Mitratech
Mitratech
  • Industries
  • Solutions
  • Products
  • Client Success
  • Resources
  • Events
  • About Us
Contact Us

Industry Solutions

See All Industry Solutions →

Trusted Legal and Compliance Solutions Purpose-Built for Every Industry — So You Can Stay Aligned, Audit-Ready, and Ahead of What’s Next

Business, Consulting & Technology Services
Modern Compliance Solutions for Consulting and Technology Firms That Can’t Miss a Deadline
Education
Dynamic Compliance Solutions Designed to Safeguard Your Institution — and the Learners and Leaders Who Depend on It
Energy & Utilities
Compliance Solutions to Help You Stay Current and Compliant Across Pipelines, Platforms, and Plants
Financial Services
Proactive Compliance Software Built for Banks, Insurers, Credit Unions, and Investment Firms
Government
Defensible Compliance Software Built to Help Federal, State, and Local Teams Respond Stay Audit-Ready
Healthcare
Automated Compliance Solutions to Protect People, Data, and Patient Care Delivery
Hospitality & Retail
Compliance Software Built to Keep Up With Every Shift, Store, and Staff Member
Insurance
Compliance Solutions to Keep Every Policy Defensible and Audit-Ready — Including Your Own
Law Firm Practice & Management
Automation & Compliance Built to Empower Law Firms — and the Teams Running Them
Manufacturing & Construction
Compliance Software to Keep Your Worksites Safe and Your Factories Running Smoothly
Media & Entertainment
Technology Solutions Built for Content, Confidentiality, and Everything Behind the Scenes
See All Industry Solutions →
  • AUTOMATION, ANALYTICS, & AI
  • LEGAL
  • RISK
  • HUMAN RESOURCES

Solutions

Workflow Automation iconAUTOMATION, ANALYTICS, & AI

TAP | Workflow toggleAutomation iconAUTOMATION, ANALYTICS, & AI

Learn more →
MITRATECH AUTOMATION
Workflow Automation
Technology-leading automation
Document Automation
Premier document assembly & automation
MITRATECH ANALYTICS
Mitratech HQ
Headquarters to access solutions, dashboards & more
PlatoBI
Central repository of advanced analytics
InvoiceIQ
AI invoice review
MITRATECH AI
Mitratech Platform
All Access. One Platform.
ARIES™
AI digital assistant
Mitratech Risk Platform
Use-case centric risk management
See All Use Cases →
Legal iconLegal

Legal iconLEGAL SOLUTIONS

Learn more →
ENTERPRISE LEGAL MANAGEMENT
Matter Management & eBilling
The #1 most-used legal software
Legal Spend Management
Deep spend analytics & proven ROI
Outside Counsel & Panel Management
A data-driven marketplace for outside counsel selection
Case Management
Law firm & public sector case solution
Legal Hold
~75% faster legal hold management
AUTOMATION, ANALYTICS, & AI FOR LEGAL
Document Automation
Premier document assembly & automation
Workflow Automation
Technology-leading automation
Contract Automation
Streamlined contract management
More Legal Analytics & AI Solutions →
Risk & Compliance iconRisk

Risk & Compliance iconRISK SOLUTIONS

Learn more →
INTEGRATED RISK MANAGEMENT
Enterprise Risk Management
Fully integrated GRC platform
Business Continuity & Alerting
Continuity & incident management, disaster recovery
Ethics Hotline
Anonymous reporting and secure communications
Compliance Training
Employee education focused on laws, regulations, and company policies
Third-Party & Vendor Risk Management
AI-powered third-party vendor and supplier management.
Policy Management
Best-in-class policy software
INFORMATION GOVERNANCE
Secure Data & EUC Management
Shadow IT & EUC
IT & Cyber Risk
Holistic defense from IT & cyber threats
Data & AI Governance
AI application governance & discovery
AUTOMATION, ANALYTICS, & AI FOR RISK
Mitratech Risk Platform
Integrated platform underpinned by AI
Workflow Automation
Technology-leading automation
Document Automation
Premier document assembly & automation
More Risk Analytics & AI Solutions →
Human Resources iconHUMAN RESOURCES

Human Resources iconHUMAN RESOURCES SOLUTIONS

Learn more →
HR COMPLIANCE INTELLIGENCE
Compliance Tracking
Robust compliance monitoring
HR Expert Assisted Services
On-demand HR experts
Employee Handbook Mgmt
Comprehensive, easy to implement handbooks
Employee Law Monitoring & Alerting
Reliable workplace compliance & alerts
EMPLOYEE LIFECYCLE MANAGEMENT
Background Screening
PBSA-accredited screening & ongoing monitoring
Employee Onboarding
Effortless, fast hiring
Applicant Tracking
Efficient talent management
Inclusive Recruiting & Hiring
Software for equitable hiring
Training & Performance Mgmt
Top-rated, easy to use talent suite
Immigration Case Mgmt
Never a fine, unified immigration software
Federal Contractor Compliance
Build diverse, high-performing teams and ensure compliance
AUTOMATION, ANALYTICS, & AI FOR HR
Document Automation
Technology-leading automation
Workflow Automation
Premier document assembly & automation
More HR Analytics & AI Solutions →
  • AUTOMATION, ANALYTICS, & AI
  • LEGAL
  • RISK
  • HUMAN RESOURCES

Product

AUTOMATION, ANALYTICS, & AI iconAUTOMATION, ANALYTICS, & AI

TAP | Workflow toggleAutomation iconAUTOMATION, ANALYTICS, & AI

Learn more →
MITRATECH AUTOMATION
Workflow Automation
Technology-leading automation
Document Automation
Premier document assembly & automation
MITRATECH ANALYTICS
Mitratech HQ
Headquarters to access solutions, dashboards & more
PlatoBI
Central repository of advanced analytics
InvoiceIQ
AI invoice review
MITRATECH AI
Mitratech Platform
All Access. One Platform.
ARIES™
AI digital assistant
Mitratech Risk Platform
Use-case centric risk management
See All Products →
Legal iconLegal

Legal iconLEGAL PRODUCTS

Learn more →
ENTERPRISE LEGAL MANAGEMENT
Matter Management & eBilling
Mitratech TeamConnect
Legal Spend Management
Mitratech Managed Bill Review
Outside Counsel & Panel Management
Mitratech AdvanceLaw
Case Management
Mitratech CaseCloud™
Legal Hold
Mitratech LegalHold
AUTOMATION, ANALYTICS, & AI for Legal
AI Invoice Management
InvoiceIQ
Document Automation
Mitratech HotDocs
Workflow Automation
Mitratech TAP
Contract Automation
Mitratech HotDocs
See All Legal Products →
Risk & Compliance iconRisk

Risk & Compliance iconRISK PRODUCTS

Learn more →
INTEGRATED RISK MANAGEMENT
Enterprise Risk Management
Mitratech Alyne
Business Continuity & Alerting
Mitratech Preparis
Ethics Hotlines & Compliance Training
Mitratech Syntrio
Third-Party & Vendor Risk Management
Mitratech Prevalent
Policy Management
Mitratech PolicyHub
INFORMATION GOVERNANCE
Secure Data & EUC Management
Mitratech ClusterSeven
IT & Cyber Risk
Mitratech Alyne
Data & AI Governance
Mitratech Alyne
AUTOMATION, ANALYTICS, & AI FOR RISK
Risk AI
Mitratech Risk Platform
Workflow Automation
Mitratech TAP
Document Automation
Mitratech HotDocs
See All Risk Products →
Human Resources iconHuman Resources

Human Resources iconHUMAN RESOURCES PRODUCTS

Learn more →
HR COMPLIANCE INTELLIGENCE
Compliance Tracking
Mitratech Mineral
Employee Law Monitoring & Alerting
Mitratech Mineral
Employee Handbook Management
Mitratech Mineral
HR Expert Assisted Services
Mitratech Mineral
EMPLOYEE LIFECYCLE MANAGEMENT
Background Screening
Mitratech AssureHire
Employee Onboarding
Mitratech I9 Compliance
Applicant Tracking
Mitratech TalentReef
Inclusive Recruiting & Hiring
Mitratech Circa
Training & Performance Management
Mitratech Trakstar
Immigration Case Management
Mitratech INSZoom
Federal Contractor Compliance
Mitratech Circa
AUTOMATION, ANALYTICS, & AI FOR HR
Workflow Automation
Mitratech TAP
Document Automation
Mitratech HotDocs
See All HR Products →
  • Our Clients
  • Premium Experience
  • Professional Services
  • Hosting
  • Mitratech Academy
  • Support Center
  • Blog
  • Resource Hub
  • Multimedia
  • TAP Use Cases
  • Risk Use Cases
  • Interact 2026
  • Industry Events
  • Upcoming Webinars
  • On Demand Webinars
  • Why Mitratech?
  • Our Team
  • Careers
  • Press Center
  • Awards
  • Partners
  • DEIB Policy

Important Policies

  • Privacy Policy
  • Terms & Conditions
  • California Consumer Privacy Act
  • UK & EU Privacy Rights
  • Data Processing Addendum
  • Acceptable Use Policy
  • Vulnerability Disclosure Policy
  • Cigna Machine-Readable Files Policy
  • Assignment to Mitratech Trakstar, Inc.

Trakstar Terms & Conditions

Last updated on September 25, 2025

Subscription Agreement

Last Updated as of the 10th day of January, 2025

This Subscription Agreement (together with all Order Forms and Addenda attached hereto, the “Agreement”) of Mitratech Trakstar, Inc., a subsidiary of Mitratech Holdings, Inc., and its affiliates (“Trakstar”) governs all access to and use of the human resources computer program, software modules and interactive computer services for human resources and management solutions and all applicable documentation of Trakstar and its affiliates, together with all related interfaces, functionality, web-services, supplements, add-on components, corrections, bug fixes, modifications, enhancements, updates, new versions or releases that Trakstar subsequently may make available (collectively, the “System”), and constitutes a legally binding agreement between the entity for whom the System will be accessed and/or used (the “Client”), including without limitation all of Client’s personnel who access or use the System, and Trakstar.

THIS AGREEMENT CONTAINS VERY IMPORTANT INFORMATION REGARDING CLIENT’S RIGHTS AND OBLIGATIONS, AS WELL AS CONDITIONS, LIMITATIONS AND EXCLUSIONS THAT MIGHT APPLY TO CLIENT. PLEASE READ THIS AGREEMENT CAREFULLY BEFORE ACCESSING OR USING THE SYSTEM OR ANY PORTION THEREOF. BY CLICKING ON “I AGREE” OR BY ACCESSING OR USING THE SYSTEM OR ANY PORTION THEREOF, YOU, ON BEHALF OF THE CLIENT, ACKNOWLEDGE AND CONFIRM THAT: (A) YOU HAVE FULL AUTHORITY FROM THE CLIENT TO BIND THE CLIENT TO ALL OF THE TERMS AND CONDITIONS OF THIS AGREEMENT; (B) YOU HAVE READ AND UNDERSTAND ALL OF THE TERMS AND CONDITIONS OF THIS AGREEMENT; (C) CLIENT AGREES TO BE BOUND BY ALL OF THE TERMS AND CONDITIONS OF THIS AGREEMENT; AND (D) CLIENT ACKNOWLEDGES THAT THIS AGREEMENT IS THE LEGAL EQUIVALENT OF A SIGNED, WRITTEN CONTRACT BETWEEN Trakstar AND CLIENT. IF YOU OR THE CLIENT WHOM YOU ARE REPRESENTING ARE NOT WILLING TO BE BOUND BY ALL OF THE TERMS AND CONDITIONS OF THIS AGREEMENT, INCLUDING WITHOUT LIMITATION THE PRECEDING ACKNOWLEDGEMENT AND AGREEMENT, THEN YOU MUST NOT SELECT THE ‘I AGREE’ BUTTON ASSOCIATED WITH THIS AGREEMENT AND YOU MUST NOT ACCESS OR USE THE SYSTEM OR ANY PORTION THEREOF; Trakstar DOES NOT AND WILL NOT GRANT YOU OR THE CLIENT ANY RIGHT OR LICENSE TO ACCESS OR USE THE SYSTEM OR ANY PORTION THEREOF.

THIS AGREEMENT REQUIRES THE USE OF ARBITRATION TO RESOLVE DISPUTES, RATHER THAN JURY TRIALS.

This Agreement applies to Client’s subscription to the System. This Agreement is subject to change by Trakstar at any time, in Trakstar’s sole discretion, upon Trakstar’s posting a notice on this website (the “Site”) or sending Client a notice via e-mail to notify Client that this Agreement has been revised, and Client hereby consents to receiving such notice in such manner. Any changes to this Agreement will be in effect as of the “Last Updated” date referenced above (the “Last Updated Date”). Client’s continued use of the System after the Last Updated Date will constitute Client’s acceptance of and agreement to such changes. All Order Forms (as defined below) between Trakstar and Client shall be governed by this Agreement.

1.Access to and Use of the System.

1.1.Order Forms. The parties must set forth those services within the System to which Client is receiving or will receive a subscription (the “Services”), together with the term of such subscription, associated fees and other terms, in a mutually approved (which approval may be evidenced in a written agreement, through a click-through agreement or through DocuSign or other reliable electronic means, regardless of whether approval occurs prior to, in conjunction with or following the Effective Date hereof), written order forms (each an “Order Form”). Hereafter, “System” shall be deemed to mean only those parts of the System necessary for Client to receive the Services to which Client has a subscription pursuant to an effective Order Form. The Services shall provide the business functionality set forth in Trakstar’s documentation, as amended by Trakstar from time to time as Trakstar modifies the System (the “Specifications”).

1.2.Access. Subject to the terms and conditions of this Agreement, including the timely payment of all fees due hereunder, Trakstar hereby: (a) agrees to make available to the personnel that Client authorizes to access and use the System (each a “User” and collectively the “Users”) non-exclusive access to the System via the Internet in accordance with the standard access protocol of Trakstar; (b) authorizes Client, on a non-exclusive, non-transferable basis, to have Users access and use the System, which will at all times reside on servers owned or controlled by Trakstar; and (c) authorizes Client, on a non-exclusive, non-transferable basis, to have Users make a reasonable number of copies of Trakstar’s standard documentation that Trakstar provides to Client from time to time (“Documentation”), in whole or in part, as required for Client to produce internal support, training or communication materials regarding usage of the System.

1.3.Limited Scope. Trakstar is providing a limited term subscription to access and use the System during the term set forth on Client’s Order Form. Client acknowledges that access to, and use of, the System is limited to the scope of the express provisions set forth in Section 1.1 and Section 1.2 above and that there are no implied licenses; all rights not expressly granted under this Agreement are reserved by Trakstar.

1.4.Restrictions. Client agrees that it will not, and will not allow its directors, officers, employees, business partners, contractors or agents to:

a.Reverse assemble, reverse engineer, decompile or otherwise attempt to derive source code from the System or any component thereof;

b.Copy, reproduce, modify, sell, lease, sub-license, market or commercially exploit in any way the System or any component thereof (including the further distribution or blank forms or templates) other than as expressly agreed to in this Agreement;

c.Use, or permit the use of, the System except for Client’s internal purposes. Client agrees that it shall not provide access to or perform services for third parties using the System including, but not limited to, any service bureau, time-sharing, lease, distribution or re-sale, rental, application service provider arrangement, or any other arrangement;

d.Disclose, resell or grant access to an access code to the System or any component thereof to any third party not affiliated with Trakstar.

1.5.Updates. Trakstar may, at its sole discretion, make available error corrections, bug fixes, modifications or minor enhancements to the System (each an “Update” and collectively “Updates”) that Trakstar generally makes available to its clients that subscribe to the same Services.

1.6.Upgrades. Trakstar may develop new modules that provide new functionality or services (each an “Upgrade”) that are not part of the Services to which Client is subscribing. Client may, at Client’s discretion, purchase a subscription to an Upgrade pursuant to the terms of a new Order Form.

1.7.Certain Parts of the System.

a.Client acknowledges and agrees that certain parts of the System may be used only to transmit and store resumes (or CVs), files associated with the process of hiring a candidate (hereinafter referred to as “Candidate”), job descriptions and comments with respect to the foregoing. In such parts of the System, Client may not (i) use the Service to upload advertisements or materials other than materials regarding the candidate search process, job descriptions and comments, or (ii) transmit unsolicited information, materials or data (including, without limitation, “spam” messages).

b.Client further acknowledges and agrees that Client may not: (i) transmit any code of a destructive nature or that attempts to automatically gather information from the screen (screen scraping); or (ii) use automated systems (“bots”) to upload multiple streams of data, such as for multiple Candidates, at once. If Trakstar reasonably deems Client’s bandwidth usage to be excessive (as determined solely by Trakstar), in order to protect the responsiveness of services for all clients, Trakstar reserves the right, upon notice to Client, to reduce or disable Client’s use of this part of the System until Client can reduce its bandwidth consumption.

1.8.Right to Modify the System.

a.Trakstar provides a platform that can be configured to meet the needs of its clients without customizing the software directly as part of a one-off build for a given client. However, if Client desires specific development work, then Client will suggest the same to Trakstar and, upon Trakstar and Client executing a written order for the specific development work (“Specific Work”) for the fees set forth in such order, Trakstar will use commercially reasonable efforts to develop such Specific Work and make available the Specific Work to Client as part of the Services.

b.Trakstar reserves the right, in its sole discretion and without incurring any liability to Client, to change, enhance and otherwise modify the specifications for, and formulations and methods of provision of, the System and the Services, provided that such alterations will not materially reduce the functionality of the same. Trakstar further reserves the right, in its sole discretion, to create new products and/or services based upon or incorporating the System, the Services or elements thereof.

