STANDARD TERMS AND CONDITIONS
THE LICENSOR, CYBERNATICS PTE LTD PROVIDES LICENSED SOFTWARE TO
LICENSEE (CUSTOMER) AS DEFINED IN CLAUSE 1 BELOW UNDER THIS END
USER LICENSE AGREEMENT (THE “AGREEMENT”). THIS AGREEMENT GOVERNS
LICENSEE’S INSTALLATION AND USE OF THE VERSION OF THE LICENSED
SOFTWARE IDENTIFIED IN THE APPLICABLE PURCHASE ORDER, OR IF NOT
ACQUIRED VIA A PURCHASE ORDER, LICENSEE’S INSTALLATION OR USE OF THE
LICENSED SOFTWARE CONSTITUTES ACCEPTANCE OF THIS AGREEMENT.
PLEASE READ THIS AGREEMENT CAREFULLY BEFORE PROCEEDING, AS IT MAY
CONTAIN RESTRICTIONS ON YOUR USE OF THE SOFTWARE. THIS AGREEMENT
SUPERSEDES AND CONTROLS OVER ANY OTHER TERMS PROVIDED TO
LICENSEE REGARDING LICENSEE’S USE OF THE LICENSED SOFTWARE,
WHETHER WRITTEN OR ORAL, AS PART OF A SIGNED AGREEMENT (INCLUDING,
BUT NOT LIMITED TO, MASTER AGREEMENTS AND PORTFOLIO TERMS, UNLESS
A DIFFERENT AGREEMENT IS EXPRESSLY REFERENCED IN A PURCHASE ORDER
OR EXECUTED BY LICENSOR AND LICENSEE SPECIFYING THAT IT APPLIES TO
THE VERSION OF THE LICENSED SOFTWARE TO WHICH THIS AGREEMENT
RELATES), A CLICK-WRAP AGREEMENT PROVIDED WITH THE LICENSED
SOFTWARE OR OTHERWISE (SUCH TERMS REFERRED TO AS THE “OTHER
AGREEMENT”), EVEN IF SUCH OTHER AGREEMENT WAS EMBEDDED WITHIN
PREVIOUSLY LICENSED SOFTWARE.
LICENSOR RESERVES THE RIGHT TO UPDATE, AMEND, AND/OR MODIFY THIS
AGREEMENT FROM TIME TO TIME, AND MAY INCLUDE SUCH UPDATED
AGREEMENT WITH OR EMBEDDED IN FUTURE VERSIONS OF THE LICENSED
PLEASE DIRECT ANY QUESTIONS TO THE CYBERNATICS PTE LTD’S LEGAL
DEPARTMENT AT LEGAL@FOCUS.SG.
ENTERING INTO THIS AGREEMENT DOES NOT CONSTITUTE A SALES
TRANSACTION. THE SALE OF A LICENSE TO SOFTWARE PRODUCTS TAKES
PLACE UNDER PURCHASE ORDER(S) WHICH (UNLESS OTHERWISE STATED IN
THE PURCHASE ORDER) INCORPORATE THE TERMS OF THIS AGREEMENT.
1. Parties to this Agreement
1.1. “Cybernatics Pte Ltd”, “we”, “us” or “our” means Cybernatics Pte Ltd or its Affiliate(s)
who execute or assent to the Purchase Order. “You” or “your” means the Customer who is the
licensee who signs and agrees to the services specified in the Purchase Order (where
applicable) as defined in clause 1.2 below.
1.2. The specific cybersecurity software, software-as-a-service, hardware and/or services
for which you have contracted including but not limited to any security information and event
management or SIEM-related services (the “Cybersecurity Services”) will be identified in a
print or electronic document identified as Purchase Order or such other named form which
serves the same purpose as a Purchase Order (the “Purchase Order(s)”). Such Purchase Order,
where applicable, may identify each transaction’s contracting entities, pricing and related
provisions and may reference or link to supplemental terms, agreements or policies and
references to Purchase Order includes such documents. The Purchase Order, together with
these Cybersecurity Services Terms and Conditions (“Cybersecurity Terms and Conditions”),
form a single contract (the “Agreement”).
1.3 These Cybersecurity Terms and Conditions take precedence over any other terms in the
Agreement with regards to Cybersecurity Services and any conflicts shall be resolved in favour
of these Cybersecurity Terms and Conditions.
1.4 For purposes of these Cybersecurity Terms and Conditions, an “Event” means any act
or attempt to disrupt, misuse, or gain unauthorised access to any system or electronic facilities
or operations that results in a loss, alteration or disclosure of data, system downtime or
degradation or loss of operation or services relating to the Cybersecurity Services.
