Overview of Trinity Cyber Contracting

Last modified: September 27, 2023

Table of Contents

 Overview >>

 Terms of Service >>

 Service Level Agreement >>

The Terms of Service (ToS) are the contractual terms governing your subscription to Trinity Cyber services. To help explain Trinity Cyber’s approach to contracting, we present a short outline immediately below. If you have any questions, be sure to visit or contact our team.

I. Basics

The ToS are legal agreements that outline each party’s rights and obligations, including (1) what you can expect from us as your service provider, (2) what we expect from you when you use the applicable service, and (3) our business practices. Unless otherwise noted, the ToS is a global document, intended to simplify contracting across regions.

II. URL Terms

Additional terms, collectively called the "URL Terms" are additional contractual terms specific to one or more products or services and incorporated by reference into the ToS, covering topics such as service descriptions, support processes, Service Level Agreements (SLAs), and acceptable use policies. We may update our URL Terms, including when we launch new products and services, and to reflect new laws and regulations. The relevant URL Terms and other resources for each product or service are available at

III. Organization

The ToS are broadly organized in three general parts, collectively the Trinity Cyber Commercial Subscription Agreement.

  1. The terms that describe the business and legal relationship between you and Trinity Cyber for your use of Trinity Cyber services, including definitions of key concepts.
  2. Region-specific terms that apply if your billing address is in the applicable region.
  3. Additional terms, collectively called the "URL Terms."

Terms of Service

These Trinity Cyber Terms of Service together with the additional terms incorporated herein by reference (the "Commercial Subscription Agreement" or "Agreement") are entered into by Trinity Cyber and the entity or person agreeing to them (including by accepting an Order that references these Terms of Service) ("Company") and govern Company’s access to and use of the Services. "Trinity Cyber" has the meaning given in Section 13.11.

This Agreement is effective when Company clicks to accept it or when the Company accepts an Order which references these Terms of Service from Trinity Cyber or an Authorized Reseller (the "Effective Date"). If you are accepting on behalf of Company, you represent and warrant that (i) you have full legal authority to bind Company to this Agreement; (ii) you have read and understand this Agreement; and (iii) you agree, on behalf of Company, to this Agreement.

