@RISK Privacy Policy

TERMS AND CONDITIONS

@RISK TECHNOLOGIES TERMS & CONDITIONS

Last Modified: July 15, 2019

 

Trial Agreement

 

This Trial Agreement ID # @RISK_30-DAY PROOF OF VALUE _DDMON19_001 (the “Agreement”) is effective Month DD, 2019.

 

For Plan Level: 30-DAY PROOF OF VALUE  

 

BETWEEN: @RISK Technologies, Inc. (the "Company"), a company organized and existing under the laws of the State of Delaware, with its headquarters located at:

 

16400 Dallas Parkway, Suite 105, Dallas, Texas 75248

 

AND: Customer Name (the "Customer"), a company organized and existing under the laws of the State of State Name with its headquarters located at:

 

Customer Address

 

RECITALS:

1. The Company desires to provide Customer certain Cyber and Information Security Risk Management products and services on the terms and conditions hereinafter set forth.

2. Customer desires to engage the Company for such products and services on such terms and conditions.

 

NOW THEREFORE in consideration of the premises, the mutual covenants contained herein and other good and valuable consideration, the receipt and sufficiency of which are hereby acknowledged, the Company and the Customer (“Parties”) hereto agree as follows:

 

  1. PRODUCTS AND SERVICES TO BE PROVIDED.

 

    1. The Company agrees to provide to the Customer the products and services set out in the Statement of Work (“SOW”) attached hereto as Schedule “A” (the “Services”).

    2. Subject to the provisions of Section 7 hereof, the Parties mutually agree that, at all reasonable times, access to necessary information, data, the work product, or any component thereof, which will arise as requirements in performing the Services, will be provided.

 

  1. ANALYTIC SOLUTION AS A SERVICE. 

    1. Unless the Parties have entered into different terms in writing signed by the Parties, the terms and conditions (“Terms”) set forth herein apply to the Services set forth in the SOW, and such Services shall be incorporated in and constitute an integral part of the Agreement and references herein to the Agreement shall include these Terms.  The Agreement may include:

      1. computing Solutions

      2. hosting Solution or hardware

      3. services, and

      4. software licenses (individually, “Software”, and “collectively, the “Quorum Cognitive Cyber Defense Solution” or “Solution”). 

 

    1. Customer acknowledges that no provision of any order or other similar documentation will be deemed to modify, add to, or supersede any provision of these Terms, unless expressly initialized by a senior executive of Company.  

 

  1. OWNERSHIP.  

 

    1. Company retains all right, title and ownership of the Solution, other than the non-exclusive license rights set out below.  

    2. The Customer agrees that all work product produced in performing the Services, or any component thereof, including computer software, publications, reports and other materials prepared by Company (whether or not copyrighted or patentable), shall be the property of Company.

    3. The Company agrees that all data provided by the Customer remains the property of the Customer.

 

  1. LICENSE GRANT.  

 

    1. In consideration of the fees paid by Customer and subject to these Terms, Company hereby grants to Customer a non-exclusive, non-transferable, limited license to use and access the Solution solely for Customer’s internal business purposes on a hosting Solution and with any hardware as further specified in the SOW during the Term and subject to all other restrictions set forth in this Agreement. 

    2. Any rights not expressly granted by Company in these Terms are reserved.

    3. Customer grants to Company a limited, nonexclusive, nontransferable, non-sublicensable right to access, use, copy, process, store, modify, display, and create derivative works of the Data and Content solely to the extent necessary and appropriate to provide the Software and the Solution, support services, professional services, and any other products or services that the Parties have agreed Company will provide. For purposes of this section, “Data and Content” means the electronic data, information, content, and/or other materials that Customer submits or makes available to Company for analysis or manipulation with the Software and Solution. 

 

  1. SOLUTION RESTRICTIONS.  

 

    1. Customer agrees that it will not (and will not authorize or permit any employee or third party to):

 

      1. reproduce, modify, distribute, disclose, transfer or make available to any third party any portion of the Solution (or any related documentation) in any form; 

      2. reverse engineer, decompile, or disassemble any portion of the Software, or otherwise attempt to decrypt, extract or derive source code for, or any algorithms or data structures embodied within, the Software; 

      3. publish or disclose to any third party any evaluation, performance or benchmark tests or analyses; or 

      4. use the Software at a location other than those specified in the applicable agreement for the Solution, unless otherwise approved by the Company (such approval not to be unreasonably withheld or delayed).

