Egypt – Cairo Cloud – Legal Documents
CloudSigma is structured to legally separate cloud locations by country. This ensures that our Cairo cloud hosting is subject to Egyptian law only, our Swiss cloud to Swiss law only, our U.S. clouds to U.S. law only, etc.
For our Swiss cloud hosting terms and conditions, please click here.
For our German Dusseldorf cloud hosting terms and conditions, please click here.
For our German Frankfurt cloud hosting terms and conditions, please click here.
For our US cloud hosting terms and conditions, please click here.
For our Irish cloud hosting terms and conditions, please click here.
For our UK cloud hosting terms and conditions, please click here.
For our Saudi Arabian cloud hosting terms and conditions, please click here here.
For our Australian cloud hosting terms and conditions, please click here here.
For our Honolulu cloud hosting terms and conditions, please click here here.
For our Clark cloud hosting terms and conditions, please click here here.
For our Tokyo cloud hosting terms and conditions, please click here here.
For our Manila 2 cloud hosting terms and conditions, please click here here.
For our Manila cloud hosting terms and conditions, please click here.
For our Monterey cloud hosting terms and conditions, please click here.
Our Egypt cloud hosting terms and conditions are outlined below: All services provided to you (“you”, “your”, “user”) by WhiTech LLC, trading as “WhiTech” (“we”, “us”, “our”) apply to and are governed by these Terms of Service, the Acceptable Use Policy, the Privacy Policy, the Data Processing Agreement under the European General Data Protection Regulation (GDPR), the Copyright Notice, the Service Level Agreement and the terms of your Purchase including any services provided through the Website and to any email, written or other correspondence relating to such services. We retain the right and entitlement to revise or vary the Agreement and such revisions and variations will become binding on you as referred to below. The Agreement forms a legally binding agreement between us and you. Continued use of the Website or accepting Services offered by us by ticking the box ‘Please confirm you have read and agree to our Terms of Service.’ constitutes acceptance of the Agreement and formation of a legally binding agreement. Any individual submitting a Purchase on behalf of a company or other legal entity represents and warrants that he or she has the legal authority and entitlement to bind that entity into the Agreement in which case “you”, “your” and “user” shall mean the company or legal entity. The Agreement is the complete and exclusive agreement between you and us regarding its subject matter and supersedes and replaces any prior agreement, understanding, or communication, written or oral. If you do not accept any Any Purchase or commencement of supply of Services is done so on the basis that you have agreed to be legally bound to the terms of the Agreement and that you represent and warrant that you have the legal authority to enter into said Agreement. The Services and Website are provided and offered for adults over the age of 18 only. If you are under 18 and/or you are not able to form legally binding contracts you should not use the Services and/or Website. You must check with the owner and/or providers of your internet access you are using in relation to the Services and/or Website that such access is lawful and allowed by any policy and/or terms of service governing the use of any equipment or internet connection. By continuing to use the Website and any of the services offered by it, you are confirming that you are 18 We reserve the right and entitlement to alter the Agreement at any time. We will notify you in accordance with the Agreement at least thirty (30) days prior to any alterations becoming valid and binding. Upon receipt of such notice, you will have the option either to terminate your account under the provisions of clause 10 and receive a refund for any positive account balance or to continue to use our Services and be bound by the altered Agreement. After the altered Agreement has come into force, purchase of additional Services or continued use of the Website including API usage constitutes your agreement to be legally bound to the altered Agreement’s terms and conditions in full. 1. Definitions In this Terms of Service: 3. Services 4. Use of Services 5. Service Level Agreement 5.1 The Service Level Agreement forms part of the Agreement for Services you Purchase from WhiTech. 5.2 Any credit resulting from the terms and conditions of the Service Level Agreement shall be credited to the Credit Balance for use against future Services. No credits resulting from the Service Level Agreement will be paid to you as cash or another form of refund. 6. Beta Services A Service in Beta Testing is subject to the following terms: 7. Support 8. Links to Third Party Web sites 9. Links to the Website 10. Termination 11. Taxes, Duty and Value Added Taxation 12. Privacy Policy, Intellectual Property Rights and Confidential Information 13. Notices 14. Disclaimer 15. Liability 16. Limitation of Liability 17. Indemnity You shall indemnify and defend us, our agents, affiliates, suppliers, directors, officers, employees and partners (the “WhiTech Indemnitees”) from and against any legal claims, losses, liabilities, expenses, fines, damages and settlement amounts including reasonable legal fees and court costs incurred by WhiTech Indemnitees arising under any claim as a result of your actual or alleged gross negligence, wilful misconduct, violation of law, failure to meet the security obligations required by the Agreement, violation of the Acceptable Use Policy or the Terms of Service. These indemnification obligations shall be enforceable provided that we promptly communicate to you reasonable details of any claim and cooperate in defending any claim. We will choose legal counsel to defend any claim provided these decisions are reasonable and communicated promptly to you. You must comply with reasonable requests from us for assistance and cooperation in defence of the claim. We may not agree to any settlement in relation to any claim without your prior written consent which may not be unreasonably withheld. Expenses incurred by WhiTech Indemnitees must be paid by you as they are occurred. 