These Terms were last modified on May 12, 2023.
These Terms of Service (“ToS” or “Agreement”) are made and entered into by and between Different Dev LLC (“Provider” or “Different Dev”) and the business entity agreeing to these terms (“Customer” or “You”). The Different Dev Terms of Service are located at https://DifferentDev.com/tos. Different Dev and Customer may each be referred to as Party and collectively as Parties.
This Agreement is effective as of the date Customer signs a Statement of Work to accept the Agreement (the “Effective Date”). If You are accepting on behalf of Customer, You represent and warrant that: (i) You have full legal authority to bind Customer or You personally to this Agreement; (ii) You have read and understand this Agreement; and (iii) You agree, on behalf of Customer, to this Agreement. If You do not have the legal authority to bind Customer, please do not click to accept. This Agreement governs Customer’s access to and use of the Provider’s Services, and in the event there is any conflict between the ToS and any Statement of Work for Goods and Services, then the terms of the ToS prevail.
1. Provision of the Services.
Subject to this Agreement, during the Term, Customer may use the Services described the mutually executed Statement of Work . But Customer may not sublicense or transfer these rights except as permitted under the Assignment section of the Agreement. Before Different Dev will provide Services under this ToS, Customer must agree in writing to a Statement of Statement of Work which state the specific Services, price, volume, and related timing.
2. Payment Term
2.1. Service Fees. Provider calculates and bill fees and charges monthly. Provider may bill You more frequently for fees accrued if Provider suspects that your account is fraudulent or at risk of non-payment. You will pay Provider the applicable fees and charges for use of the Service Offerings as described on the Provider Site using a credit card Provider supports. All amounts payable under this Agreement will be made without setoff or counterclaim, and without any deduction or withholding. Fees and charges for any new Service or new feature of a Service will be effective when Provider posts updated fees and charges on the Provider Site unless Provider expressly states otherwise in a notice. Provider may increase or add new fees and charges for any existing Services by giving You at least 30 days’ advance notice. Provider may charge You interest at the rate of 1.5% per month (or the highest rate permitted by law, if less) on all late payments.
2.2 Taxes. All fees and charges payable by You are exclusive of applicable taxes and duties, including VAT and applicable sales tax. You will provide Provider any information Provider reasonably requests to determine whether we are obligated to collect VAT from You, including your VAT identification number. If You are legally entitled to an exemption from any sales, use, or similar transaction tax, You are responsible for providing Provider with legally-sufficient tax exemption certificates for each taxing jurisdiction. Provider will apply the tax exemption certificates to charges under your account occurring after the date Provider receives the tax exemption certificates. If any deduction or withholding is required by law, You will notify Provider and will pay Provider any additional amounts necessary to ensure that the net amount that Provider receives, after any deduction and withholding, equals the amount Provider would have received if no deduction or withholding had been required. Additionally, You will provide Provider with documentation showing that the withheld and deducted amounts have been paid to the relevant taxing authority.
2.3 Invoice Disputes & Refunds. To the fullest extent permitted by law, Customer waives all claims relating to Fees unless claimed within 60 days after charged (this does not affect any Customer rights with its credit card issuer). Refunds (if any) are at the discretion of Provider and will only be in the form of credit for the Services. Nothing in this Agreement obligates Provider to extend credit to any Party.
2.4 Delinquent Payments. Late payments may bear interest at the rate of 1.5% per month (or the highest rate permitted by law, if less). Provider reserves the right to suspend Customer’s Account, for any late payments.
3. Customer Obligations.
3.1 Compliance. Customer is solely responsible for its Applications, Projects, and Customer Data and for making sure its Applications, Projects, and Customer Data comply with the AUP. Provider reserves the right to review the Application, Project, and Customer Data to ensure Customer’s compliance with the AUP. Customer is responsible for ensuring all End Users comply with Customer’s obligations under the AUP, and the restrictions in Sections 3.3 and 3.5 below.