 

    1. Customer shall preserve and shall not remove any copyright, confidentiality, or other proprietary notices relating to the Software, Solution or hardware servicing or supporting the Solution, or their labels, marks or documentation and all copies thereof.

 

    1. Customer shall remain fully responsible for, and have sole control of, Customer network security and the implementation of recommendations provided, if any. 

 

  1. PRICING, ANNUAL INCREASE AND PAYMENT.

 

    1. Price; Payments.  In consideration for the hardware (if applicable), Software and the Solution, Customer agrees to pay to Company the applicable fees set forth in Schedule “A” hereto. All fees are non-refundable and exclusive of taxes.  Payment terms are 15 days from receipt of invoice. Customer is responsible for all sales and other transactional taxes, excluding only taxes on Company’s income.

 

    1. Annual Increase. The monthly fee shall increase on each annual anniversary of the contract effective date by 5%.

 

    1. Past Due Amounts. If Customer fails to make payment pursuant to the terms of the Agreement, Company may suspend Customer’s license to the Solution and other rights under these Terms, unless Customer promptly makes payment within ten (10) days of written notice. 




 

  1. INDEMNIFICATION. 


 

    1. Customer shall defend, indemnify and hold harmless Company, its affiliates, their respective officers, directors, employees, agents and representatives (“Company  Indemnitees”) from and against any and all third party claims, demands, causes of action or lawsuits, proceedings, damages, costs and expenses (including attorneys’ fees) (collectively “Claims”) incurred by Company Indemnitees based on or relating to (i) Customer’s Data (as defined below); or (ii) Customer’s use of the Software, including without limitation, any data, information, content, or results generated through the Software, use of the Solution, the capture by Company of any Customer network traffic (“PCAP”) data and its analysis by Company, the discovery (or failure to discover) a cyber threat including any data breaches resulting therefrom, and any recommendations made or the implementation (or failure to implement) any recommendations, whether or not in violation of this Agreement; or (iii) the provision by Customer of administrative, physical and technical safeguards concerning Customer’s Data (“Customer Data” shall mean data collected, ingested, used, processed, stored, analyzed, transferred, transmitted, retained by Company in connection with this Agreement, including all activities relating to or arising out of this Agreement).    

 

    1. Company will give Customer prompt notice of any Claim. Company will provide Customer information and assistance, at Customer’s expense, reasonably necessary to defend any Claim. Customer will solely control such defense. Any settlement or compromise Customer desires to enter into with the third party that imposes an obligation on Company (other than to pay money to be paid by Customer) will be subject to Company’s prior approval and will include a full release of any and all claims that the third party may have against Company Indemnitees. 

 

  1. COMPLIANCE WITH LAWS. 

 

    1. The Services shall comply with all relevant laws and regulations, and all operations and functions of the Services shall be consistent with legal and regulatory requirements. 

 

  1. LIMITED WARRANTY AND DISCLAIMER

 

    1. Company warrants that the Software and Solution will operate in substantial conformance with the documentation published by Company and distributed with the Solution for the Term.  If the Solution does not meet the warranty above during the Term, Company will repair or replace the defective element (if provided by Company) at the sole discretion of Company. Company warrants it has Commercial General Liability Insurance. Company warrants that the Software and Solution, and its hosting provider for cloud and hybrid cloud, are SOC2 compliant.  

 

    1. EXCEPT AS EXPRESSLY SET FORTH HEREIN, THE SOLUTION, SOFTWARE AND ANY OTHER MATERIALS OR DATA PROVIDED BY COMPANY ARE PROVIDED “AS IS” AND “WITH ALL FAULTS,” AND COMPANY EXPRESSLY DISCLAIMS ALL OTHER WARRANTIES OF ANY KIND, WHETHER EXPRESS, IMPLIED OR STATUTORY, INCLUDING ANY WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.

 

  1. LIMITATION OF LIABILITY. 

 

    1. IN NO EVENT SHALL COMPANY, NOR ITS EQUIPMENT PROVIDERS OR LICENSORS, BE LIABLE TO CUSTOMER FOR ANY INCIDENTAL, CONSEQUENTIAL, SPECIAL, PUNITIVE, EXEMPLARY OR INDIRECT DAMAGES, OR FOR ANY LOST PROFITS OR LOSS OF DATA, EVEN IF ADVISED OF THE POSSIBILITY OF THE SAME, HOWEVER CAUSED AND REGARDLESS OF THEORY OF LIABILITY, WHETHER TORT, CONTRACT, OR STRICT LIABILITY.  

