Australian Terms & Conditions
Terms & Conditions
- Definitions. Capitalised terms shall have their meaning as defined or as otherwise set forth in Section 15.
2.1 Services
(a) Subject to and conditioned on Customer’s and its Authorised Users’ acceptance of and compliance with the Agreement, Provider shall provide to Customer and its Authorised Users the services described in the Agreement (collectively, the “Services”), in accordance with the terms of the Agreement.
(b) If Customer purchases a subscription to the 24/7 Software API as part of the Services:
(i) Provider will provide the 24/7 Software API via a 24/7 Software API key or password, and Customer may access and use the 24/7 Software API (including any credentials and certificates) solely in connection with the products and services provided by Provider to its customers.
(ii) Customer will be responsible for all uses of its 24/7 Software API key or password and will notify Provider immediately of any unauthorised use of Provider’s 24/7 Software API key or password.
(iii) The 24/7 Software API will not include archived databases.
(iv) In connection with all Integrations, Provider may impose rate limits in accordance with Exhibit A.
(v) Customer’s use of the 24/7 Software API will be subject to the restrictions set forth in Exhibit B.
(vi) In connection with any Third-Party Integrations: before the third party begins work on the Third-Party Integration, Customer will ensure that the third party has executed a 24/7 Software Integrator Agreement with Provider.
2.2 Subcontractors
Provider may from time to time in its discretion engage third parties to perform Services (each, a “Subcontractor”), provided that such Subcontractors agree in writing to confidentiality terms at least as protective as those in the Agreement and provided that Provider shall remain responsible for its Subcontractors.
3. Restrictions
Neither Customer, nor its employees, contractors or other Persons within Customer’s control (collectively, “Customer Personnel”), shall access or use the Services or Provider Materials except as expressly permitted by the Agreement and, in the case of Third-Party Materials, the applicable third-party license agreement. For purposes of clarity and without limiting the generality of the foregoing, neither Customer nor Customer Personnel shall:
(a) copy, modify, or create derivative works or improvements of the Services or Provider Materials, except as the Agreement expressly permits;
(b) rent, lease, lend, sell, sublicense, assign, distribute, publish, transfer, or otherwise make available any Services or Provider Materials to any Person, including on or in connection with the internet or any time-sharing, service bureau, software as a service, cloud, or other technology or service, except as the Agreement expressly permits;
(c) reverse engineer, disassemble, decompile, decode, adapt or otherwise attempt to derive or gain access to the source code of the Services or Provider Materials, in whole or in part;
(d) bypass or breach any security device or protection used by the Services or Provider Materials or access or use the Services or Provider Materials other than by an Authorised User through the use of his or her own then valid Access Credentials;
(e) input, upload, transmit, or otherwise provide to or through the Services or Provider Systems any information or materials that are unlawful or injurious, or contain, transmit, or activate any Harmful Code;
(f) damage, destroy, disrupt, disable, impair, interfere with, or otherwise impede or harm in any manner the Services, Provider Systems, or Provider’s provision of services to any third party, in whole or in part;
(g) remove, delete, alter, or obscure any trademarks, Documentation, warranties, or disclaimers, or any copyright, trademark, patent, or other intellectual property or proprietary rights notices from any Services or Provider Materials, including any copy thereof;
(h) access or use the Services or Provider Materials for purposes of competitive analysis of the Services or Provider Materials, the development, provision, or use of a competing software service or product or any other purpose that is to Provider’s detriment or commercial disadvantage;
(i) use the Services for any purpose that may (i) menace or harass any person or cause damage or injury to any person or property, (ii) involve the publication of any material that is false, defamatory, harassing, or obscene, (iii) violate privacy rights or promote bigotry, racism, hatred, or harm, (iv) constitute an infringement of intellectual property or other proprietary rights, or (v) otherwise violate applicable laws, ordinances, or regulations;
(j) send unsolicited text messages, commonly known as spam;
(k) violate any applicable Law, carrier regulations, Mobile Marketing Association (MMA) Guidelines (https://www.mmaglobal.com/policies/global-mobile-advertising-guidelines), or Twilio’s acceptable use policy and terms of service, including use of SMS for emergency services (https://www.twilio.com/legal/aup); or
(l) otherwise access or use the Services or Provider Materials beyond the scope of the authorisation granted under Section 2.1.
4. Fees; Payment Terms
4.1 Fees. The Customer shall pay Provider the fees set forth in the Agreement (“Fees”) in accordance with this Section 4. Unless otherwise set forth in the Agreement or otherwise agreed to in writing by Customer and Provider, the Fees will increase annually on the Agreement's anniversary by the greater of 3% or the increase in the Consumer Price Index (CPI).
4.2 Taxes. All Fees and other amounts payable by Customer under the Agreement are exclusive of Goods and Services Tax (GST). Customer is responsible for all such taxes imposed by any governmental or regulatory authority on any amounts payable by Customer hereunder, excluding, for the avoidance of doubt, any taxes imposed on Provider’s income.
4.3 Payment. Customer shall pay all Fees within 30 days after the date of the invoice therefor. Customer shall make all payments hereunder in Australian dollars. Customer shall make payments to the address or account specified in the Agreement or such other address or account as Provider may specify in writing from time to time.
4.4 No Deductions or Setoffs. All amounts payable to Provider under the Agreement shall be paid by Customer to Provider in full without any setoff, recoupment, counterclaim, deduction, debit, or withholding for any reason (other than any deduction or withholding of tax as may be required by applicable Law).
4.5 Data Storage. Included with Customer subscription is Data Storage up to 2 GB. Additional Data Storage may be purchased by Customer for a fee.
5. Intellectual Property Rights
5.1 Services and Provider Materials. Except as explicitly set forth herein, all right, title, and interest in and to the Services and Provider Materials, including all Intellectual Property Rights therein, are and will remain with Provider and the respective rights holders in the Third-Party Materials.
5.2 Customer Data. As between Customer and Provider, Customer is and will remain the sole and exclusive owner of all right, title, and interest in and to all Customer Data, including all Intellectual Property Rights relating thereto, subject to Provider, its Subcontractors, and Provider Personnel using such data solely to perform the Services.
