|
SERVICE LEVEL AGREEMENT SaaS, Information Systems &
Cybersecurity Services ───────────────────────────────────────── For Enterprise Organizations,
Governmental Bodies & Private Clients |
|
|
|
LANCELOT TECHNOLOGIES LTD. www.lancelotech.com | info@lancelotech.com This Service Level Agreement
constitutes a legally binding contract between LANCELOT TECHNOLOGIES Ltd. and
its Clients. This document has been drafted in accordance with
internationally recognized standards including ISO/IEC 20000, ISO/IEC 27001,
ITIL v4, and applicable data protection frameworks. It is intended to be
enforceable by governmental bodies, enterprise organizations, and private
parties. |
This Service Level
Agreement (hereinafter referred to as the "Agreement" or
"SLA") is entered into by and between LANCELOT TECHNOLOGIES Ltd., a
company duly organized and operating under applicable law, with its principal
place of business accessible at www.Lancelot Technologies.com (hereinafter
referred to as "the Provider," "LANCELOT TECHNOLOGIES," or
"the Company"), and the party identified as a registered user,
subscriber, customer, or contracting entity accessing or using the Provider's
services (hereinafter referred to as "the Client,"
"Customer," or "End User").
WHEREAS, the Provider
operates a technology platform and portfolio of services encompassing
Software-as-a-Service (SaaS) solutions, information systems management, and
cybersecurity services for both enterprise organizations and private
individuals;
WHEREAS, the Client wishes
to procure and utilize such services pursuant to the terms, conditions, and
service standards set forth herein;
WHEREAS, both parties
acknowledge that this Agreement shall constitute a legally binding instrument
enforceable under applicable national and international law, including but not
limited to treaties, regulations, and directives governing commercial services,
data protection, and cybersecurity;
NOW, THEREFORE, in
consideration of the mutual covenants, representations, warranties, and
obligations set forth herein, and for other good and valuable consideration,
the receipt and sufficiency of which are hereby acknowledged, the parties agree
as follows:
For the purposes of this
Agreement, the following terms shall have the meanings ascribed to them below,
unless the context otherwise requires:
|
Term |
Definition |
|
"Agreement" |
This
Service Level Agreement, together with all Schedules, Exhibits, Order Forms,
and amendments thereto, as may be updated from time to time. |
|
"Services" |
All
SaaS products, information systems services, cybersecurity solutions, managed
services, consulting services, and ancillary digital services provided by the
Provider through its platform at www.Lancelot Technologies.com or via
separate written Order Forms. |
|
"Platform" |
The
Provider's proprietary technology infrastructure, software applications,
APIs, and web-based interfaces through which the Services are delivered. |
|
"Client
Data" |
Any
data, information, records, files, content, or materials submitted, uploaded,
transmitted, or processed by the Client or its Authorized Users through the
Platform. |
|
"Uptime" |
The
total time, expressed as a percentage, during which the Services are
operational, accessible, and performing in accordance with the documented
specifications. |
|
"Downtime" |
Any
period during which the Services are entirely unavailable or critically
degraded, excluding Scheduled Maintenance Windows and Exclusions as defined
herein. |
|
"Service
Credits" |
Monetary
or in-service credits issued by the Provider to the Client as compensation
for failure to meet specified Service Levels. |
|
"Incident" |
Any
unplanned interruption, degradation, or reduction in the quality of the
Services. |
|
"Change
Request" |
A
formal request submitted by the Client for modifications to the scope,
configuration, or operation of the Services. |
|
"Authorized
Users" |
Individuals
designated and authorized by the Client to access and use the Services on
behalf of the Client. |
|
"Personal
Data" |
Any
information relating to an identified or identifiable natural person, as
defined under applicable data protection legislation including GDPR, Israeli
Privacy Protection Law 5741-1981 (as amended), and other applicable
frameworks. |
|
"Security
Incident" |
Any
actual or reasonably suspected unauthorized access, use, disclosure,
modification, or destruction of Client Data or Provider systems. |
|
"Force
Majeure" |
Events
beyond the reasonable control of a party, including but not limited to acts
of God, war, terrorism, governmental actions, pandemics, or major
infrastructure failures attributable to third parties outside the Provider's
control. |
|
"SLA
Credit Period" |
The
billing month during which an SLA breach occurred and in respect of which
Service Credits may be claimed. |
|
"MTTR" |
Mean
Time to Recovery — the average time elapsed between the identification of a
Service Incident and full restoration of normal Service operation. |
|
"MTBF" |
Mean
Time Between Failures — the average time between consecutive Service
Incidents of the same category. |
|
"RTO" |
Recovery
Time Objective — the maximum targeted duration within which a Service must be
restored following a Disruption Event. |
|
"RPO" |
Recovery
Point Objective — the maximum targeted period in which data may be lost due
to a major Incident. |
•
References to
"including" or "includes" shall be construed as
"including without limitation" and shall not be read as limiting the
generality of any preceding words.
•
Headings and titles are for
convenience only and shall not affect the interpretation of this Agreement.
•
References to statutes,
regulations, or standards shall include any amendments, re-enactments, or
successors thereto.
•
Unless the context otherwise
requires, the singular includes the plural and vice versa.
•
Any obligation not to do something
includes an obligation not to permit, authorize, or enable others to do that
thing.
