TransArmor
®
Data Protection and
Services Participation Addendum
9
Omaha_R_CloverDPTA_2412
war, mutiny, civil commotion assuming the proportions of or
amounting to a popular rising, military rising, insurrection, rebellion,
revolution, military or usurped power,
or any action taken to hinder or
defend against these actions;
3.7.9.
Any Security Event Expenses, and Post Event Services Expenses
arising out of or resulting, directly or indirectly, from the presence of
or the actual, alleged or threatened discharge, dispersal, release or
escape of Pollutants, or any direction or request to test for, monitor,
clean up, remove, contain, treat, detoxify or neutralize pollutants, or
in any way respond to or assess the effects of pollutants;
3.7.10.
Your failure to comply with this Addendum or the Agreement in
connection with a Data Security Event;
3.7.11.
Any Data Security Event occurring before the effective date of this
Addendum;
3.7.12.
Any expenses incurred for, or as a result of, regularly scheduled,
recurring or routine security assessments, regulatory examinations,
inquiries or compliance activities;
3.7.13.
Any fines or assessment levied against you that are not the direct
result of a Data Security Event;
3.7.14.
Any Data Security Event arising out of any software not within your
control; provided, however, this exclusion shall not apply to a Data
Security Event arising out of a virus, Trojan horse or other software
used by a third party to obtain fraudulent access to data to your
computer system or to collect data in transit to or from your
computer system; or
3.7.15.
Any Data Security Event arising out of a breach in a computer
system in which you and other merchants, with no legal relationship
to one another, have hosted accounts or share a common database,
operating system or software applications.
3.8.
Processor Technology and IP. All technology used by us or our
licensors in connection with performing the Clover Security Services including,
software, portals, data processing systems (each of
the foregoing, in object
code and source code form), report templates, documentation and materials
(collectively, and any of our or our patents,
trademarks, copyrights, trade secrets and other intellectual property
and any derivative works of or modifications to the Processor Technology
or Processor IP, is the sole and exclusive property of, and is valuable,
confidential and proprietary to, Processor or its licensors. Except as otherwise
expressly provided herein, you shall not acquire any rights in any
Processor Technology or IP as a result of receiving the Clover Security
Services. You will not file any action, in any forum that challenges the
ownership any of the Clover Security Services, Processor Technology or
Processor IP. Failure to comply with this provision will constitute a material
breach of this Addendum. We have the right to immediately terminate your
access to and use of the Clover Security Services in the event of a challenge by
you. No additional rights are granted by implication, estoppel or otherwise.
3.9.
Data Collection. In the course of providing the Clover Security
Services, we may collect information relating to activities on your network
(the but not limited to, network configuration, TCP/IP
packet headers and contents, log files, malicious codes, and Trojan horses.
We retain the right to use the Data or aggregations thereof for any
reasonable purpose.
3.10.
Service Does Not Guarantee Compliance or Security.
3.10.1.
You acknowledge and agree that your use of the Clover Security
Services does not guarantee your compliance with any of the rules
or security standards established by the Card Organizations. You
further acknowledge and agree that your use of the Clover Security
Services does not guarantee the security of your IP addresses or
that your systems are secure from unauthorized access. You are
responsible for establishing and maintaining your own security
policies and procedures, and for compliance with the Card
Organization Rules and security standards, including any obligation
to notify a Card Organization and/or us of any suspected breach of
your systems or any suspicious transactions or fraudulent activity.
You are responsible for any fines or penalties imposed by any Card
Organization any other expenses and liabilities pursuant to the
Agreement less only the benefits to which you may be entitled under
the Liability Waiver provisions of this Addendum. In the event of a
suspected breach of your systems or any suspicious transactions
or fraudulent activity, you authorize us to share the details of any
questionnaire or compliance report with the Card Organizations,
and grant us and our vendors the right to access and perform a scan
of the IP addresses identified within your profile. You agree and
authorize payment for the additional scan. You further agree to
cooperate with an investigation into such matter to include complying
with the Card Organization and us pursuant to the terms of the
Agreement.
