...

As between the parties, AGAT Software Inc., retains title to and ownership of all proprietary rights with respect to the software contained within its products. The software is protected by Israeli copyright laws and international treaty provision. Therefore, you must treat the software like any other copyrighted material (e.g., a book or sound recording).
Every effort has been made to ensure that the information in this document is accurate. AGAT Software Inc. is not responsible for printing or clerical errors. Information in this document is subject to change without notice.

Disclaimer
While AGAT uses reasonable efforts to include accurate and up-to-date information in this document, AGAT makes no warranties or representations as to its accuracy. AGAT assumes no liability or responsibility for any typographical or other errors or omissions in the content of this document.

Limitation of Liability
AGAT and/or its respective suppliers make no representations about the suitability of the information contained in this document for any purpose. Information is provided “as is” without warranty of any kind and is subject to change without notice. The entire risk arising out of its use remains with the recipient. In no event shall AGAT and/or its respective suppliers be liable for any direct, consequential, incidental, special, punitive, or other damages whatsoever (including without limitation, damages for loss of business profits, business interruption, or loss of business information), even if AGAT has been advised of the possibility of such damages

Privacy Policy and Data processing notice

Agat Software (“We”) are committed to protecting and respecting your privacy.
This privacy and security statement explains what measures we take to secure your data, the personal data we collect from you through our product, and how we use that data.
This notice sets out the basis on which personal data we collect from you, or that you provide to us, will be processed by us.
Please read the following document carefully to understand our views and practices regarding your personal data protection.

Who are we and what do we do

AGAT Software Development LTD is an innovative security provider specializing in security, compliance, governance, management, and productivity solutions for Unified Communication and Collaboration (UCC) services. SphereShield, AGAT`s flagship product, handles security threats related to authentication and identity as well as communication control, data protection, and content inspection.

Securing your data

All data is encrypted in transit to and from the internet, mitigating the risk of third parties accessing your data. Data can also be encrypted at rest if requested.
We store data in data centers around the globe in accordance with the need of our customers.
We also offer an on-premises deployment that keeps our customer`s data 100% secure and private according to their internal security guidelines.

Personal data that the product collects

We collect and host the following types of information:
For our product`s basic functionality, we store only metadata of the user information. The information we store includes the usernames, UPNs, and timestamps of sign-in. The content, conversations, and files are not stored unless eDiscovery is enabled. You can see the information saved in the User Table in the back-end database.
For our different added features:
In our Ethical Wall solution, A log stores all the incidents containing usernames of sender and receiver and time of incident.

For Ethical Wall for MS Teams, when using the CASB API approach we also store credentials for one user called the Compliance Administrator, which has temporary ownership of all channels for the duration of an action (Move, Copy, etc.)
In our DLP, A log table stores all the incidents containing usernames of sender and receiver and time of incident. Content of the incidents are stored in the archive if configured.
In our eDiscovery, A log table stores all the incidents containing usernames of sender and receiver and time of incident. Content of the incidents are stored in the archive.
In our MS Teams Management, A table stores all members, team names, channel names, member roles and team avatars. We also store credentials for one user called the Compliance Administrator, which has temporary ownership of all channels for the duration of an action (Move, Copy, etc.)
In our Virtual Assistant, A table stores the recording and transcript of recorded meetings as well as participant information and meeting metadata.
Available design topologies can be found following this link here

Cookie Policy:

How we use Cookies

We use cookies for a variety of reasons detailed below. In most cases there are no industry standard options for disabling cookies without completely disabling the functionality and features they add to this site. We recommend that you leave on all cookies if you are not sure whether you need them or not, in case they are used to provide a service that you use.

Disabling Cookies

You can prevent the setting of cookies by adjusting the settings on your browser (see your browser help for how to do this). Be aware that disabling cookies will affect the functionality of this and many other websites that you visit. Therefore, it is recommended that you do not disable cookies.

The Cookies we set

Login-related cookies: We use cookies when you are logged in so that we can remember the login status. This prevents you from having to log in every single time you visit a new page. These cookies are typically removed or cleared when you log out to ensure that you can only access restricted features and areas when logged in.

Third-Party Cookies

In some particular cases, we also use cookies provided by trusted third parties. The following section details which third-party cookies you might encounter through this site.

  • Login related third-party cookies – e.g. Microsoft Azure SSO

How we Store Your Personal Data

We act appropriately to ensure that all personal data is kept secure. This includes security measures to prevent personal data from being accidentally lost, used, or accessed in an unauthorized way, for the duration of your use of our services.
We make use of AWS (Amazon). The security procedures and standards that they use are publicly available.

How Long Do We Keep Your Personal Data

The customer can manage this in the SphereShield Maintenance Service. The Default setting is 30 days.
After 30 days personal data will be removed.
This procedure applies to all our products except for eDiscovery.

