i\u2b72cl\"di\u2b72g costs a\u2b72d atto\u00ed\u2b72cQs' rccs) ir Qo\" matc\u00ediallQ mis\u00edcp\u00edcsc\u2b72t tkat a p\u00edod\"ct o\u00ed acti:itQ is \u2b72ot i\u2b72r\u00edi\u2b72gi\u2b72g tkc copQ\u00edigkts or otkc\u00eds. Acco\u00eddi\u2b72glQ, ir Qo\" a\u00edc \u2b72ot s\"\u00edc wkctkc\u00ed cc\u00edtai\u2b72 matc\u00edial i\u2b72r\u00edi\u2b72gcs tkc copQ\u00edigkts or otkc\u00eds, wc s\"ggcst tkat Qo\" ri\u00edst co\u2b72tact a\u2b72 atto\u00ed\u2b72cQ. Wkc\u2b72 rilli\u2b72g o\"t o\"\u00ed co\"\u2b72tc\u00ed \u2b72oticc ro\u00edm, plcasc bc s\"\u00edc to idc\u2b72tirQ tkc spcciric UR\u1e3as o\u00ed otkc\u00ed \"\u2b72iq\"c idc\u2b72tirQi\u2b72g i\u2b72ro\u00edmatio\u2b72 or matc\u00edial tkat Googlc kas \u00edcmo:cd o\u00ed to wkick Googlc kas disablcd acccss. Account Termination Ma\u2b72Q Googlc Sc\u00ed:iccs do \u2b72ot ka:c acco\"\u2b72t koldc\u00eds o\u00ed s\"bsc\u00edibc\u00eds. Io\u00ed Sc\u00ed:iccs tkat do, Googlc will, i\u2b72 app\u00edop\u00ediatc ci\u00edc\"msta\u2b72ccs, tc\u00edmi\u2b72atc \u00edcpcat i\u2b72r\u00edi\u2b72gc\u00eds. Ir Qo\" bclic:c tkat a\u2b72 acco\"\u2b72t koldc\u00ed o\u00ed s\"bsc\u00edibc\u00ed is a \u00edcpcat i\u2b72r\u00edi\u2b72gc\u00ed, plcasc \u2587\u2587\u2587\u2587\u2587\u2587 tkc i\u2b72st\u00ed\"ctio\u2b72s abo:c to co\u2b72tact Googlc a\u2b72d p\u00edo:idc i\u2b72ro\u00edmatio\u2b72 s\"rricic\u2b72t ro\u00ed \"s to :c\u00edirQ tkat tkc acco\"\u2b72t koldc\u00ed o\u00ed s\"bsc\u00edibc\u00ed is a \u00edcpcat i\u2b72r\u00edi\u2b72gc\u00ed. Terms and Conditions Overview of our brand terms and conditions If granted permission to use Google Brand Features, you will do so in accordance with our terms. If you are using Google Brand Features, you must indicate that those features belong to us. Our grant of permission at one point does not prevent us from revoking that permission at a later point. You agree that Google owns its brand features and that you will not challenge or attempt to challenge them. Google Brand Features are provided \u201cas is.\u201d Our complete brand terms and conditions If Google approves your request to use any Google trademarks, logos, web pages, screenshots, or other distinctive features (\u201cGoogle Brand\u201d), you agree to be bound by the following terms and conditions (the \u201cAgreement\u201d). You agree to comply with the Guidelines for Third Party Use of Google Brand Features. So long as you do so, and provided that Google expressly approves your permission request, Google grants you a non-transferable, non-exclusive, royalty-free limited license to use the Google\u2019s Brand Features set forth in your corresponding Permission Request Form for the sole purpose and only for the materials set forth therein. Any use of the Google Brand Features must be accompanied by a notice that clearly indicates that the Google Brand Features are trademarks or distinctive brand features of Google LLC. Google reserves the right in its sole discretion to terminate or modify your permission to display the Google Brand Features and to take action against any use that does not conform to these terms and conditions, infringes any Google intellectual property or other right, or violates applicable law. Except as set forth above, nothing herein grants or should be deemed to grant to you any right, title or interest in or to the Google Brand Features. Your use of the Google Brand Features will inure to the benefit of Google. You agree not to challenge or assist others to challenge the Google Brand Features (except to the extent such restriction is prohibited by applicable law), and you agree not to register or attempt to register any domain names, trademarks, trade names, or other distinctive brand features that are confusingly similar to those of Google. The Google Brand Features are provided \u201cas is\u201d and Google disclaims any warranties either expressed or implied by law regarding the Google Brand Features, including warranties of noninfringement. Furthermore, because you are not being charged for use of the Google Brand Features, in no event shall Google be liable to you for the subject matter of this Agreement under any theory of liability including for any direct, indirect, incidental, special, consequential, punitive, exemplary or other damages arising out of this Agreement or the use of the Google Brand Features. This limitation shall apply even if Google was or should have been aware or advised of the possibility of such damages and notwithstanding any failure of essential purpose of any limited remedy stated herein. Some states do not allow exclusion of implied warranties or limitation of liability for incidental or consequential damages, so the above limitations or exclusions may not apply to you. You may not assign your rights or delegate your obligations under this Agreement without Google\u2019s prior written consent. This Agreement is not intended to benefit, nor shall it be deemed to give rise to, any rights in any third party. This Agreement will be governed by and construed in accordance with the laws of the State of California, without regard to conflict of law principles. The venue for any dispute or claim arising out of or in connection with this Agreement shall be in Santa Clara County, California. The parties are independent contractors. Neither party shall be deemed to be an employee, agent, partner or legal representative of the other for any purpose and neither shall have any right, power or authority to create any obligation or responsibility on behalf of the other. The waiver by Google of a breach of any provision hereof shall not be taken or held to be a waiver of the provision itself. If any provision of this Agreement is held by a court of competent jurisdiction to be contrary to law, such provision shall be changed and interpreted so as to best accomplish the objectives of the original provision to the fullest extent allowed by law and the remaining provisions of this Agreement shall remain in full force and effect. This Agreement, the Guidelines for Third Party Use of Google Brand Features, and the Permission Request Form, constitute the entire agreement between the parties with respect to the subject matter hereof. Still can't find what you're looking for? Submit your request via our formal request form. If you\u2019ve found a website that uses a Google trademark inappropriately, we\u2019d like to hear about it. Report inappropriate use of a Google trademark. K\"\u00edi\u2b72g tkc \u013ec\u00edm or tkc ag\u00edccmc\u2b72t \"\u2b72dc\u00ed wkick Googlc kas ag\u00edccd to p\u00edo:idc Googlc Clo\"d Platro\u00edm to C\"stomc\u00ed (as applicablc, tkc \"Ag\u00edccmc\u2b72t\"), tkc Co:c\u00edcd Sc\u00ed:icc will p\u00edo:idc a Mo\u2b72tklQ Uptimc Pc\u00edcc\u2b72tagc to C\"stomc\u00ed or at lcast 99.95% (tkc \"Sc\u00ed:icc \u1e3ac:cl Objccti:c\" o\u00ed \"S\u1e3aO\"). Ir Googlc docs \u2b72ot mcct tkc S\u1e3aO, a\u2b72d ir C\"stomc\u00ed mccts its obligatio\u2b72s \"\u2b72dc\u00ed tkis S\u1e3aA, C\"stomc\u00ed will bc cligiblc to \u00edccci:c tkc Ii\u2b72a\u2b72cial C\u00edcdits dcsc\u00edibcd bclow. \u013ekis S\u1e3aA statcs C\"stomc\u00ed's solc a\u2b72d cxcl\"si:c \u00edcmcdQ ro\u00ed a\u2b72Q rail\"\u00edc bQ Googlc to mcct tkc S\u1e3aO. Capitalizcd tc\u00edms \"scd i\u2b72 tkis S\u1e3aA, b\"t \u2b72ot dc\ufb01\u2b72cd i\u2b72 tkis S\u1e3aA, ka:c tkc mca\u2b72i\u2b72g sct ro\u00edtk i\u2b72 tkc Ag\u00edccmc\u2b72t. Ir tkc Ag\u00edccmc\u2b72t a\"tko\u00edizcs tkc \u00edcsalc o\u00ed s\"pplQ or Googlc Clo\"d Platro\u00edm \"\u2b72dc\u00ed a Googlc Clo\"\u2587 \u2587\u2587\u2587\u2587\u2b72c\u00ed o\u00ed \u00edcscllc\u00ed p\u00edog\u00edam, tkc\u2b72 all \u00edcrc\u00edc\u2b72ccs to C\"stomc\u00ed i\u2b72 tkis S\u1e3aA mca\u2b72 \u2587\u2587\u2587\u2587\u2b72c\u00ed o\u00ed Rcscllc\u00ed (as applicablc), a\u2b72d a\u2b72Q Ii\u2b72a\u2b72cial C\u00edcdit(s) will o\u2b72lQ applQ ro\u00ed impactcd \u2587\u2587\u2587\u2587\u2b72c\u00ed o\u00ed Rcscllc\u00ed o\u00eddc\u00ed(s) \"\u2b72dc\u00ed tkc Ag\u00edccmc\u2b72t. Definitions. \u013ekc rollowi\u2b72g dcri\u2b72itio\u2b72s applQ to tkc App E\u2b72gi\u2b72c S\u1e3aA: \"Co:c\u00edcd Sc\u00ed:icc\" mca\u2b72s tkc compo\u2b72c\u2b72ts or tkc Sc\u00ed:icc listcd at tkc rollowi\u2b72g UR\u1e3a: kttps://clo\"\u2587.\u2587\u2587\u2587\u2587\u2587\u2587.\u2587\u2587\u2587/\u2587\u2587\u2587\u2587\u2b72gi\u2b72c/sla_c\u00ed\u00edo\u00ed_\u00edatc, o\u00ed s\"ck otkc\u00ed UR\u1e3a as maQ bc p\u00edo:idcd bQ Googlc. \"Dow\u2b72timc\" mca\u2b72s mo\u00edc tka\u2b72 a tc\u2b72 pc\u00edcc\u2b72t E\u00ed\u00edo\u00ed Ratc. \"Dow\u2b72timc Pc\u00ediod\" mca\u2b72s, ro\u00ed a C\"stomc\u00ed Applicatio\u2b72, a pc\u00ediod or ri:c co\u2b72scc\"ti:c mi\u2b72\"tcs or Kow\u2b72timc. I\u2b72tc\u00edmittc\u2b72t Kow\u2b72timc ro\u00ed a pc\u00ediod or lcss tka\u2b72 ri:c mi\u2b72\"tcs will \u2b72ot bc co\"\u2b72tcd towa\u00edds a\u2b72Q Kow\u2b72timc Pc\u00ediods. \"E\u00ed\u00edo\u00ed \u00edatc\" ro\u00ed tkc Sc\u00ed:icc is dcri\u2b72cd witk tkc Co:c\u00edcd Sc\u00ed:iccs. \"\u00cfi\u2b72a\u2b72cial C\u00edcdit\" mca\u2b72s tkc rollowi\u2b72g: Monthly Uptime Percentage Percentage of monthly bill for Covered Service which does not meet SLO that will be credited to future monthly bills of Customer 99.00% \u2013 < 99.95% 10% 95.00% \u2013 < 99.00% 25% < 95.00% 50% \"Mo\u2b72tklQ Uptimc Pc\u00edcc\u2b72tagc\" mca\u2b72s total \u2b72\"mbc\u00ed or mi\u2b72\"tcs i\u2b72 a mo\u2b72tk, mi\u2b72\"s tkc \u2b72\"mbc\u00ed or mi\u2b72\"tcs or Kow\u2b72timc s\"rrc\u00edcd r\u00edom all Kow\u2b72timc Pc\u00ediods i\u2b72 a mo\u2b72tk, di:idcd bQ tkc total \u2b72\"mbc\u00ed or mi\u2b72\"tcs i\u2b72 a mo\u2b72tk. Customc\u00ed Must Rcqucst \u00cfi\u2b72a\u2b72cial C\u00edcdit. I\u2b72 o\u00eddc\u00ed to \u00edccci:c a\u2b72Q or tkc Ii\u2b72a\u2b72cial C\u00edcdits dcsc\u00edibcd abo:c, C\"stomc\u00ed m\"st \u2b72otirQ Googlc tcck\u2b72ical s\"ppo\u00edt witki\u2b72 tki\u00edtQ daQs r\u00edom tkc timc C\"stomc\u00ed bccomcs cligiblc to \u00edccci:c a Ii\u2b72a\u2b72cial C\u00edcdit. Iail\"\u00edc to complQ witk tkis \u00edcq\"i\u00edcmc\u2b72t will ro\u00edrcit C\"stomc\u00ed\u2019s \u00edigkt to \u00edccci:c a Ii\u2b72a\u2b72cial C\u00edcdit. Ii\u2b72a\u2b72cial C\u00edcdits will bc madc i\u2b72 tkc ro\u00edm or a mo\u2b72cta\u00edQ c\u00edcdit applicd to r\"t\"\u00edc \"sc or tkc Sc\u00ed:icc a\u2b72d will bc applicd witki\u2b72 60 daQs artc\u00ed tkc Ii\u2b72a\u2b72cial C\u00edcdit was \u00edcq\"cstcd. PREVIOUS VERSIONS (Last modified Janua\u00edy 30, 2020) Du\u00eding the \u013ee\u00edm of the ag\u00edeement unde\u00ed which Google has ag\u00edeed to p\u00edovide Google Cloud Platfo\u00edm to Custome\u00ed(as applicable, the \"Ag\u00edeement\"), the Cove\u00eded Se\u00edvice will p\u00edovide a Monthly Uptime Pe\u00edcentage to Custome\u00ed(the \"Se\u00edvice Level Objective\" o\u00ed \"SLO\") as follows: Monthly Uptime Percentage >=99.9% Covered Service Data Catalog API usage Ir Googlc docs \u2b72ot mcct tkc S\u1e3aO, a\u2b72d ir C\"stomc\u00ed mccts its obligatio\u2b72s \"\u2b72dc\u00ed tkis S\u1e3aA, C\"stomc\u00ed will bc cligiblc to \u00edccci:c tkc Ii\u2b72a\u2b72cial C\u00edcdits dcsc\u00edibcd bclow. Mo\u2b72tklQ Uptimc Pc\u00edcc\u2b72tagc a\u2b72d Ii\u2b72a\u2b72cial C\u00edcdit a\u00edc dctc\u00edmi\u2b72cd o\u2b72 a calc\u2b72da\u00ed mo\u2b72tk basis pc\u00ed P\u00edojcct pc\u00ed Rcgio\u2b72. \u013ekis S\u1e3aA statcs C\"stomc\u00ed's