Table of Contents
1. Effective/Last-Change Date 2
2. Scope 2
3. Changes and Supplemental Terms 2
4. Contact Us 2-3
5. Introduction 3
6. Compliance, Privacy Shield Framework, Safe Harbor 4-6 Framework and Data Transfer Agreements
7. Other Privacy Frameworks and Principles 6
8. Related Standards, Laws, Practices and Policies 6-10
9. Principles – Privacy Shield and Safe Harbor Alignment 10-21
9.1 Notice 11-13
9.2 Choice 13
9.3. Accountability for Onward Transfer 14-15
9.4 Security 15
9.5 Data Integrity and Purpose Limitation 15-20
9.6 Access 20-21
9.7 Recourse, Enforcement and Liability 21
II. TERMS 22-25
1. Copyrights, Trademarks and other Intellectual Property 22
3. Disclaimer of Warranty and Limitation of Liability 22
4. Use of the Teradata Logo 22-23
5. Permissible Use and Restrictions on Use 23
6. Claims of Copyright Infringement 24-25
7. Export Laws 25
8. Miscellaneous 25
1. Effective/Last-Change Date
September 28, 2016.
We will treat all PI in accordance with this policy statement or as the relevant persons or data subjects (“you”) otherwise consent. This policy also applies to Teradata websites, social media sites, mobile and desktop applications (“apps”) and other online contacts and communications between you and Teradata, and other documents and communications to which this policy statement applies, is appended or is incorporated by reference, and where, if required by applicable law, you additionally have agreed or consented to the terms of this policy statement (collectively, our “Sites”).
3. Changes and Supplemental Terms
We will post public notice, such as through the Effective Date written on the cover page of this document and at the top of this page, at www.teradata.com/privacy for at least 30 days when this policy statement is updated or modified in a material way. If we wish to propose using PI in a manner different from stated and applicable at the time of collection, we will give notice of it, and you will be given the choice to consent or not consent to use of that information in such a way. From time to time, we may propose to supplement or amend this policy statement and other PDP terms with site-specific or interaction-specific information and terms, such as with respect to a particular permission-based subscription, membership, forum, transaction, location, country, information-type or particular other web, information exchange or social media site (“Supplemental Privacy Terms”). If so and when applicable to a Teradata Site with which you are interacting, you will be given notice of, and a choice to consent or not consent to, any such applicable Supplemental Privacy Terms.
In addition, Teradata employees with access credentials to Teradata’s online networks may access Teradata’s internal policies, information protection standards and related information that pertain to PDP (including those that pertain to Human Resources (“HR”) data) through the internal Teradata online homepage under the “Resources” tab by selecting “Corporate Policies” and/or “Information Security.” Any employee who does not have online access to those items will be provided with copies after he or she requests them from his or her manager, his or her Teradata Human Resources representative or the Teradata Ethics, Compliance and Privacy Office.
4. Contact Us
Questions, concerns, complaints and disputes regarding this policy statement, data privacy at Teradata or Teradata’s compliance with applicable PDP laws and regulations or with the principles of the EU-U.S. Privacy Shield Framework or the U.S.-Swiss Safe Harbor Framework may be directed to the Teradata Ethics, Compliance & Privacy Office
by e-mail at: Ethics&[email protected]
or by mail at:
Ethics, Compliance & Privacy Office
Attn: Todd B. Carver, Chief Ethics, Compliance and Privacy Officer
10000 Innovation Drive
Dayton, Ohio, USA 45342-4927
PDP-related issues that are specific to Information Technology (“IT”) Security may be directed to our global Information Security Office
by e-mail at: [email protected]
or by mail at:
Information Security Office
Attn: Timothy Kiggins, Chief Information Security Officer
10000 Innovation Drive
Dayton, Ohio, USA 45342-4927
In addition, questions, concerns, complaints and disputes regarding this policy statement, data privacy at Teradata or Teradata’s compliance with applicable PDP laws and regulations or with the principles of the EU-U.S. Privacy Shield Framework or the U.S.-Swiss Safe Harbor Framework, as well as regarding other ethics and compliance issues, may be submitted to the Teradata Ethics Helpline. The Teradata Ethics Helpline is a third-party administered service that is freely accessible online and by telephone around-the-clock (other than during planned maintenance and unplanned outages) and in multiple languages. It also accommodates confidential and anonymous reporting to the extent permissible under applicable laws. The administrator of the Teradata Ethics Helpline refers matters raised through the Teradata Ethics Helpline to the Teradata Ethics, Compliance and Privacy Office. You may contact the Teradata Ethics Helpline
online at: https://tdhelp.alertline.com/gcs/welcome
or by telephone at: 1-866-455-0993.
Privacy is a priority at Teradata. Privacy and information security are very important to us. Maintaining trust, securing private information, and respecting the privacy of everyone we encounter are paramount to us.
Protecting privacy is part of our culture, values and everyday conduct at Teradata. Our commitment to privacy and information security goes beyond what is written in this policy statement. That commitment is a part of our foundation and culture. Integrity, responsibility, being people-focused, and being dedicated to our customers are among our core values that we apply to all aspects of our business, including with regard to PDP. Trust and accountability are declared qualities for which we strive and that we recognize in our workforce, in our supply chain and with our business partners, including with respect to PDP. Our Code of Conduct includes commitments by, and expectations of, us and all Teradata employees, contractors and suppliers to protect data and comply with laws, including with respect to laws that pertain to PDP. We regularly train, reinforce, set the tone and example from management, and communicate with our workforce about the importance, requirements, standards and practices applicable to PDP at Teradata. Our Supplier Code of Conduct and our Business Partner Code of Conduct also incorporate the principles of the Teradata Code, as well as global laws and standards regarding PDP and the principles of the United Nations Global Compact and Electronic Industry Citizenship Coalition (“EICC”) Code of Conduct (which includes privacy-related ethics commitments). For more about our culture, values, codes of conduct, ethics and compliance program and related corporate responsibility initiatives, please see http://www.teradata.com/code-of-conduct/ and http://www.teradata.com/corporate-social-responsibility/ (see particularly the “Teradata Corporate Social Responsibility Report” linked to that webpage; for the version of that report which covers 2015, see pages 41 through 50 for reporting regarding our ethics-and-compliance-related initiatives, training, codes and results).
Privacy and information security also are important customer-relations, employee-relations, supplier-relations and business-partner-relations and satisfaction issues for us. We have written policies and often agree through contracts to help assure that we, our suppliers and our service-providers comply with additional PDP requirements, standards and practices, and to help assure that industry, customer, legal, regulatory and consumer expectations and requirements regarding PDP are respected and satisfied. More details concerning those laws, requirements, standards, practices and policies are set forth below.
6. Compliance, the EU-U.S. Privacy Shield Framework, U.S.-Swiss Safe Harbor Framework and Data Transfer Agreements
In addition to the compliance-with-laws and other commitments pertaining to PDP as set forth in the preceding section of this policy statement, Teradata, including Teradata Corporation and its U.S.-based controlled subsidiaries, Teradata US, Inc., Teradata Operations, Inc., Teradata International, Inc., and Teradata Government Systems LLC, recognizes, abides by, commits to comply with and self-certifies to compliance with the EU-U.S. Privacy Shield Framework and the U.S.-Swiss Safe Harbor Framework, and their underlying principles and subprinciples as set forth by the U.S. Department of Commerce, regarding the collection, use, retention, transfer, disclosure and handling of certain personal, individual and personally-identifiable information collected from or about residents or citizens of the European Economic Area (“EEA”), European Union (“EU”) or Switzerland. Those underlying principles include: Notice; Choice; Accountability for Onward Transfer; Security; Data Integrity and Purpose Limitation; Access; and, Recourse, Enforcement and Liability. More information is set forth below regarding how each of these principles is addressed at Teradata. Prior to agreement and implementation of the EUU.S. Privacy Shield Principles by EU and U.S. officials, Teradata also committed to comply with and self-certified to compliance with the predecessor U.S.-EU Safe Harbor Framework Principles.
For more information about the EU-U.S. Privacy Shield Framework or to access Teradata’s Privacy Shield certification registration, please go to https://www.privacyshield.gov. To directly access the EU-U.S. Privacy Shield List, please go to https://www.privacyshield.gov/list.
To directly access information regarding the U.S.-Swiss Safe Harbor Framework, please go to http://2016.export.gov/safeharbor/swiss/index.asp, and to directly access the U.S.-Swiss Safe Harbor List, please go to https://safeharbor.export.gov/swisslist.aspx.
For more information about the U.S.-EU Safe Harbor Framework that preceded the EU-U.S. Privacy Shield Framework or to access Teradata’s last U.S.-EU Safe Harbor certification registration, please go to the U.S. Department of Commerce website at http://www.export.gov/safeharbor/ or, while online, select the Safe Harbor logo above. To directly access the U.S.-EU Safe Harbor List, please go to https://safeharbor.export.gov/list.aspx or, while online, select the “We self-certify compliance with:” image above.