3.2 Privacy. Customer will protect the privacy and legal rights of its End Users under all applicable laws and regulations, which includes a legally adequate privacy notice communicated from Customer. Customer may have the ability to access, monitor, use, or disclose Customer Data submitted by End Users through the Services. Customer will obtain and maintain any required consents from End Users to allow Customer’s access, monitoring, use and disclosure of Customer Data. Further, Customer will notify its End Users that any Customer Data provided as part of the Services will be made available to a third party as part of Provider providing the Services.
3.3 Restrictions. Customer will not, and will not allow third parties under its control to: (a) distribute bulk email, unsolicited commercial email, or any form of spam or phishing emails; (b) copy, modify, create a derivative work of, reverse engineer, decompile, translate, disassemble, or otherwise attempt to extract any or all of the source code of the Services (subject to Section 3.4 below and except to the extent such restriction is expressly prohibited by applicable law); (c) use the Services for High Risk Activities; (d) sublicense, resell, or distribute any or all of the Services separate from any integrated Application; (e) create multiple Applications, Accounts, or Projects to simulate or act as a single Application, Account, or Project (respectively) or otherwise access the Services in a manner intended to avoid incurring Fees; (f) process or store any Customer Data that is subject to the International Traffic in Arms Regulations maintained by the Department of State. Unless otherwise specified in writing by Provider, Provider does not intend uses of the Services to create obligations under HIPAA, and makes no representations that the Services satisfy HIPAA requirements. If Customer is (or becomes) a Covered Entity or Business Associate, as defined in HIPAA, Customer will encrypt all Customer Protected Health Information (as defined in HIPAA) in transit and at rest and Provider shall have no obligation to verify Customer’s compliance with its of encryption of Customer’s Protected Health Information.
3.4 Third Party Components. Third party components (which may include open source software) of the Services may be subject to separate license agreements. To the limited extent a third party license expressly supersedes this Agreement, that third party license instead governs Customer’s agreement with Provider for the specific included third party components of the Services, or use of the Services (as may be applicable).
3.5 Documentation. Provider may provide Documentation for Customer’s use of the Services. The Documentation may specify restrictions (including attribution or HTML restrictions) on how the Applications may be built or the Services may be used and Customer will comply with any such restrictions specified.
3.6 Digital Millennium Copyright Act (“DMCA”) Policy. Provider provides information to help copyright holders manage their intellectual property online, but Provider cannot determine whether something is being used legally or not without their input. Provider responds to notices of alleged copyright infringement and terminates accounts of repeat infringers according to the process set out in the U.S. DMCA. If Customer thinks somebody is violating Customer’s or its End Users’ copyrights and wants to notify Provider, Customer can email Provider at [email protected] and provide all pertinent information.
4. Suspension and Removals.
4.1 Suspension/Removals. If Customer becomes aware that any Application, Project (including an End User’s use of a Project), or Customer Data violates the AUP, Customer will immediately suspend the Application or Project (if applicable), remove the applicable Customer Data or suspend access to an End User (as may be applicable). If Customer fails to suspend or remove as noted in the prior sentence, Provider may specifically request that Customer do so. If Customer fails to comply with Provider’s request to do so within 24 hours, then Provider may suspend Provider accounts of the applicable End Users, disable the Project or Application, and/or disable the Account (as may be applicable) until such violation is corrected.
4.2 Emergency Security Issues. Despite the foregoing, if there is an Emergency Security Issue, then Provider may automatically suspend the offending, Application, Project, or End User Account. Suspension will be to the minimum extent required, and of the minimum duration, to prevent or terminate the Emergency Security Issue. If Provider suspends an End User account, Application, Project, or the Customer Account, for any reason, without prior notice to Customer, at Customer’s request, Provider will provide Customer the reason for the suspension as soon as is reasonably possible.
5. Intellectual Property Rights; Use of Customer Data; Feedback.
5.1 Intellectual Property Rights. Except as expressly set forth in this Agreement, this Agreement does not grant either Party any rights, implied or otherwise, to the other’s content or any of the other’s intellectual property. As between the Parties, Customer owns all Intellectual Property Rights in Customer Data and the Application or Project (if applicable), and Provider owns all Intellectual Property Rights in the Services and Software.