6. Confidentiality
6.1 Confidential Information. In connection with the Agreement, each party (as the “Disclosing Party”) may disclose or make available Confidential Information to the other party (as the “Receiving Party”). Subject to Section 6.2, “Confidential Information” means information in any form or medium (whether oral, written, electronic or other) that the Disclosing Party considers confidential or proprietary, including information consisting of or relating to the Disclosing Party’s technology, trade secrets, know-how, business operations, plans, strategies, customers, and pricing, and information with respect to which the Disclosing Party has contractual or other confidentiality obligations, in each case whether or not marked, designated, or otherwise identified as “confidential.” Without limiting the foregoing: all Provider Materials are the Confidential Information of Provider and the terms and existence of the Agreement are the Confidential Information of each of the parties.
6.2 Exclusions. Confidential Information does not include information that the Receiving Party can demonstrate by written or other documentary records: (a) was rightfully known to the Receiving Party without restriction on use or disclosure prior to such information’s being disclosed or made available to the Receiving Party in connection with the Agreement; (b) was or becomes generally known by the public other than by the Receiving Party’s or any of its Representatives’ noncompliance with the Agreement; (c) was or is received by the Receiving Party on a non-confidential basis from a third party that, to the Receiving Party’s knowledge, was not or is not, at the time of such receipt, under any obligation to maintain its confidentiality; or (d) the Receiving Party can demonstrate by written or other documentary records was or is independently developed by the Receiving Party without reference to or use of any Confidential Information.
6.3 Protection of Confidential Information. As a condition to being provided with any disclosure of or access to Confidential Information, the Receiving Party shall:
(a) not access or use Confidential Information other than as necessary to exercise its rights or perform its obligations under and in accordance with the Agreement;
(b) except as may be permitted by and subject to its compliance with Section 6.4, not disclose or permit access to Confidential Information other than to its Representatives who: (i) need to know such Confidential Information for purposes of the Receiving Party’s exercise of its rights or performance of its obligations under and in accordance with the Agreement; (ii) have been informed of the confidential nature of the Confidential Information and the Receiving Party’s obligations under this Section 6.3; and (iii) are bound by written confidentiality and restricted use obligations at least as protective of the Confidential Information as the terms set forth in this Section 6.3;
(c) safeguard the Confidential Information from unauthorised use, access, or disclosure, using at least the degree of care it uses to protect its sensitive information and in no event less than a reasonable degree of care; and
(d) ensure its Representatives’ compliance with, and be responsible and liable for any of its Representatives’ non-compliance with, the terms of this Section 6.
6.4 Compelled Disclosures. If the Receiving Party or any of its Representatives is compelled by applicable Law to disclose any Confidential Information then, to the extent permitted by applicable Law, the Receiving Party shall: (a) promptly, and prior to such disclosure, notify the Disclosing Party in writing of such requirement so that the Disclosing Party can seek a protective order or other remedy or waive its rights under Section 6.3; and (b) provide reasonable assistance to the Disclosing Party, at the Disclosing Party’s sole cost and expense, in opposing such disclosure or seeking a protective order or other limitations on disclosure. If the Disclosing Party waives compliance or, after providing the notice and assistance required under this Section 6.4, the Receiving Party remains required by Law to disclose any Confidential Information, the Receiving Party shall disclose only that portion of the Confidential Information that the Receiving Party is legally required to disclose and, on the Disclosing Party’s request, shall use commercially reasonable efforts to obtain assurances from the applicable court or other presiding authority that such Confidential Information will be afforded confidential treatment.
6.5 Disclosures to Third-Party Social Media Platforms. Notwithstanding anything to the contrary in this Agreement, Provider may disclose information received from, regarding, or relating to (a) Customer, (b) Customer’s owners, managers, members, officers, employees, clients, or customers, or (c) this Agreement to WhatsApp, Facebook, any application provided by Meta Platforms, Inc., or any other social media platform or application that Provider currently has a contractual relationship with or may in the future have a contractual relationship with (collectively, the “Third-Party Social Media Platforms”), solely to the extent necessary to deliver the Services, support authorised communication functionality, or comply with applicable contractual, platform, carrier, or legal requirements. Provider’s disclosure of such information in accordance with this Section 6.5 is not a violation of this Section 6, or any other confidentiality or data security obligations that Provider owes to Customer.
7. Information Security.
Provider will comply with the data security requirements set forth in Exhibit D, which is attached hereto and incorporated herein by reference.
8.1 Term.
The term of the Agreement commences as of the effective date set forth in the Agreement and shall continue for the time frame set forth in the Agreement, unless superseded or otherwise terminated by mutual written agreement of the parties or pursuant to the termination provisions hereto.
8.2 Renewal Terms. After the initial term of the Agreement, the term of the Agreement will automatically renew for subsequent one-year periods until a party provides at least 30 days written notice prior to the end of the then-current term.
8.3 Termination. In addition to any other express termination right set forth elsewhere in the Agreement:
(a) either party may terminate the Agreement, effective on written notice to the other party, if the other party breaches the Agreement (including Customer’s failure to pay any amount due under the Agreement), and such breach: (i) is incapable of cure; or (ii) being capable of cure, remains uncured 30 days after the non-breaching party provides the breaching party with written notice of such breach; and
(b) either party may terminate the Agreement, effective immediately upon written notice to the other party, if the other party:
(i) becomes insolvent or is generally unable to pay, or fails to pay, its debts as they become due; (ii) files or has filed against it, a petition for voluntary or involuntary bankruptcy or otherwise becomes subject, voluntarily or involuntarily, to any proceeding under any domestic or foreign bankruptcy or insolvency Law; (iii) makes or seeks to make a general assignment for the benefit of its creditors; or (iv) applies for or has appointed a receiver, trustee, custodian, or similar agent appointed by order of any court of competent jurisdiction to take charge of or sell any material portion of its property or business.
8.4 Effect of Expiration or Termination. Upon any expiration or termination of the Agreement, except as expressly otherwise provided in the Agreement:
(a) all rights, licenses, consents, and authorisations granted by either party to the other hereunder will immediately terminate;
(b) Provider shall return to Customer, or at Customer’s written request destroy, all documents and tangible materials containing Customer Data or Customer’s Confidential Information;
(c) Customer shall immediately cease all use of any Services or Provider Materials and promptly return to Provider, or at Provider’s written request destroy, all documents and tangible materials containing any Provider Materials or Provider’s Confidential Information;
(d) Provider may immediately disable all Customer and Authorised User access to the Services and Provider Materials.