The Provider agrees to
deliver the following categories of services to the Client, subject to the
terms and conditions of this Agreement and any applicable Order Form:
•
Provision of cloud-hosted software
applications accessible via the Platform;
•
User account management, access
control, and multi-tenant environment administration;
•
Regular software updates, patches,
and feature releases at no additional charge unless otherwise specified;
•
API access and integration
capabilities as documented in the Provider's technical documentation;
•
Mobile application access where
applicable and as specified in the relevant Order Form.
•
Systems design, architecture
consulting, and implementation support;
•
Infrastructure management and
optimization services;
•
Database administration, backup,
and recovery services;
•
IT governance advisory and
enterprise architecture consulting;
•
Digital transformation strategy
and execution support;
•
Business continuity planning and
disaster recovery solution design.
•
Vulnerability assessment and
penetration testing (VAPT);
•
Security Operations Center (SOC)
monitoring and managed detection & response (MDR);
•
Threat intelligence and risk
assessment services;
•
Compliance consulting (ISO 27001,
NIST CSF, SOC 2, PCI-DSS, and applicable national frameworks);
•
Incident response and digital
forensics;
•
Security awareness training and
simulated phishing campaigns;
•
Data Loss Prevention (DLP)
implementation and management;
•
Identity and Access Management
(IAM) consulting and implementation;
•
Zero-Trust architecture design and
implementation support.
The Provider offers the
following service tiers, the specifications of which are set out in Schedule A
(Service Tier Specifications) attached hereto:
|
Tier |
Uptime
SLA |
Support
Response |
Intended
For |
|
Essential |
99.5%
monthly |
8
business hours |
Individuals
/ SME |
|
Professional |
99.9%
monthly |
4
business hours |
Mid-size
Organizations |
|
Enterprise |
99.95%
monthly |
2
business hours |
Large
Enterprises |
|
Sovereign
/ Gov |
99.99%
monthly |
1
hour / 24x7x365 |
Governments
/ Defense |
The Provider commits to
maintaining Service Availability in accordance with the applicable service tier
as set forth in Article 2.2. Uptime percentage shall be calculated on a
calendar month basis using the following formula:
|
Uptime Calculation Formula |
|
Uptime
% = [(Total Minutes in Month − Downtime Minutes) ÷ Total Minutes in Month] ×
100 |
|
|
|
Example
(Enterprise Tier): 43,200 total minutes/month. Permitted Downtime = 0.05% ×
43,200 = 21.6 minutes/month |
|
Example
(Sovereign/Gov Tier): 43,200 total minutes/month. Permitted Downtime = 0.01%
× 43,200 = 4.32 minutes/month |
Uptime measurements shall
be conducted by the Provider's internal monitoring systems, supplemented by
independent third-party monitoring tools where applicable. Measurement data
shall be made available to the Client upon written request and shall be the primary
reference for SLA credit calculations.
The Provider reserves the
right to conduct scheduled maintenance windows during which Services may be
temporarily unavailable or degraded. The following conditions apply to
Scheduled Maintenance:
•
The Provider shall provide no less
than seventy-two (72) hours' advance written notice for routine scheduled
maintenance;
•
For emergency maintenance required
to address critical security vulnerabilities or imminent service-threatening
issues, the Provider shall provide reasonable advance notice and shall endeavor
to minimize disruption;
•
Scheduled Maintenance shall, where
possible, be conducted during low-traffic periods (typically between 02:00 and
06:00 local time of the primary service region);
•
Sovereign and Government tier
clients shall receive no less than five (5) business days' advance notice for
non-emergency scheduled maintenance;
•
Downtime attributable to properly
notified Scheduled Maintenance shall be excluded from Uptime calculations.
In addition to Uptime
commitments, the Provider undertakes to maintain the following performance
standards for the Services:
|
Performance
Metric |
Standard
Target |
Critical
Threshold |
|
API
Response Time (P95) |
≤ 500
milliseconds |
≤
1,000 milliseconds |
|
Web
Application Load Time |
≤ 3
seconds (P95) |
≤ 5
seconds |
|
Data
Processing Throughput |
Per
contracted capacity |
Not
below 80% of contracted |
|
Security
Event Detection (SOC) |
≤ 15
minutes |
≤ 30
minutes |
|
Backup
Completion |
Daily,
within maintenance window |
Weekly
minimum |
|
Patch
Deployment (Critical CVE) |
≤ 24
hours of disclosure |
≤ 72
hours |
|
Incident
Response Initiation |
Per
tier response SLA |
Per
tier × 1.5 |
All Service Incidents
shall be classified according to the following severity framework, which
governs response times, escalation procedures, and remediation priorities:
|
Priority |
Description |
Initial Response |
Resolution Target |
Escalation |
|
P1 — Critical |
Complete service outage or major security breach affecting
production |
30 min (24×7) |
4 hours |
C-level + 1 hr |
|
P2 — High |
Significant degradation; major functionality unavailable |
2 hours (24×7) |
8 hours |
Senior Mgr + 2 hr |
|
P3 — Medium |
Partial functionality impaired; workaround available |
4 business hours |
3 business days |
Team Lead |
|
P4 — Low |
Minor issues, feature requests, general inquiries |
1 business day |
10 business days |
Support Agent |
Clients shall report
Service Incidents through the following designated channels. The timestamp of
the first report received through an official channel shall constitute the
"Incident Start Time" for SLA measurement purposes:
•
Primary: Provider's online support
portal at support.Lancelot Technologies.com;
•
Emergency (P1/P2): Dedicated
emergency telephone line as communicated to the Client upon subscription;
•
Secondary: Email to info@lancelotech.com(for
P3/P4 incidents only);
•
For Sovereign/Government tier
clients: Dedicated account management contact as specified in the relevant
Order Form.