5.2 Use of Customer Data. Provider may use Customer Data and Applications only to provide the Services to Customer and its End Users and to help secure and improve the Services. For instance, this may include identifying and fixing problems in the Services, enhancing the Services to better protect against attacks and abuse, and making suggestions aimed at improving performance or reducing cost. 5.3 Customer Feedback. If Customer provides Provider feedback or suggestions about the Services, then Provider may use that information without obligation to Customer, and Customer hereby irrevocably assigns to Provider all right, title, and interest in that feedback or those suggestions.
6. Technical Support Services.
6.1 By Customer. Customer is responsible for technical support of its Applications and Projects.
6.2 By Provider. Subject to payment of applicable support Fees, Provider will provide Technical Support Services (“TSS”) to Customer during the Term as described in a Statement of Work. Certain TSS levels include a minimum recurring Fee as described in the “Fees” definition below. If Customer downgrades its TSS level during any calendar month, Provider may continue to provide TSS at the same level and TSS Fees before the downgrade for the remainder of that month.
6.2.1 Support Request Submission.
184.108.40.206 Customer Efforts to Fix Errors. Prior to making a request to Provider, Customer will use reasonable efforts to fix any error, bug, and malfunction or network connectivity defect without escalation to Provider. Thereafter, a Customer Contact may submit a written request for technical support through the Provider for Work Support Center.
220.127.116.11 Characterization of Requests. Customer designates priority upon submission of Requests. Upon receiving a request, Provider will determine whether the request is a “Service Unusable,” “Standard Request” or a “Feature Request.” Any such determination made by Provider is final and binding on Customer. Provider reserves the right to change Customer’s priority designation if Provider believes that Customer’s designation is incorrect and will inform Customer of any such change in its response to the support Request. Customer may appeal any such reclassification to Provider’s Support management for review through any available support channel.
18.104.22.168 Procedures for Acknowledgement and Resolution of Requests. When making a Request, Customer will provide all requested diagnostic information and assist Provider Support Personnel as may be required to resolve a Request.
22.214.171.124 Request Acknowledgement. Provider may respond to a Request by acknowledging receipt of the Request. Customer acknowledges and understands that Provider may be unable to provide answers to, or resolve all, Requests.
126.96.36.199 Feature Requests. If Provider deems a Request to be a Feature Request, Provider will log such Request for consideration to add to a future update or release of the Services and will consider the matter closed. Provider is under no obligation to respond to or resolve any Feature Request or to include any such Feature Request in any future update or release.
188.8.131.52 Building Applications. For clarity, Provider will not have any obligation to write or build any Applications or write code to facilitate Applications.
6.2.2. Accessing Support
184.108.40.206 Designated Support Contacts. Customer will provide first-level support to End Users. Provider will provide second-level support to Customer only. If Customer wishes to change its Designated Contacts, it will notify Provider via the Provider for Work Support Center at least 5 Business Days prior to the change. If on the date these updated Guidelines were first posted Customer has more Designated Contacts than are set forth under the applicable Support level under Section 6.4 below, the current Contacts will continue to be allowed until the expiration of the current license term for the applicable Services under the Agreement.
220.127.116.11 Support Hours and Target Initial Response Times. Provider will process Requests during the Hours of Operation, unless otherwise indicated in these Guidelines. Any Requests received outside of the Hours of Operation will be logged and processed at the beginning of the next Business Day. Target initial response times are based on the subscribed support level.
6.2.3. Maintenance. To ensure optimal performance of the Services, Provider performs periodic Maintenance. In most cases, Maintenance will have limited or no negative impact on the availability and functionality of the Services. If Provider expects planned Maintenance to negatively affect the availability or functionality of the Services, Provider will use commercially reasonable efforts to provide at least seven days advance notice of the Maintenance. In addition, Provider may perform emergency unscheduled Maintenance at any time. If Provider expects such emergency unscheduled Maintenance to negatively affect the availability or functionality of the Services, Provider will use commercially reasonable efforts to provide advance notice of such Maintenance. Maintenance notices noted above will be provided via the Provider for Work Support Center.