Teradata also takes measures to comply with EEA/EU/Swiss cross-border data transfer laws that pertain to PI by having in place express consents and written intra-group data transfer agreements among various Teradata subsidiaries and entities in the EEA/EU/Switzerland with various relevant Teradata subsidiaries and entities in United States and other applicable countries (“Data Transfer Agreements” or “DTAs”). The intra-group DTAs incorporate EEA/EU/Swiss-approved “Standard Contractual Clauses” (also referred to as “Model Clauses”) with respect to those data transfers. We also comply with EEA/EU/Swiss data transfer laws regarding PI with respect to other countries that have been recognized by them as having adequate protections for PI (e.g., Israel, Argentina, Canada and New Zealand) by complying with and/or being subject to the jurisdiction of the applicable laws and regulations of those countries for PI that is transferred to those countries. We have had a number of our intragroup DTAs in place since approximately 2008. We review, change, update and add to the intra-group DTAs as our business, entities, operations, offerings and data flows, and applicable laws, regulations, requirements and frameworks evolve; and, we intend to continue to do so over time. Teradata’s multidimensional approach to PDP compliance with respect to EEA/EU/Swiss data transfer laws and regulations enables us to comply with EEA/EU/Swiss data transfer laws and regulations by at least one of several different legally-recognized means, even if one of those mechanisms is deemed invalid, expired or inapplicable (e.g., such as was the case with respect to the U.S.-EU Safe Harbor Framework prior to adoption of the EU-U.S. Privacy Shield Framework).
Teradata typically acts as a “data processor” with respect to PI we access, collect, use, process, retain, transfer, disclose or handle for one of our customers, and our customer typically serves as the “data controller” with respect to PI processed by or for that customer.
With respect to PI that we access, collect, use, process, retain, transfer, disclose or handle for ourselves, such as with regard to our own employees so we may manage, account for and provide their employment, compensation, benefits and human resources management (“HR data”) and with regard to visitors of our online Sites, Teradata typically serves as the “data controller.” Our service providers who access, collect, use, process, retain, transfer, disclose or handle PI for us typically serve as downstream “data processors” or “sub-processors” for us.
Overview regarding how we handle Personal Information when we are the “data controller”.
Questions, Issues, Complaints and Disputes. Teradata commits to try to address all questions, concerns, complaints and disputes you may have with us regarding your privacy and our collection or use of your PI. You may submit questions, concerns, complaints and disputes directly to Teradata at the e-mail or mailing addresses set forth under the “Contact Us” heading of this document, or through the Teradata Ethics Helpline, also as set forth under the “Contact Us” heading of this document. With respect to PDP-related complaints and disputes, we commit to respond within a reasonable timeframe, not to exceed 45 days, and include a description of our assessment of the merits of the complaint/dispute/problem and of how we will rectify the complaint/dispute/problem
Dispute Resolution. Teradata also has committed to referral of all unresolved PDP complaints/disputes from EU, EEA or Swiss citizens or residents regarding their PI transferred to or for Teradata in the U.S. to an independent dispute resolution services provider and dispute resolution mechanism. The provider for such PI-related complaints/disputes is the International Center for Dispute Resolution (“ICDR”), international division of the American Arbitration Association (“AAA”), and the dispute resolution mechanism is the ICDR/AAA International Arbitration Rules, based on documents only and as modified by applicable ICDR/AAA Privacy Shield Procedures or applicable Safe Harbor Administrative Procedures. Consistent with the principles of the EU-U.S. Privacy Shield Framework and the U.S.-Swiss Safe Harbor Framework, if you are subject to such a framework you may initiate and proceed with this dispute resolution mechanism without any filing fees or dispute-resolution-provider administrative costs being borne by you (i.e., Teradata will be responsible for all filing fees and dispute-resolutionprovider administrative fees for such dispute resolution mechanism). If Teradata does not timely acknowledge or satisfactorily address your PI-related privacy complaint/dispute/problem within 45 days after our receipt of your notice, you may contact the ICDR/AAA and initiate that independent dispute resolution process. For online access to information about the ICDR/AAA Privacy Shield or Safe Harbor programs or to initiate a complaint under the ICDR/AAA Privacy Shield or Safe Harbor Programs, please visit http://info.adr.org/safeharbor/. For citizens and residents of countries that are not subject to the EU-U.S. Privacy Shield Framework or U.S.-Swiss Safe Harbor Framework, or to the extent your home country does not recognize the above-described dispute resolution provider or dispute resolution process as valid, but who have unresolved privacy-related complaints about or disputes with Teradata, complaints/disputes may be referred to the AAA and resolved in accordance with the AAA’s Commercial Arbitration Rules (see http://www.adr.org), the U.S. Federal Trade Commission, U.S. Department of Commerce or a data protection authority (“DPA”), court or other forum of competent jurisdiction over the applicable Teradata entity and the data subject. Irrespective of the foregoing, all complaints and disputes regarding HR data that includes employee PI is subject to jurisdiction of the applicable Data Protection Authority for the country/location of the relevant Teradata employee (including applicants and former employees and their families and beneficiaries regarding whom PI is disclosed to or obtained by Teradata).
7. Other Privacy Frameworks and Principles
In developing and validating our privacy and privacy-related information security policies and standards, we respect, have adopted and/or have taken into account many additional major frameworks and principles developed and applied around the world (many of which also have been incorporated into the laws of various countries, provinces, states and other jurisdictions), including:
- ISO 29100:2011 (Privacy Framework)
- ISO 27002:2013 (Information Technology – Security Techniques – Code of Practice for Information Security Controls)
- ISO 27018:2014 (Protection of customer PII/data privacy in public cloud environments)
- Online Privacy Alliance Guidelines
- Organisation for Economic Co-operation and Development (“OECD”) Guidelines on the Protection of Privacy and Trans-border Flows of Personal Data
- OECD Guidelines for Multinational Enterprises (Article VIII regarding Privacy)
- OECD Guidelines for the Security of Information Systems and Networks
- United Nations (“UN”) Guidelines for the Regulation of Computerized Personal Data Files
- International Standards on Privacy and Personal Data Protection (the “Madrid Resolution” on International Privacy Standards)
- Asia Pacific Economic Cooperation (“APEC”) Privacy Framework
- European Data Protection Directive (EU Directive 95/46/EC)
- European Privacy and Electronic Communications Directive (EU Directive 2002/58/EC)
- European General Data Protection Regulation (“GDPR”)
- Council of Europe Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data, and its Additional Protocol regarding Supervisory Authorities and Trans-border Data Flows
- Cybersecurity in the Golden State, a 2014 guide by the California Attorney General for businesses regarding PDP
- Australian Privacy Guide by the Office of the Australian Information Commissioner, Feb. 2014
- Article 29 Working Party opinions (“WP29”) regarding PDP
- Self-Regulatory Principles for Online Behavioral Advertising (“OBA Principles”)
- Council of Better Business Bureaus (“BBB”) and Direct Marketing Association (“DMA”) PDP principles
- Mobile Marketing Associations Code of Conduct for Mobile Marketing.
8. Related Standards, Laws, Practices and Policies
Teradata Corporation is a publicly-traded company listed on the New York Stock Exchange (“NYSE”). It is subject to the regulations of, disclosure duties of, and oversight by the U.S. Securities and Exchange Commission (“SEC”), as well as the listing standards and requirements of the NYSE. It also is subject to the standards, controls and obligations of the Sarbanes-Oxley Act of 2002, Section 404 (“SOX”). Collectively, the requirements of these bodies and laws include controls, validation of compliance and disclosure of material non-compliance with respect to certain procedures, policies and controls. Accordingly, when we come to possess, control, process, transfer or transmit PI that is subject to PDP laws, we implement policies, practices and procedures intended to comply with those requirements, and we implement controls, testing and validation procedures, such as reviews and audits, to help assure they are complied with. PI categories and PDP laws, including related litigation and regulatory rulings, we monitor and take acts to comply with, where, and as applicable, include:
- Health/Medical (e.g., the Health Insurance Portability and Accountability Act of 1996, Security Rule (“HIPAA”), the Health Information Technology for Economic and Clinical Health (“HITECH”) Act in the U.S., and related Omnibus Rules);
- Financial Accounts/Transactions (e.g., the Graham-Leach-Bliley Act (“GLBA”), Privacy and Safeguards Rules in the U.S.);
- Consumer Credit and Credit Cards (e.g., the Fair and Accurate Credit Transactions Act (“FACTA”), Disposal Rule and Safeguard provisions);
- Electronic records and electronic signatures (e.g., FDA Title 21 CFR Part 11 of the U.S. Code of Federal Regulations regarding Food and Drug Administration (“FDA”) guidelines);
- Deceptive acts/practices with respect to information (e.g., U.S. Federal Trade Commission (“FTC”) regulations, guidelines and rulings);
- Commercial e-mail spam (e.g., Controlling the Assault of Non-Solicited Pornography and Marketing (“CANSPAM”) Act of 2003 in the U.S.; the Canadian Anti-Spam Law (“CASL”));
- Personal information and electronic documents (e.g., the Federal Trade Commission (“FTC”) Act in the United States; the Personal Information Protection & Electronic Documents Act (“PIPEDA”) in Canada; the Federal Data Protection Act in Germany; the Personal Data Act in Sweden; the Data Protection Act in the United Kingdom (“UK”); the Privacy Act in Australia; the Personal Information Protection Act in Japan; CNIL regulations in France; and other privacy protection laws and regulations in China, India and many other countries, provinces and states throughout the world, including the California Online Privacy Protection Act and the Massachusetts Data Security Regulation);
- Personal information possessed and/or processed by government bodies (e.g., the U.S. Privacy Act and, in Canada, the Freedom of Information and Protection of Privacy Act (“FIPPA”));
- Government-issued identification numbers and related information (e.g., various laws pertaining individually identifiable data and identification numbers pertaining to social benefits, public service, social security, driver licenses, etc.);
- Safeguards and notices/remedies for breached data (e.g., various laws requiring proper storage, handling and protection of PI when shared with vendors and service providers, and providing for notices and remedies for certain data breaches);
- California’s ‘Shine the Light’ Law (e.g., Under California Civil Code Section 1798.83, if you are a California resident and your business relationship with us is primarily for personal, family or household purposes, you may request certain data regarding our disclosure, if any, of certain PI to third parties for the their direct marketing purposes; to request such information from us, please send us an e-mail at one of the email addresses under the “Contact Us” heading of this document, specifying in that request if you are a California resident and that you are making a “Request for California Privacy Information”; you may make such a request up to once per calendar year (or more frequently to the extent provided for by applicable law); if applicable, we will provide you by e-mail with a list of the categories of PI disclosed to third parties for their direct marketing purposes during the immediately preceding calendar year, along with the third parties’ names and addresses; not all PI sharing is covered by this law);
- Children and students (e.g., the Children’s On-line Privacy Protection Act of the United States (“COPPA”) and California Student Online Personal Information Protection Act (“SOPIPA”). (No one who has not reached the age of majority in his or her country may use our Sites unless supervised by an adult. Whether or not the preceding sentence applies to you, if you are under 13 years of age, do not register on any of our Sites, do not make any purchases through any of our Sites, and do not send any information about yourself to us, including your name, address, telephone number or e-mail address. In the event we learn we have collected PI from a child without verification of parental consent, we will delete that information. We do not knowingly collect information from children under the age of 13 (or the age of majority in applicable countries) and do not knowingly target our websites, social media, offerings, business activities or other Sites to children. We encourage parents and guardians to take an active role in their children’s online, mobile and social media activities and interests. Our goal is to comply with all applicable laws and regulations relating to collection and use of information from children, including COPPA. If you believe we have received information from a child or other person protected under such laws, please notify us immediately by e-mail. We will take reasonable steps not to use or share that information further, and to remove that information from our databases);
- Disabled users (e.g., As a matter of practice, we strive to comply with the sixteen standards for Web Accessibility, written by the Access Board for Section 508 of the U.S. Workforce Reinvestment Act of 1998 (select the following link for more information: http://www.access-board.gov/guidelines-andstandards/communications-and-it/about-the-section-508-standards), as may be updated from time to time or comparable accessibility standards. We also strive to comply with other accessibility laws, requirements and standards that may apply to our Sites, depending on location and local laws (for example, see the “Teradata Accessibility” link posted at http://www.teradata.com/corporate-socialresponsibility/ regarding our accessibility policy statement for Ontario, Canada, which is intended to align with requirements of Ontario, Canada, laws)).
