|
x
|
ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934
|
|
For the fiscal year ended December 31, 2018
|
o
|
TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934
|
|
For the transition period from__________ to____________
|
Delaware
|
|
77-0422528
|
(State or other jurisdiction of incorporation or organization)
|
|
(I.R.S. Employer Identification No.)
|
|
|
|
1133 Innovation Way
|
|
|
Sunnyvale, California
|
|
94089
|
(Address of principal executive offices)
|
|
(Zip code)
|
(408) 745-2000
|
||
(Registrant's telephone number, including area code)
|
Title of each class
|
|
Name of each exchange on which registered
|
Common Stock, par value $0.00001 per share
|
|
New York Stock Exchange
|
Large accelerated filer
x
|
Accelerated filer
o
|
Non-accelerated filer
o
|
Smaller reporting company
o
|
Emerging growth company
o
|
|
|
|
|
Page
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||
|
|
|
|
|
|
|
|
|
•
|
Telecom/Cable is now referred to as ‘Service Provider’
|
•
|
Strategic Enterprise is now referred to as ‘Enterprise’
|
•
|
Cloud remains unchanged
|
•
|
Reducing capital and operational costs by running multiple services over the same network using our secure, high density, highly automated, and highly reliable platforms;
|
•
|
Creating new or additional revenue opportunities by enabling new services to be offered to new market segments, which includes existing customers and new customers, based on our product capabilities;
|
•
|
Increasing customer satisfaction, while lowering costs, by enabling customers to self-select automatically provisioned service packages that provide the quality, speed, and pricing they desire;
|
•
|
Providing increased asset longevity and higher return on investment as our customers' networks can scale to higher throughput based on the capabilities of our platforms;
|
•
|
Offering network security across every environment—from the data center to campus and branch environments to assist in the protection and recovery of services and applications; and
|
•
|
Offering operational improvements that enable cost reductions, including lower administrative, training, customer care, and labor costs.
|
•
|
ACX Series
: Our ACX Series Universal Access Routers cost-effectively address current operator challenges to rapidly deploy new high-bandwidth services. The ACX Series is well positioned to address the growing metro Ethernet and mobile backhaul needs of our customers, as we expect 5G mobile network build-outs to begin to occur over the next few years. The platforms deliver the necessary scale and performance needed to support multi-generation wireless technologies.
|
•
|
MX Series
: Our MX Series is a family of high-performance, SDN-ready, Ethernet routers that function as a Universal Edge platform with high system capacity, density, and performance. The MX Series platforms utilize our custom silicon and provide carrier-class performance, scale, and reliability to support large-scale Ethernet deployments. We also offer the vMX, a virtual version of the MX router, which is a fully featured MX Series 3D Universal Edge Router optimized to run as software on x86 servers.
|
•
|
PTX Series
: Our PTX Series Packet Transport Routers deliver high throughput at a low cost per bit, optimized for the Service Provider core as well as the scale-out architectures of Cloud Providers. The PTX Series is built on our custom silicon and utilizes a forwarding architecture that is focused on optimizing IP/multi-protocol label switching, or MPLS, and Ethernet. This ensures high density and scalability, high availability, and network simplification.
|
•
|
Cloud Customer Premises Equipment, or CPE, Solution
: Our Cloud CPE is a fully automated, end-to-end NFV solution that builds on Juniper Networks Contrail Networking and supports cloud-based and premises-based VNFs. This solution includes Contrail Service Orchestration, a comprehensive management and orchestration platform that delivers and manages virtualized network services such as virtual security, and the NFX security family, a network services platform that can operate as a secure, on-premises device running software defined wide area network, or SD-WAN, and multiple virtual services, from Juniper and third parties, simultaneously.
|
•
|
NorthStar Controller
: Our wide-area network SDN controller automates the creation of traffic-engineering paths across the network, increasing network utilization and enabling a customized programmable networking experience.
|
•
|
EX Series
: Our EX Series Ethernet switches address the access, aggregation, and core layer switching requirements of micro branch, branch office, and campus environments, providing a foundation for the fast, secure, and reliable delivery of applications able to support strategic business processes. Our EX switches can also serve as security enforcement points as part of our Unified Cybersecurity Platform.
|
•
|
QFX Series
: Our QFX Series of core, spine and top-of-rack data center switches offer a revolutionary approach to switching that are designed to deliver dramatic improvements in data center performance, operating costs, and business agility for enterprises, high-performance computing networks, and cloud providers. Our QFX switches can also serve as security enforcement points as part of our Unified Cybersecurity Platform.
|
•
|
SRX Series Services Gateways for the Data Center and Network Backbone
: Our mid-range, high-end and virtual SRX Series platforms provide high-performance, scalability, and service integration, which are ideally suited for medium to large enterprise, data centers and large campus environments where scalability, high performance, and concurrent services, are essential. Our high-end SRX5800 platform is suited for service provider, large enterprise, and public sector networks. The upgrade to our high-end SRX firewall offering with our Services Process Card 3, or SPC3, with our Advanced Security Acceleration line card enhances the SRX5800 to deliver power for demanding use cases, including high-end data centers, IoT, and 5G.
|
•
|
Branch SRX, Security Policy and Management
: The Branch SRX family provides an integrated firewall and next-generation firewall, or NGFW, capabilities. Security Director is a network security management product that offers efficient, highly scalable, and comprehensive network security policy management. These solutions are designed to enable organizations to securely, reliably, and economically deliver powerful new services and applications to all locations and users with superior service quality.
|
•
|
Virtual Firewall
: Our vSRX Firewall delivers all of the features of our physical firewalls, including NGFW functionality, advanced security, and automated lifecycle management capabilities. The vSRX provides scalable, secure protection across private, public, and hybrid clouds. We also offer the cSRX which has been designed and optimized for container and cloud environments.
|
•
|
Advanced Malware Protection
: Our Advanced Threat Prevention portfolio consists of Sky ATP, a cloud-based service and Juniper ATP, or JATP, a premises-based solution. These products are designed to use both static and dynamic analysis with machine learning to find unknown threat signatures (zero-day attacks).
|
•
|
One modular operating system with common base of code and a single, consistent implementation for each control plane feature;
|
•
|
A highly disciplined and firmly scheduled development process; and
|
•
|
One common modular software architecture that scales across all Junos-based platforms.
|
•
|
Contrail
: Our Contrail Networking and Contrail Cloud Platform offer an open-source, standards-based platform for SDN and NFV. This platform enables our customers to address their key problems in the area of network automation, agility, and time-to-service deployment by providing a mechanism to virtualize the network over any physical network and automating the provisioning and management of networking services (such as security and load balancing). Contrail Enterprise Multicloud and Contrail Edge Cloud provide packaged solutions designed for Enterprise multicloud and Service Provider Edge environments, respectively. Contrail’s approach is to support multiple cloud and hardware vendors, various types of workloads, and both existing and new deployments. In late 2018, we completed the acquisition of HTBase Corporation ("HTBase"), a company that has developed a unique and disruptive platform for software-defined enterprise multicloud, which we expect will accelerate our leadership in multicloud and function with the compute orchestration capabilities of Contrail Enterprise Multicloud.
|
•
|
AppFormix
: AppFormix is an optimization and management software platform for public, private, and hybrid clouds. This intent-driven software manages automated operations, visibility, and reporting in cloud and NFV use cases. It features machine learning-based policy and smart monitors, application and software-defined infrastructure analytics, and alarms to provide comprehensive visualization, smart analytics, and the ability to manage automatic remediation for service assurance.
|
•
|
A global network of strategic distributor relationships, as well as region-specific or country-specific distributors who in turn sell to local VARs who sell to end-user customers. Our distribution channel partners resell routing, switching, and security products and services, which are purchased by all of our key customer verticals. These distributors tend to focus on particular regions or countries within regions. For example, we have substantial distribution relationships with Ingram Micro in the Americas and Hitachi in Japan. Our agreements with these distributors are generally non-exclusive, limited by region, and provide product and service discounts and other ordinary terms of sale. These agreements do not require our distributors to purchase specified quantities of our products or services. Further, most of our distributors sell our competitors' products and services, and some sell their own competing products and services.
|
•
|
VARs and Direct value-added resellers, including our strategic worldwide alliance partners referenced below, resell our products to end-users around the world. These channel partners either buy our products and services through distributors, or directly from us, and have expertise in designing, selling, implementing, and supporting complex networking solutions in their respective markets. Our agreements with these channel partners are generally non-exclusive, limited by region, and provide product and service discounts and other ordinary terms of sale. These agreements do not require these channel partners to purchase specified quantities of our products or services. Increasingly, our Cloud and Service Provider customers also resell our products or services to their customers or purchase our products or services for the purpose of providing managed or cloud-based services to their customers.
|
•
|
Strategic worldwide reseller relationships with established Juniper alliances, comprised of Dimension Data Holdings, or Dimension Data; Ericsson Telecom A.B., or Ericsson; International Business Machines, or IBM; and NEC Corporation. These companies each offer services and products that complement our own product and service offerings and act as a reseller, and in some instances as an integration partner for our products. Our arrangements with these partners allow them to resell our products and services on a non-exclusive and generally global basis, provide for product and service discounts, and specify other general terms of sale. These agreements do not require these partners to purchase specified quantities of our products or services.
|
•
|
We can quickly ramp up and deliver products to customers with turnkey manufacturing;
|
•
|
We gain economies of scale by leveraging our buying power with our contract manufacturers and original design manufacturers when we manufacture large quantities of products;
|
•
|
We operate with a minimum amount of dedicated space and employees for manufacturing operations; and
|
•
|
We can reduce our costs by reducing what would normally be fixed overhead expenses.
|
(*)
|
Prior to January 1, 2018, our product backlog consisted of confirmed orders for products scheduled to be shipped to customers, generally within the next six months, and excluded orders from distributors as we recognized product revenue on sales made through distributors upon sell-through to end-users. Backlog also excluded certain future revenue adjustments for items such as product revenue deferrals, rebates, stock rotation reserves, sales return reserves, service revenue allocations, and early payment discounts.
|
Name
|
|
Age
|
|
Position
|
||
Rami Rahim
|
|
48
|
|
Chief Executive Officer and Director
|
||
Anand Athreya
|
|
55
|
|
Executive Vice President, Chief Development Officer
|
||
Bikash Koley
|
|
45
|
|
Executive Vice President, Chief Technology Officer
|
||
Manoj Leelanivas
|
|
49
|
|
Executive Vice President, Chief Product Officer
|
||
Brian Martin
|
|
57
|
|
Senior Vice President, General Counsel and Secretary
|
||
Kenneth B. Miller
|
|
48
|
|
Executive Vice President, Chief Financial Officer
|
||
Terrance F. Spidell
|
|
50
|
|
Vice President, Corporate Controller and Chief Accounting Officer
|
•
|
unpredictable ordering patterns and limited or reduced visibility into our customers’ spending plans and associated revenue;
|
•
|
changes in customer mix;
|
•
|
changes in the demand for our products and services;
|
•
|
changes in the mix of products and services sold;
|
•
|
changes in the mix of geographies in which our products and services are sold;
|
•
|
changing market and economic conditions;
|
•
|
current and potential customer, partner and supplier consolidation and concentration;
|
•
|
price and product competition;
|
•
|
long sales, qualification and implementation cycles;
|
•
|
success in new and evolving markets and emerging technologies;
|
•
|
how well we execute on our strategy and operating plans and the impact of changes in our business model that could result in significant restructuring charges;
|
•
|
ability of our customers, channel partners, contract manufacturers and suppliers to purchase, market, sell, manufacture or supply our products (or components of our products) and services;
|
•
|
financial stability of our customers, including the solvency of private sector customers and statutory authority for government customers to purchase goods and services;
|
•
|
our ability to achieve targeted cost reductions;
|
•
|
changes in tax laws or accounting rules, or interpretations thereof;
|
•
|
changes in the amount and frequency of share repurchases or dividends;
|
•
|
regional economic and political conditions; and
|
•
|
seasonality.
|
•
|
the additional development efforts and costs required to create new software products and/or to make our disaggregated products compatible with multiple technologies;
|
•
|
the possibility that our new software products or disaggregated products may not achieve widespread customer adoption;
|
•
|
the possibility that our strategy could erode our revenue and gross margins;
|
•
|
the impact on our financial results of longer periods of revenue recognition for certain types of software products
|
•
|
the additional costs associated with regulatory compliance and changes we need to make to our distribution chain in connection with increased software sales;
|
•
|
the ability of our disaggregated hardware and software products to operate independently and/or to integrate with current and future third-party products; and
|
•
|
issues with third-party technologies used with our disaggregated products may be attributed to us.
|
•
|
changes in general IT spending,
|
•
|
the imposition of government controls, inclusive of critical infrastructure protection;
|
•
|
changes or limitations in trade protection laws or other regulatory requirements, which may affect our ability to import or export our products from various countries;
|
•
|
laws that restrict sales of products developed or manufactured outside of the country;
|
•
|
varying and potentially conflicting laws and regulations;
|
•
|
fluctuations in local economies;
|
•
|
wage inflation or a tightening of the labor market;
|
•
|
tax policies that could have a business impact;
|
•
|
import tariffs imposed by the United States and reciprocal tariffs imposed by foreign countries;
|
•
|
data privacy rules and other regulations that affect cross border data flow; and
|
•
|
the impact of the following on customer spending patterns: political considerations, unfavorable changes in tax treaties or laws, natural disasters, epidemic disease, labor unrest, earnings expatriation restrictions, misappropriation of intellectual property, military actions, acts of terrorism, political and social unrest and difficulties in staffing and managing international operations.
|
•
|
incur liens;
|
•
|
incur sale and leaseback transactions; and
|
•
|
consolidate or merge with or into, or sell substantially all of our assets to, another person.
|
•
|
maintenance of a leverage ratio no greater than 3.0x and an interest coverage ratio no less than 3.0x
|
•
|
covenants that limit or restrict the ability of the Company and its subsidiaries to, among other things, grant liens, merge or consolidate, dispose of all or substantially all of its assets, change their accounting or reporting policies, change their business and incur subsidiary indebtedness, in each case subject to customary exceptions for a credit facility of this size and type.
|
|
As of December 31,
|
||||||||||||||||||||||
|
2013
|
|
2014
|
|
2015
|
|
2016
|
|
2017
|
|
2018
|
||||||||||||
JNPR
|
$
|
100.00
|
|
|
$
|
99.77
|
|
|
$
|
125.22
|
|
|
$
|
130.34
|
|
|
$
|
133.31
|
|
|
$
|
129.24
|
|
S&P 500
|
$
|
100.00
|
|
|
$
|
113.68
|
|
|
$
|
115.24
|
|
|
$
|
129.02
|
|
|
$
|
157.17
|
|
|
$
|
150.27
|
|
NASDAQ Telecommunications Index
|
$
|
100.00
|
|
|
$
|
111.51
|
|
|
$
|
105.60
|
|
|
$
|
124.17
|
|
|
$
|
149.28
|
|
|
$
|
157.14
|
|
|
Years Ended December 31,
|
||||||||||||||||||
|
2018
(1)
|
|
2017
(2)
|
|
2016
|
|
2015
|
|
2014
(3)
|
||||||||||
|
(In millions)
|
||||||||||||||||||
Net revenues
|
$
|
4,647.5
|
|
|
$
|
5,027.2
|
|
|
$
|
4,990.1
|
|
|
$
|
4,857.8
|
|
|
$
|
4,627.1
|
|
Gross margin
|
2,741.2
|
|
|
3,072.1
|
|
|
3,104.5
|
|
|
3,078.6
|
|
|
2,858.2
|
|
|||||
Operating income (loss)
|
572.2
|
|
|
848.1
|
|
|
889.7
|
|
|
912.0
|
|
|
(419.7
|
)
|
|||||
Net income (loss)
|
$
|
566.9
|
|
|
$
|
306.2
|
|
|
$
|
592.7
|
|
|
$
|
633.7
|
|
|
$
|
(334.3
|
)
|
(1)
|
Fiscal year 2018 includes a tax benefit of $133.0 million related to a lapse in the statute of limitations and tax accounting method changes related to deferred revenue.
|
(2)
|
Fiscal year 2017 includes an estimated
$289.5 million
of tax expense related to the U.S. Tax Cuts and Jobs Act, and
pre-tax
restructuring charges of $65.6 million.
|
(3)
|
F
iscal year 2014 includes the following significant pre-tax items: impairment of goodwill of $850.0 million; restructuring and other charges of $208.5 million; gain on the sale of equity investments of
$163.0 million;
gain, net of legal fees in connection with the litigation settlement with Palo Alto Networks of
$196.1 million; and gain on the sale of Junos Pulse of $19.6 million.
|
|
Years Ended December 31,
|
||||||||||||||||||
|
2018
|
|
2017
|
|
2016
|
|
2015
|
|
2014
|
||||||||||
Net income (loss) per share:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||
Basic
|
$
|
1.62
|
|
|
$
|
0.81
|
|
|
$
|
1.55
|
|
|
$
|
1.62
|
|
|
$
|
(0.73
|
)
|
Diluted
|
$
|
1.60
|
|
|
$
|
0.80
|
|
|
$
|
1.53
|
|
|
$
|
1.59
|
|
|
$
|
(0.73
|
)
|
Cash dividends declared per share of common stock
|
$
|
0.72
|
|
|
$
|
0.40
|
|
|
$
|
0.40
|
|
|
$
|
0.40
|
|
|
$
|
0.20
|
|
|
As of December 31,
|
||||||||||||||||||
|
2018
|
|
2017
|
|
2016
|
|
2015
|
|
2014
|
||||||||||
|
(In millions)
|
||||||||||||||||||
Cash, cash equivalents, and investments
|
$
|
3,758.1
|
|
|
$
|
4,021.0
|
|
|
$
|
3,657.3
|
|
|
$
|
3,192.2
|
|
|
$
|
3,104.9
|
|
Working capital
|
2,739.3
|
|
|
2,446.3
|
|
|
2,236.0
|
|
|
1,110.5
|
|
|
1,297.2
|
|
|||||
Goodwill
|
3,108.8
|
|
|
3,096.2
|
|
|
3,081.7
|
|
|
2,981.3
|
|
|
2,981.5
|
|
|||||
Total assets
(1)
|
9,363.3
|
|
|
9,833.8
|
|
|
9,656.5
|
|
|
8,607.9
|
|
|
8,273.6
|
|
|||||
Total debt
(1)
|
2,139.0
|
|
|
2,136.3
|
|
|
2,133.7
|
|
|
1,937.4
|
|
|
1,341.2
|
|
|||||
Total long-term liabilities (excluding long-term debt)
(2)
|
908.5
|
|
|
1,278.4
|
|
|
824.4
|
|
|
594.1
|
|
|
499.9
|
|
|||||
Total stockholders' equity
(3) (4)
|
$
|
4,823.2
|
|
|
$
|
4,680.9
|
|
|
$
|
4,962.5
|
|
|
$
|
4,574.4
|
|
|
$
|
4,919.1
|
|
(1)
|
Fiscal year 2016 includes the adoption of Accounting Standards Update ("ASU") No. 2015-03 (Subtopic 835-30) -
Simplifying the Presentation of Debt Issuance Costs
, requiring that debt issuance costs related to a recognized debt liability be presented in the balance sheet as a direct deduction from the carrying amount of that debt liability, consistent with debt discounts. Other long-term assets and long-term debt in the prior years were retrospectively adjusted to conform to the required presentation.
|
(2)
|
Fiscal 2017 includes an estimated
$394.0 million
recorded in long-term income taxes payable related to the one-time transition tax as a result of the Tax Cuts and Jobs Act.
|
(3)
|
Fiscal year 2017 includes the adoption of ASU No. 2016-09 (Topic 718)
Compensation—Stock Compensation: Improvements to Employee Share-Based Payment Accounting
, which simplified several aspects of the accounting for share-based payment transactions, including the accounting for forfeitures, among other things. We elected to account for forfeitures as they occur using a modified retrospective transition method, rather than estimating forfeitures, resulting in a cumulative-effect adjustment of $9.0 million, which increased the January 1, 2017 opening accumulated deficit balance on the Consolidated Balance Sheets.
|
(4)
|
Fiscal 2018 includes the adoption of ASU No. 2014-09 (Topic 606) Revenue from Contracts with Customers, which provides guidance for revenue recognition that superseded the revenue recognition requirements in Accounting Standards Codification Topic 605, Revenue Recognition and most industry specific guidance. We adopted the standard under the modified retrospective approach, applying the amendments to prospective reporting periods. Upon adoption, we recorded a cumulative effect adjustment of
$324.7 million
, which decreased the January 1, 2018 opening accumulated deficit balance on the Consolidated Balance Sheet primarily due to the application of the new guidance in the areas of distributor sales, software revenue, variable consideration, revenue allocation, and contract acquisition costs.
|
|
As of and for the Years Ended December 31,
|
||||||||||||||||||||||||
|
2018
|
|
2017
|
|
2016
|
|
2018 vs. 2017
|
|
2017 vs. 2016
|
||||||||||||||||
|
|
|
|
|
|
|
$ Change
|
|
% Change
|
|
$ Change
|
|
% Change
|
||||||||||||
Net revenues
|
$
|
4,647.5
|
|
|
$
|
5,027.2
|
|
|
$
|
4,990.1
|
|
|
$
|
(379.7
|
)
|
|
(8
|
)%
|
|
$
|
37.1
|
|
|
1
|
%
|
Gross margin
|
$
|
2,741.2
|
|
|
$
|
3,072.1
|
|
|
$
|
3,104.5
|
|
|
$
|
(330.9
|
)
|
|
(11
|
)%
|
|
$
|
(32.4
|
)
|
|
(1
|
)%
|
Percentage of net revenues
|
59.0
|
%
|
|
61.1
|
%
|
|
62.2
|
%
|
|
|
|
|
|
|
|
|
|||||||||
Operating income
|
$
|
572.2
|
|
|
$
|
848.1
|
|
|
$
|
889.7
|
|
|
$
|
(275.9
|
)
|
|
(33
|
)%
|
|
$
|
(41.6
|
)
|
|
(5
|
)%
|
Percentage of net revenues
|
12.3
|
%
|
|
16.9
|
%
|
|
17.8
|
%
|
|
|
|
|
|
|
|
|
|||||||||
Net income
|
$
|
566.9
|
|
|
$
|
306.2
|
|
|
$
|
592.7
|
|
|
$
|
260.7
|
|
|
85
|
%
|
|
$
|
(286.5
|
)
|
|
(48
|
)%
|
Percentage of net revenues
|
12.2
|
%
|
|
6.1
|
%
|
|
11.9
|
%
|
|
|
|
|
|
|
|
|
|||||||||
Net income per share
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||||||||
Basic
|
$
|
1.62
|
|
|
$
|
0.81
|
|
|
$
|
1.55
|
|
|
$
|
0.81
|
|
|
100
|
%
|
|
$
|
(0.74
|
)
|
|
(48
|
)%
|
Diluted
|
$
|
1.60
|
|
|
$
|
0.80
|
|
|
$
|
1.53
|
|
|
$
|
0.80
|
|
|
100
|
%
|
|
$
|
(0.73
|
)
|
|
(48
|
)%
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||||||||
Operating cash flows
|
$
|
861.1
|
|
|
$
|
1,259.3
|
|
|
$
|
1,126.6
|
|
|
$
|
(398.2
|
)
|
|
(32
|
)%
|
|
$
|
132.7
|
|
|
12
|
%
|
Stock repurchase plan activity
|
$
|
750.0
|
|
|
$
|
719.7
|
|
|
$
|
312.9
|
|
|
$
|
30.3
|
|
|
4
|
%
|
|
$
|
406.8
|
|
|
130
|
%
|
Cash dividends declared per common stock
|
$
|
0.72
|
|
|
$
|
0.40
|
|
|
$
|
0.40
|
|
|
$
|
0.32
|
|
|
80
|
%
|
|
$
|
—
|
|
|
—
|
%
|
DSO
(*)
|
58
|
|
|
62
|
|
|
68
|
|
|
(4
|
)
|
|
(6
|
)%
|
|
(6
|
)
|
|
(9
|
)%
|
|||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||||||||
Deferred revenue
|
$
|
1,213.6
|
|
|
$
|
1,539.3
|
|
|
$
|
1,481.1
|
|
|
$
|
(325.7
|
)
|
|
(21
|
)%
|
|
$
|
58.2
|
|
|
4
|
%
|
Product deferred revenue
|
$
|
144.4
|
|
|
$
|
334.2
|
|
|
$
|
322.9
|
|
|
$
|
(189.8
|
)
|
|
(57
|
)%
|
|
$
|
11.3
|
|
|
3
|
%
|
Service deferred revenue
|
$
|
1,069.2
|
|
|
$
|
1,205.1
|
|
|
$
|
1,158.2
|
|
|
$
|
(135.9
|
)
|
|
(11
|
)%
|
|
$
|
46.9
|
|
|
4
|
%
|
(*)
|
DSO is for the fourth quarter ended December 31,
2018
,
2017
and
2016
.
|
•
|
Net Revenues:
During
2018
, net revenues
decreased
compared to
2017
, primarily due to lower routing product revenues from our Cloud and Service Provider verticals in the Americas. We experienced ongoing networking architectural transitions and a slower than expected pace of deployments for certain large Cloud customers as well as a decline in our Service Provider business due to the timing of deployments. The year-over-year decline in product net revenues was partially offset by broad-based revenue growth in our Enterprise vertical. Excluding the impact of Topic 606, our service net revenues would have increased during the
2018
, compared to 2017, primarily due to strong renewal and attach rates of support contracts. Of our top ten customers for
2018
, five were Cloud, four were Service Provider, and one was an Enterprise.
|
•
|
Gross Margin:
Our gross margin as a percentage of net revenues decreased during
2018
, compared to
2017
, primarily due to lower net revenues and product mix, resulting from the year-over-year decline in routing revenues from our Cloud and Service Provider verticals, and to a lesser extent, the impact of Topic 606, partially offset by improvements in our cost structure.
|
•
|
Operating Margin:
During
2018
, compared to
2017
, operating income as a percentage of net revenues
decreased
primarily due to the drivers described in the gross margin discussion above, partially offset by a net decrease in our operating expenses during
2018
, compared to
2017
, as a result of lower restructuring charges.
|
•
|
Net Income:
During
2018
, net income
increased
compared to
2017
, primarily driven by a lower statutory tax rate due to the Tax Act and tax benefits related to items unique to 2018. See Note 14,
Income Taxes,
in the Notes to Consolidated Financial Statements in Item 8 of Part II of this Report, for further discussion.
|
•
|
Operating Cash Flows:
Net cash provided by operations
decreased
in
2018
, compared to
2017
, primarily due to higher cash collections from customers during
2017
related to service renewals invoiced during the fourth quarter of 2016, partially offset by a decline in cash paid for personnel-related costs, principally as a result of a reduction in headcount and lower incentive compensation, and a decrease in payments to suppliers.
|
•
|
Capital Return:
In 2018, we repurchased
29.3 million
shares of our common stock for an aggregate amount of
$750.0 million
through the completion of a
$750.0 million
accelerated share repurchase program, or ASR. During
2018
, we also paid a quarterly cash dividend of
$0.18
per share, for an aggregate amount of
$249.3 million
.
|
•
|
DSO:
DSO is calculated as the ratio of ending accounts receivable, net of allowances, divided by net revenues for the preceding 90 days. DSO for the quarter ended
December 31, 2018
decreased
, compared to the quarter ended
December 31, 2017
, primarily due to lower overall invoicing volume, partially offset by lower revenues.
|
•
|
Deferred Revenue:
Total deferred revenue
decreased
as of
December 31, 2018
, compared to
December 31, 2017
, due to the impact of adoption of Topic 606. See Note 2,
Significant Accounting Policies,
in the Notes to Consolidated Financial Statements in Item 8 of Part II of this Report, for further discussion.
|
•
|
Goodwill:
We make significant estimates, assumptions, and judgments when valuing goodwill and other intangible assets in connection with the initial purchase price allocation of an acquired entity, as well as when evaluating impairment of goodwill and other intangible assets on an ongoing basis. These estimates are based upon a number of factors, including historical experience, market conditions, and information obtained from the management of the acquired company. Critical estimates in valuing certain intangible assets include, but are not limited to, historical and projected customer retention rates, anticipated growth in revenue from the acquired customer and product base, and the expected use of the acquired assets. These factors are also considered in determining the useful life of the acquired intangible assets. The amounts and useful lives assigned to identified intangible assets impacts the amount and timing of future amortization expense.
|
•
|
Inventory Valuation and Contract Manufacturer Liabilities:
Inventory consists primarily of component parts to be used in the manufacturing process and finished goods in-transit, and is stated at lower of cost or net realizable value. A provision is recorded when inventory is determined to be in excess of anticipated demand or obsolete, to adjust inventory to its estimated realizable value. In determining the provision, we also consider estimated recovery rates based on the nature of the inventory. As of
December 31, 2018
and
December 31, 2017
, our net inventory balances were
$82.0 million
and
$97.8 million
, respectively.
|
•
|
Revenue Recognition:
We enter into contracts to sell our products and services, and while some of our sales agreements contain standard terms and conditions, there are agreements that contain non-standard terms and conditions and include promises to transfer multiple goods or services. As a result, significant interpretation and judgment are sometimes required to determine the appropriate accounting for these transactions, including: (1) whether performance obligations are considered distinct that should be accounted for separately versus together, how the price should be allocated among the performance obligations, and when to recognize revenue for each performance obligation; (2) developing an estimate of the stand-alone selling price, or SSP, of each distinct performance obligation; (3) combining contracts that may impact the allocation of the transaction price between product and services; and (4) estimating and accounting for variable consideration, including rights of return, rebates, price protection, expected penalties or other price concessions as a reduction of the transaction price.
|
•
|
Income Taxes:
We are subject to income taxes in the United States and numerous foreign jurisdictions. Significant judgment is required in evaluating our uncertain tax positions and determining our taxes. Although we believe our reserves are reasonable, no assurance can be given that the final tax outcome of these matters will not be different from that which is reflected in our historical income tax provisions and accruals. We adjust these reserves in light of changing facts and circumstances, such as the closing of a tax audit or the refinement of an estimate. To the extent that the final tax outcome of these matters is different than the amounts recorded, such differences will affect the provision for income taxes in the period in which such determination is made.
|
•
|
Loss Contingencies:
We are involved in various lawsuits, claims, investigations, and proceedings, including those involving our IP, commercial, securities and employment matters, which arise in the ordinary course of business. We use significant judgment and assumptions to estimate the likelihood of loss or impairment of an asset, or the incurrence of a liability, in determining loss contingencies. An estimated loss contingency is accrued when it is probable that an asset has been impaired or a liability has been incurred and the amount of loss can be reasonably estimated. We record a charge equal to the minimum estimated liability for litigation costs or a loss contingency only when both of the following conditions are met: (i) information available prior to issuance of our consolidated financial statements indicates that it is probable that an asset had been impaired or a liability had been incurred at the date of the financial statements and (ii) the range of loss can be reasonably estimated. We regularly evaluate current information available to us to determine whether such accruals should be adjusted and whether new accruals are required.
|
|
Years Ended December 31,
|
||||||||||||||||||||||||
|
2018
|
|
2017
|
|
2016
|
|
2018 vs. 2017
|
|
2017 vs. 2016
|
||||||||||||||||
|
|
|
|
|
|
|
$ Change
|
|
% Change
|
|
$ Change
|
|
% Change
|
||||||||||||
Routing
|
$
|
1,839.7
|
|
|
$
|
2,189.5
|
|
|
$
|
2,352.9
|
|
|
$
|
(349.8
|
)
|
|
(16
|
)%
|
|
$
|
(163.4
|
)
|
|
(7
|
)%
|
Switching
|
934.4
|
|
|
963.4
|
|
|
858.0
|
|
|
(29.0
|
)
|
|
(3
|
)%
|
|
105.4
|
|
|
12
|
%
|
|||||
Security
|
333.0
|
|
|
293.3
|
|
|
318.0
|
|
|
39.7
|
|
|
14
|
%
|
|
(24.7
|
)
|
|
(8
|
)%
|
|||||
Total Product
|
3,107.1
|
|
|
3,446.2
|
|
|
3,528.9
|
|
|
(339.1
|
)
|
|
(10
|
)%
|
|
(82.7
|
)
|
|
(2
|
)%
|
|||||
Percentage of net revenues
|
66.9
|
%
|
|
68.6
|
%
|
|
70.7
|
%
|
|
|
|
|
|
|
|
|
|||||||||
Total Service
|
1,540.4
|
|
|
1,581.0
|
|
|
1,461.2
|
|
|
(40.6
|
)
|
|
(3
|
)%
|
|
119.8
|
|
|
8
|
%
|
|||||
Percentage of net revenues
|
33.1
|
%
|
|
31.4
|
%
|
|
29.3
|
%
|
|
|
|
|
|
|
|
|
|||||||||
Total net revenues
|
$
|
4,647.5
|
|
|
$
|
5,027.2
|
|
|
$
|
4,990.1
|
|
|
$
|
(379.7
|
)
|
|
(8
|
)%
|
|
$
|
37.1
|
|
|
1
|
%
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||||||||
Cloud
|
$
|
1,049.9
|
|
|
$
|
1,310.7
|
|
|
$
|
1,315.9
|
|
|
$
|
(260.8
|
)
|
|
(20
|
)%
|
|
$
|
(5.2
|
)
|
|
—
|
%
|
Percentage of net revenues
|
22.6
|
%
|
|
26.0
|
%
|
|
26.4
|
%
|
|
|
|
|
|
|
|
|
|||||||||
Service Provider
|
2,066.7
|
|
|
2,319.4
|
|
|
2,316.4
|
|
|
(252.7
|
)
|
|
(11
|
)%
|
|
3.0
|
|
|
—
|
%
|
|||||
Percentage of net revenues
|
44.5
|
%
|
|
46.1
|
%
|
|
46.4
|
%
|
|
|
|
|
|
|
|
|
|||||||||
Enterprise
|
1,530.9
|
|
|
1,397.1
|
|
|
1,357.8
|
|
|
133.8
|
|
|
10
|
%
|
|
39.3
|
|
|
3
|
%
|
|||||
Percentage of net revenues
|
32.9
|
%
|
|
27.8
|
%
|
|
27.2
|
%
|
|
|
|
|
|
|
|
|
|||||||||
Total net revenues
|
$
|
4,647.5
|
|
|
$
|
5,027.2
|
|
|
$
|
4,990.1
|
|
|
$
|
(379.7
|
)
|
|
(8
|
)%
|
|
$
|
37.1
|
|
|
1
|
%
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||||||||
Americas:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||||||||
United States
|
$
|
2,339.1
|
|
|
$
|
2,712.6
|
|
|
$
|
2,737.0
|
|
|
$
|
(373.5
|
)
|
|
(14
|
)%
|
|
$
|
(24.4
|
)
|
|
(1
|
)%
|
Other
|
202.1
|
|
|
234.6
|
|
|
231.8
|
|
|
(32.5
|
)
|
|
(14
|
)%
|
|
2.8
|
|
|
1
|
%
|
|||||
Total Americas
|
2,541.2
|
|
|
2,947.2
|
|
|
2,968.8
|
|
|
(406.0
|
)
|
|
(14
|
)%
|
|
(21.6
|
)
|
|
(1
|
)%
|
|||||
Percentage of net revenues
|
54.7
|
%
|
|
58.6
|
%
|
|
59.5
|
%
|
|
|
|
|
|
|
|
|
|||||||||
EMEA
|
1,290.8
|
|
|
1,195.8
|
|
|
1,238.1
|
|
|
95.0
|
|
|
8
|
%
|
|
(42.3
|
)
|
|
(3
|
)%
|
|||||
Percentage of net revenues
|
27.8
|
%
|
|
23.8
|
%
|
|
24.8
|
%
|
|
|
|
|
|
|
|
|
|||||||||
APAC
|
815.5
|
|
|
884.2
|
|
|
783.2
|
|
|
(68.7
|
)
|
|
(8
|
)%
|
|
101.0
|
|
|
13
|
%
|
|||||
Percentage of net revenues
|
17.5
|
%
|
|
17.6
|
%
|
|
15.7
|
%
|
|
|
|
|
|
|
|
|
|||||||||
Total net revenues
|
$
|
4,647.5
|
|
|
$
|
5,027.2
|
|
|
$
|
4,990.1
|
|
|
$
|
(379.7
|
)
|
|
(8
|
)%
|
|
$
|
37.1
|
|
|
1
|
%
|
(*)
|
Certain prior-period amounts have been reclassified to conform to the current-period classifications.