    2. COMPANY’S AGGREGATE LIABILITY FOR ANY DAMAGES SHALL IN NO EVENT EXCEED THE AMOUNTS PAID BY CUSTOMER TO COMPANY FOR THE HARDWARE, SOFTWARE, SOLUTION OR SERVICE SPECIFICALLY GIVING RISE TO LIABILITY DURING THE TERM.

    3. IN NO EVENT SHALL THE COMPANY BE LIABLE FOR DATA BREACHES ON OR OTHER CYBER INTRUSTIONS TO THE COMPANY’S NETWORK.

 

  1. TERM AND TERMINATION.

    1. The Term shall be for a period of three-years beginning on the effective date and shall be automatically renewed for successive three-year periods unless a party sends a written notice of non-renewal to the other party. no later than 30 days prior to the expiration of such Term, or of any renewal term, as the case may be. 

    2. This Agreement may be mutually terminated by the Parties without notice upon the occurrence of an event of default. Each of the following constitutes an event of default for the purposes of this Agreement:

 

      1. if either party commits any material dishonest or fraudulent act in the performance of any of its obligations hereunder or any material misrepresentation hereunder; and

      2. if either otherwise fails to perform or comply with any material term, condition or covenant of this Agreement;

      3. The Company shall forthwith upon termination return to the Customer all confidential information as further defined in Section 16 hereof which is in its possession, or certify its destruction.

 

  1. CONFIDENTIALITY. 

 

a. For the purposes of this Section 12, “Confidential Information” shall mean any non-public information and/or materials provided by a party under this Agreement to the other party and reasonably understood to be confidential. 

b. Unless expressly authorized in writing by the other party, neither party shall disclose to any third party any Confidential Information of the other party, nor use such Confidential Information in any manner other than to perform its obligations under this Agreement.  The foregoing restrictions do not apply to any information that: 

      1. is or becomes publicly available through no fault of the disclosing party;

      2. is already in the rightful possession of the disclosing party prior to its disclosure to that party;

      3. is independently developed by the disclosing party;

      4. is rightfully obtained by the disclosing party from a third party;

      5. is disclosed with the written consent of the other party; or

      6. is disclosed pursuant to court order or other legal compulsion.

 

c. The provisions of this Section shall survive the termination of this Agreement.

d. The existence of any claim or cause of action of either party against the other, whether pursuant to this Agreement or otherwise, shall not constitute a defense to the enforcement of the provisions of this Agreement by either party against the other.

 

  1. GENERAL TERMS.

 

    1. This Agreement, including Schedule “A” attached hereto, constitutes the entire agreement between the Parties pertaining to the subject matter hereof and supersedes all prior agreements, understandings, negotiations and discussions, whether oral or written of the Parties and there are no warranties, representations or other agreements between the Parties in connection with the subject matter hereof except as specifically set forth herein.

    2. Customer shall not, in whole or in part, transfer or assign the Agreement, except upon written consent of Company, and, absent such consent, any attempted transfer or assignment by Customer shall be null and void.  This Agreement shall inure to the benefit of and be binding upon the Parties and their respective heirs, executors, administrators, successors and permitted assigns.

    3. The Agreement, including these Terms, may be modified or amended only by a written instrument signed by Customer and a duly authorized representative of Company.  No term or provision contained in the Agreement shall be deemed waived and no breach excused unless such waiver or consent shall be in writing and signed by the party against whom enforcement thereof is sought.  

    4. Company shall not be liable to Customer for any failure, delay, or interruption in the performance of its obligations under this Agreement due to causes beyond the reasonable control of Company. 

    5. If any term or provision of the Agreement is determined by a court of competent jurisdiction to be illegal, invalid, or unenforceable, the legality, validity, or enforceability of the remainder of the Agreement shall not thereby be affected, and the Agreement shall be deemed amended to the extent necessary to delete such provision and replace it with an alternative consistent with the original intent to the maximum extent permissible under applicable law. 