2. Grant of License
2.1 Subject to the terms and conditions of this Agreement, the Licensor hereby grants you,
the Licensee a non-exclusive, non-transferable right to access and use the Cybersecurity
Services as provided by the Licensor under the Purchase Order. This license is solely for the
Licensee’s internal use and is limited to the duration of the subscription or service period
specified in the Purchase Order.
2.2 You as the Licensee, agree not to:
a. Copy, reproduce, modify, distribute, or create derivative works based on the software
application, except as expressly authorised by the Licensor;
b. Reverse engineer, decompile, disassemble, or attempt to derive the source code of the
c. Use the software application in any manner that violates applicable laws, regulations, or the
rights of third parties;
d. Share, transfer, sublicense, or assign the license or access to the software application without
prior written consent from the Licensor.
Shared Responsibility, Remedy, and Warranties.
3.1 You acknowledge and agree that Cybernatics Pte Ltd provides professional judgment,
technical expertise, and advice to you regarding your cyber risk management program. You
acknowledge and agree that you recognise your own responsibility (as further detailed below
in 3.3 of this Agreement) with respect to your cyber risk management program and that
Cybernatics Pte Ltd provides highly integrated Cybersecurity Services to you. As ultimate
system performance and security are subject to multiple factors outside of our control, we do
not warrant or guarantee the Cybersecurity Services will prevent or mitigate every Event. You
agree and understand that we cannot and do not prevent Events (either actual or attempted), or
that by working with us, you will not experience such actual or attempted Events. Instead, you
agree and expressly acknowledge that you must participate in your own defence and work with
us to create a prioritised, flexible, repeatable, performance-based, and cost-effective approach
to establish an ongoing process to identify, assess, and manage cyber risk throughout your
enterprise. Though this Agreement specifies certain responsibilities that you must accept, any
such list should not be considered absolute. Our sole liability and your exclusive remedy in
respect of an Event is: (a) if the Event was caused by defective products or services
provided by us, replacement or repair of defective products, or re-performance of
defective services under the applicable warranty in the Agreement.
Cybernatics Pte Ltd’s Representations and Warranties
3.2 Cybernatics Pte Ltd represents and warrants (i) that it will perform the Cybersecurity
Services using personnel of required skill, experience and qualifications in a professional
manner leveraging generally recognised industry standards for similar services and will devote
adequate resources to meet its obligations under this Schedule; and (ii) that the Cybersecurity
Services will be made available and performed on a professional, best effort basis. Cybernatics
Pte Ltd makes no guarantees regarding the effectiveness of the Cybersecurity Services with
respect to your overall cybersecurity program due to Cybernatics Pte Ltd’s lack of control over
numerous aspects of your operations, personnel, and Information Systems. Cybernatics Pte Ltd
is thus not responsible or liable for any issues, problems, unavailability, delay, or Events arising
from or related to: (i) force majeure events as described below; (ii) the public internet and
communications networks; (iii) data, software, hardware, services, telecommunications,
infrastructure, or networking equipment not provided by us or acts or omissions of third parties
you retain; (iv) your negligence or failure to use the latest version or follow published
documentation; (v) modifications or alterations not made by us or services we do not perform;
(vi) breach, loss or corruption of data; (vii) unauthorised access via your credentials; or (viii)
your failure to use commercially reasonable administrative, physical and technical safeguards
to protect your systems, facilities, operations or data or follow industry-standard or other
mutually agreed upon security practices.
Your Representations and Warranties.
3.3 You represent and warrant that you will (i) use commercially reasonable administrative,
physical and technical safeguards to protect your systems, facilities, operations or data or
follow industry-standard or other mutually agreed upon security practices; (ii) update to the
latest version of relevant software and follow the current documentation for the same; (iii)
make no modifications or alterations to any hardware or software comprising the Cybersecurity
Services without our express written permission; (iv) designate two (2) or more employees,
executives, or agents (the “Contact Person(s)”) who you guarantee will respond to any Events
and take recommended actions to mitigate harm to your network; (v) develop and adopt a
written governance, risk and compliance policy or policies, approved by a senior officer or
your board of directors (or an appropriate committee thereof) or equivalent Singapore body,
setting forth your policies and procedures for the protection of its information systems and non-
public information stored on those information systems (the “Cybersecurity Policy”); (vi)
develop and adopt written incident response plan (“IRP”) that is exercised and/or practiced
with key scenario driven evaluations on at least an annual basis; and (vii) provide us with copies
of your Cybersecurity Policy, IRP, and business continuity or disaster recovery plans upon our