|
|
Years Ended December 31,
|
||||||||||||||||||||||||
|
2018
|
|
2017
|
|
2016
|
|
2018 vs. 2017
|
|
2017 vs. 2016
|
||||||||||||||||
|
|
|
|
|
|
|
$ Change
|
|
% Change
|
|
$ Change
|
|
% Change
|
||||||||||||
Product gross margin
|
$
|
1,829.9
|
|
|
$
|
2,085.3
|
|
|
$
|
2,202.7
|
|
|
$
|
(255.4
|
)
|
|
(12
|
)%
|
|
$
|
(117.4
|
)
|
|
(5
|
)%
|
Percentage of product revenues
|
58.9
|
%
|
|
60.5
|
%
|
|
62.4
|
%
|
|
|
|
|
|
|
|
|
|||||||||
Service gross margin
|
911.3
|
|
|
986.8
|
|
|
901.8
|
|
|
(75.5
|
)
|
|
(8
|
)%
|
|
85.0
|
|
|
9
|
%
|
|||||
Percentage of service revenues
|
59.2
|
%
|
|
62.4
|
%
|
|
61.7
|
%
|
|
|
|
|
|
|
|
|
|||||||||
Total gross margin
|
$
|
2,741.2
|
|
|
$
|
3,072.1
|
|
|
$
|
3,104.5
|
|
|
$
|
(330.9
|
)
|
|
(11
|
)%
|
|
$
|
(32.4
|
)
|
|
(1
|
)%
|
Percentage of net revenues
|
59.0
|
%
|
|
61.1
|
%
|
|
62.2
|
%
|
|
|
|
|
|
|
|
|
|
Years Ended December 31,
|
||||||||||||||||||||||||
|
2018
|
|
2017
|
|
2016
|
|
2018 vs. 2017
|
|
2017 vs. 2016
|
||||||||||||||||
|
|
|
|
|
|
|
$ Change
|
|
% Change
|
|
$ Change
|
|
% Change
|
||||||||||||
Research and development
|
$
|
1,003.2
|
|
|
$
|
980.7
|
|
|
$
|
1,013.7
|
|
|
$
|
22.5
|
|
|
2
|
%
|
|
$
|
(33.0
|
)
|
|
(3
|
)%
|
Percentage of net revenues
|
21.6
|
%
|
|
19.5
|
%
|
|
20.3
|
%
|
|
|
|
|
|
|
|
|
|||||||||
Sales and marketing
|
927.4
|
|
|
950.2
|
|
|
972.9
|
|
|
(22.8
|
)
|
|
(2
|
)%
|
|
(22.7
|
)
|
|
(2
|
)%
|
|||||
Percentage of net revenues
|
19.9
|
%
|
|
18.9
|
%
|
|
19.5
|
%
|
|
|
|
|
|
|
|
|
|||||||||
General and administrative
|
231.1
|
|
|
227.5
|
|
|
224.9
|
|
|
3.6
|
|
|
2
|
%
|
|
2.6
|
|
|
1
|
%
|
|||||
Percentage of net revenues
|
5.0
|
%
|
|
4.5
|
%
|
|
4.5
|
%
|
|
|
|
|
|
|
|
|
|||||||||
Restructuring charges
|
7.3
|
|
|
65.6
|
|
|
3.3
|
|
|
(58.3
|
)
|
|
N/M
|
|
|
62.3
|
|
|
N/M
|
|
|||||
Percentage of net revenues
|
0.2
|
%
|
|
1.3
|
%
|
|
0.1
|
%
|
|
|
|
|
|
|
|
|
|||||||||
Total operating expenses
|
$
|
2,169.0
|
|
|
$
|
2,224.0
|
|
|
$
|
2,214.8
|
|
|
$
|
(55.0
|
)
|
|
(2
|
)%
|
|
$
|
9.2
|
|
|
—
|
%
|
Percentage of net revenues
|
46.7
|
%
|
|
44.2
|
%
|
|
44.4
|
%
|
|
|
|
|
|
|
|
|
|
Years Ended December 31,
|
||||||||||||||||||||||||
|
2018
|
|
2017
|
|
2016
|
|
2018 vs. 2017
|
|
2017 vs. 2016
|
||||||||||||||||
|
|
|
|
|
|
|
$ Change
|
|
% Change
|
|
$ Change
|
|
% Change
|
||||||||||||
Interest income
|
$
|
72.7
|
|
|
$
|
53.0
|
|
|
$
|
35.4
|
|
|
$
|
19.7
|
|
|
37
|
%
|
|
$
|
17.6
|
|
|
50
|
%
|
Interest expense
|
(103.2
|
)
|
|
(101.2
|
)
|
|
(97.7
|
)
|
|
(2.0
|
)
|
|
2
|
%
|
|
(3.5
|
)
|
|
4
|
%
|
|||||
(Loss) gain on investments, net
|
(7.4
|
)
|
|
14.6
|
|
|
(1.8
|
)
|
|
(22.0
|
)
|
|
(151
|
)%
|
|
16.4
|
|
|
N/M
|
|
|||||
Other
|
(1.6
|
)
|
|
(2.7
|
)
|
|
1.8
|
|
|
1.1
|
|
|
(41
|
)%
|
|
(4.5
|
)
|
|
(250
|
)%
|
|||||
Total other expense, net
|
$
|
(39.5
|
)
|
|
$
|
(36.3
|
)
|
|
$
|
(62.3
|
)
|
|
$
|
(3.2
|
)
|
|
9
|
%
|
|
$
|
26.0
|
|
|
(42
|
)%
|
Percentage of net revenues
|
(0.8
|
)%
|
|
(0.7
|
)%
|
|
(1.2
|
)%
|
|
|
|
|
|
|
|
|
|
Years Ended December 31,
|
||||||||||||||||||||||||
|
2018
|
|
2017
|
|
2016
|
|
2018 vs. 2017
|
|
2017 vs. 2016
|
||||||||||||||||
|
|
|
|
|
|
|
$ Change
|
|
% Change
|
|
$ Change
|
|
% Change
|
||||||||||||
Income
tax (benefit) pr
ovision
|
$
|
(34.2
|
)
|
|
$
|
505.6
|
|
|
$
|
234.7
|
|
|
$
|
(539.8
|
)
|
|
(107
|
)%
|
|
$
|
270.9
|
|
|
115
|
%
|
Effective tax (benefit) rate
|
(6.4
|
)%
|
|
62.3
|
%
|
|
28.4
|
%
|
|
|
|
|
|
|
|
|
|
As of December 31,
|
|
|
|
|
|||||||||
|
2018
|
|
2017
|
|
$ Change
|
|
% Change
|
|||||||
Working capital
|
$
|
2,739.3
|
|
|
$
|
2,446.3
|
|
|
$
|
293.0
|
|
|
12
|
%
|
|
|
|
|
|
|
|
|
|||||||
Cash and cash equivalents
|
$
|
2,489.0
|
|
|
$
|
2,006.5
|
|
|
$
|
482.5
|
|
|
24
|
%
|
Short-term investments
|
1,070.1
|
|
|
1,026.1
|
|
|
44.0
|
|
|
4
|
%
|
|||
Long-term investments
|
199.0
|
|
|
988.4
|
|
|
(789.4
|
)
|
|
(80
|
)%
|
|||
Total cash, cash equivalents, and investments
|
3,758.1
|
|
|
4,021.0
|
|
|
(262.9
|
)
|
|
(7
|
)%
|
|||
Short-term portion of long-term debt
|
349.9
|
|
|
—
|
|
|
349.9
|
|
|
N/M
|
|
|||
Long-term debt
|
1,789.1
|
|
|
2,136.3
|
|
|
(347.2
|
)
|
|
(16
|
)%
|
|||
Cash, cash equivalents, and investments, net of debt
|
$
|
1,619.1
|
|
|
$
|
1,884.7
|
|
|
$
|
(265.6
|
)
|
|
(14
|
)%
|
|
Years Ended December 31,
|
||||||||||||||||||||||||
|
2018
|
|
2017
|
|
2016
|
|
2018 vs. 2017
|
|
2017 vs. 2016
|
||||||||||||||||
|
|
|
|
|
|
|
$ Change
|
|
% Change
|
|
$ Change
|
|
% Change
|
||||||||||||
Net cash provided by operating activities
(*)
|
$
|
861.1
|
|
|
$
|
1,259.3
|
|
|
$
|
1,126.6
|
|
|
$
|
(398.2
|
)
|
|
(32
|
)%
|
|
$
|
132.7
|
|
|
12
|
%
|
Net cash provided by (used in) investing activities
(*)
|
$
|
564.8
|
|
|
$
|
(303.0
|
)
|
|
$
|
(417.0
|
)
|
|
$
|
867.8
|
|
|
(286
|
)%
|
|
$
|
114.0
|
|
|
(27
|
)%
|
Net cash used in financing activities
|
$
|
(968.6
|
)
|
|
$
|
(794.8
|
)
|
|
$
|
(236.3
|
)
|
|
$
|
(173.8
|
)
|
|
22
|
%
|
|
$
|
(558.5
|
)
|
|
236
|
%
|
(*)
|
On January 1, 2018, we adopted the new accounting pronouncement
Statement of Cash Flows: Restricted Cash
. We applied this provision on a retrospective basis to conform to the current-period presentation. The adoption did not have a material impact on the cash flow activity presented in our Consolidated Statement of Cash Flows for the fiscal years ended 2017 and 2016.
|
|
Dividends
|
|
Stock Repurchase Program
|
|
Total
|
|||||||||||||||||
Year
|
Per Share
|
|
Amount
|
|
Shares
|
|
Average price
per share
|
|
Amount
|
|
Amount
|
|||||||||||
2018
|
$
|
0.72
|
|
|
$
|
249.3
|
|
|
29.3
|
|
|
$
|
25.62
|
|
|
$
|
750.0
|
|
|
$
|
999.3
|
|
2017
|
$
|
0.40
|
|
|
$
|
150.4
|
|
|
26.1
|
|
|
$
|
27.61
|
|
|
$
|
719.7
|
|
|
$
|
870.1
|
|
2016
|
$
|
0.40
|
|
|
$
|
152.5
|
|
|
13.5
|
|
|
$
|
23.25
|
|
|
$
|
312.9
|
|
|
$
|
465.4
|
|
|
Payments Due by Period
|
||||||||||||||||||
|
Total
|
|
Less than
1 year
|
|
1-3 years
|
|
3-5 years
|
|
More than
5 years
|
||||||||||
Operating leases
(1)
|
$
|
146.3
|
|
|
$
|
33.7
|
|
|
$
|
55.0
|
|
|
$
|
31.3
|
|
|
$
|
26.3
|
|
Other lease arrangement
(2)
|
101.0
|
|
|
13.1
|
|
|
26.9
|
|
|
28.1
|
|
|
32.9
|
|
|||||
Purchase commitments with contract manufacturers and suppliers
(1)
|
663.3
|
|
|
605.9
|
|
|
57.4
|
|
|
—
|
|
|
—
|
|
|||||
Long-term debt
(3)
|
2,150.0
|
|
|
350.0
|
|
|
600.0
|
|
|
—
|
|
|
1,200.0
|
|
|||||
Interest payment on long-term debt
(3)
|
798.9
|
|
|
88.5
|
|
|
144.4
|
|
|
118.7
|
|
|
447.3
|
|
|||||
Tax liability related to the Tax Act
(4)
|
245.2
|
|
|
—
|
|
|
—
|
|
|
53.8
|
|
|
191.4
|
|
|||||
Other contractual obligations
(1)
|
97.8
|
|
|
43.1
|
|
|
37.8
|
|
|
14.0
|
|
|
2.9
|
|
|||||
Total
|
$
|
4,202.5
|
|
|
$
|
1,134.3
|
|
|
$
|
921.5
|
|
|
$
|
245.9
|
|
|
$
|
1,900.8
|
|
(1)
|
See Note 16,
Commitments and Contingencies,
in Notes to Consolidated Financial Statements in Item 8 of Part II of this Report for additional information regarding our contractual commitments.
|
(2)
|
Lease arrangement is related to a data center lease agreement that we entered in to in July 2015. See Note 16,
Commitments and Contingencies
, in Notes to Consolidated Financial Statements in Item 8 of Part II of this Report for further explanation on the lease agreement.
|
(3)
|
See Note 10,
Debt and Financing,
in Notes to Consolidated Financial Statements in Item 8 of Part II of this Report for additional information regarding our debt.
|
(4)
|
See Note 16,
Commitments and Contingencies,
in Notes to Consolidated Financial Statements in Item 8 of Part II of this Report for additional information regarding our tax liability related to the Tax Act.
|
|
- 150 BPS
|
|
- 100 BPS
|
|
- 50 BPS
|
|
Fair Value
as of
December 31,
2017
|
|
+ 50 BPS
|
|
+ 100 BPS
|
|
+ 150 BPS
|
||||||||||||||
Available-for-sale fixed income securities
|
$
|
2,387.8
|
|
|
$
|
2,380.4
|
|
|
$
|
2,372.9
|
|
|
$
|
2,365.5
|
|
|
$
|
2,358.0
|
|
|
$
|
2,350.6
|
|
|
$
|
2,343.2
|
|
(*)
|
Prior to January 1, 2018, certain investments in privately-held companies were accounted for at cost less impairment. Realized gains or losses from sales or impairments were recognized in the Consolidated Statements of Operations.
|
|
Page
|
|
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
|
Years Ended December 31,
|
||||||||||
|
2018
|
|
2017
|
|
2016
|
||||||
Net revenues:
|
|
|
|
|
|
||||||
Product
|
$
|
3,107.1
|
|
|
$
|
3,446.2
|
|
|
$
|
3,528.9
|
|
Service
|
1,540.4
|
|
|
1,581.0
|
|
|
1,461.2
|
|
|||
Total net revenues
|
4,647.5
|
|
|
5,027.2
|
|
|
4,990.1
|
|
|||
Cost of revenues:
|
|
|
|
|
|
||||||
Product
|
1,277.2
|
|
|
1,360.9
|
|
|
1,326.2
|
|
|||
Service
|
629.1
|
|
|
594.2
|
|
|
559.4
|
|
|||
Total cost of revenues
|
1,906.3
|
|
|
1,955.1
|
|
|
1,885.6
|
|
|||
Gross margin
|
2,741.2
|
|
|
3,072.1
|
|
|
3,104.5
|
|
|||
Operating expenses:
|
|
|
|
|
|
||||||
Research and development
|
1,003.2
|
|
|
980.7
|
|
|
1,013.7
|
|
|||
Sales and marketing
|
927.4
|
|
|
950.2
|
|
|
972.9
|
|
|||
General and administrative
|
231.1
|
|
|
227.5
|
|
|
224.9
|
|
|||
Restructuring charges
|
7.3
|
|
|
65.6
|
|
|
3.3
|
|
|||
Total operating expenses
|
2,169.0
|
|
|
2,224.0
|
|
|
2,214.8
|
|
|||
Operating income
|
572.2
|
|
|
848.1
|
|
|
889.7
|
|
|||
Other expense, net
|
(39.5
|
)
|
|
(36.3
|
)
|
|
(62.3
|
)
|
|||
Income before income taxes
|
532.7
|
|
|
811.8
|
|
|
827.4
|
|
|||
Income tax (benefit) provision
|
(34.2
|
)
|
|
505.6
|
|
|
234.7
|
|
|||
Net income
|
$
|
566.9
|
|
|
$
|
306.2
|
|
|
$
|
592.7
|
|
|
|
|
|
|
|
||||||
Net income per share:
|
|
|
|
|
|
||||||
Basic
|
$
|
1.62
|
|
|
$
|
0.81
|
|
|
$
|
1.55
|
|
Diluted
|
$
|
1.60
|
|
|
$
|
0.80
|
|
|
$
|
1.53
|
|
Shares used in computing net income per share:
|
|
|
|
|
|
||||||
Basic
|
349.0
|
|
|
377.7
|
|
|
381.7
|
|
|||
Diluted
|
354.4
|
|
|
384.2
|
|
|
387.8
|
|
|
Years Ended December 31,
|
||||||||||
|
2018
|
|
2017
|
|
2016
|
||||||
Net income
|
$
|
566.9
|
|
|
$
|
306.2
|
|
|
$
|
592.7
|
|
Other comprehensive (loss) income, net of tax:
|
|
|
|
|
|
||||||
Available-for-sale debt securities:
|
|
|
|
|
|
||||||
Change in net unrealized gains and losses, net of tax benefit (provision) of $1.0, ($4.0), and $0.7 for 2018, 2017, and 2016, respectively
|
0.6
|
|
|
4.5
|
|
|
0.8
|
|
|||
Net realized (gains) losses reclassified into net income, net of tax provisions of zero, $0.9, and $0.5 for 2018, 2017, and 2016, respectively
|
0.9
|
|
|
(2.1
|
)
|
|
(1.2
|
)
|
|||
Net change on available-for-sale debt securities, net of tax
|
1.5
|
|
|
2.4
|
|
|
(0.4
|
)
|
|||
Cash flow hedges:
|
|
|
|
|
|
||||||
Change in net unrealized gains and losses, net of tax benefit (provision) of $2.3, ($4.4), and ($0.8) for 2018, 2017, and 2016, respectively
|
(6.4
|
)
|
|
15.7
|
|
|
(2.1
|
)
|
|||
Net realized (gains) losses reclassified into net income, net of tax provisions of $0.3, $2.4, and $0.7 for 2018, 2017, and 2016, respectively
|
(1.2
|
)
|
|
(5.2
|
)
|
|
(1.1
|
)
|
|||
Net change on cash flow hedges, net of tax
|
(7.6
|
)
|
|
10.5
|
|
|
(3.2
|
)
|
|||
Change in foreign currency translation adjustments
|
(12.4
|
)
|
|
19.0
|
|
|
(14.5
|
)
|
|||
Other comprehensive (loss) income, net of tax
|
(18.5
|
)
|
|
31.9
|
|
|
(18.1
|
)
|
|||
Comprehensive income
|
$
|
548.4
|
|
|
$
|
338.1
|
|
|
$
|
574.6
|
|
|
December 31,
2018 |
|
December 31,
2017 |
||||
|
|
|
|
||||
ASSETS
|
|
|
|
||||
Current assets:
|
|
|
|
||||
Cash and cash equivalents
|
$
|
2,489.0
|
|
|
$
|
2,006.5
|
|
Short-term investments
|
1,070.1
|
|
|
1,026.1
|
|
||
Accounts receivable, net of allowance for doubtful accounts of $4.9 and $5.7 as of December 31, 2018 and 2017, respectively
|
754.6
|
|
|
852.0
|
|
||
Prepaid expenses and other current assets
|
268.1
|
|
|
299.9
|
|
||
Total current assets
|
4,581.8
|
|
|
4,184.5
|
|
||
Property and equipment, net
|
951.7
|
|
|
1,021.1
|
|
||
Long-term investments
|
199.0
|
|
|
988.4
|
|
||
Purchased intangible assets, net
|
118.5
|
|
|
128.1
|
|
||
Goodwill
|
3,108.8
|
|
|
3,096.2
|
|
||
Other long-term assets
|
403.5
|
|
|
415.5
|
|
||
Total assets
|
$
|
9,363.3
|
|
|
$
|
9,833.8
|
|
LIABILITIES AND STOCKHOLDERS' EQUITY
|
|
|
|
||||
Current liabilities:
|
|
|
|
||||
Accounts payable
|
$
|
208.8
|
|
|
$
|
217.6
|
|
Accrued compensation
|
221.0
|
|
|
186.0
|
|
||
Deferred revenue
|
829.3
|
|
|
1,030.3
|
|
||
Short-term portion of long-term debt
|
349.9
|
|
|
—
|
|
||
Other accrued liabilities
|
233.5
|
|
|
304.3
|
|
||
Total current liabilities
|
1,842.5
|
|
|
1,738.2
|
|
||
Long-term debt
|
1,789.1
|
|
|
2,136.3
|
|
||
Long-term deferred revenue
|
384.3
|
|
|
509.0
|
|
||
Long-term income taxes payable
|
404.4
|
|
|
650.6
|
|
||
Other long-term liabilities
|
119.8
|
|
|
118.8
|
|
||
Total liabilities
|
4,540.1
|
|
|
5,152.9
|
|
||
Commitments and contingencies (Note 16)
|
|
|
|
|
|
||
Stockholders' equity:
|
|
|
|
||||
Convertible preferred stock, $0.00001 par value; 10.0 shares authorized; none issued and outstanding
|
—
|
|
|
—
|
|
||
Common stock, $0.00001 par value; 1,000.0 shares authorized; 346.4 shares and 365.5 shares issued and outstanding as of December 31, 2018 and 2017, respectively
|
—
|
|
|
—
|
|
||
Additional paid-in capital
|
7,672.8
|
|
|
8,042.1
|
|
||
Accumulated other comprehensive loss
|
(18.2
|
)
|
|
(5.4
|
)
|
||
Accumulated deficit
|
(2,831.4
|
)
|
|
(3,355.8
|
)
|
||
Total stockholders' equity
|
4,823.2
|
|
|
4,680.9
|
|
||
Total liabilities and stockholders' equity
|
$
|
9,363.3
|
|
|
$
|
9,833.8
|
|
|
Years Ended December 31,
|
||||||||||
|
2018
|
|
2017
|
|
2016
|
||||||
Cash flows from operating activities:
|
|
|
|
|
|
||||||
Net income
|
$
|
566.9
|
|
|
$
|
306.2
|
|
|
$
|
592.7
|
|
Adjustments to reconcile net income to net cash provided by operating activities:
|
|
|
|
|
|
||||||
Share-based compensation expense
|
217.1
|
|
|
187.5
|
|
|
224.6
|
|
|||
Depreciation, amortization, and accretion
|
210.5
|
|
|
225.6
|
|
|
206.7
|
|
|||
Deferred income taxes
|
42.6
|
|
|
(139.6
|
)
|
|
55.9
|
|
|||
Other
|
9.6
|
|
|
(14.5
|
)
|
|
3.5
|
|
|||
Changes in operating assets and liabilities, net of acquisitions:
|
|
|
|
|
|
||||||
Accounts receivable, net
|
96.3
|
|
|
203.8
|
|
|
(263.5
|
)
|
|||
Prepaid expenses and other assets
|
(70.9
|
)
|
|
43.0
|
|
|
(43.6
|
)
|
|||
Accounts payable
|
3.5
|
|
|
(10.1
|
)
|
|
66.6
|
|
|||
Accrued compensation
|
41.4
|
|
|
(42.8
|
)
|
|
(19.5
|
)
|
|||
Income taxes payable
|
(269.2
|
)
|
|
447.3
|
|
|
3.1
|
|
|||
Other accrued liabilities
|
(11.4
|
)
|
|
(2.1
|
)
|
|
(1.6
|
)
|
|||
Deferred revenue
|
24.7
|
|
|
55.0
|
|
|
301.7
|
|
|||
Net cash provided by operating activities
|
861.1
|
|
|
1,259.3
|
|
|
1,126.6
|
|
|||
Cash flows from investing activities:
|
|
|
|
|
|
||||||
Purchases of property and equipment
|
(147.4
|
)
|
|
(151.2
|
)
|
|
(214.7
|
)
|
|||
Purchases of available-for-sale debt securities
|
(1,228.5
|
)
|
|
(1,882.9
|
)
|
|
(1,598.0
|
)
|
|||
Proceeds from sales of available-for-sale debt securities
|
1,070.2
|
|
|
944.0
|
|
|
1,182.1
|
|
|||
Proceeds from maturities and redemptions of available-for-sale debt securities
|
910.2
|
|
|
741.6
|
|
|
342.3
|
|
|||
Purchases of equity securities
|
(17.5
|
)
|
|
(14.9
|
)
|
|
(25.2
|
)
|
|||
Proceeds from sales of equity securities
|
36.9
|
|
|
12.4
|
|
|
9.5
|
|
|||
Proceeds from Pulse note receivable
|
—
|
|
|
75.0
|
|
|
—
|
|
|||
Subsequent payments related to acquisitions in prior years
|
(42.7
|
)
|
|
—
|
|
|
—
|
|
|||
Payments for business acquisitions, net of cash and cash equivalents acquired
|
(16.4
|
)
|
|
(27.0
|
)
|
|
(113.0
|
)
|
|||
Net cash provided by (used in) investing activities
|
564.8
|
|
|
(303.0
|
)
|
|
(417.0
|
)
|
|||
Cash flows from financing activities:
|
|
|
|
|
|
||||||
Repurchase and retirement of common stock
|
(756.6
|
)
|
|
(725.8
|
)
|
|
(324.6
|
)
|
|||
Proceeds from issuance of common stock
|
56.9
|
|
|
64.5
|
|
|
62.3
|
|
|||
Payment of dividends
|
(249.3
|
)
|
|
(150.4
|
)
|
|
(152.5
|
)
|
|||
Change in customer financing arrangement
|
(16.9
|
)
|
|
16.9
|
|
|
—
|
|
|||
Payment of debt
|
—
|
|
|
—
|
|
|
(300.0
|
)
|
|||
Issuance of debt, net
|
—
|
|
|
—
|
|
|
494.0
|
|
|||
Other
|
(2.7
|
)
|
|
—
|
|
|
(15.5
|
)
|
|||
Net cash used in financing activities
|
(968.6
|
)
|
|
(794.8
|
)
|
|
(236.3
|
)
|
|||
Effect of foreign currency exchange rates on cash, cash equivalents, and restricted cash
|
(10.6
|
)
|
|
17.0
|
|
|
(14.0
|
)
|
|||
Net increase in cash, cash equivalents, and restricted cash
|
446.7
|
|
|
178.5
|
|
|
459.3
|
|
|||
Cash, cash equivalents, and restricted cash at beginning of period
|
2,059.1
|
|
|
1,880.6
|
|
|
1,421.3
|
|
|||
Cash, cash equivalents, and restricted cash at end of period
|
$
|
2,505.8
|
|
|
$
|
2,059.1
|
|
|
$
|
1,880.6
|
|
|
|
|
|
|
|
||||||
Supplemental disclosures of cash flow information:
|
|
|
|
|
|
||||||
Cash paid for interest, net of amounts capitalized
|
$
|
94.0
|
|
|
$
|
93.9
|
|
|
$
|
92.8
|
|
Cash paid for income taxes, net
|
$
|
181.0
|
|
|
$
|
193.5
|
|
|
$
|
173.9
|
|
|
|
|
|
|
|
||||||
Non-cash investing and financing activities:
|
|
|
|
|
|
||||||
Construction costs for building with financing obligation
|
$
|
—
|
|
|
$
|
—
|
|
|
$
|
15.3
|
|
|
Shares
|
|
Common Stock
and
Additional
Paid-In Capital
|
|
Accumulated
Other
Comprehensive
Loss
|
|
Accumulated
Deficit
|
|
Total
Stockholders'
Equity
|
|||||||||
Balance at December 31, 2015
|
384.0
|
|
|
$
|
8,334.8
|
|
|
$
|
(19.2
|
)
|
|
$
|
(3,741.2
|
)
|
|
$
|
4,574.4
|
|
Net income
|
—
|
|
|
—
|
|
|
—
|
|
|
592.7
|
|
|
592.7
|
|
||||
Other comprehensive loss, net
|
—
|
|
|
—
|
|
|
(18.1
|
)
|
|
—
|
|
|
(18.1
|
)
|
||||
Issuance of common stock
|
11.1
|
|
|
62.3
|
|
|
—
|
|
|
—
|
|
|
62.3
|
|
||||
Repurchase and retirement of common stock
|
(14.0
|
)
|
|
(191.3
|
)
|
|
—
|
|
|
(133.3
|
)
|
|
(324.6
|
)
|
||||
Share-based compensation expense
|
—
|
|
|
222.4
|
|
|
—
|
|
|
—
|
|
|
222.4
|
|
||||
Tax effects from employee stock option plans
|
—
|
|
|
5.9
|
|
|
—
|
|
|
—
|
|
|
5.9
|
|
||||
Payment of cash dividends ($0.40 per share of common stock)
|
—
|
|
|
(152.5
|
)
|
|
—
|
|
|
—
|
|
|
(152.5
|
)
|
||||
Balance at December 31, 2016
|
381.1
|
|
|
8,281.6
|
|
|
(37.3
|
)
|
|
(3,281.8
|
)
|
|
4,962.5
|
|
||||
Net income
|
—
|
|
|
—
|
|
|
—
|
|
|
306.2
|
|
|
306.2
|
|
||||
Other comprehensive income, net
|
—
|
|
|
—
|
|
|
31.9
|
|
|
—
|
|
|
31.9
|
|
||||
Issuance of common stock
|
10.7
|
|
|
64.5
|
|
|
—
|
|
|
—
|
|
|
64.5
|
|
||||
Repurchase and retirement of common stock
|
(26.3
|
)
|
|
(354.6
|
)
|
|
—
|
|
|
(371.2
|
)
|
|
(725.8
|
)
|
||||
Share-based compensation expense
|
—
|
|
|
188.2
|
|
|
—
|
|
|
—
|
|
|
188.2
|
|
||||
Payment of cash dividends ($0.40 per share of common stock)
|
—
|
|
|
(150.4
|
)
|
|
—
|
|
|
—
|
|
|
(150.4
|
)
|
||||
Cumulative adjustment for share-based compensation expense upon adoption of Accounting Standards Update ("ASU") 2016-09, net of tax
|
—
|
|
|
12.8
|
|
|
—
|
|
|
(9.0
|
)
|
|
3.8
|
|
||||
Balance at December 31, 2017
|
365.5
|
|
|
8,042.1
|
|
|
(5.4
|
)
|
|
(3,355.8
|
)
|
|
4,680.9
|
|
||||
Net income
|
—
|
|
|
—
|
|
|
—
|
|
|
566.9
|
|
|
566.9
|
|
||||
Other comprehensive loss, net
|
—
|
|
|
—
|
|
|
(18.5
|
)
|
|
—
|
|
|
(18.5
|
)
|
||||
Issuance of common stock
|
10.4
|
|
|
56.9
|
|
|
—
|
|
|
—
|
|
|
56.9
|
|
||||
Repurchase and retirement of common stock
|
(29.5
|
)
|
|
(395.1
|
)
|
|
—
|
|
|
(361.5
|
)
|
|
(756.6
|
)
|
||||
Share-based compensation expense
|
—
|
|
|
218.2
|
|
|
—
|
|
|
—
|
|
|
218.2
|
|
||||
Payments of cash dividends ($0.72 per share of common stock)
|
—
|
|
|
(249.3
|
)
|
|
—
|
|
|
—
|
|
|
(249.3
|
)
|
||||
Cumulative adjustment upon adoption of ASU 2014-09 ("Topic 606"), net
|
—
|
|
|
—
|
|
|
—
|
|
|
324.7
|
|
|
324.7
|
|
||||
Reclassification of tax effects upon adoption of ASU 2018-02
|
—
|
|
|
—
|
|
|
5.7
|
|
|
(5.7
|
)
|
|
—
|
|
||||
Balance at December 31, 2018
|
346.4
|
|
|
$
|
7,672.8
|
|
|
$
|
(18.2
|
)
|
|
$
|
(2,831.4
|
)
|
|
$
|
4,823.2
|
|
|
Estimated Useful Life (years)
|
Computers, equipment, and software
|
1.5 to 7
|
Furniture and fixtures
|
5 to 7
|
Building and building improvements
|
7 to 40
|
Land improvements
|
10 to 40
|
Leasehold improvements
|
Lease term, not to exceed 10 years
|
|
December 31,
2017
|
|
|
|
January 1,
2018
|
||||||
|
As reported
|
|
Adjustments
|
|
As adjusted
|
||||||
Assets:
|
|
|
|
|
|
||||||
Accounts receivable, net of allowances
|
$
|
852.0
|
|
|
$
|
(1.9
|
)
|
|
$
|
850.1
|
|
Prepaid expenses and other current assets
|
299.9
|
|
|
31.5
|
|
|
331.4
|
|
|||
Other long-term assets
|
415.5
|
|
|
(21.1
|
)
|
|
394.4
|
|
|||
Total assets
|
$
|
9,833.8
|
|
|
$
|
8.5
|
|
|
$
|
9,842.3
|
|
|
|
|
|
|
|
||||||
Liabilities:
|
|
|
|
|
|
||||||
Deferred revenue
|
$
|
1,030.3
|
|
|
$
|
(225.4
|
)
|
|
$
|
804.9
|
|
Other accrued liabilities
|
304.3
|
|
|
33.8
|
|
|
338.1
|
|
|||
Long-term deferred revenue
|
509.0
|
|
|
(124.6
|
)
|
|
384.4
|
|
|||
Total liabilities
|
$
|
5,152.9
|
|
|
$
|
(316.2
|
)
|
|
$
|
4,836.7
|
|
|
|
|
|
|
|
||||||
Stockholders' Equity:
|
|
|
|
|
|
||||||
Accumulated deficit
|
$
|
(3,355.8
|
)
|
|
$
|
324.7
|
|
|
$
|
(3,031.1
|
)
|
•
|
Distributor Sales
: Under Topic 606, the Company recognizes revenue from sales to distributors upon delivery of the product to the distributor, rather than upon delivery of the product to the end-customer. Rebates and incentives offered to distributors, which are earned when sales to end-customers are completed, are estimated at the point of revenue recognition.
|
•
|
Software Revenue
: Under Topic 605, the Company deferred revenue for software licenses where vendor-specific objective evidence of fair value had not been established for undelivered items (primarily services). Under Topic 606, revenue for software licenses is recognized at the time of delivery unless the ongoing services provide frequent, critical updates to the software, without which the software functionality would be rapidly diminished.
|
•
|
Variable Consideration
: Some of the Company's contracts include penalties, extended payment terms, acceptance provisions or other price variability that precluded revenue recognition under Topic 605 because of the requirement for amounts to be fixed or determinable. Topic 606 requires the Company to estimate and account for variable consideration as a reduction of the transaction price.
|
•
|
Revenue Allocation
: Similar to Topic 605, Topic 606 requires an allocation of revenue between deliverables, or performance obligations, within an arrangement. Topic 605 restricted the allocation of revenue that is contingent on future deliverables to current deliverables; however, Topic 606 removes this restriction. In addition, the nature of the performance obligations identified within a contract under Topic 606 as compared to Topic 605 will impact the allocation of the transaction price between product and services.
|
•
|
Contract Acquisition Costs
: Topic 606 requires the deferral and amortization of “incremental” costs incurred to obtain a contract where the associated contract duration is greater than one year. The primary contract acquisition cost for the Company are sales commissions. Prior to January 1, 2018, the Company expensed sales commissions. The change required by Topic 606 resulted in the creation of an asset on January 1, 2018.
|
|
Year Ended
December 31, 2018*
|
|||||||||||
|
As Reported
|
|
Without Adoption of Topic 606
|
|
Topic 606 Impact
|
|||||||
Net revenues:
|
|
|
|
|
|
|||||||
Product
|
$
|
3,107.1
|
|
|
$
|
3,006.8
|
|
|
$
|
100.3
|
|
|
Service
|
1,540.4
|
|
|
1,663.3
|
|
|
(122.9
|
)
|
||||
Total net revenues
|
$
|
4,647.5
|
|
|
$
|
4,670.1
|
|
|
$
|
(22.6
|
)
|
|
|
|
|
|
|
|
|||||||
Operating expenses:
|
|
|
|
|
|
|||||||
Sales and marketing
|
$
|
927.4
|
|
|
$
|
929.3
|
|
|
$
|
(1.9
|
)
|
*
|
Except as disclosed, the adoption of Topic 606 did not have a material impact on the Company’s Consolidated Statements of Operations for the year ended December 31, 2018.
|
|
As of December 31, 2018
|
||||||||||
|
As Reported
|
|
Without Adoption of Topic 606
|
|
Topic 606 Impact
|
||||||
Assets:
|
|
|
|
|
|
||||||
Accounts receivable, net of allowances
|
$
|
754.6
|
|
|
$
|
746.3
|
|
|
$
|
8.3
|
|
Prepaid expenses and other current assets
|
268.1
|
|
|
241.6
|
|
|
26.5
|
|
|||
Other long-term assets
|
403.5
|
|
|
400.4
|
|
|
3.1
|
|
|||
Total assets
|
$
|
9,363.3
|
|
|
$
|
9,325.6
|
|
|
$
|
37.7
|
|
|
|
|
|
|
|
||||||
Liabilities:
|
|
|
|
|
|
||||||
Deferred revenue
|
$
|
829.3
|
|
|
$
|
1,111.9
|
|
|
$
|
(282.6
|
)
|
Other accrued liabilities
|
233.5
|
|
|
178.6
|
|
|
54.9
|
|
|||
Long-term deferred revenue
|
384.3
|
|
|
431.8
|
|
|
(47.5
|
)
|
|||
Total liabilities
|
$
|
4,540.1
|
|
|
$
|
4,815.2
|
|
|
$
|
(275.1
|
)
|
|
|
|
|
|
|
||||||
Stockholders' Equity:
|
|
|
|
|
|
||||||
Accumulated deficit
|
$
|
(2,831.4
|
)
|
|
$
|
(3,144.3
|
)
|
|
$
|
312.9
|
|
•
|
the package of practical expedients which allows for not reassessing (1) whether existing contracts contain leases, (2) the lease classification for existing leases, and (3) whether existing initial direct costs meet the new definition.
|
•
|
the practical expedient in ASC Subtopic 842-10 to not separate non-lease components from lease components and instead account for each separate lease component and non-lease components associated with that lease component as a single lease component by class of the underlying asset.
|
•
|
not to recognize ROU assets and lease liabilities for short-term leases, which have a lease term of twelve months or less and do not include an option to purchase the underlying asset that the Company is reasonably certain to exercise.
|
|
2018
|
|
2017
|
|
2016
|
||||||||||||||
|
HTBase
(1)
|
|
Cyphort
(2)
|
|
AppFormix
|
|
Aurrion
|
|
BTI
(2)
|
||||||||||
Net tangible assets acquired/(liabilities) assumed
|
$
|
(1.0
|
)
|
|
$
|
1.4
|
|
|
$
|
(5.3
|
)
|
|
$
|
6.0
|
|
|
$
|
(19.7
|
)
|
Intangible assets
|
7.8
|
|
|
15.4
|
|
|
20.3
|
|
|
49.0
|
|
|
43.3
|
|
|||||
Goodwill
(3)
|
14.4
|
|
|
16.7
|
|
|
32.9
|
|
|
46.9
|
|
|
20.2
|
|
|||||
Total
|
$
|
21.2
|
|
|
$
|
33.5
|
|
|
$
|
47.9
|
|
|
$
|
101.9
|
|
|
$
|
43.8
|
|
(1)
|
The primary areas of the preliminary purchase price allocation that are subject to change relate to certain legal and income tax matters.
|
(2)
|
See Note 7,
Goodwill and Purchased Intangible Assets
, for adjustments made during the measurement period subsequent to the acquisition dates.
|
(3)
|
The goodwill recognized for these acquisitions was primarily attributable to expected synergies and is not deductible for U.S. federal income tax purposes.