We also have in place physical, technical, procedural and administrative safeguards designed to implement reasonable and appropriate security measures and protect PI from unauthorized access, disclosure and use. Teradata uses security protocols and mechanisms to exchange and transmit sensitive data, such as sensitive financial account data. When sensitive data, such as a credit-card or payment-card account number or security code is entered on our Sites, we encrypt it using secure socket layer (“SSL”) technology (or like replacement technology that is at least as secure as SSL).
Teradata also has developed and complies with standard operating procedures designed to meet or exceed various internationally-recognized standards related to PDP to the extent relevant to us and our activities. These include:
- National Institute of Standards and Technology (“NIST”) Cybersecurity Framework with regard to our cyber crisis response planning and procedures, and our cybersecurity incident management process
- ISO 15408 for Common Criteria security certification has been achieved for various versions of our flagship Teradata Relational Database Management System (“RDBMS”) software
- ISO 17799 certification has been achieved for our remote security processes and procedures
- ISO 27001:2005 or ISO 27001:2013 certification and compliance has been achieved regarding information security management practices for a Global Consulting Center (“GCC”) location of our professional services organization
- Service Capability and Performance (“SCP”) Support Standard certification has been achieved by us for best practices in the services industry, including with respect to PDP
- ISO 9001:2008 certification for Teradata Research & Development (“R&D”, also referred to as “Teradata Labs”) has been achieved with respect to a quality management system to provide products which fulfill customer and regulatory requirements and aim to enhance customer satisfaction – including with respect to features and functions in our products and product development pertaining to PDP
- Capability Maturity Model Integration (“CMMI”) Level 3 including Integrated Product and Process Development (“IPPD”) has been achieved by us for development of products and services from conception through delivery and maintenance, including with respect to PDP features and functions
- IT Infrastructure Library Framework for high-quality, effective, compliant and proactive managed services
- Payment Card Industry – Data Security Standards (“PCI-DSS”) have been satisfied and verified for credit/payment-card transactions where we are the merchant or are hosting such a solution for a customer who is the merchant
- Other indicators – our commitments to and achievements regarding excellence in corporate governance, responsibility and controls has been validated and recognized by us repeatedly having been included in the World’s Most Ethical Companies listing, FTSE4Good Index and Dow-Jones Sustainability Indices.
Teradata products and services, and additional products and services available from our business alliance partners (such as Protegrity, Novetta and others) that can be utilized along with our solutions and offer features and functions designed to enhance PDP. We also have an Information Security, Privacy and Regulatory Compliance (“InfoSec”) Center of Expertise (“COE”) through which we have experienced and certified experts and consultants who provide information, training, tools, resources, best practices and consultation to our business and our customers and business alliance partners regarding privacy protection, privacy compliance and information security. Features, functions and offerings in this area include encryption, intrusion detection and prevention, vulnerability management, risk assessments, operating system hardening, authentication, identity management, control of access rights, virus protection, disk scrubbing, auditing and monitoring, network security, physical security, database security, security policies and procedures, certification and accreditation. Because these aspects of our business, products, services, business alliance partner offerings, and InfoSec COE resources and offerings are extensive and being updated and expanded continuously, please visit and browse our Sites for current information related to our PDP products, services, offerings, partners and resources.
Teradata has numerous internal written global policies (plus local policies in many countries and supplemental business, organizational, departmental and function/role-specific policies) that pertain to PDP, including the following global policies (a Teradata “Corporate Management Policy” is designated below as a “CMP”; a Teradata “Corporate Finance and Accounting Policy” is designated below as a “CFAP”):
- Protecting Information within Teradata (CMP 1402)
- Confidential Information Disclosure (CMP 1407)
- Protection of Personal (Employee/Workforce) Data (CMP 204)
- Privacy of Protected (Employee) Health Information (HIPAA) (CMP 205)
- Information Technology Infrastructure Requirements (CMP 1404)
- Data Management (CMP 1406)
- Record Retention (CFAP 111)
- Sharing of (Teradata) Financial Information (CMP 820)
- Publication of Proprietary Technical Information (CMP 911)
- Responding to Governmental Requests for Information (CMP 916)
- Electronic Data Interchange (“EDI”) for Trading Data (CMP 1405)
- Corporate Security (CMP 1700)
- Internal Accounting Controls – Information Systems (CFAP 1809)
We publish an “Information Security” ethics guide for our employees that all relevant employees are required to read, receive training on, and certify their understanding of and compliance with – when they are hired by us and annually thereafter and in connection with our Code of Conduct training and certification processes. We also publish a “Social Media Guide” for our employees, reinforcing that our PDP policies and practices also apply to their uses of social media. We conduct background checks and screening (subject to applicable laws) regarding proposed newhire employees; these are conducted with the prospective employee’s express permission or otherwise in compliance with applicable laws, and we have practices, procedures and arrangements in place with third-party service providers who assist us with background checks and screening to assure that the rights of individuals are honored and that their PI is not used or disclosed for any illegal or impermissible purpose. Newly-hired employees also are required to sign agreements and acknowledgements to agree and verify they will protect, not make unauthorized use of, and not make unauthorized disclosure of private and confidential information to which they may have access through Teradata, and they confirm such each time they log-on to our network and systems, as well as acknowledge and confirm that they are granting us permission to monitor their use of our network, systems and IT resources, with no expectation of personal privacy by them to the maximum extent permitted by law.
We publish a “Rules of the Road” IT Security reference document for all Teradata employees and contractors, as well as “Data Protection Awareness – Frequently Asked Questions (FAQ)”. In addition to PDP being addressed in our Code of Conduct for employees, our employee Code of Conduct training, our Supplier Code of Conduct and our Business Partner Code of Conduct, we also provide our employees with standalone periodic training regarding PDP.
We also have internal IT practices and procedures that pertain to PDP. Our internal written IT Information Protection Standards (“IPS”s) include:
- IPS Administration (IPS 101)
- Information Protection Data Center and Operations Requirements (IPS 102)
- Application Development/Deployment Standards (IPS 103)
- Secure Firewall Implementation (IPS 107)
- User ID and Password Management (IPS 109)
- Platform Compliance Monitoring, Administration & Oversight (IPS 115)
- Server Operating System Security Requirements (IPS 119)
- IT Service Production System Access Authorization Requirements (IPS 125)
- Wireless Network Security Requirements (IPS 127)
- Teradata Information at Non-Teradata Sites (IPS 128)
- Information Security for Connecting Outsourced Development & Support (IPS 129)
- Information Security for Teradata Global Consulting Centers (IPS 130)
- Encryption Standard for Teradata (IPS 131)
- Uses of Non-Teradata-Owned Apple Laptops on the Teradata Network (IPS 132)
Other IT practices we employ to help protect privacy and information include: penetration, vulnerability and firewall tests; anti-virus tools on all workstations; deployment of anti-spam and anti-phishing tools; URL and e-mail filtering; deployment of patch management tools; deployment of host-based intrusion detection system (“IDS”) and firewall protection tools; licenses to a data loss prevention (“DLP”) tool; deployment of network access control tools; scans and blocks for advance persistent threats (“APT”); tests, scans, spot-checks, validations and reviews by internal auditing, as well as third-party subject-matter-expert service providers; deploying full disk encryption on all Teradata laptop computers; encryption on all Teradata servers and selected desktops; and, deploying Mobile Device Management (“MDM”) security tools and requirements for certain mobile devices used to access the Teradata network. We maintain and regularly update an IT Security internal online site for our employees where information relevant to information security is aggregated and made accessible to our employees.