The Provider shall
maintain transparent communication throughout the Incident lifecycle,
including:
•
Acknowledgment of receipt within
the applicable response SLA timeframe;
•
Status updates at intervals no
less frequent than every two (2) hours for P1 incidents;
•
Root Cause Analysis (RCA) report
delivered within five (5) business days of P1/P2 Incident resolution;
•
Maintenance of a publicly
accessible status page reflecting real-time Service status.
Should the Client
determine that an Incident is not being addressed with appropriate urgency or
is not progressing toward resolution within the specified timeframes, the
Client may invoke the escalation procedure:
1.
Level 1 — Support Team Lead:
Escalation to the Provider's designated Support Team Lead, available within the
initial response window.
2.
Level 2 — Service Delivery
Manager: Escalation to the Provider's Service Delivery Manager if the Incident
remains unresolved beyond 150% of the stated resolution target.
3.
Level 3 — Executive Management:
Escalation to the Provider's C-suite or designated executive contact for P1
incidents unresolved beyond four (4) hours.
4.
Level 4 — Formal Dispute:
Initiation of the formal dispute resolution procedure as set forth in Article
14 of this Agreement.
In the event that the
Provider fails to meet the Uptime commitments specified in this Agreement
during any calendar month, the Client shall be entitled to Service Credits in
accordance with the following schedule:
|
Actual
Monthly Uptime |
SLA
Breach Level |
Service
Credit |
|
99.0%
– < Committed % |
Minor
Breach |
10%
of monthly fee |
|
98.0%
– < 99.0% |
Moderate
Breach |
20%
of monthly fee |
|
95.0%
– < 98.0% |
Significant
Breach |
30%
of monthly fee |
|
<
95.0% |
Severe
Breach |
50%
of monthly fee |
|
<
90.0% |
Critical
Breach |
100%
of monthly fee |
To receive Service
Credits, the Client must submit a valid credit claim in writing within thirty
(30) calendar days following the end of the calendar month in which the SLA
breach occurred. The claim must include the Incident ticket reference numbers,
timestamps, and description of the impact experienced. Failure to submit within
this period shall constitute a waiver of the Client's right to Service Credits
for that period.
Service Credits shall not
apply, and the Provider shall not be held in breach of its Uptime commitments,
in the following circumstances:
•
Downtime caused by Force Majeure
events as defined herein;
•
Downtime caused by the Client's
own actions, configurations, or failures, including incorrect API usage or
unauthorized modifications;
•
Downtime during properly notified
Scheduled Maintenance Windows;
•
Downtime attributable to
third-party services, providers, or infrastructure outside the Provider's
direct control (including Internet backbone failures, DNS providers, or cloud
infrastructure subcontractors), provided the Provider has exercised due diligence
in selecting and monitoring such third parties;
•
Suspension of Services for breach
of payment obligations or violation of Acceptable Use provisions;
•
Beta or preview features
explicitly designated as such and not covered by production SLAs.
EXCEPT WHERE PROHIBITED BY
APPLICABLE LAW, SERVICE CREDITS SHALL CONSTITUTE THE CLIENT'S SOLE AND
EXCLUSIVE REMEDY, AND THE PROVIDER'S ENTIRE LIABILITY, FOR ANY FAILURE TO MEET
THE UPTIME OR PERFORMANCE COMMITMENTS SET FORTH IN THIS AGREEMENT. SERVICE CREDITS
SHALL NOT LIMIT THE CLIENT'S RIGHTS WITH RESPECT TO DATA PROTECTION BREACHES,
FRAUD, OR GROSS NEGLIGENCE, WHICH SHALL BE GOVERNED BY ARTICLE 12 OF THIS
AGREEMENT.
The Provider and Client
acknowledge that the processing of Personal Data under this Agreement is
subject to applicable data protection legislation, including but not limited
to:
•
Regulation (EU) 2016/679 — General
Data Protection Regulation (GDPR) and any implementing legislation;
•
Israeli Privacy Protection Law
5741-1981 and Amendment No. 13 thereto (as applicable);
•
The Israeli Privacy Protection
Regulations (Data Security) 5777-2017;
•
The Network and Information
Security (NIS2) Directive (EU) 2022/2555 where applicable;
•
Any other applicable national or
international data protection, privacy, or cybersecurity legislation.
With respect to Client
Data containing Personal Data, the Provider shall act as a Data Processor and
the Client shall act as the Data Controller, unless otherwise agreed in a
separate Data Processing Agreement (DPA). The Provider undertakes to:
•
Process Personal Data solely on
documented instructions from the Client and for no other purpose;
•
Ensure that all personnel
authorized to process Personal Data are bound by appropriate confidentiality
obligations;
•
Implement and maintain appropriate
technical and organizational security measures in accordance with Article 6.3;
•
Not engage sub-processors without
prior specific or general written authorization from the Client, and impose
equivalent data protection obligations on any authorized sub-processors;
•
Assist the Client in fulfilling
its obligations to respond to data subject rights requests within legally
required timeframes;
•
Delete or return all Personal Data
upon termination of the Agreement, as instructed by the Client;
•
Provide all information reasonably
necessary to demonstrate compliance and cooperate with audits.
The Provider shall
maintain a comprehensive information security management system and implement
the following minimum technical and organizational measures:
•
AES-256 encryption for all Client
Data stored on Provider infrastructure;
•
TLS 1.2 or higher for all data
transmitted between Client systems and the Platform;
•
End-to-end encryption for
sensitive communications involving classified or highly sensitive data.