solc a\u2b72d cxcl\"si:c \u00edcmcdQ ro\u00ed a\u2b72Q rail\"\u00edc bQ Googlc to mcct tkc S\u1e3aO. Capitalizcd tc\u00edms \"scd i\u2b72 tkis S\u1e3aA, b\"t \u2b72ot dcri\u2b72cd i\u2b72 tkis S\u1e3aA, ka:c tkc mca\u2b72i\u2b72g sct ro\u00edtk i\u2b72 tkc Ag\u00edccmc\u2b72t. Ir tkc Ag\u00edccmc\u2b72t a\"tko\u00edizcs tkc \u00edcsalc o\u00ed s\"pplQ or Googlc Clo\"d Platro\u00edm \"\u2b72dc\u00ed a Googlc Clo\"\u2587 \u2587\u2587\u2587\u2587\u2b72c\u00ed o\u00ed \u00edcscllc\u00ed p\u00edog\u00edam, tkc\u2b72 all \u00edcrc\u00edc\u2b72ccs to C\"stomc\u00ed i\u2b72 tkis S\u1e3aA mca\u2b72 \u2587\u2587\u2587\u2587\u2b72c\u00ed o\u00ed Rcscllc\u00ed (as applicablc), a\u2b72d a\u2b72Q Ii\u2b72a\u2b72cial C\u00edcdit(s) will o\u2b72lQ applQ ro\u00ed impactcd \u2587\u2587\u2587\u2587\u2b72c\u00ed o\u00ed Rcscllc\u00ed o\u00eddc\u00ed(s) \"\u2b72dc\u00ed tkc Ag\u00edccmc\u2b72t. Definitions \u013ekc rollowi\u2b72g dcri\u2b72itio\u2b72s applQ to tkc S\u1e3aA: \"Back-off Rcqui\u00edcmc\u2b72ts\" mca\u2b72s, wkc\u2b72 a\u2b72 c\u00ed\u00edo\u00ed occ\"\u00eds, s\"bscq\"c\u2b72t \u00edcpcatcd calls m\"st bc dclaQcd ro\u00ed a pc\u00ediod or timc acco\u00eddi\u2b72g to tkc rollowi\u2b72g cscalatio\u2b72: artc\u00ed tkc ri\u00edst c\u00ed\u00edo\u00ed, tkc\u00edc is a mi\u2b72im\"m back-\u2587\u2587\u2587 i\u2b72tc\u00ed:al or 1 scco\u2b72d a\u2b72d ro\u00ed cack co\u2b72scc\"ti:c c\u00ed\u00edo\u00ed, tkc back-\u2587\u2587\u2587 i\u2b72tc\u00ed:al i\u2b72c\u00edcascs cxpo\u2b72c\u2b72tiallQ \"p to \u00ab2 scco\u2b72ds. \"Co:c\u00edcd Sc\u00ed:icc\" mca\u2b72s Kata Catalog API \"sagc. \"Dow\u2b72timc\" mca\u2b72s mo\u00edc tka\u2b72 a 5% pc\u00edcc\u2b72t E\u00ed\u00edo\u00ed Ratc a\u2b72d is mcas\"\u00edcd bascd o\u2b72 sc\u00ed:c\u00ed sidc E\u00ed\u00edo\u00ed Ratc. \"Dow\u2b72timc Pc\u00ediod\" mca\u2b72s a pc\u00ediod or ri:c o\u00ed mo\u00edc co\u2b72scc\"ti:c mi\u2b72\"tcs or Kow\u2b72timc. Pa\u00edtial mi\u2b72\"tcs o\u00ed i\u2b72tc\u00edmittc\u2b72t Kow\u2b72timc ro\u00ed a pc\u00ediod or lcss tka\u2b72 ri:c mi\u2b72\"tcs will \u2b72ot co\"\u2b72t towa\u00edds a\u2b72Q Kow\u2b72timc Pc\u00ediods. \"E\u00ed\u00edo\u00ed Ratc\" mca\u2b72s tkc \u2b72\"mbc\u00ed or Valid Rcq\"csts tkat \u00edcs\"lt i\u2b72 a \u00edcspo\u2b72sc witk H\u013e\u013eP Stat\"s 500 a\u2b72d Codc \"I\u2b72tc\u00ed\u2b72al E\u00ed\u00edo\u00ed\" di:idcd bQ tkc total \u2b72\"mbc\u00ed or Valid Rcq\"csts d\"\u00edi\u2b72g tkat pc\u00ediod, s\"bjcct to a mi\u2b72im\"m or 2000 Valid Rcq\"csts i\u2b72 tkc mcas\"\u00edcmc\u2b72t pc\u00ediod. Rcpcatcd idc\u2b72tical \u00edcq\"csts do \u2b72ot co\"\u2b72t towa\u00edds tkc E\u00ed\u00edo\u00ed Ratc \"\u2b72lcss tkcQ co\u2b72ro\u00edm to tkc Back-\u2587\u2587\u2587 Rcq\"i\u00edcmc\u2b72ts. \"\u00cfi\u2b72a\u2b72cial C\u00edcdit\" mca\u2b72s tkc rollowi\u2b72g: Monthly uptime Percentage of monthly bill for the respective Covered Service in the Region affected percentage that does not meet SLO that will be credited to Cust\u2587\u2587\u2587\u2587'\u2587 \u2587uture monthly bills 99.0% - < 99.9% 10% 95.0% - < 99.0% 25% < 95.0% 50% \"Mo\u2b72tklQ Uptimc Pc\u00edcc\u2b72tagc\" mca\u2b72s total \u2b72\"mbc\u00ed or mi\u2b72\"tcs i\u2b72 a mo\u2b72tk, mi\u2b72\"s tkc \u2b72\"mbc\u00ed or mi\u2b72\"tcs or Kow\u2b72timc s\"rrc\u00edcd r\u00edom all Kow\u2b72timc Pc\u00ediods i\u2b72 a mo\u2b72tk, di:idcd bQ tkc total \u2b72\"mbc\u00ed or mi\u2b72\"tcs i\u2b72 a mo\u2b72tk. \"Rcgio\u2b72\" mca\u2b72s tkc applicablc \u00edcgio\u2b72 idc\u2b72tiricd at kttps://clo\"\u2587.\u2587\u2587\u2587\u2587\u2587\u2587.