Fortra's Terranova Security Solution Specific Schedule

Additional Service Specific Terms:


Terms of Use for Downloadable Content:


When the Products and Services purchased by Client contain downloadable content owned by Fortra or its licensors such 
as SCORM files, videos, posters and communications tools (the “Downloadable Content”), Fortra hereby grants Client a 
limited, non-exclusive and non-transferrable right and license to use and reproduce the Downloadable Content during the 
Subscription Term solely for Client’s internal training purposes, for the quantities specified in the Purchase Agreement 
and in accordance with the Purchase Agreement. Notwithstanding the foregoing, Client does not have the right to modify 
or create derivative works from the Downloadable Content. Client agrees to demonstrate and prove, upon Fortra’s demand 
and to Fortra’s satisfaction, the number of Authorized Users that are using or have used the Products and Services 
(including the SCORM files) during the Subscription Term. Client agrees to pay Fortra any underpaid fees revealed by 
such verification.


Client will permanently delete or otherwise destroy any Downloadable Content at the expiration of the Agreement or the 
relevant Purchase Agreement and will, upon demand, provide a sworn statement by an officer of Client confirming such 
deletion or destruction.


Usage of Phishing Simulator:


If the Products and Services purchased by Client include the Phishing Simulator, the following terms apply: (a) the 
Phishing Simulator does not store any information directly provided by users being subjected to simulated phishing 
attempts. The Phishing Simulator collects such information as the IP address of the user, browser type, operating system, 
etc., which can then be incorporated in the reports generated by the platform; (b) Client agrees to use the Phishing Simulator 
only in compliance with applicable laws, including intellectual property laws. For greater clarity, the Client agrees that, 
when operating the Phishing Simulator, it will only make use of third-party text, graphic or other protected content with 
the permission of its owner or pursuant to an exception existing under applicable law, such as fair use, fair dealing or other 
similar exceptions, that allows for the use of protected content for educational purposes; (c) Client acknowledges that the 
Phishing Simulator can only be used for training purposes, with the objective of increasing the awareness of users to 
phishing attacks; (d) Client may only use the Phishing Simulator internally, with its employees, and at all times in 
compliance with its internal policies; and (e) Client may only use the Phishing Simulator to send electronic mail messages 
to addresses belonging to domains owned by it or under its control.


Usage of Gmail Phish Submitter and Outlook Phish Submitter add-ons:


Phish Submitter allows end users to report phishing simulations emails and other suspicious messages. Emails reported 
via Phish Submitter are immediately forwarded to security response team