18. Force Majeure Neither of us will be in violation of the Agreement or liable for any loss or damage that the other may suffer because of any: act of God; power cut; power surge; fire, flood, earthquake, storm, hurricane or other natural disasters, war, invasion, act of foreign enemies, hostilities (whether war is declared or not), civil war, rebellion, revolution, insurrection, military or usurped power or confiscation, terrorist activities, nationalisation, government sanction, blockage, embargo, labour dispute, strike, lockout or interruption or failure of electricity or other utilities, or any other delay or failure caused by a third party. In such an event, we reserve the right to cancel or suspend the Website and/or our Services without incurring any liability. 19. Changes to the Agreement 20. Further Terms 21. Governing Law and Jurisdiction The Agreement and all other legal relationships between you and us will be governed by and construed in accordance with Law of Egypt. Any dispute arising out of or in connection with this Agreement, including any question regarding its existence, validity or termination, shall be referred to and finally resolved by arbitration under the Arbitration Rules of Egypt, which Rules are deemed to be incorporated by reference into this clause. The seat, or legal place of arbitration shall be Egypt. The language to be used in the arbitration shall be Arabic. Last Updated: 30 November 2023 Violation of the Acceptable Use Policy (“AUP”) may result in suspension or termination of your (“your”, “you”) services in accordance with the WhiTech LLC, trading as “WhiTech” (“we”, “us”) Terms of Service. Abusive Usage You may not use WhiTech services for actions or activities which, at our sole discretion, may be illegal, offensive and abusive or promote and foster such irresponsible behaviour as well as actions contrary to accepted internet norms or behaviour that threatens our infrastructure. This includes but is not limited to: Offensive Content We prohibit all uses of WhiTech services which appear to us at our sole discretion to involve bulk email or posting of content. This includes but is not limited to: WhiTech may block mail that violates this AUP and your mail services may be suspended or terminated for any violation of this AUP in accordance with the Terms of Service. Behaviour Posing a Threat to Infrastructure We prohibit all uses of WhiTech services which appear to us, at our sole discretion, to threaten our infrastructure. This includes but is not limited to: Service Level Agreement No credit will be available under the WhiTech Service Level Agreement for interruptions of service resulting from Authorised Use Policy violations. Compliance for You & Your Users You will ensure that all use of WhiTech services, whether by you or by any of your users, follows the Terms of Service. In addition, you will bind your users to an Acceptable Use Policy containing all of the restrictions above. WhiTech shall not be liable for any failure by you or your users to comply with the terms of the AUP or the Last Updated: 30 November 2023 All users of WhiTech LLC, trading as “WhiTech” (“we”, “us”) services retain copyright, trademarks and other intellectual property rights to all content uploaded to or generated using WhiTech services by said users. All content and design of cai.cloudadore.com (“Website”) is protected by copyright, trademarks and other intellectual property rights and is the property of WhiTech. Except as stated herein, none of the material may be copied, reproduced, distributed, republished, downloaded, displayed, posted or transmitted in any form or by any means, including, but not limited to electronic, mechanical, photocopying, recording, or otherwise, without prior written permission of WhiTech. You are granted a personal, non-commercial limited, non-transferable and non-exclusive licence to access the Website, to display, copy, distribute and download the materials from the Website only in accordance with the following permissions: 1. You (“you”, “your”) acknowledge WhiTech Website as the source of the material. You must include 2. You do not modify the materials, 3. You do not, and you do not allow any third party, to modify or create a derivative work, reverse engineer or otherwise attempt to discover any source code or software available on the Website; and 4. You must inform the third party that all the Terms of Service set out herewith apply to him/her and that he/she is bound by them. This limited licence to re-copy does not permit incorporation of the material or any part of it in any other work, publication, or website whether in hard copy or electronic or any other form without the express written consent of WhiTech. The granting of this limited licence is wholly conditional upon your agreement to and compliance with the Terms of Service. We may revoke this licence at any time at our absolute discretion. Any data or software Licenced to us from third parties are provided for use strictly in connection with the services we offer and in accordance with the Terms of Service. Any data or software from third parties is subject to the third party licence terms only and may not be used for any other commercial purposes without the prior written consent of such third parties. You grant to us a non-exclusive, royalty-free licence for the duration of the provision of Services (as defined under the Terms of Service) to you, to use, store and maintain your data stored on our infrastructure and network for the purposes of providing the Services in accordance with the Terms of Service. Any unauthorised publication, use or reproduction of any content including but not limited to images, code, data, graphics, trademarks and software may be prosecuted. Last Updated: 1 Jan 2019 Copyright CLOUDSIGMA AG, 2021. All rights reserved. This Data Processing Agreement (DPA) regulates the processing of customer data including personal data as per the requirements of the European General Data Protection Regulation. This DPA is entered into between us (the Data Processor) and you (the Data Controller) and is incorporated into and governed by the terms of the Agreement. In no event shall the DPA become effective later than November 30, 2023 for any data processing activities requested by you as the Data Controller from us as the Data Processor. The parties agree as follows: For the purposes of the clauses in this Data Processing Agreement: Any capitalised term not defined in this DPA shall have the meaning given to it in the Agreement. 