\u2587\u2587\u2587/\u2587\u2587\u2587\"t/locatio\u2b72s. \"Valid Rcqucsts\" a\u00edc \u00edcq\"csts tkat co\u2b72ro\u00edm to tkc Koc\"mc\u2b72tatio\u2b72, a\u2b72d tkat wo\"ld \u2b72o\u00edmallQ \u00edcs\"lt i\u2b72 a \u2b72o\u2b72-c\u00ed\u00edo\u00ed \u00edcspo\u2b72sc. Customer Must Request Financial Credit I\u2b72 o\u00eddc\u00ed to \u00edccci:c a\u2b72Q or tkc Ii\u2b72a\u2b72cial C\u00edcdits dcsc\u00edibcd abo:c, C\"stomc\u00ed m\"st \u2b72otirQ Googlc tcck\u2b72ical s\"ppo\u00edt witki\u2b72 \u00ab0 daQs r\u00edom tkc timc C\"stomc\u00ed bccomcs cligiblc to \u00edccci:c a Ii\u2b72a\u2b72cial C\u00edcdit. C\"stomc\u00ed m\"st also p\u00edo:idc Googlc witk log rilcs skowi\u2b72g Kow\u2b72timc a\u2b72d tkc datc a\u2b72d timc it occ\"\u00ed\u00edcd. Ir C\"stomc\u00ed docs \u2b72ot complQ witk tkcsc \u00edcq\"i\u00edcmc\u2b72ts, C\"stomc\u00ed will ro\u00edrcit its \u00edigkt to \u00edccci:c a Ii\u2b72a\u2b72cial C\u00edcdit. Maximum Financial Credit \u013ekc maxim\"m agg\u00edcgatc \u2b72\"mbc\u00ed or Ii\u2b72a\u2b72cial C\u00edcdits iss\"cd bQ Googlc to C\"stomc\u00ed ro\u00ed all Kow\u2b72timc Pc\u00ediods i\u2b72 a si\u2b72glc billi\u2b72g mo\u2b72tk will \u2b72ot cxcccd 50% or tkc amo\"\u2b72t d\"c r\u00edom C\"stomc\u00ed ro\u00ed tkc Co:c\u00edcd Sc\u00ed:icc ro\u00ed tkc applicablc mo\u2b72tk. Ii\u2b72a\u2b72cial C\u00edcdits will bc i\u2b72 tkc ro\u00edm or a mo\u2b72cta\u00edQ c\u00edcdit applicd to r\"t\"\u00edc \"sc or tkc Co:c\u00edcd Sc\u00ed:icc a\u2b72d will bc applicd witki\u2b72 60 daQs artc\u00ed tkc Ii\u2b72a\u2b72cial C\u00edcdit was \u00edcq\"cstcd. SLA Exclusions \u013ekc S\u1e3aA docs \u2b72ot applQ to a\u2b72Q (a) rcat\"\u00edcs o\u00ed sc\u00ed:iccs dcsig\u2b72atcd p\u00edc-gc\u2b72c\u00edal a:ailabilitQ (\"\u2b72lcss otkc\u00edwisc sct ro\u00edtk i\u2b72 tkc associatcd Koc\"mc\u2b72tatio\u2b72);", "samples": [{"hash": "kKVLtw63WuM", "uri": "/contracts/kKVLtw63WuM#subprocessor-security", "label": "Google Cloud Master Agreement", "score": 35.3465510632, "published": true}, {"hash": "kAGcw50p3Mg", "uri": "/contracts/kAGcw50p3Mg#subprocessor-security", "label": "Google Cloud Master Agreement", "score": 34.1366339539, "published": true}], "snippet_links": [{"key": "security-and-privacy-practices", "type": "definition", "offset": [65, 95]}, {"key": "to-ensure", "type": "clause", "offset": [113, 122]}, {"key": "provide-a", "type": "definition", "offset": [137, 146]}, {"key": "access-to-data", "type": "clause", "offset": [198, 212]}, {"key": "the-scope-of-the-services", "type": "clause", "offset": [217, 242]}, {"key": "to-provide", "type": "clause", "offset": [260, 270]}, {"key": "the-risks", "type": "clause", "offset": [297, 306]}, {"key": "presented-by", "type": "definition", "offset": [307, 319]}, {"key": "the-requirements", "type": "clause", "offset": [354, 370]}, {"key": "section-113", "type": "clause", "offset": [384, 396]}, {"key": "requirements-for-subprocessor-engagement", "type": "clause", "offset": [398, 438]}, {"key": "this-addendum", "type": "definition", "offset": [443, 456]}, {"key": "to-enter", "type": "definition", "offset": [487, 495]}, {"key": "contract-terms", "type": "definition", "offset": [551, 565]}, {"key": "digital-millennium-copyright-act", "type": "clause", "offset": [757, 789]}, {"key": "wc-act", "type": "definition", "offset": [1261, 1267]}, {"key": "infringement-notification", "type": "clause", "offset": [1723, 1748]}, {"key": "counter-notification", "type": "clause", "offset": [2682, 2702]}, {"key": "account-termination", "type": "clause", "offset": [3777, 3796]}, {"key": "permission-to-use", "type": "clause", "offset": [4274, 4291]}, {"key": "google-brand-features", "type": "definition", "offset": [4292, 4313]}, {"key": "in-accordance-with", "type": "clause", "offset": [4330, 4348]}, {"key": "our-terms", "type": "clause", "offset": [4349, 4358]}, {"key": "grant-of-permission", "type": "clause", "offset": [4456, 4475]}, {"key": "google-trademarks", "type": "definition", "offset": [4792, 4809]}, {"key": "web-pages", "type": "clause", "offset": [4818, 