Our main IT infrastructure production systems are operated from highly secure data centers that are designed and implemented to help assure PDP is achieved. Those systems are routinely backed-up, the back-up data is secured, and redundancy, disaster recovery and business continuity planning are built-in to our practices and procedures with respect to that data.
With respect to consulting, professional services and managed services activities we perform for our customers, we generally control and segregate access to PI that our customers possess or process, and comply with other industry-driven and customer-driven privacy and information security practices. For example, for most of our services engagements for deployments of our solutions at our customer sites or at our customer-selected data centers, we either do not have access to the PI in our customers’ data, or, where we do, we often do so solely through secure workstations and network connections provided and managed by or for the customer, used only for that purpose, and accessible by log-on credentials and other security measures only by our authorized personnel who are in ‘need-to-know’ positions with respect to that data. Typically, for our customer onsite solutions, we do not access or take possession of our customers’ PI or other sensitive data, nor remove it from our customers’ sites.
The same applies with respect to our Global Consulting Centers (“GCC”s), such as those in the Czech Republic, Philippines, India, Pakistan and China. The services performed at those centers typically do not involve access to or possession of customer data that includes PI, particularly with respect to PI that is individually-identifiable or individually-sensitive. In the exceptional circumstances where we do, strict controls, practices and procedures are applied to secure and limit access to the PI. Where applicable laws or contract provisions prohibit or restrict access to solutions or information from locations, from countries, or by citizens or residents of other than where the solution or data is located, we implement procedures to help assure we comply with those requirements.
When we run research, development or technical support tests and benchmarks against data for our customers, we rarely have access to or take possession of actual unmodified individually-identifiable PI. If PI is involved, sensitive individually-identifiable data elements typically are encrypted, obfuscated, truncated or otherwise made anonymous. In the exceptional circumstances where we must access or take possession of sensitive individuallyidentifiable PI for critical testing, support or benchmarking, strict controls, practices and procedures are applied to secure and limit physical and electronic access to the data and data rooms, data centers and facilities involved.
When we host solutions for our customers, it is required to be done on systems that are separate from the IT infrastructure we use and access to manage and operate our own business. The data of various hosted customers is segregated from the data of other customers. Hosted solutions are operated from highly secure third-partyowned or third-party-operated data centers designed and implemented to help assure that PDP is achieved. The solutions we host, as set forth in the applicable hosting contracts or in standards incorporated into the contracts with our respective customers, are routinely backed-up, the back-up data is secured, and redundancy, disaster recovery and business continuity planning are built-in to our practices and procedures with respect to the hosteddata. Typically, with respect to environments where we serve as a data processor for our data-controllercustomers, the hosted-environment and cloud-environment contracts make it the primary responsibility of our data-controller-customers to specify their policy, government and industry regulatory compliance requirements. We work with our hosted customers and cloud customers to help assure their data is stored, processed and managing according to their requirements. Teradata also, upon occasion and as set forth in the applicable engagement contract, functions in the role of trusted advisor to our customers and will help identify and bring to the attention of our customers PDP risks or non-compliance issues we notice in the normal course of business while providing services, hosted offerings or cloud offerings.
Written contracts typically are entered into and apply to each circumstance applicable to us that involve PI. For example, written contracts are entered where: our solutions are located and services are performed onsite for a customer; we provide services offsite through a GCC; we are running tests, benchmarks or providing technical support services; or, we are hosting a solution for a customer. Also, contracts may be entered into between various Teradata subsidiaries to help assure and document that adequate PDP measures are implemented, information is secured, and applicable laws are complied with, including those that pertain to trans-border data export, transfers and flows (e.g., adopting and applying EU-U.S. Privacy Shield Framework principles, U.S.-Swiss Safe Harbor Framework principles or EU Standard Contractual Clauses (Model Clauses) in Data Transfer Agreements). We also enter into written contracts with our applicable service providers, contractors and subcontractors; these contracts typically include or incorporate confirming and supplemental PDP and compliance-with-laws obligations.
9. Principles – Privacy Shield and Safe Harbor Alignment
The following further identifies the key principles aligned with the EU-U.S. Privacy Shield Framework and the U.S.- Swiss Safe Harbor Framework that we apply to data privacy and privacy-related information security at Teradata, particularly with respect to Personal Information from or about consumers, employees and other individual online visitors. We apply these principles even where and to the extent the Privacy Shield or the Safe Harbor may be deemed invalid or inapplicable, and we also apply them through Data Transfer Agreements and practices intended to comply with applicable local/country PI and PDP laws and regulations. For each of the identified principles, the following aligns with and provides additional information about how those principles are incorporated into, and applied by us through, our polices, practices and procedures. Relevant statements and portions of the preceding sections of this policy statement also apply to and are incorporated into this section by reference.
9.1 “Notice” Principle
Through this policy statement Teradata provides notice to online visitors, consumers, employees, customers, partners and others (“you”) with clear and accurate information about our policies, practices and procedures that pertain to the collection, use, retention, transfer, disclosure and handling (“Use”) of Personal Information (“PI”), and our compliance with privacy and data protection (“PDP”) standards and laws.
Teradata believes and recognizes that you have the right to be informed about PI being collected regarding you individually and about the intended-use of that PI. We believe and recognize that you have the right to determine whether you will allow collection or other Use of your PI, to know the purpose of that collection and Use, and to unsubscribe or otherwise opt-out if you do not wish, or no longer wish, to have some or all of your PI collected, Used at all, or Used for a particular purpose (other than as expressly set forth herein, such as when necessary in connection with a transaction, employment or legal-compliance obligations). We also believe and recognize that you have the right to review individually-identifiable PI about you that we collect, retain or otherwise Use, and you have the right to have a way to update and correct that PI.
Teradata will apply these principles through practices that have the equivalent effect of this policy regardless of the specific technologies utilized for the collection or other Use of your PI. We also will apply these principles to your PI, whether it is in electronic or paper form.
Notice of what we do. Teradata provides analytic data solutions, including integrated data warehousing, big data analytics and business applications for customers worldwide. Our data warehousing solutions combine software, hardware and related business consulting and support services. Our analytic technologies transform data into actionable information to help customers make the best decisions possible. These solutions can also include thirdparty products and services from other leading technology and service business partners.
Our solutions enable our customers to integrate detailed enterprise-wide data such as their customers’, financial and operational data, and provide the analytical capabilities to transform that data into useful information, available when and where they need it to make better and faster decisions. Our analytic data solutions provide a high level of performance, scalability, availability and manageability for strategic and operational requirements. Our consultant-employees combine proven methodologies, deep industry expertise and years of hands-on experience to help our customers quickly capture business value while minimizing risk. Our customer services professionals provide a single source of support services to allow our customers to maximize use and fully leverage the value of their investments in analytic data solutions. Through active enterprise intelligence, Teradata is extending the use of traditional data warehousing by integrating advanced analytics into enterprise business processes, allowing companies to combine the analysis of current and historical data so operations personnel can make decisions at the point-of-contact or point-of-service and take action as events occur.
Additionally, Teradata offers a family of data warehouse offerings, providing customers with the ability to use Teradata for point-solutions or data marts, in addition to our core integrated data warehouse technology. Teradata offers analytic data solutions to many major industries, which include financial services (e.g., banking and insurance), media and communications (e.g., telecommunications, e-business, media and entertainment), retail, manufacturing, healthcare, government, and travel and transportation. Teradata delivers its solutions primarily through direct sales channels, as well as through alliances with systems integrators, independent software vendors, value-added resellers and distributors. We deliver our solutions globally to more than 3,000 business, government and institutional customers. We do so through a business-to-business (“B2B”) operations model.
Teradata has a presence on the web that includes www.teradata.com.
Teradata’s social media links include:
Notice of where we operate. We are a global multinational company. We are headquartered in the U.S., our primary R&D organization and facility, “Teradata Labs”, is based in the U.S., and most of our hardware-software platform products we distribute to our customers’ sites are integrated, assembled and distributed from the U.S. We also have R&D, services, sales and field operations, data processing centers, and facilities in many other countries. Our Aster Data business operations are based in San Carlos, California, USA. We have customers in over 60 different countries. We have over 100 different facilities across the world. Our supply-chain reaches across the globe. We have over 10,000 employees across the world. Accordingly, our information sources, data subjects, data objects and data flows often span the globe.
Notice of the types of information we handle. We acquire, administer, operate, host, outsource, interact with, maintain, support and service software, applications, hardware, networks, communications systems, websites, information sharing exchanges, social media venues and other sites, blogs, wikis and forums for:
- operating, managing and communicating about our own business, offerings and activities;
- R&D (such as for benchmarking, testing, quality assurance, research, and product development and integration);
- providing technical, maintenance, support, back-up, recovery, diagnostic, consulting, implementation, and other related services for our customers; and,
- use by or for our customers, including through solutions we host, including offerings we provide to or host for our customers in the forms of Software as a Service (“SaaS”), Data Warehousing as a Service (“DWaaS”), social computing and cloud computing.