|
|
2018
|
|
2017
|
|
2016
|
||||||||||||||||||||||||
|
HTBase
|
|
Cyphort
|
|
AppFormix
|
|
Aurrion
|
|
BTI
|
||||||||||||||||||||
|
Weighted
Average Estimated Useful Life (In Years) |
|
Amount
|
|
Weighted
Average Estimated Useful Life (In Years) |
|
Amount
|
|
Weighted
Average
Estimated
Useful
Life
(In Years)
|
|
Amount
|
|
Weighted
Average
Estimated
Useful
Life
(In Years)
|
|
Amount
|
|
Weighted
Average
Estimated
Useful
Life
(In Years)
|
|
Amount
|
||||||||||
Finite-lived intangible assets:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||||||
Existing technology
|
4
|
|
$
|
7.8
|
|
|
5
|
|
$
|
15.4
|
|
|
5
|
|
$
|
20.1
|
|
|
—
|
|
$
|
—
|
|
|
8
|
|
$
|
37.1
|
|
Customer relationships
|
—
|
|
—
|
|
|
—
|
|
—
|
|
|
1
|
|
0.2
|
|
|
—
|
|
—
|
|
|
8
|
|
5.3
|
|
|||||
Other
|
—
|
|
—
|
|
|
—
|
|
—
|
|
|
—
|
|
—
|
|
|
—
|
|
—
|
|
|
1
|
|
0.9
|
|
|||||
Total intangible assets with finite lives
|
|
|
7.8
|
|
|
|
|
15.4
|
|
|
|
|
20.3
|
|
|
|
|
—
|
|
|
|
|
43.3
|
|
|||||
Indefinite-lived intangible assets:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||||||
IPR&D
|
|
|
—
|
|
|
|
|
—
|
|
|
|
|
—
|
|
|
|
|
49.0
|
|
|
|
|
—
|
|
|||||
Total intangible assets acquired
|
|
|
$
|
7.8
|
|
|
|
|
$
|
15.4
|
|
|
|
|
$
|
20.3
|
|
|
|
|
$
|
49.0
|
|
|
|
|
$
|
43.3
|
|
|
As of December 31, 2018
|
|
As of December 31, 2017
|
||||||||||||||||||||||||||||
|
Amortized
Cost |
|
Gross Unrealized
Gains |
|
Gross Unrealized
Losses |
|
Estimated Fair
Value |
|
Amortized
Cost |
|
Gross Unrealized
Gains |
|
Gross Unrealized
Losses |
|
Estimated Fair
Value |
||||||||||||||||
Fixed income securities:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||||||||||||
Asset-backed securities
|
$
|
46.8
|
|
|
$
|
—
|
|
|
$
|
(0.3
|
)
|
|
$
|
46.5
|
|
|
$
|
287.1
|
|
|
$
|
—
|
|
|
$
|
(0.6
|
)
|
|
$
|
286.5
|
|
Certificates of deposit
|
152.9
|
|
|
—
|
|
|
—
|
|
|
152.9
|
|
|
83.8
|
|
|
—
|
|
|
—
|
|
|
83.8
|
|
||||||||
Commercial paper
|
393.6
|
|
|
—
|
|
|
—
|
|
|
393.6
|
|
|
217.1
|
|
|
—
|
|
|
—
|
|
|
217.1
|
|
||||||||
Corporate debt securities
|
416.1
|
|
|
—
|
|
|
(3.1
|
)
|
|
413.0
|
|
|
929.6
|
|
|
0.4
|
|
|
(3.0
|
)
|
|
927.0
|
|
||||||||
Foreign government debt securities
|
20.0
|
|
|
—
|
|
|
(0.1
|
)
|
|
19.9
|
|
|
62.9
|
|
|
—
|
|
|
(0.2
|
)
|
|
62.7
|
|
||||||||
Time deposits
|
278.6
|
|
|
—
|
|
|
—
|
|
|
278.6
|
|
|
239.2
|
|
|
—
|
|
|
—
|
|
|
239.2
|
|
||||||||
U.S. government agency securities
|
87.2
|
|
|
—
|
|
|
(0.2
|
)
|
|
87.0
|
|
|
143.9
|
|
|
—
|
|
|
(0.7
|
)
|
|
143.2
|
|
||||||||
U.S. government securities
|
811.8
|
|
|
—
|
|
|
(0.5
|
)
|
|
811.3
|
|
|
406.8
|
|
|
0.1
|
|
|
(0.9
|
)
|
|
406.0
|
|
||||||||
Total fixed income securities
|
2,207.0
|
|
|
—
|
|
|
(4.2
|
)
|
|
2,202.8
|
|
|
2,370.4
|
|
|
0.5
|
|
|
(5.4
|
)
|
|
2,365.5
|
|
||||||||
Privately-held debt and redeemable preferred stock securities
|
16.6
|
|
|
37.4
|
|
|
—
|
|
|
54.0
|
|
|
15.9
|
|
|
37.4
|
|
|
—
|
|
|
53.3
|
|
||||||||
Total available-for-sale debt securities
|
$
|
2,223.6
|
|
|
$
|
37.4
|
|
|
$
|
(4.2
|
)
|
|
$
|
2,256.8
|
|
|
$
|
2,386.3
|
|
|
$
|
37.9
|
|
|
$
|
(5.4
|
)
|
|
$
|
2,418.8
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||||||||||||
Reported as:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||||||||||||
Cash equivalents
|
$
|
936.5
|
|
|
$
|
—
|
|
|
$
|
—
|
|
|
$
|
936.5
|
|
|
$
|
351.0
|
|
|
$
|
—
|
|
|
$
|
—
|
|
|
$
|
351.0
|
|
Short-term investments
|
1,069.2
|
|
|
—
|
|
|
(1.9
|
)
|
|
1,067.3
|
|
|
1,027.2
|
|
|
0.1
|
|
|
(1.2
|
)
|
|
1,026.1
|
|
||||||||
Long-term investments
|
201.3
|
|
|
—
|
|
|
(2.3
|
)
|
|
199.0
|
|
|
992.2
|
|
|
0.4
|
|
|
(4.2
|
)
|
|
988.4
|
|
||||||||
Other long-term assets
|
16.6
|
|
|
37.4
|
|
|
—
|
|
|
54.0
|
|
|
15.9
|
|
|
37.4
|
|
|
—
|
|
|
53.3
|
|
||||||||
Total
|
$
|
2,223.6
|
|
|
$
|
37.4
|
|
|
$
|
(4.2
|
)
|
|
$
|
2,256.8
|
|
|
$
|
2,386.3
|
|
|
$
|
37.9
|
|
|
$
|
(5.4
|
)
|
|
$
|
2,418.8
|
|
|
Amortized
Cost
|
|
Estimated Fair
Value
|
||||
Due in less than one year
|
$
|
2,005.7
|
|
|
$
|
2,003.8
|
|
Due between one and five years
|
201.3
|
|
|
199.0
|
|
||
Total
|
$
|
2,207.0
|
|
|
$
|
2,202.8
|
|
|
As of December 31, 2018
|
||||||||||||||||||||||
|
Less than 12 Months
|
|
12 Months or Greater
|
|
Total
|
||||||||||||||||||
|
Fair
Value
|
|
Unrealized
Loss
|
|
Fair
Value
|
|
Unrealized
Loss
|
|
Fair
Value
|
|
Unrealized
Loss
|
||||||||||||
Fixed income securities:
|
|
|
|
|
|
|
|
|
|
|
|
||||||||||||
Asset-backed securities
|
$
|
3.1
|
|
|
$
|
—
|
|
|
$
|
43
|
|
|
$
|
(0.3
|
)
|
|
$
|
46.1
|
|
|
$
|
(0.3
|
)
|
Corporate debt securities
|
72.6
|
|
|
(0.1
|
)
|
|
330.7
|
|
|
(3.0
|
)
|
|
403.3
|
|
|
(3.1
|
)
|
||||||
Foreign government debt securities
|
1.5
|
|
|
—
|
|
|
18.4
|
|
|
(0.1
|
)
|
|
19.9
|
|
|
(0.1
|
)
|
||||||
U.S. government agency securities
|
2.0
|
|
|
—
|
|
|
45.2
|
|
|
(0.2
|
)
|
|
47.2
|
|
|
(0.2
|
)
|
||||||
U.S. government securities
|
344.0
|
|
|
—
|
|
|
63.5
|
|
|
(0.5
|
)
|
|
407.5
|
|
|
(0.5
|
)
|
||||||
Total fixed income securities
|
$
|
423.2
|
|
|
$
|
(0.1
|
)
|
|
$
|
500.8
|
|
|
$
|
(4.1
|
)
|
|
$
|
924.0
|
|
|
$
|
(4.2
|
)
|
|
As of December 31, 2017
|
||||||||||||||||||||||
|
Less than 12 Months
|
|
12 Months or Greater
|
|
Total
|
||||||||||||||||||
|
Fair
Value
|
|
Unrealized
Loss
|
|
Fair
Value
|
|
Unrealized
Loss
|
|
Fair
Value
|
|
Unrealized
Loss
|
||||||||||||
Fixed income securities:
|
|
|
|
|
|
|
|
|
|
|
|
||||||||||||
Asset-backed securities
|
$
|
215.2
|
|
|
$
|
(0.4
|
)
|
|
$
|
38.4
|
|
|
$
|
(0.2
|
)
|
|
$
|
253.6
|
|
|
$
|
(0.6
|
)
|
Corporate debt securities
|
646.7
|
|
|
(2.1
|
)
|
|
108.6
|
|
|
(0.9
|
)
|
|
755.3
|
|
|
(3.0
|
)
|
||||||
Foreign government debt securities
|
47.3
|
|
|
(0.2
|
)
|
|
6.6
|
|
|
—
|
|
|
53.9
|
|
|
(0.2
|
)
|
||||||
U.S. government agency securities
|
68.3
|
|
|
(0.2
|
)
|
|
67.9
|
|
|
(0.5
|
)
|
|
136.2
|
|
|
(0.7
|
)
|
||||||
U.S. government securities
|
260.8
|
|
|
(0.7
|
)
|
|
51.8
|
|
|
(0.2
|
)
|
|
312.6
|
|
|
(0.9
|
)
|
||||||
Total fixed income securities
|
$
|
1,238.3
|
|
|
$
|
(3.6
|
)
|
|
$
|
273.3
|
|
|
$
|
(1.8
|
)
|
|
$
|
1,511.6
|
|
|
$
|
(5.4
|
)
|
|
As of December 31,
|
||||||
|
2018
|
|
2017
|
||||
Equity investments with readily determinable fair value
|
|
|
|
||||
Money market funds
(1)
|
$
|
996.9
|
|
|
$
|
969.8
|
|
Mutual funds
(2)
|
24.3
|
|
|
27.6
|
|
||
Publicly-traded equity securities
|
2.8
|
|
|
—
|
|
||
Equity investments without readily determinable fair value
(3)
|
36.4
|
|
|
29.7
|
|
||
Total equity securities
|
$
|
1,060.4
|
|
|
$
|
1,027.1
|
|
|
|
|
|
||||
Reported as:
|
|
|
|
||||
Cash equivalents
|
$
|
985.3
|
|
|
$
|
928.0
|
|
Short-term investments
|
2.8
|
|
|
—
|
|
||
Prepaid expenses and other current assets
|
10.9
|
|
|
36.3
|
|
||
Other long-term assets
|
61.4
|
|
|
62.8
|
|
||
Total
|
$
|
1,060.4
|
|
|
$
|
1,027.1
|
|
(1)
|
Prior to January 1, 2018, money market funds were classified as available-for-sale securities and accounted for at fair value with unrealized gains and losses recognized in accumulated other comprehensive income (loss). Realized gains or losses from sales or impairments were recognized in the Consolidated Statements of Operations.
|
(2)
|
Prior to January 1, 2018, mutual funds related to the Company's NQDC plan were classified as trading securities. Unrealized gains or losses were recognized in the Consolidated Statements of Operations.
|
(3)
|
Prior to January 1, 2018, certain investments in privately-held companies were accounted for at cost less impairment. Realized gains or losses from sales or impairments were recognized in the Consolidated Statements of Operations.
|
|
As of December 31,
|
||||||
|
2018
|
|
2017
|
||||
Cash and cash equivalents
|
$
|
2,489.0
|
|
|
$
|
2,006.5
|
|
Restricted cash included in Prepaid expenses and other current assets
|
16.8
|
|
|
49.6
|
|
||
Restricted cash included in Other long-term assets
|
—
|
|
|
3.0
|
|
||
Total cash, cash equivalents, and restricted cash
|
$
|
2,505.8
|
|
|
$
|
2,059.1
|
|
|
Fair Value Measurements at
December 31, 2018 |
|
Fair Value Measurements at
December 31, 2017 |
||||||||||||||||||||||||||||
|
Quoted Prices in
Active Markets For Identical Assets (Level 1) |
|
Significant Other
Observable Remaining Inputs (Level 2) |
|
Significant Other
Unobservable Remaining Inputs (Level 3) |
|
Total
|
|
Quoted Prices in
Active Markets For Identical Assets (Level 1) |
|
Significant Other
Observable Remaining Inputs (Level 2) |
|
Significant Other
Unobservable Remaining Inputs (Level 3) |
|
Total
|
||||||||||||||||
Assets:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||||||||||||
Available-for-sale debt securities:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||||||||||||
Asset-backed securities
|
$
|
—
|
|
|
$
|
46.5
|
|
|
$
|
—
|
|
|
$
|
46.5
|
|
|
$
|
—
|
|
|
$
|
286.5
|
|
|
$
|
—
|
|
|
$
|
286.5
|
|
Certificates of deposit
|
—
|
|
|
152.9
|
|
|
—
|
|
|
152.9
|
|
|
—
|
|
|
83.8
|
|
|
—
|
|
|
83.8
|
|
||||||||
Commercial paper
|
—
|
|
|
393.6
|
|
|
—
|
|
|
393.6
|
|
|
—
|
|
|
217.1
|
|
|
—
|
|
|
217.1
|
|
||||||||
Corporate debt securities
|
—
|
|
|
413.0
|
|
|
—
|
|
|
413.0
|
|
|
—
|
|
|
927.0
|
|
|
—
|
|
|
927.0
|
|
||||||||
Foreign government debt securities
|
—
|
|
|
19.9
|
|
|
—
|
|
|
19.9
|
|
|
—
|
|
|
62.7
|
|
|
—
|
|
|
62.7
|
|
||||||||
Time deposits
|
—
|
|
|
278.6
|
|
|
—
|
|
|
278.6
|
|
|
—
|
|
|
239.2
|
|
|
—
|
|
|
239.2
|
|
||||||||
U.S. government agency securities
|
—
|
|
|
87.0
|
|
|
—
|
|
|
87.0
|
|
|
—
|
|
|
143.2
|
|
|
—
|
|
|
143.2
|
|
||||||||
U.S. government securities
|
352.8
|
|
|
458.5
|
|
|
—
|
|
|
811.3
|
|
|
322.4
|
|
|
83.6
|
|
|
—
|
|
|
406.0
|
|
||||||||
Privately-held debt and redeemable preferred stock securities
|
—
|
|
|
—
|
|
|
54.0
|
|
|
54.0
|
|
|
—
|
|
|
—
|
|
|
53.3
|
|
|
53.3
|
|
||||||||
Total available-for-sale debt securities
|
352.8
|
|
|
1,850.0
|
|
|
54.0
|
|
|
2,256.8
|
|
|
322.4
|
|
|
2,043.1
|
|
|
53.3
|
|
|
2,418.8
|
|
||||||||
Equity securities:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||||||||||||
Money market funds
(1)
|
996.9
|
|
|
—
|
|
|
—
|
|
|
996.9
|
|
|
969.8
|
|
|
—
|
|
|
—
|
|
|
969.8
|
|
||||||||
Mutual funds
(2)
|
24.3
|
|
|
—
|
|
|
—
|
|
|
24.3
|
|
|
27.6
|
|
|
—
|
|
|
—
|
|
|
27.6
|
|
||||||||
Publicly-traded equity securities
|
2.8
|
|
|
—
|
|
|
—
|
|
|
2.8
|
|
|
—
|
|
|
—
|
|
|
—
|
|
|
—
|
|
||||||||
Total equity securities
|
1,024.0
|
|
|
—
|
|
|
—
|
|
|
1,024.0
|
|
|
997.4
|
|
|
—
|
|
|
—
|
|
|
997.4
|
|
||||||||
Derivative assets:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||||||||||||
Foreign exchange contracts
|
—
|
|
|
5.3
|
|
|
—
|
|
|
5.3
|
|
|
—
|
|
|
9.2
|
|
|
—
|
|
|
9.2
|
|
||||||||
Total assets measured at fair value
|
$
|
1,376.8
|
|
|
$
|
1,855.3
|
|
|
$
|
54.0
|
|
|
$
|
3,286.1
|
|
|
$
|
1,319.8
|
|
|
$
|
2,052.3
|
|
|
$
|
53.3
|
|
|
$
|
3,425.4
|
|
Liabilities:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||||||||||||
Derivative liabilities:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||||||||||||
Foreign exchange contracts
|
$
|
—
|
|
|
$
|
(7.1
|
)
|
|
$
|
—
|
|
|
$
|
(7.1
|
)
|
|
$
|
—
|
|
|
$
|
(1.8
|
)
|
|
$
|
—
|
|
|
$
|
(1.8
|
)
|
Total liabilities measured at fair value
|
$
|
—
|
|
|
$
|
(7.1
|
)
|
|
$
|
—
|
|
|
$
|
(7.1
|
)
|
|
$
|
—
|
|
|
$
|
(1.8
|
)
|
|
$
|
—
|
|
|
$
|
(1.8
|
)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||||||||||||
Total assets, reported as:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||||||||||||
Cash equivalents
|
$
|
1,025.2
|
|
|
$
|
896.6
|
|
|
$
|
—
|
|
|
$
|
1,921.8
|
|
|
$
|
928.1
|
|
|
$
|
350.9
|
|
|
$
|
—
|
|
|
$
|
1,279.0
|
|
Short-term investments
|
297.5
|
|
|
772.6
|
|
|
—
|
|
|
1,070.1
|
|
|
247.5
|
|
|
778.6
|
|
|
—
|
|
|
1,026.1
|
|
||||||||
Long-term investments
|
18.2
|
|
|
180.8
|
|
|
—
|
|
|
199.0
|
|
|
74.8
|
|
|
913.6
|
|
|
—
|
|
|
988.4
|
|
||||||||
Prepaid expenses and other current assets
|
10.8
|
|
|
5.3
|
|
|
—
|
|
|
16.1
|
|
|
36.3
|
|
|
9.2
|
|
|
—
|
|
|
45.5
|
|
||||||||
Other long-term assets
|
25.1
|
|
|
—
|
|
|
54.0
|
|
|
79.1
|
|
|
33.1
|
|
|
—
|
|
|
53.3
|
|
|
86.4
|
|
||||||||
Total assets measured at fair value
|
$
|
1,376.8
|
|
|
$
|
1,855.3
|
|
|
$
|
54.0
|
|
|
$
|
3,286.1
|
|
|
$
|
1,319.8
|
|
|
$
|
2,052.3
|
|
|
$
|
53.3
|
|
|
$
|
3,425.4
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||||||||||||
Total liabilities, reported as:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||||||||||||
Other accrued liabilities
|
$
|
—
|
|
|
$
|
(7.1
|
)
|
|
$
|
—
|
|
|
$
|
(7.1
|
)
|
|
$
|
—
|
|
|
$
|
(1.8
|
)
|
|
$
|
—
|
|
|
$
|
(1.8
|
)
|
Total liabilities measured at fair value
|
$
|
—
|
|
|
$
|
(7.1
|
)
|
|
$
|
—
|
|
|
$
|
(7.1
|
)
|
|
$
|
—
|
|
|
$
|
(1.8
|
)
|
|
$
|
—
|
|
|
$
|
(1.8
|
)
|
(1)
|
Balance includes
$11.6 million
and
$16.8 million
in restricted investments measured at fair value, related to the Company's acquisition-related escrows for the years ended
December 31, 2018
and
2017
, respectively. The December 31, 2017 balance also includes
$25.0 million
related to the Company's Directors and Officers indemnification trust, which was subsequently terminated.
|
(2)
|
Balance relates to restricted investments measured at fair value related to the Company's NQDC plan.
|
|
As of December 31,
|
||||||
|
2018
|
|
2017
|
||||
Cash flow hedges
|
$
|
497.7
|
|
|
$
|
521.1
|
|
Non-designated derivatives
|
158.7
|
|
|
108.3
|
|
||
Total
|
$
|
656.4
|
|
|
$
|
629.4
|
|
|
Total
|
||
December 31, 2016
|
$
|
3,081.7
|
|
Additions due to business combination
|
16.7
|
|
|
Other
(*)
|
(2.2
|
)
|
|
December 31, 2017
|
3,096.2
|
|
|
Additions due to business combination
|
14.4
|
|
|
Other
(*)
|
(1.8
|
)
|
|
December 31, 2018
|
$
|
3,108.8
|
|
(*)
|
Other primarily consists of certain purchase accounting adjustments related to the acquisitions of BTI and Cyphort.
|
|
As of December 31, 2018
|
|
As of December 31, 2017
|
||||||||||||||||||||||||||||
|
Gross
|
|
Accumulated
Amortization |
|
Accumulated Impairments and
Other Charges |
|
Net
|
|
Gross
|
|
Accumulated
Amortization |
|
Accumulated Impairments and
Other Charges |
|
Net
|
||||||||||||||||
Finite-lived intangible assets:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||||||||||||
Technologies and patents
|
$
|
648.1
|
|
|
$
|
(534.0
|
)
|
|
$
|
(49.9
|
)
|
|
$
|
64.2
|
|
|
$
|
640.3
|
|
|
$
|
(518.1
|
)
|
|
$
|
(49.9
|
)
|
|
$
|
72.3
|
|
Customer contracts, support agreements, and related relationships
|
83.6
|
|
|
(75.5
|
)
|
|
(2.8
|
)
|
|
5.3
|
|
|
83.6
|
|
|
(74.1
|
)
|
|
(2.8
|
)
|
|
6.7
|
|
||||||||
Other
|
2.0
|
|
|
(2.0
|
)
|
|
—
|
|
|
—
|
|
|
2.0
|
|
|
(1.9
|
)
|
|
—
|
|
|
0.1
|
|
||||||||
Total
|
733.7
|
|
|
(611.5
|
)
|
|
(52.7
|
)
|
|
69.5
|
|
|
725.9
|
|
|
(594.1
|
)
|
|
(52.7
|
)
|
|
79.1
|
|
||||||||
Indefinite-lived intangible assets:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||||||||||||
IPR&D
|
49.0
|
|
|
—
|
|
|
—
|
|
|
49.0
|
|
|
49.0
|
|
|
—
|
|
|
—
|
|
|
49.0
|
|
||||||||
Total purchased intangible assets
|
$
|
782.7
|
|
|
$
|
(611.5
|
)
|
|
$
|
(52.7
|
)
|
|
$
|
118.5
|
|
|
$
|
774.9
|
|
|
$
|
(594.1
|
)
|
|
$
|
(52.7
|
)
|
|
$
|
128.1
|
|
Years Ending December 31,
|
Amount
|
||
2019
|
$
|
25.1
|
|
2020
|
17.2
|
|
|
2021
|
12.9
|
|
|
2022
|
7.7
|
|
|
2023
|
5.3
|
|
|
Thereafter
|
1.3
|
|
|
Total
|
$
|
69.5
|
|
|
As of December 31,
|
||||||
|
2018
|
|
2017
|
||||
Production and service materials
|
$
|
60.6
|
|
|
$
|
71.2
|
|
Finished goods
|
21.4
|
|
|
26.6
|
|
||
Inventory
|
$
|
82.0
|
|
|
$
|
97.8
|
|
|
|
|
|
||||
Reported as:
|
|
|
|
||||
Prepaid expenses and other current assets
|
$
|
80.6
|
|
|
$
|
93.8
|
|
Other long-term assets
|
1.4
|
|
|
4.0
|
|
||
Total
|
$
|
82.0
|
|
|
$
|
97.8
|
|
|
As of December 31,
|
||||||
|
2018
|
|
2017
|
||||
Computers and equipment
|
$
|
1,100.0
|
|
|
$
|
1,151.7
|
|
Software
|
223.3
|
|
|
217.8
|
|
||
Leasehold improvements
|
235.2
|
|
|
258.6
|
|
||
Furniture and fixtures
|
48.6
|
|
|
47.9
|
|
||
Building and building improvements
|
254.3
|
|
|
252.8
|
|
||
Land and land improvements
|
243.2
|
|
|
241.0
|
|
||
Construction-in-process
|
19.5
|
|
|
53.5
|
|
||
Property and equipment, gross
|
2,124.1
|
|
|
2,223.3
|
|
||
Accumulated depreciation
|
(1,172.4
|
)
|
|
(1,202.2
|
)
|
||
Property and equipment, net
|
$
|
951.7
|
|
|
$
|
1,021.1
|
|
|
As of December 31,
|
||||||
|
2018
|
|
2017
|
||||
Pulse Note (including accumulated interest paid in kind)
|
$
|
69.0
|
|
|
$
|
61.2
|
|
Contract manufacturer deposit (non-interest bearing)
|
23.9
|
|
|
—
|
|
||
Total
|
$
|
92.9
|
|
|
$
|
61.2
|
|
|
As of December 31,
|
||||||
|
2018
|
|
2017
|
||||
Beginning balance
|
$
|
27.4
|
|
|
$
|
41.3
|
|
Provisions made during the period, net
|
30.7
|
|
|
36.7
|
|
||
Actual costs incurred during the period
|
(30.1
|
)
|
|
(50.6
|
)
|
||
Ending balance
|
$
|
28.0
|
|
|
$
|
27.4
|
|
|
As of December 31,
|
||||||
|
2018
|
|
2017
|
||||
Deferred product revenue:
|
|
|
|
||||
Undelivered product commitments and other product deferrals
|
$
|
163.3
|
|
|
$
|
312.6
|
|
Distributor inventory and other sell-through items
|
—
|
|
|
68.1
|
|
||
Deferred gross product revenue
|
163.3
|
|
|
380.7
|
|
||
Deferred cost of product revenue
|
(18.9
|
)
|
|
(46.5
|
)
|
||
Deferred product revenue, net
|
144.4
|
|
|
334.2
|
|
||
Deferred service revenue
|
1,069.2
|
|
|
1,205.1
|
|
||
Total
|
$
|
1,213.6
|
|
|
$
|
1,539.3
|
|
Reported as:
|
|
|
|
||||
Current
|
$
|
829.3
|
|
|
$
|
1,030.3
|
|
Long-term
|
384.3
|
|
|
509.0
|
|
||
Total
|
$
|
1,213.6
|
|
|
$
|
1,539.3
|
|
|
Revenue Recognition Expected by Period
|
||||||||||||||
|
Total
|
|
Less than 1 year
|
|
1-3 years
|
|
More than 3 years
|
||||||||
Product
|
$
|
163.3
|
|
|
$
|
131.2
|
|
|
$
|
28.9
|
|
|
$
|
3.2
|
|
Service
|
1,069.2
|
|
|
717.1
|
|
|
292.8
|
|
|
59.3
|
|
||||
Total
|
$
|
1,232.5
|
|
|
$
|
848.3
|
|
|
$
|
321.7
|
|
|
$
|
62.5
|
|
|
Years Ended December 31,
|
||||||||||
|
2018
|
|
2017
|
|
2016
|
||||||
Interest income
|
$
|
72.7
|
|
|
$
|
53.0
|
|
|
$
|
35.4
|
|
Interest expense
|
(103.2
|
)
|
|
(101.2
|
)
|
|
(97.7
|
)
|
|||
(Loss) gain on investments, net
|
(7.4
|
)
|
|
14.6
|
|
|
(1.8
|
)
|
|||
Other
|
(1.6
|
)
|
|
(2.7
|
)
|
|
1.8
|
|
|||
Other expense, net
|
$
|
(39.5
|
)
|
|
$
|
(36.3
|
)
|
|
$
|
(62.3
|
)
|
|
Years Ended December 31,
|
||||||||||
|
2018
|
|
2017
|
|
2016
|
||||||
Severance
|
$
|
8.3
|
|
|
$
|
57.7
|
|
|
$
|
2.8
|
|
Facilities
|
—
|
|
|
—
|
|
|
0.5
|
|
|||
Contract terminations
|
(1.0
|
)
|
|
7.9
|
|
|
—
|
|
|||
Total
|
$
|
7.3
|
|
|
$
|
65.6
|
|
|
$
|
3.3
|
|
|
|
|
|
|
|
||||||
Reported as:
|
|
|
|
|
|
||||||
Restructuring charges
|
$
|
7.3
|
|
|
$
|
65.6
|
|
|
$
|
3.3
|
|
Total
|
$
|
7.3
|
|
|
$
|
65.6
|
|
|
$
|
3.3
|
|
|
December 31,
2017 |
|
Charges/
(Benefits)
|
|
Cash
Payments |
|
Other |
|
December 31,
2018 |
||||||||||
Severance
|
$
|
17.7
|
|
|
$
|
8.3
|
|
|
$
|
(25.0
|
)
|
|
$
|
0.1
|
|
|
$
|
1.1
|
|
Contract terminations and other
|
2.3
|
|
|
(1.0
|
)
|
|
(1.3
|
)
|
|
—
|
|
|
—
|
|
|||||
Total
|
$
|
20.0
|
|
|
$
|
7.3
|
|
|
$
|
(26.3
|
)
|
|
$
|
0.1
|
|
|
$
|
1.1
|
|
|
As of December 31, 2018
|
|||||||||
|
Issuance date
|
|
Maturity Date
|
|
Amount
|
|
Effective Interest
Rates
|
|||
Senior Notes ("Notes"):
|
|
|
|
|
|
|
|
|||
3.125% fixed-rate notes ("2019 Notes")
|
February 2016
|
|
February 2019
|
|
$
|
350.0
|
|
|
3.36
|
%
|
3.300% fixed-rate notes ("2020 Notes")
|
March 2015
|
|
June 2020
|
|
300.0
|
|
|
3.47
|
%
|
|
4.600% fixed-rate notes
|
March 2011
|
|
March 2021
|
|
300.0
|
|
|
4.69
|
%
|
|
4.500% fixed-rate notes
(*)
("2024 Notes")
|
March 2014
|
|
March 2024
|
|
350.0
|
|
|
4.63
|
%
|
|
4.500% fixed-rate notes
(*)
("2024 Notes")
|
February 2016
|
|
March 2024
|
|
150.0
|
|
|
4.87
|
%
|
|
4.350% fixed-rate notes ("2025 Notes")
|
March 2015
|
|
June 2025
|
|
300.0
|
|
|
4.47
|
%
|
|
5.950% fixed-rate notes
|
March 2011
|
|
March 2041
|
|
400.0
|
|
|
6.03
|
%
|
|
Total Notes
|
|
|
|
|
2,150.0
|
|
|
|
||
Unaccreted discount and debt issuance costs
|
|
|
|
|
(11.0
|
)
|
|
|
||
Total
|
|
|
|
|
$
|
2,139.0
|
|
|
|
(*)
|
2024 Notes issued in March 2014 and February 2016 form a single series and are fully fungible.
|
Years Ending December 31,
|
Amount
|
||
2019
|
$
|
350.0
|
|
2020
|
300.0
|
|
|
2021
|
300.0
|
|
|
2022
|
—
|
|
|
2023
|
—
|
|
|
Thereafter
|
1,200.0
|
|
|
Total
|
$
|
2,150.0
|
|
|
Dividends
|
|
Stock Repurchases
|
|
Total
|
|||||||||||||||||||||
Year
|
Per Share
|
|
Amount
|
|
Shares
|
|
Average price
per share |
|
Amount
|
|
Tax Withholding
Amount
|
|
Amount
|
|||||||||||||
2018
(1)
|
$
|
0.72
|
|
|
$
|
249.3
|
|
|
29.3
|
|
|
$
|
25.62
|
|
|
$
|
750.0
|
|
|
$
|
6.6
|
|
|
$
|
1,005.9
|
|
2017
(2)
|
$
|
0.40
|
|
|
$
|
150.4
|
|
|
26.1
|
|
|
$
|
27.61
|
|
|
$
|
719.7
|
|
|
$
|
6.1
|
|
|
$
|
876.2
|
|
2016
(2)
|
$
|
0.40
|
|
|
$
|
152.5
|
|
|
13.5
|
|
|
$
|
23.25
|
|
|
$
|
312.9
|
|
|
$
|
11.7
|
|
|
$
|
477.1
|
|
(1)
|
Shares repurchased under the 2018 Stock Repurchase Program.
$750.0 million
represents the full amount of the ASR for which
23.3 million
shares were received initially during the first quarter of 2018, and an additional
6.0 million
shares were received at final settlement during the third quarter of 2018.
|
(2)
|
Shares repurchased under the 2014 Stock Repurchase Program.
|
|
Unrealized
Gains/Losses
on Available-for-
Sale Debt Securities
(1)
|
|
Unrealized
Gains/Losses
on Cash Flow
Hedges
(2)
|
|
Foreign
Currency
Translation
Adjustments
|
|
Total
|
||||||||
Balance as of December 31, 2015
|
$
|
17.0
|
|
|
$
|
(1.3
|
)
|
|
$
|
(34.9
|
)
|
|
$
|
(19.2
|
)
|
Other comprehensive income (loss) before reclassifications
|
0.8
|
|
|
(2.1
|
)
|
|
(14.5
|
)
|
|
(15.8
|
)
|
||||
Amount reclassified from accumulated other comprehensive loss
|
(1.2
|
)
|
|
(1.1
|
)
|
|
—
|
|
|
(2.3
|
)
|
||||
Other comprehensive loss, net
|
(0.4
|
)
|
|
(3.2
|
)
|
|
(14.5
|
)
|
|
(18.1
|
)
|
||||
Balance as of December 31, 2016
|
$
|
16.6
|
|
|
$
|
(4.5
|
)
|
|
$
|
(49.4
|
)
|
|
$
|
(37.3
|
)
|
Other comprehensive income before reclassifications
|
4.5
|
|
|
15.7
|
|
|
19.0
|
|
|
39.2
|
|
||||
Amount reclassified from accumulated other comprehensive loss
|
(2.1
|
)
|
|
(5.2
|
)
|
|
—
|
|
|
(7.3
|
)
|
||||
Other comprehensive income, net
|
2.4
|
|
|
10.5
|
|
|
19.0
|
|
|
31.9
|
|
||||
Balance as of December 31, 2017
|
$
|
19.0
|
|
|
$
|
6.0
|
|
|
$
|
(30.4
|
)
|
|
$
|
(5.4
|
)
|
Other comprehensive income (loss) before reclassifications
|
0.6
|
|
|
(6.4
|
)
|
|
(12.4
|
)
|
|
(18.2
|
)
|
||||
Amount reclassified from accumulated other comprehensive income (loss)
|
0.9
|
|
|
(1.2
|
)
|
|
—
|
|
|
(0.3
|
)
|
||||
Other comprehensive income (loss), net
|
1.5
|
|
|
(7.6
|
)
|
|
(12.4
|
)
|
|
(18.5
|
)
|
||||
Reclassification of tax effects upon adoption of ASU 2018-02
|
5.0
|
|
|
0.7
|
|
|
—
|
|
|
5.7
|
|
||||
Balance as of December 31, 2018
|
$
|
25.5
|
|
|
$
|
(0.9
|
)
|
|
$
|
(42.8
|
)
|
|
$
|
(18.2
|
)
|
(1)
|
The reclassifications out of accumulated other comprehensive loss during the years ended
December 31, 2018
,
2017
, and
2016
for realized gains on available-for-sale debt securities were not material, and were included in other expense, net, in the Consolidated Statements of Operations.
|
(2)
|
The reclassifications out of accumulated other comprehensive loss during the years ended
December 31, 2018
,
2017
, and
2016
for realized gains and losses on cash flow hedges were not material, and were included within cost of revenues, research and development, sales and marketing, and general and administrative in the Consolidated Statements of Operations.
|
|
Outstanding RSUs, RSAs, and PSAs
(6)
|
|||||||||||
|
Number of Shares
|
|
Weighted Average
Grant-Date Fair
Value per Share
|
|
Weighted Average
Remaining
Contractual Term
(In Years)
|
|
Aggregate
Intrinsic
Value
|
|||||
Balance at December 31, 2017
|
19.5
|
|
|
$
|
25.39
|
|
|
|
|
|
||
RSUs granted
(1)(2)
|
7.4
|
|
|
25.40
|
|
|
|
|
|
|||
RSUs substituted in acquisitions
(2)(5)
|
0.1
|
|
|
26.26
|
|
|
|
|
|
|||
RSAs substituted in acquisitions
(2)(5)
|
0.1
|
|
|
27.66
|
|
|
|
|
|
|||
PSAs granted
(2)(4)
|
0.9
|
|
|
24.62
|
|
|
|
|
|
|||
RSUs vested
(3)
|
(6.5
|
)
|
|
25.67
|
|
|
|
|
|
|||
RSAs vested
(3)
|
(0.2
|
)
|
|
25.12
|
|
|
|
|
|
|||
PSAs vested
(3)
|
(1.1
|
)
|
|
24.14
|
|
|
|
|
|
|||
RSUs canceled
|
(2.0
|
)
|
|
25.92
|
|
|
|
|
|
|||
PSAs canceled
|
(0.8
|
)
|
|
24.45
|
|
|
|
|
|
|||
Balance at December 31, 2018
|
17.4
|
|
|
$
|
25.32
|
|
|
1.0
|
|
$
|
467.6
|
|
|
|
|
|
|
|
|
|
|||||
As of December 31, 2018
|
|
|
|
|
|
|
|
|||||
Vested and expected-to-vest RSUs, RSAs, and PSAs
|
15.5
|
|
|
$
|
25.31
|
|
|
1.0
|
|
$
|
418.4
|
|
(1)
|
Includes service-based and market-based RSUs granted under the 2015 Plan according to their terms.
|
(2)
|
The weighted-average grant-date fair value of RSUs, RSAs, and PSAs granted and assumed or substituted during
2018
,
2017
, and
2016
was
$25.33
,
$27.53
, and
$24.66
, respectively.
|
(3)
|
Total fair value of RSUs, RSAs, and PSAs vested during
2018
,
2017
, and
2016
was
$200.5 million
,
$187.3 million
, and
$185.7 million
, respectively.
|
(4)
|
The number of shares subject to PSAs granted represents the aggregate maximum number of shares that may be issued pursuant to the award over its full term. The aggregate number of shares subject to these PSAs that would be issued if performance goals determined by the Compensation Committee are achieved at target is
0.7 million
shares. Depending on achievement of such performance goals, the range of shares that could be issued under these awards is
0 million
to
1.0 million
shares.
|
(5)
|
RSUs and RSAs substituted in connection with the acquisition of HTBase.
|
(6)
|
Excludes
1.9 million
shares of PSAs that were modified in 2018, which relate primarily to PSAs assumed by the Company in connection with acquisitions consummated in 2016. These awards are contingent upon the achievement of certain performance milestones. The total incremental compensation cost resulting from the modifications totaled
$6.9 million
to be recognized over the remaining terms of the modified awards.
|
|
Number of Shares
|
|
Balance as of December 31, 2017
|
33.5
|
|
Additional shares authorized
|
—
|
|
RSUs and PSAs granted
(1)
|
(17.7
|
)
|
RSUs and PSAs canceled
(2)
|
5.4
|
|
Options canceled/expired
(2)
|
0.7
|
|
Balance as of December 31, 2018
|
21.9
|
|
(1)
|
RSUs and PSAs with a per share or unit purchase price lower than 100% of the fair market value of the Company's common stock on the day of the grant under the 2015 Plan are counted against shares authorized under the plan as two and one-tenth shares of common stock for each share subject to such award. The number of shares subject to PSAs granted represents the maximum number of shares that may be issued pursuant to the award over its full term.
|
(2)
|
Canceled or expired options and canceled RSUs and PSAs under the 2006 Plan are no longer available for future grant under such plan; however, the number of shares available for grant under the 2015 Plan are increased by (i) the amount of such canceled or expired options and (ii) two and one-tenth the shares for each canceled RSUs or PSAs, as applicable, up to a maximum of
29.0 million
additional shares of common stock, pursuant to the terms of the 2015 Plan.