6.3 Technical Support shall be provided by Different Dev to Customer upon Customer’s request at $250.00/hour 8am-5pm Central Time, Monday through Friday and $500.00/hour during all other times. To the extent Customer’s need for such technical support arises primarily as the result of Different Dev failure to perform the Services, such technical support shall be supplied by Different Dev at no charge to Customer.
6.4 Data Deletion Request. Customer may give Provider specific written authorization to delete specific Customer’s data stored on Provider’s systems.
7. Confidential Information. The recipient will not disclose the Confidential Information, except to Affiliates, employees, agents or professional advisors who need to know it and who have agreed in writing (or in the case of professional advisors are otherwise bound) to keep it confidential. The recipient will ensure that those people and entities use the received Confidential Information only to exercise rights and fulfill obligations under this Agreement, while using reasonable care to keep it confidential. Notwithstanding any provision to the contrary in this Agreement, the recipient may also disclose Confidential Information to the extent required by applicable Legal Process; provided that the recipient uses commercially reasonable efforts to: (i) promptly notify the other Party of such disclosure before disclosing; and (ii) comply with the other Party’s reasonable requests regarding its efforts to oppose the disclosure. Notwithstanding the foregoing, subsections (i) and (ii) above will not apply if the recipient determines that complying with (i) and (ii) could: (a) result in a violation of Legal Process; (b) obstruct a governmental investigation; and/or (c) lead to death or serious physical harm to an individual. As between the Parties, Customer is responsible for responding to all third party requests concerning its use and its End Users’ use of the Services.
8. Term and Termination.
8.1 Agreement Term. The Term of this Agreement will begin on the Effective Date for the initial term (“Initial Term”) as specified in the Statement of Work, and unless otherwise specified in a Statement of Work this Agreement shall renew for terms of 12 month thereafter (“Renewal Term”) unless a notice of termination is provided 30 days before the end of the Initial Term or Renewal Term, or the Agreement is terminated as set forth in Section 8 of this Agreement.
8.2 Termination for Breach. Either Party may terminate this Agreement for breach if: (i) the other Party is in material breach of the Agreement and fails to cure that breach within 30 days after receipt of written notice; (ii) the other Party ceases its business operations or becomes subject to insolvency proceedings and the proceedings are not dismissed within 90 days; or (iii) the other Party is in material breach of this Agreement more than two times notwithstanding any cure of such breaches. In addition, Provider may terminate any, all, or any portion of the Services or Projects, if Customer meets any of the conditions in Section 8.2(i), (ii), and/or (iii).
8.3 Termination for Inactivity. Provider reserves the right to terminate without notice to Customer the Services for inactivity, if, for a period exceeding 180 days, Customer: (a) has failed to access the Admin Console; (b) a Project has no active virtual machine or storage resources or an Application has not served any requests; or (c) no electronic bills are being generated.
8.4 Effect of Termination. If the Agreement is terminated, then: (i) the rights granted by one Party to the other will immediately cease; (ii) all Fees (including Taxes) owed by Customer to Provider are immediately due upon receipt of the final electronic bill; (iii) Customer will delete the Software, any Application, Instance, Project, and any Customer Data; and (iv) upon request, each Party will use commercially reasonable efforts to return or destroy all Confidential Information of the other Party.
8.5 Data Deletion after Termination. Following termination of this Agreement, and following all payments by Customer, Customer may give Provider specific written authorization to delete Customer’s data stored on Provider’s systems. Notwithstanding any provisions to the contrary, if Customer is at least 90 days delinquent in paying any fees under these ToS, following written notice by Provider to Customer, then Provider may delete all of Customer’s Data and Provider has no liability for any Customer Data following the written notice whatsoever.
9. Publicity. With the prior written approval of Provider, Customer is permitted to state publicly that it is a customer of the Services. If Customer wants to display Provider Brand Features in connection with its use of the Services, Customer must obtain written permission from Provider. Provider may include Customer’s name or Brand Features in a list of customers, online or in promotional materials. Provider may also verbally reference Customer as a customer of the Provider products or services that are the subject of this Agreement. Neither Party needs approval if it is repeating a public statement that is substantially similar to a previously-approved public statement. Any use of a Party’s Brand Features will inure to the benefit of the Party holding Intellectual Property Rights to those Brand Features. A Party may revoke the other Party’s right to use its Brand Features under this Section with written notice to the other Party and a reasonable period to stop the use.