Notice of whose information we handle. In connection with these activities and other interactions incidental to our business, we often access, collect, store, process, disseminate and otherwise Use information, in either or both electronic/digital form or physical/paper form, regarding a variety of people and entities. These include those in the following categories:
- “Visitors” – including those who choose to visit or use the websites, web portals, information exchange sites, blogs, wikis, social media sites, domains, downloadable applications, apps, conferences, network systems, or facilities we host, own, operate, or have hosted or operated for us, as well as those who communicate with us, including by e-mail or other electronic or digital means, and such as through helplines, call-centers, telecommunications and the like)(with the subset of those who do so through electronic or digital means being referred to as “Online Visitors”);
- “Employees” – including applicants, prospective employees, joint, temporary and contract employees, former employees, and retirees, and their qualifying family members, beneficiaries and insured, such as those who receive or are eligible for benefits through us;
- “Customers” – including customer and prospective customers, and their representatives;
- “Partners” – including current and prospective suppliers, vendors, contractors, subcontractors, representatives, distributors, resellers, systems integrators, joint marketers, advertiser, sponsors and services providers;
- “Customer/Partner Constituents” – including people and entities who are the visitors, employees, customers, partners, constituents or other data subjects of our Customers or Partners, such as those about whom data is stored and processed on our solutions by or for our Customers; and
- “Others” – including people who are or may be influencers related to our business or technologies, such as analysts, academia, members of the media, investors, members of subject-area communities, industry communities and geographical or jurisdictional communities in which we operate, and those who do not fit into one or more of the preceding other categories.
Notice about Personal Information. For purposes of this policy statement, “Personal Information” or “PI” means any information relating to an identified or identifiable individual, either alone or in reasonable combination with other information available to us. It includes all: personally identifiable information regarding you; personal information regarding and identifiable to you to the extent it is subject to privacy law or privacy regulation provisions, protections or restrictions; and, non-public information regarding and identifiable to individuals to the extent subject to privacy or confidentiality provisions, protections or restrictions in, or incorporated into, written or electronic contracts entered into by or for Teradata.
Notice about collection and use of Personal Information regarding Online Visitors. As set forth in more detail below, we collect information about Online Visitors to our online Sites, including through the use of registration, subscription, application download, apps, permission-grant, opt-in and log-on (“Register”) procedures, as well as cookies, flash cookies, web beacons and other online technology and marketing tools. If you choose to Register, such as to receive more information about us, our products or services, or about our Customers or Partners or their products or services, we may ask for certain information in order to keep you informed about available information, products, services and offerings, to serve you more effectively and efficiently, and to maintain open communications with you. In addition to contact information, our request may include, but not be limited to: name, title, company, postal address, telephone numbers, and e-mail address; information regarding your current and future objectives or preferences to help us understand how and when we may be of service to you; your operating environment to accurately present solutions and capabilities; and, other information from time-to-time to aid us in improving our communications, online Sites and marketing efforts. We may further collect log-on/Register information, such as user names of Customer/Partner Constituents who log-on to solutions we host for our Customers or who access online service-related portions of or portals through our Sites. PI also is collected when you Register or contact us to request or subscribe to newsletters, white papers, events, seminars, user groups, conferences, webcasts, webinars, blogs, wikis, training programs, discounts, coupons or other events or offers, services or forums we might provide, when you provide us with other information in an online or paper form, or when you contact us by e-mail, social media post, paper correspondence, telephone or other means. We also collect PI when you choose to participate in special offers, surveys or contests that we conduct or sponsor.
9.2 “Choice” Principle
Teradata commits to provide consumers and employees with information on the intended use of PI pertaining to them, and with mechanisms permitting the exercise of choice by them regarding disclosure of that information. More specifically:
Consumers – Teradata will not release PI to unaffiliated third parties, unless (1) the consumer requests it or expressly consents to it, (2) the data is provided to help complete a consumer-initiated transaction, (3) the disclosure is required by law, or (4) the consumer has been informed about the possibility of such disclosure and has decided not to opt-out (or has decided to opt-in, double-confirmed opt-in, or meet some other higher standard where that is expressly required by applicable law).
Employees – Teradata will not release PI to unaffiliated third parties, except and only as specifically provided for under (1) internal corporate policies, (2) as reasonably necessary for employment-related purposes and transactions, (3) the Employee requests it or expressly consents to it, (4) the data is provided to help complete an Employee-initiated communication or transaction, (5) the disclosure is required by law, or (6) the employee has been informed about the possibility of such disclosure and has decided not to opt-out (or has decided to opt-in, double-confirmed opt-in, or meet some other higher standard where such is expressly required by applicable law).
We also will respect your preferences and choices for how we contact you regarding marketing and promotional communications. We may provide you, for example, with opportunities to subscribe to e-mail lists or newsletters. If you previously signed-up to receive e-mailed information about our products, services, or special offers, but no longer wish to receive those communications you may opt-out from receiving some or all of those types of communications by selecting the ‘unsubscribe’ link, replying with ‘unsubscribe’ in the subject line in the e-mail, following the ‘unsubscribe’ or ‘preferences’ setting instructions appended to the communication, or communicating with us through one of the e-mail addresses or mailing addresses set forth in the “Contact Us” section of this document.
There are other circumstances in which we may share your PI with third parties. For example: we may disclose your PI to a third party when we, in good faith, believe disclosure is appropriate to comply with the law or a regulatory requirement, or to comply with a subpoena or court order; to prevent or investigate a possible crime, such as identity theft, hacking, cyber-attacks or other cyber-crimes; to enforce a contract; to protect the rights, property, intellectual property, or safety of Teradata or a third party; or to protect other vital interests.
In addition, your PI may be transferred to another company that has acquired the stock, or all or part of the assets or operations of Teradata (or of an applicable Teradata business operation or Teradata organization), for example, as the result of a sale, merger, reorganization, dissolution, bankruptcy, receivership or liquidation. If such a transfer occurs, the acquiring company’s use of your PI will be subject to this policy and the privacy preferences and choices you have expressed to us. While we are committed to maintaining the privacy and security of your PI in compliance with this policy and to the extent reasonably possible, we cannot and do not promise or guarantee that your PI always will remain totally private.
9.3. “Accountability for Onward Transfer” Principle
The EU-U.S. Privacy Shield Framework, U.S.-Swiss Safe Harbor Framework, HIPAA and other laws typically allow transfer of PI to a third party who is acting as a service provider, agent or “data processor” if the ultimate “data controller” takes certain steps to assure privacy and security protections. We may disclose PI to others, for example, in the following circumstances:
- to business Partners and subcontractors who need to access it in connection with the performance of requested services or solutions, or as otherwise appropriate in connection with a legitimate business need;
- to service providers who host or facilitate the delivery of online training, seminars and webinars;
- to e-mail-delivery services and other technology providers;
- to third parties who may assist in the delivery of marketing materials, technical support services, or other products, services or other information;
- with authorized reseller/distributor/marketing Partners or our subsidiaries or branches so they may follow up with you regarding products and/or services;
- Applicant Information and Employee data may be shared, on a confidential and use-restricted basis, with our affiliates, subsidiaries, recruiting advisors and service providers, as well as other third parties such as background-screening organizations for the purposes described in this policy statement and for employment-related activities as set forth elsewhere in this document and as reasonably necessary in connection with an Employee transaction or communication, compensation, benefits, tax and social benefits reporting and withholding, and other legal, compliance and reporting obligations;
- in connection with the sale or transfer of all or part of our business;
- as required or permitted by law, or when we believe in our sole discretion that disclosure is necessary or appropriate to protect our rights, protect your safety or the safety of others, investigate fraud, comply with a judicial proceeding, court order, law-enforcement or government request, or other legal process; and
- to any other third party with, and to the extent of, your affirmative consent.
In these situations, we will take reasonable steps to require the recipient to protect your PI in accordance with relevant applicable principles of the EU-U.S. Privacy Shield Framework and U.S.-Swiss Safe Harbor Framework, or otherwise take steps to ensure your PI is appropriately protected.
Trans-border data transfers/flows. Teradata is a global company with technical systems and processes that cross various national and other jurisdictional borders. PI collected by us may be transferred across country, state, provincial and other jurisdictional borders, and stored or processed in the U.S. or any other country in which we maintain facilities for the purposes of data consolidation, storage, information management and other Use. Transborder data transfers of PI are performed only if and as permissible by applicable law and, where required by applicable law, with the consent of the data subject. We will handle your PI collected by our systems in a consistent manner, as described in this policy statement, any applicable Supplemental Privacy Terms and your affirmative consent, even if the laws in some relevant countries or jurisdictions may provide less protection for your PI. Our privacy practices are designed and intended to help to protect your PI all over the world.
9.4 “Security” Principle
Teradata will take appropriate measures to ensure that PI is protected from unauthorized access and disclosure, including limiting access to such information only to those employees, service providers and Partners who have a legitimate business need to know it for a purpose permitted by this policy statement, applicable Supplemental Privacy Terms, or with express consent.
We take reasonable physical, administrative and technical measures to protect PI under our control from loss, misuse and unauthorized access, disclosure, alteration and destruction. In particular, we employ the following security measures, among others:
Security policies. We design, implement and support our IT infrastructure, data center operations, cloud operations, products and services according to documented security policies. At least annually, we assess our policy compliance and make necessary improvements to our policies and practices.
Employee training and responsibilities. We take steps to reduce the risks of human error, theft, fraud, and misuse of our facilities. We train our personnel on our privacy and security policies. We also require our employees to sign confidentiality agreements. We also have assigned to an Information Security Officer the ultimate responsibility to manage our global information security program.
Access control. We limit access to PI only to those individuals who have an authorized purpose for accessing that information. We terminate those access privileges and credentials following job changes which no longer require such access and upon employment termination. We also have designated local or organizational data protection officers, stewards or managers for various locations and organizations of the company, and where required by applicable law.
Data encryption. Our policies and procedures require that we use encrypted connections for any electronic transfers of PI.
Unfortunately, no security measures can be guaranteed to be 100-percent effective. It is important you understand that no site, system or network is completely secure or “hacker proof”, “cyber-attack proof” or “cyber-crime proof.” It is important for you to guard against unauthorized access to your passwords and the unauthorized use of computers and other electronic/data-access devices you own or control.
