Skip to content

Terms & Conditions

Terms & Conditions

1. Definitions. Capitalised terms shall have their meaning as defined or as otherwise set forth in Section 15.1 Services.

2.1 Services 

(a) Subject to and conditioned on Customer’s and its Authorised Users’ acceptance of and compliance with the Agreement, Provider shall provide to Customer and its Authorised Users the services described in the Agreement (collectively, the “Services”), in accordance with the terms of the Agreement. 

(b) If Customer purchases a subscription to the 24/7 Software API as part of the Services: 

(i) Provider will provide the 24/7 Software API via a 24/7 Software API key or password, and Customer may access and use the 24/7 Software API (including any credentials and certificates) solely in connection with the products and services provided by Provider to its customers. 

(ii) Customer will be responsible for all uses of its 24/7 Software API key or password and will notify Provider immediately of any unauthorised use of Provider’s 24/7 Software API key or password. 

(iii) The 24/7 Software API will not include archived databases. 

(iv) In connection with all Integrations, Provider may impose rate limits in accordance with Exhibit A. 

(v) Customer’s use of the 24/7 Software API will be subject to the restrictions set forth in Exhibit B. 

(vi) In connection with any Third-Party Integrations: before the third party begins work on the Third-Party Integration, Customer will ensure that the third party has executed a 24/7 Software Integrator Agreement with Provider. 

2.2 Subcontractors 

Provider may from time to time in its discretion engage third parties to perform Services (each, a “Subcontractor”), provided that such Subcontractors agree in writing to confidentiality terms at least as protective as those in the Agreement and provided that Provider shall remain responsible for its Subcontractors. 

 3. Restrictions 

Neither Customer, nor its employees, contractors or other Persons within Customer’s control (collectively, “Customer Personnel”), shall access or use the Services or Provider Materials except as expressly permitted by the Agreement and, in the case of Third-Party Materials, the applicable third-party license agreement. For purposes of clarity and without limiting the generality of the foregoing, neither Customer nor Customer Personnel shall: 

(a) copy, modify, or create derivative works or improvements of the Services or Provider Materials, except as the Agreement expressly permits; 

(b) rent, lease, lend, sell, sublicense, assign, distribute, publish, transfer, or otherwise make available any Services or Provider Materials to any Person, including on or in connection with the internet or any time-sharing, service bureau, software as a service, cloud, or other technology or service, except as the Agreement expressly permits; 

(c) reverse engineer, disassemble, decompile, decode, adapt or otherwise attempt to derive or gain access to the source code of the Services or Provider Materials, in whole or in part; 

(d) bypass or breach any security device or protection used by the Services or Provider Materials or access or use the Services or Provider Materials other than by an Authorised User through the use of his or her own then valid Access Credentials; 

(e) input, upload, transmit, or otherwise provide to or through the Services or Provider Systems any information or materials that are unlawful or injurious, or contain, transmit, or activate any Harmful Code; 

(f) damage, destroy, disrupt, disable, impair, interfere with, or otherwise impede or harm in any manner the Services, Provider Systems, or Provider’s provision of services to any third party, in whole or in part; 

(g) remove, delete, alter, or obscure any trademarks, Documentation, warranties, or disclaimers, or any copyright, trademark, patent, or other intellectual property or proprietary rights notices from any Services or Provider Materials, including any copy thereof; 

(h) access or use the Services or Provider Materials for purposes of competitive analysis of the Services or Provider Materials, the development, provision, or use of a competing software service or product or any other purpose that is to Provider’s detriment or commercial disadvantage; 

(i) use the Services for any purpose that may (i) menace or harass any person or cause damage or injury to any person or property, (ii) involve the publication of any material that is false, defamatory, harassing, or obscene, (iii) violate privacy rights or promote bigotry, racism, hatred, or harm, (iv) constitute an infringement of intellectual property or other proprietary rights, or (v) otherwise violate applicable laws, ordinances, or regulations; 

(j) send unsolicited text messages, commonly known as spam; 

(k)   violate any applicable federal, state, or local laws or any carrier regulations, Mobile Marketing Association ('MMA') Guidelines (https://www.mmaglobal.com/policies/global-mobile-advertising-guidelines), Twilio’s acceptable use policy and terms of service (including use of SMS for emergency services) (https://www.twilio.com/legal/aup), CWTA code of conduct (http://www.txt.ca/wp-content/uploads/2018/04/Common-Short-Code_Code-of-Conduct.pdf) and guidelines (http://www.txt.ca/wp-content/uploads/2019/02/Canadian-Common-Short-Code-Application-Guidelines-Version-3-7-FINAL.pdf), or CTIA handbook (https://www.wmcglobal.com/storage/us_resources/ctia-short-code-monitoring-handbook-current-Short-Code-Monitoring-Handbook-v1.7.pdf); or

(l)   otherwise access or use the Services or Provider Materials beyond the scope of the authorisation granted under Section 2.1.

  1. Fees; Payment Terms.

4.1   Fees. The Customer shall pay Provider the fees set forth in the Agreement (“Fees”) in accordance with this Section 4. Unless otherwise set forth in the Agreement or otherwise agreed to in writing by Customer and Provider, the Fees will increase annually on the Agreement's anniversary by the greater of 3% or the increase in CPI.

4.2   Taxes. All Fees and other amounts payable by Customer under the Agreement are exclusive of sales, use, and similar taxes. Customer is responsible for all such taxes imposed by any federal, state, or local governmental or regulatory authority on any amounts payable by Customer hereunder, excluding, for the avoidance of doubt, any taxes imposed on Provider’s income.

4.3 Payment. Customer shall pay all Fees within 30 days after the date of the invoice therefor. Customer shall make all payments hereunder in Australian dollars. Customer shall make payments to the address or account specified in the Agreement or such other address or account as Provider may specify in writing from time to time. 