8.5 Surviving Terms. The provisions set forth in the following sections, and any other right or obligation of the parties in the Agreement that, by its nature, should survive termination or expiration of the Agreement, will survive any expiration or termination of the Agreement: Section 3, Sections 4 through 15.
9. Disclaimer of Warranties
9.1 All Services and Provider Materials are provided "as is" and Provider hereby disclaims all warranties, whether express, implied, statutory, or otherwise, to the extent permitted by law, including all implied warranties of merchantability, fitness for a particular purpose, title, and non-infringement. Without limiting the foregoing, Provider makes no warranty of any kind that the Services or Provider Materials, or any products or results of the use thereof, will meet Customer’s or any other person’s requirements, operate without interruption, achieve any intended result, be compatible or work with any software, system or other services, or be secure, accurate, complete, free of harmful code, or error-free. All Third-Party Materials are provided "as is" and any representation or warranty of or concerning any Third-Party Materials is strictly between Customer and the third-party owner or distributor of the Third-Party Materials.
10. Indemnification
10.1 Provider Indemnification. Provider shall indemnify, defend, and hold harmless Customer and its officers, directors, employees, successors, and assigns (each, a "Customer Indemnitee") from and against any and all Losses incurred by Customer arising out of or relating to any claim, suit, action, or proceeding (each, an "Action") by a third party (other than an Affiliate of Customer) alleging that Customer’s use of the Services (excluding Customer Data and Third-Party Materials) in compliance with the Agreement infringes a third party’s Australian Intellectual Property Rights. The foregoing obligation does not apply to any Action or Losses to the extent arising out of or relating to any:
(a) access to or use of the Services or Provider Materials in combination with any hardware, system, software, network, or other materials or service not provided or authorised in writing by Provider;
(b) modification of the Services or Provider Materials other than: (i) by or on behalf of Provider; or (ii) with Provider’s written approval in accordance with Provider’s written specification;
(c) failure to timely implement any modifications, upgrades, replacements, or enhancements made available to Customer by or on behalf of Provider; or
(d) matter described in Section 10.2, whether or not the same results in any Action against or Losses by any Customer Indemnitee.
10.2 Customer Indemnification. Customer shall indemnify, defend, and hold harmless Provider and its officers, directors, employees, agents, successors, and assigns (each, a "Provider Indemnitee") from and against any and all Losses incurred by such Provider Indemnitee in connection with any Action by a third party (other than an Affiliate of a Provider Indemnitee) alleging that the Customer Data, or any Processing of Customer Data by or on behalf of Provider in accordance with the Agreement, infringes, misappropriates, or constitutes the unauthorised use of a third party’s Australian Intellectual Property Rights or personal information.
10.3 Indemnification Procedure. Each party shall promptly notify the other party in writing of any Action for which such party believes it is entitled to be indemnified pursuant to Section 10.1 or Section 10.2, as the case may be. The party seeking indemnification (the "Indemnitee") shall cooperate with the other party (the "Indemnitor") at the Indemnitor’s sole cost and expense. The Indemnitor shall immediately take control of the defence and investigation of such Action and shall employ counsel of its choice to handle and defend the same, at the Indemnitor’s sole cost and expense. The Indemnitee’s failure to perform any obligations under this Section 10.3 will not relieve the Indemnitor of its obligations under this Section 10 except to the extent that the Indemnitor can demonstrate that it has been materially prejudiced as a result of such failure. The Indemnitee may participate in and observe the proceedings at its own cost and expense with counsel of its own choosing. Neither party, as the Indemnitor, shall enter into any settlement that imposes any liability on the Indemnitee without the prior written consent of the Indemnitee to be affected by the settlement.
10.4 Mitigation. If any of the Services or Provider Materials are, or in Provider’s opinion are likely to be, claimed to infringe, misappropriate, or otherwise violate any third-party Intellectual Property Right, or if Customer’s or any Authorised User’s use of the Services or Provider Materials is enjoined or threatened to be enjoined, Provider may, at its option and sole cost and expense:
(a) obtain the right for Customer to continue to use the Services and Provider Materials materially as contemplated by the Agreement;
(b) modify or replace the Services and Provider Materials, in whole or in part, to seek to make the Services and Provider Materials (as so modified or replaced) non-infringing, while providing materially equivalent features and functionality, in which case such modifications or replacements will constitute Services and Provider Materials, as applicable, under the Agreement; or
(c) if neither (a) nor (b) are commercially reasonable, terminate the Agreement with respect to all or part of the Services and Provider Materials, require Customer to immediately cease any use of the Services and Provider Materials or any specified part or feature thereof, and Provider shall provide a refund to Customer of any pre-paid Fees for Services that Provider has not performed as of the effective date of termination.
THIS SECTION 10 SETS FORTH CUSTOMER’S SOLE REMEDIES AND PROVIDER’S SOLE LIABILITY AND OBLIGATION FOR ANY ACTUAL, THREATENED, OR ALLEGED CLAIMS THAT THE AGREEMENT OR ANY SUBJECT MATTER HEREOF (INCLUDING THE SERVICES AND PROVIDER MATERIALS) INFRINGES, MISAPPROPRIATES, OR OTHERWISE VIOLATES ANY THIRD-PARTY INTELLECTUAL PROPERTY RIGHT.
11. Limitations of Liability
11.1 Exclusion of Damages. Except as otherwise provided in Section 11.3, in no event will either party be liable under or in connection with the Agreement or its subject matter under any legal or equitable theory, including breach of contract, tort (including negligence), strict liability, and otherwise, for any: (a) loss of production, use, business, revenue, or profit; or (b) impairment, inability to use, or loss of the Services, or any interruption or delay thereof, or any consequential, incidental, indirect, exemplary, special, enhanced, or punitive damages, regardless of whether such persons were advised of the possibility of such losses or damages or such losses or damages were otherwise foreseeable, and notwithstanding the failure of any agreed or other remedy of its essential purpose.
