terms_and_conditions
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
terms_and_conditions [2019/06/22 09:17] – lucy | terms_and_conditions [2021/06/11 18:50] – lucy | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | TERMS AND CONDITIONS | + | **TERMS AND CONDITIONS** |
- | **Payment** | + | **Payment**\\ |
- | Payment | + | Payment |
- | **Price Validity** | + | **Price Validity**\\ |
- | Prices are valid for 30 days | + | Prices are valid for 60 days |
- | **Own use of the software** | + | **Own use of the software**\\ |
- | The software allows an unlimited number of recipients for testing and training during the contractual period. There are no restrictions within the software regarding the number of campaigns, domains, customers | + | The software allows an unlimited number of recipients for testing and training during the contractual period. There are no restrictions within the software regarding the number of campaigns, domains and reports created. Access and use of the LUCY products, services, documentation and related materials are solely authorized for the internal business purposes of the organization in which you are a representative of and only for the duration of the term of your subscription period. |
- | **Use of the software for third parties** | + | **Use of the software for third parties**\\ |
- | The software can be used during the contractual term to test third-party organizations such as customers, partners or suppliers. | + | The software can be used during the contract period for your own organization. This also includes companies in which the customer has a majority shareholding or legally belongs |
- | Delivery of Service/Application | + | **Delivery of Service/Software**\\ |
+ | The creation of a license key requires an existing installation. The customer can download the software from our website at any time free of charge. Lucy Security AG grants access to the licensed functions within a maximum of 5 days after receipt of the order. The customer needs the workstation ID to be delivered to us. This ID is located in the administration area under support/ | ||
- | After Payment Lucy Security AG shall within 5 days of execution of this Purchase Order deliver to the buyer | + | **Software Warranty**\\ |
- | access to the functional (tested) software and according license key. | + | Lucy Security AG warrants that during the use of the Software by the buyer the Software (i) is free from any virus, malware, spyware or any other software code* that may pose a danger to the buyer and its affiliates’ IT infrastructure, |
- | Software Warranty | + | |
- | Lucy Security AG warrants that during the use of the Software by the buyer the Software (i) is free from any | + | **Limitation of Liability**\\ |
- | virus, malware, spyware or any other software code* that may pose a danger to the buyer and its affiliates’ IT | + | Except in the case of a breach of a right of intellectual property of a party, which results in compensation obligations, |
- | infrastructure, | + | |
- | functionality of the Software), and (iii) does not create any safety risk to the buyer and its affiliates’ IT | + | **License period**\\ |
- | environment, | + | Each software is licensed for the period specified in the particular order. Unless otherwise specified in the order, the Software License will not be automatically extended beyond the initial term of the Software License. Software support services will be provided for the period specified in each order, or, if no period for support services is specified, support services will be provided for a period of one (1) year from the date of delivery of the software to the Customer Customers provided. Once the commercial license has expired, the LUCY software is automatically available as " |
- | **Minor errors (so called bugs) are being fixed as fast as possible but within a period of 1 month after reporting | + | |
- | latest | + | **Effect of termination**\\ |
- | *The software contains a feature which can simulate the functionality and behavior of a virus. The buyer is | + | Upon termination of any applicable SOW or Order for any reason, all access rights |
- | responsible to use this and all other features of the Software in accordance of local laws (e.g. data privacy for | + | |
- | collected results). | + | **Professional services**\\ |
- | In the event of breach of any of the warranties, Lucy Security AG shall fully defend, indemnify and hold the buyer | + | The period of performance for Professional Services begins |
- | and its affiliates harmless from any against any loss, liabilities, | + | |
- | Security AG warrants that all necessary measures*** have been implemented to avoid any abuse of the Software | + | **Data Protection & GDPR**\\ |
- | by any third party which would pose a safety risk to the buyer’s IT infrastructure | + | Lucy Security AG undertakes to comply with applicable data protection rules according to a separate Data Processing Addendum (the " |