Can we Access Your Personal Data?

AGAT doesn`t access personal data without the permission of the customer.

Does AGAT use Personal Data?

AGAT does not use personal data.

Does AGAT disclose Personal Data?

AGAT does not sell, disclose or share data we collect and hold from you to any third parties.

Security and Retention

We make reasonable efforts to ensure a level of security appropriate to the risk associated with the processing of personal data. We maintain organizational, technical, and administrative measures designed to protect personal data within our organization against unauthorized access, destruction, loss, alteration, or misuse. If you have reason to believe that your interaction with us is no longer secure (for example, if you suspect that the security of your account has been compromised), please contact us immediately.

Changes to our Privacy Policy

We reserve the right to change this privacy policy at any time.

Contact Us

You can contact us at these following addresses
• Security and privacy concerns, please email sales@agatsoftware.com
• For Technical Support, please email support@agatsoftware.com
• For general information, please email sales@agatsoftware.com
• For questions and comments about this privacy policy, please email support@agatsoftware.com

Confidentiality

In connection with SphereShield and all AGAT products, the Receiving Party may be given or have access to certain confidential information of AGAT Software Development LTD or third parties (collectively, “Confidential Information”). Confidential Information is all information that AGAT Software Development LTD considers confidential or proprietary information of AGAT Software Development LTD or third-party sources, regardless of whether such information is marked as such by AGAT Software Development LTD. Confidential Information shall include, but is not limited to, information regarding the organization, operations, programs, activities, policies, procedures, practices, financial condition, trade secrets, membership lists, and standards of AGAT Software Development LTD, its members, or third parties. Confidential Information also shall include but is not limited to, unpublished or pre-release versions of AGAT Software Development LTD standards, white papers, and other documents and information, or internal use only or limited circulation documents and information.

The Receiving Party covenants and agrees not to disclose or permit to be disclosed any Confidential Information, and that the Receiving Party will not appropriate, photocopy, reproduce, or in any fashion replicate any Confidential Information without the prior written consent of AGAT Software Development LTD. The Receiving Party agrees that any disclosure of Confidential Information in violation of this Agreement shall cause immediate and substantial damage to AGAT Software Development LTD and to any parties that provided the Confidential Information to AGAT Software Development LTD. The Receiving Party agrees to use reasonable efforts to maintain the confidentiality of the Confidential Information and agrees not to use any Confidential Information for its own benefit or that of a third party unless authorized in advance in writing by AGAT Software Development LTD. Confidential Information shall not include information that enters the public domain through no fault of the Receiving Party or which the Receiving Party rightfully obtains from a third party without comparable restrictions on disclosure or use.

Terms and Conditions

END-USER LICENSE AGREEMENT/Terms and Conditions FOR SphereShield.
SphereShield includes Admin Portal, CASB Adaptor, Bastion proxy and other modules in the suite.
IMPORTANT
PLEASE READ THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT CAREFULLY BEFORE CONTINUING WITH THIS PROGRAM INSTALL: AGAT Software Development End-User License Agreement (“EULA”) is a legal agreement between you (either an individual or a single entity) and AGAT Software Development, for the AGAT Software Development software product(s) identified above which may include associated software components, media, printed materials, and “online” or electronic documentation (“SOFTWARE PRODUCT”) and support of any kind (mail/phone/remote sessions).
By installing, copying, or otherwise using the SOFTWARE PRODUCT, you agree to be bound by the terms of this EULA. This license agreement represents the entire agreement concerning the program between you and AGAT Software Development, (referred to as “licenser”), and it supersedes any prior proposal, representation, or understanding between the parties.
If you do not agree to the terms of this EULA, do not install or use the SOFTWARE PRODUCT.
The SOFTWARE PRODUCT is protected by copyright laws and international copyright treaties, as well as other intellectual property laws and treaties. The SOFTWARE PRODUCT is licensed, not sold, and it remains AGAT Software Development property
1. GRANT OF LICENSE.
The SOFTWARE PRODUCT is licensed as follows:
(a) Installation and Use.
AGAT Software Development grants you the right to install/use the SOFTWARE PRODUCT on your computer running a validly licensed copy/an active subscription of the operating system (and other products that the SOFTWARE PRODUCT relays on) for which the SOFTWARE PRODUCT was designed

(b) Backup Copies.
You may also make copies of the SOFTWARE PRODUCT as may be necessary for backup and archival purposes, for your sole use.

2. DESCRIPTION OF OTHER RIGHTS AND LIMITATIONS.
(a) Maintenance of Copyright Notices.
You must not remove or alter any copyright notices on any and all copies of the SOFTWARE PRODUCT.
(b) Distribution.
You may not distribute any copies of the SOFTWARE PRODUCT to third parties.