4. Third-Party Products.
To the extent that we provide, use and deploy third-party products, software, hardware, or
services (“Third- Party Products”) as notified to you and agreed by you in relation to the
Cybersecurity Services, then notwithstanding any other terms agreed to between us, you agree
that all Third-Party Products are provided subject to the Third-Party Product supplier’s terms
and conditions (including any applicable software license terms) in effect at the time such
Third-Party Products are delivered to you. We have no liability with respect to the
performance or non-performance of such Third-Party Products, including but not
limited to any liability arising out of any Events caused by defects or failures of such
Cybernatics Pte Ltd shall defend, indemnify, and hold you harmless from and against any and
all losses, damages and costs (including reasonable attorneys’ fees) incurred in connection with
any third-party claim, action, suit, or proceeding (each a “Claim”) made or brought against you
arising out of or related to any claim that the Cybersecurity Services, when used in accordance
with this Agreement and documentation, infringes any valid patent, copyright, or trademark of
a third-party. Cybernatics Pte Ltd shall have no indemnification obligation whatsoever that
arises out of or is related to any claims arising from the combination or use of the Cybersecurity
Services with any other software, products, hardware, materials, and/or processes not provided
by Cybernatics Pte Ltd and/or your failure to adhere to and comply with all documentation and
other specifications and instructions; and/or your modification of any component of the
Cybersecurity Services, or any other unauthorised or unapproved use of the Cybersecurity
Services. If any aspect of the Cybersecurity Service becomes, or in Cybernatics Pte Ltd’s
opinion may become, subject to a Claim, Cybernatics Pte Ltd shall at its option and at its own
expense: (a) procure for you the right to continue using the Service; (b) replace or modify the
relevant component of the Cybersecurity Service with a functionally equivalent non-infringing
substitute service; or (c) modify the Cybersecurity Services so they become non-infringing
while remaining functionally equivalent. THIS CLAUSE 5 SETS FORTH CYBERNATICS
PTE LTD’S SOLE LIABILITY, AND CUSTOMER’S EXCLUSIVE REMEDY, FOR
INTELLECTUAL PROPERTY INFRINGEMENT RELATED TO THE CYBERSECURITY
SERVICES. THIS SHALL BE THE SOLE INDEMNIFICATION OBLIGATION FOR THE
CYBERSECURITY SERVICES REGARDLESS OF ANY ADDITIONAL OR SEPARATE
AGREEMENTS BETWEEN YOU AND CYBERNATICS PTE LTD.
6. Limitation of Liability
WITH RESPECT TO ALL CYBERSECURITY SERVICES(S) AND EVENTS, WE ARE
NOT LIABLE FOR INDIRECT, INCIDENTAL, EXEMPLARY, PUNITIVE, SPECIAL OR
CONSEQUENTIAL DAMAGES, INCLUDING LOST PROFITS AND REVENUES. OUR
CUMULATIVE AND AGGREGATE LIABILITY TO YOU WITH RESPECT TO ALL
CYBERSECURITY SERVICES AND ANY CYBERSECURITY EVENT IS LIMITED TO
DIRECT DAMAGES IN AN AMOUNT NOT TO EXCEED TO THE CONTRACTED
AMOUNT OF THE CYBERSECURITY SERVICES IN QUESTION. THE LIMITATIONS
AND EXCLUSIONS APPLY TO ALL CLAIMS AND CAUSES OF ACTION ARISING
OUT OF OR IN RELATION TO THE AGREEMENT REGARDLESS OF FORM. THIS CAP
SHALL APPLY TO A BREACH OF YOUR CONFIDENTIAL INFORMATION CAUSED
BY LOSS, CORRUPTION, OR ACCESS TO YOUR DATA.
You retain all ownership or other rights over data that you or persons acting on your behalf
input, upload, transfer, or make available in relation to, or which is collected from, your devices
or equipment (“Input Data”). We have the right to duplicate, analyse, transfer, modify, and
otherwise use Input Data to provide, improve, or develop our offerings. Input Data may also
be used by us in connection with your use of the portal. You have sole responsibility for
obtaining all consents and permissions (including providing notices to Users or third parties)
and satisfying all requirements necessary to permit our use of Input Data. You will, at your
cost and expense, defend, indemnify and hold harmless us and our Affiliates, subcontractors,
and licensors from and against all losses, awards, and damages (including lawyers’ fees) arising
out of claims by third parties related to our possession, processing, or use of Input Data in
accordance with the Agreement or you or Users’ infringement, misappropriation, or violation
of our or a third party’s IPR. Unless agreed in writing, we do not archive Input Data for your
future use. You acknowledge and agree that your Input Data may be transferred outside the
country or territory.