- | ***It is the buyer’s responsibility to set a secure password to secure the access to LUCY (http:// | + | |
- | com/ | + | {{: |
- | Data Protection | + | |
- | Warranties | + | To comply with local data protection law, the client is responsible selecting the according LUCY settings. |
- | Lucy Security AG warrants that (i) it complies with Swiss Data Protection laws, and (ii) it will not transfer | + | LUCY Security has committed itself to comply with the GDPR guidelines applicable in the EU. Inquiries and requests regarding the customer' |
- | outside of Switzerland****, except with the buyer’s prior written consent | + | |
- | writing | + | Within ten (10) business days of the termination of this Agreement or upon Discloser’s written request, LUCY will promptly destroy or return all of Discloser’s Confidential Information in LUCY’s possession or in the possession of any representative of LUCY |
- | ****Excluded is all communication named in this article: http://phishingserver. | + | |
- | com/PS/doc/dokuwiki/doku.php?id=network_communication_-_lucy_--_internet. To comply with Swiss | + | |
- | data protection law, it is the client is responsible selecting the according LUCY setting: http:// | + | **Support**\\ |
- | com/PS/ | + | All support activities related to software bugs are free of charge. The hourly price for support services is $90. Support bills will be created monthly or yearly. All invoices issued hereunder are due and payable within thirty (30) days of the invoice date. Other exceptions: If a WIKI article is not clearly formulated or is outdated, the customer will not be charged for the resulting questions. All other issues will be charged once the support budget included in the according license model is used up. Please ensure that the LUCY software is always up to date with the latest patch before contacting our customer service. Having said all that, the LUCY team aims to be helpful and accommodating at all times, and will do its absolute best to assist the client wherever possible. Examples of issues that are not considered LUCY bugs: \\ |
- | Applicable law and | + | • Application or system problems caused by changing anything within the Linux operating system on which LUCY runs.\\ |
- | dispute resolution | + | • Third party SPAM filters blocking mails from LUCY.\\ |
- | This Purchase Order / Invoice | + | • External Mail relays that do not work as expected.\\ |
- | this Purchase Order / Invoice | + | • Proxy settings preventing LUCY to receive updates\\ |
- | Zurich. | + | • DNS configuration issues caused by DNS entries not made by LUCY. |
- | Any pre-printed terms and conditions of Lucy Security AG shall be excluded in their entirety and shall not become | + | |
- | part of this Purchase Order, unless and to the extent that the client has explicitly accepted in writing such general | + | |
- | terms and conditions. | + | **Security and Monitoring on LUCY VPS/SaaS environment**\\ |
+ | The following information describes the process of installing and supporting a new LUCY server when it is hosted by LUCY. In case of purchasing the SaaS edition, LUCY creates a new server on the infrastructure of LUCY’s prefered provider in the country of the customer' | ||
+ | 1. All LUCY serves have configured Firewall to restrict access to the servers. The access is only allowed for the System Administrator and Support team. If required, access (root) can also be assigned exclusively to the client.\\ | ||
+ | 2. Fail2ban daemon is running for protection from brute-force attacks, it is configured to protect both SSH and Postfix.\\ | ||
+ | 3. Auditd daemon provides the detailed information about all system events, especially information on security violations that allows to take necessary actions. The event information is available in log files stored locally.\\ | ||
+ | 4. Lynis – a flexible tool that is normally executed after installation of a new server and allows to check a new system in the following ways: Security audits, Compliance testing, Penetration testing, Vulnerability detecting | ||
+ | 5. Rkhunter – is executed weekly, it is used to scan the server for rootkits, backdoors and possible local exploits. The scanning results are available in log files stored locally.\\ | ||
+ | 6. Zabbix agent – is used for monitoring processes and hardware on the LUCY server.\\ | ||
+ | 7. Backup script – is used for encrypting LUCY backups and transferring backups to the backup server. If you do not require external backups, we can disable this feature. | ||
+ | |||
+ | Additionally, | ||
+ | Since updating to the new version of LUCY is only possible when all campaigns are stopped, the LUCY software updating process is done manually by the client after publishing a new LUCY version. The update can be done with a click of a button. | ||
+ | |||
+ | |||
+ | **Confidentiality Obligations**\\ | ||
+ | For purposes of this Agreement, " | ||
+ | |||
+ | |||
+ | **Applicable law and dispute resolution**\\ | ||
+ | This contract | ||
terms_and_conditions.txt · Last modified: 2021/09/24 09:02 by lucysecurity