1.9.Third Party Products and Services.

a.Client may make certain parts of the System interoperate with third-party products or services, including by way of illustration but not limitation human capital management software, virtual meeting software or document management software (collectively, “Third Party Products”). Any access to or use by Client of such Third Party Products in connection with the Services, and any exchange of data between Client and any third party provider of such Third Party Product (each a “Third Party Provider”), is solely between Client and the applicable Third Party Provider. Trakstar does not warrant or support Third Party Products, whether or not they are designated by Trakstar as “certified” or otherwise, except as expressly specified in an Order Form.

b.If Client uses a Third Party Product in connection with a Service, then (i) Client shall ensure that it has sufficient rights in the Third Party Product and its own Client Data to allow such use by the Third Party Provider and (ii) Client hereby grants to Trakstar permission to allow the applicable Third Party Provider to access the Client Data as required for the interoperation of that Third Party Product with the Services. Trakstar is not responsible for any disclosure, distribution, modification or deletion of Client Data resulting from such access by a Third Party Provider or Third Party Product.

c.Certain features of the System may interoperate with Third Party Products. If Client desires to use such features of the System, then (i) Client will obtain authorization from the Third Party Provider to have the System interface with and access the Third Party Products, and (ii) Client hereby grants Trakstar permission to have the System interface with and access the account(s), data, materials, and other information of Client on the Third Party Product (collectively, “Client’s Third Party Product Materials”) to allow such Third Party Product to interoperate with the Services. Trakstar is not responsible for the operation of any Third Party Product or the availability or operation of the Services to the extent such availability and operation is dependent upon a Third Party Product. If the Third Party Provider ceases to make the Third Party Product available for interoperation with the corresponding Service features on reasonable terms, Trakstar may cease providing those Service features without entitling Client to any refund, credit, or other compensation.

d.Client will (i) be responsible for complying (including, without limitation, ensuring that all Users comply) with this Agreement and Trakstar’s policies available at: https://www.trakstar.com/acceptable-use-policy/, each of which is incorporated into and made a part of this Agreement by reference, (ii) be responsible for ensuring that Client Data and Client’s Third Party Product Materials are at all times accurate and appropriate, are not acquired or provided to Trakstar in violation of any applicable law, policy, contractual restrictions, or other third party rights, and do not infringe or misappropriate any intellectual property or other rights of any party, (iii) use all commercially reasonable efforts to prevent unauthorized access to or use of Services, and notify Trakstar promptly of any such unauthorized access or use, and (iv) use the Services only in accordance with the Documentation and applicable laws and government regulations.

e.Parts of the System may contain links to third party websites and vendors. Any such links to other websites and/or vendors do not represent Trakstar’s endorsement, sponsorship, or approval of such websites (or any content found thereon) or vendors. Client acknowledges that Trakstar does not control such other websites and vendors. Client understands and agrees that Trakstar does not make any representation or warranty whatsoever about any third party website or vendor, or endorse the products or services offered on or by any such website or vendor. Trakstar hereby disclaims: (i) all responsibility and liability for content on third party websites; and (ii) any representations or warranties as to the security of any information (including, without limitation, credit card and other personal information) Client might provide to a third party, and Client hereby irrevocably waives any claim against Trakstar and its directors, officers, employees, agents and members with respect to such websites (including the content thereon) and vendors.

2.Term and Termination.

2.1.Agreement Term. The initial term of this Agreement shall commence upon the date on which Client has both (a) clicked “Accept” to this Agreement and (b) entered into an Order Form with Trakstar (the “Effective Date”) and, unless earlier terminated in accordance with this Agreement, continue until there is no Order Form in effect.

2.2.Order Form Term. The term of each Order Form shall begin on the ‘begin date’ of the applicable Order Form (the “Order Form Begin Date”) and shall continue for the duration specified on the relevant Order Form (the “Order Form Initial Term”), at which time, subject to any fee changes made by Trakstar pursuant to this Agreement, the Order Form Term shall automatically renew for subsequent renewal terms each of that number of years equal to the number of years of the Order Form Initial Term (each an “Order Form Renewal Term” and, together with the Order Form Initial Term, “Order Form Term”), unless and until either Party provides written notice of intent not to renew at least sixty (60) days prior to the end of the then-current Order Form Term.

2.3.Termination. Upon a material breach of this Agreement, the non-breaching Party may send written notice to the breaching Party informing the breaching Party of the nature of the breach and providing thirty (30) days to cure a non-monetary breach and ten (10) days to cure a monetary breach (the “cure period”). If the breaching Party does not cure the material breach within the cure period, the non-breaching Party may immediately terminate this Agreement.

2.4.Effects of Termination.

a.Upon expiration or termination of an Order Form for any reason, (i) any amounts owed to Trakstar under the Order Form before such expiration or termination will be immediately due and payable, and Client will promptly pay any and all such amounts (and with respect to any amounts not paid due to a reasonable dispute, such amounts will be paid at the time of, and to the extent required by, resolution of the dispute, together with Late Payment Fees (as defined below), if any) and (ii) all rights to access or use the Services specified in the Order Form, and the associated System, will immediately terminate.

b.Upon expiration or termination of the Agreement for any reason, (i) any amounts owed to Trakstar under all Order Forms before such expiration or termination will be immediately due and payable, and Client will promptly pay any and all such amounts (and with respect to any amounts not paid due to a reasonable dispute, such amounts will be paid at the time of, and to the extent required by, resolution of the dispute, together with Late Payment Fees (as defined below), if any), (ii) all access to or use of the Services specified under all Order Forms, and the associated System, will immediately terminate and Client and all Users will immediately cease accessing or using the without limitation any Confidential Information) of the other Party in its possession or control and (iv) Client may access and download the Client Data (as defined below) from the System and, to the extent that Client requests the same within five (5) days of the expiration or termination date, Trakstar will, at Client’s expense, assist Client in downloading the Client Data in its then-current state but in a format reasonably acceptable to Client. Trakstar will perform off-boarding activities in accordance with Trakstar’s standard procedures, a copy of which is available upon request.

c.Further, upon expiration or termination of the Agreement for any reason, Client acknowledges and agrees that, unless the parties have otherwise previously agreed in writing or Trakstar is otherwise required by law to do so, Trakstar is not obligated to retain any Client Data for longer than thirty (30) days after the date of expiration or termination and Client authorizes Trakstar to permanently delete all Client Data that remains in Trakstar’s possession or control at the end of such 30 day period. Client shall be solely responsible for downloading all Client Data and complying with all data retention laws applicable to Client.

d.The following Sections will survive the termination or expiration of this Agreement: 2.4; 3.2; 3.3; 8; 9.1; 9.2; 9.3; 9.4; 9.5; 10; 11.2; 11.3; 11.4; 12; 14; and 15.

3.Fees; Payment and Taxes

3.1.Subscription Fees.

a.Client will pay Trakstar the “per seat” subscription fee set forth on the Order Form (the “Subscription Fee”), on an annual basis in advance upon receipt of invoice. Client must provide full legal name, full company name, a valid e-mail address, correct billing information and any other information requested, including any changes in this information throughout the term of the contract, in order to complete the payment process. Client acknowledges and agrees that if Client adds additional seats at any time(s) during the term, then Trakstar may invoice Client for such additional seats at the then-current Subscription Fee. All Subscription Fees are non-refundable with the exception of circumstances in which Client terminates this Agreement for Trakstar’s material, uncured breach in accordance with Section 2.3 above, in which case Client shall receive a pro-rated refund of the prepaid Subscription Fee for the remainder of the Contract Year (as defined below).

b.Client acknowledges and agrees that Subscription Fees, which are the fees paid for each “seat,” are fixed for each Contract Year during the term (provided that Client understands that it will be required to pay for additional seats that it adds at any point(s) during the term), where “Contract Year” means each 12-month period during the term of the applicable Order Form, with the first Contract Year commencing on the effective date of such Order Form and each subsequent Contract Year commencing on the annual anniversary of such effective date. Trakstar may change the Subscription Fees for the next Contract Year upon providing at least seventy-five (75) days’ notice to Client. Trakstar may provide such notice by e-mail, posting to the Site or posting on the System itself, and Client hereby consents to receiving such notice in such manner.

3.2.Late Fees.

a.Client will pay all invoiced amounts to the extent not subject to reasonable dispute within thirty (30) days of the date of invoice unless otherwise expressly set forth in the applicable Order Form. Client will pay all invoiced amounts for subsequent years as set forth in the applicable Order Form within thirty (30) days of the date of invoice unless otherwise expressly set forth in the applicable Order Form. Client will pay all withheld invoiced amounts that had been subject to reasonable dispute to the extent and at the time required by resolution of the dispute.

b.Until paid in full, all amounts that are not subject to good faith dispute that are not paid within thirty (30) days of the date of invoice may, at Trakstar’s discretion, bear an interest charge at the lesser rate of twelve percent (12%) on an annualized basis or the maximum amount permitted under applicable law (the “Late Payment Fee”). With respect to amounts that were subject to good faith dispute, Client will promptly pay such amounts to the extent required by and at the time of the dispute resolution, together with the applicable Late Payment Fee, if any.

3.3.Taxes. All Subscription Fees are exclusive of, and Client will be responsible for, all taxes (including without limitation sales, value-added and similar taxes), duties and the like, other than taxes based upon or calculated by Trakstar’s net income.

4.Service Level Commitment

4.1.Availability; Service Level Exceptions. Trakstar shall use diligent, commercially reasonable efforts with the objective of making the System available to Client at least 99.5% of the time, subject to the following exceptions (“Service Level Exceptions”), for which Trakstar will not be liable:

a.periodic maintenance procedures, enhancements, repairs or corrections with respect to the System or server(s), as deemed necessary by Trakstar (which Includes but is not limited to, infrequent product updates and improvements);

b.periods during which Trakstar has suspended Client’s access to the System as a result of Client’s material breach of this Agreement, which includes without limitation failure to make timely payment of amounts that are due and are not subject to reasonable dispute, provided that Trakstar notifies Client of such material breach and Client does not cure such breach within ten (10) days of receipt of notice;

c.acts or omissions of Client or its Users that cause the service level shortcoming or failure, which by way of illustration but not limitation include Client’s misuse of the System, scheduled or unscheduled outages of the User’s internet browser, known and persistent slow response time on a User’s internal network, or problems with the User’s computer hardware, telecommunications system or electricity; or

d.causes beyond the reasonable control of Trakstar or that are not reasonably foreseeable by Trakstar, including interruption or failure of telecommunication or digital transmission links, delays or failures due to Client’s Internet Service Provider (ISP), hostile network attacks, network congestion or other Force Majeure Event (as defined in Section 13 below).

4.2.Client Obligation. Client agrees that it shall notify Trakstar immediately if Client suspects the System is unavailable due to a fault of Trakstar. In such notice, Client shall provide reasonable information as requested by Trakstar for proper diagnosis and repair.

4.3.Outages. For purposes of this Agreement, an “Outage” occurs when the System is unavailable to Client in Client’s hosted production environment for a reason other than a Service Level Exception and such unavailability causes the System not to meet the 99.5% availability objective (with any Service Level Exception time not counted toward the unavailable time). If an Outage occurs in three (3) consecutive months, then Client may terminate this Agreement upon providing written notice to Trakstar, provided that Client must exercise this right to terminate within thirty (30) days of the latest consecutive Outage or the Agreement will be considered in good standing.

5.Support

5.1.First-Line Support. Client shall provide first-line support to its Users. Client shall appoint an “Internal Administrator” and notify Trakstar in writing regarding the Internal Administrator’s name and contact information. The Internal Administrator shall be responsible for: input of all Client-related information and data, User ID information, and organizational structure (including without limitation accurate job titles and/or roles, which will be used in connection with role-based access to the System); and training of Client’s Users. All User questions regarding the functioning of the System shall be directed first to Client’s Internal Administrator.

5.2.Second-Line Support. Provided that Client is current in its payment of Subscription Fees under this Agreement, Trakstar shall provide its standard technical support and maintenance to Client, solely through Client’s Internal Administrator, during Trakstar’s normal business hours (9:00 AM-8:00 PM Eastern Time M-F). Trakstar may provide such support via telephone, e-mail and other Internet based technology directly to Client’s Internal Administrator. Second-line support means direct technical support of the System, including, but not limited to: (a) direct response to the Internal Administrator’s inquiries concerning performance, functionality or operation of the System; (b) a direct response to reported problems for performance deficiencies with the System; (c) a diagnosis of problems for performance deficiencies of the System; and (d) a resolution of the problems for performance deficiencies of the System. Trakstar shall also provide standard error correction and maintenance modifications to the System.

5.3.Additional Support. Notwithstanding the above, if Trakstar makes a reasonable business determination that the technical support requested by Client pursuant to Section 5.2 will entail detailed, specialized maintenance or support services different in kind or amount from those provided to other clients that subscribe to similar Services, then Trakstar shall notify Client that the requested support is considered an additional service which shall be subject to additional fees, to be negotiated.

5.4. Response Commitments — During our Business Hours (9:00 AM-8:00 PM Eastern Time M-F).
Severity Level Description Communication Schedule
Critical The Services are non-operational, or Users cannot access the System. (post hourly)
High The Services are operational with functional limitations or restrictions but there is minimal business impact. (post every 4 hours)
Standard The Services are operational with functional limitations or restrictions that are not critical to the overall System operation, and the issue has a moderate impact on the functionality of the Services. (post as required)

6.System Maintenance

Trakstar shall employ industry standard practices, using technical and organizational security measures customarily adhered to within the industry, to ensure the security, confidentiality and integrity of all Client data and other information or materials transmitted to or stored on the System by or on behalf of Client or any User (“Client Data”). Trakstar shall make backups of the Client Data in the System on a daily incremental basis during the week on a rolling, 7-day basis, and a full backup each weekend.

7.Certain Client Obligations

7.1.Client is responsible for all activity occurring under its account and will comply with all applicable local, state, national and foreign laws, treaties, and regulations in connection with its access or use of the System, including those related to data privacy, data security, international communications and the transmission of technical or personal data. Client will be solely responsible for ensuring that its Users receive sufficient training to enable proper access or use of the System. Client will be solely responsible for, and will bear the cost of, providing all equipment, facilities and connectivity, including without limitation any Internet access or telecommunications services, necessary to use and access the System.

7.2.A Client’s Users will access the System through Single Sign On (SSO) or non-SSO. If Client is to access the System through SSO, then Client will be responsible for administering the User credentials. If Client is to access the System through non-SSO, then as part of the registration and account creation process, each of Client’s Users will need a unique user name (“User Name”) and password (“Password”). User may not select a User Name that is identical to that used by another person or use a User Name that, in the sole opinion of Trakstar, is offensive or inappropriate. Client shall be solely responsible for its Users’ maintaining the confidentiality of Passwords. Client is solely responsible for all usage or activity on Client’s account, including but not limited to use of Client’s account, Client’s User Names, and Password by any third party. Any fraudulent, abusive, or otherwise illegal activity may be grounds for termination of Client’s account, in Trakstar’s sole discretion, and Trakstar may refer Client to appropriate law enforcement agencies.

8.Confidential Information; Personal Information

8.1.Confidential Information.

a.For purposes of this Agreement, “Confidential Information” means (i) with respect to each party, all nonpublic, business-specific information disclosed or otherwise made available under this Agreement (but in all cases excludes Personal Information, which is addressed in Section 8.2 below) that relates to the provision or receipt, respectively, of the Services or either party’s suppliers, affiliates, investors, customers, products and/or services, pricing, research and development, technology, intellectual property, financial data, or operations and that is clearly identified as confidential at the time of disclosure or that, in light of the nature of the information itself or the circumstances surrounding its disclosure, ought in good faith to be deemed confidential, and (ii) with respect to Trakstar, the System and the Documentation.

b.Obligations. Client agrees to disclose to Trakstar only that Confidential Information of Client that is reasonably necessary to enable Trakstar to provide the Services, and Trakstar agrees to disclose to Client only that Confidential Information of Trakstar that is reasonably necessary to enable Client to receive the Services. The party receiving Confidential Information (the “Receiving Party”) from the other party (the “Disclosing Party”) will not use any Confidential Information of the Disclosing Party for any purpose other than the provision and receipt of Services under this Agreement, respectively, in accordance with all terms and conditions of this Agreement. Further, the Receiving Party will disclose the Confidential Information of the Disclosing Party only to the employees or contractors of the Receiving Party who have a need to know such Confidential Information for purposes of this Agreement and who are under a duty of confidentiality no less restrictive than the Receiving Party’s duty hereunder. The Receiving Party will protect the Disclosing Party’s Confidential Information from unauthorized use, access or disclosure in the same manner as the Receiving Party protects its own confidential or proprietary information of a similar nature and with no less than reasonable care. Client also agrees not to: (i) disclose to third parties (whether in writing or orally) any benchmark test data related to the System; and (ii) use Trakstar’s Confidential Information to create, or have a third party create, any computer software or documentation that is substantially similar to the System software.

c.Termination of Obligations. The Receiving Party’s obligations under this Section 8.1 with respect to any Confidential Information of the Disclosing Party will terminate if and when the Receiving Party can document that such information: (i) was already lawfully known to the Receiving Party at the time of disclosure by the Disclosing Party; (ii) is disclosed to the Receiving Party by a third party who had the right to make such disclosure without any confidentiality restrictions; (iii) is, or through no fault of the Receiving Party has become, generally available to the public; or (iv) is independently developed by the Receiving Party without access to, or use of, the Disclosing Party’s Confidential Information. In addition, the Receiving Party will be allowed to disclose Confidential Information of the Disclosing Party to the extent that such disclosure is: (1) approved in writing by the Disclosing Party; (2) necessary for the Receiving Party to enforce its rights under this Agreement in connection with a legal proceeding; or (3) required by law or by the order or a court of similar judicial or administrative body, provided that the Receiving Party notifies the Disclosing Party of such required disclosure promptly and in writing and cooperates with the Disclosing Party, at the Disclosing Party’s reasonable request and expense, in any lawful action to contest or limit the scope of such required disclosure.

d.Return of Confidential Information. The Receiving Party will return to the Disclosing Party or destroy all Confidential Information of the Disclosing Party in the Receiving Party’s possession or control and permanently erase all electronic copies of such Confidential Information promptly upon the written request of the Disclosing Party.

8.2.Personal Information. Client Data might include information that can be used to identify, locate, or contact an individual, alone or when combined with other personal or identifying information (“Personal Information”). Each of the party’s rights and obligations with respect to Personal Information is set forth in Addendum A attached hereto.

9.Client Data; Client-Third Party System

9.1.Client at all times has and will have sole responsibility:

a.with respect to Client Data, for the accuracy, quality, integrity, legality, reliability and appropriateness of all Client Data, and Client hereby represents, warrants and covenants to Trakstar that (i) Client has all necessary rights in all Client Data and other Confidential Information (including without limitation all intellectual property rights and trade secrets rights), and has obtained all necessary consents, made all necessary disclosures and otherwise complied with all applicable laws and regulations, including without limitation all privacy and data security laws and regulations, to transmit, input, load and use such Client Data and/or other Confidential Information that it enters into the System and to allow Trakstar to provide the Services, as are required by applicable laws, rules or regulations and (ii) Client will be responsible for all appropriate safeguards for the privacy and security of such Client Data and other Confidential Information while the same is within Client’s custody or control, including without limitation the administrative, physical and technical safeguards regarding the same while such Client Data and other Confidential Information is within Client’s custody or control.

b.with respect to any third party system, application, software or online service that Client requests Trakstar to access or use (each a “Client-Third Party System” and, collectively, the “Client-Third Party Systems”), for the quality, integrity, legality, reliability and appropriateness of all Client-Third Party Systems, and Client hereby represents, warrants and covenants to Trakstar that Client has all necessary rights in all Client-Third Party Systems (including without limitation all license and contract rights), and has obtained all necessary authorization from the relevant third parties, to have Trakstar access and use the Client-Third Party Systems pursuant to Client’s written instructions to allow Trakstar to access and use such Client-Third Party Systems in connection with the Services.