    6. Any notice required or permitted to be given hereunder shall be in writing and shall be sufficiently given if delivered 

    7. in person during normal business hours of the recipient on a business day or sent by first class mail, postage prepaid, or by electronic means, as follows:

 

      1. in the case of a notice to the Company to:

 

@RISK Technologies, Inc.
16400 Dallas Parkway, Unit 100
Dallas Texas 75248

Email dmorris@atrisktech.com

Attention: Darren Morris

Title: Vice President 

 

      1. in the case of a notice to Customer to:

 

Customer Name
Address 1:
Address 2:

Email:

Attention:

Title

 

and shall be conclusively deemed to have been given and to have been received on the following business day, if so delivered or sent by electronic means, and on the third business day following the mailing thereof, if so mailed (excluding each day during which there exists any interruption of postal services due to strike, lockout or other cause). Addresses for notice may be changed by giving notice in accordance with the foregoing.)

    1. This Agreement shall be governed by and construed in accordance with the laws of the State of Delaware and shall be treated, in all respects, as a Delaware contract. 

    2. The Parties hereby consent to the resolution by arbitration of all disputes, issues, claims or controversies arising out of or in connection with this Agreement administered in accordance with the then-current Model Arbitration Procedures of the American Arbitration Association (“AAA”) before an arbitrator who is licensed to practice law in the state in which the arbitration is convened.  Except as otherwise provided herein or by mutual agreement of the Parties, any arbitration shall be held in Dallas, Texas. The Parties shall attempt to agree upon the arbitrator who need not be associated with the AAA; provided, that If the Parties are unable to agree on the arbitrator, the AAA shall select an arbitrator on behalf of the Parties.  The arbitrator, and not any federal, state or local court or agency, shall have exclusive and broad authority to resolve any dispute relating to the interpretation, applicability, enforceability or formation of this Agreement, including any claim that all or any part of this Agreement is voidable.  It is further agreed that the decision of an arbitrator on any issue, dispute, claim or controversy submitted for arbitration, shall be final and binding upon the Parties, and that judgment may be entered on the award of the arbitrator in any court having proper jurisdiction. NOTWITHSTANDING THE FOREGOING, IN THE EVENT THAT COMPANY REQUIRES EQUITABLE RELIEF FOR ANY BREACH OF THE PROVISIONS OF THIS AGREEMENT, IT MAY BRING AN ACTION SEEKING SUCH RELIEF IN ANY IN THE STATE COURTS OF THE STATE OF TEXAS (THE “STATE COURT”) OR, TO THE EXTENT THE STATE COURT DOES NOT HAVE SUBJECT MATTER JURISDICTION, THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF TEXAS AND THE APPELLATE COURTS HAVING JURISDICTION OF APPEALS IN SUCH COURTS (THE “CHOSEN COURTS”), AND, AGENT SOLELY WITH RESPECT TO ANY SUCH ACTION (I) IRREVOCABLY SUBMITS TO THE EXCLUSIVE JURISDICTION OF THE CHOSEN COURTS, (II) WAIVES ANY OBJECTION TO LAYING VENUE IN ANY SUCH ACTION IN THE CHOSEN COURTS, (III) WAIVES ANY OBJECTION THAT THE CHOSEN COURTS ARE AN INCONVENIENT FORUM OR DO NOT HAVE JURISDICTION OVER ANY PARTY HERETO, AND (IV) AGREES THAT SERVICE OF PROCESS UPON SUCH PARTY IN ANY SUCH ACTION SHALL BE EFFECTIVE IF NOTICE IS GIVEN IN ACCORDANCE WITH SECTION 13.f.




 

IN WITNESS WHEREOF, each party to this agreement has caused it to be executed at their respective place of and on the date indicated above.

 

@RISK Technologies, Inc. CUSTOMER

 

 

Authorized Signature Authorized Signature

 

Darren Morris                               CAO                            

Print Name and Title Print Name and Title SCHEDULE “A”

STATEMENT OF WORK ID#: @RISK_30-DAY PROOF OF VALUE _DDMON19_001

 

This 30-Day Proof of Value  Plan Statement of Work (“SOW)  (“30-Day Proof of Value Plan”) is entered into as of DD Month 2019 (“30-Day Proof of Value  Plan Effective Date”) and is governed by and made a part of the @RISK Products and Services Agreement between Customer Name, Inc. (“Customer”) and @RISK Technologies, Inc. (“@RISK”), dated as of DD Month 2019 (“Agreement”).  In the event of a conflict between the terms of this SOW 30-Day Proof of Value Plan and the terms of the Agreement, the terms of the Agreement shall prevail.  All capitalized terms not otherwise defined herein shall have the same meaning as in the Agreement.

