Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 28

INDEX PAGE

A. INTRODUCTION OF THE
PARTIES...........................................................................................
B. AGREEMENT DEFINITIONS....................................................................................................
1. Program Documentation
2. Service Specifications
3. Third Party Content
4. Users
5. Safe data storage Software
6. Your Content
C. RIGHT TO ACCESS AND USE..................................................................................................
D. USE OF THE SERVICES...........................................................................................................
E. OWNERSHIP RIGHTS AND RESTRICTIONS..............................................................................
F. NON-DISCLOSURE.................................................................................................................
G. PROTECTION OF YOUR CONTENT..........................................................................................
H. PAYMENT AND PAYMENT TERMS.........................................................................................
1. Duties & Taxes
I. REPRESENTATIONS AND WARRANTIES.................................................................................
1. Good Title
2. No Disability
3. Litigation
4. Consents / Permissions
5. Compliance with applicable Laws
6. Validity
7. Causes
8. Prohibition
J. CONTENT AND DATA PROTECTION.......................................................................................
K. THIRD-PARTY CONTENT, SERVICES AND WEB
SITES...............................................................
L. SERVICE MONITORING, ANALYSES AND SAFE DATA STORAGE SOFTWARE............................
M. EXPORT................................................................................................................................
N. TERM AND TERMINATION....................................................................................................
O. CONSEQUENCES OF TERMINATION.......................................................................................
P. EVENT OF FORCE MAJEURE...................................................................................................
Q. INDEMNIFICATION................................................................................................................
R. CONFIDENTIALITY.................................................................................................................
S. GOVERNING LAW AND JURISDICTION...................................................................................
T. MODIFICATION AND WAIVER...............................................................................................
U. AMENDMENT.......................................................................................................................
V. NOTICE................................................................................................................................
W. MISCELLANEOUS..................................................................................................................
.
1. NOTICES
2. ASSIGNMENT
3. RELATIONSSHIP OF THE PARTIES
4. SEVERABILITY

X. PRICE & PRODUCT TERMS.....................................................................................................


1. SAFE BACK UP..........................................................................................................
a. Business Backup
b. Encryption
c. Data Retention
d. Backup Notifications
e. The Backup Modules
f. Faster Backups
g. Multiple Machine Backups
h. Backup Type
i. Free Seeding
2. SAFE C2C..................................................................................................................
3. SAFE IMAGE.............................................................................................................
a. Image Backup
b. Restore
c. Head Start Restore
d. Virtual Boot
e. Intelligent FTPTM
f. Image Manager
g. Recovery Environment
4. SAFE SYNC...............................................................................................................
a. White Labelled
b. Permissions and Security
c. Cross-Platform Functionality
d. Data Loss Prevention
e. Office Integration
SOFTWARE SERVICE AGREEMENT

This Agreement is For Customer relationship management (CRM) and ENTERPRISE


RESOURCE PLANNING (ERP) software services on cloud Storage Basis (hereinafter referred
to, in this “document” as Agreement") is being entered into on 27 THFEB, 2024 at Mumbai,
Maharashtra, INDIA.

A) INTRODUCTION OF THE PARTIES.(BY AND BETWEEN)

ASAP TECHNOLOGY SOLUTION SERVICES, a company formed and existing under the laws of India,
and having its registered OFFICE NO.507,THE LAXMI MALL,LAXMI INDUSTRIAL ESTATE,NEW LINK
ROAD,ANDHERIWEST,MUMBAI-400053.. (Here in after referred to as "The Client" which expression
shall successors-in interest and permitted assigns) of the ONE PART.

CLIMB GLOBAL SOLUTIONS LTD, a company duly incorporated and existing under the laws UNITED
KINGDOM having its registered office at 2 PRIGG MEADOW, ASHBURTON, NEWTON ABBOT, DEVON,
TQ13 7DF, UNITED KINGDOM (hereinafter referred to as, The Vendor: which expression shall, unless
repugnant to the context or meaning there of: be deemed to mean and include its successors-in-
interest and permitted assigns) of: The SECOND PART.

The Client and The Vendor shall hereinafter be collectively referred to as "The "Parties" and
individually as the "party".

B) AGREEMENT DEFINITIONS:

The Client is, inter alia, engaged in the business of software development and Support Android and
IOS application development, Internet of Things (IoT), AI-ML, AR-VR, Voice assistants and Voice
Skills, DevOps & Cloud computing services For Customer relationship management (CRM) and
ENTERPRISE RESOURCE PLANNING (ERP).

The Vendor is, inter alia, engaged in a range of cloud data backup and storage services, as well as
data recovery software, DevOps & Cloud computing services for Customer relationship management
(CRM) and ENTERPRISE RESOURCE PLANNING (ERP).

The Client, being desirous of engaging The Vendor; Services (defined hereinafter) for Software &
cloud Services, approached The Vendor, and both the parties have agreed that the Vendor will
render to the Client these Services for such sufficient mutually agreed consideration on the Terms
and Conditions contained herein.
1. “Program Documentation” refers to the user manuals, help windows, readme files for the Services
and any safe Data Storage Software.

2. “Service Specifications” means the following documents, as applicable to the Services under Your
order: (a) the Cloud Hosting and Delivery Policies, the Program Documentation, the Safe data
storage service descriptions, and the Data Processing Agreement, (b) Safe data storage’s privacy
policy, and (c) any other Safe data storage documents that are referenced in or incorporated into
Your order. The following do not apply to any non-Cloud Safe data storage service offerings acquired
in Your order, such as professional services: The Cloud Hosting and Delivery Policies, Program
Documentation, and the Data Processing Agreement. The following do not apply to any Safe data
storage Software that is provided by Safe data storage as part of the Services and governed by the
terms of this Agreement: The Cloud Hosting and Delivery Policies, Safe data storage service
descriptions, and the Data Processing Agreement.

3. “Third Party Content” means all software, data, text, images, audio, video, photographs and other
content and material, in any format, that are obtained or derived from third party sources outside of
Safe data storage that You may access through, within, or in conjunction with Your use of, the
Services. Examples of Third-Party Content include data feeds from social network services, RSS feeds
from blog posts, Safe data storage data marketplaces and libraries, dictionaries, and marketing data.

4. “Users” means those employees, contractors, and end users, as applicable, authorized by You or
on Your behalf to use the Services in accordance with this Agreement and Your order. For Services
that are specifically designed to allow Your clients, agents, customers, suppliers or other third parties
to access the Cloud Services to interact with You, such third parties will be considered “Users”
subject to the terms of this Agreement and Your order.