•
Multi-factor authentication (MFA)
enforced for all administrative and privileged access;
•
Role-based access control (RBAC)
with principle of least privilege;
•
Regular access reviews and
immediate de-provisioning upon personnel changes;
•
Privileged Access Management (PAM)
for all critical infrastructure access.
•
24×7 Security Operations Center
(SOC) monitoring;
•
Security Information and Event
Management (SIEM) system with automated alerting;
•
Intrusion Detection and Prevention
Systems (IDS/IPS);
•
Continuous vulnerability scanning
and management.
In the event of a Security
Incident involving Personal Data, the Provider shall:
•
Notify the Client without undue
delay, and no later than seventy-two (72) hours after becoming aware of the
breach, where feasible;
•
Provide the Client with sufficient
information to enable the Client to fulfill its own notification obligations to
supervisory authorities and data subjects;
•
Cooperate fully with the Client
and relevant regulatory authorities in the investigation and remediation of the
breach;
•
Implement immediate containment
measures and document all actions taken in a formal Incident Report.
The Provider shall
maintain Client Data within the geographic regions specified in the applicable
Order Form or as agreed in writing. Where Sovereign or Government tier services
are procured, the Provider shall provide written certification of data residency
compliance upon request. Cross-border data transfers shall only be undertaken
in compliance with applicable legal transfer mechanisms, including Standard
Contractual Clauses or equivalent approved transfer mechanisms.
The Provider shall
maintain and operate its Services in accordance with internationally recognized
cybersecurity standards and shall at all times:
•
Hold and maintain certification to
ISO/IEC 27001 (Information Security Management) or demonstrate equivalent
security posture;
•
Conduct annual independent
penetration testing of its production environment by qualified third-party
security professionals;
•
Maintain a documented and tested
vulnerability disclosure and patch management program;
•
Apply critical security patches
within twenty-four (24) hours and high-severity patches within seventy-two (72)
hours of official disclosure;
•
Conduct annual security awareness
training for all personnel with access to Client Data;
•
Maintain written information
security policies and procedures, reviewed annually;
•
Maintain appropriate cyber
insurance coverage and provide evidence thereof upon request.
The Client acknowledges
shared responsibility for security outcomes and undertakes to:
•
Maintain the confidentiality of
all account credentials and promptly notify the Provider of any suspected
unauthorized access;
•
Ensure all Authorized Users employ
strong authentication practices, including MFA where supported;
•
Maintain its own systems,
endpoints, and networks in a secure and patched state;
•
Not conduct unauthorized security
testing, scanning, or probing of the Provider's infrastructure;
•
Comply with the Provider's
Acceptable Use Policy as set out in Schedule B;
•
Promptly report any suspicious
activity or potential security incident observed in connection with the
Services.
In the event of a Security
Incident affecting the Services, the parties agree to cooperate in accordance
with the following framework:
5.
Identification: Either party
identifying a Security Incident shall notify the other within the timeframes
specified in Article 4.2.
6.
Containment: The Provider shall
implement immediate containment measures and provide the Client with a
preliminary impact assessment within four (4) hours of P1 Security Incidents.
7.
Eradication and Recovery: The
Provider shall document and execute a remediation plan, with the Client's
cooperation as required.
8.
Post-Incident Review: A formal
Root Cause Analysis shall be provided within five (5) business days, including
recommendations for preventing recurrence.
9.
Evidence Preservation: Both
parties shall preserve all relevant logs, records, and evidence in accordance
with applicable legal and regulatory requirements.
Access to and use of the
Services shall be subject to the payment of applicable subscription fees as set
out in the Client's Order Form or as published on the Provider's website.
Subscription terms may be monthly or annual and shall auto-renew unless either
party provides written notice of non-renewal no less than thirty (30) days
prior to the end of the then-current subscription term.
The Provider reserves the
right to adjust subscription fees upon no less than sixty (60) days' advance
written notice to the Client. Fee adjustments shall take effect at the
commencement of the next renewal period. The Client's continued use of the
Services following the effective date of a fee adjustment shall constitute
acceptance thereof. In the event the Client does not accept an adjustment, the
Client may terminate the subscription in accordance with Article 9.
•
All fees are due upon the
commencement of the applicable subscription term or renewal, unless otherwise
specified in the Order Form;
•
Payment may be made via credit
card, bank transfer, or such other methods as the Provider may designate;
•
Late payments shall accrue
interest at the rate of 1.5% per month, or the maximum rate permitted by
applicable law, whichever is lower;
•
The Provider reserves the right to
suspend Services upon thirty (30) days' written notice where fees remain
overdue, subject to dispute resolution provisions;
•
All fees are exclusive of
applicable taxes, duties, and levies, which shall be borne by the Client.
Subscription fees are
generally non-refundable, except where:
•
The Client exercises a statutory
right of cancellation within any cooling-off period mandated by applicable
consumer protection law;
•
The Provider materially fails to
deliver the contracted Services and fails to remedy such failure within a
reasonable cure period;
•
The Agreement is terminated by the
Client for cause in accordance with Article 9.3;
•
A prepaid annual subscription is
terminated by the Provider without cause prior to the subscription period end,
in which case a pro-rated refund shall be provided for the unused portion.
This Agreement shall
commence on the Effective Date and shall remain in full force and effect for
the duration of the active subscription term, and shall continue for successive
renewal periods unless terminated in accordance with this Article.