4.4   No Deductions or Setoffs. All amounts payable to Provider under the Agreement shall be paid by Customer to Provider in full without any setoff, recoupment, counterclaim, deduction, debit, or withholding for any reason (other than any deduction or withholding of tax as may be required by applicable Law).

4.5   Data Storage. Included with Customer subscription is Data Storage up to 2 GB. Additional Data Storage may be purchased by Customer for a fee.

  1. Intellectual Property Rights.

5.1   Services and Provider Materials. Except as explicitly set forth herein, all right, title, and interest in and to the Services and Provider Materials, including all Intellectual Property Rights therein, are and will remain with Provider and the respective rights holders in the Third-Party Materials.

5.2   Customer Data. As between Customer and Provider, Customer is and will remain the sole and exclusive owner of all right, title, and interest in and to all Customer Data, including all Intellectual Property Rights relating thereto, subject to Provider’s, its Subcontractor’s, and the Provider Personnel’s use of the data solely to perform the Services.

  1. Confidentiality.

6.1   Confidential Information. In connection with the Agreement, each party (as the “Disclosing Party”) may disclose or make available Confidential Information to the other party (as the “Receiving Party”). Subject to Section 6.2, “Confidential Information” means information in any form or medium (whether oral, written, electronic or other) that the Disclosing Party considers confidential or proprietary, including information consisting of or relating to the Disclosing Party’s technology, trade secrets, know-how, business operations, plans, strategies, customers, and pricing, and information with respect to which the Disclosing Party has contractual or other confidentiality obligations, in each case whether or not marked, designated, or otherwise identified as “confidential.” Without limiting the foregoing: all Provider Materials are the Confidential Information of Provider and the terms and existence of the Agreement are the Confidential Information of each of the parties.

6.2   Exclusions. Confidential Information does not include information that the Receiving Party can demonstrate by written or other documentary records: (a) was rightfully known to the Receiving Party without restriction on use or disclosure prior to such information’s being disclosed or made available to the Receiving Party in connection with the Agreement; (b) was or becomes generally known by the public other than by the Receiving Party’s or any of its Representatives’ noncompliance with the Agreement; (c) was or is received by the Receiving Party on a non-confidential basis from a third party that, to the Receiving Party’s knowledge, was not or is not, at the time of such receipt, under any obligation to maintain its confidentiality; or (d) the Receiving Party can demonstrate by written or other documentary records was or is independently developed by the Receiving Party without reference to or use of any Confidential Information.

6.3   Protection of Confidential Information. As a condition to being provided with any disclosure of or access to Confidential Information, the Receiving Party shall:

(a)   not access or use Confidential Information other than as necessary to exercise its rights or perform its obligations under and in accordance with the Agreement;

(b)   except as may be permitted by and subject to its compliance with Section 6.4, not disclose or permit access to Confidential Information other than to its Representatives who: (i) need to know such Confidential Information for purposes of the Receiving Party’s exercise of its rights or performance of its obligations under and in accordance with the Agreement; (ii) have been informed of the confidential nature of the Confidential Information and the Receiving Party’s obligations under this Section 6.3; and (iii) are bound by written confidentiality and restricted use obligations at least as protective of the Confidential Information as the terms set forth in this Section 6.3;

(c)   safeguard the Confidential Information from unauthosized use, access, or disclosure, using at least the degree of care it uses to protect its sensitive information and in no event less than a reasonable degree of care; and

(d)   ensure its Representatives’ compliance with, and be responsible and liable for any of its Representatives’ non-compliance with, the terms of this Section 6.

6.4   Compelled Disclosures. If the Receiving Party or any of its Representatives is compelled by applicable Law to disclose any Confidential Information then, to the extent permitted by applicable Law, the Receiving Party shall: (a) promptly, and prior to such disclosure, notify the Disclosing Party in writing of such requirement so that the Disclosing Party can seek a protective order or other remedy or waive its rights under Section 6.3; and (b) provide reasonable assistance to the Disclosing Party, at the Disclosing Party’s sole cost and expense, in opposing such disclosure or seeking a protective order or other limitations on disclosure. If the Disclosing Party waives compliance or, after providing the notice and assistance required under this Section 6.4, the Receiving Party remains required by Law to disclose any Confidential Information, the Receiving Party shall disclose only that portion of the Confidential Information that the Receiving Party is legally required to disclose and, on the Disclosing Party’s request, shall use commercially reasonable efforts to obtain assurances from the applicable court or other presiding authority that such Confidential Information will be afforded confidential treatment.

6.5   Disclosures to Social Media Platforms. Notwithstanding anything to the contrary in this Agreement, Provider’s disclosure of information received from, regarding, or relating to (a) Customer, (b) Customer's owners, managers, members, officers, employees, clients, or customers, or (c) this Agreement to WhatsApp, Facebook, any application provided by Meta Platforms, Inc., or any other social media platform or application that Provider currently has a contractual relationship with or that Provider may in the future have a contractual relationship with (collectively, the “Third-Party Social Media Platforms”) as required by Provider’s contractual agreements with the Third-Party Social Media Applications’ providers is not a violation of this Section 6, or any other confidentiality or data security obligations that Provider owes to Customer.

  1. Information Security. Provider will comply with the data security requirements set forth in Exhibit C, which is attached hereto and incorporated herein by reference.
  2. Term and Termination.

8.1   Term. The term of the Agreement commences as of the effective date set forth in the Agreement and shall continue for the time frame set forth in the Agreement, unless superseded or otherwise terminated by mutual written agreement of the parties or pursuant to the termination provisions hereto.

8.2   Renewal Terms. After the initial term of the Agreement, the term of the Agreement will automatically renew for subsequent one-year periods until a party provides at least 30 days written notice prior to the end of the then-current term.