5.. “Safe data storage Software” means any software agent, application or tool that Safe data
storage makes available to You for download specifically for purposes of facilitating Your access to,
operation of, and/or use with, the Services.

6.. “Your Content” means all software, data (including Personal Data as that term is defined in the
Data Processing Agreement for Safe data storage Cloud Services described in this Agreement), text,
images, audio, video, photographs, non-Safe data storage or third party applications, and other
content and material, in any format, provided by You or any of Your Users that is stored in, or run on
or through, the Services. Services under this Agreement, Safe data storage Software, other Safe data
storage products and services, and Safe data storage intellectual property, and all derivative works
thereof, do not fall within the meaning of the term “Your Content”.

C) Right to Access and Use:

Subject to the terms of this Agreement, CLIMB GLOBAL SOLUTIONS LTD grants Company a non-
exclusive, non-transferable, worldwide right to access and use the cloud Services described in the
Grant Letter during the applicable Subscription Period solely for Company’s internal business
purposes. Use of the Cloud Services depends on the types of services purchased. Company must
have an active service to the cloud services, or have an active Support agreement for the Cloud
Services, as applicable, to continue to receive access to the cloud services. User-based subscriptions
may not be shared or used by more than one individual User but may be reassigned to new User
who are replacing former Users that have been terminated or otherwise no longer use the cloud
Services.

D. USE OF THE SERVICES

 We will make the Safe data storage services listed in your order (the “Services”) available to You
pursuant to this Agreement and Your order. Except as otherwise stated in this Agreement or
Your order, you have the non-exclusive, worldwide, limited right to use the Services during the
period defined in Your order, unless earlier terminated in accordance with this Agreement or
the order (the “Services Period”), solely for Your internal business operations. You may allow
Your Users to use the Services for this purpose, and you are responsible for their compliance
with this Agreement and Your order.

 The Service Specifications describe and govern the Services. During the Services Period, we may
update the Services and Service Specifications to reflect changes in, among other things, laws,
regulations, rules, technology, industry practices, patterns of system use, and availability of
Third-Party Content. Safe data storage updates to the Services or Service Specifications will not
materially reduce the level of performance, functionality, security or availability of the Services
during the Services Period of Your order.

 You may not, and may not cause or permit others to: (a) use the Services to harass any person;
cause damage or injury to any person or property; publish any material that is false,
defamatory, harassing or obscene; violate privacy rights; promote bigotry, racism, hatred or
harm; send unsolicited bulk e-mail, junk mail, spam or chain letters; infringe property rights; or
otherwise violate applicable laws, ordinances or regulations; (b) perform or disclose any
benchmarking, availability or performance testing of the Services; or (c) perform or disclose
network discovery, port and service identification, vulnerability scanning, password cracking,
remote access or penetration tests of the Services (the “Acceptable Use Policy”). In addition to
other rights that we have in this Agreement and Your order, we have the right to take remedial
action if the Acceptable Use Policy is violated, and such remedial action may include removing
or disabling access to material that violates the policy.

 Customer Relationship Management (CRM) services encompass a variety of software tools and
strategies designed to help businesses manage interactions with current and potential
customers. These services typically include features like contact management, sales
automation, lead tracking, email integration, analytics, and more.

 Popular CRM services include Salesforce, HubSpot CRM, CRM, Microsoft Dynamics 365, and
many others. Each of these platforms offers its own set of features tailored to different business
needs and sizes.
 CRM services are crucial for businesses as they help in streamlining processes, improving
customer interactions, and ultimately boosting sales and revenue. By centralizing customer data
and providing insights into customer behaviour, CRM services enable businesses to build
stronger relationships with their customers and drive growth.

 Salesforce is one of the leading Customer Relationship Management (CRM) platforms globally,
renowned for its cloud-based software solutions tailored to various business needs. Founded in
1999, Salesforce has grown into a comprehensive suite of applications covering sales, customer
service, marketing automation, analytics, and more.

 Key features of CRM CLOUD SERVICE include:

 1. **Sales Cloud**: Helps businesses manage their sales processes, from lead generation to
closing deals, through features like contact management, opportunity tracking, and sales
forecasting.

 2. **Service Cloud**: Enables businesses to deliver exceptional customer service by providing


tools for case management, knowledge base, and omni-channel support.

 3. **Marketing Cloud**: Offers tools for creating personalized marketing campaigns, managing
customer journeys, and analyzing marketing performance.

 4. **Commerce Cloud**: Facilitates e-commerce operations by providing capabilities for


creating online stores, managing product catalogs, and optimizing customer experiences.

 5. **Community Cloud**: Allows businesses to create online communities for customers,


partners, and employees to collaborate and engage with each other.

 6. **Analytics Cloud**: Provides advanced analytics capabilities for gaining insights from data
collected across various Salesforce applications.
 7. **Integration**: Salesforce offers robust integration capabilities, allowing businesses to
connect Salesforce with other applications and systems, ensuring smooth data flow and process
automation.

 8. Customization and AppExchange**: Salesforce can be customized to meet specific business


requirements through its declarative tools like Salesforce Lightning App Builder and custom
development using Apex and Visualforce. Additionally, the Salesforce AppExchange offers a vast
marketplace of third-party apps and integrations to extend Salesforce's functionality.

 Overall, Salesforce is highly regarded for its scalability, flexibility, and extensive ecosystem,
making it a preferred choice for businesses of all sizes across industries.

 HubSpot CRM is another popular Customer Relationship Management (CRM) platform that
offers a range of tools to help businesses manage their interactions with customers. Here are
some key features and aspects of HubSpot CRM:

 1. **Contact Management**: HubSpot CRM provides a centralized database for storing and
managing contacts, including their interactions, communication history, and relevant details.

 2. **Pipeline Management**: Users can create customizable sales pipelines to track deals and
monitor their progress from lead to close. This feature helps sales teams prioritize tasks and
focus on opportunities that are most likely to convert.

 3. **Email Tracking and Templates**: HubSpot CRM offers email tracking capabilities, allowing
users to monitor email opens, clicks, and replies. It also provides email templates and
sequences to streamline communication with prospects and customers.

 4. **Integration with Marketing Hub and Sales Hub**: HubSpot CRM seamlessly integrates with
other HubSpot products like Marketing Hub and Sales Hub, enabling businesses to align their
marketing, sales, and customer service efforts for a cohesive customer experience.
 5. **Automation**: Users can automate repetitive tasks and workflows, such as lead scoring,
email follow-ups, and data entry, to save time and improve efficiency.