Either party may terminate
this Agreement for convenience by providing no less than thirty (30) calendar
days' written notice to the other party. Such termination shall take effect at
the end of the then-current billing cycle. Annual subscribers terminating for
convenience shall not be entitled to a refund of prepaid fees except as
expressly provided in Article 8.4.
Either party may terminate
this Agreement immediately upon written notice if the other party:
•
Materially breaches any provision
of this Agreement and fails to cure such breach within thirty (30) days of
written notice specifying the breach;
•
Becomes insolvent, makes an
assignment for the benefit of creditors, or is subject to bankruptcy or
liquidation proceedings;
•
Commits fraud, misrepresentation,
or willful misconduct in connection with the Services;
•
In the case of Client: uses the
Services in violation of applicable law or in a manner that poses a direct
threat to the Provider's infrastructure or other clients.
Upon termination of this
Agreement for any reason:
•
All licenses and rights granted to
the Client shall immediately cease;
•
The Provider shall provide the
Client with a thirty (30) day data export window during which the Client may
retrieve all Client Data in a standard machine-readable format;
•
Following the data export window,
the Provider shall securely delete all Client Data, unless retention is
required by applicable law;
•
Any accrued but unpaid fees shall
remain due and payable;
•
Provisions of this Agreement that
by their nature survive termination shall remain in full force and effect.
The Provider may suspend
access to the Services immediately and without prior notice in the following
circumstances:
•
Where the Client's use of the
Services poses an imminent threat to the security, integrity, or availability
of the Provider's systems or other clients' data;
•
Where legally required to do so by
a competent governmental or judicial authority;
•
Where the Client is in material
breach of the Acceptable Use Policy.
In all other cases of
suspension (including non-payment), the Provider shall provide no less than
forty-eight (48) hours' advance written notice. The Provider shall lift any
suspension promptly upon resolution of the underlying cause.
The Client acknowledges
that the Provider retains all right, title, and interest in and to the
Platform, Services, software, documentation, methodologies, know-how, and all
related intellectual property rights (collectively, "Provider IP").
Nothing in this Agreement shall be construed as a transfer of any Provider IP
to the Client. The Client is granted a limited, non-exclusive,
non-transferable, revocable license to access and use the Services solely for
its internal business purposes during the term of this Agreement.
The Client retains all
right, title, and interest in and to Client Data. The Client grants the
Provider a limited, non-exclusive license to access, process, store, and use
Client Data solely to the extent necessary to provide the Services and fulfill
obligations under this Agreement. The Provider shall not use Client Data for
any other purpose, including product development, marketing, or sale to third
parties.
Where the Client provides
feedback, suggestions, or recommendations regarding the Services, the Provider
may use such input to improve its products and services. The Client hereby
grants the Provider a non-exclusive, royalty-free, perpetual license to incorporate
such feedback into its products, without obligation to compensate the Client
therefor.
The Client shall not, and
shall not permit any third party to:
•
Reverse engineer, decompile,
disassemble, or attempt to derive the source code of any software component of
the Services;
•
Copy, modify, distribute, sell, or
resell the Services or any portion thereof without the Provider's express
written consent;
•
Remove or obscure any proprietary
notices, labels, or marks on the Services;
•
Use the Provider's trademarks,
logos, or branding without prior written authorization;
•
Create derivative works based upon
the Services or the Provider's documentation.
Each party (as
"Disclosing Party") may disclose to the other party (as
"Receiving Party") information that is confidential in nature.
"Confidential Information" means any non-public information disclosed
by either party in connection with this Agreement, including but not limited
to: technical information, business plans, pricing, client data, security
architectures, and proprietary methodologies, whether disclosed in written,
oral, electronic, or any other form.
Each Receiving Party
undertakes to:
•
Hold all Confidential Information
in strict confidence using no less than the same degree of care it uses to
protect its own confidential information, but in no event less than reasonable
care;
•
Use Confidential Information
solely for the purposes of performing its obligations or exercising its rights
under this Agreement;
•
Not disclose Confidential
Information to any third party without the Disclosing Party's prior written
consent, except as permitted herein;
•
Limit access to Confidential
Information to those personnel and authorized sub-processors who have a
legitimate need-to-know and are bound by equivalent confidentiality
obligations.
Confidentiality
obligations shall not apply to information that: (a) is or becomes publicly
available through no act or omission of the Receiving Party; (b) was rightfully
known to the Receiving Party prior to disclosure; (c) is received from a third
party without restriction; or (d) is independently developed by the Receiving
Party without use of Confidential Information.
Where a Receiving Party is
compelled to disclose Confidential Information pursuant to applicable law,
court order, or governmental authority, the Receiving Party shall: (i) provide
prompt written notice to the Disclosing Party to the extent legally permissible;
(ii) cooperate with the Disclosing Party in seeking a protective order or
similar relief; and (iii) disclose only the minimum information required to
comply with the legal obligation.
The obligations of
confidentiality set forth in this Article shall survive the termination or
expiration of this Agreement for a period of five (5) years, except with
respect to trade secrets, for which such obligations shall survive
indefinitely.
The Provider represents
and warrants that:
•
It has full power and authority to
enter into this Agreement and to perform its obligations hereunder;
•
The Services shall be provided
with reasonable skill and care, in a professional and workmanlike manner
consistent with recognized industry standards;
•
The Services shall operate in
material conformity with the applicable documentation and specifications;
•
It has obtained and shall maintain
all necessary licenses, permits, and authorizations required to provide the
Services;
•
The Platform does not, to the
Provider's knowledge, infringe upon the intellectual property rights of any
third party;
•
It shall comply with all
applicable laws and regulations in the provision of the Services.