11.2 Cap on Monetary Liability. Except as otherwise provided in Section 11.3, in no event will the aggregate liability of Provider and its licensors, service providers, and suppliers under or in connection with the Agreement or its subject matter, under any legal or equitable theory, including breach of contract, tort (including negligence), strict liability, and otherwise, exceed the total amount paid by Customer during the prior 12 months. The foregoing limitation applies notwithstanding the failure of any agreed or other remedy of its essential purpose.
11.3 Exceptions. The exclusions and limitations in Section 11.1 and Section 11.2 do not apply to: (a) a party’s obligations under Section 6 (Confidentiality); (b) a party’s indemnification obligations under Section 10 (Indemnification); (c) liability arising from a party’s breach of its data protection or privacy obligations under the Agreement or applicable Law; (d) liability arising from a party’s gross negligence or wilful misconduct; (e) liability for personal injury or death; or (f) any liability which cannot be limited or excluded under applicable Law.
12. Force Majeure
Any delay in the performance of any duties or obligations of either party (except the payment of money owed) will not be considered a breach of the Agreement if such delay is caused by a labour dispute, shortage of materials, fire, earthquake, flood, or any other event beyond the control of such party, including downtime caused by a third-party hosting provider, provided that such party uses reasonable efforts, under the circumstances, to notify the other party of the circumstances causing the delay and to resume performance as soon as possible.
13. Insurance
Provider will maintain the following: (a) General Liability Insurance of One Million Dollars (AU$1,000,000) per occurrence and Two Million Dollars (AU$2,000,000) in the aggregate; (b) Automobile Liability Insurance in an amount of One Million Dollars (AU$1,000,000) per occurrence combined single limit; and (c) Technology Errors and Omissions Insurance in an amount of One Million Dollars (AU$1,000,000) per claim and Two Million Dollars (AU$2,000,000) in the aggregate.
14. Miscellaneous
14.1 Relationship of the Parties. The relationship between the parties is that of independent contractors. Nothing contained in the Agreement shall be construed as creating any agency, partnership, joint venture, or other form of joint enterprise, employment, or fiduciary relationship between the parties, and neither party shall have authority to contract for or bind the other party in any manner whatsoever.
14.2 Notices. All notices, requests, consents, claims, demands, waivers, and other communications under the Agreement have binding legal effect only if in writing and addressed to a party as set forth in the Agreement (e.g., on the cover page), or to such other address or such other person that such party may designate from time to time in accordance with this Section 14.2. Notices sent in accordance with this Section 14.2 will be deemed effectively given: (a) when received, if delivered by hand, with signed confirmation of receipt; (b) when received, if sent by a nationally recognised overnight courier, signature required; or (c) when sent by email, on the date sent, provided no delivery failure notification is received, or, if sent outside business hours, on the next business day.
14.3 Headings. The headings in the Agreement are for reference only and do not affect the interpretation of the Agreement.
14.4 Entire Agreement. The Agreement constitutes the sole and entire agreement of the parties with respect to the subject matter of the Agreement and supersedes all prior and contemporaneous understandings, agreements, representations, and warranties, both written and oral, with respect to such subject matter. In the event of any inconsistency between the statements made in the body of the Agreement, the related exhibits, schedules, attachments, and appendices and these Terms and Conditions, the following order of precedence governs: (a) first, the Agreement, excluding its exhibits, schedules, attachments, and appendices; (b) second, the exhibits, schedules, attachments, and appendices to the Agreement; and (c) third, any other documents incorporated into the body of the Agreement by reference, including these Terms and Conditions.
14.5 Assignment: Neither party shall assign or otherwise transfer the Agreement without the other party’s prior written consent; provided that either party may assign the Agreement in connection with a merger, or sale of all or substantially all of its assets, provided that the assignee agrees in writing to be bound by the terms of the Agreement. Any assignment in contravention of this Section 14.5 shall be null and void.
14.6 No Third-party Beneficiaries: The Agreement is for the sole benefit of the parties hereto and their respective successors and permitted assigns and nothing herein, express or implied, is intended to or shall confer upon any other person any legal or equitable right, benefit, or remedy of any nature whatsoever under or by reason of the Agreement.
14.7 Amendment and Modification; Waiver: No amendment to or modification of the Agreement is effective unless it is in writing, identified as an amendment to the Agreement, and signed by each party. No waiver by any party of any of the provisions hereof shall be effective unless explicitly set forth in writing and signed by the party so waiving.
14.8 Severability: If any term or provision of the Agreement is invalid, illegal, or unenforceable in any jurisdiction, such invalidity, illegality, or unenforceability shall not affect any other term or provision of the Agreement or invalidate or render unenforceable such term or provision in any other jurisdiction. Upon such determination that any term or other provision is invalid, illegal, or unenforceable, the parties hereto shall negotiate in good faith to modify the Agreement so as to effect the original intent of the parties as closely as possible in a mutually acceptable manner in order that the transactions contemplated hereby be consummated as originally contemplated to the greatest extent possible.
14.9 Governing Law; Submission to Jurisdiction: The Agreement is governed by and construed in accordance with the laws of the State of Queensland and the Commonwealth of Australia without giving effect to any choice or conflict of law provision.
14.10 Waiver of Jury Trial: Each party irrevocably and unconditionally waives any right it may have to a trial by jury in respect of any legal action arising out of or relating to the Agreement or the transactions contemplated hereby.
14.11 Equitable Relief: Each party acknowledges and agrees that a breach or threatened breach by such party of any of its obligations under Section 6 or, in the case of Customer, Section 3, would cause the other party irreparable harm for which monetary damages would not be an adequate remedy and agrees that, in the event of such breach or threatened breach, the other party is entitled to seek equitable relief, including a restraining order, an injunction, specific performance, and any other relief that may be available from any court, without any requirement to post a bond or other security, or to prove actual damages or that monetary damages are not an adequate remedy. Such remedies are not exclusive and are in addition to all other remedies that may be available at law, in equity or otherwise.
14.12 Counterparts: The Agreement may be executed in counterparts, each of which is deemed an original, but all of which together are deemed to be one and the same agreement. A signed copy of the Agreement delivered by facsimile, e-mail, or other means of electronic transmission is deemed to have the same legal effect as delivery of an original signed copy of the Agreement.
14.13 Not Construed Against Drafter: The language of the Agreement shall not be interpreted in favour of or against any Party as the drafter of the Agreement.
