ABOUT THIS DOCUMENT
- This document is referred to as the Managed IT Terms, Base Plan Terms, or Managed IT Base Plan Terms
- This document outlines the Managed IT service that the Service Provider provides to its clients.
- Completion by both the Client and the Service Provider of an Order Form for this service, constitutes acceptance of these Terms.
- The Service Provider advises its clients that its terms are published at https://ccp.com.au/terms
- For definitions and our Master Terms of Service, read our Master Terms of Service available at https://ccp.com.au/terms/terms-of-service
GLOSSARY OF TERMS
See the Legal Glossary for the full glossary. It is shared across all four plan product descriptions and is referenced here rather than inlined.
UNIT OF MEASURE
- We measure the service quantity as a number of “seats”.
- Seats means a combined total of “users” and “servers” where;
- A user for the definition of counting seats is a distinct individual (employee, contractor, offshore worker, third-party user, etc.) who uses or has access to any Service Component under these Terms (for example: Helpdesk support, Microsoft 365, Cybersecurity Training, Cloud Phone, etc.), irrespective of how they connect or whether their device is actively monitored.
- A server for the definition of counting seats is any operating system dedicated to providing shared, business-critical services to two or more users, and;
- Hosts one or more server roles (for example: domain controller, file server, application server, database/mail/web/print/backup server, virtual desktop host, or similar).
- Excludes any endpoint primarily used by a single person for their own work (laptops, desktops, workstations, tablets, phones, even if monitoring or security agents are installed).
- This service has a minimum quantity of 10 seats.
- All User and Server Seats must be included - no exclusions for unmanaged email (e.g. Gmail), unmonitored endpoints, offshore devices, offshore staff, subcontracted staff, etc, unless they are;
- Managed, supported, and monitored by a third party to a similar level of security as what is included in this service or to a level we agree to in writing and,
- at no point request any of the products, services, or components in this service.
- The components of this service may have different units of measure and/or the individual features of components in this service may have different units of measure as defined in their quantity ratio definition.
ABOUT COMPONENTS
- This service consists of multiple components.
- Each component has its own description, client obligations, limitations, and optionally a quantity ratio.
- The description of a component describes how the service operates, is delivered, and what inclusions if any.
- The client obligations list your obligations that we require to deliver the services as outlined in this document.
- The limitations describe examples where we may not be able to supply the services or where the description may be limited by additional factors.
- the quantity ratio defines the maximum quantity of assets, devices, domains, or other unit of measure covered by the component, represented as a ratio against the total number of seats. For example, 1 domain per 5 users. Where a ratio is defined, the ratio is rounded down to the nearest whole number. Exceeding the quantity ratio for a component will require you to either reduce your usage, increase your seats, or pay a fee for exceeding the quantity included in the component.
Client Security Baseline Obligation
Commitment Overview
To maintain a secure and resilient IT environment, all clients are required to meet a defined set of baseline security requirements. These standards are essential for protecting both the client’s and the Service Provider’s systems, data, and operations from cyber threats.
We acknowledge that implementation may take time. However, to the extent permitted by law, the Service Provider is not liable for any security incident, breach, data loss, or related service issue that could reasonably have been prevented by timely implementation or ongoing maintenance of the security controls outlined in this document. Until the security baseline is fully met, any related remediation work will fall outside the scope of our standard service coverage.
Baseline Security Requirements
These baseline requirements apply where the relevant security control is included in your selected services or, if not included, are expected to be implemented via an equivalent solution internally or from a third-party provider unless otherwise agreed to by us in writing:
- Regular Operational Reviews:
Engage in any regular meeting we schedule to;- Review reports and address any security concerns with the service provider.
- Reconcile the list of staff and devices, identifying any discrepancies in reports.
- Address any excessive use of our services as defined in our Master Terms of Service.
- Multifactor Authentication (MFA):
- Implement phish-resistant multifactor authentication or similar controls to secure access to all critical systems.
- Application Control:
- Implement our Application Control product or a similar product from another provider to manage and monitor application usage and prevent unauthorized applications from running.
- Vulnerability Management:
- Implement enhanced vulnerability management or an equivalent service offered by another provider to attempt to remediate known vulnerabilities within a 30 day period or better.
- Cybersecurity Awareness Training:
- Participate in Cybersecurity Awareness Training through our service or an equivalent program offered by another provider to educate employees about cybersecurity best practices and threat recognition.
- Password Management:
- Implement a password manager with Single Sign-On capabilities through our service or a similar product from another provider to enhance password security and simplify user authentication.