10.1 Each Party represents and warrants that: (a) it has full power and authority to enter into the Agreement; and (b) it will comply with all laws and regulations applicable to its provision, or use, of the Services, as applicable. Provider warrants that it will provide the Services in accordance with the applicable SLA (if any).
10.2 Payment Card Industry (“PCI”) Compliance. Different Dev has been approved by a PCI Qualified Security Assessor (“QSA”) to be complaint with the PCI Data Security Standards (“DSS”). However, Customer is totally responsible for all software it uses for Customer’s Credit Card data including all account numbers, PIN numbers, addresses, and all related Personal Identifiable Information. 10.3 Personal Health Information (“PHI”). Customer shall not store any PHI on any of Services, unless Customer has notified Different Dev at least thirty (30) days in advance of PHI upload and Customer has signed Different Dev’s Business Associate Agreement (“BAA”) which shall then apply to such PHI. All Customer PHI shall be encrypted while stored by Customer.
10.3 Personal Health Information (“PHI”). Customer shall not store any PHI on any of Services, unless Customer has notified Different Dev at least thirty (30) days in advance of PHI upload and Customer has signed Different Dev’s Business Associate Agreement (“BAA”) which shall then apply to such PHI. All Customer PHI shall be encrypted while stored by Customer.
11. Disclaimer. EXCEPT AS EXPRESSLY PROVIDED FOR HEREIN, ALL SERVICES ARE PROVIDED “AS IS”, TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, PROVIDER AND ITS SUPPLIERS DO NOT MAKE ANY OTHER WARRANTY OF ANY KIND, WHETHER EXPRESS, IMPLIED, STATUTORY OR OTHERWISE, CUSTOMER BEARS THE ENTIRE RISK FOR USE OF SOFTWARE AND SERVICES EVEN CYBER INTRUSIONS INCLUDING, WITHOUT LIMITATION, MALWARE AND RANSOMWARE. INCLUDING WITHOUT LIMITATION WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR USE AND NON-INFRINGEMENT. PROVIDER AND ITS SUPPLIERS ARE NOT RESPONSIBLE OR LIABLE FOR THE DELETION OF OR FAILURE TO STORE ANY CUSTOMER DATA AND OTHER COMMUNICATIONS MAINTAINED OR TRANSMITTED THROUGH USE OF THE SERVICES. CUSTOMER IS SOLELY RESPONSIBLE FOR SECURING AND BACKING UP ITS APPLICATION, PROJECT, AND CUSTOMER DATA. NEITHER PROVIDER NOR ITS SUPPLIERS, WARRANTS THAT THE OPERATION OF THE SOFTWARE OR THE SERVICES WILL BE ERROR-FREE OR UNINTERRUPTED. NEITHER THE SOFTWARE NOR THE SERVICES ARE DESIGNED, MANUFACTURED, OR INTENDED FOR HIGH-RISK ACTIVITIES.
12. Limitation of Liability.
12.1 Limitation on Indirect Liability. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, NEITHER PARTY, NOR PROVIDER’S SUPPLIERS, WILL BE LIABLE UNDER THIS AGREEMENT FOR LOST REVENUES OR DIRECT, INDIRECT, SPECIAL, INCIDENTAL, CONSEQUENTIAL, EXEMPLARY, OR PUNITIVE DAMAGES, EVEN IF THE PARTY KNEW OR SHOULD HAVE KNOWN THAT SUCH DAMAGES WERE POSSIBLE AND EVEN IF DIRECT DAMAGES DO NOT SATISFY A REMEDY.
12.2 Limitation on Amount of Liability. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, NEITHER PARTY, NOR PROVIDER’S SUPPLIERS, MAY BE HELD LIABLE UNDER THIS AGREEMENT FOR MORE THAN THE AMOUNT PAID BY CUSTOMER TO PROVIDER DURING THE MONTH PRECEEDING THE EVENT GIVING RISE TO LIABILITY.