15. Definitions
24/7 Software API: Optional application programming interfaces provided by the Provider under this Agreement.
Access Credentials: Any username, identification number, password, license, or security key, security token, PIN, or other security code, method, technology, or device used, alone or in combination, to verify an individual’s identity and authorisation to access and use the Services.
Affiliate: An entity that now or hereafter controls, is controlled by, or is under common control with a specified entity, where “control” means beneficial ownership, directly or indirectly, of more than 50% of the outstanding shares or other ownership interest (representing the right to vote for the election of directors or other managing authority or the right to make decisions for such entity, as applicable) of an entity. Such entity shall be deemed an Affiliate only so long as such control exists.
Agreement: The agreement entered into between Customer and Provider for the provision of the Services. All references to the Agreement include the Agreement and these Terms and Conditions unless the reference is made specifically to the body of the Agreement (which reference would be intended to exclude these Terms and Conditions).
Authorised User: Each of the individuals authorised to use the Services pursuant to the Agreement.
CPI: The Consumer Price Index as published by the Australian Bureau of Statistics or any successor agency.
Customer Data: Information, data, and other content, in any form or medium, that is collected, downloaded, or otherwise received, directly or indirectly, from Customer or an Authorised User by or through the Services or that incorporates or is derived from the Processing of such information, data, or content by or through the Service.
Documentation: Any manuals, instructions, or other documents or materials that Provider provides or makes available to Customer in any form or medium and which describe the functionality, components, features, or requirements of the Services or Provider Materials, including any aspect of the installation, configuration, integration, operation, use, support, or maintenance thereof.
Harmful Code: Any software, hardware, or other technology, device, or means, including any virus, worm, malware, or other malicious computer code, the purpose or effect of which is to:
a. Permit unauthorised access to, or to destroy, disrupt, disable, distort, or otherwise harm or impede in any manner any (i) computer, software, firmware, hardware, system, or network or (ii) any application or function of any of the foregoing or the security, integrity, confidentiality, or use of any data Processed thereby; or
b. Prevent Customer or any Authorised User from accessing or using the Services or Provider Systems as intended by the Agreement. Harmful Code does not include any Provider Disabling Device.
Integration: Using the 24/7 Software API to connect (a) an external system or application to (b) a system or application that the Provider provides to the Customer. “Integrations” include Proprietary Integrations and Third-Party Integrations.
Intellectual Property Rights: Any and all registered and unregistered rights granted, applied for, or otherwise now or hereafter in existence under or related to any patent, copyright, trademark, trade secret, database protection, or other intellectual property rights laws, and all similar or equivalent rights or forms of protection, in any part of the world.
Law: Any statute, law, ordinance, regulation, rule, code, order, constitution, treaty, common law, judgment, decree, or other requirements of any Australian federal, state (including Queensland), local, or foreign government or political subdivision thereof, or any arbitrator, court, or tribunal of competent jurisdiction.
Losses: Any and all losses, damages, liabilities, deficiencies, claims, actions, judgments, settlements, interest, awards, penalties, fines, costs, or expenses of whatever kind, including reasonable legal fees and the costs of enforcing any right to indemnification hereunder and the cost of pursuing any insurance providers.
Person: An individual, corporation, partnership, joint venture, limited liability entity, governmental authority, unincorporated organisation, trust, association, or other entity.
Process: To take any action or perform any operation or set of operations that the Services are capable of taking or performing on any data, information or other content, including to collect, receive, input, upload, download, record, reproduce, store, organise, compile, combine, log, catalogue, cross-reference, manage, maintain, copy, adapt, alter, translate, or make other derivative works or improvements, process, retrieve, output, consult, use, perform, display, disseminate, transmit, submit, post, transfer, disclose, or otherwise provide or make available, or block, erase, or destroy.
Processing and Processed have correlative meanings.
Proprietary Integration: An Integration in which the external system or application is developed and owned by the Customer.
Provider: 24/7 Software Australia Pty Ltd (ABN 14 676 670 643) trading as 24/7 Software.
Provider Disabling Device: Any software, hardware, or other technology, device, or means used by Provider or its designee to disable Customer’s or any Authorised User’s access to or use of the Services automatically with the passage of time or under the positive control of Provider or its designee.
Provider Materials: The Service Software, Documentation, and Provider Systems and any and all other information, data, documents, materials, works, and other content, devices, methods, processes, hardware, software, and other technologies and inventions, including any deliverables, technical or functional descriptions, requirements, plans, or reports, that are provided or used by Provider or any Subcontractor in connection with the Services or otherwise comprise or relate to the Services or Provider Systems. For the avoidance of doubt, Provider Materials do not include Customer Data.
Provider Personnel: All individuals involved in the performance of Services as employees, agents, or independent contractors of Provider or any Subcontractor.
Provider Systems: The information technology infrastructure used by or on behalf of Provider in performing the Services, including all computers, software, hardware, databases, electronic systems (including database management systems), and networks, whether operated directly by Provider or through the use of third-party services.
Representatives: With respect to a party, that party’s, and its Affiliates’ employees, officers, directors, and legal advisors.
Service Software: The Provider software application or applications and any third-party or other software, and all new versions, updates, revisions, improvements, and modifications of the foregoing, that Provider provides remote access to and use of as part of the Services.
Third-Party Integration: An Integration in which a third party provides the external system or application to the Customer.
EXHIBIT A - API Rate Limits Overview
24/7 Software API usage is subject to rate limiting. These limits mitigate denial-of-service attacks and abusive actions such as rapidly updating configurations, aggressive polling and concurrency, or excessive API calls.
The service protection limits are high enough that it should be rare for an individual using an API to encounter them during normal usage. However, it is possible if the client application allows for bulk operations. Client application developers should be aware of how service protection API limits are enforced and design the UI to reduce the potential for users to send extremely demanding requests to the server. But they should still expect that service protection API limit errors can occur and be prepared to handle them.
If this limit is exceeded or if CPU or total time limits are exceeded, the app or user may be throttled. API requests made by a throttled user or app will fail or be denied.