The Client represents and
warrants that:
•
It has full legal authority to
enter into this Agreement and to submit Client Data to the Services;
•
Client Data and the Client's use
of the Services do not violate any applicable law, regulation, or third-party
rights;
•
All information provided to the
Provider during the registration and subscription process is accurate,
complete, and current;
•
It shall use the Services solely
in accordance with this Agreement and applicable law.
EXCEPT AS EXPRESSLY SET
FORTH IN ARTICLE 12.1, THE SERVICES ARE PROVIDED ON AN "AS IS" AND
"AS AVAILABLE" BASIS. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE
LAW, THE PROVIDER EXPRESSLY DISCLAIMS ALL IMPLIED WARRANTIES, INCLUDING IMPLIED
WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE,
NON-INFRINGEMENT, AND ACCURACY. THE PROVIDER DOES NOT WARRANT THAT THE SERVICES
WILL BE ENTIRELY ERROR-FREE OR THAT ALL DEFECTS WILL BE CORRECTED, BUT
UNDERTAKES TO ADDRESS DEFECTS IN ACCORDANCE WITH THE INCIDENT MANAGEMENT
PROCEDURES SET FORTH HEREIN.
TO THE MAXIMUM EXTENT
PERMITTED BY APPLICABLE LAW, IN NO EVENT SHALL EITHER PARTY BE LIABLE TO THE
OTHER PARTY FOR ANY INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, CONSEQUENTIAL, OR
PUNITIVE DAMAGES (INCLUDING LOSS OF PROFITS, LOSS OF REVENUE, LOSS OF BUSINESS
OPPORTUNITY, OR LOSS OF DATA) ARISING OUT OF OR IN CONNECTION WITH THIS
AGREEMENT OR THE USE OR INABILITY TO USE THE SERVICES, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES.
THE PROVIDER'S TOTAL
CUMULATIVE LIABILITY TO THE CLIENT FOR ANY AND ALL CLAIMS ARISING OUT OF OR IN
CONNECTION WITH THIS AGREEMENT, WHETHER IN CONTRACT, TORT (INCLUDING
NEGLIGENCE), OR OTHERWISE, SHALL NOT EXCEED THE TOTAL FEES PAID BY THE CLIENT
TO THE PROVIDER IN THE TWELVE (12) MONTHS IMMEDIATELY PRECEDING THE EVENT
GIVING RISE TO THE CLAIM.
The limitations of
liability set forth in Article 13.1 shall not apply to:
•
Liability for death or personal
injury caused by either party's negligence;
•
Liability for fraud or willful
misconduct;
•
The Provider's indemnification
obligations under Article 13.4;
•
Breaches of confidentiality
obligations under Article 11;
•
Liability for data protection
breaches arising from the Provider's non-compliance with applicable law, up to
the maximum extent permitted by data protection legislation.
The Client shall defend,
indemnify, and hold harmless the Provider and its officers, directors,
employees, agents, and subcontractors from and against any claims, liabilities,
damages, losses, costs, and expenses (including reasonable legal fees) arising
out of or in connection with: (a) the Client's breach of this Agreement; (b)
the Client's use of the Services in violation of applicable law; (c) Client
Data infringing the rights of any third party; or (d) the Client's gross
negligence or willful misconduct.
The Provider shall defend,
indemnify, and hold harmless the Client from and against any claims that the
Services, as delivered by the Provider and used by the Client in accordance
with this Agreement, infringe the intellectual property rights of any third
party, provided that the Client: (a) promptly notifies the Provider of any such
claim; (b) grants the Provider sole control of the defense; and (c) cooperates
reasonably with the Provider's defense efforts.
The parties shall attempt
in good faith to resolve any dispute, controversy, or claim arising out of or
relating to this Agreement (a "Dispute") through informal
negotiation. Either party may initiate such negotiations by providing written
notice specifying the nature of the Dispute. The parties shall endeavor to
resolve the Dispute within thirty (30) calendar days of such notice.
If the Dispute is not
resolved through informal negotiation within thirty (30) days, either party may
refer the matter to non-binding mediation before a mutually agreed mediator.
The costs of mediation shall be shared equally between the parties.
If the Dispute remains
unresolved following mediation, or if either party declines mediation, the
Dispute shall be finally resolved by binding arbitration in accordance with the
rules of a mutually agreed international arbitration institution (including,
without limitation, the International Chamber of Commerce (ICC) or the United
Nations Commission on International Trade Law (UNCITRAL) Arbitration Rules).
The arbitral award shall be final and binding and may be enforced in any court
of competent jurisdiction.
This Agreement shall be
governed by and construed in accordance with applicable law as specified in the
Client's Order Form or, absent such specification, the laws of the State of
Israel. For Clients domiciled within the European Union, matters relating to
GDPR compliance shall be subject to the laws of the applicable EU member state.
The parties consent to the exclusive jurisdiction of the courts specified in
the relevant Order Form for any matter not subject to arbitration under this
Article.
Notwithstanding the
foregoing, either party may seek emergency injunctive or other equitable relief
from a court of competent jurisdiction where necessary to prevent irreparable
harm, including in cases of imminent data breach, intellectual property infringement,
or violation of confidentiality obligations.
The Provider shall
maintain and regularly test a comprehensive Business Continuity Plan (BCP) that
ensures the continued delivery of critical Services in the event of a major
disruption. The BCP shall be reviewed and updated at least annually and following
any significant Incident.