8. Intellectual Property Rights
All right, title, and interest, including, but not limited to, all intellectual property rights
(including copyrights, trademarks, and patents), proprietary rights (including trade secrets and
know-how), throughout the world (“IPR”) and all derivative works, modifications, and
improvements, are retained by us and are our confidential information. We shall own all IPR
that is: (i) developed by us or our Affiliates by processing or analysis of Input Data (excluding
Input Data itself but including derived data that is sufficiently different from Input Data so that
Input Data cannot be identified from analysis or further processing of such derived data); or
(ii) generated through support, monitoring, or other observation of your and your Users’ use of
the Cybersecurity services.
We may use open-source software (“OSS”) and to the extent required by the licenses covering
OSS, the terms of such licenses will apply to OSS in lieu of this Agreement. To the extent the
licenses applicable to OSS: (i) prohibit any restriction with respect to such OSS, such restriction
will not apply to such OSS; and (ii) require us to make an offer to provide source code or related
information in connection with the OSS, such offer is hereby made. If required by our written
contract with them, certain of our licensors are third-party beneficiaries of the Agreement.
10. Warranty and Disclaimer
EXCEPT AS OTHERWISE EXPRESSLY SET FORTH IN THE AGREEMENT, SIEM, THE
PORTAL, AND SUPPORT ARE PROVIDED WITH NO WARRANTIES OR
REPRESENTATIONS OF ANY KIND, WHETHER EXPRESS, IMPLIED, OR
STATUTORY. TO THE MAXIMUM EXTENT PERMITTED BY LAW, WE EXPRESSLY
DISCLAIM ALL WARRANTIES AND REPRESENTATIONS INCLUDING
MERCHANTABILITY AND FITNESS FOR PURPOSE. WE DO NOT WARRANT THAT
SIEM WILL MEET YOUR REQUIREMENTS, OR THAT IT WILL OPERATE WITHOUT
INTERRUPTION, OR BE ERROR FREE.
11. Handling and Protection of Personal Data
11.1 Compliance with PDPA. We shall comply with all our obligations under the Personal
Data Protection Act 2012 in relation to you and under this Clause 11 only if we have access to
and are in control of any Customer’s personal data that are provided to us at the Customer’s
11.2 Process, Use and Disclosure. We shall only process, use or disclose the Customer’s
a) strictly for the purposes of fulfilling its obligations and providing the services required
under this Agreement;
b) with the Customer’s prior written consent; or
c) when required by law or an order of court, but shall notify the Customer as soon as
practicable before complying with such law or order of court at its own costs.
11.3 Transfer of personal data outside Singapore. We shall not transfer Customer’s Personal
Data to a place outside Singapore without the Customer’s prior written consent. If the Customer
provides consent, we shall provide a written undertaking to the Customer that the Customer’s
Personal Data transferred outside Singapore will be protected at a standard that is comparable
to that under the PDPA. If we transfer Customer’s Personal Data to any third party overseas,
we shall procure the same written undertaking from such third party.
11.4 Security Measures
11.4.1 We shall protect Customer’s Personal Data in our control or possession by making
reasonable security arrangements(including, where appropriate, physical, administrative,
procedural and information & communications technology measures) to prevent:
a) unauthorised or accidental access, collection, use, disclosure, copying, modification,
disposal or destruction of Customer’s Personal Data, or other similar risks; and
b) the loss of any storage medium or device on which personal data is stored.
For the purposes of this Agreement, “reasonable security arrangements” include arrangements
set out below which shall not be varied without the Customer’s prior written consent:
- Operating Systems to be hardened to CIS standards;
- Communications between agent and manager are encrypted;
- Network VAPT will be conducted on the implementation and final solution
before going live.
11.4.2 We shall only permit the authorised personnel to access Customer’s Personal Data on a
need to know basis.
11.5 Access to Personal Data. We shall provide the Customer with access to the Customer’s
Personal Data that we have in our possession or control, as soon as practicable upon
Customer’s written request.
11.6 Accuracy and Correction of Personal Data. Where the Customer provides Customer’s
Personal Data to us, the Customer shall make reasonable effort to ensure that the
Customer’s Personal Data is accurate and complete before providing the same to us.