 

  1. GENERAL.

This SOW 30-Day Proof of Value Plan details the deliverables @RISK will provide and/or the Services that @RISK will perform for Customer (“@RISK Service”) for the deployment of the @RISK Service.  The Parties acknowledge that additional SOWs may be entered between the Parties when additional efforts are initiated. If Customer wishes to secure additional services to deploy additional functionality not included in the scope of this SOW 30-Day Proof of Value Plan, @RISK will develop a separate Statement of Work or change order.

 

  1. PRODUCTS.


 

QuorumTM Cognitive Cyber Defense Solution

 

The QuorumTM technology is a collaborative machine learning and Big Data technology. It interfaces with an on-site installed edge computing Solution called Quorum CollectTM. QuorumTM provides @RISK customers a unified, preemptive and proactive security solution. Using its single pane of glass, cyber risk is measured, mitigated and transferred outside of the organization and upon request delivered as part of a request for quote to various insurance carriers.  By following the RoadMap and the monthly scoring that summarize 24/7 operations, Quorum enables an interactive orchestration of vision, mission, strategy, initiatives and tasks. The solution tracks the list of deliverables or benchmarks for the initiatives, including the name of the person responsible for each.  The technology is an important part in establishing a security strategic plan that is defined by standards such as ISO/IEC 27002. The Solution enables Strategic, Operational & Tactical levels of an organization to have access to a profound understanding of threats facing the organization. Further, the Solution identifies how best to defend against them by: 

  • Detecting and resolving cyber threat related problems

  • Reducing time to delivery from solution concept through implementation by:

    • Fusing People, Process, Technology, Data, Risk and Privacy efforts into a unified effort so that the organization’s “business of business” remains uninterrupted. The Solution accomplishes this by provisioning flexible and adaptable security architectures and evolving the organization so that security is integrated as seamlessly as possible with applications, data, processes and workflows into a unified environment.

 

Balanced ScoreCardTM for Cyber

 

The ScoreCardTM provides an interactive and objective measurement of how well the Customer is progressing on achieving the goals and tasking’s required to achieve Network ConsensusTM as defined by the mutually agreed RoadMap.TM Network ConsensusTM enables defenders to discover hidden patterns in the attack surface, reduce alert overload, and find and plug holes before exploitation by attackers.

 

Network ConsensusTM

 

Network ConsensusTM is defined as the ability to unify both network devices and security appliances in a more cohesive cyber defense.  Leveraging inherent data provided by each device the Solution will automate post breach digital forensic investigation tradecraft, tasks and human processes and apply algorithms assembled in cognitively assembled models where analytic results are optimized through machine learning.  The results are continuously trained using data stored in a Cognitive Library that catalogs People, Process, Technology, Data, Risk and Privacy rules until a specific Artificial Intelligence can mimic human behavior. This symphonic integration of human systems and subsystems using systems engineering and consensus theory transforms post incident response into pre-incident discovery. This pre-incident discovery enables organizations to plug the holes in their security operations before the evolved advanced cyber threat has a chance to exploit them.

 

  1. PROJECT SCOPE.

The project scope has been defined based on several discussions with the Customer and is detailed within the Statement of Work.  

 

  1. @RISK ROLES.

@RISK project team roles are described below.  The extent of each @RISK team member’s involvement will vary by task as defined in the project plan.  @RISK will notify Customer of any change in the @RISK team mix that may be necessary from time to time. 

 

  1. CUSTOMER ROLES. 

Customer will assume responsibility for the following roles and tasks: 

  • Ensure @RISK personnel necessary accompanied access to the Customer premises and server room, as needed for on-site install.

  • Assist @RISK personnel in network familiarity, as needed.

  • Timely delivery or access to data as tasked in the Quorum Solution POV.

  • Review and take remedial action on SITREPS (Analysis) entered into the Solution upon notification of Customer

  • Make all customer cyber requirements available to @RISK 

  • Help @RISK map customer requirements to customer’s 30-day Proof of Value

 

  1. DELIVERABLES AND ACTIVITIES.

Here are the deliverables and activities included in this 30-Day Proof of Value Plan SOW that where initially provided in the SHAPE Phase and No Cost Proof of Value Contract and are carried into and updated in the 30-Day Proof of Value Plan SOW: 

 

Shape (Initial POV assessment) – @RISK begins every engagement with an initial assessment to “Shape” the engagement around the specific characteristics of the Customer’s environment.  The Shape phase of our solution begins with the installation of the Quorum Collect Continuous Monitoring technology powered by Big Data Machine Learning and Analytics. In this phase, data is collected to conduct a cyber-attack surface measurement with planning sessions and a survey to deliver a holistic “forecasted” cyber situational awareness information security RoadMap.