9.2.where Client, by virtue of itself and/or the Client Data that is submitted to the System, is subject to the General Data Protection Regulation, Regulation (EU) 2016/679 (“GDPR”), the terms of Trakstar’s data processing addendum attached as Addendum A (the “DPA”), together with the Standard Contractual Clauses and Appendices thereto, form a part of and are hereby incorporated into this Agreement by this reference and apply to the extent Client Data includes Personal Information. For the sake of clarity, when interpreting the DPA, Client will be the data controller, and Trakstar will act as a data processor. In the event Personal Information is transferred from the European Economic Area (EEA), the United Kingdom and/or Switzerland, the Standard Contractual Clauses or another adequate means of protection will apply, as further set forth in the DPA. For the purposes of the Standard Contractual Clauses, Client and its applicable affiliates are each the data exporter, and Client’s acceptance of this Agreement will be treated as Client’s or its applicable affiliate’s execution of the Standard Contractual Clauses and Appendices.

9.3.where Client, by virtue of itself and/or the Client Data that is submitted to the System, is subject to other Data Regulations, Client shall at all times comply with the Data Regulations. For purposes of this Agreement, “Data Regulation” means any applicable data protection, privacy or similar law or regulation that applies to data processed in connection with this Agreement, including FTC Guidance, self-regulatory principles set forth by the Digital Advertising Alliance, the California Consumer Privacy Act of 2018 Cal. Civil Code § 1798.100 et seq. and other U.S. state and federal legislation relating to data privacy and security, in each instance with respect to each of the foregoing as such laws and regulations are amended and revised from time to time.

9.4.Client acknowledges that use of the Services involves transmission of Client Data and other communications over the internet and other networks, and that such transmissions could potentially be accessed by unauthorized parties. Client must promptly notify Trakstar of any suspected security breach at [email protected]. Client is fully responsible, and Trakstar has no liability, for any viruses, worms, Trojan horses, or other disabling code, malware component, or code or program harmful to a network or system (collectively, “Malware”) contained in or originating from Client Data, provided that such Malware was not introduced to the Client Data through Trakstar or did not originate from Trakstar.

9.5.Client hereby authorizes Trakstar to receive, maintain, modify, distribute and display Client Data during the term of this Agreement, solely to enable Trakstar to provide the Services to Client and as otherwise authorized under this Agreement. Client further authorizes Trakstar to collect anonymized Service information, such as usage or traffic patterns, and aggregate it with such data from other clients to generate statistical information to analyze and improve the Services and to develop, display and distribute Trakstar’s Insights benchmark and similar reports, provided that Trakstar takes reasonable measures to ensure this information cannot be associated with Client, Client’s Users, or any identifiable natural person and provided further that Trakstar may only use such anonymized and aggregate Service information in deidentified form and may not attempt to reidentify the information. Except as permitted in this Agreement, Trakstar will not edit, delete, or disclose the contents of Client Data unless authorized by Client or unless Trakstar is required to do so by law or in the good faith belief that such action is necessary to: (i) conform with applicable laws or comply with legal process served on Trakstar; (ii) protect and defend the rights or property of Trakstar; (iii) enforce this Agreement; or (iv) perform Trakstar’s obligations described in this Agreement, the Specifications or in conformance with Client’s instructions.

9.6.Client will be solely responsible where Client, a person or entity acting on behalf of Client or a User deletes, corrects, destroys, damages, loses or fails to store any Client Data.

10.Intellectual Property

10.1.Trakstar Property. Client acknowledges that, as between Trakstar and Client, Trakstar is and will remain sole and exclusive owner of all right, title and interest in and to the System and Documentation, and all components and portions thereof, and all other materials, information, processes and technology used by Trakstar or made available to Client in connection with the Services, and any and all improvements, enhancements, updates, upgrades and modifications to any of the preceding (whether or not made in conjunction with this Agreement) and all Specific Works, and all patent, trade secret, copyright, trademark and other proprietary rights worldwide embodied in each of the preceding.

10.2.Client Property. As between Client and Trakstar, Client is and will remain the sole and exclusive owner of all right, title and interest in and to Client’s Confidential Information and the Client Data.

10.3.Protection of Proprietary Rights. Client shall not remove or obscure any proprietary, copyright, patent, trademark, design right, trade secret, or any other proprietary rights legends from the System or Documentation.

11.Limited Warranty; Disclaimer

11.1.Warranty. Trakstar represents and warrants that the System and the Services provided under this Agreement will substantially conform to the Specifications and the Documentation made available by Trakstar.

11.2.Disclaimer. Except as expressly provided in Section 11.1 above, Trakstar and its licensors expressly disclaim any and all representations, warranties and conditions of any kind or nature, express or implied, whether written or oral, including without limitation, representations, warranties and conditions of satisfactory quality, performance, merchantability, merchantable quality, durability, fitness for a particular purpose, title, non-infringement and those arising by statute or otherwise in law or from a course of dealing or use of trade. Trakstar and its licensors do not represent or warrant that: (a) the Services will meet the Client’s business requirements; (b) the Services will be error-free or uninterrupted or that the results obtained from its use will be accurate or reliable; or (c) all deficiencies in the System or any Services can be found or corrected. Some states do not allow limitations relating to implied warranties, so the above limitations may not apply to Client.

11.3.Acknowledgement. Where applicable, Client acknowledges that Trakstar has no control over, and no duty to take any action regarding: which of the Client’s Client Data the Client accesses via the System; what effects the Client Data may have on Client or any User; how Client may interpret or use the Client Data; or what actions Client may take as a result of having been exposed to the Client Data. Client releases Trakstar from any and all liability for Client having acquired or not acquired, used or not used, relied upon or not relied upon, acted upon or not acted upon Client Data obtained or obtainable through the System. Trakstar makes no representations or warranties concerning the content of any Client Data contained in or accessed through the System, and Trakstar will not be responsible or liable for the accuracy, completeness, copyright compliance or legality of Client Data contained in or accessed through the System.

11.4.Exclusive Remedy. Except for the exclusive remedy as provided above for service level commitments, and except for the exclusive remedy provided by Trakstar for infringement, for any breach of warranty or the failure of Trakstar to provide the services as required herein (a “deficiency”), the Client’s sole and exclusive remedy and Trakstar’s entire obligation hereunder shall be, at Trakstar’s option, for Trakstar to cure the deficiency or for Trakstar to refund an amount equal to the amount Client paid for the deficiency reduced by any benefit received by Client for the deficiency.

12.Limitations of Liability; Indemnification

12.1.Limitations.

a.TO THE FULLEST EXTENT ALLOWED BY APPLICABLE LAW, FOR ANY BREACH OR DEFAULT BY TRAKSTAR OF ANY OF THE PROVISIONS OF THIS AGREEMENT OTHER THAN ANY BREACH OR DEFAULT OF ADDENDUM A, UNDER NO CIRCUMSTANCE WILL TRAKSTAR AND ITS LICENSORS’ ENTIRE LIABILITY, IF ANY, EXCEED ONE TIMES (1X) THE SUBSCRIPTION FEE ACTUALLY PAID BY CLIENT TO TRAKSTAR FOR THE CONTRACT YEAR IN WHICH THE CAUSE OF ACTION FIRST AROSE. TO THE FULLEST EXTENT ALLOWED BY APPLICABLE LAW, FOR ANY BREACH OR DEFAULT BY TRAKSTAR OF ADDENDUM A, UNDER NO CIRCUMSTANCE WILL TRAKSTAR AND ITS LICENSORS’ ENTIRE LIABILITY, IF ANY, EXCEED ONE TIMES (1X) THE SUBSCRIPTION FEE ACTUALLY PAID BY CLIENT TO TRAKSTAR FOR THE CONTRACT YEAR IN WHICH THE CAUSE OF ACTION FIRST AROSE.

b.TO THE FULLEST EXTENT ALLOWED BY APPLICABLE LAW, IN NO EVENT WILL TRAKSTAR AND ITS LICENSORS BE LIABLE FOR SPECIAL, INCIDENTAL, INDIRECT, OR CONSEQUENTIAL LOSS OR DAMAGE, LOST BUSINESS REVENUE, LOSS OF PROFITS, LOSS OF DATA, LOSS OF COVER, DAMAGES FOR DELAY, PUNITIVE OR EXEMPLARY DAMAGES, FAILURE TO REALIZE EXPECTED PROFITS OR SAVINGS OR ANY CLAIM AGAINST CLIENT BY ANY OTHER PERSON, REGARDLESS OF THE FORUM AND REGARDLESS OF WHETHER IN AN ACTION BASED ON CONTRACT, WARRANTY, STRICT LIABILITY, TORT (INCLUDING BUT NOT LIMITED TO NEGLIGENCE) OR OTHERWISE, EVEN IF TRAKSTAR AND ITS LICENSORS HAVE BEEN ADVISED OF THE POSSIBILITY OF ANY SUCH LOSSES OR DAMAGES AND EVEN IF THE REMEDY SET FORTH HEREIN SHALL BE DEEMED TO HAVE FAILED OF ITS ESSENTIAL PURPOSE.

c.EACH PROVISION OF THIS AGREEMENT THAT PROVIDES FOR A LIMITATION OF LIABILITY, DISCLAIMER OF WARRANTIES, OR EXCLUSION OF DAMAGES IS TO ALLOCATE THE RISKS OF THIS AGREEMENT BETWEEN THE PARTIES. THIS ALLOCATION IS REFLECTED IN THE PRICING OFFERED BY TRAKSTAR TO CLIENT AND IS AN ESSENTIAL ELEMENT OF THE BASIS OF THE BARGAIN BETWEEN THE PARTIES. EACH OF THESE PROVISIONS IS SEVERABLE AND INDEPENDENT OF ALL OTHER PROVISIONS OF THIS AGREEMENT. THE LIMITATIONS IN THIS SECTION 12 WILL APPLY NOTWITHSTANDING THE FAILURE OF ESSENTIAL PURPOSE OF ANY LIMITED REMEDY IN THIS AGREEMENT.

12.2.Disclaimer. To the fullest extent allowed by law, Trakstar disclaims any liability or responsibility for the reliability, availability, or operability of the Services provided through the System. By using the System, Client acknowledge that Trakstar is not responsible or liable for any harm resulting from: (a) use of the System; (b) the temporary or permanent inability to access or retrieve any content from the System; and (c) downloading information contained on the System, including, without limitation, harm caused by viruses, worms, trojan horses, or any similar contamination or destructive program. The limitations specified in this Section will survive termination or expiration of this Agreement.

12.3.One Year Limit. No Party may bring an action, regardless of form, arising out of or related to this Agreement (other than to recover fees or expenses due to Trakstar) more than one year after the cause of action has arisen or the date of discovery of such cause, whichever is later.

12.4.Indemnification by Client. Subject to the provisions contained herein, Client agrees to defend, indemnify and hold Trakstar and its officers, directors, employees, agents, affiliates, licensors, distributors, and resellers harmless against any loss, damage, expense, or cost, including reasonable attorneys’ fees (including allocated costs for in-house legal services) (“Liabilities”) arising out of any claim, demand, proceeding, or lawsuit by a third party relating to Client’s acts or omissions related to Client’s representations, warranties and covenants set forth in Section 9.1.

12.5.Indemnification by Trakstar. In the event of a third party claim against Client asserting that Client’s use of the System infringes upon or violates any U.S. patent, copyright, trade secret, or other proprietary right, as Client’s exclusive remedy, Trakstar will defend, at Trakstar’s expense, and will indemnify Client and hold Client harmless against any loss, cost, expense (including attorneys’ fees), or liability arising out of such claim, whether or not such claim is successful. In the event an injunction or order should be obtained against use of the System by reason of the allegations, or if in Trakstar’s opinion the System is likely to become the subject of such a claim of infringement, Trakstar will, at its option and its expense, and as Client’s exclusive remedy: (a) procure for the Client the right to continue using the System; (b) replace or modify the same so that it becomes non-infringing (such modification or replacement shall be functionally equivalent in all material respects to the original); or (c) if neither (a) nor (b) is practicable, refund any prepaid subscription fees, on a pro-rated basis, for Services not rendered and terminate this Agreement. Notwithstanding the foregoing, Trakstar will not indemnify Client to the extent that the claim arises because Client altered the System or used it outside the scope of use identified in the Trakstar’s user documentation. In addition, Trakstar will not indemnify Client to the extent that an infringement claim is based upon (i) any information, design, specification, instruction, software, data, or material not furnished by Trakstar, or (ii) any system from a third party portal or other external source that is accessible to Client within or from the System (e.g., a third-party Web page accessed via a hyperlink) or (iii) based upon the combination of any system with any products or services not provided by Trakstar. This Section provides Client’s exclusive remedy for any infringement claims or damages.

13.Force Majeure

Notwithstanding anything in this Agreement to the contrary, each party will be excused from performance hereunder (excluding payment obligations) for any period and to the extent that it is prevented from performing pursuant hereto, in whole or in part, as a result of delays caused by a Force Majeure Event. For purposes of this Agreement, “Force Majeure Event” means an act of God, war (whether or not actually declared), armed conflict or the serious threat of the same, hostility, blockade, military embargo, sabotage, insurrection, rebellion, act of a public enemy, riot or other act of civil disobedience, governmental act, judicial action, explosion, act of terrorism or threat thereof (including cyberterrorism), natural disaster (including without limitation asteroid strikes or volcanic activity), violent storm (including without limitation hurricanes, tornados or blizzards), atmospheric disturbance (including without limitation geomagnetic storm, solar flare or sun outage with respect to electricity grids, transformers and satellite transmissions), destruction by lightning, fire, earthquake, tsunami, flood, plague, epidemic, pan-epidemic, quarantine, civil commotion, strike or lockout or labor dispute (excluding for the avoidance of doubt strikes of Trakstar’s staff), satellite malfunction, prolonged internet outage, communications line failure or power failure.

14.Waiver of Jury Trials and Binding Arbitration

14.1.CLIENT AND TRAKSTAR ARE AGREEING TO GIVE UP ANY RIGHTS TO LITIGATE CLAIMS IN A COURT OR BEFORE A JURY. OTHER RIGHTS THAT CLIENT WOULD HAVE IF CLIENT WENT TO COURT MAY ALSO BE UNAVAILABLE OR MAY BE LIMITED IN ARBITRATION. ANY CLAIM, DISPUTE OR CONTROVERSY (WHETHER IN CONTRACT, TORT OR OTHERWISE, WHETHER PRE-EXISTING, PRESENT OR FUTURE, AND INCLUDING STATUTORY, CONSUMER PROTECTION, COMMON LAW, INTENTIONAL TORT, INJUNCTIVE AND EQUITABLE CLAIMS) BETWEEN CLIENT AND TRAKSTAR ARISING FROM OR RELATING IN ANY WAY TO CLIENT’S SUBSCRIPTION TO, ACCESS TO, OR USE OF THE SYSTEM WILL BE RESOLVED EXCLUSIVELY AND FINALLY BY BINDING ARBITRATION.

14.2.The arbitration will be administered by the American Arbitration Association (“AAA”) under its Commercial Arbitration Rules and Mediation Procedures (“Commercial Rules”). The arbitrator will have exclusive authority to resolve any dispute relating to arbitrability and/or enforceability of this arbitration provision, including any unconscionability challenge or any other challenge that the arbitration provision or the agreement is void, voidable or otherwise invalid. The arbitrator will be empowered to grant whatever relief would be available in court under law or in equity. Any award of the arbitrator(s) will be final and binding on each of the parties, and may be entered as a judgment in any court of competent jurisdiction.

14.3.If any provision of this arbitration agreement is found unenforceable, the unenforceable provision will be severed, and the remaining arbitration terms will be enforced.

15.Miscellaneous.

15.1.Assignment. Neither party may assign this Agreement without the other party’s prior written consent (not to be unreasonably delayed, conditioned or withheld), and any purported attempt to do so is null and void, provided, however, that either party may, without requiring the consent of the other party, assign this Agreement and all of its rights under this Agreement to an Affiliate or an assignee in the event of a merger, sale of assets of the business to which this Agreement is related, or consolidation. Any purported assignment or delegation in violation of this Section 15.1 is null and void. No assignment or delegation relieves the assigning party of any of its obligations under this Agreement.

15.2.Choice of Law. All matters arising out of or relating to this Agreement are governed by and construed in accordance with the internal laws of the State of Delaware without giving effect to any choice or conflict of law provision or rule (whether of the State of Delaware or any other jurisdiction) that would cause the application of the laws of any jurisdiction other than those of the State of Delaware.

15.3.Entire Agreement. This Agreement and all Exhibits hereto and Trakstar’s Acceptable Use Policy, a current copy of which can be accessed here, as well as agreements and other documents referred to in this Agreement constitute the entire agreement between the Parties with regard to the subject matter hereof and thereof. This Agreement supersedes all previous agreements between or among the Parties. There are no agreements, representations, or warranties between or among the Parties other than those set forth in this Agreement or the documents and agreements referred to in this Agreement.

15.4.Export Compliance. The Services, the System, and other Trakstar technology might be subject to export laws and regulations of the United States and other jurisdictions. Each party represents that it is not named on any government denied-party list. Client further represents that it is not located, and will not access or use, or permit any User to access or use, any part of the System or Services in any U.S.-embargoed country or region (including but not limited to Cuba, Iran, North Korea, Sudan, Syria or Crimea), or access or use any part of the System or Services in violation of any applicable U.S., local or foreign export laws or regulations.

15.5.Feedback. Client may, but is not required to, provide feedback to Trakstar from time to time at its discretion, which feedback will not be treated as Client’s Confidential Information. To the extent Client does provide feedback to Trakstar, Client shall, and hereby does, grant Trakstar a perpetual, irrevocable, non-exclusive, worldwide, transferable, assignable, sub-licensable, royalty-free, fully paid-up license to use and exploit the feedback for any purpose.

15.6.Independent Contractor Relationship. The relationship between the Parties to this Agreement is that of independent contractors. Neither Party is an agent, representative or employee of the other Party. Neither Party will have any right, power or authority to enter into any agreement for or on behalf of, or incur any obligation or liability of, or to otherwise bind, the other Party. This Agreement will not be interpreted or construed to create an association, agency, joint venture or partnership between the Parties or to impose any liability attributable to such a relationship upon either Party.

15.7.Notice. Any notice, approval, request, authorization, direction or other communication under this Agreement will be given in writing and will be deemed to have been delivered and given for all purposes (a) on the delivery date if delivered by confirmed facsimile; (b) on the delivery date if delivered personally to the Party to whom the same is directed; (c) one business day after deposit with a commercial overnight carrier, with written verification of receipt; or (d) five business days after the mailing date, if sent by U.S. mail, return receipt requested, postage and charges prepaid, or any other means of rapid mail delivery for which a receipt is available. The contact information below the Parties signatures may be used by the Parties hereto.