 6. **Reporting and Analytics**: HubSpot CRM offers reporting tools to track sales performance,
monitor pipeline metrics, and gain insights into customer behavior. Customizable dashboards
allow users to visualize data and make informed decisions.

 7. **Free Version**: HubSpot CRM offers a free version with basic features, making it accessible
to small businesses and startups. Users can upgrade to paid plans for additional functionality
and advanced features

 8. **User-Friendly Interface**: HubSpot CRM features an intuitive and user-friendly interface,


making it easy for users to navigate and adopt the platform quickly.Overall, HubSpot CRM is
known for its simplicity, affordability, and integration with other HubSpot products, making it a
popular choice for businesses looking to streamline their sales and marketing processes.

 Cloud services refer to computing resources and applications that are delivered over the
internet. These services are hosted on remote servers maintained by third-party providers,
allowing users to access and utilize them via the internet rather than on local infrastructure.
Cloud services offer several advantages, including scalability, flexibility, cost-effectiveness, and
accessibility from anywhere with an internet connection.

 Here are some common types of cloud services:

 **Infrastructure as a Service (IaaS)**: Provides virtualized computing resources over the


internet, including virtual machines, storage, and networking. Users can rent these resources on
a pay-as-you-go basis, allowing for scalability and cost savings compared to maintaining physical
infrastructure.

 2. **Platform as a Service (PaaS)**: Offers a platform for developing, running, and managing
applications without the complexity of building and maintaining the underlying infrastructure.
PaaS providers typically offer tools and services for application development, deployment, and
management.
 3. **Software as a Service (SaaS)**: Delivers software applications over the internet on a
subscription basis. Users can access these applications through a web browser or API without
needing to install or manage the software locally. Common examples of SaaS include email,
customer relationship management (CRM), and productivity applications.

 4. **Database as a Service (DBaaS)**: Provides database management and administration as a


cloud service. Users can store, manage, and access their databases remotely without the need
to install or maintain database software.

 5. **Function as a Service (FaaS)**: Also known as serverless computing, FaaS allows


developers to run code in response to events without provisioning or managing servers.
Developers can focus on writing code while the cloud provider handles the infrastructure and
scaling.

 6. **Storage as a Service**: Offers cloud-based storage solutions for storing and managing data.
Users can store files, documents, and other data in the cloud, with options for scalability,
redundancy, and accessibility.

 7. **Backup as a Service (BaaS)**: Provides cloud-based backup and recovery solutions for data
protection. Users can back up their data to the cloud, ensuring data resilience and disaster
recovery capabilities.

 Cloud services are used by businesses of all sizes across various industries to streamline
operations, improve efficiency, and drive innovation. They have become an essential part of
modern IT infrastructure, enabling organizations to adapt quickly to changing business needs
and leverage the benefits of cloud computing.
 CRM is a cloud-based Customer Relationship Management (CRM) platform developed by
Corporation. It offers a wide range of features and tools to help businesses manage their sales,
marketing, customer support, and other aspects of customer relationships. Here are some key
aspects and features of CRM:

 1. **Contact Management**: CRM provides a centralized database for storing and managing
customer contacts, including their interactions, communication history, and other relevant
details.

 2. **Sales Automation**: Users can automate various sales processes, such as lead
management, deal tracking, and sales forecasting, to streamline workflows and improve
efficiency.

 3.**Pipeline Management**: CRM allows users to create customizable sales pipelines to


visualize and track the progress of deals from lead to closure. This feature helps sales teams
prioritize tasks and focus on opportunities with the highest potential.

 4. **Email Integration**: CRM seamlessly integrates with email platforms, allowing users to
track email communications, schedule follow-up emails, and manage contacts directly from
their inbox.

 5. **Workflow Automation**: Users can automate repetitive tasks and processes using CRM's
workflow automation capabilities. This includes sending automated notifications, updating
records, and triggering actions based on predefined criteria.

 6. **Analytics and Reporting**: CRM offers robust reporting and analytics tools to track sales
performance, monitor key metrics, and gain insights into customer behavior. Customizable
dashboards allow users to visualize data and make informed decisions.
 7. **Mobile App**: CRM provides a mobile app for iOS and Android devices, enabling users to
access CRM data, manage contacts, and track sales activities on the go.

 8. **Integration with Suite**: CRM seamlessly integrates with other applications, such as
Campaigns for email marketing, Desk for customer support, and Books for accounting,
providing a unified platform for managing various aspects of business operations.

 9. **Customization**: CRM offers extensive customization options, allowing users to tailor the
system to their specific business needs. This includes custom fields, layouts, modules, and
workflows.

 Overall, CRM is known for its user-friendly interface, affordability, and comprehensive feature
set, making it a popular choice for small and medium-sized businesses looking to streamline
their sales and marketing processes.

 Microsoft Dynamics 365 is a suite of cloud-based business applications developed by Microsoft.


It encompasses a wide range of solutions aimed at various business functions, including sales,
customer service, marketing, finance, operations, and more. Here are some key aspects and
features of Microsoft Dynamics 365:

 1. **Unified Platform**: Dynamics 365 provides a unified platform for managing various
business functions, allowing organizations to streamline operations, improve collaboration, and
gain insights across departments.

 **Modular Structure**: Dynamics 365 is modular in nature, with each application focusing on
specific business processes. Organizations can choose and customize the applications that best
suit their needs, whether it's sales, customer service, field service, marketing, finance, supply
chain management, or human resources.

 3. **Integration with Office 365 and Power Platform**: Dynamics 365 seamlessly integrates
with other Microsoft products and services, such as Office 365, SharePoint, Teams, and Power
Platform. This integration enables users to access CRM data, collaborate on documents, and
automate workflows within familiar Microsoft environments.

 4. **AI and Analytics**: Dynamics 365 incorporates artificial intelligence (AI) and advanced
analytics capabilities to help organizations make data-driven decisions, predict customer
behavior, and identify trends. This includes features like predictive lead scoring, sentiment
analysis, and customer segmentation.

 5. **Customer Insights**: Dynamics 365 Customer Insights provides a 360-degree view of


customers by aggregating data from various sources, including CRM, ERP, and third-party
applications. This helps organizations understand customer preferences, personalize
interactions, and improve engagement.

 6. **Customer Engagement**: Dynamics 365 for Sales, Customer Service, and Marketing
enables organizations to effectively engage with customers across multiple channels, including
email, social media, chat, and phone. It provides tools for managing leads, tracking interactions,
resolving issues, and executing targeted marketing campaigns.

