End-User License Agreement

Please read this End­-user License Agreement (“Agreement”) carefully before clicking the “I Agree” button, downloading or using Redlist (“Application”). By clicking the “I Agree” button, downloading or using the Application, you are agreeing to be bound by the terms and conditions of this Agreement which Redlist will provide its application, materials and services (collectively the “Services”). If you do not agree to the terms of this Agreement, do not click on the “I Agree” button and do not download or use the Application. “You” or “Your” as used in this Agreement refers to you, or your company, firm or entity, your affiliates, and their respective officers, directors, shareholders, and employees on whose behalf this Agreement is entered into.

1. GRANT OF LICENSE

Redlist hereby grants You a limited, non-exclusive, non-transferable, right to use the Services, solely for your own internal business purposes, subject to the terms and conditions of this Agreement. All rights not expressly granted to You are reserved by Redlist and its licensors. The foregoing license shall immediately terminate upon termination of this Agreement for any reason.

2. COPYRIGHT

Title and copyrights in and to the Services, including any images, “applets,” photographs, animations, video, audio, music, and text incorporated into or a part of the Services, and all accompanying printed and electronic materials, together with any copies You are permitted to make hereby, are owned by or licensed to Redlist and are protected by United States copyright laws and international treaty provisions. You are permitted to make copies of the printed training materials accompanying the Services solely for use as reference guides for authorized users using the Services in an authorized manner. All such copies shall contain the copyright and other notices of Redlist. All other copying of the printed materials accompanying the Services is prohibited without express written permission from Redlist.

3. YOUR USE OF THE SERVICES

You agree not to use the Services (a) for any illegal purpose, (b) for unauthorized access or distribution of any software, data, or material protected by copyright, patent, or trade secret, or (c) to post or transmit any hateful, vulgar, threatening, libelous, abusive, harassing, defamatory, racially, ethnically, or otherwise unlawful or tortious material, including material harmful to children.

You acknowledge and understand that You are solely responsible for the use of and the results obtained from the Services. You understand that it is Your sole responsibility to understand and comply with any and all applicable laws regarding Your use of the Services and all use of the Services in Your place or places of business, regardless of country or jurisdiction. You agree to abide by any and all local, country, and international export rules and regulations, laws and treaties governing Your use of the Services, including but not limited to those related to data privacy, international communications and the transmission of technical or personal data.

You agree to use the Services in conjunction with the operation of your business, and such operation may include use by related third party partners, vendors and clients with whom you collaborate in Your normal course of business and to whom you may grant access to Your Account.

You shall not (a) license, sublicense, sell, resell, transfer, assign, distribute or otherwise commercially exploit or make available to any unrelated third party or competitor of Redlist the Services in any way; (b) modify or make derivative works based upon the Services; (c) “frame” or “mirror” the Services on any other server or wireless or Internet-based device; or (d) reverse engineer or access the Services in order to (i) build or offer a competitive product or service, (ii) build or offer a product or service using similar ideas, features, functions or graphics of the Services, or (iii) copy any ideas, features, functions or graphics of the Services.

You shall not: (a) intentionally interfere with or disrupt the integrity or performance of the Services; or (b) attempt to gain unauthorized access to the Services, (c) intentionally send or store software viruses, worms, Trojan horses or other harmful computer code, files, scripts, agents or programs intended to interfere with the Services or other users of the Services.

You agree that the Services are not intended for use in the storage, processing or handling of data that is (i) Payment Card Industry data (“PCI data”), (ii) Protected Health Information subject to the Health Insurance Portability and Accountability Act, as amended (“HIPAA”), (iii) Sensitive Personal Data or (iv) the following data elements (a) Social Security number; (b) driver’s license number or government issued identification card number; or (c) financial account number, or credit or debit card number, with or without any required security code, access code, personal identification number or password, that would permit access to an individual’s financial account. “PCI data” means Cardholder Data as defined by the Payment Card Industry Data Security Standard (PCI DSS) v3.2; “Protected Health Information” has the meaning set forth in HIPAA, and “Sensitive Personal Data” has the meaning set forth in Article 9 of the European Union General Data Protection Regulation or other applicable data protection legislation.