(c) Prohibition on Reverse Engineering, Decompilation, and Disassembly.
You may not reverse engineer, decompile, or disassemble the SOFTWARE PRODUCT, except and only to the extent that such activity is expressly permitted by applicable law notwithstanding this limitation.
(d) Rental.
You may not rent, lease, or lend the SOFTWARE PRODUCT.
(e) Support Services.
AGAT Software Development may provide you with support services related to the SOFTWARE PRODUCT (“Support Services”). Any supplemental software code provided to you as part of the Support Services shall be considered part of the SOFTWARE PRODUCT and subject to the terms and conditions of this EULA.
(f) Compliance with Applicable Laws.
You must comply with all applicable laws regarding use of the SOFTWARE PRODUCT.

3. TERMINATION
Without prejudice to any other rights, AGAT Software Development LTD may terminate this EULA if you fail to comply with the terms and conditions of this EULA. In such an event, you must uninstall/cancel the product from any computer and device and destroy all copies of the SOFTWARE PRODUCT in your possession.
4. COPYRIGHT
All titles, including but not limited to copyrights, in and to the SOFTWARE PRODUCT and any copies there of are owned by AGAT Software Development or its suppliers. All title and intellectual property rights in and to the content which may be accessed through the use of the SOFTWARE PRODUCT is the property of the respective content owner and may be protected by applicable copyright or other intellectual property laws and treaties. This EULA grants you no rights to use such content. All rights not expressly granted are reserved by AGAT Software Development.
5. NO WARRANTIES
AGAT Software Development expressly disclaims any warranty for the SOFTWARE PRODUCT or any part there of. The SOFTWARE PRODUCT is provided ‘As Is’ without any express or implied warranty of any kind, including but not limited to any warranties of merchantability, no infringement, or fitness of a particular purpose. AGAT Software Development does not warrant or assume responsibility for the accuracy or completeness of any information, text, graphics, links or other items contained within the SOFTWARE PRODUCT. AGAT Software Development makes no warranties respecting any harm that may be caused by the transmission of a computer virus, worm, time bomb, logic bomb, or other such computer program. AGAT Software Development further expressly disclaims any warranty or representation to Authorized Users or to any third party. 

6. LIMITATION OF LIABILITY
IN NO EVENT SHALL AGAT SOFTWARE DEVELOPMENT BE LIABLE FOR ANY DEMAGES, INCLUDING PERSONAL INJURY OR ANY INCIDENTAL, SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES WHATSOEVER, INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, LOSS OF DATA, BUSINESS INTERRUPTION OR ANY OTHER COMMERCIAL OR PRIVATE DAMAGES OR LOSSES, ARISING OUT OF OR RELATED TO YOUR USE OR INABILITY TO USE THE SOFTWARE PRODUCT OR ANY PART THEREOF, HOWEVER CAUSED, REGARDLESS OF ANY THEORY OF LIABILITY (CONTRACT, TORT OR OTHERWISE) AND EVEN IF AGAT SOFTWARE DEVELOPMENT DIRECTLY OR INDIRECTLY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

AGAT Software Development shall have no liability with respect to the content of the SOFTWARE PRODUCT or any part there of, including but not limited to errors or omissions contained therein, libel, infringements of rights of publicity, privacy, trademark rights, business interruption, personal injury, any loss of privacy, moral rights or the disclosure of confidential information.

IN NO EVENT SHALL AGAT Software Development’s TOTAL LIABILITY TO YOU FOR ALL DAMAGES EXCEED THE AMOUNT YOU HAVE PAID FOR THE SOFTWARE PRODUCT.

 

Appendix A

Technical and organizational measures are taken by AGAT to protect and secure any personal information that is processed. Below is a list of policies that AGAT Software has implemented. The policies can be provided in redacted form upon request.

Security and Privacy Statement

8329-R1

Access Control Policy

8331-R1

Acceptable Use Policy

8332-R1

Backup and Restoration Policy

8333-R1

Business Continuity and Disaster Recovery Policy

8334-R1

Change Management Policy

8335-R1

Corporate Ethics Policy

8336-R1

Customer Support and SLA Policy

8337-R1

Data Retention and Disposal Policy

8338-R1

Incident Management Policy

8339-R1

Information Classification Policy

8340-R1

Information Security Policy

8341-R1

Key Management and Cryptography Policy

8342-R1

Network Security Policy

8343-R1

Personnel Security Policy

8344-R1

Risk Assessment Policy

8345-R1

Server Security Policy

8346-R1

Software Development Policy

8347-R1

Vendor Management Policy

8348-R1

Vulnerability and Penetration Testing Management Policy

8349-R1

Workstation and Mobile Devices Policy

8350-R1

Refund Policy

8351-R1