 7. **Field Service Management**: Dynamics 365 Field Service helps organizations optimize
their field service operations by scheduling appointments, dispatching technicians, and
managing service contracts. It also provides tools for asset management, inventory tracking,
and predictive maintenance.

 8. **Scalability and Flexibility**: Dynamics 365 is highly scalable and flexible, allowing
organizations to adapt and grow with changing business needs. It can accommodate businesses
of all sizes, from small startups to large enterprises, across various industries.

 Overall, Microsoft Dynamics 365 is a comprehensive and customizable platform that empowers
organizations to digitize their business processes, enhance customer experiences, and drive
business growth.

 Enterprise Resource Planning (ERP) services refer to the suite of integrated applications that
help businesses manage their core processes. These processes often include product planning,
purchasing, inventory management, sales, marketing, finance, human resources, and more. ERP
systems streamline operations by centralizing data and automating workflows, leading to
increased efficiency and productivity.

 ERP services typically include:

 1. **Consulting**: Advising businesses on the selection, implementation, and customization of


ERP systems to meet their specific needs.
 2. **Implementation**: Installing and configuring ERP software according to the business
requirements, including data migration and integration with existing systems.

 3. **Customization**: Tailoring the ERP system to align with unique business processes and
workflows.

 4. **Training**: Providing training sessions for employees to effectively use the ERP software.

 5. **Support and Maintenance**: Offering ongoing support, troubleshooting, and updates to


ensure the smooth functioning of the ERP system.

 6. **Integration Services**: Integrating the ERP system with other software applications, such
as Customer Relationship Management (CRM) or Business Intelligence (BI) tools.

 7. **Upgrade Services**: Assisting businesses in upgrading their ERP systems to newer versions
or migrating to cloud-based solutions.

 ERP services can be provided by ERP vendors, consulting firms, or independent ERP specialists.
Businesses often seek ERP services to improve operational efficiency, enhance decision-making,
and gain a competitive edge in their industry.
E. OWNERSHIP RIGHTS AND RESTRICTIONS

 You or Your licensors retain all ownership and intellectual property rights in and to Your
Content. We or our licensors retain all ownership and intellectual property rights in and to the
Services, derivative works thereof, and anything developed or delivered by or on behalf of us
under this Agreement.

 You may have access to Third Party Content through use of the Services. Unless otherwise
stated in Your order, all ownership and intellectual property rights in and to Third Party Content
and the use of such content is governed by separate third party terms between You and the
third party.

 You grant us the right to host, use, process, display and transmit Your Content to provide the
Services pursuant to and in accordance this Agreement and Your order. You have sole
responsibility for the accuracy, quality, integrity, legality, reliability, and appropriateness of Your
Content, and for obtaining all rights related to Your Content required by Safe data storage to
perform the Services.

 You may not, and may not cause or permit others to: (a) modify, make derivative works of,
disassemble, decompile, reverse engineer, reproduce, republish or copy any part of the Services
(including data structures or similar materials produced by programs); (b) access or use the
Services to build or support, directly or indirectly, products or services competitive to Safe data
storage; or (c) license, sell, transfer, assign, distribute, outsource, permit time sharing or service
bureau use of, commercially exploit, or make available the Services to any third party except as
permitted by this Agreement or Your order.

F. NON-DISCLOSURE

 By virtue of this Agreement, the parties may disclose information that is confidential
(“Confidential Information”). Confidential Information shall be limited to the terms and pricing
under this Agreement, Your Content residing in the Services, and all information clearly
identified as confidential at the time of disclosure.

 A party’s Confidential Information shall not include information that: (a) is or becomes a part of
the public domain through no act or omission of the other party; (b) was in the other party’s
lawful possession prior to the disclosure and had not been obtained by the other party either
directly or indirectly from the disclosing party; (c) is lawfully disclosed to the other party by a
third party without restriction on the disclosure; or (d) is independently developed by the other
party.

 Each party agrees not to disclose the other party’s Confidential Information to any third party
other than as set forth in the following sentence for a period of five years from the date of the
disclosing party’s disclosure of the Confidential Information to the receiving party; however, we
will protect the confidentiality of Your Content residing in the Services for as long as such
information resides in the Services. Each party may disclose Confidential Information only to
those employees, agents or subcontractors who are required to protect it against unauthorized
disclosure in a manner no less protective than required under this Agreement, and each party
may disclose the other party’s Confidential Information in any legal proceeding or to a
governmental entity as required by law. We will protect the confidentiality of Your Content
residing in the Services in accordance with the Safe data storage security practices defined as
part of the Service Specifications applicable to Your order.

G. PROTECTION OF YOUR CONTENT

In performing the Services, Safe data storage will comply with the Safe data storage privacy
policy applicable to the Services ordered.
 Safe data storage’s Data Processing Agreement for Safe data storage Cloud Services (the “Data
Processing Agreement”), which is incorporated herein by reference, describes how we will
process Personal Data that You provide to us as part of Safe data storage’s provision of the
Services, unless stated otherwise in Your order. You agree to provide any notices and obtain any
consents related to Your use of, and our provision of, the Services.

 Safe data storage will protect Your Content as described in the Service Specifications, which
define the administrative, physical, technical and other safeguards applied to Your Content
residing in the Services and describe other aspects of system management applicable to the
Services. We and our affiliates may perform certain aspects of the Services (e.g., administration,
maintenance, support, disaster recovery, data processing, etc.) from locations and/or through
use of subcontractors, worldwide.

 You are responsible for any security vulnerabilities, and the consequences of such
vulnerabilities, arising from Your Content, including any viruses, Trojan horses, worms or other
harmful programming routines contained in Your Content, or from Your use of the Services in a
manner that is inconsistent with the terms of this Agreement. You may disclose or transfer, or
instruct us to disclose or transfer, Your Content to a third party, and upon such disclosure or
transfer we are no longer responsible for the security or confidentiality of such content and
applications outside of Safe data storage.

 Unless otherwise specified in Your order (including in the Service Specifications), You may not
provide us access to health, payment card or similarly sensitive personal information that
imposes specific data security obligations on the processing of such data greater than those
specified in the Service Specifications. If available, you may purchase services from us (e.g., Safe
data storage Payment Card Industry Compliance Services) designed to address particular data
protection requirements applicable to Your business or Your Content.

H. PAYMENT AND PAYMENT TERMS

All fees payable will be due within Ninety days from the invoice date. Once placed, your order is
non - cancellable and the sums paid non-refundable, except as provided in this Agreement or Your
order. You will pay any sales, value-added or other similar taxes imposed by applicable law that we
must pay based on the Services You ordered, except for taxes based on our income. Also, you will
reimburse us for reasonable expenses related to any non-Cloud safe data storage services ordered,
such as professional services. Fees for Services listed in an order are exclusive of taxes and
expenses.