- HR Collaboration:
- Include the service provider in new hire onboarding and employee termination processes to ensure proper account management and access control.
- Regular Staff and Device Audits:
- Conduct regular reviews with the service provider to reconcile the list of staff and devices, identifying any discrepancies in reports.
- Incident Response Planning:
- Develop and maintain an incident response plan that specifically addresses how to manage and mitigate cyber incidents.
- Data Backup: * Ensure all critical business data is backed up through our services or a similar backup solution provided by another vendor.
- Collaboration with Software Providers: * Work with all software providers to implement and enforce multifactor authentication or similar controls.
Liability, Coverage Exclusion, and Remedy
-
Until the security baseline is fully implemented:
- To the extent permitted by law, we are not liable for any incident that could reasonably have been prevented by adherence to the requirements set out above.
- Work related to such incidents is not covered by our standard service entitlements and may incur additional charges.
-
If we detect you have not implemented (or have removed) a mandatory baseline security control,
- we will notify you in writing, specifying the non-compliance and outlining the steps required. We will offer reasonable assistance to help you comply (where the relevant control is included in your Service plan);
- You will have 30 days (“Remedy Period”) from notice to address the non-compliance or agree on a remediation plan with us. If, after this period, you remain non-compliant:
- We may suspend or restrict only the affected service(s) (e.g. Cyber Security), where technically possible, and you acknowledge that we have no liability for any incidents or losses arising from such service(s) during the period of non-compliance.
- If ongoing non-compliance creates a material risk to our systems or other clients, or if partial suspension is not technically or commercially feasible, we may terminate your agreement with a further 30 days’ written notice.
- We may extend the remedy period if you are actively working with us in good faith to resolve the issue.
-
You acknowledge that until all baseline security requirements are met, the effectiveness of our services may be reduced, and we are not responsible for loss or damage that could have been prevented by your compliance.
-
By engaging our services, you acknowledge and agree to these baseline security requirements, recognising your role in upholding the security and integrity of the shared IT environment.
Included Components
Managed Helpdesk Component
Description
Our Managed Helpdesk component is designed to provide comprehensive support for your business needs. The component includes:
- Remote Support. We include unlimited remote support, by way of phone calls, emails and remote control software, subject to the acceptable use policy as per the Master Terms of Service.
- Onsite Support. We include unlimited onsite support, within our service area, subject to the acceptable use policy as per the Master Terms of Service.
- Out of Scope Support Rates. Out of scope work is charged at a reduced rate of $190/hour, charged in increments of 15 minutes. Out of scope work performed onsite has a minimum charge of 1 hour.
- Dedicated Support Team. You will have a team of skilled IT technicians, led by at least one senior technician, assigned to your account for consistent and personalized service. At any time, you may request a different team in writing and if it is within reason, we will do our best to fulfil that request.
- Direct Contact Number. You will receive a dedicated phone line for direct access to your support team to bypass any receptionist, dispatcher, or other administrative staff.
- Enhanced Service Level Agreements (SLAs):
- Priority 1 (Critical): Response within 1 business hour.
- Priority 2 (High): Response within 4 business hours.
- Priority 3 (Medium): Response within 1 business day.
- Priority 4 (Low): Response within 2 business days.
- Priority 5 (Very Low): Best effort response.
The priority level is determined based on the urgency and impact of the issue, at our discretion, acting in good faith.
You may opt to escalate the priority level of any request, as per our Master Terms of Service.
Client Obligations
For the Managed Helpdesk component, clients and their staff are required to:
- Provide timely and accurate information necessary for us to perform our services.
- Attend scheduled appointments for the time they are scheduled.
- Perform identity verification for privileged requests to ensure security compliance.
- Use the designated communication channels (our ticketing system, email, or the direct contact number) to log issues for SLA tracking.
Service Limitations
The Managed Helpdesk component has the following limits:
- Response and Resolution Times: These are dependent on the timeliness of the information provided by the customer. SLA times are paused when waiting for third-party vendor responses, identity verification or additional information from the customer. SLA response times are only recorded when requests are logged through to our official support email address, our ticketing platform or over the phone.
- Out of Scope Work:
- Any work performed to support a 3rd party’s product where we can provide a comparable service or product is considered out of scope as per our master terms of service.
- On-site work provided outside our service area is considered out of scope.
- Out of scope work is exempt from our SLAs (Service Level Agreements) and is performed at a “Best Effort” response time.
- Project Work: Project work is considered out of scope.