We strongly urge you to do your part and take measures to preserve your own data privacy and to protect and secure your own information. Among the practices you should consider and implement are: use differing passwords for differing accounts; use ‘strong’ passwords; use screen locks; be suspicious of and do not reply to e-mails that include your personal financial information; check web addresses carefully for fake, variant or apparentlymisspelled URLs; use e-mail and Internet Service Provider (“ISP”) anti-spam functionality, settings and processes; set your browser and device settings to the levels of privacy and security you desire; and, use, keep-updated, and apply desired settings for security and virus protection software tools on your devices. For information, tips and practices regarding online privacy and data protection, consider visiting an online group or site of your choice (e.g., considering your language, country, location, types of uses, types of data, types of devices and types of communications) that is dedicated to sharing information regarding data privacy and information protection. One you might find helpful and instructive, for example, is http://www.staysafeonline.org/ powered by the National Cyber Security Alliance, and its “Stop. Think. Connect.” initiative.
9.5 “Data Integrity and Purpose Limitation” Principle
Teradata will limit the collection and other Use of sensitive individually identifiable PI to that which is reasonably needed for valid business purposes or to comply with applicable laws. Any such data will be obtained by us only through lawful and fair means.
When you visit us online, we want you to feel secure that we are respecting your privacy. Individually identifiable PI we collect about you when you visit us online is the information you choose to provide by Registering or by providing other feedback or consent to us, subject to this policy and any applicable Site-specific Supplemental Privacy Terms. When we do receive that kind of PI from you, we do not share it other than for purposes and with other parties as permitted through this policy, through applicable Supplemental Privacy Terms, and when you have granted consent (such as when necessary in connection with a transaction, employment or legal compliance obligations).
Categories of cookies we use include:
Strictly necessary (essential) cookies – These are required for the operation of our Site. They include, for example, cookies that enable you to log into secure areas of our website, use a shopping cart or help us to choose the right language for you.
Analytical/performance cookies – These allow us to recognise and count the number of visitors and to see how visitors move around our Site when they are using it. This helps us to improve the way our Site works, for example, by ensuring that users are finding what they are looking for easily. Functionality cookies – These are used to recognise you when you return to our website. This enables us to personalise our content for you and remember your preferences (e.g., language or region).
With your permission, we set cookies on your computer that begin with “_utm” so we can have access to Google Analytics Services and Omniture SiteCatalyst. Google Analytics is a web analysis service of Google Inc. (“Google”), SiteCatalyst is a web analysis service from Adobe Systems Inc. (“Adobe”). You may read more about Google Analytics on their own site http://www.google.com/analytics/features/index.html and about SiteCatalyst on http://www.adobe.com/uk/privacy/analytics.html?f=2o7. Google and Adobe store analytical data such as the data generated with their cookies or web beacons and transferred to their servers. Google and Adobe collect information about how you got to our Site. We do not gain access to the information collected by Google Analytics or SiteCatalyst. The systems only provide us with analysis. Some of Google’s cookies are set to remain for up to two years. To opt out of receiving any persistent cookies associated with the SiteCatalyst HBX service for our Site you can request an “opt out” cookie from Adobe (id = OPT_OUT). If you accept this cookie, their servers will recognize it as an opt out cookie and will not attempt to deliver persistent cookies to you in the future. To learn more about how to opt out please visit http://www.adobe.com/privacy/opt-out.html.
You can find more information about the individual cookies we may use and the purposes for which we use them in the table below:
We also may use flash cookies, which are objects stored locally on an Online Visitor’s system/device to collect and store information about his or her preferences and navigation from and on our Sites. Flash cookies may, for example, be connected with or managed by the Online Visitor through use of or in connection with Adobe Flash Player, and not necessarily managed by the same browser settings used for managing browser cookies or other cookies. Where required by law, we will ask you for your explicit consent to the usage of flash cookies and will not use them without your consent.
Social Plug-Ins and Share Buttons. We also may use social plug-ins (e.g., a Facebook ‘Like’ button or a Google +1 button) on or in connection with some of our Sites. When you visit a Site that contains a social plug-in and the social plug-in is selected or enabled, your browser establishes a direct connection to the social plug-in operator’s server. The social plug-in operator directly transfers the plug-in content to your browser. The social plug-in provider receives information about your access to sites. We have no influence on the data gathered by the plug-in operator. The Online Visitor is responsible for managing his or her privacy consents, settings and preferences, and addressing with the third-party operator, privacy issues that pertain to his or her use of, or plug-in with, third-party social media sites.
We use the social plug-ins of the following networks:
- The “Like” button by facebook.com which is ultimately run by Facebook Inc., 1601 S. California Ave, Palo Alto, CA 94304, USA (“Facebook”), you can identify this plug-in by the white “thumb up” on a blue ground or a white “f” on blue ground;
- “+1″ button of the social network Google Plus, run by Google Inc., 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States (“Google”), the plug-in of “+1” can be recognized by its sign “+1” on a white or colored background;
- Share-Button from LinkedIn, LinkedIn Corporation, 2029 Stierlin Court, Mountain View, CA 94043, USA;
- Twitter, Twitter, Inc., 1355 Market St, Suite 900, San Francisco, CA 94103, you can identify the Twitter plug-in by a stylized blue bird or a blue minor “t” on blue ground.
When visiting one of our Sites that contains a social plug-in of one of the above named networks, your browser will establish a direct connection to the respective social network’s servers enabling the respective social network to receive information about you having accessed our Site. We have no influence over the data gathered by the social plug-ins and have no knowledge of or control over the data gathered by the respective social network. To our knowledge, the embedded social plug-ins provide the respective social network with information that you have accessed our Site. If you are logged into the respective social network, your visit can be linked to your account. If you interact with the social plug-ins, the corresponding information will also be shared with the respective social network and linked to your account. Even if you are not logged into the respective network, there is the possibility that the social plug-ins transmit your IP-address to the respective social network.
For the purpose and scope of data collection and the further processing and use of data by the respective social network, as well as your rights and ways to protect your privacy, please see the privacy notices of these social networks at www.facebook.com/policy.php, http://www.google.com/intl/de/+/policy/+1button.html, https://www.linkedin.com/legal/pop/pop-privacy-policy, and https://twitter.com/privacy.
While every attempt is made to validate and screen outside links that may be provided through our online Sites, we are not responsible for the content of any outside third-party web sites. Bulletin boards, blogs, wikis, chat rooms, exchanges, share sites, social media venues and similar “forums” (whether operated by or for us, or otherwise) often are open or accessible to others in the forums and may be open to the public or those who otherwise gain access to information posted on or through the forum. Your participation in such forums and what you disclose in such forums is totally your own voluntary choice. If you make that choice and include your PI in your posts, it may lead to use of your PI by others, and we will not responsible for any information you decide to make available on or through such forums, nor for any contacts of you by others as a result of your participation in, or your own disclosures on or through, such forums. We reserve the right to monitor such forums operated by, for or about us, and Use information legally posted on or through them. There should be no expectation of privacy by anyone with respect to the content of postings or disclosures he or she voluntarily makes on or through such forums.
IP addresses and “clickstream” information. Some online clickstream data includes User Information. User Information is information about computers that interact with our systems. This includes:
Web server logs. In the process of administering our Sites, we maintain and track usage through web server logs. These logs provide information such as what types of browsers are accessing our Sites, what pages receive high traffic, and the times of day our servers experience significant loads. We use Internet Protocol (“IP”) addresses to analyze trends, administer Sites, track users’ movements, and gather broad demographic information for aggregate use. We use this information to improve the content and navigation features of our Sites. Anonymous or aggregated forms of this data also may be used to identify future features and functions to develop for our Sites and to provide better service or a better user experience. We do not link this information with individually identifiable PI. We also reserve the right to, and may, share aggregated and anonymous information with third parties.
Web beacons. We and third parties also may employ web beacons on or in connections with our Sites or in connection with e-mails and other electronic/digital communications we send, distribute, or have sent or distributed for us. Web beacons are tiny graphics with unique identifiers, similar in function to cookies, and are used to track the online movements of users. In contrast to cookies, which are stored on a user’s computer hard drive, web beacons typically are embedded invisibly on webpages and other online or electronic/digital documents and are about the size of the period at the end of this sentence. Web beacons also may be used, for example, in an e-mail, newsletter or other electronic communication to determine if it has been opened by the user or if web links contained in it have been selected by the user. Where required by law, we will ask you for your explicit consent to the usage of web beacons by us and will not use them without your consent. We are not, however, responsible for any third-party deployment or usage of web beacons.
We also may use User Information to help us prevent and detect security threats, fraud or other malicious activity, and to ensure the proper functioning of our solutions, products and services.
How we use personal information. We also may use PI for the following purposes:
To respond to your requests. These requests may include processing orders and processing downloads for product demonstration or evaluation.
To maintain or upgrade a system. Our technical staff may require periodic access to services data to monitor system performance, test systems, and develop and implement upgrades to systems. This may include providing technical support including through a customer support portal. Any temporary copies of services data created as a necessary part of this process are maintained only for time periods relevant to and necessary for those purposes.
To address performance and fix issues. On occasion, we may develop new versions, patches, updates, and other fixes to our programs and services, such as security patches addressing newly discovered vulnerabilities. In accordance with the terms of a Customer contract or order for such, we may remotely access a user’s computer, as permitted under the terms of an applicable contract, to troubleshoot a performance issue. We also may use such information to provide product updates and notices.
To provide informational services. We may use PI while providing online forums, such as user groups and bulletin boards. We may do so while delivering live or online events, such as training seminars or conferences, including third-party events sponsored or hosted by Teradata.
To meet legal requirements. We may be required to provide certain PI to comply with legally-mandated reporting, disclosure, or other legal process requirements.