8.3   Termination. In addition to any other express termination right set forth elsewhere in the Agreement:

(a)   either party may terminate the Agreement, effective on written notice to the other party, if the other party breaches the Agreement (including Customer’s failure to pay any amount due under the Agreement), and such breach: (i) is incapable of cure; or (ii) being capable of cure, remains uncured 30 days after the non-breaching party provides the breaching party with written notice of such breach; and

(b)   either party may terminate the Agreement, effective immediately upon written notice to the other party, if the other party:

(i)   becomes insolvent or is generally unable to pay, or fails to pay, its debts as they become due; (ii) files or has filed against it, a petition for voluntary or involuntary bankruptcy or otherwise becomes subject, voluntarily or involuntarily, to any proceeding under any domestic or foreign bankruptcy or insolvency Law; (iii) makes or seeks to make a general assignment for the benefit of its creditors; or (iv) applies for or has appointed a receiver, trustee, custodian, or similar agent appointed by order of any court of competent jurisdiction to take charge of or sell any material portion of its property or business.

8.4   Effect of Expiration or Termination. Upon any expiration or termination of the Agreement, except as expressly otherwise provided in the Agreement:

(a)   all rights, licenses, consents, and authorisations granted by either party to the other hereunder will immediately terminate;

(b)   Provider shall return to Customer, or at Customer’s written request destroy, all documents and tangible materials containing Customer Data or Customer’s Confidential Information;

(c)   Customer shall immediately cease all use of any Services or Provider Materials and promptly return to Provider, or at Provider’s written request destroy, all documents and tangible materials containing any Provider Materials or Provider’s Confidential Information;

(d)  Provider may immediately disable all Customer and Authorised User access to the Services and Provider Materials; and

(e)  if Customer terminates the Agreement pursuant to Section 8.3(a) or Section 8.3(b), Customer will be relieved of any obligation to pay any Fees attributable to the period after the effective date of such termination and Provider will refund to Customer any pre-paid Fees for Services that Provider has not performed as of the effective date of termination.

8.5   Surviving Terms. The provisions set forth in the following sections, and any other right or obligation of the parties in the Agreement that, by its nature, should survive termination or expiration of the Agreement, will survive any expiration or termination of the Agreement: Section 3, Sections 5 through 15.

  1. DISCLAIMER OF WARRANTIES. ALL SERVICES AND PROVIDER MATERIALS ARE PROVIDED “AS IS” AND PROVIDER HEREBY DISCLAIMS ALL WARRANTIES, WHETHER EXPRESS, IMPLIED, STATUTORY, OR OTHER, AND PROVIDER SPECIFICALLY DISCLAIMS ALL IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT, AND ALL WARRANTIES ARISING FROM COURSE OF DEALING, USAGE OR TRADE PRACTICE. WITHOUT LIMITING THE FOREGOING, PROVIDER MAKES NO WARRANTY OF ANY KIND THAT THE SERVICES OR PROVIDER MATERIALS, OR ANY PRODUCTS OR RESULTS OF THE USE THEREOF, WILL MEET CUSTOMER’S OR ANY OTHER PERSON’S REQUIREMENTS, OPERATE WITHOUT INTERRUPTION, ACHIEVE ANY INTENDED RESULT, BE COMPATIBLE OR WORK WITH ANY SOFTWARE, SYSTEM OR OTHER SERVICES, OR BE SECURE, ACCURATE, COMPLETE, FREE OF HARMFUL CODE OR ERROR-FREE. ALL THIRD-PARTY MATERIALS ARE PROVIDED “AS IS” AND ANY REPRESENTATION OR WARRANTY OF OR CONCERNING ANY THIRD-PARTY MATERIALS IS STRICTLY BETWEEN CUSTOMER AND THE THIRD-PARTY OWNER OR DISTRIBUTOR OF THE THIRD-PARTY MATERIALS.
  2. Indemnification.

10.1   Provider Indemnification. Provider shall indemnify, defend, and hold harmless Customer and its officers, directors, employees, successors, and assigns (each, a “Customer Indemnitee”) from and against any and all Losses incurred by Customer arising out of or relating to any claim, suit, action, or proceeding (each, an “Action”) by a third party (other than an Affiliate of Customer) alleging that Customer’s use of the Services (excluding Customer Data and Third-Party Materials) in compliance with the Agreement infringes a third party’s U.S. Intellectual Property Rights. The foregoing obligation does not apply to any Action or Losses to the extent arising out of or relating to any:

(a)   access to or use of the Services or Provider Materials in combination with any hardware, system, software, network, or other materials or service not provided or authorised in writing by Provider;

(b)   modification of the Services or Provider Materials other than: (i) by or on behalf of Provider; or (ii) with Provider’s written approval in accordance with Provider’s written specification;

(c)   failure to timely implement any modifications, upgrades, replacements, or enhancements made available to Customer by or on behalf of Provider; or

(d)   matter described in Section 10.2, whether or not the same results in any Action against or Losses by any Customer Indemnitee.

10.2   Customer Indemnification. Customer shall indemnify, defend, and hold harmless Provider and its officers, directors, employees, agents, successors, and assigns (each, a “Provider Indemnitee”) from and against any and all Losses incurred by such Provider Indemnitee in connection with any Action by a third party (other than an Affiliate of a Provider Indemnitee) alleging that the Customer Data, or any Processing of Customer Data by or on behalf of Provider in accordance with the Agreement, infringes, misappropriates, or constitutes the unauthorised use of a third party’s U.S. Intellectual Property Rights or personal information.

10.3   Indemnification Procedure. Each party shall promptly notify the other party in writing of any Action for which such party believes it is entitled to be indemnified pursuant to Section 10.1 or Section 10.2, as the case may be. The party seeking indemnification (the “Indemnitee”) shall cooperate with the other party (the “Indemnitor”) at the Indemnitor’s sole cost and expense. The Indemnitor shall immediately take control of the defence and investigation of such Action and shall employ counsel of its choice to handle and defend the same, at the Indemnitor’s sole cost and expense. The Indemnitee’s failure to perform any obligations under this Section 10.3 will not relieve the Indemnitor of its obligations under this Section 10 except to the extent that the Indemnitor can demonstrate that it has been materially prejudiced as a result of such failure. The Indemnitee may participate in and observe the proceedings at its own cost and expense with counsel of its own choosing. Neither party, as the Indemnitor, shall enter into any settlement that imposes any liability on the Indemnitee without the prior written consent of the Indemnitee to be affected by the settlement.