- Project Work typically involves tasks requiring planning, scheduling, stakeholder coordination, or anticipated effort exceeding 3 business days. If in doubt, we will advise you in writing before classifying a request as project work.
- Examples of project work are, but not limited to;
- Office relocations
- New office fit outs
- New system integrations
- Cloud platform migrations
- SharePoint intranet development
- New server deployments
- New network infrastructure deployments
- Custom software development
Managed Cyber Security Component
Description
Our Managed Cyber Security component is designed to provide a layered cybersecurity approach to protect your organisation from cyber threats. This component includes:
- Managed Antivirus. We manage your systems built-in antivirus, or the antivirus provided through other inclusive licensing like Microsoft Defender for Endpoint when you subscribe to a plan that provides this antivirus. In the absence of a suitable antivirus, we will supply an antivirus product.
- Endpoint Detection and Response. We will provide Endpoint Detection and Response capabilities, backed by a 24x7 security operations centre. The Endpoint Detection and Response service will employ techniques such as ransomware canaries, open port detection, malicious process behaviour detection, and persistent foothold detection. Refer to the “Security Operations Centre Response” for how incidents are responded to.
- Identity Threat Detection and Response. We will provide Identity Threat Detection and Response capabilities, backed by a 24x7 security operations centre. The Identity Threat Detection and Response service will employ techniques such as session hijacking protection, credential theft protection, location and VPN anomaly detection, rogue application detection, and other signal monitoring methods. Refer to the “Security Operations Centre Response” for how incidents are responded to.
- Security Operations Centre Response. The security operations centre will respond to threats and alerts in a timely manner.
- Where the security operations centre can confirm a compromise with confidence the security operations team will remotely isolate the impacted device or user account.
- Where the security operations centre cannot confirm a compromise with confidence;
- an incident report will be supplied to our frontline helpdesk who will perform additional investigation, contact the impacted user or assigned user of the impacted device, and
- if we are unable to contact the user, out of an abundance of caution, isolate the impacted device or user account.
- when isolating a device or user account;
- isolating a device means to restrict its ability to communicate with any network, and
- isolating a user means to restrict its ability to log in and revoke any existing sessions.
- DNS Security Filtering. We will provide at the device or network level, Domain Name Service (DNS) security and category filtering. We will use DNS Security filtering to block threats through blocking known malicious domain names, risky Top Level Domain (TLD) extensions, domains that do not satisfy minimum age requirements, and similar. You may optionally use the DNS filtering service to block categories of domains such as gambling, artificial intelligence, recruitment, social media, and similar.
- Domain Registration and DNS Management. We will register your gTLD and auTLD domains (.com, .net, .org, .com.au, .net.au, .org.au) domains as part of the service. We will keep the domain registered, protect it from unauthorized transfers and modification, manage its DNS records, and provide valid SPF, DKIM, and DMARC configuration for your domains to prevent impersonation and spoofing attacks.
- Backups for Servers. We will provide a backup service for your servers and retain those backups with an agreed upon retention period. We will provide 1 Terabyte of backup storage per server (pooled) held offsite from your organisations environment. If your backup requirements exceed the allocated storage, we will notify you and either lower your retention period to reduce your storage requirements or charge you for the additional storage. Backups will be taken once per day, or at an agreed upon cadence.
- Backups for Microsoft 365. Where we are providing your Microsoft 365 licensing, we will include backups as a service, retain information for up to 7 years or until you cancel your service with us, performing a backup at least once per day. It will include features such as point in time restore, eDiscovery search, with unlimited storage. We will back up the following workloads inside of Microsoft 365;
- Exchange Online
- Outlook Mail
- Folders
- Contacts
- Calendars
- Tasks
- Attachments
- In-place Archives
- Public Folders and Subfolders
- Shared Mailboxes
- SharePoint
- Sites
- Sub-Sites
- Documents
- Folders
- Lists
- Site Assets
- Site Pages
- Style Library
- Permissions
- OneDrive
- Drives
- Folders
- Permissions
- Groups & Teams
- Channels (Private & Public)
- Conversations
- Permissions
- Tasks
- Mailbox
- Drives
- Sites
- Calendar
- Files
- Notebooks
- Planner
- Private Chats
- Exchange Online
- Regular Backup Testing. We will validate and test the backups we take on an automated basis once every business day. We will perform disaster recovery testing of the backups we take, once per year.
Client Obligations
For the Managed Cyber Security component, clients and their staff are required to:
- Attend any cyber security incident response sessions we hold.