15.8.Severability. If any term or provision of this Agreement is determined to be illegal, unenforceable, or invalid in whole or in part for any reason, such illegal, unenforceable, or invalid provisions or part thereof shall be stricken from this Agreement, and such provision shall not affect the legality, enforceability, or validity of the remainder of this Agreement. If any provision or part thereof of this Agreement is stricken in accordance with the provisions of this Section, then this stricken provision shall be replaced, to the extent possible, with a legal, enforceable, and valid provision that is as similar in tenor to the stricken provision as is legally possible.

15.9.Third-Party Beneficiaries. This Agreement does not and is not intended to confer any rights or remedies upon any person or entity other than Client and Trakstar.

15.10.Waivers. The failure by Trakstar to enforce any right or provision of this Agreement will not constitute a waiver of future enforcement of that right or provision. The waiver of any right or provision will be effective only if in writing and signed by a duly authorized representative of Trakstar.

ADDENDUM A

PERSONAL INFORMATION

1.Data Processing Addendum

1.1.A copy of the Trakstar Data Processing Addendum can be found at https://www.trakstar.com/data-processing-addendum and will be executed with Clients to whom the UK and EU General Data Protection Regulation applies.

2.CCPA

2.1.Definitions. The following definitions and rules of interpretation apply in this Agreement: (i) “CCPA” means the California Consumer Privacy Act of 2018, as amended (Cal. Civ. Code §§ 1798.100 to 1798.199), the CCPA Regulations (Cal. Code Regs. tit. 11, §§ 999.300 to 999.337), and any related regulations or guidance provided by the California Attorney General, terms defined in the CCPA, including personal information and business purposes, carry the same meaning in this Addendum; (ii) “Contracted Business Purposes” means the services described in this Agreement for which Trakstar receives or accesses personal information; and (iii) “Authorized Persons” means the persons or categories of persons that Client authorizes to provide Trakstar with personal information processing instructions, which includes Employees, Contractors, Applicants, Hiring Managers, Trainees, and Trainers.

2.2.Trakstar’s CCPA Obligations.

a.Trakstar will only collect, use, retain or disclose personal information for the Contracted Business Purposes for which Client provides or permits personal information access from Authorized Persons.

b.Trakstar will not collect, use, retain, disclose, sell or otherwise make personal information available for Trakstar’s own commercial purposes or in a way that does not comply with the CCPA. If a law requires Trakstar to disclose personal information for a purpose unrelated to the Contracted Business Purpose, Trakstar must first inform Client of the legal requirement and give Client an opportunity to object or challenge the requirement, unless the law prohibits such notice.

c.Trakstar will limit personal information collection, use, retention and disclosure to activities reasonably necessary and proportionate to achieve the Contracted Business Purposes or another compatible operational purpose.

d.Trakstar must promptly comply with any Client request or instruction from Authorized Persons requiring Trakstar to provide, amend, transfer or delete the personal information, or to stop, mitigate or remedy any unauthorized processing.

e.If the Contracted Business Purposes require the collection of personal information from individuals on Client’s behalf, Trakstar will always provide a CCPA-compliant notice at collection that Client specifically pre-approves in writing. Trakstar will not modify or alter the notice in any way without Client’s prior written consent.

f.Where the CCPA permits, Trakstar may aggregate, deidentify or anonymize personal information so it no longer meets the personal information definition, and may use such aggregated, deidentified or anonymized data for its own research and development purposes as well as for other commercial purposes, such as trendspotting or benchmarking. Trakstar will not attempt to or actually re-identify any previously aggregated, deidentified or anonymized data and will contractually prohibit downstream data recipients from attempting to or actually re-identifying such data.

2.3.Assistance with Client’s CCPA Obligations.

a.Trakstar will reasonably cooperate and assist Client with meeting Client’s CCPA compliance obligations and responding to CCPA-related inquiries, including responding to verifiable consumer requests, taking into account the nature of Trakstar’s processing and the information available to Trakstar.

b.Trakstar must notify Client immediately if it receives any complaint, notice or communication that directly or indirectly relates either party’s compliance with the CCPA. Specifically, Trakstar must notify Client within [ten (10)] working days if it receives a verifiable consumer request under the CCPA.

2.4.Subcontracting

a.Trakstar may use subcontractors to provide portions of the Contracted Business Services. Trakstar cannot make any disclosures to the subcontractor that the CCPA would treat as a sale.

b.For each subcontractor used, Trakstar will give Client an up-to-date list disclosing:

(1) The subcontractor’s name, address and contact information.

(2) The type of services provided by the subcontractor.

(3) The personal information categories disclosed to the subcontractor in the preceding 12 months.

c.Trakstar remains fully liable to Client for the subcontractor’s performance of its agreement obligations.

d.In the event that Trakstar audits a subcontractor’s compliance with its personal information obligations, Trakstar will provide Client with the audit results.

2.5.CCPA Warranties.

a.Each party will comply with all applicable requirements of the CCPA when collecting, using, retaining or disclosing personal information.

b.Trakstar warrants that it has no reason to believe any CCPA requirements or restrictions prevent it from providing any of the Contracted Business Purposes or otherwise performing under this Agreement. Trakstar must, promptly after becoming aware of the same, notify Client of any changes to the CCPA’s requirements that might adversely affect its performance under the Agreement.

CCPA Supplemental Privacy Policy

Last updated as of the 22nd day of June, 2022

This supplemental privacy policy for California residents supplements the information contained in the Privacy Policy of Applied Training Systems, Inc. and its subsidiaries, collectively doing business as “Trakstar” (collectively, “Trakstar,” “we,” “us,” or “our”) and applies solely to visitors, users, and others who reside in the State of California (“consumers” or “you”). We adopt this notice to comply with the California Consumer Privacy Act of 2018 (“CCPA”) and other California privacy laws. Any terms defined in the CCPA have the same meaning when used in this notice.

Information We Collect

We collect information that identifies, relates to, describes, references, is capable of being associated with, or could reasonably be linked, directly or indirectly, with a particular consumer or device (“personal information”). In particular, we have collected the following categories of personal information from consumers within the last twelve (12) months:

 

Category Examples Collected
A. Identifiers. A real name, alias, postal address, unique personal identifier, online identifier, Internet Protocol address, email address, account name, Social Security number, driver’s license number, passport number, or other similar identifiers. YES
B. Personal information categories listed in the California Customer Records statute (Cal. Civ. Code § 1798.80(e)). A name, signature, Social Security number, physical characteristics or description, address, telephone number, passport number, driver’s license or state identification card number, insurance policy number, education, employment, employment history, bank account number, credit card number, debit card number, or any other financial information, medical information, or health insurance information. Some personal information included in this category may overlap with other categories. YES
C. Protected classification characteristics under California or federal law. Age (40 years or older), race, color, ancestry, national origin, citizenship, religion or creed, marital status, medical condition, physical or mental disability, sex (including gender, gender identity, gender expression, pregnancy or childbirth and related medical conditions), sexual orientation, veteran or military status, genetic information (including familial genetic information). YES
D. Commercial information. Records of personal property, products or services purchased, obtained, or considered, or other purchasing or consuming histories or tendencies. NO
E. Biometric information. Genetic, physiological, behavioral, and biological characteristics, or activity patterns used to extract a template or other identifier or identifying information, such as, fingerprints, faceprints, and voiceprints, iris or retina scans, keystroke, gait, or other physical patterns, and sleep, health, or exercise data. NO
F. Internet or other similar network activity. Browsing history, search history, information on a consumer’s interaction with a website, application, or advertisement. YES
G. Geolocation Data. Physical location or movements. NO
H. Sensory Data. Audio, electronic, visual, thermal, olfactory, or similar information. NO
I. Professional or employment-related information. Current or past job history or performance evaluations. YES
J. Non-public education information (per the Family Educational Rights and Privacy Act (20 U.S.C. Section 1232g, 34 C.F.R. Part 99)). Education records directly related to a student maintained by an educational institution or party acting on its behalf, such as grades, transcripts, class lists, student schedules, student identification codes, student financial information, or student disciplinary records. NO
K. Inferences drawn from other personal information. Profile reflecting a person’s preferences, characteristics, psychological trends, predispositions, behavior, attitudes, intelligence, abilities, and aptitudes. NO

Personal information does not include:

  • Publicly available information from government records.
  • De-identified or aggregated consumer information.
  • Information excluded from the CCPA’s scope, like:
    • health or medical information covered by the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and the California Confidentiality of Medical Information Act (CMIA) or clinical trial data;
    • personal information covered by certain sector-specific privacy laws, including the Fair Credit Reporting Act (FRCA), the Gramm-Leach-Bliley Act (GLBA) or California Financial Information Privacy Act (FIPA), and the Driver’s Privacy Protection Act of 1994.

We obtain the categories of personal information listed above from the following categories of sources:

  • Directly, through background checks conducted during the hiring process.
  • Directly and indirectly from activity on our website and products. For example, from submissions through our websites or through usage details collected automatically.

Use of Personal Information

We may use or disclose the personal information we collect for one or more of the following business purposes:

  • To carry out our obligations and enforce our rights arising from any contracts entered into between you and us, including services, billing, and collections.
  • To fulfill or meet the reason for which the information is provided. For example, if your employer provides us with your personal information for services related to products we offer, we will use that information to fulfill such services under the applicable customer agreement.
  • To provide you with information, products or services that you request from us.
  • To provide you with alerts and other notices concerning our products or services, or events or news, that may be of interest to you.
  • To carry out our obligations and enforce our rights arising from any contracts entered into between you and us, including services, billing, and collections.
  • To improve our website and present its contents to you.
  • For testing, research, analysis and product development.
  • As necessary or appropriate to protect the rights, property or safety of us, our clients or others.
  • To respond to law enforcement requests and as required by applicable law, court order, or governmental regulations.
  • As described to you when collecting your personal information or as otherwise set forth in the CCPA.
  • To evaluate or conduct a merger, divestiture, restructuring, reorganization, dissolution, or other sale or transfer of some or all of our assets, whether as a going concern or as part of bankruptcy, liquidation, or similar proceeding, in which personal information held by us is among the assets transferred.

We will not collect additional categories of personal information or use the personal information we collected for materially different, unrelated, or incompatible purposes without providing you notice.

Sharing Personal Information

We may disclose your personal information to a third party for a business purpose. When we disclose personal information for a business purpose, we enter a contract that describes the purpose and requires the recipient to both keep that personal information confidential and not use it for any purpose except performing the contract.

In the preceding twelve (12) months, we have disclosed the following categories of personal information for a business purpose:

Category A: Identifiers.

Category B: California Customer Records personal information categories.

Category I: Professional or employment-related information.

We disclose your personal information for a business purpose to the following categories of third parties:

  • Our affiliates.
  • Service providers.
  • Third parties to whom you or your employer authorizes us to disclose your personal information in connection with products or services we provide to you.

In the preceding twelve (12) months, we have not sold any personal information.

Your Rights and Choices

The CCPA provides consumers (California residents) with specific rights regarding their personal information. This section describes your CCPA rights and explains how to exercise those rights.

Right to Know and Data Portability

You have the right to request that we disclose certain information to you about our collection and use of your personal information over the past 12 months (the “right to know”). Once we receive your request and confirm your identity, we will disclose to you:

  • The categories of personal information we collected about you.
  • The categories of sources for the personal information we collected about you.
  • Our business or commercial purpose for collecting or selling that personal information.
  • The categories of third parties with whom we share that personal information.
  • The specific pieces of personal information we collected about you (also called a data portability request).
  • If we sold or disclosed your personal information for a business purpose, two separate lists disclosing:
    • sales, identifying the personal information categories that each category of recipient purchased; and
    • disclosures for a business purpose, identifying the personal information categories that each category of recipient obtained.

Right to Delete

You have the right to request that we delete any of your personal information that we collected from you and retained, subject to certain exceptions (the “right to delete”). Once we receive your request and confirm your identity, we will delete (and direct our service providers to delete) your personal information from our records, unless an exception applies.

We may deny your deletion request if retaining the information is necessary for us or our service providers to:

  1. Provide services under agreements with our customers where a lawful use of your information has been established.
  2. Complete services for which we collected the personal information, provide a good or service that you requested, take actions reasonably anticipated within the context of our ongoing business relationship with you, or otherwise perform our services with you.
  3. Detect security incidents, protect against malicious, deceptive, fraudulent, or illegal activity, or prosecute those responsible for such activities.
  4. Debug products to identify and repair errors that impair existing intended functionality.
  5. Exercise free speech, ensure the right of another consumer to exercise their free speech rights, or exercise another right provided for by law.
  6. Comply with the California Electronic Communications Privacy Act (Cal. Penal Code § 1546 seq.).
  7. Engage in public or peer-reviewed scientific, historical, or statistical research in the public interest that adheres to all other applicable ethics and privacy laws, when the information’s deletion may likely render impossible or seriously impair the research’s achievement, if you previously provided informed consent.
  8. Enable solely internal uses that are reasonably aligned with consumer expectations based on your relationship with us.
  9. Comply with a legal obligation.
  10. Make other internal and lawful uses of that information that are compatible with the context in which you provided it.

We will delete or deidentify personal information not subject to one of these exceptions from our records and will direct our service providers to take similar action.

Exercising Your Rights to Know or Delete

To exercise the access, data portability, and deletion rights described above, please submit a verifiable consumer request to us by either:

  • Emailing [email protected]
  • Calling us at 1 (877) 489-5651

Only you, or someone legally authorized to act on your behalf, may make a request to know or delete related to your personal information. You may also make a request to know or delete on behalf of your minor child.

You may only make a verifiable consumer request for access or data portability twice within a 12-month period. The verifiable consumer request must:

  • Provide sufficient information that allows us to reasonably verify you are the person about whom we collected personal information or an authorized representative.
  • Describe your request with sufficient detail that allows us to properly understand, evaluate, and respond to it.

We cannot respond to your request or provide you with personal information if we cannot verify your identity or authority to make the request and confirm the personal information relates to you. Making a request to know or delete does not require you to create an account with us. However, we do consider requests made through your password protected account sufficiently verified when the request relates to personal information associated with that specific account. We will only use personal information provided in a verifiable consumer request to verify the requestor’s identity or authority to make the request.

Response Timing and Format

We will confirm receipt of your request within ten (10) business days. If you do not receive confirmation within the 10-day timeframe, please contact [email protected]. We endeavor to respond to a verifiable consumer request within 45 days of its receipt. If we require more time (up to 90 days), we will inform you of the reason and extension period in writing. If you have an account with us, we will deliver our written response to that account. If you do not have an account with us, we will deliver our written response electronically. Any disclosures we provide will only cover the 12-month period preceding the verifiable consumer request’s receipt. The response we provide will also explain the reasons we cannot comply with a request, if applicable. For data portability requests, we will select a format to provide your personal information that is readily useable and should allow you to transmit the information from one entity to another entity without hindrance.

We do not charge a fee to process or respond to your verifiable consumer request unless it is excessive, repetitive, or manifestly unfounded. If we determine that the request warrants a fee, we will tell you why we made that decision and provide you with a cost estimate before completing your request.

Personal Information Sales Opt-Out and Opt-In Rights

We do not sell the personal information of consumers.

If you are age 16 or older, you have the right to direct us to not sell your personal information at any time (the “right to opt-out”). We do not sell the personal information of consumers we actually know are less than 16 years old. Consumers who opt-in to personal information sales may opt-out of future sales at any time.

To exercise the right to opt-out, you (or your authorized representative) may submit a request to us by emailing [email protected].

Once you make an opt-out request, we will wait at least twelve (12) months before asking you to reauthorize personal information sales. However, you may change your mind and opt back into personal information sales at any time by contacting us at [email protected].

You do not need to create an account with us to exercise your opt-out rights. We will only use personal information provided in an opt-out request to review and comply with the request.

Non-Discrimination

We will not discriminate against you for exercising any of your CCPA rights. Unless permitted by the CCPA, we will not:

  • Deny you goods or services.
  • Charge you different prices or rates for goods or services, including through granting discounts or other benefits, or imposing penalties.
  • Provide you a different level or quality of goods or services.
  • Suggest that you may receive a different price or rate for goods or services or a different level or quality of goods or services.

Changes to Our Privacy Notice

We reserve the right to amend this supplemental privacy policy at our discretion and at any time. When we make changes to this privacy policy, we will post the updated notice on the Website and update the policy’s effective date. Your continued use of our Website following the posting of changes constitutes your acceptance of such changes.

Contact Information

If you have any questions or comments about this notice, our Privacy Policy, the ways in which we collect and use your personal information, your choices and rights regarding such use, or wish to exercise your rights under California law, please do not hesitate to contact us at:

Phone:
1 (877) 489-5651
Website:
https://www.trakstar.com
Email:
[email protected]
Postal Address:
Applied Training Systems, Inc.
Attn: DPO
113 Cherry St.
PMB 57615
Seattle, WA 98104

If you need to access this supplemental privacy policy in an alternative format due to having a disability, please contact [email protected] or call 1 (877) 489-5651.


California Consumer Privacy Act (CCPA) Notice to Applicants

This privacy notice for California residents who are applicants to Trakstar positions, supplements the information contained in the Privacy Policy of Applied Training Systems, Inc. and its subsidiaries (collectively, “we,” “us,” or “our”) and applies solely to applicants for Trakstar including visitors, users, and others who reside in the State of California (“consumers” or “you”). We adopt this notice to comply with the California Consumer Privacy Act of 2018 (“CCPA”) and other California privacy laws. Any terms defined in the CCPA have the same meaning when used in this notice.