|
|
Years Ended December 31,
|
||||
|
2018
|
|
2017
|
|
2016
|
ESPP:
|
|
|
|
|
|
Volatility
|
29%
|
|
25%
|
|
32%
|
Risk-free interest rate
|
1.9%
|
|
0.9%
|
|
0.4%
|
Expected life (years)
|
1.2
|
|
0.5
|
|
0.5
|
Dividend yield
|
2.7%
|
|
1.5%
|
|
1.8%
|
Weighted-average fair value per share
|
$6.93
|
|
$6.04
|
|
$5.56
|
|
|
|
|
|
|
Market-based RSUs:
|
|
|
|
|
|
Volatility
|
28%
|
|
30%
|
|
36%
|
Risk-free interest rate
|
2.4%
|
|
1.9%
|
|
1.2%
|
Dividend yield
|
2.6%
|
|
1.4%
|
|
1.7%
|
Weighted-average fair value per share
|
$28.39
|
|
$19.30
|
|
$14.71
|
|
Years Ended December 31,
|
||||||||||
|
2018
|
|
2017
|
|
2016
|
||||||
Cost of revenues - Product
|
$
|
6.3
|
|
|
$
|
4.6
|
|
|
$
|
6.4
|
|
Cost of revenues - Service
|
18.0
|
|
|
17.5
|
|
|
15.3
|
|
|||
Research and development
|
120.6
|
|
|
86.6
|
|
|
126.5
|
|
|||
Sales and marketing
|
51.1
|
|
|
55.6
|
|
|
55.2
|
|
|||
General and administrative
|
21.1
|
|
|
23.2
|
|
|
23.4
|
|
|||
Total
|
$
|
217.1
|
|
|
$
|
187.5
|
|
|
$
|
226.8
|
|
|
Years Ended December 31,
|
||||||||||
|
2018
|
|
2017
|
|
2016
|
||||||
Stock options
|
$
|
0.4
|
|
|
$
|
0.5
|
|
|
$
|
4.4
|
|
RSUs, RSAs, and PSAs
|
198.2
|
|
|
171.3
|
|
|
206.9
|
|
|||
ESPP
|
18.5
|
|
|
15.7
|
|
|
15.5
|
|
|||
Total
|
$
|
217.1
|
|
|
$
|
187.5
|
|
|
$
|
226.8
|
|
(*)
|
Certain prior-period amounts have been reclassified to conform to the current-period classifications.
|
|
Years Ended December 31,
|
||||||||||
|
2018
|
|
2017
|
|
2016
|
||||||
Americas:
|
|
|
|
|
|
||||||
United States
|
$
|
2,339.1
|
|
|
$
|
2,712.6
|
|
|
$
|
2,737.0
|
|
Other
|
202.1
|
|
|
234.6
|
|
|
231.8
|
|
|||
Total Americas
|
2,541.2
|
|
|
2,947.2
|
|
|
2,968.8
|
|
|||
Europe, Middle East, and Africa
|
1,290.8
|
|
|
1,195.8
|
|
|
1,238.1
|
|
|||
Asia Pacific
|
815.5
|
|
|
884.2
|
|
|
783.2
|
|
|||
Total
|
$
|
4,647.5
|
|
|
$
|
5,027.2
|
|
|
$
|
4,990.1
|
|
|
As of December 31,
|
||||||
|
2018
|
|
2017
|
||||
United States
|
$
|
941.7
|
|
|
$
|
1,005.1
|
|
International
|
128.5
|
|
|
144.1
|
|
||
Property and equipment, net and purchased intangible assets, net
|
$
|
1,070.2
|
|
|
$
|
1,149.2
|
|
Note 14.
|
Income Taxes
|
|
Years Ended December 31,
|
||||||||||
|
2018
|
|
2017
|
|
2016
|
||||||
Domestic
|
$
|
160.6
|
|
|
$
|
474.2
|
|
|
$
|
466.2
|
|
Foreign
|
372.1
|
|
|
337.6
|
|
|
361.2
|
|
|||
Total pretax income
|
$
|
532.7
|
|
|
$
|
811.8
|
|
|
$
|
827.4
|
|
|
Years Ended December 31,
|
||||||||||
|
2018
|
|
2017
|
|
2016
|
||||||
Current (benefit) provision:
|
|
|
|
|
|
|
|
|
|||
Federal
|
$
|
(126.1
|
)
|
|
$
|
594.3
|
|
|
$
|
121.4
|
|
States
|
9.0
|
|
|
13.9
|
|
|
10.3
|
|
|||
Foreign
|
38.9
|
|
|
45.4
|
|
|
46.0
|
|
|||
Total current (benefit) provision
|
(78.2
|
)
|
|
653.6
|
|
|
177.7
|
|
|||
Deferred (benefit) provision:
|
|
|
|
|
|
||||||
Federal
|
36.6
|
|
|
(128.7
|
)
|
|
57.2
|
|
|||
States
|
2.2
|
|
|
(17.7
|
)
|
|
4.3
|
|
|||
Foreign
|
5.2
|
|
|
(1.6
|
)
|
|
(4.5
|
)
|
|||
Total deferred (benefit) provision
|
44.0
|
|
|
(148.0
|
)
|
|
57.0
|
|
|||
Total (benefit) provision for income taxes
|
$
|
(34.2
|
)
|
|
$
|
505.6
|
|
|
$
|
234.7
|
|
|
Years Ended December 31,
|
||||||||||
|
2018
|
|
2017
|
|
2016
|
||||||
Expected provision at statutory rate
|
$
|
111.9
|
|
|
$
|
284.1
|
|
|
$
|
289.6
|
|
State taxes, net of federal benefit
|
7.4
|
|
|
12.0
|
|
|
8.9
|
|
|||
Foreign income at different tax rates
|
(12.8
|
)
|
|
(46.4
|
)
|
|
(53.4
|
)
|
|||
R&D tax credits
|
(22.1
|
)
|
|
(15.1
|
)
|
|
(16.8
|
)
|
|||
Share-based compensation
|
4.7
|
|
|
—
|
|
|
10.5
|
|
|||
Release of valuation allowance
|
—
|
|
|
(1.7
|
)
|
|
(0.7
|
)
|
|||
Domestic production activities
|
—
|
|
|
(12.4
|
)
|
|
(9.5
|
)
|
|||
Non-deductible compensation
|
1.9
|
|
|
1.6
|
|
|
2.4
|
|
|||
Impact of the U.S. Tax Cuts and Jobs Act
|
2.8
|
|
|
289.5
|
|
|
—
|
|
|||
Tax accounting method changes
|
(65.4
|
)
|
|
—
|
|
|
—
|
|
|||
Lapses in federal statutes of limitations
|
(67.6
|
)
|
|
—
|
|
|
—
|
|
|||
Other
|
5.0
|
|
|
(6.0
|
)
|
|
3.7
|
|
|||
Total (benefit) provision for income taxes
|
$
|
(34.2
|
)
|
|
$
|
505.6
|
|
|
$
|
234.7
|
|
|
As of December 31,
|
||||||
|
2018
|
|
2017
|
||||
Deferred tax assets:
|
|
|
|
|
|
||
Net operating loss carry-forwards
|
$
|
12.9
|
|
|
$
|
18.3
|
|
Research and other credit carry-forwards
|
220.0
|
|
|
198.8
|
|
||
Deferred revenue
|
37.7
|
|
|
103.5
|
|
||
Share-based compensation
|
26.1
|
|
|
31.1
|
|
||
Cost sharing adjustment
|
12.2
|
|
|
12.4
|
|
||
Reserves and accruals not currently deductible
|
62.7
|
|
|
76.7
|
|
||
Other
|
13.2
|
|
|
12.8
|
|
||
Total deferred tax assets
|
384.8
|
|
|
453.6
|
|
||
Valuation allowance
|
(233.7
|
)
|
|
(214.5
|
)
|
||
Deferred tax assets, net of valuation allowance
|
151.1
|
|
|
239.1
|
|
||
Deferred tax liabilities:
|
|
|
|
||||
Property and equipment basis differences
|
(40.6
|
)
|
|
(42.5
|
)
|
||
Purchased intangibles
|
(13.7
|
)
|
|
(12.4
|
)
|
||
Unremitted foreign earnings
|
(26.4
|
)
|
|
(25.4
|
)
|
||
Deferred compensation and other
|
(8.9
|
)
|
|
(10.4
|
)
|
||
Total deferred tax liabilities
|
(89.6
|
)
|
|
(90.7
|
)
|
||
Net deferred tax assets
|
$
|
61.5
|
|
|
$
|
148.4
|
|
|
Years Ended December 31,
|
||||||||||
|
2018
|
|
2017
|
|
2016
|
||||||
Balance at beginning of year
|
$
|
264.5
|
|
|
$
|
223.1
|
|
|
$
|
216.1
|
|
Tax positions related to current year:
|
|
|
|
|
|
||||||
Additions
|
4.3
|
|
|
64.6
|
|
|
27.2
|
|
|||
Tax positions related to prior years:
|
|
|
|
|
|
||||||
Additions
|
12.7
|
|
|
1.8
|
|
|
1.0
|
|
|||
Reductions
|
(33.8
|
)
|
|
(16.6
|
)
|
|
(4.1
|
)
|
|||
Settlements
|
(2.6
|
)
|
|
(4.0
|
)
|
|
(14.3
|
)
|
|||
Lapses in statutes of limitations
|
(67.0
|
)
|
|
(4.4
|
)
|
|
(2.8
|
)
|
|||
Balance at end of year
|
$
|
178.1
|
|
|
$
|
264.5
|
|
|
$
|
223.1
|
|
|
Years Ended December 31,
|
||||||||||
|
2018
|
|
2017
|
|
2016
|
||||||
Numerator:
|
|
|
|
|
|
||||||
Net income
|
$
|
566.9
|
|
|
$
|
306.2
|
|
|
$
|
592.7
|
|
Denominator:
|
|
|
|
|
|
||||||
Weighted-average shares used to compute basic net income per share
|
349.0
|
|
|
377.7
|
|
|
381.7
|
|
|||
Dilutive effect of employee stock awards
|
5.4
|
|
|
6.5
|
|
|
6.1
|
|
|||
Weighted-average shares used to compute diluted net income per share
|
354.4
|
|
|
384.2
|
|
|
387.8
|
|
|||
Net income per share:
|
|
|
|
|
|
||||||
Basic
|
$
|
1.62
|
|
|
$
|
0.81
|
|
|
$
|
1.55
|
|
Diluted
|
$
|
1.60
|
|
|
$
|
0.80
|
|
|
$
|
1.53
|
|
|
|
|
|
|
|
||||||
Anti-dilutive shares
|
3.9
|
|
|
1.1
|
|
|
2.5
|
|
|
|
|
Leases
|
||||||||
Years Ending December 31,
|
Unconditional Purchase Obligations
|
|
Operating Leases
|
|
Other Lease Arrangement
|
||||||
2019
|
$
|
43.1
|
|
|
$
|
33.7
|
|
|
$
|
13.1
|
|
2020
|
26.4
|
|
|
30.7
|
|
|
13.3
|
|
|||
2021
|
11.4
|
|
|
24.3
|
|
|
13.6
|
|
|||
2022
|
8.5
|
|
|
17.0
|
|
|
13.9
|
|
|||
2023
|
5.5
|
|
|
14.3
|
|
|
14.2
|
|
|||
Thereafter
|
2.9
|
|
|
26.3
|
|
|
32.9
|
|
|||
Total
|
$
|
97.8
|
|
|
$
|
146.3
|
|
|
$
|
101.0
|
|
|
Year Ended December 31, 2018
|
|
Year Ended December 31, 2017
|
||||||||||||||||||||||||||||
|
First Quarter
|
|
Second Quarter
|
|
Third Quarter
|
|
Fourth Quarter
|
|
First Quarter
|
|
Second Quarter
|
|
Third Quarter
|
|
Fourth Quarter
|
||||||||||||||||
Net revenues
|
$
|
1,082.6
|
|
|
$
|
1,204.1
|
|
|
$
|
1,179.8
|
|
|
$
|
1,181.0
|
|
|
$
|
1,221.0
|
|
|
$
|
1,308.9
|
|
|
$
|
1,257.8
|
|
|
$
|
1,239.5
|
|
Gross margin
|
618.4
|
|
|
700.9
|
|
|
711.0
|
|
|
710.9
|
|
|
746.6
|
|
|
801.9
|
|
|
772.4
|
|
|
751.2
|
|
||||||||
Income before income taxes
|
41.4
|
|
|
150.9
|
|
|
152.0
|
|
|
188.4
|
|
|
140.6
|
|
|
245.2
|
|
|
225.8
|
|
|
200.2
|
|
||||||||
Net income (loss)
(1)
|
$
|
34.4
|
|
|
$
|
116.5
|
|
|
$
|
223.8
|
|
|
$
|
192.2
|
|
|
$
|
108.8
|
|
|
$
|
179.8
|
|
|
$
|
165.7
|
|
|
$
|
(148.1
|
)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||||||||||||
Net income (loss) per share:
(2)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||||||||||||
Basic
|
$
|
0.10
|
|
|
$
|
0.33
|
|
|
$
|
0.65
|
|
|
$
|
0.56
|
|
|
$
|
0.29
|
|
|
$
|
0.47
|
|
|
$
|
0.44
|
|
|
$
|
(0.40
|
)
|
Diluted
(3)
|
$
|
0.10
|
|
|
$
|
0.33
|
|
|
$
|
0.64
|
|
|
$
|
0.55
|
|
|
$
|
0.28
|
|
|
$
|
0.47
|
|
|
$
|
0.43
|
|
|
$
|
(0.40
|
)
|
(1)
|
Net income for the third and fourth quarters of 2018 include a lower statutory tax rate due to the Tax Act and tax benefits related to items unique to 2018. See Note 14,
Income Taxes
, for further discussion. Net loss for the fourth quarter of 2017 includes an estimated
$289.5 million
of tax expense related to the Tax Act, and restructuring charges of
$36.2 million
.
|
(2)
|
Net income (loss) per share is computed independently. Therefore, the sum of the quarterly net income per share may not equal the total computed for the year or any cumulative interim period.
|
(3)
|
Potentially dilutive common shares for the fourth quarter of 2017 were excluded from the computation of diluted net loss per share because their effect would be anti-dilutive.
|
Allowance for Doubtful Accounts
|
Balance at
Beginning of
Year
|
|
Charged to
(Reversed from)
Costs and
Expenses
|
|
Write-offs,
Net of
Recoveries
|
|
Balance at
End of
Year
|
||||||||
2018
|
$
|
5.7
|
|
|
$
|
(0.8
|
)
|
|
$
|
—
|
|
|
$
|
4.9
|
|
2017
|
$
|
7.6
|
|
|
$
|
(2.0
|
)
|
|
$
|
0.1
|
|
|
$
|
5.7
|
|
2016
|
$
|
9.3
|
|
|
$
|
1.0
|
|
|
$
|
(2.7
|
)
|
|
$
|
7.6
|
|
|
|
|
Additions
|
|
|
|
|
||||||||||||
Sales Return Reserve
|
Balance at
Beginning of
Year
|
|
Charged as a
Reduction in
Revenues
|
|
Charged to
Other Accounts
|
|
Used
|
|
Balance at
End of
Year
|
||||||||||
2018
(*)
|
$
|
44.5
|
|
|
$
|
70.7
|
|
|
$
|
—
|
|
|
$
|
(82.5
|
)
|
|
$
|
32.7
|
|
2017
|
$
|
71.4
|
|
|
$
|
25.0
|
|
|
$
|
65.9
|
|
|
$
|
(107.1
|
)
|
|
$
|
55.2
|
|
2016
|
$
|
71.2
|
|
|
$
|
44.6
|
|
|
$
|
89.6
|
|
|
$
|
(134.0
|
)
|
|
$
|
71.4
|
|
|
|
|
|
Incorporated by Reference
|
||||||
Exhibit No.
|
|
Exhibit
|
|
Filing
|
|
Exhibit No.
|
|
File No.
|
|
File Date
|
3.1
|
|
|
S-8
|
|
4.1
|
|
333-218344
|
|
5/30/2017
|
|
3.2
|
|
|
8-K
|
|
3.2
|
|
001-34501
|
|
5/30/2017
|
|
4.1
|
|
|
8-K
|
|
4.1
|
|
001-34501
|
|
3/4/2011
|
|
4.2
|
|
|
8-K
|
|
4.8
|
|
001-34501
|
|
3/4/2011
|
|
4.3
|
|
|
8-K
|
|
4.1
|
|
001-34501
|
|
3/4/2014
|
|
4.4
|
|
|
8-K
|
|
4.1
|
|
001-34501
|
|
3/10/2015
|
|
4.5
|
|
|
8-K
|
|
4.1
|
|
001-34501
|
|
2/29/2016
|
|
4.6
|
|
|
8-K
|
|
4.2
|
|
001-34501
|
|
2/29/2016
|
|
4.7
|
|
|
8-K
|
|
4.8
|
|
001-34501
|
|
3/4/2011
|
|
4.8
|
|
|
8-K
|
|
4.8
|
|
001-34501
|
|
3/4/2011
|
|
4.9
|
|
|
8-K
|
|
4.1
|
|
001-34501
|
|
3/4/2014
|
|
4.10
|
|
|
8-K
|
|
4.1
|
|
001-34501
|
|
3/10/2015
|
|
4.11
|
|
|
8-K
|
|
4.1
|
|
001-34501
|
|
3/10/2015
|
|
4.12
|
|
|
8-K
|
|
4.1
|
|
001-34501
|
|
2/29/2016
|
|
10.1
|
|
|
10-Q
|
|
10.1
|
|
000-26339
|
|
11/14/2003
|
|
10.2
|
|
|
10-K
|
|
10.2
|
|
001-34501
|
|
2/24/2017
|
|
10.3
|
|
|
10-Q
|
|
10.9
|
|
001-34501
|
|
11/10/2014
|
|
10.4
|
|
|
10-K
|
|
10.20
|
|
000-26339
|
|
2/29/2008
|
|
10.5
|
|
|
10-K
|
|
10.21
|
|
000-26339
|
|
2/29/2008
|
|
10.6
|
|
|
10-Q
|
|
10.3
|
|
000-26339
|
|
5/9/2008
|
|
10.7
|
|
|
10-Q
|
|
10.2
|
|
000-34501
|
|
11/5/2010
|
|
10.8
|
|
|
8-K
|
|
10.1
|
|
001-34501
|
|
5/27/2016
|
|
10.9
|
|
|
S-8
|
|
4.3
|
|
333-211821
|
|
6/3/2016
|
|
10.10
|
|
|
S-8
|
|
4.3
|
|
333-213490
|
|
9/2/2016
|
|
10.11
|
|
|
10-K
|
|
10.16
|
|
001-34501
|
|
2/24/2017
|
|
10.12
|
|
|
S-8
|
|
4.4
|
|
333-151669
|
|
6/16/2008
|
|
10.13
|
|
|
|
S-8
|
|
4.3
|
|
333-221422
|
|
11/8/2017
|
|
|
|
|
Incorporated by Reference
|
||||||
Exhibit No.
|
|
Exhibit
|
|
Filing
|
|
Exhibit No.
|
|
File No.
|
|
File Date
|
10.14
|
|
|
8-K
|
|
10.1
|
|
001-34501
|
|
5/30/2017
|
|
10.15
|
|
|
|
|
|
|
|
|
|
|
10.16
|
|
|
10-K
|
|
10.19
|
|
001-34501
|
|
2/23/2018
|
|
10.17
|
|
|
8-K
|
|
10.2
|
|
001-34501
|
|
5/20/2015
|
|
10.18
|
|
|
8-K
|
|
10.3
|
|
001-34501
|
|
5/20/2015
|
|
10.19
|
|
|
8-K
|
|
10.4
|
|
001-34501
|
|
5/20/2015
|
|
10.20
|
|
|
8-K
|
|
10.1
|
|
001-34501
|
|
9/20/2016
|
|
10.21
|
|
|
8-K
|
|
10.2
|
|
001-34501
|
|
8/31/2017
|
|
10.22
|
|
|
10-Q
|
|
10.6
|
|
001-34501
|
|
11/7/2017
|
|
10.23
|
|
|
8-K
|
|
10.2
|
|
001-34501
|
|
9/20/2016
|
|
10.24
|
|
|
8-K
|
|
10.1
|
|
001-34501
|
|
8/31/2017
|
|
10.25
|
|
|
10-Q
|
|
10.5
|
|
001-34501
|
|
11/7/2017
|
|
10.26
|
|
|
8-K
|
|
10.1
|
|
001-34501
|
|
5/29/2014
|
|
10.27
|
|
|
8-K
|
|
10.1
|
|
001-34501
|
|
6/27/2014
|
|
10.28
|
|
|
10-K
|
|
10.31
|
|
001-34501
|
|
2/23/2018
|
|
10.29
|
|
|
|
|
|
|
|
|
|
|
10.30
|
|
|
8-K
|
|
10.1
|
|
001-34501
|
|
11/24/2014
|
|
10.31
|
|
|
10-Q
|
|
10.2
|
|
001-34501
|
|
11/5/2015
|
|
10.32
|
|
|
10-Q
|
|
10.3
|
|
001-34501
|
|
11/7/2017
|
|
10.33
|
|
|
10-Q
|
|
10.4
|
|
001-34501
|
|
11/7/2017
|
|
10.34
|
|
|
10-Q
|
|
10.3
|
|
001-34501
|
|
5/8/2018
|
|
10.35
|
|
|
10-Q
|
|
10.4
|
|
001-34501
|
|
5/8/2018
|
|
10.36
|
|
|
8-K
|
|
10.1
|
|
001-34501
|
|
5/29/2018
|
|
10.37
|
|
|
10-Q
|
|
10.3
|
|
001-34501
|
|
11/7/2018
|
|
10.38
|
|
|
10-Q
|
|
10.1
|
|
001-34501
|
|
11/7/2018
|
|
10.39
|
|
|
10-K
|
|
10.60
|
|
001-34501
|
|
2/29/2016
|
|
10.40
|
|
|
8-K
|
|
10.1
|
|
001-34501
|
|
8/10/2018
|
|
|
|
|
Incorporated by Reference
|
||||||
Exhibit No.
|
|
Exhibit
|
|
Filing
|
|
Exhibit No.
|
|
File No.
|
|
File Date
|
10.41
|
|
|
10-Q
|
|
10.1
|
|
001-34501
|
|
5/8/2018
|
|
10.42
|
|
|
10-Q
|
|
10.2
|
|
001-34501
|
|
5/8/2018
|
|
21.1
|
|
|
|
|
|
|
|
|
|
|
23.1
|
|
|
|
|
|
|
|
|
|
|
24.1
|
|
Power of Attorney (included on the signature page to the Report)
|
|
|
|
|
|
|
|
|
31.1
|
|
|
|
|
|
|
|
|
|
|
31.2
|
|
|
|
|
|
|
|
|
|
|
32.1
|
|
|
|
|
|
|
|
|
|
|
32.2
|
|
|
|
|
|
|
|
|
|
|
101
|
|
The following materials from Juniper Networks Inc.'s Annual Report on Form 10-K for the year ended December 31, 2018, formatted in XBRL (Extensible Business Reporting Language): (i) the Consolidated Statements of Operations, (ii) Consolidated Statements of Comprehensive Income, (iii) Consolidated Balance Sheets, (iv) the Consolidated Statements of Cash Flows, and (v) Consolidated Statements of Changes in Stockholders' Equity, and (iv) Notes to Consolidated Financial Statements, tagged as blocks of text*
|
|
|
|
|
|
|
|
|
101.INS
|
|
XBRL Instance Document*
|
|
|
|
|
|
|
|
|
101.SCH
|
|
XBRL Taxonomy Extension Schema Document*
|
|
|
|
|
|
|
|
|
101.CAL
|
|
XBRL Taxonomy Extension Calculation Linkbase Document*
|
|
|
|
|
|
|
|
|
101.DEF
|
|
XBRL Taxonomy Extension Definition Linkbase Document*
|
|
|
|
|
|
|
|
|
101.LAB
|
|
XBRL Taxonomy Extension Label Linkbase Document*
|
|
|
|
|
|
|
|
|
101.PRE
|
|
XBRL Taxonomy Extension Presentation Linkbase Document*
|
|
|
|
|
|
|
|
|
*
|
|
Filed herewith
|
|
|
|
**
|
|
Furnished herewith
|
|
|
|
+
|
|
Indicates management contract or compensatory plan, contract or arrangement.
|
|
|
|
†
|
|
Portions of this exhibit (indicated by asterisks) have been omitted pursuant to a request for confidential treatment that has been separately filed with the Securities and Exchange Commission.
|
JUNIPER NETWORKS, JUNIPER, the Juniper Networks logo, JUNOS, CONTRAIL, BTI, BTI SYSTEMS, CYPHORT, and APPFORMIX are registered trademarks of Juniper Networks, Inc. and/or its affiliates in the United States and other countries. Other names may be trademarks of their respective owners.
|
|
|
Juniper Networks, Inc.
|
|
|
|
|
|
February 22, 2019
|
|
By:
|
/s/ Kenneth B. Miller
|
|
|
|
Kenneth B. Miller
|
|
|
|
Executive Vice President, Chief Financial Officer
(Duly Authorized Officer and Principal Financial Officer)
|
|
|
|
|
February 22, 2019
|
|
By:
|
/s/ Terrance F. Spidell
|
|
|
|
Terrance F. Spidell
|
|
|
|
Vice President, Corporate Controller and Chief Accounting Officer
(Duly Authorized Officer and Principal Accounting Officer)
|
Signature
|
|
Title
|
|
Date
|
|
|
|
|
|
/s/ Rami Rahim
|
|
Chief Executive Officer and Director
(Principal Executive Officer)
|
|
February 22, 2019
|
Rami Rahim
|
|
|
|
|
|
|
|
|
|
/s/ Kenneth B. Miller
|
|
Executive Vice President and Chief Financial Officer
(Principal Financial Officer)
|
|
February 22, 2019
|
Kenneth B. Miller
|
|
|
|
|
|
|
|
|
|
/s/ Terrance F. Spidell
|
|
Vice President, Corporate Controller and Chief Accounting Officer
(Principal Accounting Officer)
|
|
February 22, 2019
|
Terrance F. Spidell
|
|
|
|
|
|
|
|
|
|
/s/ Scott Kriens
|
|
Chairman of the Board
|
|
February 22, 2019
|
Scott Kriens
|
|
|
|
|
|
|
|
|
|
/s/ Robert M. Calderoni
|
|
Director
|
|
February 22, 2019
|
Robert M. Calderoni
|
|
|
|
|
Signature
|
|
Title
|
|
Date
|
|
|
|
|
|
/s/ Rahul Merchant
|
|
Director
|
|
February 22, 2019
|
Rahul Merchant
|
|
|
|
|
|
|
|
|
|
/s/ James Dolce
|
|
Director
|
|
February 22, 2019
|
James Dolce
|
|
|
|
|
|
|
|
|
|
/s/ Mercedes Johnson
|
|
Director
|
|
February 22, 2019
|
Mercedes Johnson
|
|
|
|
|
|
|
|
|
|
/s/ Kevin DeNuccio
|
|
Director
|
|
February 22, 2019
|
Kevin DeNuccio
|
|
|
|
|
|
|
|
|
|
/s/ Gary Daichendt
|
|
Director
|
|
February 22, 2019
|
Gary Daichendt
|
|
|
|
|
|
|
|
|
|
/s/ William R. Stensrud
|
|
Director
|
|
February 22, 2019
|
William R. Stensrud
|
|
|
|
|
Name (“
Participant
”):
|
|
Date of Grant:
|
|
Number of Restricted Stock Units:
|
|
PARTICIPANT
|
Signature:
|
|
|
|
COMPANY
|
Signature:
|
|
Title:
|
Date:
|
ARTICLE 1.
|
DEFINITIONS AND INTERPRETATION.
|
1
|
1.1
|
Definitions
|
1
|
1.2
|
Interpretation
|
1
|
ARTICLE 2.
|
TERM
|
1
|
2.1
|
Initial Term
|
1
|
2.2
|
SOW Term Extensions
|
2
|
ARTICLE 3.
|
SERVICES
|
2
|
3.1
|
Statements of Work
|
2
|
3.2
|
Non-Exclusivity of Services
|
4
|
3.3
|
No Minimum Commitment
|
4
|
3.4
|
Projects
|
4
|
3.5
|
Changes to Customer Group
|
4
|
3.6
|
Governmental Approvals and Consents
|
5
|
3.7
|
Technology and Process Evolution
|
5
|
3.8
|
Knowledge Sharing
|
5
|
3.9
|
Reports
|
5
|
3.10
|
Customer Systems
|
6
|
3.11
|
Satisfaction Surveys
|
6
|
3.12
|
Responsibility for Resources
|
6
|
3.13
|
Work Reprioritization
|
6
|
3.14
|
Cooperation with Third Parties
|
7
|
3.15
|
Management of Third-Party Contracts
|
7
|
3.16
|
Customer Policies
|
9
|
3.17
|
Non-Compliance with Customer Policies
|
9
|
3.18
|
Process Interface Manual
|
9
|
3.19
|
Due Diligence
|
9
|
3.20
|
Excuse from Performance
|
10
|
3.21
|
Acceptance Testing
|
11
|
3.22
|
Deficiencies in Reviewable Items
|
11
|
3.23
|
Rejection Process
|
11
|
3.24
|
Final Acceptance
|
12
|
3.25
|
No Deemed Acceptance
|
12
|
ARTICLE 4.
|
TRANSITION
|
12
|
4.1
|
Transition Plan
|
12
|
4.2
|
Transition Performance
|
13
|
ARTICLE 5.
|
TRANSFORMATION
|
13
|
5.1
|
Transformation Plan
|
13
|
5.2
|
Transformation Performance
|
13
|
5.3
|
Transformation Timing
|
14
|
ARTICLE 6.
|
HUMAN RESOURCES
|
14
|
ARTICLE 7.
|
SERVICE LEVELS AND CREDITS
|
14
|
7.1
|
General
|
14
|
7.2
|
Reporting and Measurement Tools
|
14
|
7.3
|
Anticipated Default; Root-Cause Analysis
|
14
|
7.4
|
Performance Credits
|
15
|
7.5
|
Deliverable Credits
|
15
|
ARTICLE 8.
|
SERVICE LOCATIONS
|
15
|
8.1
|
Service Locations
|
15
|
8.2
|
Physical Safety and Security Procedures
|
16
|
ARTICLE 9.
|
PROVIDER STAFF
|
16
|
9.1
|
Key Personnel
|
16
|
9.2
|
Provider Staff Agreements
|
16
|
9.3
|
Provider Staff Removal
|
17
|
9.4
|
Background Check and Work Eligibility
|
17
|
9.5
|
Restricted Parties Compliance
|
17
|
9.6
|
Provider Agents
|
17
|
9.7
|
Services to Customer Competitors
|
18
|
9.8
|
Qualifications and Training of Provider Staff
|
18
|
9.9
|
Personnel Turnover Rate
|
19
|
ARTICLE 10.
|
CONTINUED PROVISION OF SERVICES
|
19
|
10.1
|
Disaster Recovery Plan
|
19
|
10.2
|
Force Majeure
|
19
|
10.3
|
Alternate Source
|
20
|
10.4
|
No Payment for Unperformed Services
|
20
|
10.5
|
Allocation of Resources
|
20
|
10.6
|
Service Improvement Plan and Step-In
|
20
|
ARTICLE 11.
|
CUSTOMER OPERATIONAL RESPONSIBILITIES
|
21
|
11.1
|
Customer Resources
|
21
|
11.2
|
Customer Operational Responsibilities
|
22
|
ARTICLE 12.
|
FEES AND PAYMENT
|
22
|
12.1
|
General
|
22
|
12.2
|
Expenses
|
22
|
12.3
|
Disputed Fees and Right to Offset
|
22
|
12.4
|
Transition Fees
|
23
|
12.5
|
Extraordinary Events
|
23
|
12.6
|
Benchmarking Arrangement
|
23
|
ARTICLE 13.
|
TAXES
|
25
|
13.1
|
Customer Tax Responsibility
|
25
|
13.2
|
Provider Tax Responsibility
|
25
|
13.3
|
Excluded Tax Responsibilities
|
25
|
13.4
|
Tax Cooperation
|
25
|
ARTICLE 14.
|
AUDITS
|
25
|
14.1
|
Service Audits
|
25
|
14.2
|
Fees Audits
|
26
|
14.3
|
Audits Required by Governmental Authorities
|
26
|
14.4
|
Provider’s Controls Audits
|
26
|
14.5
|
Record Retention
|
27
|
14.6
|
Facilities
|
27
|
14.7
|
Response
|
27
|
ARTICLE 15.
|
RELATIONSHIP MANAGEMENT
|
28
|
15.1
|
Governance Guidelines and Principles
|
28
|
15.2
|
Appointments
|
28
|
15.3
|
Escalation Procedure for Relationship Issues
|
28
|
ARTICLE 16.
|
INTELLECTUAL PROPERTY RIGHTS
|
28
|
16.1
|
Assigned Rights
|
28
|
16.2
|
Moral Rights
|
28
|
16.3
|
Maintenance of Records
|
29
|
16.4
|
Further Assurances
|
29
|
16.5
|
Customer Property
|
29
|
16.6
|
Provider Property
|
29
|
16.7
|
No Implied License
|
30
|
ARTICLE 17.
|
CONFIDENTIALITY AND CUSTOMER DATA.
|
30
|
17.1
|
Use and Disclosure
|
30
|
17.2
|
Required Disclosure
|
31
|
17.3
|
Security Incidents
|
31
|
17.4
|
Rights in Confidential Information
|
32
|
17.5
|
Return of Confidential Information
|
32
|
17.6
|
Third-Party Information
|
32
|
17.7
|
Other Rights
|
32
|
17.8
|
U.S. Defend Trade Secrets Act
|
32
|
17.9
|
Rights in Customer Data
|
32
|
17.10
|
Protection of Customer Data
|
33
|
17.11
|
Information and System Security
|
33
|
17.12
|
Return of Confidential Information and Customer Data
|
34
|
17.13
|
Notice of Adverse Impact
|
34
|
17.14
|
Internal Controls.
|
35
|
ARTICLE 18.
|
REPRESENTATIONS AND WARRANTIES
|
36
|
18.1
|
Representations and Warranties by Customer
|
36
|
18.2
|
Representations and Warranties by Provider
|
37
|
18.3
|
DISCLAIMER
|
40
|
ARTICLE 19.
|
TERMINATION
|
40
|
19.1
|
Termination for Convenience
|
40
|
19.2
|
Termination for Change in Control of Customer
|
40
|
19.3
|
Termination for Change in Control of Provider
|
40
|
19.4
|
Termination by Customer for Cause
|
41
|
19.5
|
Termination by Customer for Breach of Warranties by Provider
|
41
|
19.6
|
Service Level Termination Event
|
41
|
19.7
|
Termination by Provider for Cause
|
41
|
19.8
|
Termination for Failure to Transition
|
41
|
19.9
|
Termination for Failure to Transform
|
41
|
19.10
|
Other Terminations
|
42
|
19.11
|
Cumulative Rights
|
42
|
19.12
|
Termination Effectiveness
|
42
|
ARTICLE 20.
|
TERMINATION ASSISTANCE
|
42
|
20.1
|
Termination Assistance Services
|
42
|
20.2
|
Exit Rights
|
43
|
20.3
|
Termination Assistance Upon Insourcing or Resourcing
|
44
|
ARTICLE 21.
|
INDEMNITIES
|
44
|
21.1
|
Indemnities by Customer
|
44
|
21.2
|
Indemnities by Provider
|
45
|
21.3
|
Provider Obligations Upon Infringement/Misappropriation
|
45
|
21.4
|
Indemnification Procedures
|
46
|
ARTICLE 22.
|
DAMAGES
|
46
|
22.1
|
Direct Damages Cap
|
46
|
22.2
|
Consequential Damages
|
47
|
22.3
|
Exceptions
|
47
|
22.4
|
Acknowledged Direct Damages
|
48
|
22.5
|
Data Breach Damages
|
49
|
22.6
|
Collective Caps
|
49
|
ARTICLE 23.
|
INSURANCE
|
50
|
23.1
|
Insurance
|
50
|
23.2
|
Period of Insurance
|
50
|
23.3
|
Insurance Documentation
|
51
|
ARTICLE 24.
|
COMPLIANCE WITH LAWS
|
51
|
24.1
|
Compliance
|
51
|
24.2
|
Changes in Law
|
51
|
24.3
|
Ethical Practices
|
52
|
24.4
|
Export Control
|
53
|
24.5
|
Regulatory Fines
|
54
|
ARTICLE 25.
|
MISCELLANEOUS PROVISIONS
|
55
|
25.1
|
Assignment
|
55
|
25.2
|
Notices
|
55
|
25.3
|
Counterparts
|
55
|
25.4
|
Relationship
|
56
|
25.5
|
Consents, Approvals and Requests
|
56
|
25.6
|
Waivers
|
56
|
25.7
|
Remedies Cumulative
|
56
|
25.8
|
Amendments
|
56
|
25.9
|
Survival
|
56
|
25.10
|
Third-Party Beneficiaries
|
57
|
25.11
|
Covenant of Further Assurances
|
57
|
25.12
|
Conflict of Interest
|
57
|
25.13
|
Publicity, Branding and Co-Branding
|
57
|
25.14
|
Equitable Relief
|
57
|
ARTICLE 26.
|
CONSTRUCTION
|
57
|
26.1
|
Severability
|
57
|
26.2
|
Sole and Exclusive Venue
|
57
|
26.3
|
Section 365(n)
|
58
|
26.4
|
Governing Law
|
58
|
26.5
|
Continued Performance
|
58
|
26.6
|
Duly Authorized
|
58
|
26.7
|
Entire Agreement
|
58
|
(A)
|
Workers’ compensation insurance in accordance with all federal, state and local requirements, and such policy to include an alternate employer endorsement;
|
(B)
|
Employer’s liability insurance with minimum limits of $[***] per accident for bodily injury by accident; $[***] policy limit by disease; and $[***] for bodily injury by disease, each employee, and such policies to include alternate employer endorsements;
|
(C)
|
Commercial general liability or CGL insurance with minimum limits of $[***] per occurrence, $[***] aggregate for products and completed operations, $[***] for advertising and personal injury, and $[***] for general aggregate;
|
(D)
|
Automobile liability insurance covering use of all owned, non-owned and hired automobiles with bodily injury & property damage coverage with minimum limits of $[***];
|
(E)
|
Umbrella Liability insurance with minimum limits of $[***] and with terms and conditions at least as broad as the underlying insurance policies, with respect to general liability, automobile liability and employers’ liability;
|
(F)
|
Professional liability insurance (errors and omissions) with the minimum limit of $[***] for each occurrence;
|
(G)
|
Crime insurance with the minimum limit of $[***] for each loss; and
|
(H)
|
Cyber liability insurance, including network business interruption, data protection, information security, or privacy breach, (including coverage for events arising from ransomware, extortion, business email compromise, general fraud and EU General Data Protection Regulation requirements), which may be included as part of Provider’s professional errors and omissions liability policy with minimum limits of $[***] for each occurrence.
|
In the case of Customer:
|
1133 Innovation Way
Sunnyvale, California 94089
Attn: Chief Information Officer
|
|
|
In the case of Provider:
|
One North Castle Drive
|
|
Armonk, New York 10504
|
|
|
|
Attn: General Manager, Global Technology Services (North America)
|
|
Juniper Networks, Inc.
|
|
By: ______________________________
|
|
Name: Brian M. Martin
|
|
Title: SVP, General Counsel and Secretary
|
|
Date: ____________________________
|
|
|
|
|
|
|
|
|
|
International Business Machines Corp.
|
|
By: ______________________________
|
|
Name: ___________________________
|
|
Title: _____________________________
|
|
Date: ____________________________
|
•
|
Exhibit A
(Service Description)
|
•
|
Exhibit B
(Fees)
|
•
|
Exhibit C
(Service Levels and Performance Credits)
|
•
|
Exhibit D
(Critical Deliverables and Deliverable Credits)
|
•
|
Exhibit E
(Transition)
|
•
|
Exhibit F
(Reports)
|
•
|
Exhibit G
(Human Resources)
|
•
|
Exhibit H
(Provider Key Personnel)
|
•
|
Exhibit I
(Service Locations)
|
•
|
Exhibit J
(Customer Operational Responsibilities and Customer Resources)
|
•
|
Exhibit K
(Satisfaction Surveys)
|
•
|
Exhibit L
(Asset Responsibility and Ownership Matrix)
|
•
|
Exhibit M
(SOW Specific Customer Policies)
|
•
|
Exhibit N
(Incremental Terms and Conditions)
|
•
|
Exhibit O
(Transformation)
|
•
|
Exhibit P
(Projects)
|
1.
|
DEFINITIONS
.
|
2.
|
SERVICES
.
|
2.1
|
Service Description
. Provider will, subject to the terms and conditions of the MSA and this SOW, provide to Customer the Services described in
Exhibit A
(Service Description). The Services may be supplemented, enhanced, modified or replaced, in each case, in accordance with the terms of the MSA. The Parties will comply with their respective obligations set forth in
Exhibit A
(Service Description) and elsewhere in this SOW. In addition to Provider’s tasks and responsibilities expressly set forth in this SOW and in
Exhibit A
(Service Description), the Services include other Provider responsibilities, roles and tasks as provided for in paragraph (D) of
Section 3.1
(Statements of Work) and elsewhere in the MSA.
|
2.2
|
Responsibility for Services
. Customer will meet its obligations and provide the resources with respect to the Services as are specifically identified as Customer’s responsibility in
Exhibit A
(Service Description) and Provider shall perform all other services, tasks and functions necessary to accomplish the Services subject to Customer’s reasonable satisfaction.
|
3.
|
FEES AND INVOICING
.
|
3.1
|
Fees
. In consideration of the Services provided to Customer under this SOW, Customer will pay to Provider the undisputed Fees set forth in
Exhibit B
(Fees).