- Participate any cyber security audits we may perform when requested.
- Implement changes in your businesses processes that we recommend, where the recommendations would increase your cyber security. This may include changes such as regularly reviewing access to systems, implementing approval workflows, modifying your employment and termination procedures to correctly add and remove users from IT systems.
- Notify us in a timely manner of all employee hires and terminations.
- Notify us of any expected travel before the travel date.
- Notify us of any suspected cyber security incident, such as accidentally clicking on a phishing link, running a file that had unexpected behaviour, or unusual behaviour within your systems.
- Assign as us your Partner of Record in Microsoft 365, and grant what permissions and access that we ask for.
- Provide us with access to your systems when required to install, reinstall, configure, repair, or diagnose issues with our software and services.
- Purchase and maintain suitable onsite storage that meets our requirements as requested by us, to facilitate server backups.
Service Limitations
The Workstation Monitoring component has the following limits:
- DNS Security Filtering Limitations: The categorization systems for domains may from time to time, incorrectly categorize a domain, allowing it through the filter, or blocking it as a false positive. If any domain is miscategorized, you may notify us, and we will submit it for reclassification.
- Backup Licensing Limitations:
- Deactivated Mailboxes: We grant up to 20% (rounded down) free deactivated backups. For the avoidance of doubt, this means that if we are providing the service for ten users, we will keep up to two mailboxes under a ‘Deactivated’ status. This will retain the existing backup data but will not receive new backup information.
- Shared Mailboxes: We grant up to 50% (rounded down) free shared mailbox backups. For the avoidance of doubt, this means that if we are providing the service for ten users, we will include the backups for up to five shared mailboxes as part of the service.
- License Overages: All mailboxes must be backed up; we do not exclude any mailboxes from our backup service. If your backup requirements exceed our backup allowances, we will contact you and either remove mailboxes from your Microsoft 365 service or charge you for the overages at our current backup service rates.
- Supported Operating Systems for EDR: The Endpoint Detection and Response service can only run on supported operating systems. The supported versions will change as new operating systems are released, and older operating systems reach end of life. You may request the list of currently supported operating system versions from us. The supported operating system types are as follows;
- Microsoft Windows Editions
- Microsoft Windows Server Editions
- macOS
- Supported Operating Systems for Managed Antivirus: The Antivirus Management features are only available on supported operating systems. The supported versions will change as new operating systems are released, and older operating systems reach end of life. You may request the list of currently supported operating system versions from us. The supported operating system types are as follows;
- Microsoft Windows Editions
- Microsoft Windows Server Editions
- Supported Operating Systems for DNS Security Filtering: The DNS Security Filtering features are only available on supported operating systems. If your device is not supported, we will deploy network level filtering or DNS forwarding as an alternative. The supported versions will change as new operating systems are released, and older operating systems reach end of life. You may request the list of currently supported operating system versions from us. The supported operating system types are as follows;
- Microsoft Windows Editions
- Android and iOS
- Chromebook (through chrome extensions)
- macOS
- Supported Operating Systems for Backups: We can only back up supported operating systems, that have not reached end-of-life support from their manufacturer. The supported versions will change as new operating systems are released, and older operating systems reach end of life. You may request the list of currently supported operating system versions from us. The supported operating system types are as follows;
- Microsoft Windows Editions
- Microsoft Windows Server Editions
- Linux
- macOS
- Recovery Time Objectives: The time to recover from backups are subject to the amount of data stored and available bandwidth. Recovery is performed as fast as the technology allows. Once we complete our first annual disaster recovery test, we will report on the time it takes to restore from backups.
Quantity Ratios
- Domain Registration and DNS Management: 1 Domain per 5 seats.
- Managed Antivirus: 1.35 devices per seat.
- Endpoint Detection and Response: 1.35 devices per seat.
Monitoring and Patching Component
Description
Our Monitoring and Patching component is designed to provide remote access for our IT support staff, asset tracking, software cataloguing, fault detection, patching, and remediation on an automated basis. This component includes:
- Asset Inventory: We collect information on devices we monitor, such as serial numbers, operating systems, software installed, resource utilization history, patch status, health status, and more.
- Monitoring and Alerting: We build and define monitoring and alerting policies to detect potential failures, incidents, and tasks requiring remediation.
- Automated Patching: Automated patching of Windows, MacOS, and Linux Operating systems and automatic updating of over 200 3rd party applications.
- Secure Remote Access: Audited, recorded, and secure remote access for our IT support staff to support their Remote Support work.
