CIS SecureSuite Services & Consulting

This Services and Consulting Membership Agreement (the "Agreement") is made as of the date of acceptance between Center for Internet Security, Inc. ("CIS"), a Maryland nonprofit corporation and Customer and its Affiliates (as defined herein) (collectively “Customer”), (CIS and Customer, each a “Party”).

RECITALS

Whereas, CIS provides consensus-oriented information security products, services, controls, tools, metrics, suggestions, and recommendations as a public service to Internet users worldwide; and

Whereas, Customer wishes to obtain a Services and Consulting membership from CIS and CIS desires to grant such a membership to Customer.

AGREEMENT

Now Therefore, in consideration of the mutual promises set forth herein and other good and valuable consideration, the receipt and sufficiency of which is hereby acknowledged, the parties agree as follows:

I. Definitions

Affiliate means any corporation, firm, limited liability company, partnership or other entity that directly or indirectly controls or is controlled by or is under common control with a Party.

CIS Benchmarks means consensus based secure configuration guidelines applicable to a variety of operating systems, middleware and software applications, and network devices.

CIS Controls means the CIS Critical Security Controls for Effective Cyber Defense, v. 6.0 and later.

CIS SecureSuite means the cybersecurity configuration and remediation membership offerings provided by CIS, as set forth in this Agreement.

CIS SecureSuite Products includes any or all of the following:  CIS Benchmarks and CIS Controls in any format provided, CIS-CAT Pro (including CIS-CAT Pro Assessor and CIS-CAT Pro Dashboard as described below), CIS Workbench community site, product guides, remediation content and other products offered by CIS from time to time.

II. Membership Benefits.

Under the terms and conditions set forth in this Agreement, CIS grants to Customer a Services and Consulting membership that entitles Customer to the following benefits:

A. Organizational Use

  1. Access to and use of the CIS configuration assessment tool (“CIS-CAT Pro”), including use of the following:
    a. CIS CAT Pro Assessor, allowing Customer to analyze and score the configuration of Customer’s internal information technology systems and obtain a score between 1-100 for conformity against CIS Benchmarks including CIS Benchmark recommendations annotated with one of more of the CIS Controls and subcontrols; and
    b. CIS-CAT Pro Dashboard, allowing Customer to: analyze multiple CIS Benchmarks in a single view for comparison, multiple device reviews; access a CIS Controls view for any annotated CIS Benchmark content; view individual CIS-CAT Pro assessment results, including the ability to create exceptions and recalculate the CIS-CAT Pro assessment; and create individual reporting in multiple formats.
  2. The right to use and distribute the CIS SecureSuite Products within and throughout Customer’s organization;
  3. Unlimited access to and use of the CIS Workbench (a community site where SecureSuite resources are developed) for access to CIS SecureSuite Products, including forums for information sharing, user support, and discussions among members, developers, and CIS staff;
  4. Timely electronic notification of updates to the CIS SecureSuite Products;
  5. CIS SecureSuite Products support from CIS staff and developers;
  6. At Customer’s option, listing of Customer on the dedicated CIS SecureSuite Member pages of the CIS public website and in other promotional materials;
  7. The right to use the CIS SecureSuite membership mark (as set forth on Exhibit A) on Customer’s websites and documents in accordance with the terms and conditions of the CIS Logos and Trademark Use Policy, a copy of which can be found at https://www.cisecurity.org/cis-logos-and-trademark-use-policy/, as such Policy may be amended from time to time;
  8. Updates or improvements of existing CIS SecureSuite Products that are made in the ordinary course of business and provided pursuant to this Agreement; and
  9. The ability to edit/modify CIS Benchmarks for use within the Customer’s organization based upon the Customer’s unique internal specifications and requirements (a “Customized Benchmark”). Once a Customized Benchmark is created, Customer is prohibited from labeling or identifying such Customized Benchmark as a “CIS Benchmark.”  Such Customized Benchmark shall not be considered a “derivative work” pursuant to section VII(E) of this Agreement.