Exhibit B
(Fees) describes in detail the methodologies for calculating the Fees (providing formula examples, where applicable), the measures of resource utilization, and the means of tracking such usage for purposes of calculating variable charges hereunder.
|
3.2
|
Transition Fees
. Customer will pay Provider the undisputed Fees for Transition as set forth in
Exhibit B
(Fees) which may require that Provider successfully achieves the relevant milestone, meets the applicable acceptance criteria set forth in
Exhibit E
(Transition) and that milestone is approved by Customer in accordance with
Exhibit E
(Transition).
|
3.3
|
Invoicing
. Unless otherwise set forth in
Exhibit B
(Fees), Provider shall invoice Customer for all Fees on a calendar month basis. Any and all Fees for a partial month will be prorated. All invoices must include: (A) all detail reasonably requested by Customer in a form sufficient to satisfy Customer’s internal accounting and chargeback requirements (such as allocating charges between capital and expense, among locations and departments, etc.); (B) the Fees and, subject to
Section 12.2
(Expenses) of the MSA, any reimbursable expenses under Project Documents, where applicable; (C) the calculations utilized to establish the charges in such
|
4.
|
SERVICE LEVELS AND PERFORMANCE CREDITS
.
|
4.1
|
Service Levels and Reporting
. Beginning on the date on which Provider assumes responsibility for the Services in accordance with the Transition Plan set forth in
Exhibit E
(Transition), and continuing throughout the Term, Provider shall perform the Services so as to meet or exceed the Service Levels in
Exhibit C
(Service Levels and Performance Credits). Provider will monitor the Service Levels and provide the Service Level reports as specified in
Exhibit C
(Service Levels and Performance Credits) and
Exhibit F
(Reports).
|
4.2
|
Performance Credits
. If Provider does not meet the Critical Performance Indicators, Provider will pay Customer the Performance Credits specified in
Exhibit C
(Service Levels and Performance Credits) in accordance with the MSA.
|
4.3
|
Service Level Termination Events
. For purposes of this SOW, Service Level Termination Events are as follows: [TBD].
|
5.
|
CRITICAL DELIVERABLES AND DELIVERABLE CREDITS
.
|
6.
|
TRANSITION
.
|
7.
|
REPORTS
.
|
7.1
|
Monthly Reports
. In addition to the Service Level reports, Provider will provide to Customer the other monthly reports set forth in
Exhibit F
(Reports), or such other frequency as may be specified in that Exhibit.
|
7.2
|
No Additional Fees for Reports
. Reports identified in
Exhibit F
(Reports) constitute the agreed upon reports as of the SOW Effective Date, including but not limited to any other reports as the Parties may mutually agree during the Project.
|
7.3
|
Form of Reports
. Where requested by Customer, Provider will provide Customer with all reports specified in the MSA and
Exhibit F
(Reports) electronically and in two forms: (A) raw data captured or generated from various systems, data feeds and other data sources from which Provider generates the reports (
e.g.,
server logs) and by Provider personnel in the course of performing the Services (
e.g.,
manually generated record information) (collectively, the “
Raw Data
”); and (B) Raw Data that Provider has altered, manipulated or refined to generate reports, provide certain data views or otherwise meet its obligations under this SOW (“
Refined Data
”). In addition, where the tool used to generate the report allows real time (or near real time) access to the Raw Data used to generate the reports, Provider agrees to provide that real-time (or near real-time) access to Customer at no charge, or otherwise provide the relevant Raw Data used to generate the reports under this
Exhibit F
(Reports) and the MSA as soon as reasonably practicable following the request from Customer.
|
8.
|
HUMAN RESOURCE TRANSITION
.
|
9.
|
SATISFACTION SURVEYS
.
|
10.
|
SERVICE LOCATIONS
.
|
11.
|
CUSTOMER OPERATIONAL RESPONSIBILITIES AND CUSTOMER RESOURCES
.
|
12.
|
ADDITIONAL AUDIT REQUIREMENTS
.
|
13.
|
PROVIDER KEY PERSONNEL.
|
14.
|
STEP-IN EVENTS.
|
15.
|
SOW TERM
.
|
16.
|
ASSET RESPONSIBILITY AND OWNERSHIP MATRIX
.
|
17.
|
SOW SPECIFIC CUSTOMER POLICIES
.
|
18.
|
INCREMENTAL TERMS AND CONDITIONS
.
|
19.
|
TRANSFORMATION
.
|
20.
|
PROJECTS
.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2.
|
During Transition, the Parties will agree upon the Project management and related Services and Deliverables for in-flight Projects to be provided pursuant to this SOW.
|
Transition Critical Milestone
|
Description/Comments
|
Transition Critical Milestone Completion Date
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
ROLE
|
RESOURCE NAME
|
FULL TIME / PART TIME
|
COMMITMENT HOURS / DURATION
|
COMMENTS
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1.1
|
This
Exhibit P
(this “
Exhibit
”) describes the overall Project management process that will be implemented in order to support delivery of all Projects (including all in-flight Projects) under this SOW.
|
2.1
|
The Provider Project Executive will have overall responsibility and accountability to meet agreed upon quality, cost, schedule and technical objectives of the Project.
|
2.2
|
Provider will assign an individual to act as Project Manager and Customer will assign a Project Point of Contact who each has the authority to represent and bind Customer and Provider, respectively, for that Project and who will have specific operational roles as described below and further delineated in the Project Plan. A Project Manager or Project Point of Contact may be assigned to oversee more than one Project at a time. The Project Manager or Project Point of Contact is a role which may be assigned to an individual who has other job responsibilities and who will serve as the point of accountability for the specific Project at hand. Customer and Provider will each provide the other reasonable advance written notice of a Change to their respective Project Point of Contact or Project Manager and will discuss any objections the other has to such Change.
|
2.3
|
Customer and Provider will develop a Project Plan as specified in Section 6 below. The terms and conditions of the Agreement will apply to all Projects, except to the extent expressly amended by the applicable Project Plan. Timeframes within which deliverables will be submitted and accepted will be mutually agreed by the Parties as necessary in the Project Plan.
|
3.1
|
Provider Responsibilities
. Provider will cause the Provider Project Executive to:
|
(A)
|
be the single-point-of-contact to Customer for establishing and maintaining communications through the Customer Project Point of Contact regarding the Project;
|
(B)
|
develop the detailed Project Plan in conjunction with the Customer Project Point of Contact;
|
(C)
|
measure, track and evaluate progress against the Project Plan;
|
(D)
|
maintain files of the Project Plan and any associated documentation;
|
(E)
|
manage the Project for Provider including planning, directing, and monitoring all Project activities;
|
(F)
|
establish the Provider Project team and, in conjunction with the Customer Project Point of Contact, orient team members regarding the Project management process and the Project Plan, including individual responsibilities, deliverables, and timelines;
|
(G)
|
provide operational guidance to, manage and be accountable for the performance of Provider's employees and subcontractors assigned to the Project;
|
(H)
|
define and monitor the support resources required for the Project;
|
(I)
|
request all Changes via a Change Request;
|
(J)
|
resolve deviations from the Project Plan with the Customer Project Point of Contact
|
(K)
|
address the resolution of Project issues;
|
(L)
|
plan, schedule, conduct and participate in periodic Project planning, review and status meetings, as applicable, including review of the work products being produced;
|
(M)
|
coordinate and schedule the attendance of Provider's employees and subcontractors, as appropriate, at such periodic planning, review, and status meetings; and
|
(N)
|
provide periodic written status reports to Customer Project Point of Contact that provide information such as schedule status, technical progress, issue identification and related action plans.
|
3.2
|
Customer Responsibilities
. Customer will cause the Customer Project Point of Contact to:
|
(A)
|
be the single-point-of-contact for the management of Customer’s obligations under the Project;
|
(B)
|
serve as the interface between the Project team members and Customer’s business functions, units, or Affiliates participating in the Project;
|
(C)
|
define Customer's business and technical requirements for each Project;
|
(D)
|
reasonably assist Provider in Provider's development of the detailed Project Plan and validate that the Project Plan meets Customer’s business and technical requirements;
|
(E)
|
request all Changes via a Change Request;
|
(F)
|
participate in and provide reasonable support during periodic Project planning, review, and status meetings, as scheduled by Provider;
|
(G)
|
obtain and provide information, data, decisions and approvals, within the agreed time period;
|
(H)
|
coordinate and schedule the attendance of Customer employees and subcontractors, as appropriate, at planning, review, and status meetings scheduled by Provider;
|
(I)
|
assist in the resolution of Project issues and escalate within Customer's management as needed;
|
(J)
|
assist Provider in resolution of deviations from the Project Plan;
|
(K)
|
participate in periodic Project reviews, as reasonably requested by Provider; and
|
(L)
|
review the deliverables to determine if they meet the Completion Criteria set forth in the applicable Project Plan and, within the specified time frame, inform the Provider Project Executive in writing of the results of such review.
|
4.1
|
A Project Plan will contain the following information:
|
(A)
|
Project Manager and Project Point of Contact
|
(B)
|
This section will identify Customer’s Project Point of Contact and Provider's Project Managers including name, address, telephone number, and mobile number.
|
(C)
|
Purpose and Scope of Work
|
(D)
|
This section will provide a summary of the overall purpose of the Project and define the scope of work to be performed.
|
(E)
|
Assumptions and Dependencies
|
(F)
|
This section will describe any key assumptions or dependencies upon which the Project was based or is dependent upon for successful completion, or both.
|
(G)
|
Definitions
|
(H)
|
This section will define any terms specific to the Project.
|
(I)
|
Provider Responsibilities
|
(J)
|
This section will describe the responsibilities that Provider is required to perform in order to complete the Project.
|
(K)
|
Customer Responsibilities
|
(L)
|
This section will describe the responsibilities that Customer is required to perform in order to complete the Project.
|
(M)
|
Required Equipment and Materials
|
(N)
|
This section will list all required equipment and materials including, hardware and software, that Customer or Provider must provide in order to facilitate completion of the Project.
|
(O)
|
Deliverables
|
(P)
|
This section will provide a description of any items to be delivered by Provider under the Project.
|
(Q)
|
Estimated Exhibit
|
(R)
|
This section will provide the estimated schedule for completion of the Project, including any milestones and target dates for completion.
|
(S)
|
Completion Criteria
|
(T)
|
This section will state the criteria that Provider must meet in order to satisfy its obligations under the Project and the timelines for acceptance thereunder.
|
(U)
|
Charges
|
(V)
|
This section will specify the applicable fees, if any, for the Project (for example, included within the Annual Services Charge or performed for additional fees on a fixed price or time and materials basis) as well as the interval at which said fees will be paid to Provider by Customer.
|
(W)
|
Additional or Unique Terms and Conditions
|
(X)
|
This section will identify terms and conditions, if any, in addition to or different from the terms in the Agreement or SOW.
|
5.1
|
A Project may be changed in accordance with
Schedule 12
(Change Control Procedures).
|
6.1
|
The Services will be completed when all of the Deliverables have been accepted by Customer pursuant to the Completion Criteria in the Project Plan.
|
7.1
|
As part of the Transition for each Statement of Work, Provider will provide the Project management and related Services and Deliverables for in-flight Projects as agreed upon by the Parties during the Transition.
|
1.
|
CROSS-FUNCTIONAL SERVICES OVERVIEW AND OBJECTIVES
|
1.1
|
Services Overview
|
1.2
|
Service Objectives
|
(A)
|
The following are the key high-level Service objectives across the Cross-Functional Services:
|
(1)
|
Critical IT and service management functions are integrated into and made a part of the Services provided as part of each SOW.
|
(2)
|
The Customer Group receives Services with an enterprise view across SOWs.
|
1.3
|
Required Tooling
|
(A)
|
Provider’s Services and Fees are dependent upon Provider’s ability to implement the automation tools defined in the SOWs. Provider requires Customer’s consent, reasonable support and reasonable participation in implementing the automation prerequisites set forth in the SOWs into Customer’s environment in accordance with the agreed upon implementation plan. Subject to
Section 3.20
(Excuse from Performance), if Customer prevents or unreasonably impedes the implementation of Provider’s automation tools, then Provider may be required to make Changes to its implementation plan in order to provide the Services as agreed in the SOWs. Any Changes to the agreed upon implementation plan will be addressed through the Change Control Procedures and may result in an equitable and corresponding adjustment to the Fees and/or Baselines set forth in
Exhibit B
(Fees) of the applicable SOW.
|
(B)
|
Notwithstanding anything else in the MSA or SOWs to the contrary, Provider reserves the right to implement automation tools and technologies to enhance its ability to deliver the Services in accordance with the Service Levels. In the event that Provider elects to implement any such tools and/or technologies, Customer will cooperate in good faith in such implementation including, at a minimum, assisting with the implementation of any required automation prerequisites. All such implementations will be addressed through the Change Control Procedures.
|
2.
|
SERVICE DESCRIPTIONS AND ROLES AND RESPONSIBILITIES
|
2.1
|
General Roles and Responsibilities
|
(A)
|
The following table identifies general roles and responsibilities that Provider and Customer will perform:
|
General Roles and Responsibilities
|
[***]
|
1. Identify Customer Group’s IT requirements.
|
[***]
|
2. Provide Services that support Customer Group’s technical requirements and end user requirements.
|
[***]
|
3. Comply with known Customer Policies, standards and regulations applicable to the Services.
|
[***]
|
4. Provide Customer Polices, standards and regulations applicable to the Services to Provider.
|
[***]
|
5. Develop and timely maintain the comprehensive Process Interface Manuals (“
PIM
”) in accordance with the MSA that contains the actual operational and process standards that will be used in the delivery of the Services.
|
[***]
|
6. Report performance against the Service Levels in accordance with the reporting requirements of the applicable SOW.
|
[***]
|
7. Monitor and audit Provider’s performance in its delivery of the Services under the Agreement.
|
[***]
|
8. Coordinate changes to the IT infrastructure that may affect the Service Levels of any other Service area.
|
[***]
|
9. Provide timely creation, updating, maintenance and provision of appropriate Project Plans, Project time and cost estimates, technical specifications, management Documentation and management reporting in a form/format that is acceptable to Customer for Projects and major Service activities.
|
[***]
|
10. Coordinate Service delivery with other support groups within each of the other SOWs in coordination with Authorized Users, Customer, and appropriate persons, as necessary.
|
[***]
|
11. Provide VIP support Services as necessary.
|
[***]
|
12. Provide list of individuals who will receive VIP support.
|
[***]
|
2.2
|
IT Processes and Responsibilities
|
(A)
|
Administration
|
(1)
|
Administration Services are the activities associated with providing a stable System infrastructure and to effectively and efficiently perform procedures to ensure the Services meet the Service Levels.
|
(2)
|
The following table identifies operations and administration roles and responsibilities that Provider and Customer will perform, including:
|
Administration Roles and Responsibilities
|
[***]
|
1. Producing periodic reports as necessary and respond in a timely manner to queries and requests concerning the inventory data or supporting information.
|
[***]
|
2. On a periodic basis (at least semi-annually), updating the Asset Inventory and Management System by electronically polling Equipment (to the extent enabled in the Customer-approved enterprise management System provided by Provider).
|
[***]
|
3. When performing Equipment installations, validating and correcting physical inventory information.
|
[***]
|
4. Conducting regular inventory reconciliation through random record-to-floor physical inventory verification.
|
[***]
|
5. Timely updating the Asset Inventory and Management System by the following actions: securely removing Assets that are no longer in use; modifying Asset information resulting from Asset relocation and/or use by a different Authorized User; adding new Asset information upon implementation of new Equipment or Software.
|
[***]
|
6. Identifying strategies and approaches that will result in the elimination of unnecessary Equipment or Software, or modifications to existing Equipment and Software that Provider believes will provide Customer with competitive advantages, increased efficiency, increased performance, or cost savings (for example: securely eliminate redundant Equipment; deploy handsets that can utilize a single line for Voice and data; consolidate multiple PCs where a single unit would satisfy Customer’s needs, etc.). For the avoidance of doubt, all such identified strategies and/or approaches will follow the Change Control Procedures prior to implementation of any such strategies and/or approaches.
|
[***]
|
(B)
|
Software Support
|
(1)
|
Software support Services consist of the activities related to the secure and efficient installation, upgrade, changes, and support for Customer approved Software.
|
(2)
|
The following table identifies Software support roles and responsibilities that Provider and Customer will perform, including:
|
Software Support Roles and Responsibilities
|
[***]
|
1. Installing, upgrading, and changing Software as required and in accordance with Customer Policies and/or technical review board.
|
[***]
|
2. Interfacing with retained Customer Personnel and other third parties to promote the compatibility of Software products.
|
[***]
|
3. Unless otherwise directed by Customer, installing, upgrading, and changing the Software to prescribed release levels in accordance with Customer Policies and/or technical review board.
|
[***]
|
4. Providing installation of department or Authorized User-specific Software as requested by Customer.
|
[***]
|
5. Installing bug fixes, patches, updates and upgrades from Third-Party Suppliers for third-party Software Problems, which includes installation of third-party supplied Software patches as required.
|
[***]
|
6. At least thirty (30) days prior to the start of each calendar quarter, giving written notice to Customer of upgrades and Software changes that are planned to occur in the following quarter.
|
[***]
|
7. Provide input and approval of Software upgrade and change timeline.
|
[***]
|
8. Upgrading and effecting changes to the Software in accordance with the timeline approved by Customer.
|
[***]
|
9. Coordinating testing, installation, customization, and support of Software with Application development and maintenance personnel, Authorized Users, and other third parties as required.
|
[***]
|
10. Observing Customer Change Management procedures while implementing all changes, upgrades, or enhancements.
|
[***]
|
11. For any changes, upgrades, or enhancements, advising Customer of any additional Equipment, Network, environmental, or other requirements needed during integration testing and/or otherwise known to be necessary for the implementation thereof.
|
[***]
|
12. Supporting Software identified as in-scope in the applicable SOW; excluding Applications supported by Customer’s retained staff or other third parties, as required and in accordance with Customer Architecture Standards.
|
[***]
|
13. Supporting Software at prescribed release levels or as directed by Customer.
|
[***]
|
14. Subject to Change Control Procedures, supporting Software used by a specific Authorized User, pursuant to Customer Policies and/or technical review board as requested by Customer.
|
[***]
|
15. Supporting Software internally developed and used by Customer.
|
[***]
|
16. For System Software, providing Level 1 and Level 2 support and provide and/or coordinate Level 3 Support.
|
[***]
|
17. Providing Authorized Users with Software support, advice, and assistance as needed.
|
[***]
|
18. Timely maintaining a list of Documentation that reflects the complexity and diversity of the environment and that enhances the Software support process.
|
[***]
|
Software Support Roles and Responsibilities
|
[***]
|
19. Timely maintaining a library of Provider-supplied and Provider-developed Documentation that identifies the Software supported by Provider and the operational support procedures associated with all such Software.
|
[***]
|
20. Timely maintaining master copies of all Customer standard Software in a secure, Customer approved source code repository.
|
[***]
|
21. Maintaining subscription to the anti-virus/malware Software support in order to proactively receive virus/malware engine and pattern updates.
|
[***]
|
22. Performing virus/malware scans on all e-mails.
|
[***]
|
23. Providing and implementing the capability to scan hard drives or other temporary storage devices (such as USB memory sticks, PCMCIA flashcards, FireWire hard drives) for virus/malwares upon request.
|
[***]
|
24. Developing any plans necessary to provide virus/malware protection.
|
[***]
|
25. Promptly responding to virus/malware Incidents per the instructions provided by the Customer in the Incident/ticket submitted to Provider.
|
[***]
|
26. Providing proactive alerts to Authorized Users relative to current virus/malware threats specific to Customer’s environment.
|
[***]
|
(C)
|
Service Catalog
|
(1)
|
Service Catalog Services are the activities associated with developing, revising, archiving, maintaining, managing, reproducing, and distributing an archive of information relating to approved products, Software, and Equipment for Authorized Users.
|
(2)
|
The following table identifies Service Catalog roles and responsibilities that Provider and Customer will perform, including:
|
Service Catalog Roles and Responsibilities
|
[***]
|
1. Creating and regularly (at least quarterly) updating a list of Equipment and Software that includes the approved products for purchase or lease by Authorized Users for new deployments (the “
Service Catalog
”).
|
[***]
|
2. Aligning the Service Catalog with Customer’s IT strategic direction, technical architecture, Refresh strategy, roadmap, and product evaluation and test results. Provider will obtain Customer’s approval for the Service Catalog.
|
[***]
|
3. Timely maintaining the Service Catalog on a relational database System in Customer’s ServiceNow System, which contains links/integration with the Asset Inventory and Management System as necessary and appropriate. Provider will obtain Customer’s prior written approval for the database design and Customer will have full and continual access to the database.
|
[***]
|
4. Implementing new Service Catalog items in Customer’s ServiceNow System.
|
[***]
|
5. Categorizing the Service Catalog content by type of Service, configuration type, and/or Equipment or Software type (for example, IMACS, network, desktops, laptops, printers, office suite software, PDAs, etc.).
|
[***]
|
6. Including in the Service Catalog individual Services, Equipment and Software items, as well as entire configurations of Services, Equipment and Software, as applicable, based on the deployment standards or options (for example: a “New Hire” selection might include acquisition and installation of a PC, network drop, telephone, etc.).
|
[***]
|
7. Including any notation required for specific use (or limitation) of the Equipment or Software—or of the delivery of the Service—by region, by business unit, or by category of Authorized User.
|
[***]
|
8. Including any technical limitations/requirements for the use of Equipment or Software (for example: minimum disk space, memory, operating System, etc.) or execution/delivery of the Service.
|
[***]
|
9. Integrating approvals into the Service Request workflow.
|
[***]
|
10. Including a description of how to obtain additional information about all Services, Equipment, and/or Software.
|
[***]
|
11. Making the Service Catalog, available on Customer’s Intranet, along with search capabilities and contact information for queries.
|
[***]
|
(D)
|
Maintenance
|
(1)
|
Maintenance Services are the activities associated with the maintenance and repair of Software, Equipment, and infrastructure, including networks, websites and databases, including “break/fix” services. Installed platform and product version levels are to be maintained in accordance with this Schedule, unless coordinated with and approved in writing by Customer.
|
(2)
|
The following table identifies Maintenance roles and responsibilities that Provider and Customer will perform, including:
|
Maintenance Roles and Responsibilities
|
[***]
|
1. Timely coordinating and managing third parties that provide maintenance-related support for Equipment and Software used in conjunction with the Services and performing these responsibilities regardless of the Party (Provider or Customer) that has financial responsibility for the underlying Asset and maintenance expenses.
|
[***]
|
2. Timely performing maintenance of Equipment and Software in accordance with Change Management procedures and scheduling this maintenance to minimize disruption to Customer’s Services.
|
[***]
|
3. Where Provider is financially responsible for the underlying Equipment or Software maintenance expense, providing (or arranging for qualified third parties to provide) maintenance for such Equipment and Software.
|
[***]
|
4. Providing such maintenance as necessary to keep the Equipment and Software in good operating condition and in accordance with the manufacturer’s specifications, or other agreements as applicable, so that such Assets will qualify for the manufacturer’s standard maintenance plan upon sale or return to a lessor.
|
[***]
|
5. Coordinating with the Third-Party Supplier of Equipment and Software, and installing and testing all updates, upgrades, bug fixes, and patches in order to maintain such Equipment and Software as necessary to meet specified Service Levels.
|
[***]
|
6. For in-scope third-party maintenance contracts, administering and managing the contract on behalf of Customer, notify Customer in writing at least ninety (90) days in advance about maintenance contracts that are about to expire, and recommending modifications to the Services during such third-party maintenance contract renewal consideration period.
|
[***]
|
(E)
|
Refresh and Technical Currency
|
(1)
|
Refresh and Technical Currency Services are the activities associated with modernizing the IT infrastructure on a continual basis to keep the System components current with evolving industry standard technology platforms.
|
(2)
|
The following table identifies Refresh and Technical Currency roles and responsibilities that Provider and Customer will perform, including:
|
Refresh and Technical Currency Roles and Responsibilities
|
[***]
|
1. Refresh Equipment and Software as required throughout the Term, for purposes that include meeting Customer’s IT requirements; preventing technological obsolescence or failure; and accommodating volume changes, the ability to increase efficiency, the ability to lower costs, and/or the need to maintain the required Third-Party Supplier support; maintaining compatibility with the Customer-owned Software, Customer-licensed Software and Equipment for which Customer has financial responsibility for Equipment Refresh; and otherwise as required for Provider to meet its obligations under the Agreement (including the Performance Standards). Deploying Equipment and Software associated with any Refresh in accordance with the standards of Customer’s technical architecture and long-range IT plan.
|
[***]
|
Refresh and Technical Currency Roles and Responsibilities
|
[***]
|
2. Providing Refresh within the timeframes and other requirements associated with Refresh, as well as the financial responsibility for the underlying Assets in accordance with the Financial Responsibility Matrix, including performing Refresh throughout the Term in accordance with the timeframes and other requirements. Customer reserves the right to modify the Refresh timeframes and requirements during the Term based on its business requirements.
|
[***]
|
3. Where Customer is financially responsible for Equipment and Software used in conjunction with the Services, implementing and supporting the new Assets provided by Customer.
|
[***]
|
4. Regardless of the ownership of underlying Assets: providing Provider Staff who are adequately trained and skilled with the appropriate expertise in the use of the Equipment or Software to be deployed as part of the Refresh, and providing such training prior to the Refresh; providing minimal disruption to Customer’s business operations associated with technology Refresh; using best practices and effective automation tools during Refresh deployment; and performing changes to Equipment and Software in accordance with Change Management procedures.
|
[***]
|
5. Unless otherwise directed by Customer, providing and supporting Software under Provider’s operational responsibility at the N-1 Release Level.
|
[***]
|
6. As directed by Customer, supporting the N-1 Release Level, the N-2 Release Level, and earlier versions of the Software for the longer of the following: (1) the version N Release Level’s general public availability or (2) from the time the Third-Party Supplier ceases to support such version.
|
[***]
|
7. Using commercially reasonable efforts to support Software that is no longer supported by the Third-Party Supplier.
|
[***]
|
8. Providing support for mutually agreed Software versions and release levels that exist as of the Effective Date until otherwise directed by Customer.
|
[***]
|
9. Maintaining a standard current level of Software on Customer and the other Authorized User’s computing platforms, including: performing the following upon each new N Release Level issued by a Provider: within eight (8) months after the release of a new N Release Level by a Third-Party Supplier (1) testing and evaluating the new release in preparation for upgrading the global Authorized User environment to the new standard level; (2) engaging with Customer Application teams to understand the Authorized User workload required to migrate the production environments to the new Software revision; and (3) building a deployment strategy and plan.
|
[***]
|
10. Review and provide input and approval for the Software release deployment strategy and plan.
|
[***]
|
11. Deploy Software release in accordance with approved deployment plan.
|
[***]
|
12. In partnership with the Software manufacturer(s), building and maintaining a schedule of anticipated releases of major and minor releases of Systems Software, and timely presenting these schedules to the Technical Review Board meetings prior to communicating such schedules to Customer Application teams to build awareness and preparedness to perform the necessary testing and porting of Applications into the new standard environments.
|
[***]
|
Refresh and Technical Currency Roles and Responsibilities
|
[***]
|
13. Developing an annual plan for Refresh, including: at least ninety (90) days prior to Customer’s annual planning process meetings, reviewing the Asset inventory and producing and delivering a report that lists the Assets that are due to be Refreshed in the upcoming plan year. Based on usability of the Assets and reviewing with Customer alternatives to replace, re-lease, consolidate, or retain the Assets.
|
[***]
|
14. Participate in Asset review discussion and provide input in Refresh and/or reasonable alternatives.
|
[***]
|
15. Deliver recommendations regarding Asset Refresh and/or reasonable alternatives to Customer within thirty (30) days after the Asset review discussion.
|
[***]
|
16. If Software Changes are required due to replacement of Assets, Provider, in consultation with the Customer, will review alternatives for making changes to such Software. requests for replacement of the Assets and mutually agreed Software will be processed in accordance with the Change Control Procedures.
|
[***]
|
17. Provide proposal for Refresh of Customer-owned and leased Assets.
|
[***]
|
18. Provide input and approval for Refresh plan of Customer-owned and leased Assets.
|
[***]
|
19. Execute that Refresh plan utilizing established Service Desk and procurement processes approved in writing by Customer.
|
[***]
|
20. Providing monthly reports ninety (90) days prior to lease expiration date showing Assets to be Refreshed with latest data.
|
[***]
|
21. Notifying Customer monthly of open agreements related to Assets that will retire within ninety (90) days of the report date.
|
[***]
|
22. Tracking and reporting on basic information related to the start and end dates of leases of Equipment.
|
[***]
|
23. Updating Asset records after and on retirement.
|
[***]
|
(F)
|
Redeployment and Disposal of Equipment
|
(1)
|
The secure redeployment and disposal of Equipment services are the activities associated planning, tracking, and executing the de-installment and/or redeployment of Customer Assets in order to provide uninterrupted Services.
|
(2)
|
The following table identifies Redeployment and Disposal of Equipment roles and responsibilities that Provider and Customer will perform, including:
|
Redeployment and Disposal of Equipment Roles and Responsibilities
|
[***]
|
1. Performing de-installation and/or secure re-deployment of Equipment in accordance with Change Management procedures, including: complying with backup requirements and providing permanent removal of any Customer Software or data that may exist on storage media (either fixed, removable, or shared).
|
[***]
|
2. Upon secure redeployment or secure disposal of Equipment, make the necessary changes in the Asset Inventory and Management System.
|
[***]
|
3. Prior to a new purchase or lease of any Equipment, advise Customer of any possibility of securely re-deploying existing Equipment.
|
[***]
|
4. To the extent the Equipment is owned or leased by Customer, returning the Equipment to a central location or securely re-deploy Equipment as requested by Customer; securely disposing of unusable Equipment in an appropriate, environmentally responsible manner, securely erasing data and configuration information resident in the computer System, storage components, and/or devices in such a manner that makes the data permanently irretrievable prior to securely disposing of Equipment; if the Equipment is owned by Customer and sold for salvage, crediting Customer for the Equipment’s salvage price.
|
[***]
|
(G)
|
Delivery and Staging
|
(1)
|
Delivery and Staging Services are the activities associated with the safe, efficient, and timely packing, shipping, and set-up of IT-related Assets.
|
(2)
|
The following table identifies Delivery and Staging roles and responsibilities that Provider and Customer will perform, including:
|
Delivery and Staging Roles and Responsibilities
|
[***]
|
1. Providing Services associated with the delivery and staging of Equipment and Software.
|
[***]
|
2. Develop shipping and delivery processes during Transition.
|
[***]
|
3. Provide input and approval or shipping and delivery processes during Transition.
|
[***]
|
4. Receiving Equipment and Software that are delivered in accordance with valid procurement orders from Customer; also assist Customer in the receiving process as necessary at Customer Facilities.
|
[***]
|
5. Verifying that contents of the delivery are included according to the valid procurement order.
|
[***]
|
6. As appropriate and required, notifying representatives from Customer, Provider or any applicable Third-Party Suppliers that the order has been received; plus completing and forwarding any required paperwork associated with verifying the receipt and contents of the order to the appropriate Customer, Provider, or Third-Party Supplier personnel.
|
[***]
|
7. Providing timely input into Provider and/or Customer Systems and processes to provide accurate billing and order/inventory management.
|
[***]
|
Delivery and Staging Roles and Responsibilities
|
[***]
|
8. After receipt at the initial site, moving or shipping, Equipment and Software (if necessary) to the staging site(s) (and a location within the site) on a scheduled delivery date that is agreed to with the appropriate Authorized User(s) or Third-Party Supplier.
|
[***]
|
9. Facilitating shipping to and from sites, as required.
|
[***]
|
10. Providing temporary storage and staging facilities for Customer when needed.
|
[***]
|
11. Assuming responsibility for freight-related and transportation-related costs associated with the shipment and receipt of Equipment from Equipment manufacturer locations to Customer Facilities and/or Provider Service Locations.
|
[***]
|
12. Assuming responsibility for freight-related and transportation-related costs associated with the shipment and receipt of Equipment from Customer Facilities to other Customer Facilities.
|
[***]
|
13. Store the Equipment and Software in a Customer provided secure area and do not subject the Equipment or Software to extreme heat, cold, dampness or other unfavorable conditions.
|
[***]
|
14. Providing logistics Services (for example, provisioning, site preparation, etc.) associated with the movement of the Equipment or Software from Third-Party Suppliers to staging facilities.
|
[***]
|
15. After the Equipment and/or Software has reached its final staging destination and prior to its actual installation: unloading, uncrating, and/or removing the packaging that was used to ship and contain the product; removing shipping and packaging materials from Customer’s premises in an environmentally responsible manner; assembling and/or testing the product, including assembling a complete or partial configuration, if required by the agreed installation plan; providing the specific configuration required to complete the assembly and/or installation of the Equipment and Software; using the Customer standard configuration for the underlying type of Equipment and/or Software for new Equipment and Software, unless otherwise approved by Customer in writing; providing configuration specifications and assembly/test instructions to Provider Staff or Third-Party Supplier in electronic format and/or paper copy as needed; providing parts and materials necessary for proper assembly and installation of Equipment, Software and Services, exclusive of electrical power and environmental resources and any other materials specifically agreed in advance and in writing with Customer or a Third-Party Supplier; coordinating with Third-Party Suppliers that are supplying peripheral or ancillary Equipment or Software; providing replacement parts/units to remedy out-of-box failures or Equipment found inoperable during assembly.
|
[***]
|
(H)
|
Quality Assurance
|
(1)
|
Quality Assurance (QA) Services are the activities associated with the assessment and definition of QA activities and parameters, including metrics and procedures consistent with industry standards.
|
(2)
|
The following table identifies Quality Assurance roles and responsibilities that Provider and Customer will perform, including:
|
Quality Assurance Roles and Responsibilities
|
[***]
|
1. Developing and employing a quality assurance program, subject to Customer’s approval, designed to promote and consistently maintain performance of the Services at a high level of quality and focus on measuring and improving reliability, speed, cost effectiveness, and Customer satisfaction.
|
[***]
|
2. Writing and maintaining procedures and measurements on quality assurance activities associated with the Services.
|
[***]
|
3. Ensuring that the quality metrics and procedures employed are consistent with similar standards in Customer’s industry and/or in the provision of similar professional services.
|
[***]
|
4. Subject to
Section 17.14
(Internal Controls) of the MSA, ensuring compliance with a published quality assurance program, with adequate internal controls and verification activities.
|
[***]
|
5. In accordance with
Article 14
(Audits) of the MSA, allowing Customer to perform audits that will focus on Provider’s adherence to its quality assurance procedures and standards; on the metrics gathered to support quality assurance activities; and on Provider’s efforts to improve overall quality.
|
[***]
|
(I)
|
Security Management
|
(1)
|
Security Management Services are the activities that enable Customer, Provider, and Third-Party Suppliers to meet the security requirements detailed in security policies, contractual requirements, legislative requirements, and in the Service Levels schedule.
|
(2)
|
The following table identifies security management roles and responsibilities that Provider and Customer will perform, including:
|
Security Management Roles and Responsibilities
|
[***]
|
1. Comply with Customer’s requirements according to security policies, contractual requirements, legislative requirements, and as expressed in the Service Levels.
|
[***]
|
2. Comply with Provider’s internal security requirements according to internal security policies and standard security baselines.
|
[***]
|
3. Assisting Customer to define security requirements based upon business needs.
|
[***]
|
4. Providing advice on improving the information security model and plan implementation.
|
[***]
|
5. Complying with its physical and logical security responsibilities, including, in particular, providing that proper segregation of duties exists where appropriate, including where processes span to Provider and/or Third-Party Supplier(s). If during the implementation of Changes or management of crises it is not feasible to observe a proper segregation of duties, immediately informing Customer of this fact and keeping a complete and accurate record of any and all actions performed and by whom.
|
[***]
|
6. Provide Customer with a written record within two (2) days after the change or crisis.
|
[***]
|
Security Management Roles and Responsibilities
|
[***]
|
7. Promptly informing Customer if Provider becomes aware of any vulnerability or weakness in the Services or any Security Incident and participate in discussions related to a possible solution or mitigation.
|
[***]
|
8. Complying with Customer security and safety policies, standards and procedures at Customer Facilities, as they may be revised or updated.
|
[***]
|
9. Recommending supplemental physical security standards to increase the overall level of security at Customer Facilities.
|
[***]
|
10. When noted, recommending supplemental physical security provisions at Customer Facilities.
|
[***]
|
11. Complying with Customer Policies, including data and records management and electronic records and data archiving.
|
[***]
|
12. Provide to Provider Customer Policies related to data and records management and electronic records and data archiving.
|
[***]
|
13. Supporting security administration process with Customer’s and Third-Party Supplier(s)’s physical security administration processes, where the processes interact.
|
[***]
|
14. In Service Locations, comply with Provider’s security processes.
|
[***]
|
15. Performing Provider’s physical security functions (for example, identification badge controls, and alarm responses) at Service Locations from which Services are being performed.
|
[***]
|
16. Provider will provide logical security administration to maintain authorized access to IT data.
|
[***]
|
17. Establishing and maintaining mechanisms to safeguard against Security Incidents in accordance with
Schedule 9
(Information and System Security Requirements) and the Customer Security Document.
|
[***]
|
18. Implementing an information security approach that follows a resource-ownership concept for security, for certifying owners, and for periodically reviewing authorized access for computer users.
|
[***]
|
19. Researching System security Problems for infrastructure or Applications under the control of Provider. Provider will remediate all such problems on Provider Equipment and will remediate all such problems on Customer Equipment per Customer’s instructions.
|
[***]
|
Security Management Roles and Responsibilities
|
[***]
|
20. Managing and administering access to the Provider-operated Customer Systems and Customer Data; such management and administration will: allow Customer IT security read-only rights related to such Provider-operated Customer Systems regarding the Services, including access to audit trails and logs; allow Customer to retain authority for approval of data and System access requirements; provide such entities and persons as Customer informs Provider access to the Provider-operated Customer Systems; follow Customer’s instructions and the procedures regarding such access as in accordance with
Article 14
(Audits) of the MSA; maintain security rules and access rights in accordance with
Schedule 9
(Information and System Security Requirements) and the Customer Security Document.
|
[***]
|
21. Reviewing documented information security procedures with Customer pertaining to the Provider-operated Customer Systems.
|
[***]
|
22. Developing, maintaining, updating, and implementing security procedures with Customer’s review and approval, including physical access strategies and standards.
|
[***]
|
23. Assisting in the development and utilization of an action plan and escalation procedures to be set forth in the PIM for any Security Incidents in accordance with the
Schedule 9
(Information and System Security Requirements) and the Customer Security Documentand reporting any Security Incidents to Customer, and escalating within Provider’s and Customer’s organizations, in accordance therewith.
|
[***]
|
24. Monitoring users of the Systems and Services for authorized access, reviewing, and deciding which users need to be removed and reporting that to Provider.
|
[***]
|
25. Timely responding and promptly removing those users who Customer identifies as no longer having authorized access.
|
[***]
|
26. Promptly identify to Customer security risks associated with the Services.
|
[***]
|
27. Notifying Customer, and escalating within Provider’s and Customer’s organizations, in the event of a Security Incident in accordance with the PIM.
|
[***]
|
28. Conducting periodic reviews, as appropriate, to validate that Provider employee access to programs and libraries is appropriate for Provider-operated Customer Systems.
|
[***]
|
29. Conducting periodic reviews, as appropriate, to validate that Customer employee access to programs and libraries is appropriate for Provider-operated Customer Systems.
|
[***]
|
30. Running monthly reports to identify to Customer those accounts that should be removed on Systems for Provider operated Customer Systems.
|
[***]
|
31. Capturing data regarding routine access and exceptions for audit trail purposes and making such data available to Customer upon request.
|
[***]
|
32. Performing security audits, providing Incident investigation support, and initiating corrective actions as part of the Change Management process to minimize and prevent Security Incidents.
|
[***]
|
Security Management Roles and Responsibilities
|
[***]
|
33. After obtaining Customer’s written approval, installing, updating, and maintaining Software that will provide security monitoring, alarming, and access-tracking functionality for Provider-operated Customer Systems.
|
[***]
|
34. Security access control tools for data, Software, and Networks in compliance with Customer Policies, standards and procedures, and maintaining such security and access control devices in proper working order.
|
[***]
|
35. Implementing and maintaining a set of automated and manual processes designed to enforce Customer Policies.
|
[***]
|
36. Establishing policies and processes for assigning, resetting, and disabling IDs and passwords used for data or System access.
|
[***]
|
37. Executing password and ID management, in accordance with Customer Policies,
e.g.