1. Duties & Taxes: The Remuneration shall be exclusive of the applicable Service Tax or any
other duties, taxes and levies, the burden of payment for which will be by the Client, the
burden of collection of which will be the responsibility of the Vendor. Also, the onus of
remitting the collected duties, taxes and any other Government Levy to the appropriate
Government Treasury lies on the Vendor. The Client may deduct tax at source, if and when
applicable, at the rates applicable for levying of Taxes as mandated by the Income Tax
Authorities of India. The Client will be responsible for its payment to the Government
Treasury.

Payment will be made after Downloading of Software in to India.

I. REPRESENTATIONS AND WARRANTIES

. The Parties hereby represent and warrant as follows:

1. Good Title: They have the full power and absolute authority to enter into this Agreement.

2. No Disability: They are not under any disability, restriction. Or prohibition, whether legal,
contractual, or otherwise, which shall prevent them from performing or adhering to any of
their obligations under this Agreement, and have not entered into and shall not enter into
any agreement that may violate this Agreement.

3. Litigation: No Litigation, arbitration, or administrative proceedings are threatened, or to the


knowledge of the Parties, pending, which call into question the validity or performance of
their obligations under Agreement.

4. Consents / Permissions: All authorizations, approvals, consents, licenses, exemptions,


filings, and other matters, official or otherwise, required or advisable in connection with the
entry into, performance, validity, and enforceability of this Agreement and the transactions
contemplated hereby shall be obtained or effected in a timely manner.

5. Compliance with applicable Laws: Each Party shall strictly comply with all applicable laws in
their respective jurisdictions. The Client, its Promoters and Directors, Associates,
Representatives, Employees & Agents in India or abroad shall not be liable or held liable in
any manner or from whatsoever and whosesoevers for the breach of any natural laws.
Statutes, contractual obligations, taxation, or for any other civil or criminal actions,
penalties or liabilities applied under any natural, statutory, local, national and international
laws, customs, regulations and conventions, when such violation is in the part of the
Vendor., its Promoters and Directors, Associates, Representatives, Employees & Agents in
India or abroad. This understanding is explicit, implicit, and clearly undertaken agreed to
and between both the parties to this agreement.

6. Validity: Each party represents that it has validly entered into this Agreement and that it has
the power and authority to do so. We warrant that during the Services Period, we will
perform the Services using commercially reasonable care and skill in all material respects as
described in the Service Specifications. If the Services provided to You were not performed
as warranted, You must promptly provide us with a written notice that describes the
deficiency in the Services (including, as applicable, the service request number notifying us
of the deficiency in the Services).

7. Causes: We do not warrant that the services will be performed error-free or uninterrupted,
that we will correct all services errors, or that the services will meet your requirements or
expectations. We are not responsible for any issues related to the performance, operation
or security of the services that arise from your content or third-party content or services
provided by third parties.

8. Prohibition: To the extent not prohibited by law, these warranties are exclusive and there
are no other express or implied warranties or conditions including for software, hardware,
systems, networks or environments or for merchantability, satisfactory quality and fitness
for a particular purpose.

J. CONTENT AND DATA PROTECTION:

Content consists of all data and information that client or its authorized users’ providers,
authorized access to, or inputs to the cloud services.
Use of the cloud services will not affect client’s ownership or license rights in such Content.
CLIMB GLOBAL SOLUTIONS LTD, may access and use the content solely for the purpose of
providing and managing the cloud Services. CLIMB GLOBAL SOLUTIONS LTD, will treat all
content as confidential by not disclosing content except to CLIMB GLOBAL SOLUTIONS LTD
employees and only to the extent necessary to deliver the cloud services.
Cloud Services Agreement means the storage services provided by CLIMB GLOBAL SOLUTIONS
LTD.
Client acknowledges that CLIMB GLOBAL SOLUTIONS LTD may modify a Cloud Services from
time to time at CLIMB GLOBAL SOLUTIONS LTD sole discretion and such modifications will
replace prior versions as of the effective date. Updates to a TD (such as a services description
or statement of work) will take effect upon a new order or for TDs previously agreed by the
Client will take effect upon the change effective date for ongoing services, or upon the renewal
date for cloud Services that automatically renew. The intent of any modification will be to: i)
improve or clarify existing commitments; ii) maintain alignment to current adopted standards
and applicable laws; or iii) provide additional features or functionality of a cloud Service.

K. THIRD-PARTY CONTENT, SERVICES AND WEB SITES

 The Services may enable You to link to, transmit Your Content to, or otherwise access third
parties’ websites, platforms, content, products, services, and information. We do not control
and are not responsible for such third parties’ websites, platforms, content, products, services,
and information.

 Any Third-Party Content we make accessible is provided on an “as-is” and “as available” basis
without any warranty of any kind. You acknowledge and agree that we are not responsible for,
and have no obligation to control, monitor, or correct, Third Party Content. We disclaim all
liabilities arising from or related to Third Party Content.

 You acknowledge that: (i) the nature, type, quality and availability of Third Party Content may
change at any time during the Services Period, and (ii) features of the Services that inter
operate with third parties such as Facebook™, YouTube™ and Twitter™, etc. (each, a “Third
Party Service”), depend on the continuing availability of such third parties’ respective
application programming interfaces (APIs). We may need to update, change or modify the
Services under this Agreement as a result of a change in, or unavailability of, such Third-Party
Content, Third Party Services or APIs. If any third-party ceases to make its Third-Party Content
or APIs available on reasonable terms for the Services, as determined by us in our sole
discretion, we may cease providing access to the affected Third-Party Content or Third-Party
Services without any liability to You. Any changes to Third Party Content, Third Party Services or
APIs, including their unavailability, during the Services Period does not affect Your obligations
under this Agreement or the applicable order, and You will not be entitled to any refund, credit
or other compensation due to any such changes.

L. SERVICE MONITORING, ANALYSES AND SAFE DATA STORAGE SOFTWARE

 We continuously monitor the Services to facilitate Safe data storage’s operation of the Services;
to help resolve Your service requests; to detect and address threats to the functionality,
security, integrity, and availability of the Services as well as any content, data, or applications in
the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy.
Safe data storage monitoring tools do not collect or store any of Your Content residing in the
Services, except as needed for such purposes. Safe data storage does not monitor, and does not
address issues with, non-Safe data storage software provided by You or any of Your Users that is
stored in, or run on or through, the Services. Information collected by Safe data storage
monitoring tools (excluding Your Content) may also be used to assist in managing Safe data
storage’s product and service portfolio, to help Safe data storage address deficiencies in its
product and service offerings, and for license management purposes.