  1. Services and Term
    1. Services. Pursuant and subject to this Agreement, and in consideration of payment by Company of agreed upon fees under the applicable Order, Trinity Cyber will: (i) tune, maintain, update, and operate its technology as a service and provide ancillary professional services necessary to provide the security benefits of its Solution Services to Company; (ii) provide Company credentials to access Trinity Cyber’s Customer Portal, and (iii) make all reasonable efforts, with Company’s assistance, to move Company’s Internet Traffic through Trinity Cyber’s fully managed technology. Company will receive the full set of generally released Solution capabilities and will not be charged as additional capabilities are developed and added generally to the Solution.
    2. Term. Unless otherwise set forth in an Order, the Initial Term for Solution Services is one year. Unless otherwise set forth in an Order, at the end of the Initial Term, Solution Services ordered hereunder will renew for up two successive Renewal Terms equal in length to the Initial Term unless and until terminated as provided herein or either party provides at least sixty (60) days’ advance written notice of its intent not to renew.
  2. Service Changes and Access
    1. Service Change. Upon at least thirty (30) days’ advance written notice to Trinity Cyber personnel, Company may request to (i) add segments of its Internet traffic, up to and including all segments of Company Internet traffic, (ii) change connection options, and (iii) add extra services, which might carry additional fees. Changes to connection options can require coordination among Trinity Cyber network engineers and Company personnel to effectuate the requested change. Careful, good faith coordination among the Parties is required to establish in advance a mutually-agreed-upon effective date and time for service changes.
    2. Trinity Cyber’s Customer Portal. In leveraging the Solution on behalf of Company hereunder, Trinity Cyber shall give Company’s Authorized Users access to Trinity Cyber’s Customer Portal to allow Company to view the performance of the Solution. Consistent with the foregoing, Trinity Cyber hereby grants Company a limited, worldwide, non-exclusive and non-transferable right and license during the Term to allow Company’s designated employees and independent contractors who are authorized by Company ("Authorized Users") access and use of: (a) Trinity Cyber’s Customer Portal through the Internet; and (b) documentation relating to the Solution, solely in and for Company’s own internal purposes and business operations and in accordance with the terms and conditions of this Agreement.
    3. Authorized Users. Company (or, if requested by the Company, Trinity Cyber) will assign each Authorized User a unique account name and password to access Trinity Cyber’s Customer Portal (each, a "User ID"). Company shall be responsible for any and all acts and omissions of its Authorized Users, and Company shall ensure that its Authorized Users abide by its data handling processes and all local, state, national, and foreign laws, and regulations, as applicable
    4. User IDs and Trinity Cyber’s Customer Portal. Company shall be responsible for ensuring the security and confidentiality of all User IDs. To the extent permitted by law, Company acknowledges and agrees that it will be fully and solely responsible for all liability incurred through the use of a User ID, and that use of Trinity Cyber’s Customer Portal under any User ID will be deemed to have been performed by Company. Should Company become aware of an unauthorized use of a User ID and/or Trinity Cyber’s Customer Portal ("Unauthorized Access"), Company shall notify Trinity Cyber immediately of the occurrence and of its efforts to remediate the effects of the Unauthorized Access and prevent a future occurrence.
    5. Restrictions and Company Obligations. Company shall not permit, either directly or indirectly, any person or third party (including affiliates of Company) other than the Authorized Users to access, view, or use Trinity Cyber’s Customer Portal. Company shall not, and shall ensure that its Authorized Users do not: (a) transfer, distribute, sell, lease, license, or otherwise make any aspect or portion of the Solution available to a third party; (b) reproduce, copy, translate, modify, adapt, decompile, disassemble, create Derivative Works of, reverse engineer the object code version of, or otherwise attempt to secure the source code of, all or any part of the Solution or access the Solution in order to build a similar or competitive product or service, except strictly as and to the extent expressly authorized by Applicable Laws; (c) obfuscate, remove, or alter any of the logos, trademarks, Internet links, patent or copyright notices, confidentiality or proprietary legends or other notices or markings that are on or in the Solution or documentation describing it unless performed by Trinity Cyber as contracted for herein; (d) intentionally send or store viruses, worms, time bombs, Trojan horses, or any other harmful or malicious code, files, scripts, agents, or programs; (e) intentionally interfere with or disrupt the integrity or performance of Trinity Cyber’s Customer Portal, any of Trinity Cyber’s other systems, infrastructure, or technology, or the data accessible through Trinity Cyber’s Customer Portal; (f) attempt to gain unauthorized access to Trinity Cyber’s systems or networks or any other accounts, computer systems, or networks through hacking, password mining, or other means; or (g) cause or permit reverse engineering of any Confidential Information or decompilation or disassembly of any software programs that are part of the Solution. The term "Derivative Work" means any derivative work of, translation, modification, adaption, enhancement, upgrade, addition, development, or improvement to an underlying intellectual property asset. Trinity Cyber may suspend the Solution and access to its Customer Portal if Company or any of its agents (or their respective employees or contractors) violate any of the restrictions in this paragraph. At all times, Company shall comply with all Applicable Laws (as defined herein), including without limitation all federal or state data-privacy, security, or consumer-protection laws relating to the use, confidentiality, security, and privacy of data. In the course of such compliance, Company shall follow all reasonable cybersecurity practices and shall address the specific cybersecurity vulnerabilities in its networks and systems that Trinity Cyber brings to Company’s attention in the course of operating the Solution. As part of Company’s reasonable cybersecurity practices, Trinity Cyber strongly suggests that Company maintain an adequate cybersecurity insurance policy. Company shall obtain any consents required for Trinity Cyber to access and use Company’s systems and data for purposes of operating the Solution for Company’s benefit. Company shall cooperate with Trinity Cyber as required for Trinity Cyber to properly perform its obligations, including by providing Trinity Cyber access to data and systems and supporting its discussions with Internet Service Providers or Internet Exchange Points. Trinity Cyber shall host and retain physical control over the Solution at all times. Trinity Cyber shall have no obligation to deliver or otherwise make available to Company any copies of computer programs or code, whether in object code or source code form. Trinity Cyber shall have the sole discretion to add, remove, or make changes to the functionality or capabilities of its Solution while providing performance consistent with this Agreement.
    6. Monitoring. Trinity Cyber shall have the right to monitor and audit Company’s use of Trinity Cyber’s Customer Portal without notice and by any means, including, without limitation, remote means, to verify Company’s compliance with the terms of this Agreement. Company shall be responsible for ensuring that its employees and independent contractors comply with the terms of this Agreement. Company shall be liable for any breach of this Agreement by its employees or independent contractors.
  3. Ownership and Privacy
    1. Trinity Cyber Assets. Company acknowledges and admits the validity of, and Trinity Cyber’s ownership of, all trademarks, service marks, patents, copyrights, trade secrets, and other proprietary and intellectual property rights (collectively, "IPR") in or related to the Solution, documentation relating to the Solution, and Trinity Cyber Proprietary Information (as defined below) (collectively, "Trinity Cyber Assets"). All Trinity Cyber Assets are and shall remain the exclusive property of Trinity Cyber, whether or not specifically recognized or perfected under local Applicable Laws. Company shall not take any action that jeopardizes or could jeopardize Trinity Cyber Assets. For purposes of this Agreement, "Trinity Cyber Proprietary Information" means Trinity Cyber’s proprietary software, methodologies, tools, specifications, drawings, sketches, models, samples, records, documentation, works of authorship or creative works, ideas, knowledge, data or other materials that have been originated or developed by Trinity Cyber or on Trinity Cyber’s behalf, or otherwise purchased by, or licensed to, Trinity Cyber, and used by Trinity Cyber in the course of performing any Services.
    2. Feedback. All feedback and suggestions provided by Company to Trinity Cyber relating to the Solution or any Trinity Cyber Assets, including, without limitation, any suggested features, upgrades, improvements, enhancements, or modifications to Trinity Cyber Assets (collectively, "Feedback"), is deemed to be Trinity Cyber’s Confidential Information. Trinity Cyber may use such Feedback for any purpose, including, but not limited to, improvement and modification of Trinity Cyber Assets, and Trinity Cyber owns all rights, title, and interests in and to such improvements and modifications.
    3. Acknowledgment. Company shall retain and own all rights, title, and interest in and to Company Data (as defined below in Section 3.4) and thus Company acknowledges and agrees that Trinity Cyber shall have no liability (including damages caused by viruses and other malicious code contained in Company Data) to Company or any third party for the content, use, accuracy, or any other aspect of Company Data.
    4. Company Data and Privacy Protection. During the course of providing Solution Services, Trinity Cyber may be provided access to or otherwise obtain or handle Company Data (as defined below in this Section 3.4). Trinity Cyber agrees to protect all Company Data as detailed in this Section 3.4.
      1. Privacy Protection Definitions. For purposes of this Section 3.4, the following definitions shall apply:
        1. "Affiliate" means any corporation, partnership or other entity that at any time directly or indirectly controls, is controlled by or is under common control with such first corporation partnership or entity: "control" means the possession, directly or indirectly of the power to direct or cause the direction of the management and policies of a corporation, partnership or other entity whether through the ownership of voting securities or by contract or otherwise.
        2. "Payment Data" means: (i) with respect to a payment card, the account holder’s name, account number, service code, card validation code/value, PIN or PIN block, valid to and from dates and magnetic strip data; and (ii) information relating to a payment card transaction that is identifiable with a specific account.
        3. "Data Protection Requirements" means, collectively, all national, state and local laws or regulations relating to the protection of information that identifies or can be used to identify an individual that apply in the jurisdictions in which Company Entities do business and that apply with respect to Trinity Cyber’s handling of Company Data (including, without limitation; in the United States, the Gramm-Leach-Bliley Act and California Consumer Privacy Act ("CCPA"); in the European Union, Regulation (EU) 2016/679 ("GDPR"); in the United Kingdom, the Data Protection Act 2018; in Canada, the Personal Information Protection and Electronic Documents Act ("PIPEDA"); and in Australia and New Zealand, the Australian Privacy Act 1988 and the New Zealand Privacy Act 1993) and any self-regulatory programs to which the Company Entities subscribe, including, without limitation, any Certification, relating to the protection of data that identifies or can be used to identify an individual that apply with respect to Trinity Cyber’s handling of Company Data.
        4. "Internal Data" means any information regarding the business or business activities of Company or Company Entities (as defined below) that is not available to the general public. For the avoidance of doubt, Internal Data includes, without limitation, all information the Company Entities may possess that is subject to an obligation to maintain the confidentiality of same, including, without limitation, Licensee information.
        5. "Company Data" means Internal Data and includes, without limitation, any Personally Identifiable Data, Sensitive Personally Identifiable Data, and/or Payment Data that may be provided or made accessible to Trinity Cyber by Company.
        6. "Company Entities" means, collectively, The Company and all companies in which the Company directly or indirectly owns a majority interest, commonly called "subsidiaries" of the Company.
        7. "Licensee" means a member of the network of independent third parties licensed to operate businesses using the "Company" name, service mark(s) and/or business system(s).
        8. "PCI Standards" means the security standards for the protection of payment card data with which the payment card companies require merchants to comply, including, but not limited to, the Payment Card Industry Data Security Standards ("PCI-DSS") currently in effect and as may be updated from time to time.
        9. "Personally Identifiable Data" means any information that identifies, relates to, describes, is capable of being associated with, or could reasonably be linked, directly or indirectly, with a particular consumer or household. Personally Identifiable Data may relate to any individual, including, but not limited to, any employee, former employee, service provider, former service provider, customer, prospective customer, former customer, business associates (including, without limitation, Licensees), former business associates (including, without limitation, Licensees), claimant or former claimant of the rental business car sales business or claims administration business of the Company Entities or any Licensee. Personally Identifiable Data includes, without limitation, names, addresses, telephone numbers, fax numbers, e-mail addresses, date and place of birth, driver’s license number, images of driver’s licenses, Internet Protocol ("IP") address, passport number, credit card information, frequent flyer and other membership reward program information and affiliations with companies or associations, information about transactions with Company Entities, such as for example but not limitation, the locations, dates and times of a customer’s rental pickup and return, arrival airlines and flight numbers and rental charges incurred for such transactions.