4827]}, {"key": "you-agree-to", "type": "clause", "offset": [4890, 4902]}, {"key": "the-following-terms-and-conditions", "type": "clause", "offset": [4915, 4949]}, {"key": "guidelines-for", "type": "clause", "offset": [4998, 5012]}, {"key": "third-party-use", "type": "definition", "offset": [5013, 5028]}, {"key": "and-provided-that", "type": "clause", "offset": [5077, 5094]}, {"key": "a-non", "type": "clause", "offset": [5164, 5169]}, {"key": "limited-license-to-use", "type": "clause", "offset": [5212, 5234]}, {"key": "features-set", "type": "definition", "offset": [5254, 5266]}, {"key": "request-form", "type": "definition", "offset": [5306, 5318]}, {"key": "purpose-and", "type": "clause", "offset": [5332, 5343]}, {"key": "the-materials", "type": "clause", "offset": [5353, 5366]}, {"key": "a-notice", "type": "clause", "offset": [5446, 5454]}, {"key": "the-right", "type": "clause", "offset": [5585, 5594]}, {"key": "discretion-to-terminate", "type": "clause", "offset": [5607, 5630]}, {"key": "action-against", "type": "clause", "offset": [5706, 5720]}, {"key": "does-not-conform", "type": "definition", "offset": [5734, 5750]}, {"key": "these-terms-and-conditions", "type": "clause", "offset": [5754, 5780]}, {"key": "intellectual-property", "type": "definition", "offset": [5803, 5824]}, {"key": "applicable-law", "type": "clause", "offset": [5853, 5867]}, {"key": "inure-to-the-benefit", "type": "clause", "offset": [6062, 6082]}, {"key": "assist-others", "type": "definition", "offset": [6124, 6137]}, {"key": "except-to-the-extent", "type": "clause", "offset": [6178, 6198]}, {"key": "to-register", "type": "clause", "offset": [6268, 6279]}, {"key": "domain-names", "type": "clause", "offset": [6307, 6319]}, {"key": "trade-names", "type": "clause", "offset": [6333, 6344]}, {"key": "similar-to", "type": "definition", "offset": [6403, 6413]}, {"key": "in-no-event-shall", "type": "clause", "offset": [6712, 6729]}, {"key": "subject-matter-of-this-agreement", "type": "clause", "offset": [6762, 6794]}, {"key": "theory-of-liability", "type": "definition", "offset": [6805, 6824]}, {"key": "other-damages", "type": "clause", "offset": [6920, 6933]}, {"key": "arising-out-of", "type": "definition", "offset": [6934, 6948]}, {"key": "agreement-or", "type": "definition", "offset": [6954, 6966]}, {"key": "possibility-of-such-damages", "type": "clause", "offset": [7096, 7123]}, {"key": "purpose-of", "type": "clause", "offset": [7169, 7179]}, {"key": "limited-remedy", "type": "clause", "offset": [7184, 7198]}, {"key": "exclusion-of-implied-warranties", "type": "clause", "offset": [7239, 7270]}, {"key": "liability-for", "type": "clause", "offset": [7288, 7301]}, {"key": "incidental-or-consequential-damages", "type": "clause", "offset": [7302, 7337]}, {"key": "your-rights", "type": "clause", "offset": [7419, 7430]}, {"key": "obligations-under-this-agreement", "type": "clause", "offset": [7448, 7480]}, {"key": "prior-written-consent", "type": "clause", "offset": [7498, 7519]}, {"key": "this-agreement-will-be-governed-by", "type": "clause", "offset": [7635, 7669]}, {"key": "laws-of-the-state-of-california", "type": "clause", "offset": [7707, 7738]}, {"key": "conflict-of-law", "type": "clause", "offset": [7758, 7773]}, {"key": "the-venue", "type": "definition", "offset": [7786, 7795]}, {"key": "dispute-or-claim", "type": "clause", "offset": [7804, 7820]}, {"key": "in-connection-with", "type": "clause", "offset": [7839, 7857]}, {"key": "parties-are-independent-contractors", "type": "clause", "offset": [7921, 7956]}, {"key": "neither-party-shall", "type": "clause", "offset": [7958, 7977]}, {"key": "an-employee", "type": "definition", "offset": [7994, 8005]}, {"key": "legal-representative", "type": "clause", "offset": [8025, 8045]}, {"key": "authority-to", "type": "definition", "offset": [8118, 