Organizational Use Restrictions

  1. The Customer agrees that the Customer may not sell or resell any CIS SecureSuite Product or distribute any CIS SecureSuite Product outside of Customer’s organization.
  2. Except as set forth in sections II(B) and (C), the Customer agrees that the Customer use of CIS SecureSuite Products is limited to internal use to secure the organization’s owned system/network(s) and data (including Customer’s data stored in a third Party network or cloud environment), and not that of any third Party.
  3. Customer may engage a third Party contractor or Customer (“Third Party”) to assist in the installation, downloading and use of the CIS SecureSuite Products; provided that such Third Party shall access the CIS SecureSuite Products solely in connection with its contractual performance of duties for Customer and shall not retain any of the CIS SecureSuite Products for use other than for assisting the Customer named herein. Customer shall take reasonable steps to ensure that such Third Party’s use of the CIS SecureSuite Products is limited as described herein.  Such Third Party shall access the CIS SecureSuite Products in the same manner and method as Customer.

B. Consulting Use 

  1. For onsite consulting engagements, the right for the Customer to download, install, and use the CIS SecureSuite Products on Customer Clients’ computer network or environment, including any third party network or cloud environment hosting Customer Clients’ data , for the sole purpose of providing information security consulting and auditing services to those Customer Clients, provided that, at the end of each consulting/auditing engagement, the Customer must remove all copies of any CIS SecureSuite Products from the Customer Clients’ computers, networks, systems, and organizational environments that have been installed or provided to those Customer Clients; and
  2. For remote consulting engagements, the right for Customer to be given direct access to a time-limited version of CIS-CAT Pro, for the sole purpose of providing information security consulting and auditing services to those Customer Clients, provided that Customer Client agrees to use CIS-CAT time-limited version only to assess Customer Client’s internal system.
  3. Notwithstanding any license terms for the CIS Controls to the contrary, CIS hereby provides Customer a non-exclusive, non-transferable worldwide license to use the CIS Controls in the context of any consulting engagement, including developing Customized Policies as defined below.
  4. The right for the Customer to assist the Customer Clients in developing security configuration and/or security metrics policies that are specifically customized to meet the Customer Clients’ information security needs (“Customized Policies”), provided that the Customer Clients agree to:
    a. use any Customized Policies only for securing Customer Clients’ internal systems or Customer Clients’ data hosted in a third party network or cloud environment; and
    b. not distribute any Customized Policies beyond the Customer Clients’ organizations.
    Once a Customized Policy is created by Customer, Customer may represent to Customer Clients that such Customized Policy leverages one or more CIS SecureSuite Products but not that it incorporates any CIS SecureSuite Product(s); and
  5. The right for the Customer to use the CIS SecureSuite Logo on reports and related materials     prepared for Customer Clients, in accordance with the terms and conditions of the CIS Logos and Trademarks Use Policy, a copy of which can be found at https://www.cisecurity.org/cis-logos-and-trademark-use-policy/, as such Policy may be amended from time to time.

The Customer is not required to remove Customized Policies from the Customer Clients’ computers, networks, systems, and organizational environments at the end of consulting/auditing engagements.

Consulting Use Restrictions

  1. The Customer agrees that the Customer may not charge the Customer Clients directly for the CIS SecureSuite Products and that neither the Customer nor any of the Customer Clients may sell, resell, or distribute the CIS SecureSuite Products.
  2. CIS agrees that the Customer may charge the Customer Clients for training, installation, programming and other services, even if those services relate to the CIS SecureSuite Products.

C. Hosting Use 

  1. The right for the Customer to download, install, and use the CIS SecureSuite Products for the sole purpose of supporting Customer’s hosting and/or managed services business; and
  2. The right for the Customer to use the CIS SecureSuite Logo on reports and related materials prepared for Customer Clients, in accordance with the terms and conditions of the CIS SecureSuite Trademarks Use Policy, a copy of which can be found at https://www.cisecurity.org/cis-logos-and-trademark-use-policy/.

Hosting Use Restrictions

  1. The Customer agrees that the Customer may not charge the Customer Clients directly for the CIS SecureSuite Products and that neither the Customer nor any of the Customer Clients may sell, resell, or distribute the CIS SecureSuite Products.

III. Membership Fees.

A. Services and Consulting Membership Fee. In exchange for the rights granted by CIS to Customer in Section II of this Agreement, Customer agrees to pay CIS the applicable membership fee (“Membership Fee”) in U.S. Dollars (USD), plus any applicable US sales tax, which shall be due and payable within thirty (30) days of the Effective Date. Membership Fee payment may be made by: (i) EFT transfer; (ii) check made payable to Center for Internet Security and mailed to CIS Accounts Receivable, 31 Tech Valley Drive, East Greenbush, NY 12061; or (iii) credit card transaction according to the instructions provided to Customer by CIS. The amount of the Membership Fee to be paid by Customer to CIS pursuant to this section shall not be reduced by any amount of any taxes or fees to be collected by a taxing jurisdiction, financial institution or payment processor incidental to the payment of Membership Fee by Customer to CIS.