4. WARRANTY

Redlist represents and warrants that:

(a) it has the right, power and authority to enter into this Agreement, grant the rights and licenses granted herein and fully perform its obligations hereunder;

(b) the making and performance of this Agreement by Redlist does not and shall not violate any separate agreement, right or obligation existing between Redlist and any third party;

(c) the Services and the use thereof do not infringe any intellectual property right of any third party anywhere in the world and no third party and, other than Redlist’ licensors, has any proprietary interest in or to the Services;

(d) the Services do not contain a malicious or disabling code that is intended to damage, destroy or destructively alter software, hardware, systems or data; and

(e) the Services have been created using, and will maintain during the Term of this Agreement, at least an industry-recognized level of security given the state of technology available for such Services, that Redlist will not materially decrease the overall security of the Services, and that Redlist will use commercially reasonable practices to ensure the security and protection of your content, data, and files;

(f) the Services will perform materially in accordance with the applicable documentation

EXCEPT AS EXPRESSLY PROVIDED HEREIN, NEITHER PARTY MAKES ANY WARRANTY OF ANY KIND, WHETHER EXPRESS, IMPLIED, STATUTORY OR OTHERWISE, AND EACH PARTY SPECIFICALLY DISCLAIMS ALL IMPLIED WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW.​

Redlist shall indemnify and hold You harmless from any and all legal damages awarded by a court of competent jurisdiction against You as a result of the court’s finding that the Services delivered under this Agreement infringe a United States patent, copyright or other intellectual property right of a third party, and any and all expenses and costs (including legal fees and associated court costs) reasonably incurred by You in connection with any such infringement claim. The foregoing indemnity obligation is conditioned on the following: You promptly notify Redlist in writing of such claims when known; and You providing to Redlist all available information, assistance and authority to defend the claim.

If the Services or any part thereof becomes the subject of a valid claim of infringement under any patent, copyright or trade secret law, as Your sole and exclusive right and remedy, Redlist shall endeavor to either procure the right, at Redlist’ sole expense, to permit Your continued use of the Services, or replace or modify the Services so as to avoid infringement without materially altering the functionality and performance thereof. If Redlist reasonably and in good faith determines that either of the foregoing is not commercially practicable, Redlist may terminate this Agreement and the licenses granted herein effective immediately upon written notice to You and shall refund a pro rata portion of any prepaid amounts. Redlist agrees to notify You immediately of any claims asserted against Redlist the outcome or resolution of which may affect the rights granted to You pursuant to this Agreement.

5. LIMITATION OF LIABILITY

Please Read this Section Carefully. It contains Disclaimers of Warranties and Limitations of Liability, made on behalf of Redlist and its Licensors.

IN NO EVENT WILL EITHER PARTY BE LIABLE FOR: (A) DIRECT, SPECIAL, INDIRECT, CONSEQUENTIAL OR INCIDENTAL DAMAGES EVEN IF SUCH PARTY HAS BEEN ADVISED OF THE POSSIBILITY THEREOF, INCLUDING, BUT NOT LIMITED TO, LOST PROFITS, LOST BUSINESS REVENUE, OR FAILURE TO REALIZE EXPECTED SAVINGS, OR (B) ANY CLAIMS BY ANY OTHER PARTY, IN EACH CASE IRRESPECTIVE OF THE CAUSE OF ACTION UNDERLYING SUCH CLAIM, INCLUDING, BUT NOT LIMITED TO: (I) BREACH OF CONTRACT, EVEN IF IN THE NATURE OF A BREACH OF CONDITION OR A FUNDAMENTAL TERM OR A FUNDAMENTAL BREACH, OR (II) TORT INCLUDING, BUT NOT LIMITED TO, NEGLIGENCE OR MISREPRESENTATION.

IN NO EVENT SHALL Redlist’ LIABILITY, AND THE LIABILITY OF ITS LICENSORS, TO YOU OR ANY THIRD PARTIES IN ANY CIRCUMSTANCE EXCEED THE AMOUNT OF FEES YOU PAY TO Redlist IN THE TWELVE (12) MONTHS PRIOR TO THE ACTION GIVING RISE TO LIABILITY.

In no event is Redlist’ liable for any damage to or loss or destruction (a) of any of Your content, files, or data which may result from Your use of the Services or any damage; (b) arising from Your failure to perform in connection with this Agreement; or (c) arising from misuse of Your User Names or IDs. All limitations and disclaimers stated in this Agreement also apply to Redlist’ licensors as intended beneficiaries of this Agreement. Any rights or limits stated herein are the maximum for which Redlist and its licensors are collectively responsible.