2. Purpose 2.1 We have agreed to provide the Services to you in accordance with the terms of the Agreement. In providing the Services, we shall process Customer Data on behalf of you. We will process and protect such Customer Data in accordance with the terms of this DPA. 3. Scope 4. Obligations of the Processor 5. Obligations of the Controller 6. Sub-Processors 7. Liability 8. Audit 8.1 We shall make available to you subject to a fee all information reasonably necessary to demonstrate compliance with our processing obligations and allow for and contribute to audits and inspections. 8.2 Any audit conducted by you under this DPA shall consist of examination of the most recent reports, certificates and/or extracts prepared by an independent auditor bound by confidentiality provisions at least as strict as those set out in the Agreement. In the event that provision of the same is not deemed sufficient in your reasonable opinion, you may conduct a more extensive audit which will be: (i) at your expense; (ii) limited in scope to matters specific to you and agreed in advance; (iii) carried out during Swiss business hours and upon reasonable notice which shall be not less than 4 weeks unless an identifiable material issue has arisen; and (iv) conducted in a way which does not interfere with our day-to-day business. 8.3 This clause shall not modify or limit your rights of audit, instead it is intended to clarify the procedures in respect of any audit undertaken pursuant thereto. 9. Notification of Data Breach 10. Compliance, Cooperation and Response 11. Term and Termination 12. General Appendix 1: Data Processing Activities to Be Performed by Us You as the Data Controller grant users the right to access the Services in accordance with the terms of the Agreement for transfer of Customer Data identified in sections 3, 4 and 5 below, as it relates to the processing operations identified in section 6 below. 1. Controller You as the Data Controller grant users the right to access the Services in accordance with the terms of the Agreement for transfer of Customer Data identified in sections 3, 4 and 5 below, as it relates to the processing operations identified in section 6 below. 2. Processor We as the Data Processor received data identified in sections 3, 4 and 5 below, as it relates to the processing operations identified in section 6 below. 3. Data Subjects You acknowledge and agree that the categories of Data subjects that use and might process Customer Data via the Services are solely determined by you and your User’s use of the Services. Notwithstanding the foregoing, the Customer Data processed usually concerns the following categories of Data Subjects: 4. Categories of Customer Data For using the Services, we do not require any other Customer Data from Users other than the full name, email address, password and IP address for using the Services. The categories of Customer Data processed is solely determined by you and your Users use of the Services. Customer Data might be stored in database records, metadata and files on file systems which identify or may reasonably be used to identify, Data Subjects. You agree and acknowledge that you and your Users have to strictly abide by the Acceptable Use Policy (AUP) and that Customer Data is only processed via the Services with the prior written consent of the Data Subject. 5. Special categories of Personal Data We do not require any special categories of Personal Data for using the Services, and your and your User’s use of the Services solely determine if and which special categories of Personal Data are stored and processed. You agree and acknowledge that you and your Users have to strictly abide by the Acceptable Use Policy (AUP) and that sensitive Personal Data is only processed via the Services with the prior written consent of the Data Subject. 6. Processing operations The Customer Data processed will be subject to the following basic processing activities: Processing operations include, but are not limited to: The following descriptions provide an overview of the technical and organisational security measures implemented. It should be noted however that, in some circumstances, in order to protect the integrity of the security measures and in the context of data security, detailed descriptions may not be available. It’s acknowledged and agreed that the technical and organisational measures described therein and in our internal Security Policies will be updated and amended from time to time, at our sole discretion. Notwithstanding the foregoing, the technical and organisational measures will not fall short of those measures described in the Security Policy in any material, detrimental way. 1. Hosting Infrastructure We utilise third party Hosting infrastructure in form of data centres and Infrastructure-as-a-Service (IaaS) with organizations that maintain current ISO 27001 certifications and/or SSAE 16 SOC 1 Type II or SOC 2 Attestation Reports. We will not utilise third party data centres that do not maintain the aforementioned certifications and/or attestations, or other substantially similar or equivalent certifications and/or attestations. 2. Physical Access Control Technical or organisational measures regarding access control, especially regarding legitimation of authorised persons. The aim of the entrance control is to prevent unauthorised people from physically accessing such data processing equipment which processes or uses Customer Data. We employ measures designed to prevent unauthorized persons from gaining access to data processing systems and the Services in which Customer Data is processed, such as the use of security personnel, secured buildings and data center premises. For our Services, the constructional and substantive security standards comply with the security requirements for data centres. 