10.4   Mitigation. If any of the Services or Provider Materials are, or in Provider’s opinion are likely to be, claimed to infringe, misappropriate, or otherwise violate any third-party Intellectual Property Right, or if Customer’s or any Authorised User’s use of the Services or Provider Materials is enjoined or threatened to be enjoined, Provider may, at its option and sole cost and expense:

(a)   obtain the right for Customer to continue to use the Services and Provider Materials materially as contemplated by the Agreement;

(b)   modify or replace the Services and Provider Materials, in whole or in part, to seek to make the Services and Provider Materials (as so modified or replaced) non-infringing, while providing materially equivalent features and functionality, in which case such modifications or replacements will constitute Services and Provider Materials, as applicable, under the Agreement; or

(c)    If neither (a) nor (b) are commercially reasonable, terminate the Agreement with respect to all or part of the Services and Provider Materials, require Customer to immediately cease any use of the Services and Provider Materials or any specified part or feature thereof, and Provider shall provide a refund to Customer of any pre-paid Fees for Services that Provider has not performed as of the effective date of termination.

THIS SECTION 10 SETS FORTH CUSTOMER’S SOLE REMEDIES AND PROVIDER’S SOLE LIABILITY AND OBLIGATION FOR ANY ACTUAL, THREATENED, OR ALLEGED CLAIMS THAT THE AGREEMENT OR ANY SUBJECT MATTER HEREOF (INCLUDING THE SERVICES AND PROVIDER MATERIALS) INFRINGES, MISAPPROPRIATES, OR OTHERWISE VIOLATES ANY THIRD-PARTY INTELLECTUAL PROPERTY RIGHT.

  1. Limitations of Liability.

11.1   EXCLUSION OF DAMAGES. EXCEPT AS OTHERWISE PROVIDED IN SECTION 11.3, IN NO EVENT WILL EITHER PARTY BE LIABLE UNDER OR IN CONNECTION WITH THE AGREEMENT OR ITS SUBJECT MATTER UNDER ANY LEGAL OR EQUITABLE THEORY, INCLUDING BREACH OF CONTRACT, TORT (INCLUDING NEGLIGENCE), STRICT LIABILITY, AND OTHERWISE, FOR ANY: (a) LOSS OF PRODUCTION, USE, BUSINESS, REVENUE, OR PROFIT; OR (b) IMPAIRMENT, INABILITY TO USE OR LOSS, INTERRUPTION OR DELAY OF THE SERVICES CONSEQUENTIAL, INCIDENTAL, INDIRECT, EXEMPLARY, SPECIAL, ENHANCED, OR PUNITIVE DAMAGES, REGARDLESS OF WHETHER SUCH PERSONS WERE ADVISED OF THE POSSIBILITY OF SUCH LOSSES OR DAMAGES OR SUCH LOSSES OR DAMAGES WERE OTHERWISE FORESEEABLE, AND NOTWITHSTANDING THE FAILURE OF ANY AGREED OR OTHER REMEDY OF ITS ESSENTIAL PURPOSE.

11.2   CAP ON MONETARY LIABILITY. EXCEPT AS OTHERWISE PROVIDED IN SECTION 11.3, IN NO EVENT WILL THE AGGREGATE LIABILITY OF PROVIDER AND ITS LICENSORS, SERVICE PROVIDERS, AND SUPPLIERS UNDER OR IN CONNECTION WITH THE AGREEMENT OR ITS SUBJECT MATTER, UNDER ANY LEGAL OR EQUITABLE THEORY, INCLUDING BREACH OF CONTRACT, TORT (INCLUDING NEGLIGENCE), STRICT LIABILITY, AND OTHERWISE, EXCEED THE TOTAL AMOUNT PAID BY CUSTOMER DURING THE PRIOR 12 MONTHS. THE FOREGOING LIMITATION APPLIES NOTWITHSTANDING THE FAILURE OF ANY AGREED OR OTHER REMEDY OF ITS ESSENTIAL PURPOSE.

11.3   Exceptions. The exclusions and limitations in Section 11.1 and Section 11.2 do not apply to a party’s obligations under Section 6 (Confidentiality), Section 10 (Indemnification), or liability for party’s gross negligence or wilful misconduct.

  1. Force Majeure. Any delay in the performance of any duties or obligations of either party (except the payment of money owed) will not be considered a breach of the Agreement if such delay is caused by a labour dispute, shortage of materials, fire, earthquake, flood, or any other event beyond the control of such party, including downtime caused by a third-party hosting provider, provided that such party uses reasonable efforts, under the circumstances, to notify the other party of the circumstances causing the delay and to resume performance as soon as possible.
  2. Insurance. Provider will maintain the following (a) General Liability Insurance of One Million Dollars ($1,000,000) per occurrence and Two Million Dollars ($2,000,000) in the aggregate; (ii) Automobile Liability Insurance in an amount of One Million Dollars ($1,000,000) per occurrence combined single limit; and (iii) Technology Errors and Omissions Insurance in an amount of One Million Dollars ($1,000,000) per claim and Two Million Dollars ($2,000,000) in the aggregate.
  3. Miscellaneous.

14.1   Relationship of the Parties. The relationship between the parties is that of independent contractors. Nothing contained in the Agreement shall be construed as creating any agency, partnership, joint venture, or other form of joint enterprise, employment, or fiduciary relationship between the parties, and neither party shall have authority to contract for or bind the other party in any manner whatsoever.