8130]}, {"key": "on-behalf-of", "type": "definition", "offset": [8171, 8183]}, {"key": "the-waiver", "type": "clause", "offset": [8195, 8205]}, {"key": "by-google", "type": "clause", "offset": [8206, 8215]}, {"key": "breach-of-any", "type": "clause", "offset": [8221, 8234]}, {"key": "waiver-of-the", "type": "clause", "offset": [8287, 8300]}, {"key": "provision-of", "type": "clause", "offset": [8326, 8338]}, {"key": "court-of-competent-jurisdiction", "type": "clause", "offset": [8367, 8398]}, {"key": "contrary-to-law", "type": "clause", "offset": [8405, 8420]}, {"key": "the-original", "type": "definition", "offset": [8513, 8525]}, {"key": "to-the-fullest-extent-allowed-by-law", "type": "clause", "offset": [8536, 8572]}, {"key": "provisions-of-this-agreement", "type": "clause", "offset": [8591, 8619]}, {"key": "full-force-and-effect", "type": "clause", "offset": [8636, 8657]}, {"key": "entire-agreement-between-the-parties", "type": "clause", "offset": [8784, 8820]}, {"key": "with-respect-to", "type": "clause", "offset": [8821, 8836]}, {"key": "formal-request", "type": "clause", "offset": [8934, 8948]}, {"key": "inappropriate-use", "type": "definition", "offset": [9062, 9079]}, {"key": "monthly-uptime-percentage", "type": "definition", "offset": [10688, 10713]}, {"key": "covered-service", "type": "clause", "offset": [10745, 10760]}, {"key": "does-not-meet", "type": "clause", "offset": [10767, 10780]}, {"key": "monthly-bills", "type": "clause", "offset": [10817, 10830]}, {"key": "of-customer", "type": "clause", "offset": [10831, 10842]}, {"key": "previous-versions", "type": "clause", "offset": [11629, 11646]}, {"key": "last-modified", "type": "clause", "offset": [11648, 11661]}, {"key": "google-cloud", "type": "definition", "offset": [11754, 11766]}, {"key": "service-data", "type": "definition", "offset": [11988, 12000]}, {"key": "in-the-region", "type": "definition", "offset": [14040, 14053]}, {"key": "customer-must", "type": "clause", "offset": [14628, 14641]}, {"key": "financial-credit", "type": "definition", "offset": [14650, 14666]}, {"key": "sla-exclusions", "type": "clause", "offset": [15520, 15534]}], "hash": "b1c969b818fa39ffd68d81422fa09693", "id": 7}, {"size": 2, "snippet": "Prior to onboarding Subprocessors, GlobalSign conducts security self-check questionnaires of Subprocessors to ensure Subprocessors provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged. Once GlobalSign has assessed the risks presented by the Subprocessor, the Subprocessor is required to enter into appropriate security, confidentiality and privacy contract terms, as described in the addendum of GlobalSign to ensure compliance with the obligations of article 28 of the General Data Privacy Regulation.", "samples": [{"hash": "7C853i0Mph0", "uri": "/contracts/7C853i0Mph0#subprocessor-security", "label": "Data Processing Addendum", "score": 27.2943191528, "published": true}, {"hash": "4sQUkG1GPOT", "uri": "/contracts/4sQUkG1GPOT#subprocessor-security", "label": "Data Processing Addendum", "score": 27.2943191528, "published": true}], "snippet_links": [{"key": "prior-to", "type": "clause", "offset": [0, 8]}, {"key": "to-ensure", "type": "clause", "offset": [107, 116]}, {"key": "provide-a", "type": "definition", "offset": [131, 140]}, {"key": "security-and-privacy", "type": "clause", "offset": [150, 170]}, {"key": "access-to-data", "type": "clause", "offset": [192, 206]}, {"key": "the-scope-of-the-services", "type": "clause", "offset": [211, 236]}, {"key": "the-risks", "type": "clause", "offset": [284, 293]}, {"key": "presented-by", "type": "definition", "offset": [294, 306]}, {"key": "to-enter", "type": "definition", "offset": [354, 362]}, {"key": "contract-terms", "type": "definition", "offset": [418, 432]}, {"key": "obligations-of", "type": "clause", "offset": [507, 521]}, {"key": "article-28", "type": "definition", "offset": [522, 532]}, {"key": "data-privacy-regulation", "type": "clause", "offset": [548, 571]}], "hash": "9a46190b81cd90fc6abd6b0bfbbda2df", "id": 9}, {"size": 2, "snippet": "LogicMonitor shall conduct security assessments of its subprocessors that process Customer Data to ensure effectiveness of their security operational practices. LogicMonitor\u2019s current subprocessors are listed at \u2587\u2587\u2587\u2587://\u2587\u2587\u2587.