3.10.2.
In addition to your obligations under the Agreement to comply with all
laws, you are solely responsible for monitoring legal developments
applicable to the operation of your business, interpreting applicable
laws and regulations, determining the requirements for compliance
with all applicable laws and regulations, and maintaining an on-going
compliance program.
3.11.
Scanning Authority; Scanning Obligations. You represent and
warrant that you have full right, power, and authority to consent for the Clover
Security Services to scan for vulnerabilities the IP address and/or URL and/or
domain names identified to us by you for scanning, whether electronically or by
any other means, whether during initial enrollment or thereafter. If applicable,
you shall obtain all consents and authorizations from any third parties necessary
for us or our vendors to perform the Clover Security Services, including,
without
limitation, third party datacenters, co-locations and hosts. We will not be required to
execute agreements with any such third parties. You agree to defend, indemnify
and hold us and our vendors harmless from any third party claim that such access
was not authorized. You may use the Clover Security Services and portals only to
scan IP addresses,
URLs and domain names owned by and registered to you.
You under- stand that your failure to provide a complete list of and complete access
to your IP addresses will significantly impair the scanning services and may
result in incomplete or inaccurate results. You agree that all Clover Security
Services hereunder, including without limitation their functionality and contents, is
confidential information, and use and/or access to the Clover Security
Services is subject to the terms of Confidentiality in the Agreement.
3.12.
Scanning Risks. You acknowledge and understand that accessing
retrieving, transmitting, and scanning IP addresses and other data involves
inherent risks, including, without limitation, risks related to system or network
performance and availability, and data corruption. You assume full
responsibility to backup and/or otherwise protect your data against loss,
damage or destruction, and to take appropriate measures to respond to any
potential adverse impact of the systems or disruption of service.
3.13.
Use of Clover Security Services and Portals.
Your use of our or our
services, portals, reports, and scanning solution is subject to the
following restrictions: (i) Clover Security Services, portals, and reports may only
be used for the stated purposes in this Addendum for your internal business
purposes in accordance with all applicable laws (including any export control
laws); (ii) Clover Security Services and portals utilized for scanning may only
scan IP
addresses, URLs and domain names owned by and registered to you;
and (iii) you shall limit access to the portals to only those employees and/or
contractors who have an obligation of confidentiality with you and only to those
who have a requirement for such access on a to basis and you
shall be solely responsible for disabling portals accounts for those employees
and/or contractors who no longer require access. You shall promptly notify us
of any unauthorized use of the Clover Security Services. You shall not (i)
decompile, reverse engineer, disassemble, or otherwise derive the source code
from any component of the Clover Security Services or portals including the
software embedded therein; (ii) modify, enhance, translate, alter, tamper with,
upgrade or create derivatives works of the portals, software or documentation;
(iii) distribute, lease, license, sell, assign, sublicense or otherwise disseminate or
transfer its rights to use any portion of the Clover Security Services to any third
party or (iv) strip out or alter any trademark, service mark, copyright, patent, trade
secret, ownership or any other proprietary or Intellectual Property notices,
legends,
warnings, markings or indications on or within any component of the
portals, software or documentation, or attempt (i), (ii), (iii) and/or (iv) above.
You shall notify us immediately if you know, suspect or have reason to know
that you or anyone you have granted access to the Clover Security Services
violated any provision of this Addendum. Further you agree not to share your
personal information (DDA, tax ID,
MID, etc.) with a third party so they may gain
access to the Clover Security Services.
3.14.
Disclaimers.
3.14.1.
We do not make and hereby expressly disclaim all representations
or warranties including, without limitation (i) that access to the Clover
Security Services will be uninterrupted or error free; (ii) that security
breaches will not occur with respect to any information communicated
through the Clover Security Services, the Internet, or any common
carrier communications facility; and (iii) as to the results that may or