12.3 Exceptions to Limitations. These limitations of liability do not apply to breaches of confidentiality obligations, violations of a Party’s Intellectual Property Rights by the other Party, or indemnification obligations.
13.1 By Customer. Unless prohibited by applicable law, Customer will defend and indemnify Provider and its Affiliates against Indemnified Liabilities in any Third-Party Legal Proceeding to the extent arising from: (i) any Application, Project, Instance, Customer Data or Customer Brand Features; or (ii) Customer’s, or its End Users’, use of the Services in violation of the AUP.
13.2 By Provider. Provider will defend and indemnify Customer and its Affiliates against Indemnified Liabilities in any Third-Party Legal Proceeding to the extent arising solely from an Allegation that use of (a) Provider’s technology used to provide the Services (excluding any open source software) or (b) any Provider Brand Feature infringes or misappropriates the third party’s patent, copyright, trade secret, or trademark.
13.3 Exclusions. This Section 13 will not apply to the extent the underlying Allegation arises from:
a. the Indemnified Party’s breach of this Agreement;
b. modifications to the Indemnifying Party’s technology or Brand Features by anyone other than the Indemnifying Party;
c. combination of the Indemnifying Party’s technology or Brand Features with materials not provided by the Indemnifying Party; or
d. use of non-current or unsupported versions of the Services or Brand Features;
13.4 Conditions. Sections 13.1 and 13.2 will apply only to the extent:
a. The Indemnified Party has promptly notified the Indemnifying Party in writing of any Allegation(s) that preceded the Third-Party Legal Proceeding and cooperates reasonably with the Indemnifying Party to resolve the Allegation(s) and Third-Party Legal Proceeding. If breach of this Section 13.4(a) prejudices the defense of the Third-Party Legal Proceeding, the Indemnifying Party’s obligations under Section 13.1 or 13.2 (as applicable) will be reduced in proportion to the prejudice.
b. The Indemnified Party tenders sole control of the indemnified portion of the Third-Party Legal Proceeding to the Indemnifying Party, subject to the following: (i) the Indemnified Party may appoint its own non-controlling counsel, at its own expense; and (ii) any settlement requiring the Indemnified Party to admit liability, pay money, or take (or refrain from taking) any action, will require the Indemnified Party’s prior written consent, not to be unreasonably withheld, conditioned, or delayed.
a. If Provider reasonably believes the Services might infringe or misappropriate a third party’s Intellectual Property Rights, then Provider may, at its sole option and expense: (a) procure the right for Customer to continue using the Services; (b) modify the Services to make them non-infringing or non-misappropriating without materially reducing their functionality; or (c) replace the Services with a non-infringing or non-misappropriating, functionally equivalent alternative.
b. If Provider does not believe the remedies in Section 13.5(a) are commercially reasonable, then Provider may suspend or terminate Customer’s use of the impacted Services.
13.6 Sole Rights and Obligations. Without affecting either Party’s termination rights, this Section 13 states the Parties’ only rights and obligations under this Agreement for Intellectual Property Rights-related Allegations and Third-Party Legal Proceedings.
14. U.S. Federal Agency Users. The Services were developed solely at private expense and are commercial computer software and related documentation within the meaning of the applicable Federal Acquisition Regulation and agency supplements thereto.
15. Lien in Favor of Different Dev. Different Dev shall be entitled to all of the rights, benefits and privileges provided by and under Section 7.209 of the Uniform Commercial Code of the State of Texas.
16.1 Notices. All notices must be in writing and addressed to the other Party’s legal department and primary point of contact. The notice to Different Dev should be sent to: [email protected] or 1226 Main Street, Danbury, Texas 75534. Notice will be treated as given on receipt as verified by written or automated receipt or by electronic log (as applicable).
16.2 Assignment. Customer may not assign any part of this Agreement without the written consent of Provider, which will not be unreasonably withheld. If Provider agrees to an assignment only when: (a) the assignee has agreed in writing to be bound by the terms of this Agreement; (b) the assigning Party remains liable for obligations under the Agreement if the assignee defaults on them; and (c) the assigning Party has notified the other Party of the assignment. Any other attempt to assign is void.