The Provider commits to
the following recovery objectives for production services, subject to
tier-specific variations as set out in Schedule A:
|
Service Tier |
RTO (Max) |
RPO (Max) |
Backup Frequency |
|
Essential |
24 hours |
24 hours |
Daily |
|
Professional |
8 hours |
8 hours |
Every 6 hours |
|
Enterprise |
4 hours |
4 hours |
Hourly |
|
Sovereign / Gov |
1 hour |
15 minutes |
Continuous / PITR |
The Provider shall at all
times operate its Services in compliance with applicable laws, regulations, and
internationally recognized standards, including but not limited to ISO/IEC
27001, ISO/IEC 22301, SOC 2 Type II, GDPR, and applicable Israeli privacy and
cybersecurity legislation. The Provider shall maintain documentary evidence of
such compliance and shall make it available to the Client or its designated
auditors upon reasonable request.
Enterprise and
Sovereign/Government tier Clients shall have the right to conduct, or
commission an independent third party to conduct, an audit of the Provider's
security and compliance posture no more than once per calendar year, upon
thirty (30) days' advance written notice. Audits shall be conducted during
normal business hours, shall not unreasonably interfere with the Provider's
operations, and shall be subject to appropriate confidentiality protections.
The Client shall bear the cost of such audits unless the audit reveals a
material non-compliance, in which case the Provider shall bear reasonable audit
costs.
The Provider shall, upon
request, provide the Client with:
•
Copies of current ISO 27001
certificates or equivalent;
•
SOC 2 Type II audit reports
(subject to appropriate NDA);
•
Penetration testing summary
reports (redacted as appropriate);
•
GDPR Data Processing Impact
Assessments where relevant;
•
Business Continuity and Disaster
Recovery test results.
The Services are provided
for lawful business and personal use in accordance with this Agreement and
applicable law. Clients and Authorized Users may use the Services to access the
features and functionalities described in the Provider's documentation for
legitimate operational purposes.
The following activities
are strictly prohibited in connection with the Services:
•
Transmitting, storing, or
processing any content that is unlawful, harmful, threatening, abusive,
defamatory, obscene, or otherwise objectionable;
•
Engaging in any activity that
violates applicable export control laws, sanctions, or embargoes;
•
Attempting to gain unauthorized
access to other clients' data or to restricted portions of the Provider's
infrastructure;
•
Conducting or facilitating any
form of distributed denial-of-service (DDoS) attack, malware distribution,
phishing, or other malicious cyber activity;
•
Mining cryptocurrency or
conducting any unauthorized resource-intensive computation on Provider
infrastructure;
•
Circumventing or attempting to
circumvent any security controls, access restrictions, or license enforcement
mechanisms;
•
Using the Services to develop or
test offensive cyber capabilities without the Provider's express written
authorization;
•
Violating any applicable privacy
law or processing Personal Data in a manner inconsistent with this Agreement.
The Provider reserves the
right to investigate any suspected violation of this Acceptable Use Policy and
to take appropriate action, including suspension or termination of Services,
reporting to law enforcement authorities, and pursuing legal remedies.
The Provider reserves the
right to amend this Agreement from time to time to reflect changes in law,
regulatory requirements, industry standards, or Provider operational practices.
Amendments shall be communicated to the Client via email to the registered
account address and/or via notice on the Provider's website no less than thirty
(30) calendar days prior to the effective date of the amendment. The Client's
continued use of the Services following the effective date of an amendment
shall constitute acceptance of the amended terms. Clients who do not accept an
amendment may terminate the Agreement in accordance with Article 9.2.
Official communications
under this Agreement shall be made in writing via:
•
Email to the registered account
address (for operational notices, SLA reports, and incident communications);
•
Registered post or courier to the
registered business address (for formal legal notices, including termination);
•
In-platform notifications (for
minor updates, maintenance schedules, and feature announcements).
Notices shall be deemed
received: upon confirmation of email delivery or, absent such confirmation,
twenty-four (24) hours after dispatch; or upon actual delivery in the case of
posted notices.
The Services may integrate
with or provide access to third-party software, APIs, and services. Such
third-party services are subject to their own terms and conditions, and the
Provider assumes no liability for the availability, accuracy, security, or functionality
of third-party services. The Client's use of third-party integrations is at its
own risk.
The Provider may engage
sub-processors to assist in the delivery of the Services. The Provider shall
maintain and make available to the Client an up-to-date list of sub-processors
upon request. The Provider shall ensure that all sub-processors are bound by
data protection obligations at least equivalent to those set forth in this
Agreement. The Provider shall remain liable to the Client for the acts and
omissions of its sub-processors as if they were the Provider's own acts and
omissions.
This Agreement, together
with all Schedules, Order Forms, and any Data Processing Agreement executed
between the parties, constitutes the entire agreement between the parties with
respect to its subject matter and supersedes all prior agreements, understandings,
negotiations, and representations, whether written or oral, relating to the
same subject matter.
If any provision of this
Agreement is found by a court or arbitral tribunal of competent jurisdiction to
be invalid, illegal, or unenforceable, such provision shall be modified to the
minimum extent necessary to make it valid and enforceable, and the remaining
provisions shall continue in full force and effect.
No failure or delay by
either party in exercising any right or remedy under this Agreement shall
constitute a waiver of that right or remedy. No waiver shall be effective
unless made in writing and signed by an authorized representative of the
waiving party.
The Client may not assign
or transfer any of its rights or obligations under this Agreement without the
prior written consent of the Provider, which shall not be unreasonably
withheld. The Provider may assign this Agreement in connection with a merger, acquisition,
corporate reorganization, or sale of substantially all of its assets, provided
the assignee assumes all obligations hereunder. Any attempted assignment in
violation of this Article shall be void.