Active Directory.
|
[***]
|
38. Implementing and maintaining a secure database of Provider access requests, access rights, and approval authorities.
|
[***]
|
39. Communicating with Authorized Users regarding requests for System or data access, and coordinating with Customer IT security, which authorizes access to Customer Data and Systems.
|
[***]
|
40. Running periodic reports to identify accounts that should be removed or unusual disk space usage of a particular Authorized User or group and providing timely reports to Customer IT security.
|
[***]
|
41. Coordinating System password changes and, subject to Customer’s approval.
|
[***]
|
42. Performing backup and recovery procedures in response to Security Incidents that result in lost/damaged information.
|
[***]
|
43. Responding to security audit requests from Customer and/or regulatory authorities in accordance with the provisions of
Article 14
(Audits) of the MSA.
|
[***]
|
44. Cooperating and assist with efforts by Customer and/or representatives of Customer for security tests on Customer Systems.
|
[***]
|
45. Working together with Customer to Change security in responses to evolving requirements and changing technology.
|
[***]
|
46. Maintaining safeguards against Security Incidents in accordance with
Article 17
(Confidentiality and Customer Data) of the MSA and
Schedule 14
(Data Privacy) of the MSA.
|
[***]
|
47. Supporting security administration processes with Customer’s and Third-Party Supplier(s)’ logical security administration processes, where the processes interact.
|
[***]
|
48. Supporting logical security administration process with Service Management processes, especially Incident Management, Change Management, and IT Service Continuity Management.
|
[***]
|
49. Providing Application Development and maintenance security support and advice.
|
[***]
|
50. Developing any Application functionality consistently with Customer’s security standards and procedures.
|
[***]
|
(J)
|
Service Delivery
|
(1)
|
Capacity Management
|
(a)
|
Capacity Management Services are activities to provide that the capacity of the IT Infrastructure matches the evolving demands of Customer Group in the most cost-effective and timely manner. The process encompasses the following:
|
(i)
|
Monitoring performance and throughput of the Services, Systems, and supporting IT components
|
(ii)
|
Understanding current demands and forecasting for future requirements
|
(iii)
|
Developing capacity plans which will meet Customer Group’s demand and the Service Levels
|
(iv)
|
Conducting risk assessment of capacity recommendations
|
(v)
|
Identifying financial impacts of capacity plans
|
(vi)
|
Undertaking tuning activities of the Systems and Services
|
(b)
|
The following table identifies Capacity Management roles and responsibilities that Provider and Customer perform, including:
|
Capacity Management Roles and Responsibilities
|
[***]
|
1. Capacity Management is the primary responsibility of Provider.
|
[***]
|
2. Provide input on and participate in capacity management planning.
|
[***]
|
3. Provider will apply Capacity Management to the applicable Services.
|
[***]
|
4. Formally reviewing capacity requirements as part of Customer’s normal business planning cycle.
|
[***]
|
5. Verifying that there is adequate capacity to meet the required Service Levels.
|
[***]
|
6. Managing capacity to demand for the Services.
|
[***]
|
7. Working with Customer to achieve optimal utilization of capacity.
|
[***]
|
8. Providing additional capacity or advising Customer regarding the need for additional capacity, as appropriate.
|
[***]
|
9. Monitoring resources and System performance, System utilization, capacity limits, and expected capacity needs, and recording that information.
|
[***]
|
10. Producing regular management reports, including current usage of resources, trends and forecasts, and exceptions.
|
[***]
|
11. Determining capacity requirements of new Systems to determine the necessary computer and Network resources required, and then sizing such new Systems, taking into account Equipment utilization, performance of Service Levels, and cost (minimizing cost to Customer). Changes or implementations of new Systems will be subject to the Change Control Procedures.
|
[***]
|
Capacity Management Roles and Responsibilities
|
[***]
|
12. Utilizing, and reporting on the use of such, new Equipment and Software in order to improve the efficiency and effectiveness of the process, as part of the continuous improvement and evolution of the Services.
|
[***]
|
13. Carrying out performance testing of new Systems to confirm that such Systems meet planned performance and utilization expectations and requirements.
|
[***]
|
14. As requested by Customer, or as needed to deliver the Services, proposing Service Levels that are maintainable and cost-justified.
|
[***]
|
15. Tuning Systems to achieve optimum use of Equipment, Network, and Software resources.
|
[***]
|
16. Timely resolving performance-related Incidents and Problems.
|
[***]
|
17. Performing ad hoc performance and capacity studies as requested by Customer or as needed to deliver the Services.
|
[***]
|
18. In support of Application development and maintenance activities, estimating applicable resource requirements, including impact on the capacity of the server environment, network environment, end-user computing environment, etc., as required.
|
[***]
|
19. Deploying proactive capacity management processes wherever practicable to do the following: prevent Incidents and Problems related to resource utilization from occurring; trend current System and resource utilization and estimate future utilization; validate and verify that planned changes affect only the expected resource impact.
|
[***]
|
20. Utilizing reactive capacity management (that is, responding reactively to occurrences of insufficient capacity) whenever necessary to facilitate successful performance of the Services.
|
[***]
|
21. Investigating new technology applicable to the Services and incorporating technological development, advances, and evolution into the Services and reporting on such technology upgrades/proposals. Incorporation of new technology is subject to the Change Control Procedures.
|
[***]
|
22. Aligning capacity management and Provider’s IT business plan for the Services with Customer’s Long-Range IT Plan.
|
[***]
|
23. Applying capacity management tools, data, reports, and disciplines to Incidents and Problems relating to poor performance in order to timely resolve such Incidents and Problems.
|
[***]
|
24. Aligning capacity management outputs with the Service Levels and other performance requirements documented in the Agreement.
|
[***]
|
25. Actively including capacity management in the Change management process to assess Changes for their impact on the capacity of the Systems and providing appropriate feedback to those submitting change requests.
|
[***]
|
26. Incorporating Customer work schedules, periodic business fluctuations, and dependencies between elements of the Services into capacity management planning.
|
[***]
|
27. Performing short-term demand management as required to maintain delivery of the Services during failures, spikes in demand, or other spontaneous events.
|
[***]
|
Capacity Management Roles and Responsibilities
|
[***]
|
28. In consultation with Customer, supporting demand management activities to encourage Authorized Users to make the most efficient use of the Services and assisting Customer to minimize its costs while maximizing the value it receives from the Services. Provider’s responsibilities in this regard include developing demand management models and making recommendations to dampen Authorized User demands on Systems, when requested by Customer.
|
[***]
|
29. Assisting Customer in forecasting Customer’s capacity requirements and monitoring, validating and reporting to Customer the capacity forecast against Customer’s actual utilization.
|
[***]
|
30. Proactively developing and delivering to Customer forecasts of growth and other changes in response to the projected Customer business and operational needs disclosed by Customer to Provider on an annual basis, or more frequently as Customer may reasonably require.
|
[***]
|
31. Working with Customer to maintain knowledge base of future demand for the Services and estimating the effects of demand on Service Levels.
|
[***]
|
32. Reviewing Customer’s IT strategies, IT plans, and IT financial plans and validating that capacity management requirements align with those plans and, to the extent such alignment does not exist, work with Customer in order to bring about such alignment.
|
[***]
|
33. On an agreed schedule, or as requested by Customer, revising the capacity planning model based on actual performance.
|
[***]
|
34. Using appropriate types of modeling in support IT planning and capacity and utilization studies; such modeling could include: estimates based upon experience and current and historical resource utilization experience; pilot projects; prototype development; analytical modeling; simulation modeling; baseline models; trend analysis; forecasting.
|
[***]
|
35. Participate as needed in Customer’s business capacity management planning processes.
|
[***]
|
36. Producing and updating the capacity plan in conjunction with Customer’s IT business planning cycle.
|
[***]
|
37. Provide capacity planning recommendations based on business needs to Provider.
|
[***]
|
38. Incorporate Customer’s capacity planning recommendations into Provider’s annual plan. Provider will include the Capacity Plan in Provider’s annual publication of the IT business plan.
|
[***]
|
39. Updating Provider’s capacity management information in a timely manner with the technical specifications of newly acquired Configuration Items (“
CIs
”), changed CIs, Service performance requirements, planned workloads and demands to be placed upon the IT resources, and any other relevant information. at least twice-yearly, sampling the Provider’s capacity management information to ensure the correctness of the data contained therein and provide report to Customer.
|
[***]
|
40. Investigating and researching threshold breaches and near misses to determine what remedial action should be taken, then planning and performing such remedial actions through the Change Management process.
|
[***]
|
Capacity Management Roles and Responsibilities
|
[***]
|
41. Employing regular monitoring, identification of exceptions, and manual review of reports and trends.
|
[***]
|
42. Maintaining an understanding of the capacity and utilization of each of the IT components that Provider manages, including Equipment, Software licenses, and voice and data circuits.
|
[***]
|
43. As necessary to provide optimum resource usage (Equipment, Software, circuits, etc.) in the delivery of the Services, installing Equipment and Software monitors, properly configuring those monitors, and collecting the resultant data.
|
[***]
|
44. Upon request, estimating the resource and utilization effects of planned changes.
|
[***]
|
45. Reactively responding to Incidents and Problems that are caused by a lack of resource or an inefficient use of a resource.
|
[***]
|
46. Proactively identifying components that are susceptible to failure and recommending cost-effective solutions for Customer’s consideration and possible approval.
|
[***]
|
(2)
|
Availability Management
|
(a)
|
Availability Management Services are the activities associated with tuning Service components for maximum availability of Services.
|
(b)
|
The following table identifies Availability Management roles and responsibilities that Provider and Customer will perform, including:
|
Availability Management Roles and Responsibilities
|
[***]
|
1. Optimizing the capability of the Infrastructure and Services by collecting, monitoring, analyzing, and reporting on key elements of Availability and then initiating Change through the Change Control Procedures when required, necessary to meet the Service Level requirements for Availability.
|
[***]
|
2. Determining Availability requirements in business terms.
|
[***]
|
3. Provide requirements on expected performance levels of Availability and security to Provider.
|
[***]
|
4. Designing for expected Service Levels of Availability and security.
|
[***]
|
5. Develop Availability plans.
|
[***]
|
6. Review and approve Availability plans.
|
[***]
|
7. Implement approved Availability plans.
|
[***]
|
8. Continuously reviewing and improving Availability.
|
[***]
|
9. Operating and maintaining an Availability management process to plan, implement, measure, and manage the Availability and the general reliability of the Services to confirm that the levels of Availability and reliability consistently meet Customer’s IT requirements and objectives.
|
[***]
|
10. Integrating Provider’s Availability management process with Customer’s and/or Customer’s Third-Party Supplier’s Availability management processes, where the processes interact.
|
[***]
|
Availability Management Roles and Responsibilities
|
[***]
|
11. Integrating the Availability management process with other Service management processes, including Incident management, Change management, Service capacity management, and IT Service continuity management.
|
[***]
|
12. Providing the levels of Availability and reliability of the Services in compliance with the Service Levels. Provider will provide an IT Infrastructure architecture that allows the introduction of new layers of complexity that does not compromise overall reliability.
|
[***]
|
13. Producing Availability and reliability impact assessments with respect to change request and work orders.
|
[***]
|
14. Cooperating with Customer and its Third-Party Supplier(s) to provide Availability and reliability of the Services to Authorized Users in accordance with the Service Levels.
|
[***]
|
15. Retaining at least twenty-four (24) months of Availability and reliability data to enable trend analysis and making such data available to Customer.
|
[***]
|
16. Providing early warning or advice to Customer of potential or actual Availability and reliability issues. Provider will provide additional advice as the potential threat to Availability or reliability increases and as the threat becomes more imminent. Work diligently to remediate all such threats.
|
[***]
|
17. Providing regular reporting of Service outages related to the Services that affect Authorized Users irrespective of where the outage occurred.
|
[***]
|
18. Providing a monthly report in a format agreed upon with Customer that, at a minimum, provides a comparison of performance and Availability; providing a list of outages, linked to an Incident, including the date and time the outage commenced, its duration, and the affected infrastructure and Applications; providing trend analysis of the performance for critical Services and the Applications supported by the critical Services (the “
Critical Applications
”) during the thirteen (13) most recent months; reporting on proposed preventative maintenance activities.
|
[***]
|
19. Providing Customer with recommendations of preventative maintenance options and implementing any such preventative options approved by Customer pursuant with the Change Control Procedures.
|
[***]
|
(3)
|
Service Continuity Management
|
(a)
|
Service Continuity Management Services are the activities required to provide prioritized Service Continuity for Customer, including Applications, and their associated infrastructure (
e.g.
, CPU, servers, network, data and output devices, End-User Devices) and associated Voice and data Networks.
|
(b)
|
The following table identifies Service Continuity Management roles and responsibilities that Provider and Customer will perform, including:
|
Service Continuity Roles and Responsibilities
|
[***]
|
1. Customer will retain responsibility for its business continuity plans and management activities and will approve Provider’s activities in advance.
|
[***]
|
(K)
|
Service Support
|
(1)
|
Incident Management
|
(a)
|
Incident Management Services include the activities associated with restoring normal Service operation as quickly as possible and minimize the adverse impact on Customer business operations, thus ensuring that the best possible levels of Service quality and availability are maintained.
|
(b)
|
The following table identifies Incident and Problem Management roles and responsibilities that Provider and Customer will perform, including:
|
Incident Management Roles and Responsibilities
|
[***]
|
1. Providing an Incident management process that will restore Service operation as quickly as possible with minimum disruption to the business, thus enabling the best achievable levels of availability and Service quality to be maintained to promote Authorized User satisfaction.
|
[***]
|
2. When an Incident occurs, restoring Service as quickly as possible with minimal business impact.
|
[***]
|
3. Implementing an Incident management process that is flexible and facilitates effective communication and coordination across functions, Customer Facilities, regions and Third-Party Suppliers.
|
[***]
|
4. Integrating Provider’s Incident management process with the Customer’s Service management processes, including Problem Management, Configuration Management, and Change Management.
|
[***]
|
5. Validating that the Incident management process provides an audit trail that meets Customer’s requirements, including; recording detailed audit information of the activity that creates, changes, or deletes data and user access to Systems that contain Customer Data; providing end-to-end traceability even when transactions span across multiple Applications, Systems components, or parties.
|
[***]
|
6. Communicating the Incident management process to Provider’s organization, Customer, and each Third-Party Supplier involved in the delivery of IT Services.
|
[***]
|
7. Facilitating and leading information exchange between and among Provider, Customer, and/or Third-Party Suppliers to improve end-to-end Incident management.
|
[***]
|
8. Developing and documenting processes regarding interfaces, interaction, and responsibilities between Level 1 support personnel, Level 2 support personnel, and other internal or external persons or entities that may either raise an Incident, act on an Incident, or receive an Incident.
|
[***]
|
Incident Management Roles and Responsibilities
|
[***]
|
9. Wherever possible, designating end-to-end responsibility and ownership for each Incident to a single Provider Service Desk staff member, thus minimizing redundant contacts with the Authorized User.
|
[***]
|
10. Providing a mechanism for expedited handling of Incidents that are of high business priority to Customer and/or Third-Party Suppliers, based on the assigned Severity Level, as per escalation processes described in the Incident and Problem management procedures.
|
[***]
|
11. Use Customer’s existing ServiceNow tools in order to provide real-time visibility of data records associated with Incidents, including Service Requests to Customer and other Third-Party Suppliers.
|
[***]
|
12. Receiving and logging Incidents (including submissions received by telephone, electronically, or other means approved by Customer) and opening an Incident record.
|
[***]
|
13. Providing Incident detection, reporting, recording, and initial support.
|
[***]
|
14. Providing Incident investigation, diagnosis, impact analysis, and reclassification as required.
|
[***]
|
15. Utilizing and timely updating the Incident management System with complete and relevant information relating to an Incident.
|
[***]
|
16. Making an initial determination of the potential resolution.
|
[***]
|
17. Prioritizing and escalating Incidents from VIP users.
|
[***]
|
18. Linking multiple contacts pertaining to the same Incident to the associated Incident record.
|
[***]
|
19. Linking multiple Incidents pertaining to the same Service Request to the associated Service Request.
|
[***]
|
20. Resolving as many Incidents as possible during the Authorized User’s initial contact with the Service Desk, without transferring the call or using any escalation.
|
[***]
|
21. Resolving Incidents that are resolvable by Level 1 support and closing the Incident, including Service Requests, after receiving confirmation from the affected Authorized User that the Incident has been resolved.
|
[***]
|
22. Resolving Incidents arising from or related to the Services, including break/fix Equipment and Software support.
|
[***]
|
23. Acting proactively and coordinating with other parties (whether Parties or third parties) as needed in order to resolve Incidents and action Service Requests.
|
[***]
|
24. Transferring Incidents within specified time limits to the appropriate party without compromising Service Levels or security requirements.
|
[***]
|
25. Providing or coordinating the Resolution of Incidents.
|
[***]
|
26. Escalating issues to the appropriate levels for Resolution in accordance with escalation procedures approved by Customer.
|
[***]
|
27. Escalating an Incident where the Incident cannot be resolved within the relevant Service Levels or otherwise agreed timeframe.
|
[***]
|
Incident Management Roles and Responsibilities
|
[***]
|
28. Closing an Incident, including Service Requests, only after receiving confirmation from the affected Authorized User that the Incident has been resolved.
|
[***]
|
29. Restoring normal Service operations as quickly as possible following an Incident, with minimum disruption to Customer’s business operations, and in compliance with Service Levels.
|
[***]
|
30. Retaining overall responsibility and ownership of Incidents until the Incident is closed subject to the Incident management process defined in the PIM.
|
[***]
|
31. Tracking and reporting the progress of Resolution efforts and the status of Incidents Provider is responsible for, including: reviewing the proposed resolution time for each Incident with the appropriate party and updating the status accordingly; coordinating Incident tracking efforts, and providing and maintaining regular communications between parties and Authorized Users until Incident resolution; keeping Customer informed of changes in Incident status throughout the Incident life cycle in accordance with agreed Service Levels; keeping Customer informed of anticipated Resolution times for active Incidents.
|
[***]
|
32. Leveraging a knowledge base to assist with the Resolution of Incidents and the processing of Service Requests, including: making the knowledge base available online to Authorized Users for user self-help. Tracking the use of the knowledge base and reporting usage statistics to Customer on a monthly basis, or as requested by Customer (for example, the number of Incidents resolved using the knowledge base).
|
[***]
|
33. Where Incidents relate to Assets, updating details in the Asset Inventory and Management System and the CMDB, or coordinating with the relevant process to confirm updates are made.
|
[***]
|
34. Performing the same functions and assuming the same responsibilities for Service Requests as required for Incident Management, including: tracking and managing Service Requests from Authorized Users; resolving Service Requests by working with Service management teams, business owners, and Third-Party Supplier(s); and providing liaison with Change Management to confirm that Service Requests follow the Change Management procedures, as appropriate.
|
[***]
|
35. Recording the Incident and opening an Incident record.
|
[***]
|
36. Transferring the Incident to the appropriate person or entity for resolution or to provide guidance.
|
[***]
|
37. Continuing to work toward resolution of the relevant part(s).
|
[***]
|
38. Transferring the remaining part(s) to the Service Desk, without compromising relevant Service Levels.
|
[***]
|
39. Providing status updates to Authorized User within agreed Service Levels.
|
[***]
|
40. Escalating unresolved Incidents according to procedures approved by Customer, and prioritizing high-impact Applications, Software, Equipment and Services, such that they are treated with the highest priority.
|
[***]
|
Incident Management Roles and Responsibilities
|
[***]
|
41. Implementing escalation procedures that reflect and describe the Incident, including: Severity Level of the Incident; location of the Incident and the name and/or number of affected Authorized Users; elapsed time before an Incident is escalated to the next higher Severity Level; The levels of involvement (and notification) of Provider management and Customer management at each Severity Level; investigative and diagnostic activities to identify workarounds for each Incident; Incident resolution activities to restore normal Service in compliance with the relevant Service Levels; ability to resolve Incidents by matching Incidents to known errors that are stored in a Known Error Database; ability to resolve Incidents by implementing workarounds that are stored in a knowledge base; escalation process used to escalate Incidents to appropriate support teams when necessary; escalation process used to escalate Incidents to Provider’s and/or Customer’s management team; ability to generate Change requests where necessary for the implementation of workarounds; ability to generate a Problem from an Incident; ability to record information on the details of the Incident and the corrective action for later statistical analysis as part of the Problem Management process.
|
[***]
|
42. Creating an audit trail of activity that creates, changes, or deletes data and user access to Systems that contain Customer Data and end-to-end traceability across Applications, Systems, and parties.
|
[***]
|
43. Maintaining a central knowledge database used to capture, store, and retrieve information and solutions for reuse by Provider Staff, Third-Party Supplier(s), and Authorized Users. This knowledge database will enable the sharing of policies, procedures, best practices, and methods to resolve Incidents among Provider Staff, Third-Party Suppliers(s), and Authorized Users.
|
[***]
|
44. Regularly updating the Incident Management System (including the central knowledge database) with Provider solutions and best practices as they are developed, including updates based on “lessons learned” and experience with similar technologies and problems for other customers.
|
[***]
|
45. Allowing Customer to monitor and view the knowledge database on an ongoing basis (including Authorized Users).
|
[***]
|
46. Limiting access to the Incident Management Systems to the agreed levels for the type of Authorized Users who require access to the Systems.
|
[***]
|
47. Providing Provider, at Customer’s expense, with appropriate licenses and/or interfaces to use the ServiceNow (or any replacement thereof).
|
[***]
|
48. Providing regular progress notifications to Customer on current Priority Level 1, Priority Level 2, Priority Level 3, and Priority Level 4 Incidents and, as necessary, through any follow-up communication and work required post-Resolution. The frequency of such notification is determined by the severity of the Incident in accordance with the PIM.
|
[***]
|
Incident Management Roles and Responsibilities
|
[***]
|
49. Providing regular progress notifications to the Service Desk on Incidents raised by VIP users, with the frequency of such notification in accordance with relevant Service Levels and Customer requirements.
|
[***]
|
50. Providing prompt notification to Customer of System outages on Systems Customer designates as critical and otherwise providing affected Authorized Users with regular and timely progress updates that clearly indicate information about the Incident including: nature of the Incident; estimated time to completion; potential short-term alternatives.
|
[***]
|
51. Providing the monthly report in electronic copy in a format agreed to with Customer, which at a minimum includes: key issues relating to Incident Management; number of Incidents during the month, grouped by severity, Service, region, and classification; list of Incidents, short description, reference number, and a shortcut to detailed description; detailed description, including timing of activities; links to Problems and the Known Error Database; trend analysis of the Incidents reported during the thirteen (13) most recent months.
|
[***]
|
52. Calculating statistics and providing monthly reports to Customer, which include: sources of the Incidents; frequency regarding the types or categories of Incidents; the duration of open Incident (average and quantities by age); number of Incidents resolved upon first contact; the Service Desk call-abandoned rate.
|
[***]
|
53. Provide information regarding Incident resolution, including Service Level measurement reporting.
|
[***]
|
(L)
|
Problem management
|
(1)
|
Problem Management Services also include minimizing the adverse impact of Incidents and related Problems on the business of Customer Group that are caused by errors in the IT infrastructure, and to prevent the recurrence of Incidents related to those errors. In order to achieve this goal, Problem Management seeks to get to the root cause of Incidents and then initiate actions to improve or correct the situation.
|
(2)
|
The following table identifies Problem Management roles and responsibilities that Provider and Customer will perform, including:
|
Problem Management Roles and Responsibilities
|
[***]
|
1. Determining the root cause of the Incidents comprising a Problem, and then initiating actions to improve or correct the situation.
|
[***]
|
2. Using a Problem Management process to reduce the recurrence of Incidents.
|
[***]
|
3. Communicating the Problem Management process within the Provider organization and to each Third-Party Supplier(s).
|
[***]
|
4. Integrating Provider’s Problem Management process with its other Service management processes, especially Incident Management, Configuration Management, and Change Management.
|
[***]
|
Problem Management Roles and Responsibilities
|
[***]
|
5. Managing the effective entry of data into Problem Management Systems and escalating to Customer for prioritization and approval, including: Providing Customer the ability to enter Problem tickets directly into the Problem Management System; Supporting the effective execution of root-cause analysis.
|
[***]
|
6. Managing and resolving any deviation from the effective management of Problems.
|
[***]
|
7. Facilitating information exchange between and among Provider and Third-Party Supplier(s), which will drive continued improvement in Problem Management.
|
[***]
|
8. Conducting regularly scheduled Problem Management meetings to prioritize the resolution of Problems. Providing single point of contact, or designated assignee, for each Problem.
|
[***]
|
9. Survey Incidents to identify reoccurring Problems.
|
[***]
|
10. Validating that Problem resolution and corrective actions taken are sufficient to confirm that root causes identified do not reoccur in same or similar environments regularly. This includes updating manuals, procedures, and other Documentation.
|
[***]
|
11. Verifying Provider and Third-Party Supplier(s) are implementing corrective actions identified above in accordance with the PIM.
|
[***]
|
12. Escalating to appropriate management within Provider and Third-Party Supplier(s) if corrective actions are not being closed.
|
[***]
|
13. Documenting and publishing Problem Management meetings status reports to Customer, Provider, and necessary Third-Party Supplier(s) key resources; recording Problem Management status in the IT Service management (ITSM) system, which as of the Effective Date is ServiceNow.
|
[***]
|
14. Updating the knowledge database with relevant information, including documented workarounds for known Problems.
|
[***]
|
15. Performing trend analyses on the volume and nature of Problems in order to identify areas for improvement and reporting on the trend analyses and improvements to Customer and Third-Party Supplier(s) on at least a quarterly basis.
|
[***]
|
16. Developing tools/scripts and enhancing processes to proactively perform Problem Management, with the objectives of automating the Problem Management process and predicting Problems before they occur.
|
[***]
|
17. Implementing measures to avoid unnecessary reoccurrence of Problems.
|
[***]
|
18. Coordinating Problem tracking efforts and notifications to the Service Desk and Third-Party Supplier(s); and maintaining regular communications between parties until problem resolution.
|
[***]
|
19. Managing Problems in accordance with consistent and agreed classification and prioritization criteria.
|
[***]
|
20. Retaining overall responsibility and ownership of Problems until the Problem is closed subject to Customer approval.
|
[***]
|
Problem Management Roles and Responsibilities
|
[***]
|
21. Updating the Problem Management System (including the knowledge database) with Provider solutions and best practices as they are developed, including updates based on “lessons learned” and experience with similar technologies and problems for other customers.
|
[***]
|
22. Maintaining access to Problem Management information and ability to write reports.
|
[***]
|
23. Providing a monthly report in a format approved by Customer. This report includes: the number of Problems in total and grouped by type, severity, status and whether a known error; Problem reviews; Problem trend analysis findings; issues relating to the Problem Management Service, such as any other information that may improve or facilitate a better Problem Management process, including decisions to be made by Customer and Provider; trend analysis of Problems reported during the thirteen (13) most recent months; Communication and Notification.
|
[***]
|
24. Maintaining communications and providing reports through the Service Desk to Customer and affected Authorized Users and, as necessary, to Third-Party Supplier(s) from the time a Problem is identified through resolution. As necessary, also providing any follow-up communications and reporting work required post-resolution.
|
[***]
|
25. Tracking and reporting any backlog of unresolved Problems on at least a monthly basis to the Problem Manager, or more frequently as requested by Customer.
|
[***]
|
26. Providing the Problem Management team with monthly and ad hoc electronic reports on Problems including: statistics on total numbers of Problems; outstanding Problems; Resolution time; chronic outages; performance; and Problem trend analysis.
|
[***]
|
(M)
|
Configuration Management
|
(1)
|
Configuration Management Services are activities that provide a logical model of the infrastructure by identifying, controlling, maintaining, and verifying installed Software, Equipment, and infrastructure, including networks, websites and databases versions to account for IT Assets and configurations, provide accurate information on configurations and provide a sound basis for Incident, Problem, Change Management and Release Management and to verify configuration records against the infrastructure and correct any exceptions.
|
(2)
|
The following table identifies Configuration Management roles and responsibilities that Provider and Customer will perform, including:
|
Configuration Management Roles and Responsibilities
|
[***]
|
1. Maintain a CMDB that contains details of the elements that are used in the provision and management of its IT Services and which contains information that relates to the maintenance, movement, and problems experienced with the CIs.
|
[***]
|
Configuration Management Roles and Responsibilities
|
[***]
|
2. Maintaining a Configuration Management process including in accordance with the PIM, that will include; Maintaining accurate configuration data for the CIs — including operations documents, Equipment, Software and Applications — used to provide the Services; verifying that only authorized and identifiable CIs — including operations documents, Equipment, Software and Applications — are accepted and recorded from receipt to disposal; based on the capability of the CMDB platform reproducing the configuration status of the CIs — including operations Documentation, Equipment, Software and Applications — at any point in time throughout its life cycle; conducting reviews and sampling to verify the physical existence of CIs — including operations documents, Equipment, Software, and Applications — and checking that they are correctly recorded in the CMDB; producing and maintaining current Equipment, Software, and Applications architecture and design Documentation for issue to Customer upon request.
|
[***]
|
3. Integrating the Provider’s Configuration Management process with Customer’s and Third-Party Supplier(s)’ Configuration Management processes, where the processes interact, as defined in the PIM.
|
[***]
|
4. Integrating the Configuration Management process with Service management processes, including Incident Management, Problem Management, Change Management, and Release Management as defined in the PIM.
|
[***]
|
5. Using the Configuration management process to identify, control, maintain, and verify the CIs (CIs) approved by Customer as comprising the Equipment, Software, and Applications to provide the Services as defined in the PIM.
|
[***]
|
6. Verifying that CIs approved by Customer for the Equipment, Software, and Applications are incorporated into Customer’s CMDB as defined in the PIM.
|
[***]
|
7. For each Customer-approved CI, using at least the attributes specified by Customer.
|
[***]
|
8. Validating that change to any CI record in the CMDB is the result of an approved Request for Change, including: Validating the integrity and currency of the CMDB by validating the content of the CMDB against the CIs that provide the Services; and If a discrepancy is found, taking corrective action through the Incident Management process as defined in the PIM.
|
[***]
|
9. Maintaining the CMDB to meet performance standards, to maximize efficiency, and to minimize outages, as necessary.
|
[***]
|
10. Provide CMDB physical database management support, including providing backups and restores of data in a timely manner.
|
[***]
|
11. Install, maintain, and support CMDB-related database Software products.
|
[***]
|
12. In the event of unusual activity, correct situations caused by lack of CMDB capacity in a timely manner (such as dataset or table space capacity events, full log files, etc.).
|
[***]
|
Configuration Management Roles and Responsibilities
|
[***]
|
13. Validate synchronization and currency of the CMDB and Active Directory by continually validating the content of the Active Directory components of the CMDB against the content of the relevant Active Directory.
|
[***]
|
14. Testing and implementing CMDB database environment changes, as approved by Customer.
|
[***]
|
15. Validating synchronization and currency of the CMDB and Active Directory by validating the content of the Active Directory components of the CMDB against the content of the relevant Active Directory.
|
[***]
|
16. In accordance with the PIM, taking corrective action through the Incident Management process if a physical sample identifies any deficiency in the accuracy or completeness of the records in the CMDB.
|
[***]
|
17. Scope of CMDB includes non-production environments, including pre-deployed CI’s
|
[***]
|
18. Verifying release and configuration Documentation before Changes are made to the live environment.
|
[***]
|
19. Maintaining a secure audit trail of CMDB transactions.
|
[***]
|
20. Customer will retain access to information in the CMDB and be able to write reports on this data.
|
[***]
|
(N)
|
Change Management
|
(1)
|
Change Management Services are activities that are to ensure that standardized methods and procedures are used for efficient and prompt handling of changes, in order to minimize the impact of change upon Service quality and consequently to improve the day-to-day operations of Customer Group. Change Management covers aspects of managing the introduction and implementation of changes affecting Services and in any of the management processes, tools, and methodologies designed and utilized to support the Service components. The Change Management process includes the following process steps:
|
(a)
|
Request process
|
(b)
|
Recording/tracking process
|
(c)
|
Prioritization process
|
(d)
|
Responsibility assignment process
|
(e)
|
Impact/risk assessment process
|
(f)
|
Review/approval process
|
(g)
|
Implementation process
|
(h)
|
Verification (test) process
|
(i)
|
Release process
|
(j)
|
Closure process
|
(2)
|
The following table identifies Change Management and Release Management roles and responsibilities that Provider and Customer will perform:
|
Change Management Roles and Responsibilities
|
[***]
|
1. Communicating the Change Management process within the Provider’s own organization and to each Third-Party Supplier(s).
|
[***]
|
2. Validate the Change Management process complies with Customer’s Software quality standards and requirements.
|
[***]
|
3. Provide Software quality standards and requirements.
|
[***]
|
4. Align the Change Management process with Customer’s IT processes for new hardware/Software requests and Projects.
|
[***]
|
5. Provide requirements for IT processes for new hardware/Software requests and Projects.
|
[***]
|
6. Verifying that the effective execution of the Change Management process, as well as an appropriate review of planned changes, takes place with due consideration of the business and technology risk of planned changes, taking into consideration all defined criteria (such as complexity of change, the skill level of the individual(s) executing the change, the planned change execution timeframe, the change slot timeframe, the back-out timeframe, and the relevant business processing criticality).
|
[***]
|
7. With proper authorization, stopping any planned changes that, in the professional view of the person(s) performing the Services, would compromise the continuation of Services to Customer, and act as the gatekeeper to production, unless expressly overridden by Customer’s Operations Manager in accordance with the approved Change Advisory Board escalation process, and assuming responsibility for escalating any issues arising from the decision to stop a planned change.
|
[***]
|
8. Managing and conducting the review of any change failures and providing a strong interlock between Change Management and Incident Management and Problem Management processes so that post-change issues can be linked to the change activity where relevant.
|
[***]
|
9. Managing to Resolution any deviation from effective Change Management process, providing review and closure of failed changes.
|
[***]
|
10. Facilitating and leading information exchange between and among the Provider and the Third-Party Suppliers in order to drive an effective Change Management Process.
|
[***]
|
11. Not making changes that (a) may adversely affect the function or performance of, or decrease the resource efficiency of the Services, (b) increase Customer’s costs or fees, or (c) impact the way in which Customer conducts its business or operations, without obtaining prior Customer approval via the Change Advisory Board (CAB).