To market products and services. We may use such information to inform you about products, services or events, and otherwise perform marketing activities, including for and to enable direct marketing and behavioral marketing and advertising.
Applicant/Employee information we collect. We also collect “Applicant Information” – individually identifiable PI such as name, home address, personal telephone number, resume and other information you voluntarily provide when you submit a job application to us, including sensitive information such as racial or ethnic origin, membership in a political association or trade union, or health information if you choose to provide it as part of the job application or other information form, either online or on paper (including voluntary disclosures you may make in connection with compiling government and government-contracting labor statistics). We also collect names and contact information for referrals and alternative-contact people if provided as part of the job application process. PI from references and alternative-contact people may only be provided to us by the applicant or employee; we instruct them that they may provide PI regarding a reference or contact-person only with the consent of the reference or alternative-contact person. Applicant Information is collected in the country where contact for the position is located and in the U.S. in a central Human Resources information repository. Applicant Information is used solely to assess the applicant’s qualification and skills, to communicate with the applicant, to verify the submitted-information, including reference and background checks to the extent permitted by applicable law, and for legal-defense-purposes as necessary. Applicant Information may be shared, on a confidential and use-restricted basis, with our affiliates, subsidiaries, recruiting advisors and service providers, as well as other third parties such as background-screening organizations solely for the purposes described above. Applicant Information is retained according to applicable laws and will be deleted or destroyed as required by applicable law. Applicant Information (including any changes or updates thereto) will be added to your employment record and may be Used for employment-related purposes if, when or after you have become a Teradata Employee. We also collect and otherwise Use Employee data and PI as set forth elsewhere in this document, and otherwise as reasonably necessary and in connection with the employment relationship, Employee transactions, Employee contracts, and Employee compensation, benefits, social-benefits-reporting and withholding, tax withholding and reporting, and the like.
Other referral-related information we collect. Certain communications and forums we operate in connection with our Sites and business, or we host or process for our Customers or Partners, may include the ability for you to “refer a friend” or “forward to a friend”, or provide a testimonial (collectively, a “Referral”). You must not make a Referral that discloses PI or confidential information you do not have the legal right to share with us; where consent from the referred-person is required by law or through a contractual obligation you have, then you are responsible for obtaining that consent before you provide the Referral. If you make such a Referral, we may track that you made the Referral and share the information that you made the Referral with the referred-person or party.
9.6 “Access” Principle
Teradata strives to maintain the accuracy of the PI we hold, including establishing, as appropriate, mechanisms allowing consumers and employees to have the opportunity to review and correct PI about them.
You may review and correct, and (to the extent not limited or prohibited by applicable law) have us delete, your PI that we hold by requesting it by e-mail or correspondence addressed to one of the applicable sources identified in the “Contact Us” section of this policy. When you do so, please provide your name, mailing address, and a clear description of the information you wish to review, correct or have deleted. We will respond promptly within the time limits established by applicable law, but at least within 30 days after your request. For your protection, we may ask you for additional information to verify your identity. In most cases, we will provide the access you request and will correct or delete any inaccurate information you discover. In some cases, however, we may limit or deny your request if the law permits or requires us to do so (for example, we may decline to delete data that we are required by law to keep a record of, such as for tax withholdings and payments). We encourage you to promptly update your PI with us if and as it changes.
If Teradata is engaged to host a solution, we may host Customer/Partner Constituent or “audience-member” information. We respect the privacy of all audience-member information, and (unless otherwise expressly agreed upon in writing) we view and treat it as the Customer’s/Partner’s confidential information. With respect to data hosted or processed in connection with our Marketing Applications business operations and offerings, often that data includes only basic contact information, such as name and e-mail address. We, however, may obtain any type of data about any type of individual that our Customer/Partner uploads or otherwise provides to us in connection with a hosted-solution or sends to us through online or offline mechanisms. In this regard, we do not control what audience-member information we may receive or host, or what steps the Customer or Partner, as the “data controller”, has taken to ensure that the data is reliable for its intended use, accurate, complete, and current. If a Customer or Partner uploads sensitive PI – such as social security or social benefit numbers, bank-account numbers, credit-card or payment-card numbers, passport numbers, driver license numbers, personal health information, access passwords or PINs, or EU sensitive PI, such as racial or ethnic origin, political or religious affiliation, or trade union membership status – (which generally would be contrary to our agreement with the Customer or Partner) we reserve the right to eliminate that information from our servers and/or suspend or terminate the Customer’s or Partner’s hosted-processing privileges, order or account with us. We will use audiencemember information only as permitted by our contract with the applicable “data controller” Customer or Partner. We will not share, sell, rent, or trade with third parties for their marketing purposes any audience-member information collected by us for a Customer or Partner, unless that Customer or Partner authorizes us to do so and represents to us that it has, and that it has sole responsibility for obtaining, all appropriate and any legally-required audience-member consents to do so.
For our hosted-solutions, our Customer or Partner typically has full control over its audience-member information, whether to correct, update or delete personally identifiable PI it has collected and uploaded. If a Customer or Partner receives a data-access request from an audience-member about whom we host data and the Customer or Partner would like our assistance in responding to that request, it may contact us and we will strive to respond to such requests no later than 30 days after our receipt of the request.
9.7 “Recourse, Enforcement and Liability” Principle
Teradata maintains procedures for verifying compliance with the commitments we make in this policy statement and to adhere to the EU-U.S. Privacy Shield Framework principles and the U.S.-Swiss Safe Harbor Framework principles. To do this, we complete a privacy compliance assessment at least annually, make improvements based on the results and use the results to self-certify annually to the EU-U.S. Privacy Shield Principles and U.S.-Swiss Safe Harbor Principles. We also provide the resources identified above in the “Contact Us” section of this policy so you may raise privacy-related questions, issues, concerns, complaints and disputes with us, and we provide the “dispute resolution” process noted above in the “Compliance, Privacy Shield Framework, Safe Harbor Framework and Data Transfer Agreements” section of this policy statement to help assure you have a process and mechanism to enforce compliance with the standards set forth in this policy statement. As also noted above, we are subject to the jurisdiction of, and compliance monitoring and enforcement by, the U.S. Department of Commerce and U.S. Federal Trade Commission and by applicable national Data Protection Authorities with respect to certain PI, such as PI in HR data. And, in connection with our planning for future improvement and for future compliance with the European General Data Protection Regulation (“GDPR”) when it is scheduled to become effective starting in 2018, we also are monitoring, evaluating and preparing to commence GDPR-compliant and more robust, documented and verified DPD practices in the coming years, such as with respect to PDP compliance reviews, PDP due diligence regarding third-party vendors/service-providers, PDP risk assessments, PDP impact assessments, PDP-by-design practices and PDP-by-default practices.
1. Copyrights, Trademarks and other Intellectual Property
Copyright 1996-2016 by Teradata Corporation (including applicable subsidiaries). All rights reserved.
All trademarks (including the Teradata mark) are the property of their respective owners in the United States and other countries.
Copyright in this document and the Site(s) to which this document is appended or incorporated-by-reference is owned by Teradata Corporation (including applicable subsidiaries). Any person is hereby authorized to view, copy, download, temporarily store and imprint this document and extracts of it, and do so with respect to the content of or from our Sites to which they have legal, duly authorized and terms-compliant access, subject to the following conditions:
1. The document, Site and content, and extracts of them, may be used solely for personal non-commercial informational purposes.
2. The document, Site and content, and extracts of them, may not be altered without our prior written consent.
3. Any copy of the document, Site or content, and extracts of them, must include our copyright notice.
Note that any product, process or technology described in this document or on or through Site(s) to which this document is appended or incorporated-by-reference may be the subject of other Intellectual Property rights reserved by Teradata and others, and those are not licensed, transferred altered or broadened hereunder.
3. Disclaimer of Warranty and Limitation of Liability
INFORMATION PROVIDED IN, THROUGH OR BY THIS DOCUMENT OR ANY SITE TO WHICH THIS DOCUMENT IS APPLICABLE, APPENDED OR INCORPORATED BY REFERENCE OR ANY PUBLICATION, OTHER SITE OR OTHER DOCUMENT ACCESSED OR ACCESSIBLE BY, THROUGH OR IN CONNECTION WITH A TERADATA SITE IS PROVIDED, TO THE MAXIMUM EXTENT PERMISSIBLE UNDER APPLICABLE LAW, ON AN “AS IS”, “WHERE IS”, “WHEN IS” AND “WHEN AVAILABLE” BASIS, WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT.
INFORMATION PROVIDED IN, THROUGH OR BY THIS DOCUMENT OR ANY SITE TO WHICH THIS DOCUMENT IS APPLICABLE, APPENDED OR INCORPORATED BY REFERENCE OR ANY PUBLICATION, OTHER SITE OR OTHER DOCUMENT ACCESSED OR ACCESSIBLE BY, THROUGH OR IN CONNECTION WITH A TERADATA SITE MAY INCLUDE TECHNICAL INACCURACIES, TYPOGRAPHICAL ERRORS OR OTHER ERRORS. CHANGES ARE PERIODICALLY ADDED TO THE INFORMATION HEREIN AND THEREIN; SUCH CHANGES MAY OR MAY NOT BE INCORPORATED IN NEW EDITIONS. TERADATA AND ITS SUPPLIERS, CUSTOMERS AND OTHER BUSINESS PARTNERS MAY MAKE IMPROVEMENTS, CHANGES OR DISCONTINUATIONS WITH RESPECT TO SITES, PUBLICATIONS, DOCUMENTS, PRODUCTS, SOFTWARE AND SERVICES AT ANY TIME, WITH OR WITHOUT NOTICE.
