End-user license agreement

ArchiFM International Ltd. has been marketing its comprehensive facility management packaged software, ArchiFM, with complex IT platforms and services in the background for years. In order to continue its successful market activity with better IT services, robustness, and business continuity, ArchiFM International Ltd. decided to lift / shift its existing IT infrastructure operated in the on-premise environment today to the Amazon Web Services managed cloud infrastructure.

TC2 Ltd. being an official AWS Advanced Solution Partner asked to facilitate the business needs of ArchiFM International Ltd. alongside the design and implementation of the planned architecture.

From a business and legal point of view, AWS products and services are indirectly delivered to ArchiFM International Ltd. through TC2 as an official Reseller (Solution Provider Partner – SPP). The contract transparently conveys the relationship between AWS and its partner while all the business and legal terms are backed to back. Therefore, the following Service Terms below govern the use of AWS Services

AWS Service Terms

Capitalized terms used in these Service Terms but not defined below are defined in the AWS Customer Agreement or other agreement with us governing your use of the Services (the “Agreement”)

Content and Data Protection:

These Service Terms incorporate when using AWS Services to process Customer Data – AWS Data Processing Addendum (“DPA”)

AWS offers a GDPR-compliant Data Processing Addendum (GDPR DPA), which enables customers to comply with GDPR contractual obligations. The AWS GDPR DPA is incorporated into the AWS Service Terms and applies automatically to all customers globally who require it to comply with the GDPR.

Security and Compliance:

Amazon Web Services (AWS) delivers a scalable cloud computing platform designed for high availability and dependability, providing the tools that enable you to run a wide range of applications. Helping to protect the confidentiality, integrity, and availability of your systems and data is of the utmost importance to AWS, as is maintaining your trust and confidence. This document is intended to introduce AWS’ approach to security, including the controls in the AWS environment and some of the products and features that AWS makes available to customers to meet your security objectives.

AWS computing environments are continuously audited, with certifications from accreditation bodies across geographies and verticals, including SOC 1/SSAE 16/ISAE 3402 (formerly SAS 70), SOC 2, SOC 3, ISO 9001 / ISO 27001, FedRAMP, DoD SRG, and PCI DSS Level 1.i. AWS also has assurance programs that provide templates and control mappings to help customers establish the compliance of their environments running on AWS; for a complete list of programs, see AWS Compliance Programs.

Fine-grain identity and access controls combined with continuous monitoring for near real-time security information ensures that the right resources have the proper access at all times, wherever your information is stored  – AWS Data Center Security and availability

Service Availability:

AWS commits to offer Service Level Agreements (SLAs) and publish Service Level Objectives (SLOs) for all paid, generally available services.

Our Cloud hosting service provider is Amazon Web Services – EMEA SARL (38 Avenue John F. Kennedy, L-1855, Luxembourg)

All servers are hosted in AWS EU-Central-1-Europe (Frankfurt) under the following conditions:

  •  The AWS global infrastructure is built around AWS Regions and Availability Zones. Regions provide multiple physically separated and isolated Availability Zones, which are connected through low-latency, high-throughput, and highly redundant networking
  • 24/7 server monitoring by native AWS services
  • Multiple backups and snapshots to fault-tolerant AWS data storage systems
  • Restricted access to your instances using security groups and Firewall provided by Microsoft Server embedded service
  • Service ports are not public, they can only be accessed by private IP addresses through VPN tunnel
  • Restricted access and user management to the production ArchiFM environment over the Internet and compliance with AWS security best practices