6. FORCE MAJEURE

Neither party shall be under any liability to the other for any delay in performing any obligation under this Agreement to the extent caused by reason of circumstances beyond the reasonable control of that party and without such party’s fault or negligence, which shall include but not be limited to acts of God, war, strikes, lack or failure of transportation facilities, acts of terrorism, fire, acts of government authority. In the event of a force majeure event, the affected party shall give prompt written notice to the other party, stating the period of time the same is expected to continue. If any such failure or delay in performance continues for more than sixty (60) days, either party may terminate this Agreement upon written notice to the other.

7. YOUR INFORMATION

Redlist provides only storage and delivery Services and it is not the publisher of Your information stored or transmitted within the Services. Because Redlist does not review, censor or monitor and is not in any manner responsible for any content You store or send through the Services, to the extent such content includes, without limitation, infringing, abusive, profane, hateful, libelous, unlawful, or offensive material, all content from parties accessed via the Services, accessed by You and those You have authorized, shall be all at Your own risk. You acknowledge hereby and retain all right, title and interest (including, where appropriate, copyright and other proprietary or intellectual property rights) in the content, information and files You store through use of the Services, and Redlist explicitly disclaims any ownership of, or right, title and interest in the content, information and files You store through use of the Services. Redlist assumes no liability whatsoever for any claims, losses, actions, damages, suits or proceedings arising out of or otherwise relating to such content accessed using the Services. Information You store in the Services is considered Your Confidential information.

Redlist shall use reasonable commercial efforts to ensure as part of the Services, but cannot guarantee that any content, data, or files stored or sent to or by You using the Services will be transmitted in uncorrupted form without viruses or other damaging or destructive attributes or within a reasonable period of time. Redlist shall use reasonable commercial efforts to ensure as part of the Services, but cannot guarantee that any content, data, or files You store in or transmit through the Services will not be subject to unauthorized access by others or that others will not gain access to the Services.

8. CONFIDENTIALITY

You and Redlist may disclose information to one another, and You may save information in connection with the Services, which is considered by the disclosing party to be proprietary or confidential information (the “Confidential Information”). Confidential Information is defined as any information or data, in any form, including, but not limited to oral, written, graphic or electromagnetic forms, models or samples, which the disclosing party identifies as confidential or which is of such a nature that the receiving party should reasonably understand that the disclosing party desires to protect such information or data against unrestricted disclosure or use, including without limitation, business information, financial data and marketing data. All Confidential Information shall remain the sole property of the disclosing party and its confidentiality shall be maintained and protected by the receiving party with the highest degree of care during the term of this Agreement and for a period of three years following the expiration or termination of this Agreement. The receiving party shall not use the Confidential Information of the other party except as necessary to fulfill its obligations under this Agreement, nor shall it disclose such Confidential Information to any third party without the prior written consent of the disclosing party. The restrictions on the use or disclosure of any Confidential Information shall not apply to any Confidential Information: (i) after it has become generally available to the public without breach of this Agreement by the receiving party; (ii) is rightfully in the receiving party’s possession prior to disclosure to it by the disclosing party; (iii) is independently developed by the receiving party; (iv) is rightfully received by the receiving party from a third party without a duty of confidentiality; or (v) is disclosed under operation of law. Further, in the event such disclosure is required of either party under judicial order or requirement of law, such party will promptly notify the disclosing party of such order or requirement.

You understand that Redlist implementation and support personnel may need to access Your Account to assist You in Your implementation, as well as to address support requests that may occur from time to time, but such access shall be on a need-to-know basis. You permit Redlist implementation and support personnel to access Your Account with the understanding that all information in Your Account shall be considered Confidential Information by Redlist personnel. Redlist agrees to hold in confidence and not reproduce, distribute, infringe on, transmit, or transfer, directly or indirectly, in any form, by any means, the Confidential Information.