        10. "Sensitive Personally Identifiable Data" means: (i) an individual’s Social Security number, Taxpayer Identification Number, passport number, driver’s license number or other government-issued identification number; or (b) financial account number, with or without any code or password that would permit access to the account; and/or (ii) an individual’s name or a unique identification number in combination with race, religion, ethnicity, medical or health information, biometric data (e.g. fingerprints, retina scans, etc.), digital signature files (i.e. digital identification key not a scanned image of a person’s signature on paper), background check information or sexual orientation.
      2. Agreement and Compliance with Applicable Laws
        1. All references herein to Company Data are to data that is provided to, or obtained, used, accessed, maintained or otherwise handled by Trinity Cyber in connection with providing the Services to Company.
        2. Trinity Cyber will at all times comply with and treat Company Data, including Sensitive Personal Data and Payment Data, if applicable, in accordance with the requirements of this Section 3.4 and applicable Data Protection Requirements. Trinity Cyber hereby represents and warrants that it will inform itself regarding, and comply with, all applicable Data Protection Requirements and all applicable PCI Standards. Trinity Cyber will notify Company if Trinity Cyber believes that Company’s instructions concerning Sensitive Personal Data, including, without limitation, the requirements of this Section 3.4, would cause Trinity Cyber to violate any Data Protection Requirement or PCI standards.
        3. To the extent applicable that Trinity Cyber has access to Payment Data, Trinity Cyber shall: (a) ensure that its information security program complies with the requirements of the PCI Standards; (b) maintain a complete audit trail of all transactions and activities associated with Payment Data: and (c) not store card validation codes/values, complete magnetic strip data or PINs and PIN blocks (even if such data is encrypted). Trinity Cyber represents and warrants that it shall maintain certification of its compliance with PCI Standards and that it shall undergo independent, third-party system vulnerability scans quarterly. Trinity Cyber shall promptly provide, at the request of Company, current certification of compliance with PCI Standards by an authority recognized by the payment card industry for that purpose. If during the term of the Agreement, Trinity Cyber undergoes, or has reason to believe that it will undergo, and adverse change in its certification or compliance status with the PCI Standards and/or other material payment card industry standards, it will promptly notify Company of such circumstances. Trinity Cyber further represents and warrants that it shall not take any actions that will compromise Company’s ability to comply with the PCI Standards.
      3. Data Ownership, Transfer, and Use
        1. At no time shall Trinity Cyber acquire any ownership, license, rights, title or other interest in or to Company Data, all of which shall, as between Company and Trinity Cyber, be and remain the proprietary and confidential information of Company. Trinity Cyber shall not be entitled to use Company Data for its own purposes, or for the purpose of any affiliate or third party.
        2. In no event may Trinity Cyber: (a) use Company Data to market its services or those of an affiliate or third party; or (b) sell, rent, or otherwise monetize Company Data in any form or manner whatsoever.
        3. Trinity Cyber will hold Company Data in strict confidence and will not, except as may be permitted by this Agreement, disclose Company Data to any third party, firm or enterprise (including, without limitation, Trinity Cyber’s affiliates) or use (directly or indirectly) any Company Data for any purpose other than in generic form to improve its security controls or as specifically directed by Company in writing and in accordance with the Data Protection Requirements. In addition, Trinity Cyber may not store or physically transfer Company Data in or to any location outside the United States without receiving the prior written consent of Company.
        4. Prior to providing Company Data to any third party, including, without limitation, Trinity Cyber’s affiliates or a potential subcontractor or service provider, Trinity Cyber must obtain written approval for such disclosure from an officer of Company. If Trinity Cyber is permitted to disclose Company Data to such third party, such disclosure must be limited to the minimum Company Data necessary for the third party to fulfill its obligations to Trinity Cyber in support of the Trinity Cyber’s Services under the Agreement. Trinity Cyber agrees that if Company consents to Trinity Cyber’s disclosure of Company Data to such third party, before making such disclosure Trinity Cyber will enter into a written agreement with the third party that includes obligations that are at least as broad in scope and restrictive as those under this Section 3.4. Nonetheless, Trinity Cyber shall remain at all times accountable and responsible for all actions by such third parties with respect to the disclosed Company Data.
        5. Trinity Cyber represents, warrants, and covenants that it has at least one compliant transfer mechanism in place under GDPR. Trinity Cyber agrees that this Section 3.4 incorporates by reference the European Commission Implementing Decision (EU) on Standard Contractual Clauses for the Transfer of Personal Data from Controllers to Processors Established in Third Countries pursuant to Regulation (EU) 2016/679 of the European Parliament and of the Council (“Model Processor Contract”), where Trinity Cyber shall be deemed for the purposes of this Section 3.4 to be the “data importer,” each of Company’s affiliates established in the EU shall be deemed for the purposes of this Addendum to be the “data exporter,” and the description of the transfer(s) in Annex I.B to the Model Processor Contract shall be the data processing activities in the Agreement and applicable Statements of Work which are such activities necessary for Trinity Cyber to perform its services for Company as described in this Agreement, and the data security measures in Annex II to the Model Processor Contract shall be those identified in this Agreement.
        6. At the request of Company, Trinity Cyber and any affiliate or subcontractor of Trinity Cyber will enter into a separate data processing agreement that incorporates the European Commission Standard Contractual Clauses between Controllers and Processors, or any similar agreement relating to other countries, with one or more of the Company Entities in order to allow Personally Identifiable Data to be transferred to Trinity Cyber and any affiliate or subcontractor of Trinity Cyber by Company Entities operating outside the United States.
        7. Trinity Cyber shall provide Company with a destruction schedule for Company Data and as appropriate, regularly dispose of Company Data that is maintained by Trinity Cyber, but that is no longer necessary to provide Services. Notwithstanding the foregoing, Trinity Cyber shall comply with Company’s written instructions to preserve Company Data in connection with any investigations, lawsuits or other disputes in which any Company Entities may be involved. Except to perform Termination Support, upon termination or expiration of the Agreement for any reason or upon Company’s request, Trinity Cyber shall immediately cease handling Company Data or any portion thereof specified by Company, and shall return in a manner and format reasonably requested by Company, or if specifically directed by Company, shall destroy any or all such Company Data in Trinity Cyber’s possession, power or control, in whatever form, including without limitation all copies, fragments, excerpts, and any materials containing Company Data, whether or not such Company Data has been intermingled with Trinity Cyber’s own information or materials. Upon Company’s instruction to destroy or return Company Data, all copies of Company Data shall be permanently removed from Trinity Cyber’s, it agents’, subcontractors’ and third parties’ systems, records, archives and backups and all subsequent use of such Company Data by Trinity Cyber, its agents, subcontractors and third parties shall cease. Upon request, an officer of Trinity Cyber will certify to Company that all forms of the requested Company Data have been destroyed by providing certificate of destruction containing a description of the data, media type, method of disposal, date of disposal, and signature of Trinity Cyber’s authorized management staff.
      4. Security and Access
        1. Trinity Cyber shall develop, implement, maintain, monitor and comply with a comprehensive, written information security program that contains administrative, technical and physical safeguards to protect against anticipated threats or hazards to the security, confidentiality or integrity of, the unauthorized or accidental destruction, loss, alteration or use of, and the unauthorized access to or acquisition of Company Data. In addition, Trinity Cyber shall provide Company with documentation of such safeguards every twelve (12) months from the effective date of this Agreement and prior to any material change.
        2. Trinity Cyber will ensure that its information security program is consistent with: (i) Company’s information security practices and requirements and which may be updated and issued to Trinity Cyber by Company from time to time; (ii) as applicable, enhanced security provisions governing the use of Sensitive Personal Data in order to comply with all applicable laws, including, without limitation, the Data Protection Requirements (including, without limitation, if applicable, the Massachusetts data security regulations (201 Mass. Code Regs. §§ 17.01 – 17.05)); (iii) as applicable, current PCI Standards; and (iii) other applicable and prevailing standard industry practices.
        3. Trinity Cyber will conduct a risk assessment at least annually, and more frequently if consistent with industry standards, or as may otherwise be reasonably requested by Company, to identify and assess reasonably foreseeable internal and external risks to the security, confidentiality and integrity of electronic, paper and other records containing Company Data, and evaluate and improve, where necessary, the effectiveness of its safeguards for limiting those internal and external risks.
        4. Trinity Cyber shall review and, as appropriate, revise its information security program: (a) at least annually or whenever there is a material change in Trinity Cyber’s business practices that may reasonably affect the security or integrity of Company Data; (b) in accordance with prevailing industry practices; and/or (c) as reasonably requested by Company. If Trinity Cyber modifies its information security program following such a review, Trinity Cyber shall promptly notify Company of the modifications and shall provide the modifications to Company in writing. In the event that Trinity Cyber alters or modify its information security program in such a way that will weaken or compromise the confidentiality and security of Company Data, Company reserves the right, among other remedies under this Agreement, to terminate the Agreement without penalty or suspend Services and payment due. Such termination or suspension will not be considered Company’s breach of the Agreement.
        5. Trinity Cyber agrees that: (a) it will establish, maintain and comply with appropriate access controls consistent with then-current industry best practices, which as of the inception of the Agreement, includes but is not limited to, limiting access to Company Data to the minimum number of Trinity Cyber employees and personnel who require such access in order to provide the Services to Company; (b) its employees and personnel who will be provided access to, or otherwise come into contact with, Company Data will be required (including during the term of their employment or retention and thereafter) to protect such Company Data in accordance with the requirements of this Section 3.4; (c) its employees and personnel who will be provided access to, or otherwise come into contact with, Company Data will have the appropriate qualifications and references (including, without limitation, a requirement that Trinity Cyber conduct background checks of such employees and personnel appropriate for the Company Data to which such employee or personnel is to be given access, prior to such employees or personnel accessing any Company Data) to handle and to protect such Company Data in accordance with the requirements of this Section 3.4; and (d) Trinity Cyber will provide such employees and personnel with appropriate training regarding information security, which shall include, to the extent applicable, the handling of Personally Identifiable Data and Special Personally Identifiable Data, the protection of Payment Data as well as the PCI Standards, and the protection of Company Data at least annually.
        6. Trinity Cyber shall maintain and enforce its information security program at each location from which Trinity Cyber provides the Services. In addition: (a) Trinity Cyber shall ensure that its information security program covers all networks, systems, servers, computers, notebooks, laptops, PDAs, mobile phones, and other devices and media that process or handle Company Data or that provide access to Company Data, or the networks, systems or information of the Company Entities. Moreover, Trinity Cyber shall ensure that its information security program includes, without limitation, industry standard password protections, firewalls and anti-virus and malware protections to protect Company Data stored on computer systems. Trinity Cyber shall regularly test and monitor Trinity Cyber security procedures and systems, and shall conduct periodic reviews to ensure compliance with the requirements set forth herein. Trinity Cyber shall make the results of such reviews available to Company at Company’s request; and (b) Trinity Cyber shall annually upon written request from Company: (i) provide Company with a copy of its SOC1/SOC2 Type II reports or equivalent external assessment report, which shall include an assessment report(s) for any third party supporting the Services, (ii) complete Company’s standard information security questionnaire, which shall include responses to any questions regarding Trinity Cyber’s controls for any part of the Services performed by a third party by or on behalf of Trinity Cyber, and (iii) make available an appropriate senior representative of Trinity Cyber’s information security team to meet with Company’s information security team to discuss any questions or concerns Company may have regarding Trinity Cyber’s information security program; all of which shall be at no additional cost or expense to Company.