14.2   Notices. All notices, requests, consents, claims, demands, waivers, and other communications under the Agreement have binding legal effect only if in writing and addressed to a party as set forth in the Agreement (e.g., on the cover page), or to such other address or such other person that such party may designate from time to time in accordance with this Section 14.2. Notices sent in accordance with this Section 14.2 will be deemed effectively given: (a) when received, if delivered by hand, with signed confirmation of receipt; (b) when received, if sent by a nationally recognized overnight courier, signature required; (c) when sent, if by facsimile or e-mail, if sent during the addressee’s normal business hours, and on the next business day, if sent after the addressee’s normal business hours; and (d) on the 3rd day after the date mailed by certified or registered mail, return receipt requested, postage prepaid.

14.3   Headings. The headings in the Agreement are for reference only and do not affect the interpretation of the Agreement.

14.4   Entire Agreement. The Agreement constitutes the sole and entire agreement of the parties with respect to the subject matter of the Agreement and supersedes all prior and contemporaneous understandings, agreements, representations, and warranties, both written and oral, with respect to such subject matter. In the event of any inconsistency between the statements made in the body of the Agreement, the related exhibits, schedules, attachments, and appendices and these Terms and Conditions, the following order of precedence governs: (a) first, the Agreement, excluding its exhibits, schedules, attachments, and appendices; (b) second, the exhibits, schedules, attachments, and appendices to the Agreement; and (c) third, any other documents incorporated into the body of the Agreement by reference, including these Terms and Conditions.

14.5   Assignment. Neither party shall assign or otherwise transfer the Agreement without the other party’s prior written consent; provided that either party may assign the Agreement in connection with a merger, or sale of all or substantially all of its assets, provided that the assignee agrees in writing to be bound by the terms of the Agreement. Any assignment in contravention of this Section 14.8 shall be null and void.

14.6   No Third-party Beneficiaries. The Agreement is for the sole benefit of the parties hereto and their respective successors and permitted assigns and nothing herein, express or implied, is intended to or shall confer upon any other Person any legal or equitable right, benefit, or remedy of any nature whatsoever under or by reason of the Agreement.

14.7   Amendment and Modification; Waiver. No amendment to or modification of the Agreement is effective unless it is in writing, identified as an amendment to the Agreement, and signed by each party. No waiver by any party of any of the provisions hereof shall be effective unless explicitly set forth in writing and signed by the party so waiving.

14.8   Severability. If any term or provision of the Agreement is invalid, illegal ,or unenforceable in any jurisdiction, such invalidity, illegality, or unenforceability shall not affect any other term or provision of the Agreement or invalidate or render unenforceable such term or provision in any other jurisdiction. Upon such determination that any term or other provision is invalid, illegal, or unenforceable, the parties hereto shall negotiate in good faith to modify the Agreement so as to effect the original intent of the parties as closely as possible in a mutually acceptable manner in order that the transactions contemplated hereby be consummated as originally contemplated to the greatest extent possible.

14.9   Governing Law; Submission to Jurisdiction. The Agreement is governed by and construed in accordance with the internal laws of the State of Delaware without giving effect to any choice or conflict of law provision.

14.10   Waiver of Jury Trial. Each party irrevocably and unconditionally waives any right it may have to a trial by jury in respect of any legal action arising out of or relating to the Agreement or the transactions contemplated hereby.

14.11   Equitable Relief. Each party acknowledges and agrees that a breach or threatened breach by such party of any of its obligations under Section 6 or, in the case of Customer, Section 3, would cause the other party irreparable harm for which monetary damages would not be an adequate remedy and agrees that, in the event of such breach or threatened breach, the other party is entitled to seek equitable relief, including a restraining order, an injunction, specific performance, and any other relief that may be available from any court, without any requirement to post a bond or other security, or to prove actual damages or that monetary damages are not an adequate remedy. Such remedies are not exclusive and are in addition to all other remedies that may be available at law, in equity or otherwise.

14.12   Counterparts. The Agreement may be executed in counterparts, each of which is deemed an original, but all of which together are deemed to be one and the same agreement. A signed copy of the Agreement delivered by facsimile, e-mail, or other means of electronic transmission is deemed to have the same legal effect as delivery of an original signed copy of the Agreement.

14.13   Not Construed Against Drafter. The language of the Agreement shall not be interpreted in favor of or against any Party as the drafter of the Agreement.

  1. Definitions.

24/7 Software API” means optional application programming interfaces provided by Provider under this Agreement.

Access Credentials” means any user name, identification number, password, license, or security key, security token, PIN or other security code, method, technology, or device used, alone or in combination, to verify an individual’s identity and authorisation to access and use the Services.

Affiliate” means an entity that now or hereafter controls, is controlled by or is under common control with a specified entity, where “control” means beneficial ownership, directly or indirectly, of more than 50% of the outstanding shares or other ownership interest (representing the right to vote for the election of directors or other managing authority or the right to make the decisions for such entity, as applicable) of an entity. Such entity shall be deemed an Affiliate only so long as such control exists.

Agreement” means the agreement entered into between Customer and Provider for the provision of the Services. All references to the Agreement are meant to include the Agreement and these Terms and Conditions unless the reference is made specifically to the body of the Agreement (which reference would be intended to exclude these Terms and Conditions). 

Authorised User” means each of the individuals authorised to use the Services pursuant to the Agreement.

CPI” means the Consumer Price Index presently designated by the Australian Bureau of Statistics (ABS)

Customer Data” means information, data, and other content, in any form or medium, that is collected, downloaded, or otherwise received, directly or indirectly from Customer or an Authorised User by or through the Services or that incorporates or is derived from the Processing of such information, data, or content by or through the Service.

Documentation” means any manuals, instructions, or other documents or materials that Provider provides or makes available to Customer in any form or medium and which describe the functionality, components, features, or requirements of the Services or Provider Materials, including any aspect of the installation, configuration, integration, operation, use, support, or maintenance thereof.

Harmful Code” means any software, hardware, or other technology, device or means, including any virus, worm, malware, or other malicious computer code, the purpose or effect of which is to (a) permit unauthorised access to, or to destroy, disrupt, disable, distort, or otherwise harm or impede in any manner any (i) computer, software, firmware, hardware, system, or network or (ii) any application or function of any of the foregoing or the security, integrity, confidentiality, or use of any data Processed thereby, or (b) prevent Customer or any Authorised User from accessing or using the Services or Provider Systems as intended by the Agreement. Harmful Code does not include any Provider Disabling Device.