9. INDEMNIFICATION

You shall indemnify Redlist and Redlist’ officers, directors, employees and agents (each a “Redlist Indemnitee”) against any and all claims, actions, losses, damages, liabilities, costs and expenses (including, without limitation, reasonable attorneys’ fees and disbursements incurred by an Indemnitee in any action between such Redlist Indemnitee arising out of or in connection with Your use of the Services, including, without limitation, Your use of the Services in conjunction with any material or content that You store or transmit that: (a) infringes any third party’s intellectual property or publicity/privacy rights; (b) violates any law or regulation; (c) is defamatory, libelous, unlawfully threatening or unlawfully harassing; (d) is obscene, harmful to minors or child pornographic; (e) contains any viruses, trojan horses, worms, time bombs, cancelbots or other computer programming routines that are intended to damage or detrimentally interfere with the Services or data contained within the Services; or, (f) is materially false, inaccurate or misleading.

Redlist agrees to indemnify and hold You and Your officers, directors, employees and agents (each “Your Indemnitee”) harmless from and against any and all third party claims, actions, losses, damages, liabilities, costs and expenses (including, without limitation, reasonable attorneys’ fees and disbursements incurred by Your Indemnitee in any action between Your Indemnitee and any third party arising out of or in connection with the breach of any of Redlist’ representations or warranties set forth in this Agreement.

The indemnification obligations set forth herein are contingent upon the following conditions: (i) Redlist or You, as the case may be (the “Indemnified Party”) must promptly notify the other party (the “Indemnifying Party”) in writing of the third party claim or action (however, failure of the Indemnified Party to so promptly notify the Indemnifying Party will not relieve the Indemnifying Party of its indemnification obligations hereunder, except to the extent it has been damaged thereby); (ii) the Indemnified Party will reasonably cooperate with the Indemnifying Party in the defense of the matter; and (iii) the Indemnifying Party will have primary control of the defense of the action and negotiations for its settlement and compromise; provided, however, that the Indemnified Party may, at its own cost, obtain separate counsel to represent its interests.

10. PERFORMANCE

Redlist will make commercially reasonable efforts to assure that the Services will be available everyday of the year. You understand that normal maintenance and backup procedures will cause temporary down time during which the Services cannot be used. Other than such scheduled downtime, Redlist will make commercially reasonable efforts to make the Services available 99.6% of the time. It is possible that there will be interruptions of Services during non-scheduled maintenance. Redlist will make commercially reasonable efforts to address errors and omissions in the Services, and to ensure the Service is performing in a manner materially in keeping with the documentation. Your access to the Services is through the Internet, and you understand that your ability to use the Services is dependent on the global telecommunications infrastructure involving the reliability and performance. Services may be subject to limitations, delays, and other problems inherent in the use of the Internet and electronic communications. Redlist is not responsible for any delays, delivery failures, or other damage resulting from such problems.

11. SERVICES UPGRADES, ENHANCEMENTS, AND BRANDING

You understand that Redlist makes regular and sometimes substantial changes and improvements to the Services and that communication with Your users about planned changes may be necessary to ensure Your efficient use of the Services. You understand and agree that from time to time, and solely at its discretion, Redlist may communicate directly with users in Your account using electronic and other means. Such communication shall be restricted to content relating to planned and actual product changes and enhancements, product education, product feedback and suggestions, system availability, and other content relevant important to the productive use of the Services. Under no circumstances will user information, including emails, be shared with third parties.

12. NO AGENCY

You and Redlist are independent contractors, and no agency, partnership, joint venture, employee-employer or franchisee-franchisor relationship is intended or created by this Agreement.

13. NOTICES

Except as explicitly stated otherwise, any notice to Redlist shall be given in writing to Legal Counsel at Redlist:

Redlist, LLC
Attention: Legal Counsel
2436 W 700 S
STE 202
Pleasant Grove, UT 84062

Any notice to You will be given to the address You provide to Redlist during the registration and provisioning process. Either party may update its address by proper notice to the other party in the same manner as provided herein. Notice shall be deemed given twenty-four (24) hours after the notice is sent, unless the method of communication is email and the sending party is notified that the electronic mail address is invalid. Alternatively, Either party may give notice by certified mail, postage prepaid and return receipt requested, to the address provided to the other party during the registration and provisioning process. In such case, notice shall be deemed given three (3) days after the date of mailing.