B. Services and Consulting Renewal Membership Fee. Customer’s renewal membership fee (“Renewal Membership Fee”) will equal the Services and Consulting Membership Fee that is listed for Customer’s membership category as specified on the CIS website, https://www.cisecurity.org/cis-securesuite/pricing-and-categories/, thirty (30) days prior to the expiration of any Term of this Agreement.

C. Non-Payment of In the event of non-payment of the any Membership fee by Customer, CIS reserves the right to restrict Customer’s access to the CIS SecureSuite Products until such time as payment has been rendered.

D. Accounts Payable Contact Information. Customer shall designate a point of contact regarding this Agreement.

IV. Term and Termination.

A. Term. The term of this Agreement will commence on the Effective Date and, unless earlier terminated as provided for in Section IV.B, below, will continue for a period of one year from the Effective Date (the “Initial Term”).   Thereafter, this Agreement may be renewed for consecutive one (1) year renewal terms (each a “Renewal Term”) upon CIS’s receipt and acceptance of a Renewal Membership Fee from the Customer at or before the beginning of each such Renewal Term.  CIS agrees to send Customer a renewal invoice at least thirty (30) days prior to the expiration of the Initial Term of this Agreement.

B.

  1. Right to Terminate. Both CIS and Customer shall have the right to terminate this Agreement: (1) if the other party fails to perform a material obligation under this Agreement and fails to cure such nonperformance within thirty (30) days following written notice thereof; or (2) for convenience by providing at least thirty (30) days written notice to the other party. Upon termination, Customer will cease use of the CIS SecureSuite Products as of the date of such termination.
  2. Membership Fee Refund.

    a. Refund for One Year Term Agreements. In the event of termination by CIS for nonperformance by Customer, or for convenience by Customer, Customer will not be entitled to a refund of any Membership Fees or Renewal Membership Fees that have been paid by Customer to CIS. In the event of termination by Customer for nonperformance by CIS or for convenience by CIS, Customer: (i) will be entitled to a prorated refund of any unused Membership Fees or Renewal Membership Fees that have been paid by Customer to CIS.

    b. Refund for Multi Year Term Agreements. In the event of termination by CIS for nonperformance by Customer, or for convenience by Customer, Customer will not be entitled to a refund of any Membership Fees or Renewal Membership Fees that have been paid by Customer to CIS applicable to the current year of the Term or Renewal Term, but will be entitled to full refund of that portion of any Membership Fees or Renewal Membership Fees applicable to any subsequent years within the Term or Renewal Term. In the event of termination by Customer for nonperformance by CIS, Customer: (i) will be entitled to a prorated refund of any unused Membership Fees or Renewal Membership Fees that have been paid by Customer to CIS for the remaining part of the current year of the Membership Term or Renewal Term from the initial instance of non-performance, and full refund of that portion of any Membership Fees or Renewal Membership Fees applicable to any subsequent years within the Term or Renewal Term.

V. CIS SecureSuite Products Provided As Is.

CIS makes reasonable efforts to utilize and maintain the most current network security and antivirus protection programs available to screen and protect CIS’s computer programs, websites, and computer infrastructure from malware.  However, Customer understands and agrees that CIS is providing the CIS SecureSuite Products “as is” and “as available” without any representations, warranties, or covenants of any kind whatsoever.

VI. Ownership Rights of Intellectual Property and SecureSuite Products Reserved.

Customer is not acquiring any title or ownership rights in or to any of the CIS SecureSuite Products or associated intellectual property, including the Trademark, and full title and all ownership rights to the CIS SecureSuite Products and associated intellectual property remain the exclusive property of CIS.  The Customer understands and agrees that the use of the Trademark in connection with this Agreement does not create any right, title or interest in or to the use of the Trademark and that all such use and goodwill associated with the Trademark will inure to the sole benefit of CIS.  Customer further agrees that it will comply with the terms and conditions of the CIS Logos andTrademarks Use Policy, found https://www.cisecurity.org/cis-logos-and-trademark-use-policy/, as such policy may be amended from time to time. All rights to the CIS SecureSuite Products not expressly granted in this Agreement are hereby reserved.