Information We Collect

We collect information that identifies, relates to, describes, references, is capable of being associated with, or could reasonably be linked, directly or indirectly, with a particular consumer or device (“personal information”). In particular, we have collected the following categories of personal information from consumers within the last twelve (12) months:

Category Examples Collected
A. Identifiers. A real name, alias, postal address, unique personal identifier, online identifier, Internet Protocol address, email address, account name, Social Security number, driver’s license number, passport number, or other similar identifiers. YES
B. Personal information categories listed in the California Customer Records statute (Cal. Civ. Code § 1798.80(e)). A name, signature, Social Security number, physical characteristics or description, address, telephone number, passport number, driver’s license or state identification card number, insurance policy number, education, employment, employment history, bank account number, credit card number, debit card number, or any other financial information, medical information, or health insurance information. Some personal information included in this category may overlap with other categories. YES
C. Protected classification characteristics under California or federal law. Age (40 years or older), race, color, ancestry, national origin, citizenship, religion or creed, marital status, medical condition, physical or mental disability, sex (including gender, gender identity, gender expression, pregnancy or childbirth and related medical conditions), sexual orientation, veteran or military status, genetic information (including familial genetic information). YES
D. Commercial information. Records of personal property, products or services purchased, obtained, or considered, or other purchasing or consuming histories or tendencies. NO
E. Biometric information. Genetic, physiological, behavioral, and biological characteristics, or activity patterns used to extract a template or other identifier or identifying information, such as, fingerprints, faceprints, and voiceprints, iris or retina scans, keystroke, gait, or other physical patterns, and sleep, health, or exercise data. NO
F. Internet or other similar network activity. Browsing history, search history, information on a consumer’s interaction with a website, application, or advertisement. YES
G. Geolocation Data. Physical location or movements. NO
H. Sensory Data. Audio, electronic, visual, thermal, olfactory, or similar information. NO
I. Professional or employment-related information. Current or past job history or performance evaluations. YES
J. Non-public education information (per the Family Educational Rights and Privacy Act (20 U.S.C. Section 1232g, 34 C.F.R. Part 99)). Education records directly related to a student maintained by an educational institution or party acting on its behalf, such as grades, transcripts, class lists, student schedules, student identification codes, student financial information, or student disciplinary records. NO
K. Inferences drawn from other personal information. Profile reflecting a person’s preferences, characteristics, psychological trends, predispositions, behavior, attitudes, intelligence, abilities, and aptitudes. NO

Personal information does not include:

  • Publicly available information from government records.
  • De-identified or aggregated consumer information.
  • Information excluded from the CCPA’s scope, like:
    • health or medical information covered by the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and the California Confidentiality of Medical Information Act (CMIA) or clinical trial data;
    • personal information covered by certain sector-specific privacy laws, including the Fair Credit Reporting Act (FRCA), the Gramm-Leach-Bliley Act (GLBA) or California Financial Information Privacy Act (FIPA), and the Driver’s Privacy Protection Act of 1994.

We obtain the categories of personal information listed above from the following categories of sources:

  • Directly, through background checks conducted during the hiring process.
  • Directly and indirectly from activity on our website and products. For example, from submissions through our websites or through usage details collected automatically.

Use of Personal Information

We may use or disclose the personal information we collect for one or more of the following business purposes:

  • Recruiting and hiring, for example from your application and through the interview process.
  • To conduct background checks on new employees.
  • To comply with mandatory government reporting obligations.
  • To manage employee records through our HCM systems.
  • To improve our website and present its contents to you.
  • As necessary or appropriate to protect the rights, property or safety of us, our clients or others.
  • To respond to law enforcement requests and as required by applicable law, court order, or governmental regulations.
  • As described to you when collecting your personal information or as otherwise set forth in the CCPA.

We will not collect additional categories of personal information or use the personal information we collected for materially different, unrelated, or incompatible purposes without providing you notice.

Sharing Personal Information

Trakstar’s policy is to protect your privacy. We do not disclose, sell, or share your Personal Information to third parties unless explicitly authorized under the employer / employee relationship. Such disclosures are detailed below:

In the preceding twelve (12) months, we have disclosed the following categories of personal information for a business purpose:

Category A: Identifiers.

Category B: California Customer Records personal information categories.

Category C. Protected classification characteristics under California or federal law.

Category I: Professional or employment-related information.

We disclose your personal information for a business purpose to the following categories of third parties:

  • HCM and HR Service providers.
  • Service providers for background checks.
  • Government agencies with mandatory reporting requirements.

In the preceding twelve (12) months, we have not sold any personal information.

Your Rights and Choices

You have the right to request that we disclose certain information to you about our collection and use of your personal information over the past 12 months. Once we receive and confirm your verifiable consumer request, we will disclose to you:

  • The categories of personal information we collected about you.
  • The categories of sources for the personal information we collected about you.
  • Our business or commercial purpose for collecting or selling that personal information.
  • The categories of third parties with whom we share that personal information.
  • The specific pieces of personal information we collected about you (also called a data portability request).
  • If we sold or disclosed your personal information for a business purpose, two separate lists disclosing:
    • sales, identifying the personal information categories that each category of recipient purchased; and
    • disclosures for a business purpose, identifying the personal information categories that each category of recipient obtained.

Deletion Request Rights

You have the right to request that we delete any of your personal information that we collected from you and retained, subject to certain exceptions. Once we receive and confirm your verifiable consumer request, we will delete (and direct our service providers to delete) your personal information from our records, unless an exception applies.

We may deny your deletion request if retaining the information is necessary for us or our service providers to:

  1. Comply with federal, state, and local laws
  2. Comply with a civil, criminal, or regulatory inquiry, investigation, subpoena, or summons by federal, state, or local authorities.
  3. Cooperate with law enforcement agencies concerning conduct or activity that we reasonably and in good faith believe may violate federal, state or local law.
  4. Otherwise exercise or defend legal claims.
  5. Manage the employer-employee relationship under employment agreements with you where a lawful use of your information has been established.
  6. Exercise free speech, ensure the right of another consumer to exercise their free speech rights, or exercise another right provided for by law.
  7. Comply with the California Electronic Communications Privacy Act (Cal. Penal Code § 1546 seq.).
  8. Engage in public or peer-reviewed scientific, historical, or statistical research in the public interest that adheres to all other applicable ethics and privacy laws, when the information’s deletion may likely render impossible or seriously impair the research’s achievement, if you previously provided informed consent.
  9. Make other internal and lawful uses of that information that are compatible with the context in which you provided it.

Exercising Access, Data Portability, and Deletion Rights

To exercise the access, data portability, and deletion rights described above, please submit a verifiable consumer request to us by either:

  • Emailing [email protected]
  • Calling us at 1 (877) 489-5651

Only you or a person registered with the California Secretary of State that you authorize to act on your behalf, may make a verifiable consumer request related to your personal information. You may also make a verifiable consumer request on behalf of your minor child.

You may only make a verifiable consumer request for access or data portability twice within a 12-month period. The verifiable consumer request must:

  • Provide sufficient information that allows us to reasonably verify you are the person about whom we collected personal information or an authorized representative.
  • Describe your request with sufficient detail that allows us to properly understand, evaluate, and respond to it.

We cannot respond to your request or provide you with personal information if we cannot verify your identity or authority to make the request and confirm the personal information relates to you. Making a verifiable consumer request does not require you to establish an employment relationship with us. We will only use personal information provided in a verifiable consumer request to verify the requestor’s identity or authority to make the request.

Response Timing and Format

We endeavor to respond to a verifiable consumer request within 45 days of its receipt. If we require more time (up to 90 days), we will inform you of the reason and extension period in writing. If you have an account with us, we will deliver our written response to that account. If you do not have an account with us, we will deliver our written response electronically. Any disclosures we provide will only cover the 12-month period preceding the verifiable consumer request’s receipt. The response we provide will also explain the reasons we cannot comply with a request, if applicable. For data portability requests, we will select a format to provide your personal information that is readily usable and should allow you to transmit the information from one entity to another entity without hindrance.

We do not charge a fee to process or respond to your verifiable consumer request unless it is excessive, repetitive, or manifestly unfounded. If we determine that the request warrants a fee, we will tell you why we made that decision and provide you with a cost estimate before completing your request.

Non-Discrimination

We will not discriminate against you for exercising any of your CCPA rights.

Changes to Our Privacy Notice

We reserve the right to amend this privacy notice and privacy policy at our discretion and at any time. When we make changes to this privacy notice, we will notify you by email or through a notice on our website.

Contact Information

If you have any questions or comments about this notice, our Privacy Policy, the ways in which we collect and use your personal information, your choices and rights regarding such use, or wish to exercise your rights under California law, please do not hesitate to contact us at:

Phone: 1 (877) 489-5651

Website: trakstar.com

Email: [email protected]

Postal Address: Applied Training Systems, Inc.

Attn: Chris McClave, DPO

113 Cherry St.
PMB 57615
Seattle, WA 98104

UK & EU Privacy Rights

Last Updated as of the 23rd day of June, 2022

This privacy notice should be read in conjunction with our Privacy Policy.

How we use your personal data and your rights

When you visit or register with Trakstar online or use any Trakstar online product, service or mobile application, your personal data is controlled by Applied Training Systems, Inc. (doing business as “Trakstar”).

Your personal data is primarily used to provide you with the Trakstar products and services you request. It may also be used to comply with legal obligations we are subject to or to fulfill our legitimate interests, such as to personalize your experience, develop and improve our services or to detect illegal activities. With your prior consent, it may also be used to send you offers and promotions.

You have a number of rights including the right to request access to, change, or remove your personal data, or to change your marketing preferences (including withdrawing your consent at any time) — please see our Privacy Policy to learn more about managing your marketing preferences or deleting your account.

Our Data Protection Officer can be contacted by emailing: [email protected]

If you are in the EU, you may reach us through our support team at [email protected].

You have a right to lodge a complaint with your local Data Protection Supervisory Authority or with the UK Information Commissioner’s Office: https://ico.org.uk/for-the-public.

For more information about Trakstar’s data collection and use practices, please read Trakstar’s Privacy Policy.

Data Processing Addendum

THIS DATA PROCESSING ADDENDUM (the “Addendum”) forms part of the Master Services Agreement (the “Agreement”) by and between Applied Training Systems, Inc., a Delaware corporation (the “Data Processor”) and the undersigned party to this Addendum (the “Customer,” and collectively with the Data Processor, the “Parties”).

Recitals

A. The Customer acts as a Data Controller, as defined in GDPR (as defined below);

B. The Customer wishes to subcontract certain Services, which imply the processing of personal data, to the Data Processor; and

C. The Parties seek to implement a data processing agreement that complies with the requirements of the current legal framework in relation to the GDPR and other Data Protection Laws, and that incorporates by reference all provisions of the Standard Contract Clauses (as defined below), attached hereto as Exhibit A and incorporated herein by this reference, which are not otherwise stated herein.

NOW, THEREFORE, in consideration of the promises and agreements set forth herein, the Parties, each intending to be legally bound hereby, do promise and agree as follows:

1. Definitions. Unless otherwise defined herein, capitalized terms and expressions used in this Addendum shall have the following meaning:

“Addendum” means this Data Processing Addendum and all Schedules attached hereto.“Affiliate” means, with respect to a party, an entity that (directly or indirectly) controls, is controlled by or is under common control with, such party, where control refers to the power to direct or cause the direction of the management policies of another entity, whether through ownership of voting securities, by contract or otherwise.

“Customer Personal Data” means any Personal Data processed by a contracted Data Processor on behalf of Customer pursuant to or in connection with the Agreement.

“EEA” means the European Economic Area.

“GDPR”, also known as the General Data Protection Regulation, means the laws and regulations of the European Union and the EEA as applicable to the transfer and processing of Personal Data under the Agreement, including (where applicable) the Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016.

“Data Transfer” means a transfer of Customer Personal Data from the Customer or Customer’s authorized users to the Data Processor, including any onward transfer of Customer Personal Data from a Data Processor to a subcontracted Data Processor.

“Data Protection Laws” means the GDPR and, to the extent applicable, the data protection or privacy laws, regulations or legal requirements of the United Kingdom and the United States.

“Personal Data” means information about an individual that (a) can be used to identify, contact or locate a specific individual; (b) can be combined with other information that can be used to identify, contact or locate a specific individual; or (c) is defined as “personal data” or “personal information” by applicable laws or regulations relating to the collection, use, storage or disclosure of information about an identifiable individual.

“Processing” means any operation or set of operations which is performed on Personal Data or on sets of Personal Data, whether or not by automated means, such as collection, recording, organization, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure or destruction.

“Services” means the services provided to the Customer by the Data Processor as described in the Agreement.

“Standard Contractual Clauses” means the standard contractual clauses, as updated from time to time, that apply to the transfer of Personal Data from Customer to Data Processors, as amended by incorporating the description of the Personal Data to be transferred set out in Schedule 1 to this Addendum and the technical and organizational measures to be implemented as set out in Schedule 2 to this Addendum.

“Sub-Processor” means any processor engaged by the Data Processor or by any other subprocessor of the Data Processor who agrees to receive from the Data Processor, or from any other sub-processor of the Data Processor Customer Personal Data exclusively intended for processing activities to be carried out on behalf of the Data Processor after the transfer in accordance with his instructions, the terms of the this Addendum and Standard Contractual Clauses and the terms of the written subcontract.

The terms, “Commission,” “Controller,” “Data Subject,” “Member State,” “Personal Data Breach,” and “Supervisory Authority” shall have the same meaning as in the GDPR, and their cognate terms shall be construed accordingly.

2. Standard Contract Clauses

a. Standard Contract Clauses Incorporated by Reference. Customer (as “data exporter”) and Data Processor (as “data importer”) hereby enter into the Standard Contractual Clauses, which are incorporated in full by reference, and incorporate any amendments to the Standard Contract Clauses implemented by the Commission, to the extent such amendments relate to a restricted transfer which is subject to the Data Protection Laws of a given country or territory, to reflect (to the extent possible without material uncertainty as to the result) any change (including any replacement) made in accordance with those Data Protection Laws (a) by the Commission to or of the equivalent contractual clauses approved by the Commission under the GDPR (in the case of the Data Protection Laws of the European Union or a Member State); or (b) by an equivalent competent authority to or of any equivalent contractual clauses approved by it or by another competent authority under another Data Protection Law. The governing law in the Standard Contractual Clauses shall be the law of the data exporter. In the event of inconsistencies between the provisions of the Standard Contractual Clauses and this Addendum, the Agreement or other agreements between the Parties as regards the Services, the Standard Contractual Clauses shall take precedence.b. Repeal of Standard Contract Clauses. In the event that the Standard Contractual Clauses are replaced or repealed by the Commission or under GDPR, the Parties shall work together to negotiate in good faith a solution to enable a transfer of Personal Data to be conducted in compliance with GDPR.

3. Processing of Customer Personal Data

a. Data Processor Responsibilities. Data Processor shall:

i. comply with all applicable Data Protection Laws, as applicable, in the Processing of Customer Personal Data;ii. not Process Customer Personal Data other than on the relevant Customer’s documented instructions, including as set forth in the Agreement;

iii. upon request from Customer, make available to Customer the current list of SubProcessors with their country of location, and types of Personal Data Processed by such Sub-Processor; and

iv. otherwise comply with the Standard Contract Clauses as applicable to the Processing of Customer Personal Data as stated in this Addendum and Agreement.

b. Customer Responsibilities. The Customer shall:

i. comply, at all times with the applicable Data Protection Laws with respect to the processing of Personal Data in connection with its obligations under the Agreement;ii. instruct throughout the duration of the Services the Data Processor to process the Customer Personal Data transferred only on the Customer’s behalf and in accordance with the applicable Data Protection Law and the Standard Contract Clauses;

iii. ensure that the legally binding consents to the collection, access, use, maintenance, and/or disclosure of the Personal Data in accordance with the applicable Data Protection Laws and Customer policies and procedures have been obtained from each individual and entity to whom the Personal Data relates;

iv. promptly inform Data Processor of any policies it implements with respect to the Processing and protection of Personal Data with express instructions as to how these policies should be implemented by Data Processor;

v. promptly inform Data Processor of any request for erasure with respect to Data Subject’s Personal Data with detailed instructions as to how Data Processor should address the request; and

vi. provide to Data Processor and also promptly update, when necessary, the following information: (a) identity and contact information of the Data Protection Officer or other contact of the Customer; (b) identity and contact information of the EU representative of the Customer; (c) types of Personal Data to be Processed; and (d) categories of Data Subjects to whom the Personal Data relates.

c. Consent to Processing. The Customer authorizes and instructs Data Processor to process Customer Personal Data in accordance with this Addendum and Agreement. Customer hereby acknowledges that such Customer Personal Data shall be Processed in the United States, and shall be maintained on servers located in the United States.

d. Consent to Sub-Processing. Customer hereby authorizes Data Processor to continue to use those Sub-Processors already engaged by Data Processor as at the date of this Addendum. Data Processor shall notify Customer of the appointment of any new Sub-Processor. Customer may reject (on reasonable grounds) the proposed appointment. The Parties shall work together to address the objections raised by any Customer. If no agreement can be reached by the Parties, then Data Processor and Customer shall work together in good faith to terminate the contract. Data Processor shall ensure that the arrangement between Data Processor and the Sub-Processor is governed by a written contract including terms which offer at least the same level of protection for Customer Personal Data as those set out in this Addendum and meet the requirements of the GDPR and applicable Data Protection Laws.

4. Data Processor Personnel. Data Processor shall take reasonable steps to ensure the reliability of any employee, agent or contractor of the Data Processor who may have access to the Customer Personal Data, ensuring in each case that access is strictly limited to those individuals who need to know/access the relevant Customer Personal Data, as strictly necessary for the purposes of the Agreement, and to comply with Data Protection Laws in the context of that individual’s duties to the Data Processor, ensuring that all such individuals are subject to confidentiality undertakings or professional or statutory obligations of confidentiality.

5. Security.

a. Security Systems. Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of Processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, Data Processor shall in relation to the Customer Personal Data implement and maintain appropriate technical and organizational measures to ensure a level of security appropriate to the: (a) applicable Data Protection Laws; (b) harm that might result from unlawful or unauthorized processing or accidental loss, damage, alteration, disclosure or destruction of the Personal Data; and (c) nature of the Personal Data.b. GDPR Requirements. Data Processor shall, with regard to Personal Data, implement and maintain appropriate technical and organizational security measures to ensure a level of security appropriate to that risk, including, as appropriate, the measures referred to in the GDPR, and particularly those related to possible Personal Data Breaches. Specifically, Data Processor shall:

i. have in place and comply with a security policy which: (a) defines security needs based on a regular impact assessments; (b) allocates responsibility for implementing the policy to a specific individual or members of a team, including having a Data Protection Officer (“DPO”);ii. ensure that appropriate security safeguards and virus protection are in place to protect the hardware and software which is used in processing the Personal Data in accordance with best industry practice;

iii. ensure its storage of Personal Data conforms with the industry practice such that the media on which Personal Data is recorded (including paper records and records stored electronically) are stored in secure locations and access by personnel to Personal Data is strictly monitored and controlled; and

iv. have secure methods in place for the transit of Personal Data within the customer support portal (for instance, by using encryption).

6. Data Subject Rights

a. Data Subject Requests. Data Processor shall, to the extent legally permitted, promptly notify Customer if it receives a request from a Data Subject to exercise the Data Subject’s right of access, right to rectification, restriction of Processing, erasure, data portability, object to the Processing, or its right not to be subject to an automated individual decision making (each a “Data Subject Request”). Taking into account the nature of the Processing, Data Processor shall assist Customer by appropriate technical and organizational measures, to the extent possible, for the fulfillment of Customer’s obligation to respond to a Data Subject Request under GDPR or applicable Data Protection Laws. Except to the extent required by applicable law, Data Processor shall not respond to any such Data Subject Request without Customer’s prior written consent except to confirm that the request relates to Customer. Further, to the extent Customer, in its use of the Services, does not have the ability to address a Data Subject Request, Data Processor shall upon Customer’s request provide commercially reasonable efforts to assist Customer in responding to such Data Subject Request, to the extent Data Processor is legally permitted to do so and provided that such Data Subject Request is required under GDPR or applicable Data Protection Laws. Any costs arising from such provision of assistance shall be the responsibility of Customer, to the extent legally permitted.b. Government Requests. The Personal Data processed pursuant to the Agreement may be subject to disclosure upon a valid request and as legally required by any law enforcement agency, whether located in the United States or EEA. Data Processor shall immediately notify Customer of any third-party request to release Customer Personal Data. Data Processor will cooperate with Customer to keep such Customer Personal Data confidential. At any time, Customer is entitled to suspend the transfer of data and/or terminate the Agreement citing its concern of the applicability of this Section.