14. TERMINATION

This Agreement shall commence on the Effective Date and shall continue forever unless earlier terminated as provided herein. Either party may, at its option, terminate this Agreement in the event of a material breach of this Agreement by the other party. Any such termination may be affected only through a written notice to the other party, specifically identifying the breach or breaches on which termination is based. Following receipt of such notice, the party in breach shall have thirty (30) days to cure such breach or breaches, and this Agreement shall terminate in the event that such breach is not cured by the end of such period.

15. GOVERNING LAW AND ARBITRATION

Any and all disputes arising out of or in connection with the negotiation, execution, interpretation, performance or nonperformance of this Agreement shall be solely and finally settled by arbitration, which shall be conducted in Utah, U.S.A. by a single arbitrator appointed by the American Arbitration Association. The parties hereby renounce all recourse to litigation and agree that the award of the arbitrator shall be final and subject to no judicial review. The arbitration shall be conducted pursuant to the Commercial Arbitration Rules of the American Arbitration Association, as now or hereafter amended. All substantive questions of law shall be determined under the laws of the State of Utah, U.S.A. (without regard to the principles of conflicts of laws of such state).

16. SEVERABILITY

This Agreement, together with the Order Form Agreement, if any, comprises the entire agreement between You and Redlist with respect to the subject matter hereof and supersedes all prior agreements between the parties regarding the subject matter of this Agreement. If one or more of the paragraphs in this Agreement are found to be unenforceable or invalid, the remaining paragraphs shall remain in effect.

17. ASSIGNMENT

This Agreement may not be assigned by a party without the prior written consent of the other party unless such assignment is to (i) a parent or subsidiary, (ii) an acquirer of assets, or (iii) a successor by merger. Any purported assignment in violation of this section shall be void. Any actual or proposed change in control of You that results or would result in a direct competitor of Redlist directly or indirectly owning or controlling 50% or more of You shall entitle Redlist to terminate this Agreement for cause immediately upon written notice.

18. AUTHORITY

If this Agreement is being accepted by any individual for You, then You represent, warrant and attest that such individual has the authority to execute this Agreement on Your behalf.

19. PERSONAL DATA PROTECTION CLAUSES

For purposes of this section, the Applicable Law means Regulation (EU) 2016/679 of the European Parliament and of the Council of April 27, 2016.

You are the “Controller.” Redlist is the “Service Provider” or “Processor.” “Personal Data” means any information relating to an identified or identifiable natural person (“Data Subject”).

19.1 Instructions

Processor will process Personal Data only on documented instructions from Controller, unless Processor is legally required to transfer so long as, in that case, Processor informs Controller of the legal requirement to transfer except as prohibited under Applicable Law.

Processor shall immediately inform Controller if, in its opinion, an instruction from Controller infringes Applicable Law.

19.2 Records of Processing Activities

Processor must keep records of its processing activities performed on behalf of the Controller, including:

a) name and contact details of the Processor, Controller, and respective data processing officer if applicable;

b) categories of processing carried out on behalf of each controller;

c) where applicable, transfers of personal data to a third country or an international organization, including the identification of that third country or international organization and the documentation of suitable safeguards, and;

d) a description of the technical and organizational security measures.

19.3 Sub-processing

Sub-processing shall be authorized in advance by Controller through either a general or a specific written authorization. Where Personal Data is processed by sub-contractors the Processor shall:

a) not authorize any third party and/or sub-contractor to process the Personal Data (“Sub-processor”) other than with the prior written consent of the Controller, and;

b) remain fully liable to the Controller for any failure by a sub-processor to fulfill its obligations in relation to the processing of any Personal Data.​

The Processor must ensure that the contract between Processor and Sub-processor includes the same terms as those set out in these Clauses. In cases of transfer of Personal Data outside the European Economic Area, the contracts shall incorporate a legal mechanism to ensure an adequate level of protection of the Personal Data transferred.

In case the Controller grants a general authorization to sub-processing Personal Data, the Processor shall inform the Controller of any intended change concerning the addition or replacement of Sub-processors, giving the Controller the opportunity to object.  Controller may object to the use of a replacement or additional Sub-processor by notifying the Processor within twenty (20) business days after receipt of the Processor’s notice. If Controller objects to a new Sub-processor, the parties shall in good faith discuss a commercially reasonable solution.

Processor uses its Sub-processors  to assist it in providing the Services. These Sub-processors set out below provide cloud hosting and storage services; content delivery and review services; assist in providing customer support; as well as incident tracking, response, diagnosis and resolution services.

