Additional Service Specific Terms:
Terms of Use for Downloadable Content:
When the Products and Services purchased by Client contain downloadable content owned by Fortra or its licensors such
as SCORM files, videos, posters and communications tools (the “Downloadable Content”), Fortra hereby grants Client a
limited, non-exclusive and non-transferrable right and license to use and reproduce the Downloadable Content during the
Subscription Term solely for Client’s internal training purposes, for the quantities specified in the Purchase Agreement
and in accordance with the Purchase Agreement. Notwithstanding the foregoing, Client does not have the right to modify
or create derivative works from the Downloadable Content. Client agrees to demonstrate and prove, upon Fortra’s demand
and to Fortra’s satisfaction, the number of Authorized Users that are using or have used the Products and Services
(including the SCORM files) during the Subscription Term. Client agrees to pay Fortra any underpaid fees revealed by
such verification.
Client will permanently delete or otherwise destroy any Downloadable Content at the expiration of the Agreement or the
relevant Purchase Agreement and will, upon demand, provide a sworn statement by an officer of Client confirming such
deletion or destruction.
Usage of Phishing Simulator:
If the Products and Services purchased by Client include the Phishing Simulator, the following terms apply: (a) the
Phishing Simulator does not store any information directly provided by users being subjected to simulated phishing
attempts. The Phishing Simulator collects such information as the IP address of the user, browser type, operating system,
etc., which can then be incorporated in the reports generated by the platform; (b) Client agrees to use the Phishing Simulator
only in compliance with applicable laws, including intellectual property laws. For greater clarity, the Client agrees that,
when operating the Phishing Simulator, it will only make use of third-party text, graphic or other protected content with
the permission of its owner or pursuant to an exception existing under applicable law, such as fair use, fair dealing or other
similar exceptions, that allows for the use of protected content for educational purposes; (c) Client acknowledges that the
Phishing Simulator can only be used for training purposes, with the objective of increasing the awareness of users to
phishing attacks; (d) Client may only use the Phishing Simulator internally, with its employees, and at all times in
compliance with its internal policies; and (e) Client may only use the Phishing Simulator to send electronic mail messages
to addresses belonging to domains owned by it or under its control.
Usage of Gmail Phish Submitter and Outlook Phish Submitter add-ons:
Phish Submitter allows end users to report phishing simulations emails and other suspicious messages. Emails reported
via Phish Submitter are immediately forwarded to security response team