Application Rate Limit Categories and Cumulative Rate Limits Provider enforces limits at the individual API endpoint level as requests per minute or request per second depending on the usage and type of the API.
|
Category |
Rate Limit |
Max Records |
|
Authentication/End user |
60 (per min) |
1 record per call |
|
System Setup -GET |
60 (per min) |
100 records per call |
|
System Setup – PUT |
1 (per second) |
1 record per call |
|
Announcements – GET |
60 (per min) |
100 records per call |
|
Announcements – PUT |
1 (per second) |
1 record per call |
|
Documents – GET |
1 (per second) |
1 record per call |
|
Events – GET |
60 (per min) |
100 records per call |
|
Events - PUT |
1 (per second) |
1 record per call |
|
Documents – PUT |
1 (per second) |
1 record per call |
|
Associated Person - GET |
60 (per min) |
100 records per call |
|
Associated Person - PUT |
1 (per second) |
1 record per call |
|
Systems Users - GET |
60 (per min) |
100 records per call |
|
System Users – PUT |
1 (per second) |
1 record per call |
|
IMS – GET |
60 (per min) |
100 records per call |
|
IMS – PUT |
1 (per second) |
1 record per call |
|
CMMS – GET |
100 (per min) |
1000 records per call |
|
CMMS – PUT |
10 (per second) |
1 record per call |
|
Conversations – GET |
100 (per min) |
1000 records per call |
|
Conversations – PUT -SMS |
1 (per second) |
1 record per call |
|
CheckPoint – GET |
100 (per min) |
1000 records per call |
|
CheckPoint – PUT |
1 (per second) |
1 record per call |
|
Lost & Found – GET |
60 (per min) |
100 records per call |
|
Lost & Found – PUT |
1 (per second) |
1 record per call |
|
Tasks – GET |
60 (per min) |
100 records per call |
|
Tasks – PUT |
1 (per second) |
1 record per call |
|
Reports – GET |
1 (per min) |
1 record per call |
|
Reports – PUT |
Not available |
NA |
If an org-wide rate limit is exceeded, an HTTP 429 status code is returned.
Total CPU Time: The amount of CPU time the request takes to process. When total CPU time exceeds applicable service protection limits, calls may be throttled or denied.
Total Time: The total time taken to process a request. When total request time exceeds applicable service protection limits, calls may be throttled or denied.
Retry Operations: When a service protection API limit error occurs, the API will provide an error indicating the duration before any new requests from the user can be processed. Generally, this is either per minute or per second.
Exceeding Quota Limits: If the applicable API request quota is exceeded, the API returns an error code 403 or 429 and a message that the account has exceeded the quota.
Requesting Additional Quota: Customer may request to increase the quota of the API by providing a justified use case and evidence of optimised code. Approval of any increased quota will be at the discretion of the Provider engineering team following review of the documentation.
EXHIBIT B - 24/7 Software API Use Restrictions
By accepting and using the 24/7 Software API, Customer will use the 24/7 Software API solely as authorised in the Agreement and, specifically, will not:
Use the 24/7 Software API for any illegal or unauthorised purpose or that violates any intellectual property right or other right of any person.
Circumvent, reverse engineer, disassemble, decompile, decode, adapt, or otherwise attempt to derive or gain access to any software component of the 24/7 Software API, in whole or in part, or modify any software code or other security mechanism employed by 24/7 Software, including without limitation any authentication technologies.
Transmit any viruses, worms, defects, Trojan horses, time-bombs, malware, spyware, or any other computer code of a destructive or interruptive nature in connection with Customer’s use of the 24/7 Software API.
Attempt to cloak or conceal Customer’s identity or the identity of the Customer Program or Integration when requesting authorisation to use the 24/7 Software API.
Use the 24/7 Software API to create any product or service that is in competition with any product or service of Provider or its Affiliates, or that otherwise replicates or attempts to replace the user experience of the software, systems and services performed and provided by Provider in connection with sporting and entertainment events, convention centres, attractions, and amusement parks for Provider customers.
Combine or integrate the 24/7 Software API with any software, technology, services, or materials not authorised by Provider.
Design or permit the products or services provided by Customer to Provider’s customers independent of the Agreement (the “Customer Program”) or an Integration to disable, override, or otherwise interfere with any Provider-implemented communications to end users, consent screens, user settings, alerts, warning, or the like.
Use the 24/7 Software API in connection with offering or promoting services that are damaging to, disparaging of, or otherwise detrimental to Provider or its Affiliates.
Use the 24/7 Software API for the purpose of aggregating, analysing, extracting, or repurposing any content therein (“Content”), except as otherwise authorised by Provider or a Provider customer.
Use, copy, distribute, or modify the 24/7 Software API in any “service bureau” or “timesharing” business.
Interfere with or disrupt any services offered by Provider.
Create, place, or disseminate any advertisements immediately before or during the presentation of any Content.
Post, email or transmit, or otherwise make available through the Customer Program, Integration, or otherwise, or position any Content around, near, or next to, any content that is inappropriate, defamatory, obscene, pornographic, abusive, hateful, infringing, unlawful, or otherwise offensive.
Edit, add to, delete from, remove hyperlinks to, add hyperlinks to, or otherwise modify the Content or any attribution therein (including by adding additional information).
Restrict or inhibit any other user from using the 24/7 Software API, or violate any requirements, procedures, policies, or regulations of networks connected to the 24/7 Software API.
Modify or delete any author attributions, legal, or other proper notices or proprietary designations or labels of the origin or source of software or other material (including Content).
Consumer Erasure Request: If the Customer Program or Integration involves or otherwise results in Customer obtaining or processing personal information, Customer must provide an email address to which Provider will send deletion or erasure requests relating to personal information (e.g., Australian Privacy Act compliance, etc.).
EXHIBIT C - Data Protection and Privacy Compliance Measures Exhibit
This Exhibit outlines the data protection and privacy practices implemented by 24/7 Software Australia Pty Ltd (trading as 24/7 Software) ("Provider") in connection with the Services. Provider acknowledges the importance of compliance with applicable data protection laws, including the Privacy Act 1988 (Cth) and, where applicable, the General Data Protection Regulation (GDPR).
1. Scope of Compliance: Provider will comply with the requirements of applicable privacy laws in connection with the processing of personal data under the Agreement, including the Privacy Act 1988 (Cth) and the Australian Privacy Principles (APPs).