List of Sub-Processors

    • Microsoft, Washington, USA
    • Intuit, California, USA
    • Twilio, California, USA
    • Progress Software Corp, Massachusetts, USA​

19.4 Confidentiality

Where Personal Data is processed by the Processor, its agents, sub-contractors or employees, the Processor shall, and shall ensure that its agents, sub-contractors and employees take reasonable steps to ensure the reliability of any employee, agent or contractor who may have access to the Personal Data, ensuring in each case that access is strictly limited to those individuals who need to access the relevant Personal Data, as strictly necessary to perform the Services in the context of that individual’s duties to the Processor, ensuring that all such individuals; a) are informed of the confidential nature of the Personal Data; b) have undertaken appropriate training in relation to Personal Data Protection; c) are subject to confidentiality undertakings or professional or statutory obligations of confidentiality; d) are aware of the Processor ‘s obligations in relation to data protection under these clauses; and e) keep all Personal Data and any analyses, profiles or documents derived there from separate from all other data and documentation of the Processor.

19.5 Security

Where Personal Data is processed by the Processor, its agents, sub-contractors or employees, the Processor shall implement and ensure that its agents, sub-contractors and employees implement appropriate technical and organizational security measures to ensure a level of security commensurate with the risks associated with the processing, such measures to be appropriate in particular to protect against accidental or unlawful destruction, loss, alteration or unauthorized disclosure of or access to the Personal Data. These measures shall take into account and be appropriate to the state of the art, nature, scope, context and purposes of processing and the risk of harm which might result from unauthorized or unlawful processing or accidental loss, destruction or damage to Personal Data and may include (as appropriate): a) ensuring the on-going confidentiality, integrity and, availability of processing systems and services; b) ensuring a means to restore the availability of and access to Personal Data in a timely manner following any physical or technical incident; and c) having in place a process for regularly testing, assessing and evaluating the effectiveness of the technical and organizational security measures.

19.6 Data Subjects Rights

Processor shall assist Controller with requests to exercise Data Subject rights, including but not limited to the right to access and the right to erasure.

19.7 Personal Data Breach

Where Personal Data is processed by the Processor, its agents, sub-contractors or employees, the Processor shall, and shall procure that its agents, sub-contractors and employees to inform the Controller without undue delay after becoming aware of a Personal Data Breach; such notification will describe the Personal Data Breach in terms of who and how many data subjects are affected, where, when and how it occurred, which measures have been taken already to stop the breach and mitigate its effects. Upon Controller’s request, Processor shall cooperate with the Controller without undue delays and provide all available information to Controller to support the data breach investigation and notification to the relevant Data Protection Authorities and/or Data Subjects where required under Applicable Law.

19.8 Data Protection Impact Assessments

Taking into account the nature of processing and information available to Processor, Processor shall assist Controller in cases where a Data Protection Impact Assessment shall be carried out.

19.9 Cooperation with Data Protection Authorities

Processor is required to cooperate on request with Data Protection Authorities in the performance of their tasks.

19.10 Availability of Information

Upon written request of the Controller, the Processor will undertake its commercially reasonable efforts to make available to the Controller reasonable information necessary to demonstrate compliance with its obligations regarding data protection as explicitly set out in these Clauses or by Applicable Law and allow for and contribute to audits, including inspections, conducted by the Processor or another auditor mandated by the Processor.

19.11 Deletion of Existing Personal Data

Where Personal Data is processed by the Processor, its agents, sub-contractors or employees, the Processor shall, and shall ensure that its agents, sub-contractors and employee: a) ensure that any systems used in the context of performance of these Clauses, including any backup systems, allow the erasure or deletion of specific Personal Data, and put in place measures to fully implement any erasure or deletion request within the timeframe required by Controller and Applicable Law; and b) upon termination for any reason of the provision of Services, cease processing the Personal Data immediately, except for the safe storing. Thereafter, at the Controller’s option, either return or delete from its systems (so that such Personal Data cannot be recovered or reconstructed), the Personal Data and any copies of it or of the information it contains, including any Personal Data in hardcopy format and the Processor shall confirm in writing to the Controller that this clause has been complied with in full.

Last Updated: July 26, 2019

Schedule a Demo

Start managing everything in one system

4.7 Star Rating
5/5