        7. Trinity Cyber shall encrypt all records and files containing Company Data in transit and at rest, using industry standard encryption tools, that Trinity Cyber: (a) transmits or sends wirelessly or across public networks; (b) stores on laptops or storage media; (c) where technically feasible, stores on portable devices; and (d) stores on any device that is transported outside of the physical or logical controls of Trinity Cyber. Trinity Cyber shall safeguard the security and confidentiality of all encryption keys associated with encrypted Company Data.
        8. If Trinity Cyber disposes of any paper, electronic or other record containing Company Data, Trinity Cyber shall do so by taking all reasonable steps (based on the sensitivity of the Company Data) to destroy the Company Data by: (a) shredding; (b) completely and permanently erasing and deleting; (c) degaussing; or (d) otherwise modifying Company Data in such records to make it unreadable, unreconstructable and indecipherable. Whenever Company Data is disposed, Trinity Cyber shall provide Company with certificate of destruction which shall include a description of the data, media type, method of disposal, date of disposal, and signature of Trinity Cyber’s authorized management staff or custodian of records.
        9. If Trinity Cyber connects to the computing systems or networks of any Company Entities, Trinity Cyber agrees that: (a) Trinity Cyber will not access, and will not permit any other person or entity to access, the computing systems or networks of the Company Entities without Company’s prior written authorization and any such actual or attempted access shall be consistent with any such authorization; (b) all Trinity Cyber connectivity to the computing systems and networks of Company Entities and all attempts at same shall be only through Company’s security gateways/firewalls; and (c) Trinity Cyber will use the latest available, most comprehensive virus and malware detection/scanning program before any attempt to access any of the computing systems or networks of any Company Entities. Trinity Cyber shall inform Company in writing of the identity of any Trinity Cyber employees and personnel who have access to the systems or networks of Company Entities. Trinity Cyber may change the Trinity Cyber employees and personnel who have access to the systems or networks of Company Entities, provided Trinity Cyber gives prior written notice to Company and receives Company’s written approval before any such change is effective.
        10. Company may perform periodic security assessments of the computing systems and networks of Company or Company Entities, which may include, without limitation, assessment of certain portions of the computing systems and networks of Trinity Cyber, third-party service providers of Trinity Cyber, or Licensees. Trinity Cyber agrees that if any such assessment reveals inadequate security by Trinity Cyber, or third-party service providers of Trinity Cyber, Company, in addition to any other remedies if may have, may suspend Trinity Cyber’s access to the affected computing systems and networks of Company Entities until such inadequate security has been appropriately addressed. Such suspension will not be considered Company’s breach of the Agreement.
      5. Individual Rights
        1. Trinity Cyber must notify Company promptly in writing (and in any event within five (5) days of receipt) of any communication received from an individual relating to his or her request to access, modify or correct Sensitive Personal Data relating to the individual, and Trinity Cyber shall comply with all reasonable instructions of Company before responding to such communications.
        2. Upon receiving a request from Company to provide Company Data related to a specific individual or to delete, anonymize, redact, or otherwise sufficiently obfuscate the PID of a specific individual, Trinity Cyber will do so in accordance with applicable law within five (5) business days. If Trinity Cyber cannot or will not do so, Trinity Cyber must provide notice to Company with the reasons for such. If Trinity Cyber facilitates the request, Trinity Cyber must provide Company with a confirmation once completed.
      6. Audits and Investigations
        1. If Trinity Cyber is requested or required (by oral questions, interrogatories, requests for information or documents in legal proceedings, subpoenas, civil investigative demands or similar processes) to disclose any Company Data to a third party, Trinity Cyber shall immediately notify Company of any such anticipated disclosure (except to the extent precluded by applicable law) and shall not disclose Company Data to the third party without providing Company notice at least forty-eight (48) hours following such request or demand, so that Company may, at its own expense, exercise such rights as it may have under law to prevent or limit such disclosure. Notwithstanding the foregoing, Trinity Cyber shall exercise commercially reasonable efforts to prevent and limit any such disclosure to only such Company Data as Trinity Cyber’s legal counsel has determined is required to be produced and to otherwise preserve the confidentiality of Company Data, including, without limitation, by cooperating with Company to obtain an appropriate protective order or other reliable assurance that confidential treatment will be accorded to Company Data.
        2. Trinity Cyber shall establish and maintain complete and accurate books, notices, and accounting and administrative records necessary to document the proper handling of Company Data under this Section 3.4, including without limitation accounts of all transactions involving Company Data, and shall retain such records pursuant to applicable law. Upon reasonable notice to Trinity Cyber, Trinity Cyber shall permit Company, its auditors, designated audit representatives, and regulators, including, without limitation, data protection regulators, to audit and inspect, at Company’s sole expense (except as otherwise provided in this Section), and no more often than once per year (unless otherwise required by Company’s regulators): (a) the facilities of Trinity Cyber and any third-party service providers of Trinity Cyber previously approved by Company where Company Data is processed, stored or maintained by, or on behalf of, Trinity Cyber; (b) any computerized or paper systems used to share, disseminate or otherwise handle Company Data; (c) Trinity Cyber’s security practices and procedures, facilities, resources, plans and procedures; and (d) all books, notices and accounting and administrative records required to be retained by Trinity Cyber hereunder. Such audit and inspection rights shall be, at a minimum, for the purpose of verifying Trinity Cyber’s compliance with this Section 3.4. If any audit or inspection conducted pursuant to this Section 3.4 reveals a material technical issue, security problem, or other non-compliance with this Section 3.4, Trinity Cyber will pay Company’s costs for conducting such audit and/or inspection and will propose an appropriate written response, including without limitation a plan for the remediation of the identified issue(s), within the time reasonably requested by Company. Upon Company’s approval of such plan, Trinity Cyber will remedy the identified issue(s) according to the plan. Company will not be responsible for any additional costs or fees related to such remedy.
        3. Upon notice to Trinity Cyber, Trinity Cyber shall promptly assist and support Company in the event of an investigation by any regulator, including without limitation a data protection regulator or similar authority, if and to the extent that such investigation relates to Company Data handled by Trinity Cyber. Such assistance and support shall be at Company’s sole expense, except where such investigation was required due to Trinity Cyber’s acts or omissions, in which case such assistance and support shall be at Trinity Cyber’s sole expense.
      7. Trinity Cyber Side Security Incidents
        1. Trinity Cyber is responsible for any and all information security incidents involving Company Data while it is in the possession of Trinity Cyber. Trinity Cyber shall notify Company in writing by email promptly (and in any event within seventy-two (72) hours) whenever Trinity Cyber reasonably believes that there has been an unauthorized acquisition, destruction, modification, use or disclosure of, or unauthorized access to, Company Data while in Trinity Cyber’s possession (“Trinity Cyber Side Security Incident”). After providing such notice, Trinity Cyber will investigate the Trinity Cyber Side Security Incident, take reasonable steps to eliminate or contain the exposures that led to such Trinity Cyber Side Security Incident, document all information collected as part of its investigation of the Trinity Cyber Side Security Incident, keep Company advised of the status of such Trinity Cyber Side Security Incident and all matters related thereto, and provide Company the opportunity to review and approve all public-facing communication prior to dispatch. Trinity Cyber further agrees to provide, at Trinity Cyber’s sole cost, reasonable assistance and cooperation requested by Company and/or Company’s designated representatives, in the furtherance of any correction, remediation, or investigation of any such Trinity Cyber Side Security Incident and/or the mitigation of any damage, including, without limitation, any notification that Company may determine appropriate to send to individuals impacted or potentially impacted by the Trinity Cyber Side Security Incident, and/or the provision of any credit reporting service that Company deems appropriate to provide to such individuals. Unless required by law, Trinity Cyber shall not notify any individual or any third party other than law enforcement of any potential Trinity Cyber Side Security Incident involving Company Data without first consulting with, and obtaining the permission of, Company.
        2. To the extent that a Trinity Cyber Side Security Incident is caused by Trinity Cyber’s breach of this Agreement or gross negligence or willful misconduct, Trinity Cyber will, at Trinity Cyber’s sole cost (i) assist in providing notice relating to the Trinity Cyber Side Security Incident to impacted individuals or third parties as directed and approved by Company, (ii) prepare public-facing and regulatory responses and notifications and provide Company the opportunity to review and approve all communications prior to dispatch, (iii) handle all applicable public-facing and regulatory responses to the Trinity Cyber Side Security Incident and notifications thereof, and (iv) provide credit monitoring services to impacted individuals for a period of one year, if required by law.
        3. In addition, within thirty (30) days of identifying or being informed of a Trinity Cyber Side Security Incident, Trinity Cyber shall develop and execute a plan that reduces the likelihood of a recurrence of such Trinity Cyber Side Security Incident.
        4. Trinity Cyber agrees that, due to the unique nature of Company Data, the unauthorized disclosure or use of Company Data may cause irreparable harm to Company, the extent of which will be difficult to ascertain and for which there will be no adequate remedy at law. Accordingly, Trinity Cyber agrees that Company, in addition to any other available remedies, shall have the right to seek an immediate injunction and other equitable relief enjoining any breach or threatened breach of the provisions of this Section 3.4 without the necessity of posting any bond or other security.
    5. Company Identity. If the need arises to use Company Data to improve security or in connection with enhancing Trinity Cyber’s Services and deliverables to Company and to other Trinity Cyber clients, such as identifying and describing a large cybersecurity threat across many sectors, Trinity Cyber shall anonymize any reference to Company and use other means to disguise the identity of Company in such data ("Generic Data"). Company hereby grants to Trinity Cyber a royalty-free, worldwide, transferable, sublicensable, irrevocable, perpetual license to use, copy, prepare derivative works of, distribute copies of, alter, and translate Generic Data.
  4. Service Charges, Billing, and Payment
    1. Service Charges. In exchange for Trinity Cyber Services, Company shall pay Trinity Cyber, or the Authorized Reseller if applicable, the applicable fee set forth in the Order (the “Subscription Fee”). With the sole exceptions set forth under the Termination section herein, Subscription Fees are non-refundable, regardless of whether or not Solution Services were actively used by Company during any time period.
    2. Payment and Payment Terms. Unless otherwise agreed in an applicable Order, Company shall pay Trinity Cyber all amounts owed pursuant to this Agreement within thirty (30) days of the date of the invoice for such amounts, without deduction, setoff, defense, or counterclaim for any reason. Payment obligation begins upon acceptance. Trinity Cyber may withhold or block Company’s access to the Solution or cease performance of the Services when any amount required to be paid by Company remains due and unpaid fifteen (15) days beyond the date when such amount is due. Company shall provide to Trinity Cyber complete and accurate billing information including, but not limited to, Company’s legal name, billing address, e-mail address, and the name and telephone number of an authorized billing contact. Company shall notify Trinity Cyber of any change in the aforementioned billing information within thirty (30) days of such change. Any payment not received from Company by the due date may accrue, at Trinity Cyber’s discretion, late charges at the rate of 1.5% of the outstanding balance per month, or the maximum rate permitted by law, whichever is lower, from the date such payment was due until the date received. This section shall not apply if the applicable Order is with an Authorized Reseller, in which case payment terms shall be as agreed between Company and the Authorized Reseller.