\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587.\u2587\u2587\u2587/terms/data_handling_supplement.", "samples": [{"hash": "hNCzO3lZfhF", "uri": "/contracts/hNCzO3lZfhF#subprocessor-security", "label": "End User License Agreement", "score": 31.9833335876, "published": true}, {"hash": "i5PZh3VVpRG", "uri": "/contracts/i5PZh3VVpRG#subprocessor-security", "label": "End User License Agreement", "score": 31.4112243652, "published": true}], "snippet_links": [{"key": "security-assessments", "type": "clause", "offset": [27, 47]}, {"key": "customer-data", "type": "clause", "offset": [82, 95]}, {"key": "to-ensure", "type": "clause", "offset": [96, 105]}, {"key": "operational-practices", "type": "clause", "offset": [138, 159]}, {"key": "current-subprocessors", "type": "clause", "offset": [176, 197]}], "hash": "5c97adcbc63ca29305cfc851c3a0afc5", "id": 10}], "next_curs": "Cl4SWGoVc35sYXdpbnNpZGVyY29udHJhY3RzcjoLEhZDbGF1c2VTbmlwcGV0R3JvdXBfdjU2Ih5zdWJwcm9jZXNzb3Itc2VjdXJpdHkjMDAwMDAwMGEMogECZW4YACAA", "clause": {"size": 116, "title": "Subprocessor Security", "parents": [["security-measures", "Security Measures"], ["definitions", "Definitions"], ["changes-to-these-data-processing-terms", "Changes to These Data Processing Terms"], ["information-security-program", "Information Security Program"], ["interpretation", "Interpretation"]], "children": [["", ""], ["compliance", "Compliance"], ["definitions", "Definitions"], ["introduction", "Introduction"], ["prohibitions", "Prohibitions"]], "id": "subprocessor-security", "related": [["predecessor-security", "Predecessor Security", "Predecessor Security"], ["contractor-security-clearance", "Contractor Security Clearance", "Contractor Security Clearance"], ["successor-securities-administrator", "Successor Securities Administrator", "Successor Securities Administrator"], ["e7-security", "E7 Security", "E7 Security"], ["password-security", "Password Security", "Password Security"]], "related_snippets": [], "updated": "2025-07-24T04:27:57+00:00", "also_ask": ["What minimum security standards should be mandated for all subprocessors?", "How can liability for subprocessor breaches be effectively allocated or limited?", "What audit and monitoring rights over subprocessors are essential for enforceability?", "How does this clause compare to GDPR and other major data protection regimes?", "What are the most common pitfalls that render subprocessor security clauses unenforceable in court?"], "drafting_tip": "Specify security standards for subprocessors to ensure data protection, require regular audits to verify compliance, and mandate breach notification to enable prompt response.", "explanation": "The Subprocessor Security clause establishes requirements for ensuring that any third-party service providers (subprocessors) engaged to process data on behalf of the primary service provider maintain adequate security standards. Typically, this clause obligates the primary service provider to vet subprocessors for compliance with relevant data protection laws and to impose contractual obligations that mirror the security commitments made to the client. Its core function is to mitigate risks associated with outsourcing data processing by ensuring that all parties handling sensitive information uphold consistent security measures."}, "json": true, "cursor": ""}}