3. System Access Control Technical and organisational measures regarding the user ID and authentication: The aim of the system access control is to prevent unauthorised use of data processing systems, are used for the processing of Customer Data. The following may, among other controls, be applied depending upon the particular Services ordered: authentication via passwords and/or two-factor authentication, documented authorization processes, documented change management processes, and logging of access on several levels. For our Services: (i) log-ins to Services Environments by our employees and Sub-processors are logged; (ii) logical access to the data centers is restricted and protected by firewall/VPN/SSH/SSL; and (iii) intrusion detection systems, centralized logging and alerting, and firewalls are used. 4. Data Access Control Technical and organisational measures regarding the on-demand structure of the authorisation concept, data access rights and monitoring and recording of the same: Measures regarding data access control are targeted on the basis that only such data can be accessed for which an access authorisation exists and that data cannot be read, copied, changed or deleted in an unauthorised manner during the processing and after the saving of such data. Customer Data is accessible and manageable only by properly authorized staff, direct database query access is restricted, and application access rights are established and enforced. Access to data necessary for the performance of the particular task is ensured within the systems and applications by a corresponding role and authorisation concept. 5. Transmission Control Technical and organisational measures regarding the transport, transfer, transmission, storage and subsequent review of Customer Data on data media (manually or electronically). Transmission control is implemented so that Customer Data cannot be read, copied, changed or deleted without authorisation, during transfer or while stored on data media, and so that it can be monitored and determined as to which recipients a transfer of Customer Data is intended. Except as otherwise specified for the Services or parts thereof, transfers of data outside the Services environment are encrypted. The content of communications (including sender and recipient addresses) sent through some email or messaging services may not be encrypted. You are solely responsible for the results of your decision to use unencrypted communications or transmissions. The transfer of Customer Data to a third party (e.g. sub-processors) is only made if a corresponding contract exists, and only for the specific purposes. If Customer Data is transferred to companies located outside the EEA, we provide that an adequate level of data protection exists at the target location or organisation in accordance with the European Union’s data protection requirements, e.g. by employing contracts based on the Standard Contractual Clauses. 6. Data Entry Control Technical and organisational measures regarding recording and monitoring of the circumstances of data entry to enable retroactive review: Data Entry Controls are implemented so that a retroactive review is enabled. System inputs are recorded in the form of log files and database records therefore it is possible to review retroactively whether and by whom Customer Data was entered, altered or deleted. 7. Data Backup and Availability Control Technical and organisational measures regarding data backup (physical/logical): Data backup and availability controls are implemented to protect Customer Data against accidental destruction and loss. For our Services: backups are taken on a regular basis where you have chosen a corresponding Hosting type or Backup option as defined in the agreement. 8. Data Processing Control Technical and organisational measures to differentiate between the competences of principal and contractor: The aim of the data processing control is to provide that Customer Data is processed by a commissioned data processor in accordance with the Instructions of the principal. Details regarding data processing control are set forth in the Agreement and DPA. 9. Data Segregation Technical and organisational measures regarding purposes of collection and separated processing: Customer Data from our different customers environments is logically segregated on our systems or those of Sub-processors. Customer Data used for internal purposes only e.g. as part of the respective customer relationship, may be transferred to a third party such as a sub-processor, solely under consideration of contractual arrangements and appropriate data protection regulatory requirements. Employees are instructed to collect, process and use Customer Data only within the framework and for the purposes of their duties (e.g. service provision). Customer Data is stored in a way that logically separates it from other customer data. Your privacy is important to us. This privacy policy describes the information practices which we WhiTech LLC, trading as “WhiTech” (“we”, “us”) employ in relation to the information which you, (“you”, “your”) provide when using the www.cai.cloudadore.com site (“Website”) or otherwise communicate with us in respect of our services. By accessing and using the Website and/or communicating with us in respect of our services you are accepting and agreeing to the practices described in this Privacy Policy. The Information We Collect We collect personally identifiable information relating to you (including name, address, phone number and e-mail address) (“Personal Information”) in the following situations: The Data and Information you Upload to IPC Services Users of WhiTech services can upload and transmit data to virtual drives (“Virtual Drive Data”) for storage and usage in relation to our services. All Virtual Drive Data uploaded to WhiTech is stored securely on our servers in our dedicated rack space in the Egypt. Unless you give WhiTech explicit permission, we will never inspect your stored data and will only measure the volume of your transmitted data for billing purposes or inspect your transmitted