VII. Restrictions.

Customer acknowledges and agrees that except as otherwise expressly permitted in this Agreement,  Customer may not: (A) decompile, disassemble, alter, reverse engineer, or otherwise attempt to derive the source code for any CIS SecureSuite Product (except to the extent that such product is already in the form of source code); (B) distribute or redistribute, sell, rent, lease, sublicense or otherwise transfer or exploit any rights to any CIS SecureSuite Product in any way or for any purpose including, without limitation, creating an image incorporating any CIS Benchmark or derivative content (including without limitation remediation content) and offering or using that image as a product or service made available to a third party; (C) post any CIS SecureSuite Product on any website, bulletin board, ftp server, newsgroup, or other similar mechanism or device; (D) remove from or alter the terms of use or any proprietary notice placed on any CIS SecureSuite Product; (E) create any derivative work based directly on an CIS SecureSuite Product or any component thereof; (F) represent or claim a particular level of compliance or consistency with any CIS SecureSuite Product; or (G) facilitate or otherwise aid other individuals or entities in violating this Agreement.

VIII. Customer’s Responsibility to Evaluate Risks.

Customer acknowledges and agrees that: (A) no network, system, device, hardware, software, or component can be made fully secure; and (B) Customer has the sole responsibility to evaluate the risks and benefits of the CIS SecureSuite Products to Customer’s particular circumstances and requirements including, without limitation, the decision to not implement one or more Benchmark configuration recommendations.

IX. Customer Indemnification of CIS.

Customer agrees to indemnify, defend, and hold CIS and all of CIS's employees, officers, directors, agents and other service providers harmless from and against any third party claim, suit or proceeding (including reasonable attorneys’ fees) brought against any of them in connection with Customer’s material breach of this Agreement.

X. CIS Indemnification of Customer.

CIS shall indemnify, defend, and hold Customer harmless against any third party claim, suit or proceeding (including reasonable attorneys’ fees) brought against Customer alleging that the CIS SecureSuite Products infringe any patent, copyright, or enforceable trade secret, provided that Customer: (A) gives CIS prompt written notice of any such claim; (B) allows CIS to control the defense and settlement of such claim; (C) refrains from entering into any settlement or compromise of such claim without CIS’s prior written consent; and (D) provides all assistance reasonably requested by CIS in the defense or settlement of such claim, at CIS’s expense.  THIS SECTION SETS FORTH CIS’S SOLE AND EXCLUSIVE LIABILITY, AND CUSTOMER’S SOLE AND EXCLUSIVE REMEDY FOR CIS’S INFRINGEMENT OF THIRD PARTY RIGHTS OF ANY KIND.

XI. Limitation of Liability.

Except as otherwise specified in this Agreement, neither Party will be liable for any indirect, incidental, special, consequential or punitive damages, including without limitation, damages for lost profits, data or use, incurred under this Agreement, whether in an action in contract or tort, even if that Party has been advised of the possibility of such damages

XII. Confidential Information.

A. Confidential Information. Each Party acknowledges that by reason of its relationship with the other Party hereunder, such Party (the “Receiving Party”) might receive access to certain confidential and proprietary information and materials concerning the other Party (the “Disclosing Party”). “Confidential Information" means oral or written non-public information that the Disclosing Party designates as being confidential or which, under the circumstances surrounding disclosure, ought to be treated as confidential, whether provided to the Receiving Party before, on or after the date "Confidential Information" includes, without limitation, information relating to the Disclosing Party’s software and hardware products, specifications, databases, networks, systems design, file layouts, tool combinations and development methods, and information relating to the Disclosing Party's business or financial affairs, such as business methods, marketing strategies, pricing, product development strategies and methods, Customer lists and financial results. "Confidential Information" also includes information received from others that the Disclosing Party is obligated to treat as confidential. Confidential Information includes all tangible materials which contain Confidential Information, including, without limitation, written or printed documents, computer disks or tapes, and other magnetic or optical storage media, whether user- or machine-readable.

B. Exclusions. Confidential Information does not include any information that the Receiving Party can reasonably demonstrate: (i) was known to the Receiving Party prior to its disclosure hereunder by the Disclosing Party; (ii) was independently developed by the Receiving Party; (iii) is or becomes publicly known through no wrongful act of the Receiving Party; (iv) has been rightfully received from a third party whom the Receiving Party has reasonable grounds to believe is authorized to make such disclosure without restriction; or (v) has been approved for public release by the Disclosing Party's prior written authorization.  Confidential Information may be disclosed pursuant to applicable law, regulations or court order or similar proceeding, provided that the Receiving Party provides, where reasonably possible and legally permissible, prompt advance notice thereof to enable the Disclosing Party to seek a protective order or otherwise prevent such disclosure.