    3. Taxes. Unless otherwise stated, fees do not include any Taxes. Company is responsible for paying all Taxes associated with its purchases hereunder. If Trinity Cyber has the legal obligation to pay or collect Taxes for which Company is responsible under this Section, the appropriate amount shall be invoiced to and paid by Company, unless Company provides Trinity Cyber with a valid tax-exemption certificate authorized by the appropriate taxing authority.
    4. Method of Payment. The method of payment by Company to Trinity Cyber shall be electronic transfer to the applicable account identified by Trinity Cyber from time to time.
  5. Indemnification
    1. Company Indemnification Company shall defend, indemnify, and hold harmless Trinity Cyber, its officers, directors, employees, and agents, from and against all claims, damages, obligations, losses, liabilities, costs, and expenses (including reasonable attorney’s fees) arising out of any third-party claim arising from or relating to: (a) Company’s use of or access to the Solution and/or any other Trinity Cyber Asset, except for claims within the scope of Section 5.2 below; (b) Company’s breach of any term of this Agreement; or (c) the gross negligence or willful misconduct of Company, its employees or agents; provided, however, that Trinity Cyber gives Company prompt written notice of any such claim, and that Trinity Cyber must reasonably cooperate with Company in such defense.
    2. Intellectual Property Rights Indemnity. Trinity Cyber shall defend, indemnify and hold harmless Company, its officers, directors, employees and agents, from and against all claims, damages, obligations, losses, liabilities, costs and expenses (including reasonable attorney’s fees) arising out of any third-party claim that a Trinity Cyber Asset infringes a United States IPR; provided, however, that (a) Company gives Trinity Cyber prompt written notice of any such claim; (b) Trinity Cyber will have the right to control and direct the defense of such claim; and (c) Company must fully cooperate with Trinity Cyber in such defense.
    3. Intellectual Property Rights Exclusions. Trinity Cyber shall have no obligations under Section 5.2 or any other liability for any claim of infringement or misappropriation resulting or alleged to result from: (a) any modification, alteration, or enhancement to the applicable Trinity Cyber Asset by any person or entity other than Trinity Cyber; (b) any use of the applicable Trinity Cyber Asset by Company in any manner for which the Solution was not designed; (c) the combination, operation, or use of the applicable Trinity Cyber Asset or any part thereof in combination with any equipment, software, data, or documentation not approved by Trinity Cyber; (d) materials, items, resources, or services provided or performed by Company (whether or not used in connection with or incorporated into the Solution); or (e) Company’s continuing the allegedly infringing activity after being notified thereof or after being informed of and provided with modifications that would have avoided the alleged infringement.
    4. Intellectual Property Rights Remedies. In the event an infringement or misappropriation claim as described in Section 5.2 arises, or if Trinity Cyber reasonably believes that a claim is likely to be made, Trinity Cyber shall have the right, at its sole option, to: (a) modify the applicable portion of the Trinity Cyber Assets to become non-infringing but functionally equivalent; (b) replace the applicable portion of the Trinity Cyber Assets with material that is non-infringing but functionally equivalent; (c) obtain for Company the right to use the applicable portion of the Trinity Cyber Assets upon commercially reasonable terms; (d) remove the infringing or violative aspect of the Trinity Cyber Assets if it can be removed without material degradation of the applicable Trinity Cyber Asset; or (e) if none of (a)-(d) are commercially practicable, terminate this Agreement by providing written notice to Company and refund to Company a pro-rata portion of any prepaid Subscription Fees for the remaining paid period after the effective date of such termination. Section 7 sets forth Company’s sole and exclusive remedy and Trinity Cyber’s entire liability with respect to IPR infringement or misappropriation claims, including patent or copyright-infringement claims and trade-secret misappropriation.
  6. Warranties
    1. Mutual Warranties. Each Party represents and warrants that: (a) it has full authority to enter into this Agreement; (b) it has not, nor will not, enter into any agreement with any third party that would prohibit or impair in any manner its ability to perform its obligations under this Agreement; and (c) it will perform its obligations under this Agreement in a professional manner and in compliance with applicable laws, or regulations or orders of duly authorized regulatory bodies with jurisdiction over Company or Trinity Cyber (as applicable) (collectively, "Applicable Laws").
    2. Solution Warranties. Trinity Cyber represents and warrants that the Solution will perform substantially in compliance with the description herein and in the applicable, then-current URL Terms at Notwithstanding anything to the contrary set forth herein, in the event that the Solution fails to conform to the foregoing warranty in any material respect, Company’s sole and exclusive remedy will be for Trinity Cyber, at its expense, to promptly use commercially reasonable efforts to cure or correct such failure, or, in the event such cure or correction is not commercially viable and completed in a commercially reasonable period of time, which in no event shall be less than thirty (30) calendar days, terminate the Agreement. The foregoing warranty is expressly conditioned upon: (i) Company providing Trinity Cyber with prompt written notice of any claim thereunder no later than thirty (30) days after discovering the non-conformity, which notice must identify with particularity the non-conformity; (ii) Company’s full cooperation with Trinity Cyber in all reasonable respects relating thereto, including, in the case of modified software, assisting Trinity Cyber to locate and reproduce the non-conformity; (iii) Company performing its obligations under this Agreement; (iv) Company utilizing correct data and procedures; and (v) the absence of any alteration or other modification of the Solution by any person or entity other than Trinity Cyber.
    4. Trinity Cyber further disclaims all responsibility for any loss, injury, claim, liability, or damage of any kind resulting from, arising out of, or in any way related to Company’s use of any equipment or software in connection with the Solution or the information accessible therefrom.
    5. Company assumes the full and sole responsibility and liability as to its use of the Solution. Company shall have the sole responsibility to verify that the Solution meets its requirements, and to ensure the accuracy of Company Data.
  7. Limitation of Liability
  8. Confidential Information
    1. Definition. “Confidential Information” of a Party means any non-public information or materials belonging to, concerning, or in the possession or control of such Party or its affiliates (the “Disclosing Party”) that is furnished, disclosed, or otherwise made available (directly or indirectly) to the other Party (or persons acting on such other Party’s behalf) (the “Receiving Party”) in connection with this Agreement and which is either marked or identified as confidential or proprietary or is of a type that a reasonable person would recognize it to be confidential or proprietary.
    2. Confidentiality Obligations. For a period of five (5) years from the date of expiration or termination of this Agreement, or if an item is a trade secret or otherwise an IPR of Trinity Cyber, so long as the item remains a trade secret or an IPR of Trinity Cyber, the Receiving Party shall: (a) hold the Confidential Information in strict confidence and avoid the disclosure thereof to any third party by using the same degree of care as it uses to avoid the unauthorized use or disclosure of its own Confidential Information of a similar nature, but not less than reasonable care; and (b) not use the Confidential Information for any purpose except as expressly contemplated under this Agreement. To the extent that Trinity Cyber receives from the Company information that meets the definition of “personally identifiable information” (“PII”), the confidentiality restrictions of this Agreement shall remain in effect unless and until one of the exceptions in Section 8.3 applies to it. The Receiving Party shall restrict the possession and use of Confidential Information to its employees and agents who have a need to know and are bound by confidentiality obligations no less stringent than those contained herein. The Receiving Party may disclose Confidential Information as required by law or legal process, provided the Receiving Party discloses only such information as is required by law and, if permitted by law, uses reasonable efforts to notify the Disclosing Party of such disclosure in sufficient time to allow the Disclosing Party to seek a protective order or similar confidential treatment. Receiving Party shall promptly notify the Disclosing Party of any facts known to such Party regarding any unauthorized disclosure or use of the Confidential Information. Each Party acknowledges that its breach of the obligations set forth in this Section may cause irreparable harm for which the other Party shall be entitled to seek injunctive or other equitable relief. All Confidential Information shall remain the exclusive property of the Disclosing Party.
    3. Limitations. Confidential Information shall not include any information that: (a) was demonstrably known by the Receiving Party before disclosure by the Disclosing Party; (b) becomes public knowledge or otherwise known to the Receiving Party after such disclosure, other than by breach of a confidentiality obligation; or (c) is independently developed by the Receiving Party by persons without access to such information.
    4. Non-Disclosure of Agreement Terms. Neither Party shall disclose the terms of this Agreement without the prior written consent of the other Party, except that each Party may: (a) make such disclosures as are necessary to comply with Applicable Laws or as necessary to enforce this Agreement; and (b) disclose the terms of this Agreement to such Party’s auditors, attorneys, accountants, or bankers as necessary for their rendition of services to such Party
    5. Return or Destruction of Confidential Information. Upon termination of this Agreement for any reason or upon the other Party’s written request, each Party promptly shall: (a) return or destroy, at the other Party’s direction, all material embodying the Confidential Information of the other Party in such Party’s possession, custody, or control, except that either Party may retain a copy of the other Party’s materials as legally required or as required by its document retention policy or archiving and backup IT processes; and (b) if requested by the other Party, deliver an affidavit certifying that such Party has complied with the obligations set forth herein.
  9. Termination
    1. Termination for Cause. Either Party (the “Non-Breaching Party”) may, without prejudice to any other right or remedy, terminate this Agreement upon written notice to the other Party if any of the following events occur by or with respect to such other Party (the “Breaching Party”): (a) the Breaching Party commits a material breach of any of its obligations hereunder and fails to cure such breach within thirty (30) days after receipt of notice of such breach or fails to reach an agreement with the Non-Breaching Party regarding the cure thereof; or (b) any insolvency of the Breaching Party, any filing of a petition in bankruptcy by or against the Breaching Party, any appointment of a receiver for the Breaching Party, or any assignment for the benefit of the Breaching Party’s creditors.
    2. Effect of Termination. Upon termination or expiration of this Agreement, (a) all rights granted to Company hereunder shall cease; (b) Company shall immediately cease, and ensure that all Authorized Users cease, any and all access to and use of the Solution and all other Trinity Cyber Assets; (c) each Party shall return to the other any Confidential Information; (d) Trinity Cyber shall use its best efforts to facilitate the Company’s reversion back to its pre-Agreement internet traffic flow, including the following two-step process: first, immediately upon termination, Trinity Cyber will arrange for the Company’s internet traffic to bypass Trinity Cyber’s Solution; and second, Trinity Cyber will work with the Company to schedule a mutually agreeable time to disconnect the Company’s internet traffic from Trinity Cyber’s technology; (e) upon written request, Trinity Cyber will delete Company’s data from its system and servers; and (f) upon written request, either Party shall deliver to the other an affidavit from an appropriate officer that certifies compliance with these termination obligations.
    3. Suspension. Trinity Cyber may (without prejudice to any other right or remedy and without liability) suspend access to the Solution immediately if: (a) Trinity Cyber has a right to terminate this Agreement; (b) Company is in violation of its obligations hereunder; or (c) the acts or omissions of Company or its agents create a material risk to the Solution or Trinity Cyber’s reputation. Suspension will continue until the grounds for suspension are removed to Trinity Cyber’s reasonable satisfaction. Company remains liable to pay the charges under this Agreement during any period of suspension.
  10. Audits and Records
    1. Maintenance of Books and Records. Each Party shall at all times maintain complete and accurate books and records relating to its activities and performance under this Agreement (“Records”).
    2. Audit Rights. During the Term and for a period of one (3) years thereafter, each Party shall make its Records available to the other Party (or its auditors) upon Trinity Cyber’s reasonable request for the purposes of verifying Company’s performance and compliance with this Agreement; provided, however in no event shall such Records include information on or the right or access to the Solution as such access could weaken the effectiveness of the Solution. Such audit shall be conducted with the cooperation of the Parties and during normal business hours.