 We may (i) compile statistical and other information related to the performance, operation and
use of the Services, and (ii) use data from the Services in aggregated form for security and
operations management, to create statistical analyses, and for research and development
purposes (clauses i and
 ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly
available; however, Service Analyses will not incorporate Your Content or Confidential
Information in a form that could serve to identify You or any individual, and Service Analyses do
not constitute Personal Data. We retain all intellectual property rights in Service Analyses.

 We may provide You with online access to download certain Safe data storage Software for use
with the Services. If we license Safe data storage Software to You and do not specify separate
terms for such software, then such Safe data storage Software is provided as part of the
Services and You have the non-exclusive, worldwide, limited right to use such Safe data storage
Software, subject to the terms of this Agreement and Your order, solely to facilitate Your use of
the Services. You may allow Your Users to use the Safe data storage Software for this purpose,
and You are responsible for their compliance with the license terms. Your right to use Safe data
storage Software will terminate upon the earlier of our notice (by web posting or otherwise) or
the end of the Services associated with the Safe data storage Software. If Safe data storage
Software is licensed to You under separate third-party terms, then Your use of such software is
governed by the separate third-party terms.

M. EXPORT

 Export laws and regulations of the UNITED KINGDOM and any other relevant local export laws
and regulations apply to the Services. Such export laws govern use of the Services (including
technical data) and any Services deliverables provided under this Agreement, and You and we
each agree to comply with all such export laws and regulations (including “deemed export” and
“deemed re-export” regulations). You agree that no data, information, software programs
and/or materials resulting from Services (or direct product thereof) will be exported, directly or
indirectly, in violation of these laws, or will be used for any purpose prohibited by these laws
including, without limitation, nuclear, chemical, or biological weapons proliferation, or
development of missile technology.

 You acknowledge that the Services are designed with capabilities for You and Your Users to
access the Services without regard to geographic location and to transfer or otherwise move
Your Content between the Services and other locations such as User workstations. You are
solely responsible for the authorization and management of User accounts across geographic
locations, as well as export control and geographic transfer of Your Content.

N. TERM AND TERMINATION


This Agreement is valid for the order which this Agreement accompanies.

 Services provided under this Agreement shall be provided for the Services Period defined in
Your order. If stated in the Service Specifications, the Services Period of certain Cloud Services
will automatically be extended for an additional Services Period of the same duration unless (i)
You provide Safe data storage with written notice no later than thirty (30) days prior to the end
of the applicable Services Period of Your intention not to renew such Cloud Services, or (ii) Safe
data storage provides You with written notice no later than ninety (90) days prior to the end of
the applicable Services Period of its intention not to renew such Cloud Services.

 We may suspend Your or Your Users’ access to, or use of, the Services if we believe that (a)
there is a significant threat to the functionality, security, integrity, or availability of the Services
or any content, data, or applications in the Services; (b) You or Your Users are accessing or using
the Services to commit an illegal act; or (c) there is a violation of the Acceptable Use Policy.
When reasonably practicable and lawfully permitted, we will provide You with advance notice
of any such suspension. We will use reasonable efforts to re-establish the Services promptly
after we determine that the issue causing the suspension has been resolved. During any
suspension period, we will make Your Content
 (as it existed on the suspension date) available to You. Any suspension under this paragraph
shall not excuse You from Your obligation to make payments under this Agreement.

 If either of us breaches a material term of this Agreement or the order and fails to correct the
breach within 30 days of written specification of the breach, then the breaching party is in
default and the non-breaching party may terminate the order under which the breach occurred.
If we terminate the order as specified in the preceding sentence, you must pay within 30 days
all amounts that have accrued prior to such termination, as well as all sums remaining unpaid
for the Services under such order plus related taxes and expenses. Except for non-payment of
fees, the non-breaching party may agree in its sole discretion to extend the 30-day period for so
long as the breaching party continues reasonable efforts to cure the breach. You agree that if
You are in default under this Agreement, you may not use those Services ordered.

 For a period of no less than 60 days after the end of the Services Period of an order, we will
make Your Content (as it existed at the end of the Services Period) available for retrieval by You.
At the end of such 60-day period, and except as may be required by law, we will delete or
otherwise render inaccessible any of Your Content that remains in the Services.

 Provisions that survive termination or expiration of this Agreement are those relating to
limitation of liability, indemnification, payment and others which by their nature are intended
to survive.
 The term of a Cloud Services Begins on the date CLIMB GLOBAL SOLUTIONS LTD notifies Client
that Client can access the cloud Services. CLIMB GLOBAL SOLUTIONS LTD will specify whether
the Cloud Services renews automatically, proceeds on a continuous use basis, or terminates at
the end of the term.

 CLIMB GLOBAL SOLUTIONS LTD may suspend or limit, to the extent necessary, Client’s use of a
cloud Services if CLIMB GLOBAL SOLUTIONS LTD determines there is a material breach of
client’s obligations, a security reach, and violation of law. If the cause of the suspension can
reasonably be remedied CLIMB GLOBAL SOLUTIONS LTD will provide notice of the actions Client
must take to reinstate the cloud services. If Client fails to take such actions within a reasonable
time, CLIMB GLOBAL SOLUTIONS LTD may terminate the Cloud Services. Failure to pay is a
material breach.

O. CONSEQUENCES OF TERMINATION

 On termination of the Agreement;


 The Vendor shall be entitled to receive Remuneration for “the Services rendered and the
Deliverable provided” till the date of termination.
 Subject to receipt of Remuneration, calculated as per the above clause by the Vendor to the
satisfaction of the Client, the Vendor shall assign to the Client the rights in the Works.

P. EVENT OF FORCE MAJEURE

Neither of us shall be responsible for failure or delay of performance if caused by: an act of
war, hostility, or sabotage; act of God; pandemic; electrical, internet, or telecommunication
outage that is not caused by the obligated party; government restrictions (including the denial
or cancelation of any export, import or other license); or other event outside the reasonable
control of the obligated party. We both will use reasonable efforts to mitigate the effect of a
force majeure event. If such event continues for more than 30 days, either of us may cancel
unperformed Services and affected orders upon written notice. This Section does not excuse
either party’s obligation to take reasonable steps to follow its normal disaster recovery
procedures or Your obligation to pay for the Services.