data to investigate suspected violations of our Acceptable Use Policy. We will never disclose your data to any third party unless we are required to do so by court or administrative order (see below). WhiTech assumes no responsibility on the compliance of the content of the Virtual Drive Data with the applicable laws and regulations and you expressly relieve WhiTech from any and all liability arising from or in connection with the Virtual Drive Data. How We Normally Use Information About You We will only use your Personal Information for the purpose(s) for which you provide it to us including for We only share your Personal Information with our associate offices and appointed agents and sub-contractors from time to time where appropriate and with other entities only as described below. We ensure the parties with whom we share your Personal Information follow practices at least as protective as those described in this Privacy Policy: Virtual Drive Data is never shared with associate offices, appointed agents, sub-contractors or other entities and third parties for any reason whatsoever. All data on virtual drives remains on servers wholly owned and controlled by WhiTech within the legal jurisdiction of the Egypt. If you are resident in the Egypt please note that the Personal Information and Virtual Drive Data you provide to WhiTech are stored in the Egypt. Collection of Information by Third-Party Sites Our Website may contain links to other websites whose information practices may be different to ours. You should consult the privacy notices of those third party sites as we have no control over information that is submitted to, or collected by them. WhiTech has no control over, and assumes no responsibility for, the content privacy policies, or practices of any third party websites. You expressly relieve WhiTech from any and all liability arising from your use of any third party website. Data Security The Client shall retain full sole root/administrative access at the file system level to their data. The Contractor system does not have access or visibility inside cloud servers or to drive data. All Client data is handled automatically by our system, this includes drive deletion, scheduled deletion of drives (for deprecated accounts), drive cloning and other data operations. The Contractor shall take no additional copies of Client drive data either within or externally from the cloud location without Client express permission. The sole copy of Client drive data resides specifically in our cloud location that the Client chooses unless subject to an explicit Client request to do otherwise. We employ security measures to prevent unauthorized access to information that we collect from you. Please note that email correspondence with us is in free format text and cannot be encrypted. Accordingly please do not send any sensitive information such as credit card details or account passwords via email. Destruction of Data Upon termination of the Agreement (as defined by the Terms of Service), WhiTech shall destroy the Personal Information and the Virtual Drive Data Notwithstanding the above, WhiTech shall have the right to maintain the Personal Information and Virtual Drive Data for legal compliance purposes and for the period specified by the applicable laws and regulations. Cookies A cookie is a text-only string of information that a website transfers to the cookie file of the browser on your computer’s hard disk so that the website can remember who you are. A cookie will typically contain the name of the domain from which the cookie has come, the “lifetime” of the cookie, and a value, usually a randomly generated unique number. When you visit our Website we send you a cookie. Cookies may be used in the following ways: Two types of cookies may be used on this website, session cookies, which are temporary cookies that remain in the cookie file of your browser until you leave the site, and persistent cookies, which remain in the cookie file of your browser for much longer (though how long will depend on the lifetime of the specific cookie). Disabling / Enabling Cookies You can accept or decline cookies by modifying the setting in your browser. Please note that if you disable cookies you may not be able to use all the features of our Website or WhiTech services. Law Enforcement We share your Personal Information and Virtual Drive Data with law enforcement agencies when obliged to do so by court or administrative order with appropriate jurisdiction. Data Protection Rights Under the General Data Protection Regulation (GDPR) If you are a resident of the EEA, you have the following data protection rights: We respond to all requests we receive from individuals wishing to exercise their data protection rights in accordance with applicable data protection laws. Children’s Privacy CloudSigma does not knowingly collect information from children under the age of 13, and children under 13 are prohibited from using our Services. If you learn that a child has provided us with personal information in violation of this Privacy Policy, you can alert us at legal@cloudsigma.com. Revisions to this Privacy Policy We reserve the right to revise the whole or any part of this Privacy Policy from time to time.When we revise this Privacy Policy, we will update this page and indicate the date that it was last modified or we may email you.. How to Contact us Information which you provide to us or we gather from the Website or in the course of providing services to you is controlled by WhiTech. “WhiTech” is a trading name and registered trademark of WhiTech LLC. Registered in Zahraa Al Maadi, Cairo Egypt Registered office: Unit no 13 the eight floor, building no 10061, Zahraa Al Maadi, Cairo, Egypt Last Updated: 30 November 2023 As part of the Terms of Service governing all purchases of WhiTech LLC, trading as “WhiTech” (“we”, “us”) services, we provide the following service level to you (“you”, “your”): 100% Virtual Server Availability Guarantee WhiTech guarantees 100% network availability in any given calendar month. The network will be deemed ‘available’ if WhiTech’s border routers and switches are available and responding to WhiTech monitoring tools in a non-degraded manner. 