  11. Restrictive Covenants
    1. Non-Solicitation. In consideration of the access to the Solution and the Confidential Information of Trinity Cyber, Company shall not solicit for employment or hire any current or former employee of Trinity Cyber without Trinity Cyber’s prior written consent. Nothing contained herein shall prohibit the hiring of any person who responds to a job posting advertised in publications of general circulation. The terms of this Section 11.1 shall survive for a period of twelve (12) months after the end of the Term or, with respect to any employee whose employment is terminated prior to the end of the Term, for a period of twelve (12) months after the end of such employee’s employment with Trinity Cyber.
    2. Non-Compete. In consideration of the access to the Solution and the Confidential Information of Trinity Cyber, Company agrees that during the Term of the Agreement and for two (2) years thereafter, Company shall not develop, offer, sell, or distribute a product that is completely or considerably similar to the Solution or considered a copy of the Solution. Company acknowledges and agrees that any breach of this Section 11.2 during the Term is grounds for immediate termination of this Agreement by Trinity Cyber with no liability on the part of Trinity Cyber.
    3. Reasonableness. Company acknowledges and agrees that to perform its obligations hereunder, it will require access to and use of the Solution and the Confidential Information of Trinity Cyber. Company acknowledges and agrees that the Solution has an international marketplace and that lack of a geographical limitation and the period of the time limitation for these restrictive covenants are both reasonable.
  12. Restrictive Covenants
    1. No Third-Party Beneficiaries. The Parties acknowledge and agree that this Agreement is entered into by and between, and for the sole benefit of, Trinity Cyber and Company, and their respective affiliates, and that there are no third-party beneficiaries of this Agreement.
    2. Assignment. The Agreement shall be binding on the Parties and their successors and permitted assigns. Neither Party shall assign, transfer, or delegate any of its rights, duties, or obligations under this Agreement, or any part thereof, whether by operation of law or otherwise, without the prior written consent of the other Party. Notwithstanding the above, Trinity Cyber may assign its rights and obligations under this Agreement, without the consent of Company, to an Affiliate, to a successor in interest to all or substantially all of its business or assets, or in connection with a divestiture or other similar transaction involving the line(s) of business that provide Services or deliverables under this Agreement. For purposes of this paragraph, “Affiliate” means any entity that directly or indirectly controls, is controlled by, or is under common control with the applicable entity. For purposes of this definition, “control” means, direct or indirect, ownership or control of more than fifty percent (50%) of the applicable entity.
    3. Relationship. The Parties shall at all times be independent contractors with respect to each other in carrying out this Agreement, and nothing herein renders them partners, joint venturers, agents, or employer and employee.
    4. Notices. All notices required or permitted under this Agreement shall be in writing, and shall be delivered to Trinity Cyber personally or by email to and to Company at the addresses set forth in the Order. Either Party may change its address for notices from time to time by providing written notice of such change to the other Party.
    5. Publicity; Press Releases. Company shall not, without the prior written consent of Trinity Cyber in each instance: (a) issue any press releases or make any public statements concerning the existence of or activities under this Agreement; or (b) disclose the terms of this Agreement to any third party other than its legal, financial, and other advisors under a duty of confidentiality, or as may be required under Applicable Laws. Company hereby grants to Trinity Cyber permission to refer to Company as a customer of Trinity Cyber.
    6. Waiver. No delay or omission by either Party to exercise any right occurring upon any non-compliance or default of the other Party with respect to any of the terms of this Agreement shall impair any such right or be construed to be a waiver thereof.
    7. Severability. In the event any provision of this Agreement is determined by a court of competent jurisdiction to be invalid or unenforceable under Applicable Laws, such provision shall be amended and interpreted to accomplish the objectives of such provision to the greatest extent possible under Applicable Laws, and the remaining provisions of this Agreement shall continue in full force and effect.
    8. Governing Law. The Agreement shall be governed by and construed in accordance with the laws of the State of Delaware, without reference to the principles of conflicts of law that would apply the substantive laws of another jurisdiction.
    9. Informal Dispute Resolution. Prior to instituting formal proceedings, the Parties shall attempt to resolve all disputes arising out of or relating to the Agreement informally.
      1. If a dispute arises between the Parties, a Party may escalate the dispute to one of its senior executives and request that the other Party do the same. The other Party shall make such escalation and notify the other Party of the name and contact information of the counterpart senior executive within ten (10) days of receipt of the request.
      2. Should any dispute remain unresolved thirty (30) business days after escalating it to senior executives, the matter may be referred to binding and confidential arbitration in accordance with Section 12.10(c) below.
      3. Any dispute, claim or controversy arising out of or relating to this Agreement or the breach, termination, enforcement, interpretation, or validity thereof, including the determination of the scope or applicability of this Agreement to arbitrate, shall be determined by arbitration before one arbitrator. The arbitration shall be administered by JAMS pursuant to JAMS’ Streamlined Arbitration Rules and Procedures.
      4. The arbitrator shall issue a decision in writing, stating reasons therefor, including both findings of fact and conclusions of law, and may award any remedy available at law or in equity consistent with the terms of this Agreement. The arbitrator shall have no power to amend or supplement this Agreement to award damages other than as permitted by this Agreement, or to fail to follow Applicable Laws. Any award rendered by the arbitrator shall be final and binding on the Parties. Judgment on the award may be entered in any court having jurisdiction. The arbitration and judgment shall be kept confidential by both Parties except as expressly permitted in this paragraph.
      5. Nothing in this Section shall prevent, or be construed as preventing, a Party from (i) instituting formal proceedings to avoid the expiration of any applicable limitations period; or (ii) seeking injunctive or other equitable relief in a court of appropriate jurisdiction.
    10. Injunctive Relief. Notwithstanding anything herein to the contrary, each Party shall be entitled to seek injunctive or equitable relief whenever the circumstances permit such Party to seek such equitable relief in a court of competent jurisdiction. Company acknowledges and agrees that the copying, disclosure, use or modification of the Solution or Trinity Cyber’s Confidential Information in any manner that is inconsistent with any terms or conditions of this Agreement shall cause irreparable injury to Trinity Cyber for which Trinity Cyber will not have an adequate remedy at law. Accordingly, Trinity Cyber shall be entitled to equitable relief in court, including but not limited to temporary restraining orders, preliminary injunctions, and permanent injunctions.
    11. Attorneys' Fees. In the event of an alleged breach of this Agreement, the prevailing Party shall be entitled to reimbursement of all of its costs and reasonable attorneys’ fees incurred in connection with such dispute or litigation, including any appeal therefrom. The prevailing Party shall be determined by the court that resolves such dispute or litigation.
    12. Survival. Notwithstanding anything to the contrary contained herein, all terms of this Agreement relating to confidentiality, proprietary rights, indemnification, disclaimers of warranty and limitations of liability, as well as those terms that by their nature survive any expiration or termination of this Agreement, shall survive.
    13. Insurance. Each Party shall maintain commercially reasonable levels of insurance related to its obligations hereunder.
    14. Force Majeure. Neither Party shall be liable for any failure or delay in the performance of its obligations, due to fire, flood, earthquake, elements of nature or acts of God, acts of war, military aggression, terrorism, riots, civil disorder, rebellions, nor other similar cause beyond the reasonable control of the Party affected (each, a “Force Majeure Event”).
    15. Headings. The headings of the various sections in this Agreement are for convenience of reference only and shall not affect the construction or interpretation of this Agreement or this Agreement.
    16. Modifications. The Agreement may be modified only pursuant to a writing executed by authorized representatives of both Parties. The Parties expressly disclaim the right to claim the enforceability of any oral modifications to this Agreement or any amendments based on course of dealing, waiver, reliance, estoppel, or other similar legal theory.
    17. Entire Agreement. The Agreement, including the Schedules attached hereto and incorporated herein by this reference, sets forth the entire and exclusive agreement between the Parties as to the subject matter hereof and supersedes all prior and contemporaneous understandings, negotiations and agreements, whether written or oral, between the Parties.
    18. Counterparts. The Agreement and any addendum thereto may be executed in one or more counterparts all of which taken together shall constitute one and the same instrument. An electronic signature shall be as legally effective as an original signature.
  13. Definitions
    1. Authorized Reseller. A company or person authorized by Trinity Cyber to sell Service subscriptions.
    2. Customer Portal. The Customer Portal dashboard designed primarily to allow Company personnel to (i) monitor the actions taken by Trinity Cyber on its Internet Traffic, as well as additional useful and valuable information, and (ii) communicate directly with the Trinity Cyber Operations Center. The Customer Portal is Company facing and Company specific and is built on an Application Programming Interface (API) that provides a window into every action that Trinity Cyber performs on Company’s traffic. The reporting delivered through the Customer Portal is a direct reflection of the threats disrupted by Trinity Cyber’s Solution (or the threats that would have been disrupted during Burn-In mode). All threat and response data provided on the Customer Portal is specific to Company’s traffic. Company may use this Internet facing application to report Errors and the correction thereof, and for submitting all manner of support requests. Communications with Trinity Cyber can also be telephonic (see Operations Center below).
    3. Error. Error means a material deviation in the performance of the Solution from the then-current description.
    4. Internet Traffic. The segment or segments of Company’s Internet traffic to be run through the Solution, any information needed to transport it through Trinity Cyber technology, and the segment or segments of Company Internet traffic treated by Trinity Cyber Services.
    5. Initial Term. One year unless otherwise stated in an Order.
    6. Order. A written order or quote document from Trinity Cyber or its Authorized Reseller and accepted by Company identifying the specific Services to be delivered, prices, and other details, and making express reference to this Agreement.
    7. Party or Parties. Trinity Cyber and/or Company.
    8. Renewal Term. Subsequent one-year term for the Services after completion of the Initial Term.
    9. Service Date. The earlier of the date on which (a) Trinity Cyber notifies Company that the Solution is available for Company’s traffic, or (b) Company first uses the Service.
    10. Service Level Agreement (SLA). The then-current Service Level Agreement at
    11. Solution or Services. A technology enabled service in which Trinity Cyber tunes, maintains, updates, and operates, its proprietary technology on Company’s Internet traffic, inspecting and taking direct actions on identified malicious traffic to render malicious traffic inert or ineffective, onboarding professional services, and various other professional services designed to increase the Company’s network security. Trinity Cyber’ proprietary technology, understanding of cyber vulnerabilities, threat and adversary tradecraft for exploiting vulnerabilities, as well as the technical and engineering knowledge and know-how to build, maintain, tune, and operate its in-line services to detect malicious traffic and to perform near real time actions to render malicious traffic inert or ineffective, and to do so surreptitiously in ways that protect the Company and deceive and disrupt cyber attackers, are collectively the Solution and interchangeably Solution, Services, and Solution Services. Showing potential threats addressed or discovered, and the preventive actions taken by Trinity Cyber, to the Company’s designated Information Technology (IT) or security operations personnel is part of Solution Services.
    12. Tax or Taxes. All taxes arising in any jurisdiction, including without limitation all: sales, use, excise, gross receipts, value added, access, bypass, franchise, telecommunications, property (for co-location customers), consumption, or other taxes, fees, duties, charges or surcharges (however designated) which are imposed on or based on the provision, sale or receipt of the benefit of Solution Services, including such taxes imposed directly on Trinity Cyber or for which Trinity Cyber is permitted to invoice Company in connection with Trinity Cyber’s performance under this Agreement. Taxes do not include Trinity Cyber’s income taxes.
    13. Term. Term means, collectively, the Initial Term and any Renewal Terms.
    14. Trinity Cyber. For purposes of the Agreement, “Trinity Cyber” means the entity identified below based on Company’s billing address and the services covered by the Agreement.