We shall put in place adequate measures to ensure that the Customer’s Personal Data in
our possession or control remain or is otherwise accurate and complete. In any case, we
shall take steps to correct any errors in the Customer’s Personal Data, as soon as
practicable upon the Customer’s written request.
11.7 Retention of Personal Data.
11.7.1 We shall not retain Customer’s Personal Data (or any documents or records
containing Customer’s Personal Data, electronic or other wise) for any period of time
longer than is necessary to serve the purposes of this Agreement.
11.7.2 We shall, upon the request of the Customer:
- return to the Customer, all Customer’s Personal Data; or
- delete all Customer’s Personal Data in its possession,
and, after returning or deleting all Customer’s Personal Data, provide the Customer with
written confirmation that it no longer possesses any Customer’s Personal Data. Where
applicable, we shall also instruct all third parties to whom it has disclosed Customer’s Personal
Data for the purposes of this Agreement to return to us or delete, such Customer’s Personal
11.8 Notification of Breach. We shall immediately notify the Customer when we become aware
of a breach of any of its obligations in Clauses 11.2 to 11.7.
12 General Terms and Conditions
12.1 Notices and Correspondence
All notices and communications by us to you may be sent or despatched to you by delivery,
post, e-mail or facsimile transmission or any other means deemed appropriate by us to your
e-mail or other address or facsimile number appearing in any of your record maintained by
us or from which any communication by you to us was despatched or issued or otherwise last
known to us. Any such notice, demand or communication addressed and so despatched to
you shall be deemed to have been received by you:
12.1.1 in the case of despatch by e-mail or facsimile transmission or other instantaneous
electronic communications, immediately upon transmission by us;
12.1.2 in the case of despatch by delivery to the address, on the date and at the time it
was so delivered or left at that address; and
12.1.3 in the case of despatch by post:
(a) to any address in Singapore, on the next day after it was posted by us; or
(b) to any address outside Singapore, on the seventh (7th) day after it was posted by us.
12.2 All notices and requests from you to us shall be in writing unless we specify to
12.4. Third Party Rights
12.5. Entire Agreement
This Agreement constitutes the entire understanding and agreement between us and you
concerning its subject matter and supersedes and replaces any prior oral or written statements,
representations, agreements or understandings between the parties relating to that subject
Agreement, for any failure or delay in fulfilling or performing any term of this Agreement when
and to the extent such failure or delay is caused by or results from acts or circumstances beyond
our reasonable control including, without limitation, acts of God, flood, fire, earthquake, explosion,
governmental actions, war, invasion or hostilities (whether war is declared or not), terrorist threats
or acts, riot, or other civil unrest, national emergency, revolution, insurrection, epidemic, lock-outs,
strikes or other labour disputes (whether or not relating to either party’s workforce), or restraints or
delays affecting carriers or inability or delay in obtaining supplies of adequate or suitable materials,
materials or telecommunication breakdown or power outage, provided that, if the event in question
continues for a continuous period in excess of 60 days, Customer shall be entitled to give notice in
writing to us to terminate this Agreement.
mutually agreed document signed by both parties. We have the right to analyse, transfer (including
outside of your territory or country), and otherwise use your data to provide, improve and develop
our cyber security Services. For Cybersecurity Services sold on a subscription or periodic basis,
the Agreement commences on the effective date of, and continues for the duration in the Purchase
Order. Upon termination or expiry, you must pay all amounts due under the Order Form. Your purchase
orders are identified only to authorise payment and any terms or conditions in any purchase order are
not a part of the Agreement or controlling.
12.8.2 Any dispute arising out of or in connection with this agreement must be submitted for
If the main contract or purchase order is terminated, this Agreement shall
terminate with immediate effect at the same time the applicable main contract or purchase
order is terminated.
12.9.2 If the service or this Agreement is terminated for any reason whatsoever, the
following shall become immediately due and payable by the Customer to us, without
prejudice to the Customer’s obligation to pay any other sums under this Agreement:
(a) where the termination date is the same as the expiry date of the Term, the Fees and
Charges up to and including the date of termination;
(b) where the termination date is before expiry of the Term, the Fees and Charges for the
Services up to and including the date of termination, 100% of the Fees and Charges for the
balance of the unexpired Term, and the early termination charges stated in the Statement of
Work (if any).
12.9.3 Upon termination of the service or this Agreement, the following will apply:
(a) the Customer’s Data and/or user accounts will be removed and deleted; and
(b) the registered portal account for access to the Portal will be terminated.
END OF DOCUMENT