Integration” means using the 24/7 Software API to connect (a) an external system or application to (b) a system or application that the Provider provides to the Customer. “Integrations” include Proprietary Integrations and Third-Party Integrations.

Intellectual Property Rights” means any and all registered and unregistered rights granted, applied for or otherwise now or hereafter in existence under or related to any patent, copyright, trademark, trade secret, database protection, or other intellectual property rights laws, and all similar or equivalent rights or forms of protection, in any part of the world.

Lawmeans any statute, law, ordinance, regulation, rule, code, order, constitution, treaty, common law, judgment, decree, or other requirements of any Australian federal, state (including Queensland), local, or foreign government or political subdivision thereof, or any arbitrator, court, or tribunal of competent jurisdiction. 

Losses” means any and all losses, damages, liabilities, deficiencies, claims, actions, judgments, settlements, interest, awards, penalties, fines, costs, or expenses of whatever kind, including reasonable legal fees and the costs of enforcing any right to indemnification hereunder and the cost of pursuing any insurance providers.

Person” means an individual, corporation, partnership, joint venture, limited liability entity, governmental authority, unincorporated organisation, trust, association, or other entity.

Process” means to take any action or perform any operation or set of operations that the Services are capable of taking or performing on any data, information or other content, including to collect, receive, input, upload, download, record, reproduce, store, organise, compile, combine, log, catalogue, cross-reference, manage, maintain, copy, adapt, alter, translate, or make other derivative works or improvements, process, retrieve, output, consult, use, perform, display, disseminate, transmit, submit, post, transfer, disclose, or otherwise provide or make available, or block, erase, or destroy.

Processing” and “Processed” have correlative meanings.

Proprietary Integration” means an Integration in which the external system or application is developed and owned by the Customer.

Provider” means 24/7 Software Pty Ltd. 

Provider Disabling Device” means any software, hardware, or other technology, device, or means used by Provider or its designee to disable Customer’s or any Authorised User’s access to or use of the Services automatically with the passage of time or under the positive control of Provider or its designee.

Provider Materials” means the Service Software, Documentation, and Provider Systems and any and all other information, data, documents, materials, works, and other content, devices, methods, processes, hardware, software, and other technologies and inventions, including any deliverables, technical or functional descriptions, requirements, plans, or reports, that are provided or used by Provider or any Subcontractor in connection with the Services or otherwise comprise or relate to the Services or Provider Systems. For the avoidance of doubt, Provider Materials do not include Customer Data.

Provider Personnel” means all individuals involved in the performance of Services as employees, agents, or independent contractors of Provider or any Subcontractor.

Provider Systems” means the information technology infrastructure used by or on behalf of Provider in performing the Services, including all computers, software, hardware, databases, electronic systems (including database management systems), and networks, whether operated directly by Provider or through the use of third-party services.

Representatives” means, with respect to a party, that party’s, and its Affiliates’ employees, officers, directors, and legal advisors.

Service Software” means the Provider software application or applications and any third-party or other software, and all new versions, updates, revisions, improvements, and modifications of the foregoing, that Provider provides remote access to and use of as part of the Services.

Third-Party Integration” means an Integration in which a third party provides the external system or application to the Customer.

 

EXHIBIT A

API Rate Limits Overview

24/7 Software API usage is subject to rate limiting. These limits mitigate denial-of-service attacks and abusive actions such as rapidly updating configurations, aggressive polling and concurrency, or excessive API calls.

The service protection limits are high enough that it should be rare for an individual using an API to encounter them during normal usage. However, it is possible if the client application allows for bulk operations. Client application developers should be aware of how service protection API limits are enforced and design the UI to reduce the potential for users to send extremely demanding requests to the server. But they should still expect that service protection API limit errors can occur and be prepared to handle them.

If this limit is exceeded or if CPU or total time limits are exceeded, the app or user may be throttled. API requests made by a throttled user or app will fail or be denied.

Application Rate Limit Categories and Cumulative Rate Limits
Provider enforces limits at the individual API endpoint level as requests per minute or request per second depending on the usage and type of the API.

Category

Rate Limits (min/second)

Max Records

Authentication/End user

60 (per min)

1 record per call

System Setup -GET

60 (per min)

100 records per call

System Setup – PUT

1 (per second)

1 record per call

Announcements – GET

60 (per min)

100 records per call

Announcements – PUT

1 (per second)

1 record per call

Documents – GET

1 (per second)

1 record per call

Events – GET

60 (per min)

100 records per call

Events - PUT

1 (per second)

1 record per call

Documents – PUT

1 (per second)

1 record per call

Associated Person - GET

60 (per min)

100 records per call

Associated Person - PUT

1 (per second)

1 record per call

Systems Users - GET

60 (per min)

100 records per call

System Users – PUT

1 (per second)

1 record per call

IMS – GET

60 (per min)

100 records per call

IMS – PUT

1 (per second)

1 record per call

CMMS – GET

100 (per min)

1000 records per call

CMMS – PUT

10 (per second)

1 record per call

Conversations – GET

100 (per min)

1000 records per call

Conversations – PUT -SMS

1 (per second)

1 record per call

Conversations – PUT -SMS

Not Available

NA

CheckPoint – GET

100 (per min)

1000 records per call

CheckPoint – PUT

1 (per second)

1 record per call

Lost & Found – GET

60 (per min)

100 records per call

Lost & Found – PUT

1 (per second)

1 record per call

Tasks – GET

60 (per min)

100 records per call

Tasks – PUT

1 (per second)

1 record per call

Reports – GET

1 (per min)

1 record per call

Reports – PUT

Not available

NA

If an org-wide rate limit is exceeded, an HTTP 429 status code is returned.