      For Agreements covering subscriptions to Trinity Cyber Network Security Service Tiers (sometimes referred to as “TC:Edge”), certain File Submission and Inspection Services (sometimes referred to as “TC:File”) when included in a commercial subscription tier, PCAP Services, or Installation/Professional Services:
      Company’s billing address Trinity Cyber contracting entity
      Australia and New Zealand Trinity Cyber, Australia Pty Ltd.
      United States and any other location not covered above Trinity Cyber, Inc., a Delaware corporation, having offices at 16701 Melford Blvd., Suite 300, Bowie, MD 20715
    15. URL Terms. URL Terms means, collectively, the Commercial Subscription Agreement, ToS, then-current service specific terms at, and SLA.
  14. Region-Specific Terms
    1. Company agrees to the following modifications to the Agreement if Company’s billing address is in the applicable region as described above:
    2. Asia Pacific - All regions. Section 4.3 (Taxes) is replaced as follows:
      • 4.3 Taxes. Trinity Cyber will itemize any invoiced Taxes. If Taxes must be withheld from any payment to Trinity Cyber, then Company will increase the payment to Trinity Cyber so that the net amount received by Trinity Cyber is equal to the amount invoiced, without reduction for Taxes.
      • The definition of "Taxes" under Section 13.12 (Tax or Taxes) is replaced as follows:
      • 13.12 Tax or Taxes. Tax means all government-imposed taxes, as per the applicable law associated with the rendering and performance of the Services, including but not limited to any duties, customs duties, and any direct or indirect taxes, including any related penalties or interest, except for taxes based on Trinity Cyber’s profit.
    3. North America - United States.
      • A new Section 12.19 is added:
      • 12.19 U.S. Federal Agency Users. The Services were developed solely at private expense and are commercial off the shelf services within the meaning of the applicable Federal Acquisition Regulations and their agency supplements.