- Automated Remediation: We build and deploy automated remediations for common Windows desktop and server issues.
- Warranty Tracking: We record serial numbers of assets and where possible, retrieve warranty information.
Client Obligations
To ensure effective delivery of our Monitoring and Patching component, clients and their staff are required to:
- Provide access to physical devices for us to install our monitoring agent on devices or install the monitoring agent following our instructions when requested.
- Ensure devices are powered on at least once every 30 days to receive patches and updates.
- Restart devices when prompted by us or our monitoring agent to facilitate patching and updates.
Service Limitations
The following limitations apply to our Workstation Monitoring component:
- Patching Limitations: Patching through our monitoring agent is only possible when no other patching solution is in place. In some configurations, we may opt to use alternate services like Microsoft Intune to manage patches of the operating system if we determine it would provide a better patching and updating experience.
- Auditing Limitations: We retain audit logs for a minimum of 90 days. Though we may be able to retrieve audit logging beyond the initial 90 days, it is not guaranteed. Remote support session recordings are stored for 30 days on a best effort basis. Availability of remote support session recordings are not guaranteed.
- Warranty Tracking: Warranty information is dependant upon the information obtainable through the APIs of the manufacturer of the device. If warranty information is inaccurate or unavailable from the manufacturer through their APIs or their API is unavailable, warranty information will not be recorded.
- Supported Operating Systems for Monitoring and Patching: Our monitoring and patching services are available only for supported operating systems, that have not reached end-of-life support from their manufacturer. The supported versions will change as new operating systems are released, and older operating systems reach end of life. You may request the list of currently supported operating system versions from us. The supported operating system types are as follows;
- Microsoft Windows Editions
- Microsoft Windows Server Editions
- macOS
- Linux
Security & Tech Review Component
Description
Our Security & Tech Review component is designed to solve the administrative requirements of IT. It is designed to be a regular set of meetings to review your IT security controls and incidents, review the performance of our Managed Helpdesk service, and review your license and service consumption to ensure compliance and combat overspending. The component includes:
- Regular Meetings:
- The team lead of your dedicated Helpdesk team will meet with you no less than once per year and no more frequently than once per quarter.
- The frequency of these meetings is at our sole discretion.
- You may opt for a meeting cadence other than what we have determined, for an additional fee.
- The meeting will be performed online over Microsoft Teams, unless we agree to meet in person.
- We will only agree to meet in person if the meeting location is within our service area.
- Security Review:
- We will report on any security incidents logged, prevented, or remediated since the most recent review.
- If you are using Microsoft 365 Business or Enterprise licenses, we will review your Microsoft 365 Secure Score and provide a roadmap of recommendations to improve your score.
- License and Service Review:
- We will report on your license consumption of any licenses we provide, and upon request report which users in your organisation are using these licenses.
- We will report on your service consumption for services we are providing, or would be capable of providing, with an aim to optimise your costs, reduce administration overhead, and unlock additional revenue.
- Managed Helpdesk Review:
- We will report on and discuss any service incidents, service requests, and change requests that have been flagged by you or our support team for discussion during the next Security & Tech Review.
- We will discuss ticket logging rates, ticket category metrics, user metrics, and other metrics to give you insight into how your staff are utilizing our Helpdesk.
- We will discuss any service incidents, service requests, and change requests that have stalled or were abandoned (we stopped receiving a response from you) to determine if it still needs to be addressed, and re-open and progress these tickets where needed.
- Asset Reporting:
- We will report on your Asset Lifecycle and recommend replacements where we determine it would increase productivity, mitigate risk, or lower costs.
Client Obligations
For the Security & Tech Review component, clients and their staff are required to:
- Respond in a timely manner to scheduling requests and/or schedule with us a regular meeting schedule such as “the First Monday of Every Quarter at 10am”.
- Set aside no less than 90 minutes per meeting and dedicate that time to the meeting.
- Join or Attend meetings at the time they are scheduled.
- Provide no less than 1 full business days’ notice for rescheduling a meeting or as soon as reasonable able where rescheduling is due to an illness or personal emergency.
- Reschedule a meeting for no later than 30 days after it was originally scheduled.
- Consider and where reasonable, implement our recommendations given during the Security & Tech Review meetings.
Service Limitations
The Workstation Monitoring component has the following limits:
- Scheduling Limitations: Your dedicated Managed Helpdesk team has only one team lead. Where the team lead may be unavailable due to;
- planned annual leave, we will notify you at least 1 business day in advance, or
- illness, personal emergency, or an incident requires their attention that is logged as Priority 1 critical, we will notify you as soon as we are reasonable able, and
- we may opt to assign another team lead or senior manager to attend the meeting in their stead. You may choose to accept the new assignment or opt to reschedule.