 

The Shape Phase (Initial Assessment) is a $10,000 cost item.  This fee will be waived for this engagement.

 

  • Administrative:

The first step is to sign and execute the Mutual NDA (attached).  This engagement is a 30-day proof of concept to evaluate @RISK’s Cyber Defense Platform.  Once the NDA is signed, the next step is to arrange a 15-30-minute architecture review with @RISK's Director of Delivery and Project Manager.  The purpose of this review is to determine the best tap point for the Quorum Collect device, set an installation date and project timeline. It is preferable for @RISK to have a network diagram of the Customer’s network prior the review. 

 

  • Assessment Requirements / Installation:

The @RISK Deployment Team requires about 60 minutes to install the Quorum Collect device.  The @RISK Deployment Team will then conduct a brief survey with the Customer’s IT team that focuses on people, process technology and data.  This survey will serve as the Customer’s baseline for creating the Strategic Roadmap and Balanced ScoreCard for Cyber, that are included in the platform. This survey also takes approximately one hour.  The deployment team will request the Customer’s list of assets and FFIEC Cyber Assessment Tool (CAT) spreadsheet (if applicable)

The Deployment Team, along with the Client Partner, will schedule a follow up call one week after the installation to confirm data is flowing properly and there are no issues on the Customer’s network. They will also confirm receipt of the Asset inventory and CAT spreadsheet.

 

Note: Total time impact for the assessment on the Customer on the date of install will be less than 2 hours.


 

  • The 30 Day No Cost Trial and Assessment:

The first two weeks after the hardware installation, the @RISK team will:

 

  • Begin Identifying the unique heuristics of the Customer’s network through the capture of PCAP/Netflow and Log data,

  • Identify the Customer’s cyber standing on the Darkweb

  • Evaluate Attack Avenues, to include perimeter threat and web hosting of the organization's web site. 

  • Run analytics on the PCAP/Netflow and Log data to detect threats and anomalies.

  • Begin the process of defending against threats specific to the Customer’s environment. 

  • Begin the creation of Situation Reports that identify the most egregious threats that need to be acted upon.

  • Work with the Customer’s IT Team to identify the assets on their network, so cross-correlation of NetFlow traffic can be accomplished as well as identifying common vulnerabilities and exploits (cve’s) against the Customer’s assets. 

  • Approximately two weeks after the installation, @RISK's team will brief the Customer’s IT Team on our preliminary findings. They will present the survey results, review insights from the DarkWeb Query, Attack Avenue, and Perimeter Threat. 

  • They will also review the open Situation Reports (SitReps) and show the Customer how to take action to review, act, and close them.   @RISK will then provide credentials and training to the IT staff for a hands-on experience for the remaining two weeks.  

 

@RISK will also provide a detailed Statement of Work accompanied by a Products and Services Agreement and pricing specifically tailored to the Customer’s size and network traffic.  The @RISK team will work with the IT staff on how best to present the platform to the C-Suite/Decision Maker(s)

 

At the end of the 30-day assessment period, @RISK's team and Customer’s IT Team will do a final brief to Customer’s C-Suite, and all other necessary members, on the progress made over the 30 days.   @RISK will emphasize a value proposition and building a Cybersecurity Roadmap tailored to the Customer’s specific needs based on the heuristics of their network. @RISK will also emphasize Regulatory, Governance, and Risk Management requirements.  

 

Customer Name

 

@RISK Technologies, Inc.



 

__________________________________________
Signature

 

__________________________________________
Signature

__________________________________________
Title

 

__________________________________________
Title

__________________________________________
Date

 

__________________________________________
Date

 

CONTACT @RISK

 

If you have any questions or comments about this Privacy Policy, the practices of the Services or your dealings with @Risk, you can contact us at any time:

 

@Risk Technologies Inc. Chief Administrative Officer 16400 N. Dallas Parkway Unit 105

Dallas, TX 75254 USA

  • White LinkedIn Icon
  • White Facebook Icon
  • White Twitter Icon

© 2019 @Risk Technologies.  All rights reserved.