2. Data Processing Details
2.1 Roles of the Parties: For the purposes of applicable data protection laws that distinguish between controller and processor roles, Customer determines the purposes and means of processing personal data and acts as the data controller. Provider processes personal data on behalf of Customer as a data processor, except where Provider is required to act as a controller under applicable law.
2.2 Categories of Personal Data: Provider processes the following categories of personal data within the scope of its services:
- names
- contact details (including email addresses, phone numbers, and postal addresses)
- user account information
- operational data
- identifiers and user IDs
2.3 Purposes of Processing: Provider processes personal data for the purpose of delivering the Services, including service delivery, system functionality, customer support, communication, analytics, and related operational activities as required under the Agreement.
2.4 Legal Basis for Processing: Provider processes personal data in accordance with applicable privacy laws, including the Australian Privacy Principles (APPs), and where applicable, legal bases recognised under the GDPR, including consent, contract performance, and legitimate interests.
2.5 Confidentiality of Processing: Provider shall ensure that any person it authorises to process personal data (including its employees, agents, and subcontractors) is subject to a duty of confidentiality and does not process personal data except as permitted under the Agreement.
2.6 Data Subject Rights: Provider acknowledges the rights of individuals under applicable privacy laws, including the right to access and correct personal information and to make complaints to the Office of the Australian Information Commissioner (OAIC). Provider will reasonably assist Customer in responding to such requests where required.
2.7 Data Security: Provider will implement and maintain appropriate technical and organisational measures to protect personal data against unauthorised access, disclosure, alteration, or destruction.
Such measures include:
(a) encryption of personal data, where appropriate;
(b) ensuring the ongoing confidentiality, integrity, availability, and resilience of processing systems and services; and
(c) regular testing, assessment, and evaluation of the effectiveness of such measures.
2.8 Cross-Border Data Transfers: Provider shall ensure that any transfer of personal data outside Australia is carried out in accordance with applicable privacy laws and subject to appropriate safeguards, including taking reasonable steps to ensure that the recipient does not breach applicable privacy obligations.
2.9 Breach Notification: Provider agrees to implement practices, procedures, and systems to support compliance with the APPs and to notify Customer of eligible data breaches where required in accordance with the Notifiable Data Breaches scheme under the Privacy Act.
3. Compliance with Australian Privacy Laws
3.1 Scope of Compliance: Provider acknowledges the requirements of the Privacy Act 1988 (Cth) and applicable state laws, including the Information Privacy Act 2009 (Qld), in relation to personal data processed within Australia.
3.2 Individual Rights: Provider will support Customer in facilitating the exercise of rights under applicable privacy laws, including access and correction requests.
3.3 Data Transparency: Provider will maintain clear and accessible privacy practices describing the handling of personal data in connection with the Services.
4. Data Privacy Assurance
4.1 Privacy by Design and Default: Provider incorporates privacy considerations into the design and operation of its Services.
4.2 Data Security Measures: Provider implements technical and organisational measures to safeguard personal data against unauthorised access, disclosure, alteration, and destruction.
4.3 Sub-processors: Provider may engage third-party service providers to support delivery of the Services and will take reasonable steps to ensure such providers are subject to appropriate data protection obligations.
5. Compliance Verification: Provider may conduct internal or external assessments of its data protection practices to support compliance with applicable laws and standards.
6. Updates and Revisions: This Exhibit may be updated from time to time to reflect changes in applicable laws, regulations, or industry practices. Any material updates will be communicated in accordance with the Agreement.
EXHIBIT D - Data Security
Definitions: In addition to any defined terms set forth in the Agreement, with respect to this Exhibit D, the following additional defined terms shall apply:
“Authorised Persons” means Provider, Provider’s subcontractors, and their respective Representatives who have a need to know or otherwise access Customer Data to enable Provider to perform its obligations under the Agreement.
“Security Breach” means any unauthorised or unlawful access to, acquisition of, disclosure of, loss of, or other Processing of Customer Data.
Standard of Care:
(a) Provider acknowledges and agrees that, in the course of its engagement by Customer, Provider may receive or have access to Customer Data. Provider shall comply with the terms and conditions set forth in the Agreement and all applicable Law in its collection, receipt, transmission, storage, disposal, use, disclosure, and other Processing of such Customer Data. Provider shall be responsible for, and remain liable to Customer for, the actions and omissions of all Authorised Persons as if they were Provider’s own actions and omissions.
(b) Customer shall ensure that (i) all Customer Data has been, and will continue to be, collected and used in accordance with the notice, consent, and other requirements of applicable Law and the Agreement; (ii) it has, and will continue to have, the right to transfer Customer Data to Provider for the purpose(s) set forth in the Agreement; and (iii) its instructions to Provider with respect to Customer Data are lawful and will not cause Provider to be in breach of any applicable Law nor create legal or regulatory liability on the part of Provider if such instructions are followed.
(c) As between the parties, Customer and/or any of Customer’s applicable Affiliate(s) is the sole owner of all Customer Data. For clarity, Customer Data is deemed to be Confidential Information of Customer and is not Confidential Information of Provider.
(d) In recognition of the foregoing, Provider agrees that it shall: (i) keep and maintain all Customer Data in strict confidence, using such degree of care as is appropriate to avoid unauthorised access, use, disclosure, or other Processing; and (ii) not, directly or indirectly, disclose Customer Data to any person other than its Authorised Persons without express written consent of Customer.
Information Security:
(a) Provider shall implement and maintain a written information security program that includes administrative, physical, and technical safeguards designed to protect Customer Data and Provider’s facilities, systems, networks, and assets against external and internal threats. All such safeguards will comply with applicable Law and the terms and conditions of the Agreement.
(b) During the term of each Authorised Person’s work for Provider, Provider shall at all times cause such Authorised Persons to abide by Provider’s obligations under the Agreement.
Security Breach Procedures:
In the event of a Security Breach involving Customer Data, Provider shall: (i) provide Customer with the name and contact information for an employee of Provider who shall serve as Customer’s primary information security contact and be available to assist Customer in resolving obligations associated with the Security Breach; (ii) notify Customer without undue delay after becoming aware of the Security Breach; and (iii) provide reasonable cooperation and assistance in connection with any investigation, mitigation, remediation, or notification obligations required under applicable Law, including the Notifiable Data Breaches scheme under the Privacy Act 1988 (Cth).