7. Personal Data Breach

a. Notification of Breach. Data Processor shall, in accordance with the GDPR and applicable Data Protection Laws, notify Customer without undue delay upon Data Processor becoming aware of a Personal Data Breach affecting Customer Personal Data, providing Customer with sufficient information to allow the Customer to meet any obligations to report or inform Data Subjects of the Personal Data Breach under the Data Protection Laws. Data Processor’s notification of or response to a Personal Data Breach under this Section 0 will not be construed as an acknowledgement by Data Processor of any fault or liability with respect to the Personal Data Breach. Notification(s) of Personal Data Breaches, if any, will be delivered to one or more of Customer’s business, technical or administrative contacts by any means Data Processor selects, including via e-mail. It is Customer’s sole responsibility to ensure it maintains accurate contact information on Data Processor’s support systems at all times.b. Data Processor Mitigation. Data Processor will use reasonable efforts to identify the cause of such Personal Data Breach and shall promptly and without undue delay: (a) investigate the Personal Data Breach and provide Customer with information about the Personal Data Breach, including if applicable, such information a Data Processor must provide to a Data Controller under the GDPR to the extent such information is reasonably available; and (b) take reasonable steps to mitigate the effects and to minimize any damage resulting from the Personal Data Breach to the extent the remediation is within Data Processor’s reasonable control The obligations herein shall not apply to any breach that is caused by Customer or Customer’s authorized users.

c. Cooperation Data Processor shall co-operate with the Customer and take reasonable commercial steps as are directed by Customer to assist in the investigation, mitigation and remediation of each such Personal Data Breach.

8. Deletion or Return of Customer Personal Data; audit rights.

a. Deletion or Return of Personal Data. Upon termination of the Services after the end of the provision of the Services, Data Processor shall, at the choice of the Customer, delete all Personal Data processed on behalf of the Customer and certify to the Customer that it has done so, or return to the Customer all Personal Data processed on its behalf and delete existing copies. Notwithstanding the foregoing, Data Processor may retain Customer Personal Data to the extent required by Data Protection Laws, and any other applicable laws of the United States (collectively, “Applicable Laws”), and only to the extent and for such period as required by such Applicable Laws and Data Processor shall ensure the confidentiality of all such Customer Personal Data and shall ensure that such Customer Personal Data is only Processed as necessary for the purpose(s) specified in the Applicable Laws requiring its storage and for no other purpose. The Parties agree that the certification of deletion of Personal Data that is described in the Standard Contractual Clauses shall be provided by the data importer to the data exporter only upon data exporter’s request.b. Audit. Data Processor shall make available to the Customer on request all information necessary to demonstrate compliance with this Addendum, and shall allow for and contribute to audits, including inspections, by the Customer or an auditor mandated by the Customer in relation to the Processing of the Customer Personal Data by the contracted Data Processors. Information and audit rights of the Customers only arise under section to the extent that the Agreement does not otherwise give them information and audit rights meeting the relevant requirements of Data Protection Laws.

9. Limitation of Liability Each Party’s and all of its affiliates’ liability, taken together in the aggregate, arising out of or related to this Addendum whether in contract, tort or under any other theory of liability, is subject to the limitation of liability section of the Agreement.

10. Insurance. In addition to any requirements set forth in the Agreement, Customer shall procure and, throughout the term of the Agreement, maintain cyber liability insurance to cover any Personal Data Breach affecting Customer Personal Data, or other losses suffered by Data Processor or any member of the same group as Data Processor resulting from any action or inaction on Customer’s part in an amount of no less than €1,000,000 per occurrence. The policy that provides liability coverage shall name Applied Training Systems, Inc. as an additional insured.

11. Miscellaneous

a. Notices. All notices and communications given under this Addendum must be sent in accordance with the Agreement.b. Amendments. No alteration, amendment, or modification of this Addendum will be valid unless in writing and signed by an authorized representative of both Parties.

c. Governing Law and Jurisdiction. With respect to the Standard Contract Clauses, Processing, privacy, and security of Customer Personal Data, the governing law shall be the law of the Customer. For all other claims or disputes arising out of this Addendum or Agreement, the governing law and venue shall be in accordance with the terms of the Agreement.

d. Severability. Should any provision of this Addendum be found invalid or unenforceable pursuant to any applicable law, then the invalid or unenforceable provision will be deemed superseded by a valid, enforceable provision that most closely matches the intent of the original provision and the remainder of the Addendum will continue in effect.

e. Ambiguity. Any ambiguity in the terms of this Addendum will be resolved to permit Data Processor to comply with Applicable Laws.

f. Entire Agreement and Conflict. This Addendum is the entire and complete agreement between the Parties with respect to the privacy and security of Personal Data and supersedes any other agreements, representations, or understandings whether oral or written. All clauses of the Agreement, that are not explicitly amended or supplemented by the clauses of this Addendum, and as long as this does not contradict with compulsory requirements of GDPR and applicable Data Protection Laws, under this Addendum, remain in full force and effect and shall apply, including, but not limited to: Governing Law and Dispute Resolution, Jurisdiction, Limitation of Liability (to the maximum extent permitted by the GDPR).


EXHIBIT A TO DATA PROCESSING ADDENDUM

STANDARD CONTRACTUAL CLAUSES
(CONTROLLER) TO APPLIED TRAINING SYSTEMS, INC. (PROCESSOR)

SECTION I

Clause 1

Purpose and scope

(a)
The purpose of these standard contractual clauses is to ensure compliance with the requirements of Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation) for the transfer of personal data to a third country.
(b)

The Parties:

(i)
the natural or legal person(s), public authority/ies, agency/ies or other body/ies (hereinafter “entity/ies”) transferring the personal data, as listed in Annex I.A. (hereinafter each “data exporter”), and
(ii)
the entity/ies in a third country receiving the personal data from the data exporter, directly or indirectly via another entity also Party to these Clauses, as listed in Annex I.A. (hereinafter each “data importer”)

have agreed to these standard contractual clauses (hereinafter: “Clauses”).

(c)
These Clauses apply with respect to the transfer of personal data as specified in Annex I.B.
(d)
The Appendix to these Clauses containing the Annexes referred to therein forms an integral part of these Clauses.

Clause 2

Effect and invariability of the Clauses

(a)
These Clauses set out appropriate safeguards, including enforceable data subject rights and effective legal remedies, pursuant to Article 46(1) and Article 46 (2)(c) of Regulation (EU) 2016/679 and, with respect to data transfers from controllers to processors and/or processors to processors, standard contractual clauses pursuant to Article 28(7) of Regulation (EU) 2016/679, provided they are not modified, except to select the appropriate Module(s) or to add or update information in the Appendix. This does not prevent the Parties from including the standard contractual clauses laid down in these Clauses in a wider contract and/or to add other clauses or additional safeguards, provided that they do not contradict, directly or indirectly, these Clauses or prejudice the fundamental rights or freedoms of data subjects.
(b)
These Clauses are without prejudice to obligations to which the data exporter is subject by virtue of Regulation (EU) 2016/679.

Clause 3

Third-party beneficiaries

(a)

Data subjects may invoke and enforce these Clauses, as third-party beneficiaries, against the data exporter and/or data importer, with the following exceptions:

(i)
Clause 1, Clause 2, Clause 3, Clause 6, Clause 7;
(ii)
Clause 8.1(b), 8.9(a), (c), (d) and (e);
(iii)
Clause 9(a), (c), (d) and (e);
(iv)
Clause 12(a), (d) and (f);
(v)
Clause 13;
(vi)
Clause 15.1(c), (d) and (e);
(vii)
Clause 16(e);
(viii)
Clause 18(a) and (b).
(b)
Paragraph (a) is without prejudice to rights of data subjects under Regulation (EU) 2016/679.

Clause 4

Interpretation

(a)
Where these Clauses use terms that are defined in Regulation (EU) 2016/679, those terms shall have the same meaning as in that Regulation.
(b)
These Clauses shall be read and interpreted in the light of the provisions of Regulation (EU) 2016/679.
(c)
These Clauses shall not be interpreted in a way that conflicts with rights and obligations provided for in Regulation (EU) 2016/679.

Clause 5

Hierarchy

In the event of a contradiction between these Clauses and the provisions of related agreements between the Parties, existing at the time these Clauses are agreed or entered into thereafter, these Clauses shall prevail.

Clause 6

Description of Transfer(s)

The details of the transfer(s), and in particular the categories of personal data that are transferred and the purpose(s) for which they are transferred, are specified in Annex I.B.

Clause 7 — Optional

Docking clause

(a)
An entity that is not a Party to these Clauses may, with the agreement of the Parties, accede to these Clauses at any time, either as a data exporter or as a data importer, by completing the Appendix and signing Annex I.A.
(b)
Once it has completed the Appendix and signed Annex I.A, the acceding entity shall become a Party to these Clauses and have the rights and obligations of a data exporter or data importer in accordance with its designation in Annex I.A.
(c)
The acceding entity shall have no rights or obligations arising under these Clauses from the period prior to becoming a Party.

SECTION II — OBLIGATIONS OF THE PARTIES

Clause 8

Data protection safeguards

The data exporter warrants that it has used reasonable efforts to determine that the data importer is able, through the implementation of appropriate technical and organizational measures, to satisfy its obligations under these Clauses.

8.1
Instructions
(a)
The data importer shall process the personal data only on documented instructions from the data exporter. The data exporter may give such instructions throughout the duration of the contract.
(b)
The data importer shall immediately inform the data exporter if it is unable to follow those instructions.
8.2
Purpose limitation

The data importer shall process the personal data only for the specific purpose(s) of the transfer, as set out in Annex I.B, unless on further instructions from the data exporter.

8.3
Transparency

On request, the data exporter shall make a copy of these Clauses, including the Appendix as completed by the Parties, available to the data subject free of charge. To the extent necessary to protect business secrets or other confidential information, including the measures described in Annex II and personal data, the data exporter may redact part of the text of the Appendix to these Clauses prior to sharing a copy, but shall provide a meaningful summary where the data subject would otherwise not be able to understand the its content or exercise his/her rights. On request, the Parties shall provide the data subject with the reasons for the redactions, to the extent possible without revealing the redacted information. This Clause is without prejudice to the obligations of the data exporter under Articles 13 and 14 of Regulation (EU) 2016/679.

8.4
Accuracy

If the data importer becomes aware that the personal data it has received is inaccurate, or has become outdated, it shall inform the data exporter without undue delay. In this case, the data importer shall cooperate with the data exporter to erase or rectify the data.

8.5
Duration of processing and erasure or return of data

Processing by the data importer shall only take place for the duration specified in Annex I.B. After the end of the provision of the processing services, the data importer shall, at the choice of the data exporter, delete all personal data processed on behalf of the data exporter and certify to the data exporter that it has done so, or return to the data exporter all personal data processed on its behalf and delete existing copies. Until the data is deleted or returned, the data importer shall continue to ensure compliance with these Clauses. In case of local laws applicable to the data importer that prohibit return or deletion of the personal data, the data importer warrants that it will continue to ensure compliance with these Clauses and will only process it to the extent and for as long as required under that local law. This is without prejudice to Clause 14, in particular the requirement for the data importer under Clause 14(e) to notify the data exporter throughout the duration of the contract if it has reason to believe that it is or has become subject to laws or practices not in line with the requirements under Clause 14(a).

8.6
Security of processing
(a)
The data importer and, during transmission, also the data exporter shall implement appropriate technical and organizational measures to ensure the security of the data, including protection against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorized disclosure or access to that data (hereinafter “personal data breach”). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purpose(s) of processing and the risks involved in the processing for the data subjects. The Parties shall in particular consider having recourse to encryption or pseudonymisation, including during transmission, where the purpose of processing can be fulfilled in that manner. In case of pseudonymisation, the additional information for attributing the personal data to a specific data subject shall, where possible, remain under the exclusive control of the data exporter. In complying with its obligations under this paragraph, the data importer shall at least implement the technical and organizational measures specified in Annex II. The data importer shall carry out regular checks to ensure that these measures continue to provide an appropriate level of security.
(b)
The data importer shall grant access to the personal data to members of its personnel only to the extent strictly necessary for the implementation, management and monitoring of the contract. It shall ensure that persons authorized to process the personal data have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality.
(c)
In the event of a personal data breach concerning personal data processed by the data importer under these Clauses, the data importer shall take appropriate measures to address the breach, including measures to mitigate its adverse effects. The data importer shall also notify the data exporter without undue delay after having become aware of the breach. Such notification shall contain the details of a contact point where more information can be obtained, a description of the nature of the breach (including, where possible, categories and approximate number of data subjects and personal data records concerned), its likely consequences and the measures taken or proposed to address the breach including, where appropriate, measures to mitigate its possible adverse effects. Where, and in so far as, it is not possible to provide all information at the same time, the initial notification shall contain the information then available and further information shall, as it becomes available, subsequently be provided without undue delay.
(d)
The data importer shall cooperate with and assist the data exporter to enable the data exporter to comply with its obligations under Regulation (EU) 2016/679, in particular to notify the competent supervisory authority and the affected data subjects, taking into account the nature of processing and the information available to the data importer.
8.7
Sensitive data

Where the transfer involves personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, or trade union membership, genetic data, or biometric data for the purpose of uniquely identifying a natural person, data concerning health or a person’s sex life or sexual orientation, or data relating to criminal convictions and offences (hereinafter “sensitive data”), the data importer shall apply the specific restrictions and/or additional safeguards described in Annex I.B.

8.8
Onward transfers

The data importer shall only disclose the personal data to a third party on documented instructions from the data exporter. In addition, the data may only be disclosed to a third party located outside the European Union (in the same country as the data importer or in another third country, hereinafter “onward transfer”) if the third party is or agrees to be bound by these Clauses, under the appropriate Module, or if:

(i)
the onward transfer is to a country benefitting from an adequacy decision pursuant to Article 45 of Regulation (EU) 2016/679 that covers the onward transfer;
(ii)
the third party otherwise ensures appropriate safeguards pursuant to Articles 46 or 47 Regulation of (EU) 2016/679 with respect to the processing in question;
(iii)
the onward transfer is necessary for the establishment, exercise or defense of legal claims in the context of specific administrative, regulatory or judicial proceedings; or
(iv)
the onward transfer is necessary in order to protect the vital interests of the data subject or of another natural person.

Any onward transfer is subject to compliance by the data importer with all the other safeguards under these Clauses, in particular purpose limitation.

8.9
Documentation and compliance
(a)
The data importer shall promptly and adequately deal with enquiries from the data exporter that relate to the processing under these Clauses.
(b)
The Parties shall be able to demonstrate compliance with these Clauses. In particular, the data importer shall keep appropriate documentation on the processing activities carried out on behalf of the data exporter.
(c)
The data importer shall make available to the data exporter all information necessary to demonstrate compliance with the obligations set out in these Clauses and at the data exporter’s request, allow for and contribute to audits of the processing activities covered by these Clauses, at reasonable intervals or if there are indications of non-compliance. In deciding on a review or audit, the data exporter may take into account relevant certifications held by the data importer.
(d)
The data exporter may choose to conduct the audit by itself or mandate an independent auditor. Audits may include inspections at the premises or physical facilities of the data importer and shall, where appropriate, be carried out with reasonable notice.
(e)
The Parties shall make the information referred to in paragraphs (b) and (c), including the results of any audits, available to the competent supervisory authority on request.

Clause 9

Use of sub-processors

(a)
GENERAL WRITTEN AUTHORIZATION. The data importer has the data exporter’s general authorization for the engagement of sub-processor(s) from an agreed list. The data importer shall specifically inform the data exporter in writing of any intended changes to that list through the addition or replacement of sub-processors at least 10 days in advance, thereby giving the data exporter sufficient time to be able to object to such changes prior to the engagement of the subprocessor(s). The data importer shall provide the data exporter with the information necessary to enable the data exporter to exercise its right to object.
(b)
Where the data importer engages a sub-processor to carry out specific processing activities (on behalf of the data exporter), it shall do so by way of a written contract that provides for, in substance, the same data protection obligations as those binding the data importer under these Clauses, including in terms of third-party beneficiary rights for data subjects. The Parties agree that, by complying with this Clause, the data importer fulfils its obligations under Clause 8.8. The data importer shall ensure that the sub-processor complies with the obligations to which the data importer is subject pursuant to these Clauses.
(c)
The data importer shall provide, at the data exporter’s request, a copy of such a sub-processor agreement and any subsequent amendments to the data exporter. To the extent necessary to protect business secrets or other confidential information, including personal data, the data importer may redact the text of the agreement prior to sharing a copy.
(d)
The data importer shall remain fully responsible to the data exporter for the performance of the sub-processor’s obligations under its contract with the data importer. The data importer shall notify the data exporter of any failure by the sub-processor to fulfil its obligations under that contract.
(e)
The data importer shall agree a third-party beneficiary clause with the sub-processor whereby – in the event the data importer has factually disappeared, ceased to exist in law or has become insolvent – the data exporter shall have the right to terminate the sub-processor contract and to instruct the sub-processor to erase or return the personal data.

Clause 10

Data subject rights

(a)
The data importer shall inform data subjects in a transparent and easily accessible format, through individual notice or on its website, of a contact point authorized to handle complaints. It shall deal promptly with any complaints it receives from a data subject.
(b)
In case of a dispute between a data subject and one of the Parties as regards compliance with these Clauses, that Party shall use its best efforts to resolve the issue amicably in a timely fashion. The Parties shall keep each other informed about such disputes and, where appropriate, cooperate in resolving them.
(c)

Where the data subject invokes a third-party beneficiary right pursuant to Clause 3, the data importer shall accept the decision of the data subject to:

(i)
lodge a complaint with the supervisory authority in the Member State of his/her habitual residence or place of work, or the competent supervisory authority pursuant to Clause 13;
(ii)
refer the dispute to the competent courts within the meaning of Clause 18.
(d)
The Parties accept that the data subject may be represented by a not-for-profit body, organisation or association under the conditions set out in Article 80(1) of Regulation (EU) 2016/679.
(e)
The data importer shall abide by a decision that is binding under the applicable EU or Member State law.
(f)
The data importer agrees that the choice made by the data subject will not prejudice his/her substantive and procedural rights to seek remedies in accordance with applicable laws.

