License Agreements
This End User Agreement (this “Agreement”, also referred to elsewhere as “EULA”) is a legal agreement between the entity entering into this Agreement and Blueshift Cybersecurity, Inc., a Delaware corporation (“Blueshift”). This Agreement governs orders placed by Customer (defined below) to access and use Blueshift’s On-Premise Software, Cloud Services and/or Professional Services (and any updates and modifications thereto).
BY ISSUING AN ORDER TO BLUESHIFT (OR ITS AUTHORIZED CHANNEL PARTNER) OR OTHERWISE USING OR ACCESSING THE PRODUCTS MADE AVAILABLE BY BLUESHIFT HEREUNDER, CUSTOMER AGREES TO FOLLOW AND BE BOUND BY THE TERMS AND CONDITIONS OF THIS AGREEMENT. IF YOU ARE AN INDIVIDUAL (“YOU”) ACTING ON BEHALF OF CUSTOMER, YOU REPRESENT THAT YOU HAVE THE AUTHORITY TO LEGALLY BIND CUSTOMER TO THE TERMS AND CONDITIONS OF THIS AGREEMENT. IF YOU DO NOT HAVE AUTHORITY TO BIND CUSTOMER, OR IF YOU OR CUSTOMER DO NOT AGREE TO THE TERMS AND CONDITIONS OF THIS AGREEMENT, YOU AND CUSTOMER MAY NOT USE THE PRODUCTS.
This Agreement consists of, collectively, this base agreement, the terms and conditions detailed in the Product Addendum attached hereto, and the applicable Policies. In the event of any conflict between the terms and conditions set forth in the base Agreement and those set forth in the Product Addendum, the terms and conditions of such Product Addendum shall control.
Whitelist Management and Blueshift Protect
Whitelisting is a cybersecurity technique whereby users can only take actions on their computer authorized by an administrator. Blueshift XDR’s Managed Whitelisting provides an optimal user experience in that functions and access are automatically limited to safe content. Blueshift Protect’s architecture utilizes elements from both architectures but implements an overall default-deny defense. Blueshift XDR’s implementation of managed whitelisting constantly monitors your system processes and blocks them at the endpoint until they’re validated.
Whitelist Management Related CMMC Domains:
Access Control (AC)
Audit and Accountability (AU)
Configuration Management (CM)
Media Protection (MP)
Risk Assessment (RM)
System and Information Integrity (SI)
This subsection sets out the terms and conditions between Blueshift and Customer for the use of Blueshift’s Extended Detection and Response (XDR) service with respect to Customer-Initiated Penetration Test services (“PenTest,” “PenTests,” “PenTesting”). This subsection specifically addresses the conditions under which PenTests are to be conducted, monitored, and reported pursuant to the Blueshift provided cybersecurity service.
Notification Requirement:
While Blueshift encourages all customers to undergo annual penetration testing, it’s imperative to outline proper procedures and expectations, as the additional labor allocated by the Blueshift Security Operations Center (“SOC”) during and after a penetration test is burdensome and detrimental to Blueshift’s normal operations. Prior to initiating any PenTest that interacts with Blueshift’s XDR service or infrastructure, Customer agrees to provide written notice to Blueshift’s SOC at least forty-eight (48) hours in advance of the scheduled start time of said PenTest. This notification is intended to allow Blueshift to prepare and monitor the test environment, and to allocate adequate resources to ensure the safety and integrity of its systems, the XDR service, and its entire customer base.
SOC Monitoring and Response:
Upon receiving notice from Customer, Blueshift’s SOC will monitor the PenTest activities for any actions that could potentially impact the stability or security of Blueshift’s XDR service or infrastructure. If the SOC detects a PenTest is being conducted without prior notification as required in Section 1, the SOC will promptly notify Customer of the unauthorized testing activity.
Non-Alerting of PenTest Activities:
Should Customer fail to provide the abovementioned 48-hour notification, Blueshift shall not be responsible for providing further alerts or notifications regarding the PenTest activities. Customer acknowledges and agrees that upon detection of an unauthorized PenTest, the sole responsibility of Blueshift will be to inform Customer of the detection, after which no further communication on this matter will be initiated by Blueshift unless specifically requested by Customer in writing.
Request for Alerts and Reports:
In the event that Customer chooses to be alerted on PenTesting activities or requests reports generated by the SOC during or post-PenTest activities, such services shall be considered outside the scope of Blueshift provided services under this Agreement with Customer. Customer agrees that it will be billed the rate of $500 USD per hour, or any fraction thereof, for any time spent by Blueshift’s SOC to provide forensic services related to during or post PenTest. These charges will be invoiced separately and are due upon receipt of the service, net fifteen (15) days.
Acknowledgment and Consent:
By initiating a PenTest, Customer acknowledges and consents to the terms outlined in this subsection. Customer agrees that all PenTesting activities are at their own risk and that Blueshift shall not be liable for any disruptions, damages, or other negative consequences without limitation resulting from such activities.
Acceptance:
Customer’s decision to proceed with a PenTest following the requirements set forth in this subsection signifies their acceptance of these terms and conditions. Failure to comply with the notification requirement as outlined above in Customer being responsible for any costs associated with additional services as detailed herein.
This subsection regarding data transfer sets out the terms and conditions for the use of Blueshift’s managed cybersecurity service concerning the transfer of specific data from Customer’s IT environment to external systems, including but not limited to Dashboarding and Artificial Intelligence (“AI”) systems, under Blueshift’s control.
Blueshift Customer Agreement for Data Transfer
This data will be sent to external systems managed by Blueshift, which the parties agree is critical for comprehensive monitoring and analysis of Customer’s cybersecurity posture. Blueshift will utilize this data to enhance detection capabilities, predict potential threats, and provide actionable insights that can significantly improve the resilience of Customer’s systems against ever-advancing cyber threats.
Blueshift agrees to maintain the confidentiality of the data being transferred to any external systems and will implement appropriate security measures to protect this information. These security measures include, but are not limited to:
However, Customer and Blueshift acknowledge that no system is entirely secure and agree that some risk is associated with transmitting sensitive data or information over networks or other communication channels. Therefore, Customer agrees to hold Blueshift harmless for any such data breaches not directly attributable to provable negligence on behalf of Blueshift.
Amendments: Blueshift reserves the right to amend this Data Transfer Agreement at any time by updating the relevant URL on the Blueshift website. Customer’s continued use of the services provided by Blueshift following such update constitutes acceptance of the amended agreement.
EXHIBIT 1: PRODUCT ADDENDUM
Part 1: Additional Terms and Conditions Specific to Cloud Services
Part 2: Additional Terms and Conditions Specific to On-Premise Software
Updates and Upgrades. Blueshift may release patches, bug fixes, updates, upgrades, maintenance and/or service packs (“Updates”) for the On-Premise Software from time to time, which may be necessary to ensure the proper function and security of the Products. Blueshift is not responsible for performance, security, warranty breaches, support or issues encountered in connection with the Products that result from Customer’s failure to accept and apply Updates within a reasonable timeframe.