16.3 Force Majeure. Neither Party will be liable for failure or delay in performance to the extent caused by circumstances beyond its reasonable control. Provider shall not be liable to Customer for anything beyond Provider’s reasonable control, including, without limitation, acts of any governmental body, war, insurrection, sabotage, armed conflict, embargo, fire, flood, strike or other labor disturbance, interruption of or delay in transportation, unavailability of or interruption or delay in telecommunications or third party services, virus attacks or hackers, cyber intrusions which may cause malware, ransomware, or related problems, failure of third party software (including, without limitation, e-commerce software, payment gateways, chat, statistics or free scripts) or inability to obtain raw materials, supplies, or power used in or equipment needed for provision of this Agreement.
16.4 No Agency. This Agreement does not create any agency, partnership or joint venture between the Parties.
16.5 No Waiver. Neither Party will be treated as having waived any rights by not exercising (or delaying the exercise of) any rights under this Agreement.
16.6 Severability. If any term (or part of a term) of this Agreement is invalid, illegal, or unenforceable, the rest of the Agreement will remain in effect.
16.7 No Third-Party Beneficiaries. This Agreement does not confer any benefits on any third party unless it expressly states that it does.
16.8 Intentionally omitted.
16.9 Equitable Relief. Nothing in this Agreement will limit either Party’s ability to seek equitable relief.
16.10 Governing Law. All claims arising out of or relating to this agreement or the services will be governed by Texas law, excluding that state’s conflict of laws rules, and will be resolved by arbitration in Brazoria County, Texas under the Commercial Rules of the American Arbitration Association (“AAA”) by one arbitrator who shall be selected by agreement of the Parties. If the Parties cannot agree on the arbitrator the AAA shall select the arbitrator. The arbitration shall be held within 6 months after the appointment of the arbitrator, during discovery each Party may take no more than 20 hours of depositions, and the arbitration hearing shall last no more than 1 day. The arbitration award may be submitted a federal or State courts of Dallas County, Texas for enforcement.
16.11 Amendments. Except as set forth in Section 1.7(b), any amendment must be in writing, signed by both Parties, and expressly state that it is amending this Agreement.
16.12 Survival. The following Sections will survive expiration or termination of this Agreement: 5, 7, 8.5, 12, 13, 15, and 16.
16.13 Entire Agreement. This Agreement sets out all terms agreed between the Parties and supersedes all other agreements between the Parties relating to its subject matter. In entering into this Agreement, neither Party has relied on, and neither Party will have any right or remedy based on, any statement, representation or warranty (whether made negligently or innocently), except those expressly set out in this Agreement. The terms located at a URL referenced in this Agreement and the Documentation are incorporated by reference into the Agreement. After the Effective Date, Provider may provide an updated URL in place of any URL in this Agreement.
16.14 Conflicting Terms. If there is a conflict between the documents that make up this Agreement, the documents will control in the following order: the Agreement, and the terms at any URL.
16.15 Insurance – Different Dev maintains insurance coverage as follows:
16.15.1 Business Automobile – commercial automobile liability insurance with a limit of liability of $1 million per occurrence and in the aggregate.
16.15.2 Commercial General Liability – commercial general liability, including products and completed operations, personal and advertising liability and property damage to property of others, with a limit of $1 million per occurrence, $2 million in the aggregate. This insurance is endorsed to add Customer as a Blanket Additional Insured, and to state that this policy is primary and non-contributory as to Customer’s insurance, if any.
16.15.3 Commercial Property – business personal property, including personal property of others and electronic data processing and media, at replacement cost value, subject to applicable deductibles. This policy also covers personal property in transit with a limit of liability of $500,000.
16.15.4 Cyber Liability – network and information security liability, as well as technology errors and omissions liability, with a limit of liability of $3 million dollars. This insurance adds Customer as a Blanket Additional Insured.
16.16 Blanket Additional Insured – Customer requests that in both the Cyber Liability and Commercial General Liability policies, Different Dev add it as a Blanket Additional Insured, subject to the terms and conditions of that coverage as set forth in each respective policy.
17.1 “Account” means Customer’s Provider account.
17.2 “Affiliate” means any entity that directly or indirectly Controls, is Controlled by, or is under common Control with a Party.