|
[***]
|
12. Approve or reject, via Change Advisory Board (CAB). Changes that may (a) adversely affect the function or performance of, or decrease the resource efficiency of the Services, (b) increase Customer’s costs or fees, or (c) impact the way in which Customer conducts its business or operations.
|
[***]
|
Change Management Roles and Responsibilities
|
[***]
|
13. Raising and recording changes.
|
[***]
|
14. Assessing the impact, costs, benefit, and risk of the proposed changes.
|
[***]
|
15. Providing and maintaining compliance with Customer policies.
|
[***]
|
16. Provide Customer Polices and maintain compliance with said polices.
|
[***]
|
17. Confirming business justification and obtaining approval.
|
[***]
|
18. Performing changes in Customer’s IT environment pertaining to the Services, including changes to individual components and coordination of changes across components.
|
[***]
|
19. Making changes in accordance with Change Management processes approved by Customer and documented in the PIM.
|
[***]
|
20. Monitoring and reporting on the change implementation.
|
[***]
|
21. Reviewing and closing changes.
|
[***]
|
22. Cooperating with the Service Desk and Third-Party Supplier(s) for changes across Applications, System components, and parties.
|
[***]
|
23. Participate in changes that are cross-Application, System components, or parties.
|
[***]
|
24. Integrating the Change Management process with its other Service management processes, including Incident Management, Problem Management, Configuration Management, and IT Service Continuity Management.
|
[***]
|
25. Collecting data on every change attempted, including: the reason for change; detailed description of change; the cause of any Incidents; measures taken to prevent recurrence; and whether the change was successful from the perspective of the Authorized Users of the System or Third-Parties affected by the change.
|
[***]
|
26. Summarizing the changes made each week and reporting the information to Customer on a weekly basis.
|
[***]
|
27. Capturing Customer change data centrally.
|
[***]
|
28. Providing an audit trail of changes to the production environment in order to determine the change made and the authorization to make the change.
|
[***]
|
29. Conducting Post Implementation Reviews (PIR) on changes as requested by Customer.
|
[***]
|
30. Maintain a standardized method and procedure for the efficient and effective handling of changes (an overall Change Management process), in a way that minimizes risk exposure and maximizes availability of the Services in accordance with the Change Management process in the PIM.
|
[***]
|
31. Manage and lead Change Advisory Boards (CAB).
|
[***]
|
32. Coordinating Change Management activities across functions, Customer’s Facilities, regions, and Third-Party Supplier(s) that provide services to Customer.
|
[***]
|
33. Participate in Change Management activities across functions, Customer’s Facilities, regions, and Third-Party Supplier(s) that provide services to Customer.
|
[***]
|
34. Making any changes necessary to provide the Services and to meet required Service Levels, in accordance with the PIM.
|
[***]
|
Change Management Roles and Responsibilities
|
[***]
|
35. In an emergency, gaining approvals from the Change Advisory Board Emergency Committee, according to Change Management process.
|
[***]
|
36. Perform Provider responsibilities in the Change Management process in accordance with the PIM and responsibilities laid out in the change request.
|
[***]
|
37. Perform Customer responsibilities in the Change Management process in accordance with the PIM and responsibilities laid out in the change request.
|
[***]
|
38. On a weekly basis, participating in Change Management meetings with Customer’s Change Manager or designee.
|
[***]
|
39. Submit proposed changes in advance to Customer in accordance with the change requirements set out in the Change Management process in the PIM.
|
[***]
|
40. Reviewing proposed changes and schedules with Customer and obtaining necessary approvals for proposed changes.
|
[***]
|
41. Coordinating with Customer affected Third-Parties and designated representatives at Facilities potentially affected by a change in order to minimize disruption of normal business processes.
|
[***]
|
42. Controlling System changes and activities required by moves, upgrades, replacements, migrations, and so forth.
|
[***]
|
43. Including rollout, testing, and roll-back plans for change requests.
|
[***]
|
44. Providing information to Customer in accordance with Customer’s Change Management process on the outcome of any request for change and the updated status after each change is implemented.
|
[***]
|
45. Updating operational and other Documentation affected by the change.
|
[***]
|
46. Reporting the status of scheduled changes, including maintaining a comprehensive list of Projects and dates.
|
[***]
|
47. Report that status of scheduled changes to the Services.
|
[***]
|
48. Conducting Post Implementation Reviews (PIR) on changes.
|
[***]
|
49. Implementing standard operating procedures in the PIM for standard changes, where appropriate.
|
[***]
|
50. Performing routine maintenance during regular periods scheduled in advance and approved by Customer.
|
[***]
|
51. Validating that Systems will be unavailable during maintenance windows only to the extent necessary for Systems maintenance purposes.
|
[***]
|
52. Providing prior notice to Customer of the maintenance to be performed during scheduled maintenance windows in accordance with the PIM. Changing scheduled maintenance windows at Customer’s request and upon reasonable notice.
|
[***]
|
53. Scheduling outages for maintenance, expansions, and modifications during hours that meet Customer’s business needs. Allowing Customer, at any time at its discretion, to specify “freeze” periods during which the Provider will not make any Changes.
|
[***]
|
54. If there is a need for emergency Systems maintenance, providing Customer with as much notice as reasonably practicable, and performing such maintenance so as to minimize interference with the business and operational needs of Customer.
|
[***]
|
55. Fully testing changes to the environment and resolving faults, if possible, prior to production startup, including inter-operability testing.
|
[***]
|
Change Management Roles and Responsibilities
|
[***]
|
56. Creating and maintaining a forward schedule of change of upcoming Releases and changes as part of the Change Management process in the PIM.
|
[***]
|
57. Providing monthly Change Management reports in a format agreed with Customer.
|
[***]
|
58. Providing a weekly report in a format agreed with Customer that, at a minimum, includes: the status of Services changes active at the beginning of the week and Services changes raised during the week; the Services changes to be implemented the following week; the Services changes submitted for approval.
|
[***]
|
59. Leading regularly scheduled Change Advisory Board meetings between Customer and Third-Party Supplier(s).
|
[***]
|
60. Participating in regularly scheduled Change Advisory Board meetings between Customer and Third-Party Supplier(s).
|
[***]
|
61. Reviewing proposed changes and schedules through a formal walk-through process with Customer and Third-Party Supplier(s), and necessary approvals for proposed changes, in accordance with the PIM.
|
[***]
|
(O)
|
Release Management
|
(1)
|
Release Management Services are activities that take a holistic view of a change to a Service to ensure that technical and non-technical aspects of a release are considered together and to plan and oversee the successful rollout of Software, Equipment, and Infrastructure, including networks, websites and databases. Design and implement efficient procedures for distribution and installation of changes. The activities also provide that correct, authorized and tested versions are installed, and that changes are traceable and secure.
|
(2)
|
The following table identifies Release Management roles and responsibilities that Provider and Customer will perform, including:
|
Release Management Roles and Responsibilities
|
[***]
|
1. Communicating the Release Management process to the Provider’s Staff, other Customer IT service departments and Third-Party Supplier(s).
|
[***]
|
2. Planning and overseeing the successful roll-out of new and changed Infrastructure-Released Software, as well as associated Equipment and Documentation, per Customer’s specifications when required.
|
[***]
|
3. When required, provide Documentation specifications for roll-out of new and changed Infrastructure-Released Software, as well as associated Equipment.
|
[***]
|
4. Providing liaison with Change Management to agree on the exact content and roll-out plan for each Release.
|
[***]
|
5. Validating that items being rolled out or changed are secure and traceable via the CMDB.
|
[***]
|
Release Management Roles and Responsibilities
|
[***]
|
6. Managing Customers’ and Authorized Users’ expectations of Releases and roll-outs.
|
[***]
|
7. Attending Customer’s Release Management weekly meeting.
|
[***]
|
8. Establishing a Release and distribution process so that Changes to the Services and Infrastructure-Released Software are controlled, tested, traceable, authorized, and implemented in a structured manner.
|
[***]
|
9. Producing Release impact assessments in support of Customer Release planning.
|
[***]
|
10. Developing implementation and back-out plans for Provider-managed change requests that will be included in a Release.
|
[***]
|
11. Building, testing, implementing, and, if necessary, backing out Releases.
|
[***]
|
12. Resolving Release issues associated with Provider-executed releases.
|
[***]
|
13. Assigning a single point of contact for each requested Release.
|
[***]
|
14. Providing proper testing for Releases going into the managed environments.
|
[***]
|
15. Managing the functions and work activities associated with Release Management, including: creating Release plans, and performing tracking and oversight functions to support the plan; coordinating the design, build, and configuration of the Release; coordinating Release acceptance activities with Customer; Developing and implementing rollout plan for the Release.
|
[***]
|
16. Developing and coordinating Release communications, preparation, and training activities.
|
[***]
|
17. Assist Customer in development and coordination of Release communications and preparation and attend training activities.
|
[***]
|
18. Coordinating distribution and installation of Releases.
|
[***]
|
19. Providing updates to Customer regarding Release status.
|
[***]
|
20. Reviewing changes and enhancements with the Authorized User to obtain sign-off.
|
[***]
|
21. Maintaining a secure audit trail of Releases.
|
[***]
|
22. Providing Customer with the reports and notices detailed in the Release Management process for each Release.
|
[***]
|
23. Verifying Projects are ready to move into Production.
|
[***]
|
24. Conducting the tests on Customer’s standard suite of products including: COTS and custom-developed Applications, for compatibility; unit testing; Systems integration testing; LAN/WAN connectivity testing; load testing; Application inter-connectivity testing, which simulates Customer’s production environment provided the tools and simulated environments are available in the Customer environment.
|
[***]
|
25. Coordinating the resolution of platform-integration-related issues with Applications development.
|
[***]
|
26. Validating compliance with the quality assurance procedures.
|
[***]
|
27. Utilizing validation and testing process.
|
[***]
|
Release Management Roles and Responsibilities
|
[***]
|
28. Developing the test plan and ensuring such plan addresses operational readiness, testing of any data conversion procedures, System performance, and System reliability, as may be applicable.
|
[***]
|
29. Performing unit testing.
|
[***]
|
30. Performing stress testing, including performance and volume testing.
|
[***]
|
31. Performing System testing.
|
[***]
|
32. Performing regression testing.
|
[***]
|
33. Performing functional testing of Provider initiated releases.
|
[***]
|
34. Assist in performing functional testing.
|
[***]
|
35. Providing Application inter-connectivity testing and network connectivity/communication testing.
|
[***]
|
36. Managing uer acceptance testing (UAT).
|
[***]
|
37. Developing a user acceptance test structure to allow testing of Customer-provided test cases.
|
[***]
|
38. Implementing a matrix of user and design requirements to test cycles and scripts.
|
[***]
|
39. Coordinating user acceptance testing.
|
[***]
|
40. Completing required testing Documentation.
|
[***]
|
41. Developing and maintaining test data
|
[***]
|
42. Monitoring and reviewing production errors in order to improve test models over time.
|
[***]
|
43. Performing pilot implementation and support.
|
[***]
|
44. Logging test results for Releases except those related to UAT.
|
[***]
|
45. Logging UAT results.
|
[***]
|
46. Conducting a walk-through of test results with Customer.
|
[***]
|
47. Reviewing test results to ensure each test was both successfully executed and passed the success criteria established for that test.
|
[***]
|
48. Reviewing the stress test results to verify that the projected additional capacity fits within the projected capacity utilization.
|
[***]
|
49. Creating an Application-specific deployment guide for the transition walk-through with the Application maintenance team.
|
[***]
|
50. Providing knowledge transfer of learnings gained from the testing to the Application maintenance team.
|
[***]
|
51. Testing Applications for which the Provider has responsibility in support of Third-Party Supplier(s)’s System testing.
|
[***]
|
1.
|
DEFINITIONS
|
(1)
|
Transfer Contracts and Subsequent Transfer Contracts (each, as defined in any Resource Transfer Agreement) (to the extent such contracts relate solely to the provision of the Removed Services);
|
(2)
|
contracts which replace Transfer Contracts or Subsequent Transfer Contracts (to the extent such contracts relate solely to the provision of the Removed Services); and
|
(3)
|
other contracts, the subject matter of which is used wholly or mainly in the provision of the Removed Services,
|
(1)
|
Transfer Assets and Subsequent Transfer Assets (each, as defined in any Resource Transfer Agreement);
|
(2)
|
Provider’s Customer Site Equipment; and
|
(3)
|
other Provider Systems,
|
(1)
|
if this Agreement expires, the time of expiration;
|
(2)
|
if this Agreement is terminated, in whole or in part, the time that Customer specifies, which will be no later than the expiration of the Termination Assistance Period; and
|
(3)
|
if there is an insourcing or resourcing in respect of this Agreement, the date upon which Customer notifies Provider such insourcing or resourcing will commence.
|
2.
|
THE DISENGAGEMENT PLAN
|
2.1
|
Provider will prepare the Disengagement Plan for each SOW pursuant to
Section 20.1
(Termination Assistance Services) of the MSA and deliver it to Customer as set forth therein. The parties will agree upon the content, effectiveness, accurateness and completeness of the Disengagement Plan and the information provided therein. Provision of Termination Assistance will not be complete until all tasks and Deliverables set forth in the applicable Disengagement Plan have been completed.
|
2.2
|
Provider will notify Customer of any known or reasonably foreseeable significant risk factors relating to the transfer of any terminated Services.
|
2.3
|
Reserved.
|
2.4
|
The Parties may jointly review the draft Disengagement Plan agreed to by Customer no less than [***] months prior to the date on which the next Disengagement Plan is to be delivered by Provider pursuant to
Section 2.1
. The conduct of such review, or the absence thereof, does not affect Provider’s obligations pursuant to this Schedule.
|
2.5
|
In addition to any and all requirements set forth in the MSA, Provider will ensure that each Disengagement Plan:
|
(A)
|
sets out a reasonably detailed set of timetables, procedures, and arrangements for the transfer of the provision of any or all of the Services from Provider or Provider Agents to Customer or one or more New Providers or to a combination of Customer and New Providers, with a view to eliminating or minimizing any disruption to or deterioration of the provision of services similar to the Services and other information technology services to, and businesses of, Customer as a result of the expiration or termination (in whole or in part) of, or an insourcing or resourcing in respect of, this Agreement;
|
(B)
|
sets out in relation to each item of Provider Software used in the performance of Provider’s obligations under the Agreement, the arrangements (if any) in relation to the licensed code and related documents which apply to that item;
|
(C)
|
includes complete and accurate lists of all Available Systems and Available Contracts and items of Commercially Available Provider Property and Available Third-Party Software, including:
|
(1)
|
a brief description of the role of that Available System or Available Contract or item of Commercially Available Provider Property or Available Third-Party Software in the performance of Provider’s obligations under this Agreement;
|
(2)
|
in respect of the Available Systems, an asset ledger setting out the date of acquisition and the current net book value of each individual asset of which the Available Systems consist; and
|
(3)
|
in respect of each of the Available Contracts, the Commercially Available Provider Property and the Available Third-Party Software, an overview of each of them and their respective value;
|
(D)
|
includes an accurate list of maintenance contracts among Provider, Provider Agents, and Customer Group where Provider or Provider Agents have offered software maintenance to Customer Group and which are Available Contracts;
|
(E)
|
and (only with respect to a Specific Disengagement Plan and at the cost of Provider) includes complete and accurate lists of all Provider Systems other than Available Systems and contracts other than Available Contracts and items of non-Commercially Available Provider Property and Third-Party Software other than Available Third-Party Software, with a brief description of the role of such system, contract or item of non-Commercially Available Provider Property or such Third-Party Software in the performance of Provider’s obligations under this Agreement, necessary to provide for a continuation of the Services;
|
(F)
|
includes the following information on Provider Staff:
|
(1)
|
the number, positions and/or job functions of dedicated Provider Staff and Affected Employees still engaged in the performance of the Services (collectively, “
Available Employees
”), a brief description of each such position and/or job function, an indication of the amount of working time spent in that position/function and the locations of all Provider Staff; and
|
(2)
|
the names and positions/job functions of each individual who is determined a member of the Key Personnel. Provider will use its best efforts to obtain, if required pursuant to, and in accordance with, applicable data protection Laws, the express consent of such Key Personnel to include this information in the Disengagement Plan.
|
(G)
|
includes a list of positions and/or job functions that are required to provide the Termination Assistance Services, a brief description of each such position and/or job function and an indication of the amount of working time to be spend in that position and/or function in connection with the Termination Assistance Services;
|
(H)
|
sets out activities to be performed by Provider during the Termination Assistance Period to effect a smooth transfer of operational responsibilities for the Removed Services, which include at minimum:
|
(1)
|
documenting and delivering to Customer object libraries, reference files and software tools used to provide the Removed Services;
|
(2)
|
delivering to Customer the existing systems support profiles, monitoring or system logs, problem tracking and resolution documentation and status reports;
|
(3)
|
providing to Customer work volumes, staffing requirements and actual Service Levels achieved and information on historical performance for each Removed Service component over the preceding twelve (12) months;
|
(4)
|
with respect to work in progress for each Removed Service at the end of the Termination Assistance Period, documenting and delivering to Customer the current status of such work, stabilizing such work for continuity during transition and providing any required training to achieve transfer of responsibility without loss of momentum or any adverse impact on project timetables, or providing a mutually agreeable bridge services agreement to complete essential projects after the effective date of expiration or termination the Term and the Termination Assistance Period; and
|
(5)
|
providing Customer with any problem logs, if any, that have not been previously provided to Customer in respect of the one-year period prior to the end of the Termination Assistance Period;
|
(I)
|
and
|
(1)
|
is in English and in language likely to be readily comprehensible to such members of Customer’s operational, management and technical staff who are reasonably capable in relation to the operational, technical and other elements of the kind that are relevant to the Removed Services and are involved in the exit transfer arrangements;
|
(2)
|
provides sufficient detail enough to allow partial termination of the Services and the continued provision of other Services not the subject of partial termination;
|
(3)
|
specifies those measures which are necessary to minimize, so far as Provider is reasonably able to assess, any disruption to the businesses of Customer as a result of the expiration or termination (in whole or in part) of, or an insourcing or resourcing in respect of, this Agreement; and
|
(4)
|
provides estimated time periods by which Provider reasonably believes the provision of the Removed Services should have migrated to Customer or a New Provider, as the case may be, and sets out the assumptions upon which such estimates are based.
|
2.6
|
As part of the Disengagement Plan, Provider will provide a transition plan with a list of activities to be performed by Customer and/or New Provider and Provider during the Termination Assistance Period to effect a smooth transfer of operational responsibilities for the Services, and which sets out any other information as reasonably required by Customer relevant to the potential transitioning of Services prior to the Disengagement Plan being developed or updated.
|
2.7
|
Provider will clearly mark the changes it has made in the updated Disengagement Plan, if one is prepared, compared to the previous Disengagement Plan. Provider will provide such mark-up together with an explanation of the changes to Customer in writing simultaneously with the submission of the updated version of the Disengagement Plan.
|
2.8
|
Each Party has the rights and obligations allocated to it in any Specific Disengagement Plan, once it has been agreed and signed on behalf of both Parties. If there is any conflict or inconsistency between this Schedule and any Specific Disengagement Plan, the Specific Disengagement Plan will prevail. The provisions of this Schedule will apply in relation to the expiration or a termination (in whole or in part) of, or an insourcing or resourcing in respect of, this Agreement irrespective of whether the Parties agree a Specific Disengagement Plan.
|
2.9
|
Provider will promptly provide Customer with such information as Customer reasonably requests and Provider or Provider Agents are reasonably able to provide in relation to the Available Systems, Available Contracts, Commercially Available Provider Property, Available Third-Party Software and Available Employees identified in the Disengagement Plan from time to time.
|
2.10
|
Provider will, on request, provide to or make available to Customer a copy of any document in possession or control of Provider and not provided to or in possession of Customer which is referred to in the Disengagement Plan, unless the Disengagement Plan specifies that such document will not be disclosed by Provider and provides reasonable justification for such non-disclosure.
|
2.11
|
Provider acknowledges that Customer is entitled to rely upon the accuracy of information and disclose the Disengagement Plan, as well as such information included in the Disengagement Plan or provided in the preparation and distribution of requests for proposals, requests for quotations, agreements and other documents for potential New Providers. Provider must make all necessary inquiries to fulfill its obligations under this Schedule and provide sufficient and accurate information for inclusion in the Disengagement Plan.
|
3.
|
TERMINATION PLANNING
|
3.1
|
Promptly following the Start of the Termination Assistance Period, the Parties and the New Provider(s) will meet to begin planning for the execution of the Termination Assistance Plan and the migration of the Removed Services to Customer and/or one or more New Providers.
|
3.2
|
Provider will develop a Specific Disengagement Plan acceptable to Customer within [***] business days of the Start of the Termination Assistance Period.
|
3.3
|
Except to the extent that the Parties agree otherwise in writing, Provider will ensure that the Specific Disengagement Plan meets the requirements set out in this Schedule above, as well as the following additional requirements. The Specific Disengagement Plan must:
|
(A)
|
identify the Critical Exit Deliverables, associated performance criteria and set out the relevant Performance Credits, in each case to the extent applicable;
|
(B)
|
specify the Exit Service Transfer Time;
|
(C)
|
specify the Planned Final Exit Date;
|
(D)
|
specify the details of any alternative services (if any) to be provided by Provider in substitution for the Removed Services;
|
(E)
|
specify a timetable, process and critical controls for conducting the Termination Assistance Services;
|
(F)
|
(G)
|
include the following information on Expected Removed Services Positions:
|
(1)
|
a complete and accurate list of Available Employees who fulfill an Expected Removed Services Position, including the positions and/or job functions, brief description of each such position and/or job function, location, date of commencement of employment or engagement, salaries, benefits, pension entitlements and other compensation, indication of the amount of working time spent in a position/function; and
|
(2)
|
the names, job functions, titles and all individual terms and conditions of employment or engagement of each Available Employee who fulfills an Expected Removed Services Position and who is identified as Key Personnel in the applicable SOW. Provider will use commercially reasonable efforts to obtain, if required pursuant to, and in accordance with, applicable data protection Laws, the express consent of such Key Personnel to include such information in the Specific Disengagement Plan; and
|
(3)
|
the numbers of such Key Personnel in: (i) Transfer Jurisdictions and (ii) Non-Transfer Jurisdictions, and in each case also indicating the relevant Transfer Jurisdiction or Non-Transfer Jurisdiction, as the case may be;
|
(H)
|
include a complete and accurate list of all Available Employees who fulfill an Expected Removed Services Position. Provider will use commercially reasonable efforts to obtain, if required pursuant to, and in accordance with, applicable data protection Laws, the express consent of such personnel to include, share and distribute such information in the Specific Disengagement Plan; and
|
(I)
|
reflect such other information reasonably requested by Customer.
|
3.4
|
Following the Start of the Termination Assistance Period, Customer will identify and notify Provider of which of the Removed Services it deems critical for the purpose of this Schedule (“
Critical Services
”), and the extent to which Customer:
|
(A)
|
where the Agreement (or any part thereof) has been terminated (as opposed to expiration of the Agreement), requires Provider to perform the other Removed Services (“
Non-Critical Services
”); and
|
(B)
|
requires the Service Levels to continue to apply as they applied in accordance with the provisions of this Agreement in respect of the Services identified as Critical Services and the Non-Critical Services during the Termination Assistance Period.
|
3.5
|
Within [***] business days of being notified of the Critical Services, Provider will identify Provider Staff and resources which are:
|
(A)
|
required in order to ensure the provision of the Critical Services and Non-Critical Services in accordance with Customer’s Service Level requirements; and
|
(B)
|
not required under
Section
3.5(A)
above and are available to perform Termination Assistance Services.
|
3.6
|
Within [***] business days of the Start of the Termination Assistance Period:
|
(A)
|
the Parties will use commercially reasonable efforts to agree to the allocation of Provider Staff and resources referred to in
Section
3.5
above; and
|
(B)
|
the Parties will use commercially reasonable efforts to agree to the extent to which additional resources are required for the performance of Critical Services and non-Critical Services (to make Provider Staff and resources available for Termination Assistance Services that have sufficient knowledge of the Critical Services and Non-Critical Services) and Termination Assistance Services during the Termination Assistance Period, it being agreed that the rates at which any such additional resources will be charged to Customer will follow the normal charging methods previously agreed between the Parties, applying any applicable agreed cost standards set forth in the Agreement.
|
3.7
|
Provider agrees that Provider Staff fulfilling positions as listed in the Specific Disengagement Plan will continue to provide the Services during the Termination Assistance Period. The involvement of other Provider Staff to provide the Services during the Termination Assistance Period will be subject to agreement between the Parties taking into account that Provider may require such other Provider Staff to meet the Service Levels.
|
3.8
|
Customer or its Affiliates will be permitted to solicit and hire any Provider Staff that have been dedicated to, or have been performing work primarily for Customer, the terminated Services as of the date of Start of the Termination Assistance Period. Provider will not interfere with Customer’s efforts, will not enforce any restrictions imposed on such Provider Staff by agreement or policy (
i.e.
, employment contract or covenant) which would interfere with Customer’s efforts, and will provide Customer reasonable access to such Provider Staff for the purposes of interviews, evaluations and recruitment. Any such employment by Customer would
|
4.
|
TERMINATION ASSISTANCE PERIOD
|
4.1
|
Provider will, during the Termination Assistance Period, perform and observe its obligations under or in connection with the employment or engagement of each member of Provider Staff who fulfills an Expected Removed Services Position, whether arising under contract, applicable Law or in the ordinary and usual course of business.
|
4.2
|
Provider will during the Termination Assistance Period, other than with the prior written consent of Customer, not:
|
(A)
|
make or propose any material change to the terms and conditions of employment or engagement of any member of Provider Staff which fulfills an Expected Removed Services Position, unless required by or provided for in any collective (labor) agreement or under any contract of employment or engagement or in the ordinary and usual course of business; or
|
(B)
|
make any changes to the duties or involvement or engagement in the provision of the Removed Services by any member of Provider Staff that fulfills an Expected Removed Services Position (other than to achieve the performance of an obligation under the Agreement);
|
(C)
|
except for any changes which are made in the ordinary and usual course of business, assign an employee, who is not a member of Provider Staff which fulfills an Expected Removed Services Position, to the provision of the Removed Services and Customer will not unreasonably withhold or delay its consent; or
|
(D)
|
except for any changes which are made in the ordinary and usual course of business, assign a member of Provider Staff which fulfills an Expected Removed Services Position to the provision of services which do not form part of the Removed Services and Customer will not unreasonably withhold or delay its consent.
|
4.3
|
During the Termination Assistance Period, Customer and/or New Provider(s) will not announce or propose any change to the terms and conditions of employment of a Removed Services Employee after the Exit Service Transfer Time, unless the Parties have fulfilled and finalized any local statutory or contractual obligation to consult with the relevant local works council, trade unions and other relevant employee representative bodies in a manner satisfactory to the Parties.
|
4.4
|
During the Termination Assistance Period, but at least [***] weeks before Exit Service Transfer Time Provider will provide to Customer and/or New Provider(s) the names of each Removed Services Employee together with full details of all their terms and conditions of employment and any other information required by Customer and/or the New Provider(s).
|
4.5
|
At any time during the Termination Assistance Period but not later than [***] days prior to the Exit Service Transfer Time, Customer and/or New Provider(s) may inform Provider (in respect of member of Provider Staff(s) in any of the Non-Transfer Jurisdictions) of the number, if any, and specific positions of those Available Employees who fulfill an Expected Removed Services Position, who Customer and/or New Provider(s) may
|
4.6
|
In Transfer Jurisdictions, Provider will during the Termination Assistance Period (provided such Termination Assistance Period commences following the termination of the Agreement for reason other than Force Majeure) at the request of Customer use commercially reasonable efforts to redeploy Removed Services Employees to accounts other than Customer’s account prior to the end of the Termination Assistance Period. Should such redeployment not be successful, legal obligations to transfer staff from Provider to Customer remain in effect.
|
5.
|
SALE AND PURCHASE OF EXIT TRANSFER SYSTEMS
|
5.1
|
In relation to each expiration, partial termination or termination of, or an insourcing or resourcing in respect of, this Agreement, Customer will have the option, exercisable by [***] days’ prior written notice to Provider at any time before the Exit Service Transfer Time, to buy (or, in relation to a particular Provider System, ensure that a New Provider buys) and Provider will (if the option is exercised) sell, (or in relation to a particular Provider System, ensure that the relevant Provider Agent sells) with effect from the Exit Service Transfer Time, the Exit Transfer Systems constituting Equipment owned by Provider and Provider Agents (and in the case of partial termination only those Exit Transfer Systems constituting Equipment which are used wholly or mainly to provide the Services which are the subject of the partial termination). Customer will seek in its notice to identify all such Exit Transfer Systems and Exit Transfer Contracts.
|
5.2
|
In consideration for each sale of an Exit Transfer System made under
Section
5.1
, Customer will in the case of expiration or termination (in whole or in part) of, or an insourcing or resourcing in respect of, this Agreement pay to Provider the current net book value (depreciated consistent with the Depreciation Method) of that Exit Transfer System, to be invoiced at or after completion of the sale and purchase of that Exit Transfer System.
|
5.3
|
Provider will (or will procure that its Provider Agents will), in the event that Customer exercises its option described in
Section
5.1
or purchases the Exit Transfer Systems under
Section 5.4
, provide unqualified warranties in favor of Customer or New Provider (as the case may be) in respect of the Exit Transfer Systems, to the effect that:
|
(A)
|
Provider or Provider Agent (as the case may be) has good and valid legal title to the Exit Transfer Systems and all components thereof; and
|
(B)
|
Except for those exceptions previously approved by Customer in writing, the Exit Transfer Systems and all components thereof are eligible for manufacturers’ recommended maintenance without any additional expenditure (other than standard maintenance charges for the period commencing as of the completion of the transfer of the relevant Exit Transfer System) or repair required.
|
5.4
|
In respect of:
|
(A)
|
any Exit Transfer System constituting Equipment that is leased by Provider from a Provider Agent; and
|
(B)
|
any Provider System constituting Equipment that is leased by Provider or Provider Agent from a third party and that would fall within the definition of an Exit Transfer System if it were owned by Provider or a Provider Agent,
|
5.5
|
Where, in respect of any Exit Transfer Asset, a member of Customer Group has during the Term paid to Provider a one-time charge relating to the maintenance of, or warranty given by a supplier in respect of, such Exit Transfer Asset, Provider will ensure that the member of Customer Group acquiring such Exit Transfer Asset receives at no additional cost the benefit of any portion of such maintenance or warranty that relates to the period beyond the Term.
|
6.
|
EXIT TRANSFER COMPLETION
|
6.1
|
The Parties will ensure that completion of the sale and purchase of such Exit Transfer Systems takes place at such place as the Parties may reasonably agree (in the purchase notice or otherwise by reasonable notice to Provider) immediately before and with effect from the Exit Service Transfer Time.
|
6.2
|
Subject to the provisions of the Disengagement Plan, at such completion, Provider will give Customer (or the relevant New Provider) possession of the Exit Transfer Systems. Provider will leave those Exit Transfer Systems which are Provider’s Customer Site Exit Equipment at the premises at which they have been used in the provision of the Removed Services (and other Exit Transfer Systems will, at completion and at the cost of Customer, be disconnected and delivered and installed at the premises of Customer or the New Provider or at a location otherwise agreed by Provider and Customer).
|
6.3
|
Risk in each Exit Transfer System will pass to Customer (or the relevant New Provider) at delivery of the Exit Transfer Systems in accordance with
Section
6.2
above (provided that the risk in Provider’s Customer Site Exit Equipment will pass to Customer (or the relevant New Provider) at completion of the sale), but title to each Exit Transfer System will not pass to Customer or New Provider until Customer or New Provider has paid the amount specified in
Sections
5.2
or
5.4
in relation to that Provider System to Provider in full.
|
7.
|
EXIT TRANSFER CONTRACTS: NOVATION, ASSIGNMENT OR TRANSFER
|
7.1
|
Where:
|
(A)
|
Provider is entitled to transfer, or (to the extent permitted under applicable Law) assign both the benefit and the burden of, an Exit Transfer Contract to Customer or a New Provider nominated by Customer in relation to that Exit Transfer Contract without breach of that Exit Transfer Contract; and
|
(B)
|
no provision in that Exit Transfer Contract would, following such transfer or assignment, prohibit or seriously restrict the use by Customer or New Provider of the subject matter of that Exit Transfer Contract,
|
7.2
|
In relation to each Exit Transfer Contract to which
Section
7.1
does not apply as a result of the parties’ inability to obtain rights to transfer or re-transfer (as the case may be), unless the Parties agree otherwise in writing, Provider, with the reasonable assistance of Customer (which reasonable assistance will include the execution by Customer of such documentation as may be reasonably required to affect the arrangements described below), will, subject to
Section
7.4
, use its reasonable efforts to ensure, at Customer’s option, that the benefit and burden of the relevant Exit Transfer Contracts are transferred to Customer by one of the following methods:
|
(A)
|
Novation
|
(B)
|
Assignment
|
(C)
|
Transfer
|
(D)
|
Right to use
|
7.3
|
From the Exit Service Transfer Time until (if at all) such termination and assumption or assignment takes effect, Provider will take each step reasonably requested of it by Customer or any New Provider nominated by Customer in relation to the Exit Transfer Contract to enable performance of the Exit Transfer Contract and to provide for Customer or New Provider the benefit of the Exit Transfer Contract. Provider will promptly notify Customer if it is aware (or reasonably should have been aware) that any step requested by Customer or a New Provider will put Provider, Customer or the New Provider (as the case may be), in breach of any Exit Transfer Contract.
|
7.4
|
In relation to Exit Transfer Contracts that are not Transfer Contracts, Provider must use its reasonable efforts to ensure that it obtains the right to transfer such Exit Transfer Contracts to Customer under
Sections
7.1
and
7.2
at no additional cost to Customer. Where Customer would incur any costs in relation to the transfer of the Exit Transfer Contracts that are not Transfer Contracts, Provider must notify Customer of such costs and the Parties will, at the election of Customer, discuss in good faith alternative solutions and Customer may elect not to take transfer of such Exit Transfer Contracts.
|
7.5
|
To the extent that a contract would fall within the definition of Available Contracts but for the fact that it is not used wholly or mainly in the provision of the Removed Services (but such contract is nevertheless used solely in relation to the Services), the Parties will, at the election of Customer, use reasonable efforts to come to arrangement by which the portion of the contract relating to the Removed Services is novated, assigned or transferred to Customer or Customer obtains rights to use in respect of such contract to the extent required in relation to the Removed Services.
|
8.
|
SOFTWARE LICENSING AND ASSISTANCE
|
8.1
|
Provider will upon termination or expiration of this Agreement (in whole or in part):
|
(A)
|
offer to grant to Customer Group upon the expiration of the Termination Assistance Period licenses to use the Commercially Available Provider Property that is not otherwise licensed to Customer pursuant to such license agreed upon in writing by the Parties, which license will be on commercially reasonable terms no less favorable to Customer than those in licenses granted to Provider’s other customers and with an initial license fee equal to the lower of (1) Provider’s commercially available price at the time or (2) the discount generally applicable to Customer on the discount it generally receives at the time the Statement of Work is terminated, in either case, prorated over a period starting on the date the charges were incurred and ending on the applicable Statement of Work expiration date; and
|
(B)
|
if requested by Customer, agree on applicable terms for Provider support upon the expiration of the Termination Assistance Period no more restrictive than commercial terms offered by Provider to licensees of the same or similar Provider Property.
|
8.2
|
Provider will procure that prior to the commencement of use, the owner, owners or authorized licensors of the Intellectual Property Rights in each item of Available Third-Party Software and each item of Commercially Available Provider Property that is the subject of an Available Contract (other than a Transfer Contract or Subsequent Transfer Contract) agree to grant to Customer, with effect from (and at the election of Customer grant at) the Exit Service Transfer Time, at no extra cost or expense to Customer beyond the applicable license
|
(A)
|
each item of such Available Third-Party Software and each item of Commercially Available Provider Property that is the subject of an Available Contract (other than a Transfer Contract or Subsequent Transfer Contract); and
|
(B)
|
each item of Commercially Available Provider Property that is the subject of a Transfer Contract or Subsequent Transfer Contract, to the extent that the relevant owner, owners or authorized licensors of the Intellectual Property Rights agrees to such grant;
|
8.3
|
Where Customer would incur costs in relation to the grant of a license with effect from the Exit Service Transfer Time in accordance with
Section
8.2
, Provider will make a record in the Disengagement Plan of the relevant costs and expenses to be incurred by Customer in securing such licenses under
Section
8.2
in relation to the item of Provider Software.
|
8.4
|
After the Start of the Termination Assistance Period, Provider will not enter into any contract for the licensing or maintenance of Third-Party Software or other Third-Party Materials that is to be wholly or mainly used in connection with the provision of the Removed Services unless done in accordance with the relevant terms of the Agreement.
|
9.
|
DELIVERY OF SOFTWARE AND ESCROW ARRANGEMENTS
|
9.1
|
Provider will provide Customer copies of any software program up to the number of licenses set forth in the Specific Disengagement Plan:
|
(A)
|
which Customer or any New Provider is entitled to use under:
|
(1)
|
any Exit Transfer Contract; or
|
(2)
|
any contract made to replace an Exit Transfer Contract;
|
(B)
|
for which Customer is granted a license pursuant to
Section
8
above,
|
9.2
|
Where the Parties have agreed to do so through the procedures for New Services set forth in
Section 3.1(D)
of the MSA, Provider will procure that the relevant Third Party enters into an escrow agreement pursuant to that Section.
|
9.3
|
If any Relevant Software was, immediately before the relevant time, used on Exit Transfer Systems that Customer has elected to buy in accordance with this Schedule, then to the extent set forth in the Specific Disengagement Plan, Provider will fulfill its obligations under this
Article
9
by:
|
(A)
|
allowing Customer to take possession of such Exit Transfer Systems in accordance with this Schedule without removing such copies; and
|
(B)
|
providing Customer with a reasonable number of back-up copies.
|
9.4
|
Provider will provide Customer with copies of other software programs to which this
Article
9
applies in such form as Customer may reasonably request.
|
10.
|
SOFTWARE MAINTENANCE
|
10.1
|
If Customer requests Provider to do so by reasonable notice before the relevant Exit Service Transfer Time Provider will offer to Customer maintenance on the terms set out, and in relation to the Provider Property specified, in the applicable Specific Disengagement Plan.
|
10.2
|
10.3
|
Provider will upon Customer’s request (on reasonable notice to do so) before the relevant Exit Service Transfer Time procure support, maintenance and enhancement of relevant Provider Third-Party Software for Customer’s benefit in accordance with the applicable SOW.