Return or Destruction of Customer Data:
At any time during the Term at Customer’s request for any reason or upon the termination or expiration of the Agreement, Provider shall, and shall instruct all Authorised Persons to, promptly return to Customer all copies, whether in written, electronic, or other form or media, of Customer Data in its possession or the possession of such Authorised Persons, or securely dispose of all such copies, and certify in writing to Customer that such Customer Data has been returned or disposed of securely, subject to any retained copies permitted under this section.
Notwithstanding the foregoing, Provider may retain copies of Customer Data to the extent required for backup, archival, legal, regulatory, or business continuity purposes, provided that such retained copies remain subject to the confidentiality, security, and data protection obligations set out in the Agreement and are not actively processed except as required for those purposes.
Provider shall comply with all reasonable directions provided by Customer with respect to the return or disposal of Customer Data.
Privacy and Data Protection
Provider and Customer must comply with the Privacy Act 1988 (Cth) and the Australian Privacy Principles (APPs). Provider agrees to implement practices, procedures, and systems to support compliance with the APPs and to notify Customer of eligible data breaches where required in accordance with the Notifiable Data Breaches scheme under the Privacy Act.
Consumer Guarantees
Nothing in the Agreement excludes, restricts or modifies any guarantee, warranty, term or condition, right or remedy implied or imposed by any applicable law which cannot lawfully be excluded or limited. This may include the Australian Consumer Law (ACL) which contains guarantees that protect the purchasers of goods and services in certain circumstances, which include that the Services will be provided with due care and skill and be reasonably fit for their purpose.
Unfair Contract Terms
To the extent that the Agreement or any part of it is found to be unfair within the meaning of the ACL, such term(s) will be severed from the Agreement without affecting the validity or enforceability of the remaining terms.
Spam Act Compliance
Provider and Customer must comply with the Spam Act 2003 (Cth) in relation to the sending of commercial electronic messages and ensure that recipients of such messages have consented to receiving them and that they include a functional unsubscribe facility.
EXHIBIT E
AI Features Terms and Conditions
This Exhibit E forms part of, and is incorporated into, the Agreement between Customer and Provider. By enabling or using any AI or automation functionality, Customer agrees to these terms.
1. Scope of AI and Automation Features
The Services may include AI-powered capabilities designed to enhance analytics, automate workflows, and assist with data-driven decision-making.
Provider may modify, enhance, or discontinue AI or automation features at any time as part of the ongoing development of the Services.
2. Use and Responsibility
Customer acknowledges and agrees that:
- AI-generated outputs are probabilistic and may be inaccurate, incomplete, or biased;
- Customer is solely responsible for reviewing, validating, and confirming any output before relying on it;
- AI features are intended to assist, not replace, professional or human judgment; and
- Customer is responsible for ensuring that its use of AI and automation features complies with all applicable laws, regulations, and internal policies.
- Customer Data may be transmitted to such providers solely for the purpose of delivering the relevant functionality;
- such providers act as sub-processors engaged by Provider; and
- Provider will ensure that appropriate contractual obligations are in place with such providers consistent with applicable data protection laws.
- Customer retains ownership of Customer Data and AI Outputs.
- Provider retains all right, title, and interest in and to the Services, including all AI systems, automation frameworks, models, algorithms, and underlying technology.
- Any feedback, prompt designs, or configuration suggestions provided by Customer may be used by Provider to improve the Services without restriction or compensation.
- AI outputs may reflect limitations in training data and system design;
- Provider does not warrant that outputs will be error-free, complete, or fit for any particular purpose; and
- Customer is responsible for verifying any outputs or decisions derived from the Services.
- process personal information without a lawful basis or required consents under applicable law (including the Privacy Act 1988 (Cth));
- violate any applicable data protection, export control, or intellectual property laws;
- generate, distribute, or facilitate false, misleading, or deceptive content;
- conduct unlawful surveillance, discrimination, or profiling of individuals; or
- interfere with or disrupt the integrity, performance, or security of the Services.
3. Customer Data Usage and Model Training
3.1 Ownership
Customer retains all right, title, and interest in and to Customer Data and any outputs generated from Customer’s lawful use of the AI features (“AI Outputs”).
3.2 Processing and Isolation
Provider processes Customer Data solely to deliver AI insights, analytics, and automation features to Customer. Customer Data and AI Outputs are logically isolated and are not shared with other customers.
3.3 No Cross-Customer Model Training
Provider does not use Customer Data, prompts, or AI Outputs to train or fine-tune models that are used for or accessible by other customers.
Provider may improve its systems using aggregated and anonymised operational metrics (e.g., usage frequency, performance data), which do not include identifiable Customer Data or content.
3.4 Data Retention
Customer Data is retained only for as long as necessary to deliver the Services or as required by applicable law. Customer may request deletion in accordance with the Agreement and applicable privacy obligations.
4. Third-Party AI and Automation Providers
Certain AI or automation functionalities may rely on third-party technologies, including but not limited to OpenAI and AWS.
Customer acknowledges and agrees that:
Provider remains responsible for its obligations under the Agreement and applicable law, including with respect to sub-processors, but is not liable for the independent acts or omissions of third-party providers beyond those obligations.
Provider utilises enterprise (B2B) arrangements with its processors and does not permit the use of Customer Data, prompts, or AI Outputs for cross-customer model training.
5. Intellectual Property
6. Accuracy, Limitations, and Disclaimers
AI and automation features are designed to assist and do not provide definitive outputs or advice.
Customer acknowledges that:
TO THE MAXIMUM EXTENT PERMITTED BY LAW, AI AND AUTOMATION FEATURES ARE PROVIDED “AS IS” AND “AS AVAILABLE,” AND PROVIDER DISCLAIMS ALL WARRANTIES, WHETHER EXPRESS, IMPLIED, STATUTORY, OR OTHERWISE, INCLUDING MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT.
7. Prohibited Uses
Customer must not use AI or automation features to:
8. Order of Precedence
In the event of any inconsistency between this Exhibit E and the Agreement (including other Exhibits), the terms of the Agreement will prevail to the extent of the inconsistency, unless this Exhibit E expressly states otherwise.