100% Network Uptime Guarantee WhiTech guarantees 100% network availability in any given calendar month. The network will be deemed ‘available’ if WhiTech’s border routers and switches are available and responding to WhiTech monitoring tools in a non-degraded manner. 1ms or less Network Latency Guarantee WhiTech guarantees a network latency of 1ms or less for data packets between servers within WhiTech’s services and network. The network latency refers to network latency times between the boundary layer of one virtual server to the boundary layer of another virtual server and excludes internal latency times resulting from software running within a virtual server at either end of the data transit. Credit If we fail to meet the guarantees detailed above, you will be able to request a credit as detailed below up to a maximum of 100% of your fee for capacity used during the previous 30 calendar days: In the event that we fail to meet the guarantee on more than one occasion within a period of 30 calendar days, then the credit that you may claim for any incident will be limited to the maximum of 100% of your fee for capacity used since the previous incident or 100% of your fee for capacity used during the previous 30 calendar days, whichever fee is lower. To receive a credit, you must contact us at support@cloudsigma.com within 30 calendar days of the incident, specifying the start time, date and duration of the qualifying period which forms the basis of your claim and the amount of credit claimed. We will be the sole arbiter regarding the award of credit and our decision will be final and binding. Limitations and Exemptions The following items or situations are exempt from WhiTech’s guarantees: A user must be up to date with all payments and have sufficient pre-pay balance where appropriate to cover current usage levels to be eligible for the credits outlined in this Service Level Agreement. No credits will be extended if a user is delinquent on any payments or has insufficient balance to continue using WhiTech services at usage levels during the qualifying claimed credit period for at least 10 calendar days. The award of credit by WhiTech to you as described in this Service Level Agreement will be the sole and exclusive remedy for unavailability or performance degradation of WhiTech services. Credits will only be provided against future service and for the avoidance of doubt may not be exchanged for cash or other forms of payment. Notwithstanding anything in this Service Level Agreement to the contrary, the maximum total credit for the monthly billing period, including all guaranties, shall not exceed 100% of your fee for the previous 30 calendar days. Credits beyond your fee for the previous 30 calendar days will not be carried forward for use against future fees. This Service Level Agreement forms part of your Agreement with WhiTech, along with the Acceptable Use Policy, and is subject to all the terms and conditions stated in these documents. Last Updated: 30 November 2023
element of the Agreement you must not take up any of the Services offered by the Website. The Agreement imposes significant legal obligations on you and also places limits on your legal rights. Please seek independent legal advice before entering into the Agreement.
or over and are accessing and using the Website and the services offered via the Website lawfully.Variation to the Agreement
2. Purchase of Credits
these Terms of Service) are:
Pound (EGP)
○ 3.9.1 an original or certified copy of photographic ID in the form of a driving licence or
passport; and/or
○ 3.9.2 an original or certified copy of proof of address as deemed acceptable to us.
be entitled to immediately suspend and/or terminate your use of Services.
and information stored on the WhiTech network and infrastructure as part of provision of Services
to you is recoverable in the case of any data loss, system fault, software failure, hardware failure
or other activity which results in any loss of data, information or other item that is being stored as
part of our Services.
○ 3.12.1 we have reason to believe that the Services, have, are being or will be used in
violation of the Agreement;
○ 3.12.2 we have reason to believe that the Services, have, are being, or will be used in
violation with the applicable laws and regulations;
○ 3.12.3 you don’t co-operate with reasonable investigations into suspected violations of
the Agreement;
○ 3.12.4 we reasonably believe that your Services are being access or used by third
parties without your authorisation;
○ 3.12.5 your Credit Balance is zero and/or insufficient to cover current Services being
utilised by you;
○ 3.12.6 we reasonably believe it is necessary in order to protect our network infrastructure and Services to other customers;
○ 3.12.7 we discover that you are affiliated with a person or legal entity that has used our
Services in the past and had their account terminated; or
○ 3.12.8 we are required to do so by law.
unless it our reasonable belief that an immediate suspension or shorter notice is required to
protect our network infrastructure and services to other customers from significant operational or
security risk or because we are compelled to do so by law.
obligations under the Agreement by you. You may be charged a reinstatement fee of up to SAR
375 to remove a suspension over your account.
Services under your account. You represent and warrant that you are solely responsible for the
use of Services whether or not authorised by you, by any employee of yours, any person to whom
you have given access to the Services and/or any person who gains access to your data or
Services as a result of a failure by you to use reasonable security precautions. You hereby
indemnify us and hold us harmless against all costs, claims, expenses and damages whatsoever
arising from the use of or access to your data or Services by any third party.
servers as part of the Services we offer to you.
you by virtue of our provision of the Services.
any and all warranties not expressly stated in the Agreement, including the implied warranties of
merchantability, fitness for a particular purpose, and non-infringement.
IS basis.
will be final and binding.