Neither party shall be in
breach of this Agreement nor liable for any delay in performing, or failure to
perform, any of its obligations under this Agreement if such delay or failure
results from Force Majeure events. The affected party shall promptly notify the
other party in writing of the Force Majeure event and its expected duration,
and shall use reasonable endeavors to mitigate its effects. If a Force Majeure
event continues for more than sixty (60) days, either party may terminate the
Agreement upon written notice without liability, other than for fees in respect
of Services already rendered.
The parties are
independent contractors and this Agreement does not create any partnership,
joint venture, employment, agency, or franchise relationship between the
parties. Neither party has the authority to bind the other party or to incur
any obligation on behalf of the other party.
This Agreement is executed
in the English language. In the event of any conflict between an English
version and any translation, the English version shall prevail. For
Sovereign/Government clients in jurisdictions where local law mandates a
specific language for contracts, a certified translation shall be appended as a
Schedule, with the English version remaining authoritative.
This Agreement may be
executed in one or more counterparts, each of which shall be deemed an original
and all of which together shall constitute one and the same instrument.
Electronic signatures shall be deemed equivalent to original signatures for all
purposes of this Agreement, in accordance with applicable electronic signature
legislation.
By accessing the Services,
accepting this Agreement electronically, or executing an Order Form that
references this SLA, the parties acknowledge that they have read, understood,
and agree to be bound by all terms and conditions set forth herein. This Agreement
shall become legally binding upon the Client's acceptance or upon the
commencement of Services, whichever occurs first.
A — SERVICE TIER SPECIFICATIONS
This Schedule forms an
integral part of the Service Level Agreement and sets forth the detailed
specifications for each service tier. Tier specifications are subject to review
and update on an annual basis, with thirty (30) days' advance written notice to
Clients.
|
Essential Tier — Specification Summary |
|
Uptime
SLA: 99.5% monthly | Permitted Downtime: ~3.6 hours/month |
|
Support:
Email and portal, 8 business hours response |
|
Backup:
Daily, 7-day retention |
|
Security:
Standard encryption, MFA, quarterly vulnerability scans |
|
Data
Residency: Shared cloud infrastructure, region selectable |
|
Suitable
For: Individual professionals, startups, small businesses |
|
Professional Tier — Specification Summary |
|
Uptime
SLA: 99.9% monthly | Permitted Downtime: ~43 minutes/month |
|
Support:
Email, portal, and phone, 4 business hours response |
|
Backup:
Every 6 hours, 30-day retention |
|
Security:
Enhanced encryption, WAF, monthly vulnerability scans, DLP |
|
Data
Residency: Dedicated region, geographic selection |
|
Suitable
For: Mid-size organizations, regulated industries |
|
Enterprise Tier — Specification Summary |
|
Uptime
SLA: 99.95% monthly | Permitted Downtime: ~21 minutes/month |
|
Support:
Dedicated Account Manager, 24x7 priority support, 2-hour response |
|
Backup:
Hourly, 90-day retention, cross-region replication |
|
Security:
Zero-trust architecture, 24x7 SOC, MDR, monthly pen-test |
|
Data
Residency: Dedicated cloud environment, compliance-verified |
|
Suitable
For: Large enterprises, financial institutions, healthcare |
|
Sovereign / Government Tier — Specification Summary |
|
Uptime
SLA: 99.99% monthly | Permitted Downtime: ~4.3 minutes/month |
|
Support:
24x7x365 dedicated team, 1-hour response, C-level escalation path |
|
Backup:
Continuous / Point-in-Time Recovery (PITR), 1-year retention |
|
Security:
Air-gapped options available, classified data handling, TEMPEST-rated
facilities (where applicable), bi-annual pen-test |
|
Data
Residency: In-country or dedicated sovereign cloud, certified compliance |
|
Suitable
For: Government agencies, defense, critical national infrastructure |
B — ACCEPTABLE USE POLICY (SUMMARY)
This Schedule provides a
summary of acceptable use obligations. Clients must ensure all Authorized Users
are informed of and comply with these requirements. The full Acceptable Use
Policy is published at www.Lancelot Technologies.com/acceptable-use and is
incorporated herein by reference.
•
Services may only be used for
lawful purposes and in compliance with applicable legislation.
•
Transmission or storage of
malicious code, exploits, or content facilitating illegal activity is strictly
prohibited.
•
Unauthorized access attempts,
security probing, or exploitation of vulnerabilities are prohibited.
•
Clients bear full responsibility
for the actions of their Authorized Users.
•
Resource usage must remain within
contracted limits; excessive usage affecting other clients may result in
throttling or suspension.
•
The Provider's support channels
must not be used abusively or in bad faith.
C — CONTACT DIRECTORY AND ESCALATION
MATRIX
Contact details for
operational purposes are maintained in the Client's secure account portal. For
legal and formal notices, the following address shall apply:
|
Provider Contact Information |
|
Company:
LANCELOT TECHNOLOGIES Technologies Ltd. |
|
Website:
www.Lancelot Technologies.com |
|
Support
Portal: support.Lancelot Technologies.com |
|
General
Enquiries: info@lancelotech.com |
|
Support:
info@lancelotech.com |
|
Legal
/ Formal Notices: info@lancelotech.com |
|
Data
Protection Officer: info@lancelotech.com |
|
Emergency
(P1/P2): As communicated to Client upon subscription activation |
]