- Reporting Limitations: Reports are gathered from a variety of first party and third-party sources. Where these sources are not accessible, reporting may be unavailable or delayed.
Microsoft 365 Component
Description
Our Microsoft 365 component is designed to manage your Microsoft 365 environment, increase adoption of the Microsoft 365 range of features, and secure your Microsoft 365 environment. This component includes:
- Microsoft 365 Environment Management. We will manage your Microsoft 365 Environment including;
- License Management
- Configuration and Management of Security Policies
- Configuration and Enablement of the features included in your Microsoft 365 licenses
- Microsoft 365 Intune Management. We will configure and manage Microsoft 365 Intune with an aim to provide a consistent and secure experience among your owned devices, deploy applications, patches, policies, and controls.
- Microsoft 365 Secure Score Monitoring. We will monitor, manage, and implement Microsoft 365 Secure Score recommendations to improve your security posture.
- Microsoft 365 Best Practices. We will configure and manage the implementation of our Microsoft 365 best practices, with an aim to reduce complexity, increase security, and standardise your environment with our recommendations.
Client Obligations
For the Microsoft 365 component, clients and their staff are expected to:
- Adhere to Microsoft 365’s licensing terms and other terms of service.
- Participate in discovery and onboarding sessions we may run from time to time, to configure the Microsoft 365 environment to be suitable for your organisation.
- Implement policies and processes to support our security recommendations.
- Use company owned, or devices enrolled in Microsoft 365 Intune, for work purposes only and not for personal use.
- Use personal devices for personal use only, not for work purposes.
- Obtain Microsoft 365 Business Premium licenses for each user, or a set of licenses that provides a similar feature set with our approval.
Service Limitations
The Microsoft 365 component service has the following limits:
- Service Enablement Cadence: You may request at any time, that we assist with any new feature implementation or improvement to an existing feature within your Microsoft 365 platform. The order, rate, and cadence with which we provide assistance, configuration, and improvements to Microsoft 365 features is at our discretion, acting in good faith.
- License Requirements: Certain features of Microsoft 365 require specific licenses to utilize these features. If you do not have a license that includes a feature inside of the Microsoft 365 environment for a user, we will not be able to enable that feature, for that user which will reduce your cybersecurity effectiveness.
Password Manager Component
Description
Our Password Manager component is designed to provide a secure, zero-knowledge, end-to-end encrypted password storage and management for your organisation. This component includes:
- Password Management. We will provide and implement a password manager service, for you to securely store, use, and share passwords and other secrets or sensitive information.
- Single Sign-On. We will configure and enable Single Sign-On with your Microsoft 365 Environment, to facilitate a secure login process with your password manager.
- Password Manager Applications. We will provide apps for compatible devices for you to access your passwords and secrets and enable password autofill functionality, including multi-factor authentication autofill.
- Platform Management. We will manage the policies that apply to your password manager service, including password strength requirements, dark web monitoring, auditing, and alerts.
- Vault Transfer. To mitigate the risk of data loss due to loss of access, we may enable a feature called “Vault Transfer” that allows us to transfer all records from one user within the Password Manager, to another user within the same organisation. When this feature is enabled, staff will be notified that this feature is enabled when they log in for the first time.
Client Obligations
For the Password Manager component, clients and their staff are expected to:
- Participate in necessary onboarding sessions and training.
- Change passwords for services and websites that our reports indicate are compromised, weak, reused, or otherwise determined to be a risk.
- To facilitate regular audits, detection of risky passwords, and aid in employee offboarding, store all your passwords ONLY within the provided password manager.
Service Limitations
While our Password Manager service has the following limits:
- Zero-Knowledge Password Storage: Passwords and secrets belong to the user of staff member who created the record, even if the record is shared. Due to the nature of a Zero-Knowledge platform, if a user loses access to their account, the records they own within the platform cannot be recovered unless vault transfer is enabled.
- Limitations of Backups: As the platform is end-to-end encrypted with zero knowledge, no recovery is possible by us if access or data is lost by the Client and backups of your data stored inside the password manager service is the client’s responsibility.
For the current binding version of this document, or any question in plain English, contact [email protected] or call (08) 9467 2269. Governed by the laws in force in Western Australia. The Australian Consumer Law applies to the extent mandatory.