○ 4.1.1 only to use the Services in accordance with the Acceptable Use Policy;
○ 4.1.2 to comply with applicable laws at all times;
○ 4.1.3 not to interfere with Services or the provision of Services;
○ 4.1.4 you will at all times act in good faith in relation to the Services;
○ 4.1.5 not to continue to use Services if you have had an account suspended or terminated now or at any time in the past;
○ 4.1.6 that you are solely responsible for the suitability of the service chosen;
○ 4.1.7 to use reasonable security precautions in relation to your use of the Services;
○ 4.1.8 only share your password with a person or persons whom you have authorised to use your account;
○ 4.1.9 that your account is non-transferable and you will be liable for any and all activities undertaken using your user account together with the associated password, whether or not the person undertaking the activities has been authorised by you;
○ 4.1.10 keep up to date your billing, contact and other account information;
○ 4.1.11 that there are inherent risks with Internet connectivity that may result in the loss of your privacy, Confidential Information and/or property;
○ 4.1.12 immediately notify us of any suspected or actual unauthorised use of your account or any security breach; and
○ 4.1.13 to be solely and entirely responsible for maintaining at least one current backup copy outside of WhiTech’s network of all data (including but not limited to operating systems, content and programs) stored on WhiTech’s network to ensure that the potential for losses is mitigated.
○ 4.5.1 payment of all fees and charges in a prompt and timely manner;
○ 4.5.2 your full compliance with the Agreement including these Terms of Service;
○ 4.5.3 compliance with all relevant laws and regulations at all times; and
○ 4.5.4 maintenance of sufficient Credit Balance to ensure Services remain fully paid up;
○ 4.5.5 your purchasing of additional Credits as required via the WebApp once your Credit Balance becomes insufficient to maintain Services for 24 hours based on your Service usage and pay-as-you-go rates of exchange of Credits for Services level at that time.
○ 4.6.1 you are 18 years of age or over, capable of taking responsibility for your own actions and of sound mind;
○ 4.6.2 you are able to enter into a legally binding agreement with us;
○ 4.6.3 if you are entering into the Agreement on behalf of a company or other legal entity you have the legal authority and entitlement to bind that entity into the Agreement;
○ 4.6.4 you are the person whose details are provided in connection with your user account;
○ 4.6.5 you are not an undischarged bankrupt or in a voluntary arrangement with your creditors; and
○ 4.6.6 you are not a person to whom WhiTech is legally prohibited to provide Services.
in respect of any case of damage, loss or claim in relation to data loss, system fault, software
failure, hardware failure or other activity which results in any loss of data, information or other
item that is being stored as part of our Services.
you and you believe that such action has been taken incorrectly, you must immediately contact us
to allow a full investigation into the matter thereby limiting and mitigating against damage, loss
and claims as a result of the suspension and/or termination.
○ 9.1.1 you do not remove, distort or otherwise alter the size or appearance of the “WhiTech” logos or trademarks;
○ 9.1.2 you do not create a frame or any other browser or border environment around the
Website;
○ 9.1.3 you do not in any way imply that we are endorsing any products or services other than our own;
○ 9.1.4 you do not misrepresent your relationship with us nor present any other false information about us;○ 9.1.5 you do not otherwise use any “CloudSigma” trademarks and/or logos displayed on the Website without express written permission from us;
○ 9.1.6 you do not link from a website that is not owned by you; and
○ 9.1.7 your website does not contain content that is distasteful, offensive or controversial, infringes any intellectual property rights or other rights of any other person or otherwise does not comply with all applicable laws and regulations.
○ 10.3.1 the information you provided about yourself was false, materially inaccurate or incomplete;
○ 10.3.2 you were not 18 years old or did not have the legal capacity to enter into the Agreement at the time of submitting the Purchase for Services either in the capacity as an individual or on behalf of another person or legal entity;
○ 10.3.3 we are precluded from providing the Services to you by law or the decision of a
competent legal or governmental authority;
○ 10.3.4 you do not use your account for a continuous period of three (3) months or more;
○ 10.3.5 your Credit Balance is zero (or negative) and you do not purchase any additional Credits within five (5) Working Days. In which case we shall additionally be entitled to immediately delete all data and information previously supplied as part of the Services and in relation to your account;
○ 10.3.6 a credit report indicates you no longer meet our reasonable criteria for creditworthiness;
○ 10.3.7 you are declared bankrupt, become insolvent, cease trading or otherwise are
unable to meet debt and payment obligations as they fall due;
○ 10.3.8 you fail to pay any sum due to us as it falls due and do not remedy the overdue amounts within five (5) Working Days or receiving notice from us that you have amounts overdue;
○ 10.3.9 we reasonably decide that your ability to pay has been adversely affected including your credit or debit card being declined or us receiving notice of any disputed charges with your credit or debit card provider or your bank;
○ 10.3.10 you violate the Acceptable Use Policy;
○ 10.3.11 your death or the ceasing to exist of a legal entity where applicable; or
○ 10.3.12 you fail to comply with any provision of the Agreement and do not remedy the failure within twenty (20) Working Days of our notice to you outlining the failure.
