Ownership. The Services are owned and operated by Confidentiality Corp. All right, title and interest in and to the materials used as part of providing the Services, including but not limited to software, information, documents, logos, graphics, and images (“Materials”) are owned by Confidentiality Corp. None of the Materials may be copied, reproduced, republished, downloaded, uploaded, posted, sold, licensed, displayed, transmitted or distributed in any way, except as part of legitimate use of the Services by registered users in good standing of the Services, and nothing on this Site or on any Applications shall be construed to confer any license to any of Confidentiality Corp's intellectual property rights, whether by estoppel, implication or otherwise.Limited License. If you are a registered user of the Services in good standing, Agreemint.com Co. grants you a limited, non-exclusive, non-transferable license to use a Nondisclosure Agreement (“NDA”) generated by the Services expressly to be used between you and a named second Party who is also a registered user of the Services in good standing; you may not use such agreements in any other circumstance, and you may not copy the content of agreements generated by the Services for use or sale outside of Agreemint.com. As a registered user of the Services, you are licensed to keep, for your own personal records, electronic or physical copies of documents created by Agreemint.com for your account
A complete set of documentation on the Terms of Service can be sent by writing to firstname.lastname@example.org, specifying nature of the request.
For further info on our complete Policies (includes Security, Use of Information, Security of Information) please request a copy by writing email@example.com
Agreemint runs on top of a typical server-side web application stack comprised of a web server which controls most of the application logic. A relational database is used for persistence. These components are provisioned inside a virtual private cloud (VPC), which only allows communication within the VPC. The application communicates with the hosts outside the VPC through a firewall which only allows traffic to the web server on a specific port. Even though components within the VPC are isolated, they each contain access control which limits the communicate to other specific hosts and protocols. Communication within the VPC is encrypted, so that even if a component within the VPC is compromised and the access control is configured incorrectly, the compromised component will not be able to eavesdrop on traffic within the VPC.
While the web server inside the VPC can communicate to the outside through the firewall protecting the VPC, it is still not directly exposed to the Internet. Instead, it communicates with a load balancer, which itself is restricted by an access control list. Finally, the load balancer communicates with the outside world via an edge firewall, which is responsible for passing only the desired traffic to the load balancer. Information in the database is secured through several layers. The traffic between the web server and the database server is encrypted. In addition, data-at-rest in encrypted with disk-level encryption. Finally, for sensitive information such as documents, the document data itself is encrypted with a group key, to which Agreemint does not have access. This means that the sensitive data can only be read by parties who have an access key to the document.
For further info on our complete Policies (includes Security, Use of Information, Security of Information) please request a copy by writing firstname.lastname@example.org
Confidentiality.io is not an attorney or law firm, and can only provide self-help services at your direction.