4. Use of the Teradata Logo
Logos are the most visible form of a company’s brand identity and must be managed carefully to protect the company values, integrity and high standards they represent. The logos posted on Teradata Sites or in related publications, documents or other Teradata communications are for use only by Teradata and authorized Teradata Partners on authorized websites, in jointly-produced collateral and related marketing materials. All other notexpressly-authorized-in-advance-by-Teradata usage by any other parties is prohibited.
For authorized use and users of Teradata logos, the following also shall apply:
- The logos may only be used as provided by Teradata. Do not make any modifications of any kind to the logo, including, but not limited to, animation, color, background, distortion of any type, or removal of any words. If you need a logo file that has not been provided here, please contact Andrea Stamas at [email protected].
- Place logos only on either a black or white background. All other color adaptations or graphical backgrounds are strictly prohibited.
- The color logo should always be reproduced in Teradata Orange. The color should always be produced as follows: CMYK M:53, Y:100, and K:4. Reference the Teradata Production Guide for drawdown samples. The web color is: HEX: FF6600.
- To maintain legibility, do not scale the Teradata logo below 1 inch wide.
- To correctly present a logo, there must be open space surrounding the logo that is at least the height of the letter “T” in the logo.
- Do not combine the logo with any other objects, including, but not limited to, words, photos, numbers or other logos.
Please contact us and see relevant Sites for additional information regarding use guidelines, restrictions and prohibitions that apply to other logos and marks of Teradata.
5. Permissible Use and Restrictions on Use
Access and use of the Sites, documents or communications to which this document is appended or incorporated by reference or sites, documents or communications accessed or accessible (e.g., posted or linked) by, through or in connection with such a Site, document or communication are for their intended purposes, such as to obtain personal public knowledge regarding Teradata and its products and services. Examples of prohibited uses include:
- any unlawful or harmful purpose
- to defame, disparage, harass, or threaten others
- violate the rights of others
- use in any manner that could damage, disable, or exhaust Teradata network or computer resources
- promote any goods or services without Teradata’s prior written consent
- provide content that is profane, obscene, or similarly inappropriate
- provide content that contains viruses or other harmful computer code
- provide content unless you own the content or have all consents legally required to provide it; for example, do not provide PI or confidential information of others (such as your employer or fellow employees) without their consent, copyrighted material without the consent of the copyright owner, or an image of a person without that person’s consent
- falsely identify yourself, your employer, or other affiliations
- falsely identify the source of any content
- remove any legal notices from any content
- access or attempt to access the account of another user
- bypass or attempt to bypass any security measures associated with it, including measures associated with a user’s account, specific content or services, or other Teradata network or computer resources • extract e-mail addresses or other the PI from or through it
- interfere with any other user’s use of it
- Teradata to incur costs by your use of it
If you become aware of any prohibited uses, you should promptly notify the Site webmaster or one of the applicable contacts listed in the “Contact Us” section in Part I of this document, and provide a detailed description of the prohibited-use and reasonably cooperate with Teradata in its investigation. However, Teradata is not obligated to enforce such terms or prohibitions against any particular user.
If you breach such terms or prohibitions, your rights to the associated content and services automatically terminate and you must discontinue your access to and use of the associated content and services, and securely and irretrievably destroy all copies of the associated content in your possession.
6. Claims of Copyright Infringement
If material on one or more Sites, documents or communications to which this document is applicable, appended or incorporated by reference infringes your copyrights, submit a written notification (“Infringement Notice”) consistent with the Digital Millennium Copyright Act, Title 17, United States Code, Section 512 (“DMCA”) to the following Designated Agent:
Name of Agent Designated to Receive Notification of Claimed Infringement: Laura Nyquist, General Counsel
Full Address of Designated Agent to which Notification Should be Sent:
10000 Innovation Drive
Dayton, Ohio, USA 45342
Telephone Number of Designated Agent: (937) 242-4719
Facsimile Number of Designated Agent: (937) 847-8425
E-mail Address of Designated Agent: [email protected]
To be effective under the DMCA, the notice must include substantially the following:
1. A physical or electronic signature of a person authorized to act on behalf of the owner of an exclusive right that is allegedly infringed;
2. Identification of the copyrighted work claimed to have been infringed, or if multiple copyrighted works at a single online site are covered by a single notification, a representative list of such works at that site;
3. Identification of the material that is claimed to be infringing or to be the subject of infringing activity and that is to be removed or access to which is to be disabled, and information reasonably sufficient to permit Teradata to locate the material;
4. Information reasonably sufficient to permit Teradata to contact the complaining party, such as an address, telephone number, and if available, an e-mail address at which the complaining party may be contacted;
5. A statement that the complaining party has a good faith belief that use of the material in the manner complained of is not authorized by the copyright owner, its agent, or the law; and
6. A statement that the information in the notification is accurate, and under penalty of perjury, that the complaining party is authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.
Upon receipt of such an Infringement Notice consistent with the DMCA:
1. Teradata will remove, or disable access to, the material that is claimed to be infringing; and
2. Teradata will take reasonable steps to forward the written notification to the alleged infringer with information about the steps Teradata has taken to assess and/or remove or disable access to the material.
If you want to contest an assessment, removal or disabling of your content for alleged copyright infringement, submit a written notice (“Counter Notice”) to the Designated Agent. To be effective, the Counter Notice must include substantially the following:
1. Your physical or electronic signature;
2. Identification of the material that has been removed or to which access has been disabled and the location at which the material appeared before it was removed or access to it was disabled;
3. Your statement under penalty of perjury that you have a good faith belief that the material was removed or disabled as a result of mistake or misidentification of the material to be removed or disabled;
4. Your name, address, and telephone number; and
5. Your statement that you consent to the jurisdiction of Federal District Court for the judicial district in which your address is located (or, for the Southern District of New York, if you reside outside of the United States) and that you will accept service of process from the person who provided the Infringement Notice or from an agent of such person.
Upon receipt of a Counter Notice consistent with the DMCA:
1. Teradata will provide a copy of the Counter Notice to the person who provided the Infringement Notice and inform that person that Teradata will replace the removed material, or cease disabling access to it, in 10 business days; and
2. Teradata will replace the removed material, or cease disabling access to it, not less than 10, nor more than 14, business days following receipt of the Counter Notice, unless the Designated Agent first receives notice from the person who provided the Infringement Notice that such person has filed an action seeking a court order to restrain the alleged infringer from engaging in infringing activity relating to the material on the Website.
7. Export Laws
You must comply fully with all applicable export laws and regulations of the United States (“Export Laws”) to assure that no content is (a) exported, directly or indirectly, in violation of Export Laws; or (b) intended to be used for any purpose prohibited by the Export Laws, including, without limitation, terrorism, cyber-attacks, cybercrimes, money-laundering, industrial espionage, or nuclear, chemical or biological weapons proliferation.
IMPORTANT – BY DOWNLOADING, OBTAINING, ACCESSING OR REQUESTING ANY SOFTWARE OR ANY DOCUMENT, RESOURCE OR CONTENT CONTAINING TECHNICAL INFORMATION FROM ANY OF OUR SITES:
- YOU ACKNOWLEDGE THAT SUCH SOFTWARE, DOCUMENT, RESOURCE AND CONTENT ARE SUBJECT TO THE RESTRICTIONS AND CONTROLS IMPOSED BY THE EXPORT LAWS OF THE UNITED STATES; AND
- YOU CERTIFY THAT:
– YOU DO NOT INTEND TO USE SUCH SOFTWARE, DOCUMENT, RESOURCE OR CONTENT FOR ANY PURPOSE PROHIBITED BY UNITED STATES EXPORT LAWS, INCLUDING, WITHOUT LIMITATION, TERRORISM, CYBER-ATTACKS, CYBER-CRIMES, MONEY-LAUNDERING, INDUSTRIAL ESPIONAGE, OR NUCLEAR, CHEMICAL OR BIOLOGICAL WEAPONS PROLIFERATION; AND
– YOU ARE NOT LISTED AS A DENIED PARTY ON ANY LIST GOVERNING UNITED STATES EXPORTS; AND
– YOU ARE NOT A NATIONAL OF ANY COUNTRY THAT IS NOT APPROVED FOR EXPORT OF SUCH SOFTWARE, DOCUMENT, RESOURCE OR CONTENT (AS OF 2016, THESE COUNTRIES INCLUDE CUBA, IRAN, NORTH KOREA, SUDAN, AND SYRIA).
You are solely responsible for compliance with all laws applicable to you.
Non-Teradata (i.e., third-party) sites, documents or communications may be accessed or accessible (e.g., linked or posted) in or in connection with a Teradata Site, document or communication. Such third-party sites, documents and communications are provided for your convenience only and do not imply any endorsement of any third-party by Teradata or any endorsement of Teradata by such third-party. Such third-party is solely and directly responsible for its sites, documents and communications and any harm they may cause you or others.
New York law (excluding its choice of law rules) governs the interpretation and enforcement of the “Terms” section of this document and any applicable “Supplemental Legal Terms”. The exclusive personal jurisdiction and venue of the courts of the State of New York in New York County or the Federal District Court for the Southern District of New York shall apply with respect to such.
You may not delegate your obligations or responsibilities under the “Terms” of this document or any applicable “Supplemental Legal Terms” without Teradata’s written consent. If a court of competent jurisdiction finds any portion of the “Terms” or any applicable “Supplemental Legal Terms” unenforceable, such portion is to be enforced to the maximum extent permissible and the remainder of such terms and prohibitions and applicable “Supplemental Legal Terms” will continue in full force and effect. Any failure to enforce or exercise any provision of such terms or prohibitions, any applicable “Supplemental Legal Terms” or any related right shall not constitute a waiver of that right or provision.
[This document ends here].
Click here to download the full PDF.