C. Use. The Receiving Party acknowledges and agrees that the Disclosing Party’s Confidential Information is of substantial value to the Disclosing Party, which value would be harmed if such information were disclosed to third parties.  The parties agree that, commencing on the Effective Date and thereafter, they will not: (i) use the Disclosing Party's Confidential Information in any way, except in the performance of obligations under this Agreement; or (ii) disclose the Disclosing Party’s Confidential Information to any third Party, except to the Receiving Party’s employees who need to know such information, provided such employees have a signed confidentiality agreement with terms no less restrictive than the terms in this Agreement. The parties will not publish, in any form, the other Party's Confidential Information beyond any descriptions published by said other Party.

D. Ownership of Information. The parties expressly agree that the Disclosing Party shall retain all ownership in its Confidential Information.

E. Return of Information. In the event of any termination or expiration of this or any other agreement between the parties: (i) upon the written request of the Disclosing Party, the Receiving Party shall return or destroy all copies of Confidential Information to the Disclosing Party; and (ii) except to the extent the Receiving Party is advised in writing by counsel that there is a legal prohibition on so doing, the Receiving Party will also promptly destroy all written material, memoranda, notes and other writings or recordings whatsoever prepared by it or its representatives based upon, containing or otherwise reflecting any Confidential Information of the Disclosing Party.  Any Confidential Information that is not returned or destroyed including, without limitation, any oral Confidential Information, shall remain subject to the confidentiality obligations set forth in this Agreement.  The Receiving Party may return the Confidential Information, or any part thereof, to the Disclosing Party at any time.

F. Duration. All obligations to protect Confidential Information set forth in this Agreement shall apply during the time of the relationship between the parties and thereafter, for a period of five (5) years.

G. Data Privacy. Both Parties agree to comply with all applicable data privacy laws and regulations, including as applicable, the General Data Protection Regulation.  The Parties further acknowledge the Standard Contractual Terms found at https://www.cisecurity.org/standard-gdpr-clauses/, which are incorporated herein and are made a part hereof, and by signing this Agreement agree to abide by its terms, to the extent applicable.

XIII. Additional Terms

A. Jurisdiction.  Customer acknowledges and agrees that: (A) this Agreement will be governed by and construed in accordance with the laws of the State of New York; and (B) any action at law or in equity arising out of or relating to this Agreement shall be filed only in the courts located in the State of New York.  Customer hereby consents and submits to the personal jurisdiction of such courts for the purposes of litigating any such action.

B. Counterparts. This Agreement may be executed in separate counterparts each signed by a Party and such counterparts deemed an executed whole with the full force and effect.  Signatures may be exchanged by email or electronic signature and such signatures will be deemed original.

C. Entire Agreement. This Agreement, including any exhibits referenced herein, constitutes the entire agreement of the Parties with respect to the subject matter hereof, and supersedes all previous written, and all previous or contemporaneous oral negotiations, understandings, arrangements, and agreements.  This Agreement may be amended only by a written amendment signed by both Parties.

D. Advertising or Publicity. Except as provided for in Sections II(A)(6) and (7), neither Party shall use the other Party’s name, service marks, or trademarks, or refer to or identify the other Party in any advertising, publicity releases (including references on any Customer lists or posting on websites), or promotional or marketing correspondence to others without the prior written approval of the other Party.

E. Notices. All notices, requests, demands and determinations made under this Agreement (other than routine operational communications) shall be in writing and shall be deemed duly given (A) when delivered personally (against a signed receipt), (B) on the designated day of delivery (other than a weekend or Federal holiday) after being timely given to an express overnight courier with a reliable system for tracking delivery, or (C) six (6) days after the day of mailing, when sent by first class United States mail, postage prepaid and return receipt requested, to the address set forth below and to the attention; for CIS:Attn: Chief Counsel, via email to legalnotices@cisecurity.org; for Customer, at an address identified by Customer.

F. Order of Precedence. Except as otherwise agreed to between the Parties, in the event of a conflict between the terms of this Agreement and any other document executed between the Parties, the following order of precedence shall apply: (1) The terms and conditions contained in this CIS Services and Consulting Membership Agreement; (2) A Purchase Order (PO) or similar document issued by Customer to CIS containing terms and conditions therein; (3) Any other document between the Parties.

EXHIBIT A

CIS SECURESUITE MEMBERSHIP MARK

CIS_SecureSuite_Membership

Rev. 05/13/2020