Q. INDEMNIFICATION

If a third party makes a claim against either You or Safe data storage (“Recipient” which may refer to
You or us depending upon which party received the Material), that any information, design,
specification, instruction, software, service, data, hardware, or material (collectively, “Material”)
furnished by either You or us (“Provider” which may refer to You or us depending on which party
provided the Material) and used by the Recipient infringes the third party’s intellectual property
rights, the Provider, at the Provider’s sole cost and expense, will defend the Recipient against the
claim and indemnify the Recipient from the damages, liabilities, costs and expenses awarded by the
court to the third party claiming infringement or the settlement agreed to by the Provider, if the
Recipient does the following:

 notifies the Provider promptly in writing, not later than 30 days after the Recipient receives
notice of the claim (or sooner if required by applicable law);
 gives the Provider sole control of the defence and any settlement negotiations; and
 gives the Provider the information, authority and assistance the Provider needs to defend
against or settle the claim.

i. If the Provider believes or it is determined that any of the Material may have
violated a third party’s intellectual property rights, the Provider may choose
to either modify the Material to be non-infringing (while substantially
preserving its utility or functionality) or obtain a license to allow for
continued use, or if these alternatives are not commercially reasonable, the
Provider may end the license for, and require return of, the applicable
Material and refund any unused, prepaid fees the Recipient may have paid
to the other party for such Material. If such return materially affects our
ability to meet obligations under the relevant order, then we may, upon 30
days prior written notice, terminate the order. If such Material is third party
technology and the terms of the third-party license do not allow us to
terminate the license, then we may, upon 30 days prior written notice, end
the Services associated with such Material and refund any unused, prepaid
fees for such Services.

ii. The Provider will not indemnify the Recipient if the Recipient (a) alters the
Material or uses it outside the scope of use identified in the Provider’s user
or program documentation or Service Specifications, or (b) uses a version of
the Material which has been superseded, if the infringement claim could
have been avoided by using an unaltered current version of the Material
which was made available to the Recipient. The Provider will not indemnify
the Recipient to the extent that an infringement claim is based upon any
Material not furnished by the Provider. We will not indemnify You to the
extent that an infringement claim is based on Third Party Content or any
Material from a third party portal or other external source that is accessible
or made available to You within or by the Services (e.g., a social media post
from a third party blog or forum, a third party Web page accessed via a
hyperlink, marketing data from third party data providers, etc.).
R. CONFIDENTIALITY

 Any information that is not publicly available and is provided by one Party to the other Party for
the purpose of implementing this Agreement shall not be disclosed by the receiving Party to any
third party without the prior written consent of the providing Party.
 The Parties shall treat this Agreement and other agreements annexed hereto as confidential. No
Party, except with prior written of the other Party, shall disclose or make any public or other
announcements of the transaction covered by this Agreement and annexed agreements or any
terms thereof.
 The Parties hereby agree that if any Party receives notice that it may be required or ordered by
any judicial, governmental, or other judicial or regulatory entity to produce any information
which is construed as confidential under this Agreement or any of its terms or any such
confidential information is required or ordered to be produced under any law, order, rule or
regulation, such Party shall be obligated to comply with the same and it shall not be construed
to be a breach pursuant to this Agreement.

S. GOVERNING LAW AND JURISDICTION

This Agreement shall be interpreted and governed by the laws of India with respect to Contract
and the fulfilment of the Contract Law. Especially with respect to breach of Contract/s
regarding deliverables. Similarly, any laws, whether criminal or otherwise held in common by
the Government of India with the Governments of other countries by virtue of treaties, mutual
agreements, etc., are included in this Agreement.

T. MODIFICATION AND WAIVER

No modification or amendment of this Agreement shall be valid or binding unless made in


writing and, in the case of an amendment, executed by both the parties and in the case of a
waiver, by the Party against whom the waiver is to be effective. No failure or delay on the part
of any of the Parties in the exercise of any right, power, privilege or remedy provided in this
Agreement shall operate as a waiver of such right, power, privilege or remedy, or as a waiver
of any preceding or succeeding breach by the other Party to this Agreement. Any single or
partial exercise of any right, power, privilege or remedy shall not preclude any other or further
exercise of such or any other right, power, privilege or remedy provided in this Agreement all
of which are several and cumulative and are not exclusive of each other or of any other rights
or remedies otherwise available to a Party at law or in equity.

U. AMENDMENT

No modification or amendment to this Agreement and no waiver of any of the terms of


conditions hereof shall be valid or binding unless made in writing and duly executed by Parties.
V. NOTICE

Any notice required under this Agreement shall be provided to the other party in writing.

We may give notices applicable to our Services customers by means of a general notice on the
Safe data storage portal for the Services, and notices specific to You by electronic mail to Your e-mail
address on record in our account information or by written communication sent by first class mail or
pre-paid post to Your address on record in our account information.

W. MISCELLANEOUS

1. NOTICES
A Party giving notice or notifying under this Agreement must do as in writing directed to the
recipient” s address specified in this Clause.

2. ASSIGNMENT
The Client may assign, transfer, delegate and / or grant all or any part of its rights, privileges
and properties hereunder to any person or entity. The Vendor acknowledges that the
Services rendered hereunder are of special, unique, extraordinary and intellectual character
and therefore, the Vendor shall not assign, transfer, license, delegate or grant all or part of
the obligations hereunder to any other person or entity, unless as stated in this clause.

3. RELATIONSSHIP OF THE PARTIES


The status of the Vendor with reference to the Client is that of independent contractor and
the former shall not be responsible to the Client or anyone engaged by the Client for any
money or materials whatsoever except as specifically set forth in the Agreement and /or
any of its Annexure, Nothing contained in the Agreement shall be construed as to constitute
the Client and the Vendor as joint venture, partners or agents, nor will any similar
relationship be deemed to exist between the Vendor and the Client. The Client shall not be
held responsible or liable to the Vendor or any third party for any expense incurred by the
Vendor, unless specifically set forth in the Agreement, nor will The Client be held responsible
or liable to the vendor or to any third party for or on account of any of the Vendor`s
Promoters and Directors, Associates, Representatives, Employees and Agents.

4. SEVERABILITY
If any provision of this Agreement is void, invalid, unenforceable or prohibited by law, the
Agreement shall be considered divisible as to such provision and deletion of such provision
shall be imperative and shall not be part of the consideration moving from either Party
hereto to the other, and the remainder of this Agreement shall be valid, binding and of like
effect as though such provision was not included herein.
X. PRICE & PRODUCT TERMS

Invoices should be cleared within the time period of 90 days. Else, Services will not be provided.