Clause 12

Liability

(a)
Each Party shall be liable to the other Party/ies for any damages it causes the other Party/ies by any breach of these Clauses.
(b)
The data importer shall be liable to the data subject, and the data subject shall be entitled to receive compensation, for any material or non-material damages the data importer or its sub-processor causes the data subject by breaching the third-party beneficiary rights under these Clauses.
(c)
Notwithstanding paragraph (b), the data exporter shall be liable to the data subject, and the data subject shall be entitled to receive compensation, for any material or non-material damages the data exporter or the data importer (or its sub-processor) causes the data subject by breaching the third-party beneficiary rights under these Clauses. This is without prejudice to the liability of the data exporter and, where the data exporter is a processor acting on behalf of a controller, to the liability of the controller under Regulation (EU) 2016/679 or Regulation (EU) 2018/1725, as applicable.
(d)
The Parties agree that if the data exporter is held liable under paragraph (c) for damages caused by the data importer (or its sub-processor), it shall be entitled to claim back from the data importer that part of the compensation corresponding to the data importer’s responsibility for the damage.
(e)
Where more than one Party is responsible for any damage caused to the data subject as a result of a breach of these Clauses, all responsible Parties shall be jointly and severally liable and the data subject is entitled to bring an action in court against any of these Parties.
(f)
The Parties agree that if one Party is held liable under paragraph (e), it shall be entitled to claim back from the other Party/ies that part of the compensation corresponding to its / their responsibility for the damage.
(g)
The data importer may not invoke the conduct of a sub-processor to avoid its own liability.

Clause 13

Supervision

(a)
The supervisory authority of the Member State in which the representative within the meaning of Article 27(1) of Regulation (EU) 2016/679 is established, as indicated in Annex I.C, shall act as competent supervisory authority.
(b)
The data importer agrees to submit itself to the jurisdiction of and cooperate with the competent supervisory authority in any procedures aimed at ensuring compliance with these Clauses. In particular, the data importer agrees to respond to enquiries, submit to audits and comply with the measures adopted by the supervisory authority, including remedial and compensatory measures. It shall provide the supervisory authority with written confirmation that the necessary actions have been taken.

SECTION III
LOCAL LAWS AND OBLIGATIONS IN CASE OF ACCESS BY PUBLIC AUTHORITIES

Clause 14

Local laws and practices affecting compliance with the Clauses

(a)
The Parties warrant that they have no reason to believe that the laws and practices in the third country of destination applicable to the processing of the personal data by the data importer, including any requirements to disclose personal data or measures authorising access by public authorities, prevent the data importer from fulfilling its obligations under these Clauses. This is based on the understanding that laws and practices that respect the essence of the fundamental rights and freedoms and do not exceed what is necessary and proportionate in a democratic society to safeguard one of the objectives listed in Article 23(1) of Regulation (EU) 2016/679, are not in contradiction with these Clauses.
(b)

The Parties declare that in providing the warranty in paragraph (a), they have taken due account in particular of the following elements:

(i)
the specific circumstances of the transfer, including the length of the processing chain, the number of actors involved and the transmission channels used; intended onward transfers; the type of recipient; the purpose of processing; the categories and format of the transferred personal data; the economic sector in which the transfer occurs; the storage location of the data transferred;
(ii)
the laws and practices of the third country of destination – including those requiring the disclosure of data to public authorities or authorizing access by such authorities – relevant in light of the specific circumstances of the transfer, and the applicable limitations and safeguards;
(iii)
any relevant contractual, technical or organizational safeguards put in place to supplement the safeguards under these Clauses, including measures applied during transmission and to the processing of the personal data in the country of destination.
(c)
The data importer warrants that, in carrying out the assessment under paragraph (b), it has made its best efforts to provide the data exporter with relevant information and agrees that it will continue to cooperate with the data exporter in ensuring compliance with these Clauses.
(d)
The Parties agree to document the assessment under paragraph (b) and make it available to the competent supervisory authority on request.
(e)
The data importer agrees to notify the data exporter promptly if, after having agreed to these Clauses and for the duration of the contract, it has reason to believe that it is or has become subject to laws or practices not in line with the requirements under paragraph (a), including following a change in the laws of the third country or a measure (such as a disclosure request) indicating an application of such laws in practice that is not in line with the requirements in paragraph (a).
(f)
Following a notification pursuant to paragraph (e), or if the data exporter otherwise has reason to believe that the data importer can no longer fulfil its obligations under these Clauses, the data exporter shall promptly identify appropriate measures (e.g. technical or organizational measures to ensure security and confidentiality) to be adopted by the data exporter and/or data importer to address the situation. The data exporter shall suspend the data transfer if it considers that no appropriate safeguards for such transfer can be ensured, or if instructed by the competent supervisory authority to do so. In this case, the data exporter shall be entitled to terminate the contract, insofar as it concerns the processing of personal data under these Clauses. If the contract involves more than two Parties, the data exporter may exercise this right to termination only with respect to the relevant Party, unless the Parties have agreed otherwise. Where the contract is terminated pursuant to this Clause, Clause 16(d) and (e) shall apply.

Clause 15

Obligations of the data importer in case of access by public authorities

15.1
Notifications
(a)

The data importer agrees to notify the data exporter and, where possible, the data subject promptly (if necessary with the help of the data exporter) if it:

(i)
receives a legally binding request from a public authority, including judicial authorities, under the laws of the country of destination for the disclosure of personal data transferred pursuant to these Clauses; such notification shall include information about the personal data requested, the requesting authority, the legal basis for the request and the response provided; or
(ii)
becomes aware of any direct access by public authorities to personal data transferred pursuant to these Clauses in accordance with the laws of the country of destination; such notification shall include all information available to the importer.
(b)
If the data importer is prohibited from notifying the data exporter and/or the data subject under the laws of the country of destination, the data importer agrees to use its best efforts to obtain a waiver of the prohibition, with a view to communicating as much information as possible, as soon as possible. The data importer agrees to document its best efforts in order to be able to demonstrate them on request of the data exporter.
(c)
Where permissible under the laws of the country of destination, the data importer agrees to provide the data exporter, at regular intervals for the duration of the contract, with as much relevant information as possible on the requests received (in particular, number of requests, type of data requested, requesting authority/ies, whether requests have been challenged and the outcome of such challenges, etc.).
(d)
The data importer agrees to preserve the information pursuant to paragraphs (a) to (c) for the duration of the contract and make it available to the competent supervisory authority on request.
(e)
Paragraphs (a) to (c) are without prejudice to the obligation of the data importer pursuant to Clause 14(e) and Clause 16 to inform the data exporter promptly where it is unable to comply with these Clauses.
15.2
Review of legality and data minimization
(a)
The data importer agrees to review the legality of the request for disclosure, in particular whether it remains within the powers granted to the requesting public authority, and to challenge the request if, after careful assessment, it concludes that there are reasonable grounds to consider that the request is unlawful under the laws of the country of destination, applicable obligations under international law and principles of international comity. The data importer shall, under the same conditions, pursue possibilities of appeal. When challenging a request, the data importer shall seek interim measures with a view to suspending the effects of the request until the competent judicial authority has decided on its merits. It shall not disclose the personal data requested until required to do so under the applicable procedural rules. These requirements are without prejudice to the obligations of the data importer under Clause 14(e).
(b)
The data importer agrees to document its legal assessment and any challenge to the request for disclosure and, to the extent permissible under the laws of the country of destination, make the documentation available to the data exporter. It shall also make it available to the competent supervisory authority on request.
(c)
The data importer agrees to provide the minimum amount of information permissible when responding to a request for disclosure, based on a reasonable interpretation of the request.

SECTION IV
FINAL PROVISIONS

Clause 16
Non-compliance with the Clauses and termination

(a)
The data importer shall promptly inform the data exporter if it is unable to comply with these Clauses, for whatever reason.
(b)
In the event that the data importer is in breach of these Clauses or unable to comply with these Clauses, the data exporter shall suspend the transfer of personal data to the data importer until compliance is again ensured or the contract is terminated. This is without prejudice to Clause 14(f).
(c)

The data exporter shall be entitled to terminate the contract, insofar as it concerns the processing of personal data under these Clauses, where:

(i)
the data exporter has suspended the transfer of personal data to the data importer pursuant to paragraph (b) and compliance with these Clauses is not restored within a reasonable time and in any event within one month of suspension;
(ii)
the data importer is in substantial or persistent breach of these Clauses; or
(iii)
the data importer fails to comply with a binding decision of a competent court or supervisory authority regarding its obligations under these Clauses.

In these cases, it shall inform the competent supervisory authority of such non-compliance. Where the contract involves more than two Parties, the data exporter may exercise this right to termination only with respect to the relevant Party, unless the Parties have agreed otherwise.

(d)
Personal data that has been transferred prior to the termination of the contract pursuant to paragraph (c) shall at the choice of the data exporter immediately be returned to the data exporter or deleted in its entirety. The same shall apply to any copies of the data. The data importer shall certify the deletion of the data to the data exporter. Until the data is deleted or returned, the data importer shall continue to ensure compliance with these Clauses. In case of local laws applicable to the data importer that prohibit the return or deletion of the transferred personal data, the data importer warrants that it will continue to ensure compliance with these Clauses and will only process the data to the extent and for as long as required under that local law.
(e)
Either Party may revoke its agreement to be bound by these Clauses where (i) the European Commission adopts a decision pursuant to Article 45(3) of Regulation (EU) 2016/679 that covers the transfer of personal data to which these Clauses apply; or (ii) Regulation (EU) 2016/679 becomes part of the legal framework of the country to which the personal data is transferred. This is without prejudice to other obligations applying to the processing in question under Regulation (EU) 2016/679.

Clause 17
Governing law

These Clauses shall be governed by the law of one of the EU Member States, provided such law allows for third-party beneficiary rights. The Parties agree that this shall be the law of Insert governing jurisdiction.

Clause 18
Choice of forum and jurisdiction

(a)
Any dispute arising from these Clauses shall be resolved by the courts of an EU Member State.
(b)
The Parties agree that those shall be the courts of Insert governing jurisdiction.
(c)
A data subject may also bring legal proceedings against the data exporter and/or data importer before the courts of the Member State in which he/she has his/her habitual residence.
(d)
The Parties agree to submit themselves to the jurisdiction of such courts.

APPENDIX
ANNEX I

This Section includes important information and the Subscription Agreement Form all interested parties must complete in order to successfully enter this Agreement.

Download Trakstar Data Processing Addendum PDF

What You Should With This Document

  1. Click the button above to download a PDF
  2. Your information is required on page 7 in order to enter into this Agreement with Trakstar.
  3. Provide your company name in the Controller field on page 8.
  4. Provide your Governing Jurisdiction in the fields on page 18.
  5. Review the information and fill the necessary fields on page 19.
  6. Identify the competent supervisory authority/ies on page 21.
  7. After providing the required information, send the completed PDF to your Trakstar Account Manager or [email protected]

ANNEX II

TECHNICAL AND ORGANIZATIONAL MEASURES INCLUDING TECHNICAL AND ORGANIZATIONAL MEASURES TO ENSURE THE SECURITY OF THE DATA

The technical and organizational measures must be described in specific detail and not in generic terms. In particular, clearly indicate which measures apply to each transfer or set of transfers.

1.1. Compliance

1.1.1.Trakstar SOC Reports. Trakstar is audited for compliance with the SOC 2 standard on an annual basis. This comprehensive audit conducted by a licensed CPA firm provides a full accounting of the Trakstar organization and product tools, methods and processes for security, availability, integrity, confidentiality, and privacy. Our SOC 2 report is available to customers upon request.

1.1.2.Trakstar GDPR Compliance. Trakstar is compliant with the EU’s General Data Protection Regulation. During 2021, Trakstar (under the parent umbrella organization of Applied Training Systems Inc., and with our former brands Trakstar, Reviewsnap, Recruiterbox, and Mindflash) was certified for the EU-U.S. Privacy Shield Framework. With the Schrems II judgement of July 2020 and subsequent rulings in 2021, Trakstar adapted its compliance to include the Standard Contractual Clauses within our Data Processing Addendum (DPA). We execute DPAs for customers located in the EU or other companies with EU based employees covered by the GDPR.

1.1.3.AWS SOC Reports. The Trakstar products and platforms are hosted on the Amazon Web Services platform. All AWS compliance and audit reports are available to AWS customers, under an NDA. AWS holds multiple certifications including SOC 2, ISO 27001:2013, GDPR, and more. To review the AWS SOC 2 reports, please refer to the AWS Artifact service.

1.2. Organizational

1.2.1.Privacy. The Trakstar team prioritizes customer data privacy and security. We employ a proactive approach to limit access to customer data by Trakstar staff. Our policies, training, and monitoring processes are regularly reviewed and enforced to protect customer data. For more information, see our Privacy Policy which may be updated from time to time by Trakstar.

1.2.2.Security and Data Policies. Each year, and as warranted, the security team at Trakstar reviews and updates our IT security policies and training program. These policies are distributed to all employees and compliance is mandatory. For data security and handling, employees are required to undergo training which covers the types of data and safeguards that must be taken to protect that data. These security and training programs cover key topics such as change management, asset usage, computer security, password and credential management, loss and theft, usage monitoring, and infrastructure protection. It is the responsibility of all Trakstar employees to handle the integrity and security of customer data.

1.2.3.Security Training. All Trakstar new employees are required to undergo security and awareness training, and to retake that course on an annual basis. Training consists of common mistakes and threats, as well as industry specific concerns related to SaaS companies. Team members are tested and knowledge is verified through a rigorous program of quizzes as well as response to real world threat examples.

1.2.4.Background Checks, Code of Conduct and Oversight. Employees undergo background checks prior to employment. The process includes verification of criminal records, reference and education checks. For certain personnel, more extensive screening requirements are in place. All employees must also agree to an employee handbook which includes a code of conduct and policies governing use of company equipment, adherence to IT and Security policies and other policies. Applied Training Systems (i.e. Trakstar and the Trakstar brands including Trakstar Hire, Trakstar Learn, Trakstar Perform and Reviewsnap) are overseen by a board of directors that govern the operations and management of the business.

1.3. Infrastructure and Endpoint Security

1.3.1.Cloud Security. All Trakstar products and services are deployed on Amazon Web Services (AWS). The Trakstar engineering team has implemented multiple controls and monitoring/compliance tools to ensure property security procedures are being adhered to including risks such as insecure Security Groups, IAM account credential and encryption key rotation, use of MFA for authentication, secure VPN connection for access to network infrastructure and more. The engineering team has deployed multiple monitoring tools to identify changes and alerts with redundant notifications to team members. Trakstar engineering uses segmented accounts and isolated access credentials to restrict scope and use a least privilege pattern for operational activity.

1.3.2.Encryption. Communications with the Trakstar platform are conducted over the Internet by customers and their users with a minimum TLS 1.2 secured connection. HTTP connections are not permitted. All data in transit is encrypted with this standard or better. Data at rest is encrypted and isolated using strong encryption algorithms. Additionally, all data stored on employee laptops is fully encrypted and redundantly stored and encrypted using backup solutions.

1.3.3.Passwords. Any user with access to production system is required to use complex, long passwords, and secure password management tools with regular rotation. The same policy applies to local laptops and SSO integrated software. Laptops are locked when unattended. Automatic screensavers with password protection are also included. Phishing drills and policies ensure staff are honoring the policies and trained to respond appropriately to security threats.

1.3.4.Network Security. All AWS production accounts utilize firewalls and application threat detection to identify and block threats to the infrastructure or applications. Direct connectivity is prohibited for internal systems. For external facing systems, connectivity is blocked unless explicitly authorized. Networks are separated using VPCs and security groups to isolate systems. For office environments as well as remote staff, all networks are untrusted and treated as a public connection; laptops and all other devices that connect are configured accordingly.

1.3.5.Intrusion Detection and Prevention. The Trakstar engineering team has deployed a suite of tools designed to identify and proactively stop intrusions, scans, and malicious payloads from penetrating our security perimeter. This includes production systems, application security, email, device threats, and rogue user behaviors such as privilege escalation. In addition to these measures, audit trails and logging systems are leveraged to identify and alert on anomalous behaviors. Changes in infrastructure configuration are monitored, alerted, and investigated.

1.3.6.Antivirus. Across the Trakstar portfolio, antivirus and malware protections have been deployed and are monitored to mitigate common threats and vulnerabilities. These systems update frequently with new malware signatures and continuously scan for malicious activity. Implementation on employee laptops is secured and managed remotely by the Trakstar security team.

1.3.7.Identity and Access Management. Following a principle of least privilege, the Trakstar engineering team restricts access to systems to a minimum basis. This includes accounts with privileged access such as system root or admin accounts. In addition, the team monitors privilege and accounts on a monthly basis with alerts that detect unusual activity.

1.3.8.Authentication. Two factor authentication is used across the Trakstar organization. The requirements for 2FA are enforced and reviewed periodically. Acceptable methods include physical tokens such as YubiKeys or app generated passcodes. Staff are also required to use a managed SSO solution for access to devices and systems that support an enterprise SSO integration.

1.4. Physical Security

1.4.1.Offices. Trakstar employees are typically remote, with the exception of a Denver office. Employees are trained on procedures such as VPN access to secure systems, a protocol for handling laptops and reporting any lost or stolen devices. No mission critical systems or sensitive data are maintained within a physical office environment. Employee laptops are fully secured and remotely managed. Access can be revoked and data can be remotely destroyed.

1.5. Security Operations

1.5.1.Vulnerability Management. Several processes and tools are in place to identify, prioritize, and remediate vulnerabilities. Trakstar engineering reviews discovered vulnerabilities which are identified by automated scanning and other methods, to identify the threat level and classification. Vulnerability detection begins at the source code, with scanners equipped to identify threats such as the OWASP Top 10 vulnerabilities.

1.5.2.Patching. A monthly patch cycle is enforced that brings tools, operating systems, and other software current with releases that resolve vulnerabilities. For high severity issues, patching is conducted on demand to remediate any potential threats.

1.5.3.Vulnerability Disclosure Policy. Trakstar publishes a vulnerability disclosure policy, which may be updated from time to time by Trakstar, covering our response to externally identified vulnerabilities. Trakstar does not compensate ethical hackers for their contributions, though they are appreciated. The policy covers expectations, reporting policy, scope, and disclosure methods.

1.5.4.Penetration Testing. Trakstar publishes a vulnerability disclosure policy, which may be updated from time to time by Trakstar, covering our response to externally identified vulnerabilities. Trakstar does not compensate ethical hackers for their contributions, though they are appreciated. The policy covers expectations, reporting policy, scope, and disclosure methods.

1.5.5.Change Management. A change control policy and procedure is used to properly review the impact of any change to code or infrastructure prior to deployment. Procedures exist to ensure multiple staff have reviewed the change and approval has been given by engineering management. All changes are documented and tied to specific change control tickets for audit purposes.