Service Level Agreement

This Service Level Agreement (“SLA”) is part of the Commercial Subscription Agreement (“CSA”) between Company and Trinity Cyber. Capitalized terms used herein that are not defined in this SLA shall have the meaning attributed to them in the Terms of Service (“ToS”).
Trinity Cyber is committed to providing effective, reliable, highly accurate and available security services without negatively affecting the availability or latency of Company’s internet service. As a part of this commitment, Trinity Cyber personnel will install new customers quickly and effectively, and provide support in a timely and professional manner. Our service is designed to remain available and highly performant, and not to interrupt customer internet services or business operations.

    1. Installation Commitment Trinity Cyber will install its service within 60-90 business days measured from the effective date of a Commercial Subscription Agreement. If Trinity Cyber fails to meet this commitment, Company will receive one-month Service Credit for every month of delay. Trinity Cyber’s Installation Commitment is subject to the condition that Company or its representatives must cooperate with Trinity Cyber in the installation process, which includes providing timely and accurate information about Company network, timely access to network configuration information and traffic, and cooperates in making any necessary network infrastructure configuration changes. This commitment does not apply to on-premise deployments.
    2. Trinity Cyber System Availability and Performance Commitments. Trinity Cyber services and technologies are designed to be highly available and low latency, and its preventive security controls are designed not to be visible to hackers or disruptive to customer operations.
      1. Trinity Cyber System Availability. Trinity Cyber guarantees 99.999% availability of its service over the period of each full calendar month (the “System Availability Target”), excluding occasional scheduled maintenance outages, which will be coordinated in a manner mutually acceptable and approved in advance by the Company and Trinity Cyber. On occasion, Trinity Cyber may place the inline components of Trinity Cyber services in bypass for the purpose of trouble shooting Company network issues. The time during which Trinity Cyber has intentionally placed its inline components into bypass for the purpose of trouble shooting is not included in the calculation of system availability.
        System Availability Service Credit
        ≥ 99.999% N/A
        < 99.999% but ≥ 99.99% 3 days
        < 99.99% but ≥ 99.00% 7 days
        < 99.00% but ≥ 98.00% 15 days
        < 98.00% 30 days
      2. Trinity Cyber System Processing. Trinity Cyber commits to processing Company internet traffic with an average latency of 3 milliseconds or less, measured as an average of all Company Internet traffic processed by Trinity Cyber over the course of a 90-day period corresponding to the four quarters of the calendar year. Trinity Cyber processing latency will be measured from the time data arrives at a Trinity Cyber processing stack until the data leaves it. This includes all load balancing, switching, and routing components in addition to the actual security processing. It does NOT include any transport latency to or from Trinity Cyber’s point of presence, transfer latencies for protocols layers above the data link layer, or latencies introduced due to the dynamic nature of the Internet. As a full-session store-and-forward proxy, latency cannot be measured at a packet level for all traffic. Some protocols, e.g. ICMP, can be measured at a per-packet layer. Others, e.g. HTTP, are proxied such that packets and segments are turned into data streams and objects before being processed and then forwarded.
      3. Trinity Cyber System Security Controls. Trinity Cyber maintains a False Detection Rate (FDR) less than 1% for all Formulas, averaged over the course of a 90-day period corresponding to the four quarters of the calendar year. Trinity Cyber will routinely implement new preventive Formulas on behalf of Company, and will maintain the same levels of accuracy and efficacy of these updates. Automated actions taken on Company’s Internet Traffic by Trinity Cyber’s Solution are tailored to minimize business impact and maximize business continuity. Every action taken will be communicated to Company, as appropriate, through Trinity Cyber’s Customer Portal, or via its Application Programming Interface (API). Customer Portal information will provide necessary timestamps and any telemetry exposed to Trinity Cyber that will aid in tracing a threat or Formula event.
      4. Commitment Not to Interrupt Company Internet Service. Most of Trinity Cyber’s services utilize inline technology. For Company’s receiving inline services, Trinity Cyber represents very little risk to Company internet availably and reliability. While using Trinity Cyber services, excluding all things outside the control or fault of Trinity Cyber, Company will experience at least 99.999% internet service availability at up to the data rate Company purchased from its Internet Service Provider (ISP) averaged across an aggregate of typical network traffic over the period of one calendar month (the “Internet Service Availability Target”). No guarantees are made about individual connections or specific protocols. Trinity Cyber will make every effort practicable to maintain the availability of Company’s network services up to and including bypassing the inline components of the Trinity Cyber Solution for the purpose of trouble shooting, to prevent or limit internet service interruption, or both. Trinity Cyber will proactively monitor its Solution as it relates to Company’s network performance to proactively mitigate potential fault conditions, and will respond to Company notices of suspected interruption promptly (see Severity 1 Response below).
        Internet Availability Service Credit
        ≥ 99.999% N/A
        < 99.999% but ≥ 99.99% 3 days
        < 99.99% but ≥ 99.00% 7 days
        < 99.00% but ≥ 98.00% 15 days
        < 98.00% 30 days
    1. Company recognizes that the Internet is a diverse collection of independently operated networks, equipment, and service providers. Transit from Company’s point(s) of presence to Trinity Cyber’s point(s) of presence will be designed for mutually agreed upon optimal computer network and financial attributes, but is outside the control of either Company or Trinity Cyber. No attributes of performance described herein that cannot be controlled by Trinity Cyber will be attributed to it. It is incumbent upon Company personnel to also do their due diligence and ensure fail-safes and automated bypass capabilities are in place to mitigate any failures outside the control of either Company or Trinity Cyber.

      Trinity Cyber can provide engineering design support and documentation sufficient to ensure Company is comfortable with their recourse options should Trinity Cyber be unable, for reasons outside of their control, to alleviate an availability or performance issue in a timely manner.
    1. Formula. Trinity Cyber defines a Formula to be a combination of 1) complex detection logic (part of a powerful new syntax developed to interrogate fully parsed and indexed network content that Trinity Cyber scanning engines, decoders, and parsers expose) and 2) automated mitigation syntax that employs tailored mitigation actions to prevent or modify a threat inline.
    2. Error. Error means a material deviation in the performance of the Solution from the then-current description.
    1. In the event that (i) the System Availability Target is not met for 3 months in a rolling 12 month period, or (ii) the Internet Service Availability Target is not met for 3 months in a rolling 12 month period, then Company may terminate the CSA and/or the applicable Order by providing written notice to Trinity Cyber, and Trinity Cyber shall refund to Company a pro-rata portion of any prepaid Subscription Fees for the remaining paid period after the effective date of such termination.
    1. Service Credit. In the specific circumstances set forth in Sections 1.1, 1.2.1 and 1.3., and only in those circumstances, monetary payment for violations of this SLA will be provided in the form of a credit to the Company (“Service Credits”) upon review by Trinity Cyber following the Service Credit Claim Process in Section 5.2. Service Credits will be proportional to the period impacted and monthly billable service prices, in accordance with circumstances described in Section 1.1 and the Service Credits listed in the tables in Sections 1.2.1 and 1.3.
    2. Service Credit Claim Process. In order to initiate a claim for a Service Credit, Company must contact Trinity Cyber within thirty (30) days after the incident has been resolved, for which credit is requested. Claims should be initiated at The Service Credit request must be made in writing and must provide: (a) the Company name and contact information; (b) the date and beginning/end time of the claimed outage or failed metric; and (c) a brief description of the characteristics of the claimed outage or failed metric.
    1. The Service Credits and the termination rights set forth in Section 4 above are Company’s sole and exclusive remedies, and Trinity Cyber’s sole and exclusive obligations and liabilities, for any failure of Trinity Cyber to meet the System Availability Target or the Internet Service Availability Target or to install the service.
    1. Trinity Cyber support services are available through the Trinity Cyber online Customer Portal 24x7x365. Response times will vary based on the severity level of the reported issue and subscription tier. Details are set forth in the chart below. Trinity Cyber support services also are available via telephone at 1-240-842-9930 for severity level 1 issues.

      Upon reporting the issue or inquiry, reported issues and inquiries will be assigned a unique Case ID number and such number must be used in all future correspondence until the issue or inquiry is resolved. Trinity Cyber will respond to Company personnel according to the severity and support levels below:
Trinity Cyber Support Core Advanced Premium
Customer Portal Access 24 x 7 x 365
Phone: 1-240-842-9930 Severity L1 Only Severity L1 Only
Monthly / Quarterly Performance Review X
Annual Review
Severity Level Response Times
Severity L1 Response – An issue that prevents operation of critical documented functions with high frequency or duration (e.g., issues involving network availability or significant throughput disruptions) 2 hrs 30 min 15 min
Severity L2 Response – An issue that consistently prevents operation of non-critical documented functions or occasionally impacts critical documented functions or a critical issue for which a temporary work around has been provided (e.g., Company believes that false detections or Formula updates are disrupting the availability of their networks or services) 1 hrs 1 hr 30 min
Severity L3 Response – An issue that has some impact on administration, non-critical operation or other secondary functions or a major issue for which a temporary work around has been provided (e.g., system errors, certificate issues) 12 hrs 3 hrs 2 hrs
Severity L4 Response – Company requests product related technical advice or general information and feature questions related to the services. 48 hrs 6 hrs 4 hrs

Support Contact Information

Special Notes:

  • In order for Trinity Cyber to best support subscribers, Company agrees to attend and support regularly scheduled monthly or quarterly business reviews with Trinity Cyber
  • Cases in a status of “Customer Hold” with no update from Company after 5 business days will be closed, except those related to Monitoring Alerts requiring Company housekeeping
  • Apex Enterprise customers get Premium SLA Support levels