1. SAFE BACK UP:


a. Business Backup: A comprehensive backup service for backing up PCs, laptops, servers,
databases and virtual machines safely to our own UK private cloud.
b. Encryption: Data encrypted on your machine using up to 448 Blowfish Encryption before being
sent to our servers via SSL encrypted transit.
c. Data Retention: Data retention is how long you wish to store changed or deleted files within
each backup set. This can be set by you upwards of one day, there is no limit to the duration.
d. Backup Notifications: After each backup you will receive a report of its status – it will even
advise you if the scheduled job has missed. If using a PC or Laptop, take advantage of our
backup reminder notification which will inform you when your last backup was run and to give
you a gentle nudge to backup and protect your files
e. The Backup Modules: Our business user client has a number of different modules available for
you to use for free. These include VMware, Hyper-V, Synology, QNAP, Total Office 365 Backup,
Microsoft Exchange Server, Microsoft SQL Server, Safe data storage Database, MySQL Database,
Lotus Domino, Lotus Notes, Windows System, and Windows System State (Active Directory) For
a small additional fee, you can even protect your hosted Office 365 Exchange Mailbox.
f. Faster Backups: Both the Single User and Business User will do a full initial backup. Then all
subsequent backups will only upload changes and new files that are created in the location
specified to backup – so they will be much faster than the initial upload.
g. Multiple Machine Backups: With our business user client, you have the ability to backup
multiple machines and manage them in our dedicated portal. Create a backup set per machine
then set required schedules and retention periods for each backup.
h. Backup Type: We have two backup types within our Business Backup solution; Single User or
Business User. The Single User is ideal for PCs and Laptops supporting Windows or Mac with
limited modules. The Business User comes with all the add-on modules and is for use with
servers, PCs and Laptops, supporting Windows, Mac or Linux.
i. Free Seeding: Slow connection speeds? Too much data to send over the internet? Not to worry -
we offer a free seeding service not just for initial backups, but for restores too. Your only cost is
to send the drive back to us. You can check your internet speed here.

2. SAFE C2C:

C2C or Cloud to Cloud backup is our agentless, direct peering backups solution for Office 365,
SharePoint, OneDrive, Teams, G Suite, Team Drives, Box Dropbox and SalesForce. Automated
backups for worry free use of public or shared cloud services
3. SAFE IMAGE:

As a Master Managed Service Provider (MSP) of StorageCraft, we are proud to offer a full Image
Backup of your critical machines. When Recovery Time Objective (RTO) is vital, StorageCraft
ShadowProtect can have your server back up and running in minutes. Additional features include:
Virtual Boot, Head Start Restore and Quick Mount to name a few.

a. Image Backup: Capture everything on your operating


system; applications, configuration settings, services, data
and custom applications.
Recovery: Recover a file or a folder, or restore a whole system fast, to the same or different
hardware - avoiding downtime and its costs.
Management: Manage multiple instances of Shadow Protect across multiple environments.
b. Restore: Restore Windows systems to different hardware-P2P, P2V, V2V, V2P.
c. HeadStart Restore: Have a restore operation already staged, and reduce downtime
for multi-terabyte systems.
d. Virtual Boot: Quickly boot any backup image into a virtual machine (VM).
e. IntelligentFTPTM: This transforms traditional FTP into a BDR-friendly transfer solution by
offering automatic network replication with greater control over what, how, and when
you replicate. This reduces the worry of having to do it manually, as the process can be
automated.
f. Image Manager: Offers powerful business continuity features such as consolidation,
verification, retention, and notifications.
g. Recovery Environment: Boot from a CD, or ISO, to quickly recover Windows or Linux
systems to the same or different hardware

4. SAFE SYNC

Securely access your enterprise data from anywhere using any mobile device. Sync offers multiple
ways to access your organization’s files securely: Web access, Desktop Sync, Virtual Drive, Mobile
Apps, WebDAV and more. Never be without your data again.

a. White Labelled: Bring your business identity to the forefront with your own branding.
Customise all aspects of Sync, including login pages, mobile apps, emails and messages.

b. Permissions and Security: Full encryption of files at rest and encryption of all
communication during transit - add an extra layer of protection when logging in using
email or Google Authenticator.
c. Cross-Platform Functionality: Allows users to access, share and sync company files and
documents from PCs, MACs iOS, Android and Windows Phone.
d. Data Loss Prevention: Protect your data with endpoint backup, remote wipe, file
versioning and recycle bins.

e. Office Integration: Integrates easily with MS Outlook Add-on, MS Office Add-on and
Office Mobile Apps
SR.NO SOFTWARE SERVICES LIST COST IN GBP
1 SAFE BACK UP SOFTWARE SERVICE 140
1.1 BUSINESS BACKUP SOFTWARE SERVICE 125
1.2 ENCRYPTION SAFE BACK UP SOFTWARE SERVICE 105
1.3 DATA RETENTION SOFTWARE SERVICE 103
1.4 MULTIPLE MACHINE BACKUP SOFTWARE SERVICE 107
2 SAFE IMAGE SOFTWARE SERVICE 135
2.1 IMAGE BACKUP SOFTWARE SERVICE 95
2.2 SHADOW PROTECT SOFTWARE SERVICE 97
2.3 HEAD START RESTORE SOFTWARE SERVICE 101
2.4 VIRTUAL BOOT SOFTWARE SERVICE 107
2.5 INTELLIGENT FTPTM SOFTWARE SERVICE 104
2.6 IMAGE MANAGER SOFTWARE SERVICE 115
3 SAFE SYNC SOFTWARE SERVICE 85
3.1 WHITE LABELLED SAFE SYNC SOFTWARE SERVICE 141
3.2 CROSS- PLATFORM FUNCTIONALITY SOFTWARE SERVICE 106
3.3 DATA LOSS PREVENTION SOFTWARE SERVICE 101
3.4 OFFICE INTEGRATION SOFTWARE SERVICE 102

COUNTERPARTS

This Agreement may be signed in two numbers of counterparts, each of which is an original and all
of which, taken together, constitute one and the same Agreement.

IN WITNESS WHEREOF, the Parties hereto have caused this agreement to be duly executed and
delivered as of the day and year first above written.

SIGNED AND DELIVERED

BY THE WITHIN NAMED (“THE CLIENT”)

ASAP TECHNOLOGY SOLUTION SERVICES

AUTHORIZED SIGNATORY

SIGNED AND DELIVERED

BY THE WITHIN NAMED (“THE VENDOR”)

CLIMB GLOBAL SOLUTIONS LTD

You might also like