Total CPU Time
The amount of CPU time the request takes to process. When total CPU time reaches the category limit above, calls may be throttled or denied.

Total Time
The length of time the request takes to process. When total time reaches the category limit above, calls may be throttled or denied.

Retry Operations
When a service protection API limit error occurs, the API will provide an error indicating the duration before any new requests from the user can be processed. Generally, this is either per minute or per second.

Exceeding Quota Limits
If the quota of requesting a 24/7 Software API is exceeded, the API returns an error code 403 or 429 and a message that the account has exceeded the quota.

Requesting Additional Quota
Customer can only request to increase the quota of the API by providing a justified use case and evidence of optimized code. Please note that the approval of increased quota will be the decision of the Provider engineering team upon review of the documentation.

EXHIBIT B

24/7 Software API Use Restrictions

By accepting and using the 24/7 Software API, Customer will use the 24/7 Software API solely as authorised in the Agreement and, specifically, will not:

  1. Use the 24/7 Software API for any illegal or unauthorized purpose or that violates any intellectual property right or other right of any person.
  2. Circumvent, reverse engineer, disassemble, decompile, decode, adapt, or otherwise attempt to derive or gain access to any software component of the 24/7 Software API, in whole or in part, or modify any software code or other security mechanism employed by 24/7 Software, including without limitation any authentication technologies
  3. Transmit any viruses, worms, defects, Trojan horses, time-bombs, malware, spyware, or any other computer code of a destructive or interruptive nature in connection with Customer’s use of the 24/7 Software API.
  4. Attempt to cloak or conceal Customer’s identity or the identity of the Customer Program or Integration when requesting authorisation to use the 24/7 Software API.
  5. Use the 24/7 Software API to create any product or service that is in competition with any product or service of Provider or its affiliates, or that otherwise replicates or attempts to replace the user experience of the software, systems and services performed and provided by Provider in connection with sporting and entertainment events, convention centres, attractions, and amusement parks for Provider customers.
  6. Combine or integrate the 24/7 Software API with any software, technology, services, or materials not authorised by Provider.
  7. Design or permit the products or services provided by Customer to Provider’s customers independent of the Agreement (the “Customer Program”) or an Integration to disable, override, or otherwise interfere with any Provider-implemented communications to end users, consent screens, user settings, alerts, warning, or the like.
  8. Use the 24/7 Software API in connection with offering or promoting services that are damaging to, disparaging of, or otherwise detrimental to Provider or its affiliates.
  9. Use the 24/7 Software API for the purpose of aggregating, analysing, extracting, or repurposing any content therein (“Content”), except as otherwise authorised by Provider or a Provider customer.
  10. Use, copy, distribute, or modify the 24/7 Software API in any “service bureau” or “timesharing” business.
  11. Interfere with or disrupt any services offered by Provider.
  12. Create, place, or disseminate any advertisements immediately before or during the presentation of any Content.
  13. Post, email or transmit, or otherwise make available through the Customer Program, Integration, or otherwise, or position any Content around, near, or next to, any content that is inappropriate, defamatory, obscene, pornographic, abusive, hateful, infringing, unlawful, or otherwise offensive.
  14. Edit, add to, delete from, remove hyperlinks to, add hyperlinks to, or otherwise modify the Content or any attribution therein (including by adding additional information).
  15. Restrict or inhibit any other user from using the 24/7 Software API, or violate any requirements, procedures, policies, or regulations of networks connected to the 24/7 Software API.
  16. Modify or delete any author attributions, legal, or other proper notices or proprietary designations or labels of the origin or source of software or other material (including Content).
  17. Consumer Erasure Request: If the Company Program or Integration involves or otherwise results in Customer obtaining or processing personal information, Customer must provide an email address to which Provider will send user delete from database requests (e.g., Australian Privacy Act, etc.).

 

EXHIBIT C

Data Protection and Privacy Compliance Measures Exhibit

1. Introduction 

This exhibit outlines the data privacy compliance practices implemented by 24/7 Software ("Provider") to ensure the protection of personal data collected, processed, and stored within the scope of our services. Provider acknowledges the importance of compliance with data protection laws and regulations, including but not limited to the Australian Privacy Act 1988 (Cth) and the General Data Protection Regulation (GDPR). 

2. Compliance with Australian Privacy Act 

2.1 Scope of Compliance: Provider commits to comply with the requirements of the Australian Privacy Act 1988 (Cth) applicable within Australia. This includes adherence to principles such as lawfulness, fairness, and transparency in the processing of personal data. 

2.2 Data Processing Details: 

2.2.1 Identity of the Data Controller and Processor: Provider shall clearly identify itself as the data controller or processor, as applicable, in any data processing activities conducted within the scope of its services. The data controller determines the purposes and means of processing personal data, while the data processor processes personal data on behalf of the data controller. 

2.2.2 Categories of Personal Data: Provider processes the following categories of personal data within the scope of its services: 

  •  Names,
  • Contact details (including email addresses, phone numbers, and postal addresses) 

2.2.3 Purposes of Processing: Provider processes personal data for the following purposes: 

  • Services delivery 
  • Customer support 
  • Communication 
  • Analytics 
  • Any other legitimate purposes identified by the data controller 

2.2.4 Legal Basis for Processing: Provider processes personal data based on the following legal bases as defined under Australian Privacy Principles (APPs):  

  • Consent 
  • Contract performance 
  • Legitimate interests pursued by the data controller 

2.2.5 Confidentiality of Processing: Provider shall ensure that any person it authorises to process the Personal Data (including Provider's staff, agents, and subcontractors) (an "Authorised Person") shall be subject to a strict duty of confidentiality (whether a contractual duty or a statutory duty) and shall not permit any person to process the Personal Data who is not under such a duty of confidentiality. 

2.3 Data Subject Rights: Provider acknowledges the rights of individuals under the Australian Privacy Act, including but not limited to: 

  • The right to access their personal data 
  • The right to correct inaccuracies in their personal data 
  • The right to withdraw consent to processing where consent is the legal basis 
  • The right to complain to the Office of the Australian Information Commissioner (OAIC) if they believe their privacy rights have been violated. 