○ 10.6.1 will not have access to any data stored on our network and infrastructure using
the Services;
○ 10.6.2 must discontinue use of the Services;
○ 10.6.3 shall remain liable for any amounts outstanding including negative Credit Balance
at the date of termination; and
○ 10.6.4 must relinquish use of any IP addresses and server names assigned to you by us
in relation to the Services and also point any Domain Name Services away from us in
relation to you.
○ 10.7.1 the accrued rights and liabilities of the parties arising in any way out of this
Agreement at the date of termination including without limitation the right to recover
damages against the other; and
○ 10.7.2 any provisions expressed to survive this Agreement, which shall remain in full
force and effect.
○ By Post:
Unit no 13 the eight floor, building no 10061, Zahraa Al Maadi, Cairo, Egypt
○ Email: legal@cloudsigma.com
and we do not make any representations or warranties if such information subsequently proves to be inaccurate or out of date. Neither us nor any other contributor to the Website make any representation or gives any warranty, condition, undertaking or term either expressed or implied as to the condition, quality, performance, accuracy, fitness for purpose, completeness or freedom from viruses of the content contained on this website or that such content will be accurate, up to date, uninterrupted or error free.
○ 16.3.1 pre-contract or other representations;
○ 16.3.2 damages or losses as a result of disruption or interruptions of any kind to Services and any associated data loss or lack of availability; and
○ 16.3.3 loss of business, contracts, anticipated savings, loss of profit, loss of revenue, loss of goodwill, loss of reputation, loss or use of data or any indirect or consequential losses under any circumstances.
these Terms of Service, the Privacy Policy, the Copyright Notice, the Data Processing Agreement
and the Service Level Agreement, provided that changes are consistent with applicable law,
industry norms and are reasonable. Any changes we make during the term of the Agreement will
become effective to you in reference to all Services past, present and future when the earliest of
the following occurs:
Agreement;
○ 19.1.2 you exchange additional credits for our Services; or
○ 19.1.3 thirty (30) days after our notice to you describing the change.
the Agreement by giving us written notice of termination on such grounds not later than thirty (30)
days following the date that you were notified of the change. If you terminate the Agreement
following such a change, thirty (30) days from the date of receipt by us of your written notice of
termination:
Any Services not fully delivered at that time will be converted back to Credits and added
to your Credit Balance based on the original rate of exchange used in relation to said
Services; and
Copyright WhiTech LLC, 2023. All rights reserved.
systems and networks without the express permission of the system or network owner;
continuous high CPU or I/O use;
and
Terms of Service.
Copyright WhiTech LLC, 2023. All rights reserved.
such acknowledgement and the WhiTech web address (cai.cloudadore.com) in the copy of the material,1. Definitions
level of protection;
or Binding Corporate Rules;
5.2 You represent and warrant that you have obtained any and all necessary permissions and authorisations necessary to permit us, our Affiliates and Sub-Processors, to execute their rights or perform their obligations under this DPA.
5.3 You are responsible for compliance with all applicable data protection legislation, including requirements with regards to the transfer of Customer Data under this DPA and the Agreement.
5.4 All Affiliate(s) of you who use the Services shall comply with your obligations set out in this DPA.
5.5 You shall implement appropriate technical and organisational procedures to protect Customer Data, taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons. You shall implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk, including inter alia as appropriate: (i) the pseudonymisation and encryption of Customer Data; (ii) the ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and
services; (iii) the ability to restore the availability and access to Customer Data in a timely manner in the event of a physical or technical incident; (iv) a process for regularly testing, assessing and evaluating the effectiveness of technical and organisational measures for ensuring the security of the processing. In accessing the appropriate level of security account shall be taken in particular of the risks that are presented by processing, in particular from accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to Customer Data transmitted, stored or otherwise processed.
5.6 You shall take steps to ensure that any natural person acting under your authority who has access to Customer Data does not process the Customer Data except on your instructions.
5.7 You shall agree to forward any notification received from the Processor or any Sub-processor pursuant to Clause 4.3 to the data protection supervisory authority if the you decide to continue the processing or to lift the suspension.
5.8 You may require correction, deletion, blocking and/or making available the Customer Data during or after termination of the Agreement. We will process the request to the extent it is lawful, and will reasonably fulfil such request in accordance with its standard operational procedures to the extent possible.
5.9 You acknowledge and agree that some instructions from you, including destruction or return of data from us, may result in additional fees. In such case, we will notify you of such fees in advance unless otherwise agreed.
Appendix 2: Technical and Organisational Security Measures
example to:
Copyright WhiTech LLC, 2023. All rights reserved.
Copyright WhiTech LLC, 2023. All rights reserved.