17.3 “Allegation” means an unaffiliated third Party’s allegation.
17.4 “Application(s)” means any web or other application Customer creates using the Services, including any source code written by Customer to be used with the Services, or hosted in an Instance.
17.5 “AUP” means the acceptable use policy set forth here for the Services: Acceptable Use Policy
17.6 “Brand Features” means the trade names, trademarks, service marks, logos, domain names, and other distinctive brand features of each Party, respectively, as secured by such Party from time to time.
17.7 “Confidential Information” means information that one Party (or an Affiliate) discloses to the other Party under this Agreement, and which is marked as confidential or would normally under the circumstances be considered confidential information. It does not include information that is independently developed by the recipient, is rightfully given to the recipient by a third party without confidentiality obligations, or becomes public through no fault of the recipient. Customer Data is considered Customer’s Confidential Information.
17.8 “Control” means control of greater than fifty percent of the voting rights or equity interests of a Party.
17.9 “Customer” means a company, business, or individual who enters into this Agreement.
17.10 “Customer Data” means content provided, transmitted, or displayed via the Services by Customer or its End Users; but excluding any data provided when Customer creates its general Provider account (under an email address provided under the “Provider Apps” product line).
17.11 “Documentation” means the Provider documentation (as may be updated from time to time) in the form generally made available by Provider to its customers for use.
17.12 “Emergency Security Issue” means either: (a) Customer’s or its End User’s use of the Services in violation of the AUP, which could disrupt: (i) the Services; (ii) other Customers’ or its End Users’ use of the Services; or (iii) the Provider network or servers used to provide the Services; or (b) unauthorized third party access to the Services.
17.13 “End Users” means the individuals that Customer permits to use the Services, Application, or Project.
17.14 “Fees” means the applicable fees for each Service and any applicable Taxes.
17.15 “High Risk Activities” means uses such as the operation of nuclear facilities, air traffic control, or life support systems, where the use or failure of the Services could lead to death, personal injury, or environmental damage.
17.16 “HIPAA” means the Health Insurance Portability and Accountability Act of 1996 as it may be amended from time to time, and any regulations issued thereunder.
17.17 “Indemnified Liabilities” means any (i) settlement amounts approved by the Indemnifying Party; and (ii) damages and costs finally awarded against the Indemnified Party and its Affiliates by a court of competent jurisdiction.
17.18 “Instance” means a virtual machine instance, configured and managed by Customer, which runs on the Services. Instances are more fully described in the Documentation.
17.19 “Intellectual Property Rights” means current and future worldwide rights under patent, copyright, trade secret, trademark, and moral rights laws, and other similar rights.
17.20 “Legal Process” means a data disclosure request made under law, governmental regulation, court order, subpoena, warrant, governmental regulatory or agency request, or other valid legal authority, legal procedure, or similar process.
17.21 “Managed Service Provider” means a company which provides outsourcing services to Third Parties which have no contractual relationship to Provider.
17.22 “Statement of Work” means any written agreement between Customer and Provider for specific Services under the ToS that may include volume, pricing, and specific requirements.
17.23 “Project” means a grouping of computing, storage, and API resources for Customer, and via which Customer may use the Services. Projects are more fully described in the Documentation.
17.24 “Software” means any downloadable tools, software development kits or other such proprietary computer software provided by Provider in connection with the Services, which may be downloaded by Customer, and any updates Provider may make to such Software from time to time.
17.25 “Taxes” means any duties, customs fees, or taxes (other than Provider’s income tax) associated with the purchase of the Services, including any related penalties or interest.
17.26 “Term” has the meaning set forth in Section 8 of this Agreement.
17.27 “Third Party” means a company or organization which may have a contractual relationship with the Provider or Customer.
17.28 “Third-Party Legal Proceeding” means any formal legal proceeding filed by an unaffiliated Third Party before a court or government tribunal (including any appellate proceeding).
17.29 “Updates” means the periodic software updates provided by Provider to Customer from time to time. Updates are designed to improve, enhance and further develop the Services and may take the form of bug fixes, enhanced functions, new software modules and completely new versions.