2.4 Data Security: Provider commits to implementing appropriate technical and organisational measures to ensure a level of security appropriate to the risk, including but not limited to: 

  • Encryption of personal data 
  • Ensuring the ongoing confidentiality, integrity, availability, and resilience of processing systems and services Regular testing, assessment, and evaluation of the effectiveness of technical and organisational measures for ensuring the security of processing 

2.5 Cross-Border Data Transfers: Provider shall ensure that any transfer of personal data to a country outside Australia will be protected by appropriate safeguards, such as the use of standard contractual clauses approved by the OAIC, to ensure the protection of personal data. 

2.6 Breach Notification: In the event of a data breach, Provider shall notify the Customer without undue delay and take all reasonable steps to mitigate the effects and minimise any damage resulting from the breach.  

  1. Compliance with Australian Privacy Laws

3.1. Scope of Compliance: Provider acknowledges the requirements of the Australian Privacy Act 1988 (Cth) and applicable state laws, including Queensland's Information Privacy Act 2009, regarding personal data processed within Australia. This includes provisions related to individual rights, data transparency, and the obligation to maintain reasonable security measures. 

3.2. Individual Rights: Provider facilitates the exercise of rights established under the Australian Privacy Act 1988 (Cth), including the rights to access personal information, request correction of personal information, and make a complaint about the handling of personal information. 

 3.3. Data Transparency: Provider provides clear and easily accessible privacy notices to individuals, outlining the categories of personal information collected, the purposes of processing, and the rights available under the Australian Privacy Act 1988 (Cth). 

 4. Data Privacy Assurance

4.1. Privacy by Design and Default: Provider incorporates privacy principles into the design and operation of its services, ensuring that data protection considerations are integrated from the outset. 

 4.2. Data Security Measures: Provider implements robust technical and organizational measures to safeguard personal data against unauthorized access, disclosure, alteration, and destruction. 

 4.3. Data Processing Agreements: Provider enters into data processing agreements with customers and third-party service providers to ensure compliance with data protection requirements and obligations under Australian law. 

 5. Compliance Verification

Provider conducts regular assessments and audits of its data privacy practices to verify compliance with the Australian Privacy Act 1988 (Cth), GDPR, and other applicable data protection laws and regulations. This includes internal audits, third-party assessments, and certifications where appropriate. 

         6. Updates and Revisions

This exhibit will be periodically reviewed and updated to reflect changes in data privacy laws, regulations, and industry best practices. Any updates will be communicated to customers in accordance with the terms of our agreement. 

 

EXHIBIT D 

Data Security 

Definitions: In addition to any defined terms set forth in the Agreement, with respect to this Exhibit C, the following additional defined terms shall apply: 

 “Authorised Persons” means Provider, Provider’s subcontractors, and their respective Representatives who have a need to know or otherwise access Customer Data to enable Provider to perform its obligations under the Agreement. 

“Security Breach” means: any unauthorized or unlawful access to, acquisition of, or other Processing of Customer Data. 

Standard of Care: 

(a) Provider acknowledges and agrees that, in the course of its engagement by Customer, Provider may receive or have access to Customer Data. Provider shall comply with the terms and conditions set forth in the Agreement and all applicable Law in its collection, receipt, transmission, storage, disposal, use, disclosure, and other Processing of such Customer Data. Provider shall be responsible for, and remain liable to Customer for, the actions and omissions of all Authorised Persons as if they were Provider’s own actions and omissions. 

 (b) Customer shall ensure that (i) all Customer Data has been, and will continue to be, collected and used in accordance with the notice, consent, and other requirements of applicable Law and the Agreement; (ii) it has, and will continue to have, the right to transfer Customer Data to Provider for the purpose(s) set forth in the Agreement; and (iii) its instructions to Provider with respect to Customer Data are lawful and will not cause Provider to be in breach of any applicable Law nor create legal or regulatory liability on the part of Provider if such instructions are followed. 

 (c) As between the parties, Customer and/or any of Customer’s applicable Affiliate(s) is the sole owner of all Customer Data. For clarity, Customer Data is deemed to be Confidential Information of Customer and is not Confidential Information of Provider. 

 (d) In recognition of the foregoing, Provider agrees that it shall: (i) keep and maintain all Customer Data in strict confidence, using such degree of care as is appropriate to avoid unauthorized access, use, disclosure, or other Processing; and (ii) not, directly or indirectly, disclose Customer Data to any person other than its Authorised Persons without express written consent of Customer. 

 Information Security: 

(a) Provider shall implement and maintain a written information security program that includes administrative, physical, and technical safeguards designed to protect Customer Data and Provider’s facilities, systems, networks, and assets against external and internal threats. All such safeguards will comply with applicable Law and the terms and conditions of the Agreement. 

 (b) During the term of each Authorised Person’s work for Provider, Provider shall at all times cause such Authorised Persons to abide by Provider’s obligations under the Agreement. 

 Security Breach Procedures: 

In the event of a Security Breach caused by Provider’s breach of its obligations in the Agreement, Provider shall: (i) provide Customer with the name and contact information for an employee of Provider who shall serve as Customer’s primary information security contact and shall be available to assist Customer as a contact in resolving obligations associated with a Security Breach; and (ii) notify Customer of the Security Breach without undue delay. 

 Return or Destruction of Customer Data: 

At any time during the Term at Customer’s request for any reason or upon the termination or expiration of the Agreement, Provider shall, and shall instruct all Authorised Persons to, promptly return to Customer all copies, whether in written, electronic, or other form or media, of Customer Data in its possession or the possession of such Authorised Persons, or securely dispose of all such copies, and certify in writing to Customer that such Customer Data has been returned to Customer or disposed of securely. Provider shall comply with all reasonable directions provided by Customer with respect to the return or disposal of Customer Data.