1.5.6.Software Development Process. The engineering group leverages several checkpoints during the software development process to ensure the security and integrity of the Trakstar products. These include pull requests with code reviews, infrastructure as code, isolation of configuration and security parameters to secured storage (parameterized) and a full automated test suite to ensure the quality controls and standards are met. Development is supported by a full ticketing and agile development process to document requirements, the QA process, and deployments.

For transfers to (sub-) processors, also describe the specific technical and organizational measures to be taken by the (sub-) processor to be able to provide assistance to Customer and, for transfers from a processor to a sub-processor, to ATSI.


ANNEX III
LIST OF SUB-PROCESSORS

Sub-Processor

Customer has authorized the use of the following sub-processor(s). Data Processor may amend this list and will provide notice to Customer within 10 days of any changes, and Customer shall have 10 days following receipt of such notice to object to the changes. Include the identity and contact details of the Sub-Processor(s), and, where applicable, the Sub-Processor(s) Data Protection Officer:

Name: Chris McClave, CTP

Address: Applied Training Systems, Inc., 113 Cherry St., PMB 57615, Seattle, WA 98104-2205

Contact person’s name, position and contact details:

Chris McClave, CTO, [email protected]

Description of the processing (including a clear delimitation of responsibilities in case several subprocessors are authorized): (see below in chart)

Subprocessor Applicability Product Processing Activity Corporate URL
Amazon Web Services All Customers All Hosting infrastructure, database services, encryption, networking https://aws.amazon.com/compliance/
Atlassian All Customers All Engineering and customer support tickets https://www.atlassian.com/
Backblaze All Customers All Automated backups for corporate devices https://www.backblaze.com/
BambooHR Opt-In Integration Hire HRIS Provider https://www.bamboohr.com/
Box Opt-In Integration Learn Content storage and sourcing for LMS courses https://www.box.com/
Checkr Opt-In Integration Hire Background checks for applicants https://www.checkr.com/
CloudAMQP by 84Codes All Customers Hire Software message queues https://www.cloudamqp.com/
Datadog All Customers Learn, Hire System and Application Logging https://www.datadoghq.com/
Salesforce Interaction Studio All Customers Learn Customer application interactions and behaviors https://www.salesforce.com/products/marketing-cloud/customer-interaction/
Glassdoor Opt-In Integration Hire Job posting board https://www.glassdoor.com/
Google All Customers All Workspace back office tools, email, calendar, office productivity https://workspace.google.com/
Google Analytics All Customers All Website analytics for usage and behavior tracking https://analytics.google.com/analytics/web/
Help Scout All Customers All Help documentation and ticketing https://www.helpscout.com/
Honeybadger All Customers Perform Platform exception and error handling and logging https://www.honeybadger.io/
HubSpot All Customers All Customer leads and contact details, customer records https://www.hubspot.com/
Indeed All Customers Hire Job posting board https://www.indeed.com/
Intercom All Customers All Sales interactions with customers https://www.intercom.com/
MailChimp All Customers All Customer contacts and email addresses for notification emails https://www.mailchimp.com/
MailGun All Customers Hire Customer contacts and email addresses for notification emails https://www.mailgun.com/
Mongo DB Atlas All Customers Hire Document indexing and data storage https://www.mongodb.com/
Namely Opt-In Integration Hire HRIS Provider https://www.namely.com/
New Relic All Customers All Software observability and application monitoring platform https://www.newrelic.com/
PandaDoc Opt-In Integration Hire Document templates and management https://www.pandadoc.com/
SolarWinds Loggly All Customers Hire Software and infrastructure logging platform https://www.solarwinds.com/loggly
SolarWinds Papertrail All Customers Perform Software and infrastructure logging platform https://www.papertrail.com
Pendo All Customers Perform, Hire Customer application interactions and behaviors https://www.pendo.io/
VMWare Pivotal Tracker All Customers Perform Engineering and customer support tickets https://www.pivotaltracker.com/
Sage Intacct All Customers All Financial management platform https://www.sageintacct.com/
Salesforce Marketing Cloud All Customers All Customer contacts, leads, notes, engagements, etc. https://www.salesforce.com/
Salesforce Slack Opt-In Integration Hire Candidate application notifications https://www.slack.com/
Snowflake All Customers All Data Warehouse https://www.snowflake.com/
Splunk Cloud All Customers All Aggregated logging application https://www.splunk.com/
Stripe All Customers Hire Credit card processing and payments, subscription management https://www.stripe.com
Twilio SendGrid All Customers All Customer contacts and email addresses for notification emails https://www.sendgrid.com
Workato All Customers All Communication between HRIS systems and Trakstar https://www.workato.com/
Zapier Opt-In Integration Learn Communication between HRIS systems and Trakstar https://www.zapier.com/
Zencoder by Brightcove All Customers Learn Video encoding and compression https://www.brightcove.com/en/products/zencoder/
Ziggeo All Customers Hire Candidate videos and responses https://ziggeo.com/
Zoom Opt-In Integration Hire Integration for scheduling interviews and meetings over Zoom https://www.zoom.us/
Zuora All Customers Learn New account provision and subscription management https://www.zuora.com/

Acceptable Use Policy

Last Updated as of the 24th day of June, 2022

By accessing and using the Trakstar website at www.trakstar.com, or any of the Services including but not limited to perform.trakstar.com, learn.trakstar.com, or hire.trakstar.com, and outlined in a Trakstar Subscription Agreement (together with all Order Forms and Addenda attached hereto, the “Agreement”), of Applied Training Systems, Inc., doing business as Trakstar, and its affiliates (collectively “Trakstar”), You accept and agree to comply with this acceptable use policy (this “AUP”). Capitalized terms not defined in this AUP have the same meaning as in Trakstar’s Subscription Agreement located at https://www.trakstar.com/terms/.

Trakstar does not actively monitor Your use of the Services under normal circumstances, nor does Trakstar exercise editorial control or review the content of any Web site, electronic mail transmission, newsgroup or other material created or accessible over or through the Site or Services (including, without limitation, any User Material). However, Trakstar may remove, block, filter or restrict by any means any Content (including User Material) that Trakstar believes, in Trakstar’s sole discretion, may be illegal, infringing, libelous, fraudulent, obscene, abusive or harassing, invasive of privacy, inaccurate, misleading, destructive or otherwise offensive or objectionable, may subject Trakstar to liability, or may violate the terms of this AUP and, in the event of such actions by Trakstar, You hereby agree and acknowledge that Trakstar shall have no liability to You or any other person or entity. To ensure that Trakstar provides a high quality experience for You and for other users of the Services, you agree that Trakstar may access your account and records on a case-by-case basis to investigate complaints or allegations of abuse, infringement of third party rights, or other unauthorized uses of the Services. Trakstar reserves the right to suspend Service, and subsequently suspend any User Materials from the Services which violates this AUP, at any time and without notice.

You agree (a) to comply with all applicable local, state, federal, national, foreign and international laws, statutes, regulations, ordinances and rules (including, without limitation, (i) any intellectual property laws or laws pertaining to the proprietary rights of others, (ii) the U.S. Foreign Corrupt trade Practices Act, (iii) the U.S. Export Administration Act or any other applicable export control laws or laws relating to the export of data or software to or from the United States or any other jurisdiction, or (iii) the U.S. International Traffic in Arms Regulations or any other applicable laws, statutes or regulations relating to national security, national defense or traffic in arms), in each case during your use of the Site or Services, and (b) that you are solely responsible and, to the maximum extent permissible by applicable law, shall bear all risk and liability, for the accuracy, completeness, reliability and/or usefulness of (I) any User Material, and (II) all communications sent by You or any other person or entity using Your account.

Prohibited uses of the Services include, but are not limited to the following:

(A) violating or attempting to violate any security features of the Services, or using or attempting to use the Services or their application programming interfaces (APIs) to violate any security features or terms of service of a third- party site, including without limitation by;

(i) accessing Content not intended for you, or logging onto a server or account that you are not expressly authorized to access;(ii) attempting to probe, scan, or test the vulnerability of the Services, or any associated system or network, or to breach security or authentication measures without proper authorization;

(iii) reverse looking-up, tracing or seeking to trace any information on any other user of or visitor to Trakstar’s properties or the Services, or any other customer of Trakstar, including any account not owned by You, to its source, or exploit www.trakstar.com or Services or information made available or offered by or through the www.trakstar.com site or Services, in any manner in which the purpose is to reveal or misuse any information, including but not limited to personal identification, other than your own information, as provided by the Service;

(iv) interfering or attempting to interfere with Service to any user, host, or network, including, without limitation, submitting to the Trakstar Site or Services a virus, Trojan horse, or any other computer code, files or programs designed to interrupt, destroy or limit the functionality of any computer software or hardware or telecommunications equipment, overloading the www.trakstar.com Site or Services, or “flooding,” “spamming,” “mail bombing,” “crashing”, or attempting any form of denial of service attack against the www.trakstar.com site or Services;

(v) using the www.trakstar.com site or Services to send unsolicited or unauthorized advertising, promotional materials, “junk mail,” “spam,” “chain letters,” or any other form of solicitation, to post fraudulent job listings for purposes of collecting candidate information or to violate the terms of service for any job board with whom Trakstar offers an integration;

(vi) forging any TCP/IP packet header or any part of the header information in any e-mail or in any posting using the Services;

(vii) attempting to modify, reverse-engineer, decompile, disassemble, or otherwise reduce or attempt to reduce to a human-perceivable form any of the source code used by Trakstar in providing the www.trakstar.com site or Services; provided that the foregoing shall not apply to the extent prohibited by applicable law.

(B) uploading, downloading, submitting, displaying, performing, transmitting, or otherwise distributing or making available any Content or User Materials that:

(i) is unlawful, threatening, abusive, harassing, tortious, obscene, defamatory, libelous, invasive of another’s privacy, hateful or racially, ethnically or otherwise objectionable;(ii) advocates or encourages conduct that could constitute a criminal offense, give rise to civil liability, or otherwise violate any applicable local, state, national, or foreign law or regulation;

(iii) degrades others on the basis of gender, race, class, ethnicity, national origin, religion, sexual preference, disability or other classification;

(iv) advertises or otherwise solicits funds or is a solicitation for goods or services;

(v) infringes any patent, trademark, trade secret, copyright or other intellectual property or proprietary right of any party or to which You do not have a right to make available under any law or under contractual or fiduciary relationships (such as inside information, proprietary and confidential information learned or disclosed as part of employment relationships or under non-disclosure agreements); or

(vi) contains software viruses or any other computer code, files or programs designed to interrupt, destroy or limit the functionality of any computer software or hardware or telecommunications equipment;

(C) harming, or attempting to harm, minors in any way;

(D) impersonating any person or entity or falsely stating or otherwise misrepresenting your affiliation with a person or entity, or forging, making or otherwise using false or misrepresenting message headers, whether in whole or in part, to mask the originator of the message;

(E) using the www.trakstar.com site or Services to defraud, blackmail, stalk or otherwise harass another person or to access, use, collect or store, or attempt to access, use, collect or store, personal data about third parties without their knowledge or consent;

(F) reselling, leasing, time-sharing, or otherwise letting other persons access or use the Services or accessing the Services other than in connection with authorized third parties accessing User Materials or Content as training materials.

Any restriction or monitoring of a minor’s access to the Trakstar site or Services is your sole responsibility. Trakstar will cooperate fully with any law enforcement officials or agencies in the investigation of any violation of this AUP or of any applicable laws. Any violation of this AUP or of any applicable laws may subject You to civil and/or criminal liability. You hereby agree and acknowledge that the burden of proving that Your use of the Services, or use of any Content or User Materials uploaded, downloaded, displayed, performed, transmitted, or otherwise distributed by You does not violate this AUP, any applicable laws or any third party rights rests solely with You.

Vulnerability Disclosure Policy

Introduction

Our team works vigilantly to protect our customers and their information assets impacted by our software. We recognize the important role that security researchers and our user community play in keeping Applied Training Systems Inc. (“ATSI”) and our customers secure. If you discover a site or product vulnerability please notify us using the guidelines below.

To encourage responsible disclosure, we commit that if we conclude that a disclosure respects and meets all the guidelines outlined below we will not bring a private action or refer a matter for public inquiry.

We strongly encourage anyone who is interested in researching and reporting security issues to observe the simple courtesies and protocols of responsible disclosure.

Guidelines for responsible disclosure

We request that you:

  • Share the real or potential security issue with us before making it public to peers, on message boards, mailing lists, and other forums.
  • Provide us a reasonable amount of time to resolve the issue before you disclose it publicly.
  • Provide full details of the security issue, and be open to describing how you found it so we may reproduce the conditions.
  • Make every effort to avoid privacy violations, degradation of user experience, disruption to production systems, and destruction or manipulation of data.
  • Only use exploits to the extent necessary to confirm a vulnerability’s presence. Do not use an exploit to compromise or exfiltrate data, establish command line access and/or persistence, or use the exploit to “pivot” to other systems.
  • Once you’ve established that a vulnerability exists or encounter any sensitive data (including personally identifiable information, financial information, or proprietary information or trade secrets of any party), you must stop your test, notify us immediately, and not disclose this data to anyone else.
  • Do not submit a high volume of low-quality reports.

Authorization

If you make a good faith effort to comply with this policy during your security research, we will consider your research to be authorized, we will work with you to understand and resolve the issue quickly, and ATSI will not recommend or pursue legal action related to your research.

Scope

At this time, the following services and applications are in-scope:

  • Web application, services, and infrastructure on any of the following domains and subdomains:
    • *.trakstar.com
    • *.reviewsnap.com
    • *.mindflash.com
    • *.recruiterbox.com
    • *.appliedtraining.com
  • Anything with significant impact across our entire security posture or infrastructure

Any service not expressly listed above, such as any connected services, are excluded from scope and are not authorized for testing. Additionally, vulnerabilities found in our third-party applications/services fall outside of this policy’s scope and should be reported directly to the vendor according to their disclosure policy (if any).

Though we develop and maintain other internet-accessible systems or services, we ask that active research and testing only be conducted on the systems and services covered by the scope of this document. If there is a particular system not in scope that you think merits testing, please contact us to discuss it first.

Out of Scope

We accept only manual or semi-manual tests. All findings coming from automated tools or scripts will be considered as out of scope. Furthermore, all issues without clearly identified security impact, missing security headers, or descriptive error messages will be considered out of scope.

These items also are considered to be out of scope:

  • Attacks designed or likely to degrade, deny, or adversely impact services or user experience (e.g., Denial of Service, Distributed Denial of Service, Brute Force, Password Spraying, Spam…).
  • Attacks designed or likely to destroy, corrupt, make unreadable (or attempts therein) data or information that does not belong to you.
  • Attacks designed or likely to validate stolen credentials, credential reuse, account takeover (ATO), hijacking, or other credential-based techniques.
  • Intentionally accessing data or information that does not belong to you beyond the minimum viable access necessary to demonstrate the vulnerability.
  • Performing physical, social engineering, or electronic attacks against our personnel, offices, wireless networks, or property.
  • Security issues in third-party applications, services, or dependencies that integrate with ATSI products or infrastructure that do not have a demonstrable proof of concept for the vulnerability (e.g., libraries, SAAS services).
  • Security issues or vulnerabilities created or introduced by the reporter (e.g., modifying a library we rely on to include a vulnerability).
  • Attacks performed on any systems not explicitly mentioned as authorized and in-scope.
  • Reports of missing “best practices” or other guidelines which do not indicate a security issue.
  • Attacks related to email servers, email protocols, email security (e.g., SPF, DMARC, DKIM), or email spam.
  • Missing cookie flags on non-sensitive cookies.
  • Reports of insecure SSL/TLS ciphers (unless accompanied with working proof of concept).
  • Reports of how you can learn whether a given client can authenticate to a ATSI product or service.
  • Reports of mappings between code names and client names.
  • Reports of simple IP or port scanning.
  • Missing HTTP headers (e.g. lack of HSTS).
  • Software or infrastructure bannering, fingerprinting, or reconnaissance with no proven vulnerability.
  • Clickjacking or self-XSS reports.
  • Reports of publicly resolvable or accessible DNS records for internal hosts or infrastructure.
  • Domain-based phishing, typosquatting, punycodes, bitflips, or other techniques.
  • Violating any laws or breaching any agreements (or any reports of the same).

Reporting a vulnerability

We accept vulnerability reports via:

  • This form (Google sign-in required)
  • Email to [email protected]

Be sure to include an email address where we can reach you in case we need more information. We take security issues seriously and will respond swiftly to fix verifiable security issues. Some parts of our product are complex and take time to update. When properly notified of legitimate issues, we will do our best to acknowledge your emailed report, assign resources to investigate the issue, and fix potential problems as quickly as possible.

We do not support PGP-encrypted emails at this time. For particularly sensitive information, please submit through our HTTPS web form.

What we would like to see from you

In order to help us triage and prioritize submissions, we recommend that your reports:

  • Describe the vulnerability, where it was discovered, and the potential impact of exploitation.
  • Offer a detailed description of the steps needed to reproduce the vulnerability (proof of concept scripts or screenshots are helpful).
  • Be in English, if possible.

What you can expect from us

When you choose to share your contact information with us, we commit to coordinating with you as openly and as quickly as possible.

  • Within 7 business days, we will acknowledge that your report has been received.
  • We will perform an initial assessment on the potential findings to determine accuracy, need for escalation and product team to work with. In this phase, you may:
    • Receive requests for additional information, or
    • Receive notification that the vulnerability is not accepted into the program because it does not meet the criteria of the program or provide sufficient detail. (You may respond to any notifications of non-acceptance by contacting [email protected])
  • We will develop a resolution and take appropriate action depending on the criticality scoring of the vulnerability.
  • We will provide the researcher with public recognition if requested and if the report results in a publicly released fix or communication.

Where necessary or if we are unable to resolve communication issues or other problems, ATSI may bring in a neutral third party (such as CERT/CC, DHS-ICS-CERT, or the relevant regulator) to assist in determining how best to handle the vulnerability.

Note: Any information shared with ATSI may be used by ATSI in any manner determined appropriate by ATSI. Submitting any information will not create any rights for the submitter, nor will it create any obligations for ATSI.

Bug Bounty

ATSI does NOT offer compensation for vulnerabilities that are disclosed. We will, from time to time, say thank you for new and interesting reports in our thanks section of this page. Please note however that providing a report does not guarantee a credit.

Cigna Machine-Readable Files Policy

cigna.com/legal/compliance/machine-readable-files

The above link leads to the machine-readable files that are made available in response to the federal Transparency in Coverage Rule and includes negotiated service rates and out-of-network allowed amounts between health plans and healthcare providers. The machine-readable files are formatted to allow researchers, regulators, and application developers to more easily access and analyze data.

Empower. Automate. Elevate. Mitratech
  • English
  • Español
  • Deutsch
  • Español (América Latina)
  • Français
  • 中文 (简体)

©2026 Mitratech, Inc. All rights reserved.

Empower. Automate. Elevate. Mitratech

©2026 Mitratech, Inc. All rights reserved.