|
10.4
|
Where, in respect of any Exit License Third-Party Software, Commercially Available Provider Property, or any Deliverables, a member of Customer Group has during the Term paid to a member of Provider Group a one-time charge relating to the maintenance of, or warranty given by a supplier in respect of, such Exit License Third-Party Software, Commercially Available Provider Property, or any Deliverables for a time period governed by the Specific Disengagement Plan, Provider will ensure that the member of Customer Group acquiring such Exit License Third-Party Software, license to such Commercially Available Provider Property, or any Deliverables receives at no additional cost the benefit of any portion of such maintenance or warranty that relates to the period beyond the Term.
|
11.
|
REMOVED SERVICES EMPLOYEES
|
11.1
|
The Parties agree between them that, unless agreed otherwise in writing, the expiration or termination (in whole or in part) of, or an insourcing or resourcing in respect of, the Agreement is not deemed to constitute a transfer of employment of the Removed Services Employees from Provider to Customer and/or one or more New Provider(s) (as the case may be), unless and to the extent that, in a Transfer Jurisdiction it is determined or established otherwise in accordance with the Transfer Legislation if there is a dispute between the Parties and finally, in court). Where and to the extent that it is determined or established otherwise in accordance with the Transfer Legislation that Removed Services Employees will transfer from Provider to Customer and/or one or more New Provider(s) (as the case may be), those rights and obligations resulting from the employment of each Removed Services Employee in Transfer Jurisdictions (including those relating to compensation and benefits and the position, function and location in which such Removed Services Employee is employed, but
|
11.2
|
For clarity, for future cases, the Parties may agree that Customer or the New Provider will offer employment to Removed Services Employees who are located in a Non-Transfer Jurisdiction.
|
11.3
|
In Non-Transfer Jurisdictions, Provider will after the termination of the Agreement or parts thereof (other than for Force Majeure) or expiration of the Agreement, or an insourcing or resourcing in respect of the Agreement, as per the Exit Service Transfer Time, assume full responsibility for Removed Services Employees in those Non-Transfer Jurisdictions and Customer has no obligation to extend an offer of employment to any Removed Services Employees in such Non-Transfer Jurisdictions.
|
11.4
|
Customer and/or New Provider(s) cannot to the detriment of the Removed Services Employees deviate from the principle set forth in
Section
11.1
that Customer and/or New Provider(s) will provide terms and conditions of employment, which are comparable to and no less favorable. Customer and/or New Provider(s) is allowed to pay cash compensation or to grant other alternative benefits to the Removed Services Employees to minimize differences between the terms and conditions of Customer and/or New Provider(s) and Provider to the extent (A) such is permitted by applicable Law and (B) any local statutory or contractual obligation to consult or inform the relevant local works councils, trade unions and other relevant employee representative bodies on such deviation has been fulfilled.
|
11.5
|
(A)
|
to the extent the Services are terminated in Provider Service Locations affected by the Force Majeure Event, Provider will bear all costs of employment, redeployment and termination of employment resulting from such termination; and
|
(B)
|
to the extent the Services are terminated in locations that have not been affected by the Force Majeure Event the following will apply (1) in respect of Transfer Jurisdictions: if the termination (in whole or in part) is deemed to constitute a transfer of employment of the Removed Services Employees from Provider to Customer by operation of the Transfer Legislation then
Section
11.1
will apply accordingly; and (2) in respect of Non-Transfer Jurisdictions and Transfer Jurisdictions where the termination (in whole or in part) is not deemed to constitute a transfer of employment of the Removed Services Employees from Provider to Customer by operation of the Transfer Legislation, then
Section
11.2
will apply accordingly and Customer has a right to offer employment to the Removed Services Employees as per the Exit Service Transfer Time on discretionary terms and conditions of employment.
|
11.6
|
Nothing in this
Section 11
or in this Schedule will be construed as granting any independent rights to Removed Services Employees by Provider and/or Customer and/or New Provider(s) or to make any Claims on the basis of this Schedule.
|
11.7
|
The Parties will as soon as practicable, but in any event at the latest one (1) month prior to the applicable Exit Service Transfer Time, jointly send to each Removed Services Employee, to the extent transferred to Customer and/or New Provider(s) in accordance with this
Section
11
a letter on his or her transfer to Customer and/or New Provider(s) in a form to be agreed upon between the Parties.
|
11.8
|
Without prejudice to the obligation of Provider to disclose information pursuant to this Schedule and to the extent permitted under applicable Law, Provider will give Customer and/or New Provider(s) such information, assistance and cooperation as Customer and/or New Provider(s) may reasonably request in writing and Provider may reasonably be able to provide, with a view to completing the transfer of employment of the Removed Services Employees. In view of the transfer of employment, Provider will, to the extent permitted under applicable Law, as soon as possible after the applicable Exit Service Transfer Time provide to Customer and/or New Provider(s) the original records or documents, payroll records and final salary details relating to the Removed Services Employees, but will after the applicable Exit Service Transfer Time preserve data or documents relating to such Removed Services Employees for such period as is required or permitted by applicable Law.
|
11.9
|
To the extent permitted by local data protection Laws, Customer, New Provider(s) and Provider will each at the other Party’s request provide to the requesting party all such information, which will be accurate and not misleading, as may be reasonably necessary to enable the requesting Party to comply with any (joint) obligation to inform and/or consult with:
|
(A)
|
Removed Services Employees;
|
(B)
|
other Provider Staff and personnel of Customer;
|
(C)
|
any relevant works council, trade union or other relevant employee representative body; or
|
(D)
|
any Governmental Authority,
|
11.10
|
In respect of the period up to the applicable Exit Service Transfer Time, Provider will perform and discharge all its obligations in respect of all Removed Services Employees, including those in connection with the termination of the employment of the Removed Services Employees with Provider, unless otherwise provided for in this
Section
11
. Provider will pay to the individual Removed Services Employee who transfers to Customer and/or the New Provider(s) pursuant to this
Section
11
, a pro rata proportion of accrued but unpaid vacation allowances and accrued but outstanding days of vacation, in respect of the period prior to the applicable Exit Service Transfer Time, unless such is prohibited by applicable Law, in which case Provider will reimburse Customer and/or New Provider(s) in respect of accrued but unpaid vacation allowances and accrued but outstanding days of vacation of relevant Removed Services Employees, in respect of the period prior to the applicable Exit Service Transfer Time and Provider will indemnify Customer or New Provider(s) against any
|
11.11
|
Customer will, and will ensure that the New Provider(s) will, perform and discharge all its obligations in respect of all Removed Services Employees who are employed by Customer or New Provider(s) pursuant to this
Section
11
in respect of the period from the applicable Exit Service Transfer Time. Customer will indemnify Provider from and against any and all Losses resulting from, arising out of or relating to, any and all Claims (including claims made by, or on behalf of, the relevant Removed Services Employees) incurred by Provider in respect to these obligations. In addition, Customer will indemnify Provider from and against any and all Losses resulting from, arising out of or relating to, any and all Claims, arising as a result of:
|
(A)
|
any event, matter or circumstance with respect to Removed Services Employees who as of the applicable Exit Service Transfer Time are employed by Customer or New Provider(s) pursuant to this
Article 11
(including an act or omission of Customer and/or New Provider(s)) which took place after the applicable Exit Service Transfer Time;
|
(B)
|
any person employed or engaged or formerly employed or engaged by Customer and/or New Provider(s) (other than a Removed Services Employee) at any time; or
|
(C)
|
any Removed Services Employee who as of the applicable Exit Service Transfer Time is employed by Customer or New Provider(s) pursuant to this
Article
11
, claiming that as a result of the transfer of employment to Customer and/or New Provider(s) his or her compensation, benefits, position, function and location has changed to his or her detriment.
|
11.12
|
Where the Transfer Legislation applies in connection with the assignment, novation, suspension, expiration or termination of the Services contemplated by a SOW (or part thereof) then:
|
(A)
|
Provider will indemnify Customer Group and/or the New Provider(s) (as the case may be) from and against any and all Losses, including all Employment Liabilities resulting from, arising out of or relating to, any and all Claims arising out of:
|
(1)
|
any claim in connection with the termination of the employment of any of the Removed Services Employees by the Provider prior to the date of transfer of employment of the Removed Services Employees to Customer or any New Provider (as the case may be);
|
(2)
|
any claim by any of the Removed Services Employees related to the period during which they were employed by Provider up to and including the date of transfer of their employment to Customer or any New Provider (as the case may be); and/or
|
(3)
|
any failure by Provider to comply with its obligations under the Transfer Legislation.
|
11.13
|
Provider agrees that where any Removed Services Employee (who was not identified to be subject to a Transfer Jurisdiction by the Provider prior to the relevant transfer) claims that the Transfer Legislation applies during or on the assignment, novation, suspension, expiration or termination (for whatever reason) of the applicable
|
(A)
|
it will notify Customer of that finding or allegation as soon as reasonably practicable after becoming aware of it;
|
(B)
|
Customer will inform Provider in writing whether it or the relevant New Provider(s) will accept the transfer of such person and the terms on which it will do so; and
|
(C)
|
if Customer confirms in writing that it or the New Provider(s) will accept the transfer of employment of that person, subject to any other terms agreed between the Parties, such person will be considered to be subject to a Transfer Jurisdiction for the purposes of this Schedule with effect from the date that he or she transfers.
|
11.14
|
Should any Service Location be subject to the Transfer Legislation, Provider will organize the Services provided from that location in such a way that no individual employee could be considered “wholly or mainly” engaged in the provision of Services.
|
12.
|
APPORTIONMENTS
|
12.1
|
There will be apportioned between Provider and Customer, at each Exit Service Transfer Time, all outgoings and expenses (including any remuneration due, and the cost of any benefit provided, under or in connection with the contract of employment of an Removed Services Employee) and all rents, royalties and other periodical payments receivable in respect of the Exit Transfer Systems, Exit Transfer Contracts and Removed Services Employees (“
Exit Payments
”).
|
12.2
|
This apportionment will be carried out as follows:
|
(A)
|
all Exit Payments will be apportioned in the currency in which the original invoice is presented;
|
(B)
|
the Exit Payments (other than fixed payment amounts) will be annualized and divided by 365 to reach a daily rate;
|
(C)
|
Customer will be responsible for or entitled to (as the case may be) an amount equal to the number of complete days during the period of the invoice after the Exit Service Transfer Time multiplied by that daily rate; and
|
(D)
|
Provider will be responsible for or entitled to (as the case may be) the rest of the invoice for Exit Payments.
|
12.3
|
Each Party will make payments due under this Section as soon as practicable.
|
13.
|
TRANSITIONAL COOPERATION AND ASSISTANCE
|
13.1
|
In relation to the expiration or any termination (in whole or in part) of, or an insourcing or resourcing in respect of, this Agreement, unless the Parties agree otherwise in writing in relation to a Provider System, Subcontract, Supply Contract or member of Provider Staff, Provider will ensure (and will ensure that each Provider Agent will ensure) that:
|
(A)
|
each Provider System that is an Available System at the Start of the Termination Assistance Period is an Available System at the Exit Service Transfer Time; and
|
(B)
|
each Subcontract or Supply Contract that is an Available Contract at the Start of the Termination Assistance Period is an Available Contract at the Exit Service Transfer Time, provided that where: (1) the term of an Available Contract will expire (for the avoidance of doubt, such expiration does not include the termination of such Available Contract at election of Provider) prior to the Exit Service Transfer Time; and (2) the extension of the term of such Available Contract would require Provider to enter into additional costs, the Parties will, without prejudice to Provider’s obligation to continue delivering the Services, in good faith consult with one another regarding alternative solutions to the extension of such Available Contract,
|
13.2
|
Without prejudice to the other obligations allocated to Provider in this Schedule and the Specific Disengagement Plan, Provider will, from the Start of the Termination Assistance Period in respect of the expiration or any termination (in whole or in part) of, or an insourcing or resourcing in respect of, this Agreement, and then until six (6) months after the end of the Termination Assistance Period, but always subject to
Sections
13.4
and
13.5
below, (A) provide all reasonably necessary cooperation and assistance to Customer and any New Provider or New Providers to facilitate the smooth, timely and orderly transfer of and transition of responsibility for the Removed Services to Customer or New Provider, and will ensure that each Provider Agent does so, in a way which avoids or minimizes any disruption or adverse effect to the provision of information technology services to, and the businesses or operations of, Customer as a result of expiration or termination (in whole or in part) or an insourcing or resourcing in respect of, this Agreement; and (B) continue to meet its remaining obligations under the Agreement. During the Termination Assistance Period, upon Customer’s request, Provider will provide Customer with Provider’s non-proprietary information and other assistance related to the Services as would be reasonably necessary for a third party to prepare for an informed assumption of responsibility for the Services upon termination or expiration of the Agreement. If, in the case any Available System has to be deinstalled or reinstalled, Provider will, at no additional charge to Customer, install and configure the new instance for Customer to the same installation and configuration as it was previously installed or configured when used by Provider in providing the Services.
|
13.3
|
The cooperation and assistance referred to in
Section
13.2
will include the following:
|
(A)
|
Informing Customer of, and delivery to Customer, by such means, at such time(s) and place(s), and in such format, as Customer reasonably requests in writing, of all documents, data, information and other Customer Property held or controlled by Provider or any Provider Agent on behalf of Customer in the course of providing the Removed Services, including all of Customer security badges,
|
(B)
|
continued provision of such of the Removed Services and such other information technology services as Customer Group or any New Provider reasonably requires;
|
(C)
|
a period of parallel working specified by Customer, including the assignment by Customer of Customer personnel to work with Provider Staff to facilitate knowledge transfer to Customer;
|
(D)
|
reasonable access to the technical records of Provider and Provider Agents relating to the Removed Services and the provision to Customer or relevant New Provider or New Providers of the following information:
|
(1)
|
in relation to the Exit Transfer Systems: all system logs, historical logs, security manuals, operations manuals, procedures manual, technical documentation relating to running of exit transfer systems, operating standards, configuration diagrams, schematics, and all such similar documents;
|
(2)
|
copies of Exit Transfer Contracts;
|
(3)
|
key support contact details for Third Party personnel in respect of contracts assigned or transferred to Customer under
Section
3
; and
|
(4)
|
details of physical and logical security processes and tools that will be available to Customer in accordance with the Agreement;
|
(E)
|
support and assistance in respect of the transporting, loading and running of Customer Data;
|
(F)
|
reasonable support and assistance with a view to enabling Customer or a New Provider to maintain any Commercially Available Provider Property, Exit License Third-Party Software, Deliverables, and provision of appropriate interface information and other technical details reasonably required to enable Customer or a New Provider to use, develop or replace any Provider Software used in the Removed Services that is not commercially available;
|
(G)
|
at Customer’s request, providing such assistance and support in connection with any physical inventory to be conducted by or on behalf of Customer of the Customer Property constituting Equipment to be returned to Customer.
|
(H)
|
at Customer’s request, transfer of any telephone number or IP address of Customer from Provider, Provider Agents, or Provider Staff to a New Provider;
|
(I)
|
at Customer’s request, provide complete and final accounting, reconciliation and invoicing for all Services, including any amounts that may be due and owing with respect to Termination Assistance in accordance with the Agreement, together with any and all reasonably required supporting documentation;
|
(J)
|
in conjunction with Customer, conducting a rehearsal of the transition prior to the cutover at such time as is reasonably acceptable to both Parties;
|
(K)
|
providing such support and assistance as may be reasonably requested to support Customer’s customers, including Authorized Users, in connection with the Termination Assistance Services, including the participation in meetings with Customer and its customers, provided that Customer will continue to serve as the primary point of contact with its customers;
|
(L)
|
Prior to removing any Systems, Equipment, software or other items from any Customer facilities, Provider will provide advance notice to Customer identifying the property it intends to remove. Such identification will be in sufficient detail to apprise Customer of the nature and ownership of such property. Provider will not remove property owned by Customer or any other member of Customer Group or Authorized Users from a Customer facility. Provider will comply with the removal procedures reasonably established by Customer and provided to Provider in writing for removal of property from any Customer facilities and all removals will be in accordance with Customer’s redeployment and disposal processes and policies, provided however, that Customer will not prevent Provider from removing Provider Systems or other items owned or leased by Provider; and
|
(M)
|
reasonable support and training in the provision of, and the technology, apparatus and software used to provide, the Removed Services so as to enable Customer to provide services similar to the Removed Services with minimum disruption and in accordance with service levels similar to the Service Levels.
|
13.4
|
Except to the extent notified by Customer to Provider under
Section
2.4
, the quality of the Removed Services and other Services provided by Provider and Provider’s performance otherwise will not be degraded during the Termination Assistance Period will accordingly at all times comply with the service level requirements set out in the Service Level Agreement.
|
13.5
|
Notwithstanding any arrangement between Customer and Provider (in the Specific Disengagement Plan or otherwise), Customer may by written notice to Provider and at its sole discretion, (A) postpone the date on which the responsibility for any Removed Service was to be transferred to Customer or a New Provider (as is agreed in the Specific Disengagement Plan) by a period of up to the maximum duration of the Termination Assistance Period; and (B) Provider will continue to provide the relevant Removed Service and/or relevant Termination Assistance Services for the duration of such postponement. The relevant Removed Service and Termination Assistance Services will be provided subject to the provisions of the Agreement (including all pricing arrangements) as such provisions would have been applicable to the services prior to the effective date of termination or expiration, Customer agreeing that it will furthermore pay to Provider any additional demonstrable costs of Provider (not otherwise accounted for the in Charges or the rates referred to in
Section
18.1
hereof) resulting from the extension of the Termination Assistance Period pursuant to this
Section
13.5
.
|
14.
|
FURTHER COOPERATION
|
14.1
|
Provider will in good faith assist and cooperate with Customer in providing such information as Customer may reasonably request in connection with any request for proposal, request for quotation, agreement or otherwise in connection with the process conducted for the provision of services similar to the (potentially) Removed Services, including:
|
(A)
|
providing such information as will assist Customer in developing base cost models; and performance histories; and
|
(B)
|
providing an update of the Disengagement Plan for the (potentially) Removed Services
.
|
14.2
|
Provider acknowledges that Customer is entitled to rely upon the accuracy of information and, subject to
Article 17
(Confidentiality and Customer Data)
of the main body of the Agreement, disclose the Disengagement Plan, as well as such information included in the Disengagement Plan or provided under
Section
14.1
in the preparation and distribution of requests for proposals, requests for quotations, agreements and other documents for potential New Providers.
|
15.
|
BUSINESS CONTINUITY
|
15.1
|
Provider will provide reasonable assistance to support Customer’s requirements for business continuity during the Termination Assistance Period, including:
|
(A)
|
updating and supplying information concerning Provider’s business continuity services, testing procedures and frequencies, redundancy diagrams and plans;
|
(B)
|
training and informing Customer of its current policies and procedures with regard to backup and business continuity;
|
(C)
|
arranging for additional overlapping coverage or support through the Termination Assistance Period to minimize disruption in the event of an outage during that period;
|
(D)
|
providing reasonable assistance to Customer in configuring Customer Systems;
|
(E)
|
performing Provider’s disaster recovery obligations set forth in the applicable SOW including with respect to the Provider DR Plan in effect immediately prior to the initiation of the Termination Assistance through the end of the Termination Assistance Period for those Services still being provided by Provider;
|
(F)
|
reasonably assisting with physical de-installation and transportation of Equipment and other Customer Property, and related physical assets from the Service Locations; and
|
(G)
|
if requested by Customer, participating in business continuity testing after the Termination Assistance Period until a successful test has been accomplished.
|
16.
|
POST COMPLETION OBLIGATIONS
|
17.
|
RIGHT TO USE PROVIDER SYSTEMS DURING TERMINATION ASSISTANCE PERIOD
|
18.
|
EXIT MANAGEMENT COSTS
|
18.1
|
Subject to
Section
18.2
below, Customer will reimburse Provider on the basis of reasonable rates to be agreed by the Parties in the Specific Disengagement Plan, in respect of time reasonably incurred, and any other expenses reasonably incurred, by Provider in each case in performing Provider’s obligations under this Schedule, unless the obligations can be performed using Provider Staff or resources used wholly or mainly in the provision of Services to Customer which have been paid for by Customer, in which case Provider will notify Customer of the extent to which using such resources would materially impact on the supply of the Services which would have been performed by such resources. To the extent that Provider’s compliance with its obligations under this Schedule will require the use of different or additional Provider Staff, services or resources beyond that which are covered by the applicable base charges and ARCs/RRCs, such Termination Assistance Services will be considered a chargeable service to be agreed through the procedures for New Services set forth in
Section 3.1(D)
of the MSA.
|
18.2
|
The sums to be reimbursed to Provider pursuant to
Section
18.1
and which are attributable to a Critical Exit Deliverable will be allocated to such Critical Exit Deliverable. Customer will only be obliged to make the reimbursement of each such allocated sum on delivery of the Critical Exit Deliverable in accordance with its performance criteria.
|
19.
|
CHANGE TO THE CHARGES FOLLOWING START OF THE TERMINATION ASSISTANCE PERIOD
|
20.
|
FAILURE TO PROVIDE TERMINATION ASSISTANCE
|
21.
|
PAYMENT OF TERMINATION COSTS
|
22.
|
STORAGE AND RETURNING MATERIALS, DATA, INFORMATION AND OTHER CUSTOMER PROPERTY
|
22.1
|
Upon Customer’s request at any time during the Term or at the end of the Termination Assistance Period, Provider will return or destroy Customer Property, Customer’s Confidential Information and Customer Data (including Personally Identifiable Information), according to, and otherwise comply with the obligations set forth in,
Section 17.5
(Return of Confidential Information),
Section 17.12
(Return of Personally Identifiable Information) and
Sections 20.2
(Exit Rights) of the MSA. Provider will transfer responsibility for off-site storage of Customer’s documents (electronic and hardcopy), if any, to Customer.
|
22.2
|
In accordance with the Disengagement Plan, Provider will vacate the Customer facilities and return to Customer, if not previously returned, all Customer resources, including Customer Equipment, in a condition at least as good as the condition thereof on the applicable SOW effective date, subject to ordinary wear and tear. Provider will perform those activities required to enable a smooth transition of operational responsibility for the terminated/expired Services, including (to the extent applicable):
|
(A)
|
returning current copies of the standard software configuration(s) and any business specific applications materials owned by Customer or which Customer is entitled to obtain as provided in the Agreement and in Provider’s possession;
|
(B)
|
delivering the existing System support profiles, enhancement logs, problem tracking/resolution documentation, and status reports associated with the terminated/expired Services;
|
(C)
|
providing monthly work volumes, Service Levels and information on historical performance for each terminated/expired Service component over the preceding twelve (12) months;
|
(D)
|
providing reasonable assistance with the movement of Customer Data from the then-existing databases to the new processing environment;
|
(E)
|
provide the orderly hand-off of applicable ongoing Projects, including a listing of the applicable then-current and planned Projects. With respect to each such Project, achieving transfer of responsibility without loss of momentum or material adverse impact on Project timetables (
e.g.
, document current status, stabilize for continuity during disengagement, and provide required training); and
|
(F)
|
cooperating with Customer’s test plans, back out procedures, and contingency plans as part of the transition.
|
22.3
|
If Customer’s request under this
Section
22
affects the ability of Provider to perform its obligations under this Agreement, Provider will be relieved from its performance to the extent that Provider is unable to comply with its obligations without such data, information, records and documentation, it being agreed that where Provider is able to comply with its obligations without such data, information, records and documentation, the further compliance by Provider of the relevant obligations will be agreed through the procedures for New Services set forth in
Section 3.1(D)
of the MSA.
|
1.1
|
This Schedule
sets out the management and reporting responsibilities of each Party with respect to the provision of the Services to Customer and provides an overview of the Governance Structure. The “
Governance Structure
” describes the internal governing bodies and reporting mechanisms to be set up and implemented by the Parties in order to manage and implement the Agreement, including the provision of the Services.
|
1.2
|
The overall purpose of the Governance Structure is to provide leadership from the executive management of both Parties for the development and ongoing operation of the Services. The Governance Structure is intended to:
|
(A)
|
Maintain current knowledge of Customer’s business direction and strategy.
|
(B)
|
Facilitate compliance with Customer’s risk management, Project approval procedures and other Customer Policies in connection with the provision of the Services and any Projects agreed.
|
(C)
|
Enable the Parties to work together to promote the achievement of the expected return on investment in connection with Customer’s relationship with Provider.
|
(D)
|
Maintain control of all Changes.
|
(E)
|
Jointly manage the prioritization and planning of Services to ensure that the potential for business benefit to Customer is optimized.
|
(F)
|
Maintain disciplined management regarding cost, quality and mutual compliance with contractual commitments.
|
(G)
|
Provide general oversight and consolidated performance reporting.
|
(H)
|
Provide a clear route for Project reporting, issue escalation and resolution and risk management.
|
(I)
|
To promote the achievement of the business case with regard to Customer’s relationship with Provider.
|
2.1
|
Governance Structure
|
(A)
|
Strategic Level
|
(1)
|
Executive Review Board
|
(B)
|
Operating Level
|
(1)
|
Performance Review Board
|
(2)
|
Transformation Review Board
|
2.2
|
Strategic Level
|
(A)
|
The “
Executive Review Board
” will have the purpose and responsibilities described below.
|
(1)
|
Purpose
|
(a)
|
To review Provider’s performance under this Agreement.
|
(b)
|
To ensure that the objectives of both Customer and Provider are satisfied with respect to the Agreement.
|
(c)
|
To approve strategy with respect to the Services in accordance with Customer’s Risk Management and Project approval procedures.
|
(d)
|
To manage the overall Customer and Provider relationship.
|
(e)
|
To ensure alignment of Customer and Provider goals and objectives.
|
(2)
|
Key Responsibilities
|
(a)
|
To monitor and direct the strategic relationship between Customer and Provider.
|
(b)
|
To provide an “interface” to the executive teams of both Parties by providing regular feedback on progress and achievements to executive meetings.
|
(c)
|
To review long term plans, business trends and directions.
|
(d)
|
To review overall performance of the Services including financial performance investments and the effectiveness of gain/risk share arrangements.
|
(e)
|
To monitor and confirm the achievement of the Transition and the Transformation as reported by the Transformation Review Board.
|
(f)
|
To prioritize, identify, and resolve strategic issues.
|
(g)
|
To resolve issues and/or disputes escalated by the Performance Review Board.
|
(h)
|
To examine proposals for amendments to the Agreement.
|
(i)
|
To review new policies or changes to existing policies.
|
(j)
|
To review new business opportunities submitted for consideration by Customer or Provider.
|
(3)
|
Members of the Executive Review Board
|
(a)
|
The Parties will name their representatives to the Executive Review Board within thirty (30) days from the Effective Date, including: Customer - TBD
|
(b)
|
Customer - TBD
|
(c)
|
Customer - TBD
|
(d)
|
Provider - TBD
|
(e)
|
Provider - TBD
|
(f)
|
Provider - TBD
|
(g)
|
Provider - TBD
|
2.3
|
Operating Level
|
(A)
|
Performance Review Board
|
(1)
|
Purpose
|
(a)
|
To provide overall operational leadership for the Services, including the delivery of the Services and Projects.
|
(b)
|
To manage ongoing and day-to-day relations between Customer Personnel and Provider Staff regarding the delivery of the Services.
|
(2)
|
Key Responsibilities
|
(a)
|
The identification and resolution of operational issues, including those issues escalated to the Performance Review Board by the Transformation Review Board.
|
(b)
|
The preparation, examination and implementation of any modifications to the format of all reports prepared by Provider.
|
(c)
|
The examination and validation of the service level credits, if any, to be paid by Provider.
|
(d)
|
To approve Service plans, guide overall activities and manage Service expectation.
|
(e)
|
To discuss and implement changes, Projects or New Services that should be agreed at a level above the day-to-day management team.
|
(f)
|
To discuss process improvement steps and oversee the implementation of any Changes decided upon by way of continuous improvement.
|
(g)
|
To review the progress of the Projects and (if applicable) all additional Projects. These reviews are to include a consideration of budget, timetable, dependencies, and progress against Project Milestones.
|
(h)
|
To review the progress of the Projects. These reviews are to include a consideration of budget, timetable, dependencies, and progress against Project Milestones.
|
(i)
|
To review monthly invoices related to the performance of the Services.
|
(j)
|
To identify any material current or future events that may affect Services.
|
(k)
|
To review the results of satisfaction surveys to be conducted by Provider and, if required, formulate an action plan to address any issues arising from such surveys.
|
(l)
|
To review the results of any qualitative surveys to be conducted by Provider, as agreed to by the Parties.
|
(m)
|
To prepare and implement any necessary amendments to the Agreement within the authority of the team (which will not include any authority to agree any of the items such as New Services).
|
(n)
|
To review and report to the Executive Review Board on the achievement of the Transition and the Transformation as reported by the Transformation Review Board.
|
(o)
|
To review annually the future technology maintenance costs.
|
(p)
|
To refer to the Executive Review Board for resolution of issues and/or disputes not resolved at Performance Review Board level.
|
(q)
|
To manage service interfaces between Customer and Provider in relation to the Agreement.
|
(r)
|
To review Service Level results and other operational and financial reporting.
|
(s)
|
To review reports produced by Provider for Customer, including the following:
|
(i)
|
service performance for the current month;
|
(ii)
|
summary of Customer usage of resources;
|
(iii)
|
prioritization of issues;
|
(iv)
|
agreed actions for any Party from any previous meetings; and
|
(v)
|
other performance measures as agreed to by the Parties.
|
(t)
|
To resolve issues affecting the provision of the Services to Customer.
|
(u)
|
To review and schedule Services-related change requests for referral to the Executive Review Board.
|
(v)
|
To review the Technology and Process Evolution described in
Section 3.7
(Technology and Process Evolution) of the MSA and formulate proposals for the implementation of any required changes Customer may wish to investigate further.
|
(w)
|
To agree on process improvement actions, including continuous improvement opportunities, and keep the appropriateness of the Service Levels under continuous review.
|
(x)
|
To agree on any changes to the Service Levels.
|
(y)
|
To discuss any need for initiation of Change Control Procedures to address Changes to the Services, or for any additional Projects.
|
(3)
|
Members of the Performance Review Board
|
(a)
|
Customer - TBD
|
(b)
|
Customer - TBD
|
(c)
|
Customer - TBD
|
(d)
|
Provider - TBD
|
(e)
|
Provider - TBD
|
(f)
|
Provider - TBD
|
(g)
|
Other - Other personnel as required.
|
2.4
|
Transformation Review Board
|
(A)
|
Purpose
|
(1)
|
To provide overall leadership for the technology and application transformation delivered by the Projects and, if appropriate, any technology-related additional Projects (collectively “
Technology Transformation Projects
”).
|
(B)
|
Key Responsibilities
|
(1)
|
To approve Technology Transformation Project plans in accordance with Customer’s Risk Management and Project approval procedures and guide overall activities.
|
(2)
|
To review the progress of the Technology Transformation Projects. These reviews are to include a consideration of budget, scope, timetable, dependencies, and progress against Project Milestones.
|
(3)
|
The identification and resolution of project issues, including those issues escalated to the Transformation Review Board by individual Project workstreams.
|
(4)
|
To assess Change Requests related to Projects in advance of submission to the Performance Review Board.
|
(5)
|
The preparation, examination, recommendation and integration of any modifications to the Technology Transformation Projects.
|
(6)
|
To identify any material current or future events that may affect the implementation of the Technology Transformation Projects.
|
(7)
|
Escalate matters as required to the Performance Review Board.
|
(C)
|
Members of the Transformation Review Board
|
(1)
|
Customer - [Program Director]
|
(2)
|
Customer - [Director of IT]
|
(3)
|
Provider - [IBM Client Partner Executive]
|
(4)
|
Provider - TBD
|
(5)
|
Other - Other personnel as required (for example Customer Group representatives).
|
3.1
|
The detailed processes to be conducted and the tasks to be performed by the various Governance Bodies will be defined during the Transition as part of the development of the Procedure Guide for the applicable SOW. The Procedure Guide will define the detail around the scheduling of and agendas to be followed by each Governance Body. The Parties will during the Term comply with and, if necessary, develop the policies and procedures set out in the Procedure Guide.
|
3.2
|
The requirements for the submission of reports to the various Governance Bodies will also be defined by the Parties in the Procedure Guide.
|
4.1
|
Prior to the initiation of formal dispute resolution procedures, the Parties will first attempt in good faith to resolve any dispute, controversy or claim arising under or in connection with this Agreement (a “
Dispute
”), as follows:
|
(A)
|
First, Customer Relationship Manager and IBM Client Partner Executive will meet as often, for such duration and as promptly as the Parties deem necessary to discuss the Dispute and negotiate in good faith in an effort to resolve the Dispute.
|
(B)
|
If Customer Relationship Manager and IBM Client Partner Executive are unable to resolve the Dispute within ten (10) Business Days after the referral of the Dispute to them, the Dispute will be referred to the Performance Review Board. The Performance Review Board will use reasonable efforts to resolve such Dispute or, if appropriate, to negotiate a modification or amendment to this Agreement. The Performance Review Board will meet as often, for such duration and as promptly as the Parties reasonably deem necessary to discuss the Dispute and negotiate in good faith in an effort to resolve the Dispute.
|
(C)
|
If the Performance Review Board is unable to resolve the Dispute within ten (10) Business Days after the referral of the Dispute to them, the Dispute will be referred to the Executive Review Board. The Executive Review Board will use reasonable efforts to resolve such Dispute or, if appropriate, to negotiate a modification or amendment to this Agreement. The Executive Review Board will meet as often, for such duration and as promptly as the Parties reasonably deem necessary to discuss the Dispute and negotiate in good faith in an effort to resolve the Dispute.
|
(D)
|
During the course of such discussions, all reasonable requests made by one Party to another for non-privileged or non-confidential information, reasonably related to the Dispute, will be considered in good faith in order that each of the Parties may be fully apprised of the other’s position. The specific format for such discussions will be left to the discretion of the Parties, but may include the preparation of agreed-upon statements of fact or written statements of position.
|
(E)
|
The Parties will continue to perform their obligations under this Agreement (to the extent reasonably possible in view of the Dispute being escalated) until such time as the Dispute has been resolved (by agreement or otherwise). While such escalation process is in process, neither Party will raise court proceedings against the other except where such action is necessary to stop or prevent an actual or threatened unauthorized disclosure of its Confidential Information, or to stop or prevent an actual or threatened misuse of its Intellectual Property Rights, or otherwise to stop or prevent irreparable harm to that Party.
|
1.1
|
This Schedule
describes the Change Control Procedures to be followed by Customer and Provider when either Party wishes to make a Change. The Parties may, by joint agreement, amend or waive any part of the Change Control Procedures in accordance with the Agreement, including where the Parties agree that shorter or longer time frames are more appropriate.
|
1.2
|
Objectives
. The objectives of the Change Control Procedures are as follows:
|
(A)
|
to review each request for a Change (a “
Change Request
”) to determine whether such Change is appropriate;
|
(B)
|
to determine whether a Change is within the scope of the Services or constitutes a New Service or is considered to be a change to the in-scope Services without constituting a change in the scope;
|
(C)
|
to prepare a more detailed proposal to implement a Change Request (such proposal, a “
Change Proposal
”);
|
(D)
|
to prioritize all Change Requests and Change Proposals;
|
(E)
|
to minimize the risk of exceeding both time and cost estimates, if any, associated with the requested Change by identifying, documenting, quantifying, controlling, managing and communicating: (a) Change Requests, (b) the preparation of Change Proposals, and (c) their disposition;
|
(F)
|
to identify the different roles, responsibilities and actions that will be assumed and taken by the Parties to define and implement the Changes; and
|
(G)
|
to document a Change whether or not such Change results in any additions or reductions in Fees, scope or time.
|
1.3
|
Each Party will be responsible for all costs and expenses incurred by its personnel, agents and subcontractors (in Provider’s case, Provider Agents and Provider Staff) with respect to its participation in, and responsibilities and obligations under, the Change Control Procedures.
|
2.1
|
Either Provider or Customer may initiate a Change Request by delivering to the other Party’s Authorized Representative or his/her nominated representative a document (a “
Change Request Form
”) that describes the Change and the reasons for it. Such Change Request Form will be the same or similar to that in
Exhibit
|
2.2
|
Each Party’s respective Authorized Representative or his/her nominated representative will be responsible for reviewing and considering any Change Request, and will approve it for further investigation, if deemed necessary. If the Parties agree that the Change Request requires further investigation, the Authorized Representatives will authorize such investigation, which will be performed as required by Provider and/or Customer. In accordance with
Section 3
(Change Request Log)
below, the Provider’s Authorized Representative or a designated representative (with review and concurrence from the Customer’s Authorized Representative) will be responsible for keeping up to date the status of each Change Request in the Change Request Log as the status of the Change Request changes through the Change Control Procedures.
|
2.3
|
Preliminary Change Report
.
|
(A)
|
Preliminary Change Report Preparation
. For each Change Request that the Parties have approved for further investigation, regardless of which Party has proposed the Change, Provider will prepare and submit to Customer within [***] calendar days (or as otherwise agreed in writing by the Parties, e-mail to suffice), with Customer’s reasonable cooperation and provision of any information reasonably requested by Provider, a preliminary written report. Such preliminary report will contain:
|
(1)
|
the costs associated with the Change;
|
(2)
|
the timeframe for implementing the Change (including any timing constraints);
|
(3)
|
the preliminary technical rationale for making the Change, as well as any changes or additions to policies, standards and procedures of Provider and/or Customer as the case may be, in accordance with which the Change is to be implemented;
|
(4)
|
the resources (including without limitation human resources, hardware, software and other Equipment) and associated Fees, if any, required for implementing the Change; and
|
(5)
|
an initial analysis of the potential risks (if any) to Customer or Provider if the Change is not implemented.
|
(B)
|
Report Review
. Customer and Provider will review the preliminary report and Customer will, within [***] calendar days after delivery of such preliminary report in writing, either (a) instruct Provider to prepare a comprehensive Change Proposal as set forth in
Section 2.3(C)
(Comprehensive Change Proposals) below, (b) notify Provider that it does not wish to proceed with the Change, or (c) proceed with the Change on the material terms set forth in the preliminary report and other mutually-agreed terms as necessary to reasonably complete the Change Order.
|
(C)
|
Comprehensive Change Proposals
. Where Customer has instructed Provider to prepare a comprehensive Change Proposal, [***] calendar days (or as otherwise agreed in writing by the Parties, e-mail to suffice) after receiving such instruction, Provider will prepare a Change Proposal including the following elements of the Agreement, to the extent relevant:
|
(1)
|
scope of the Services;
|
(2)
|
the Service Levels;
|
(3)
|
whether the Change will be an increase in Project cost, a decrease in Project cost, or cost neutral to Customer, including any Fees for the Change (
e.g.
, fixed price or time and materials, including an estimate of total costs) as well as changes to the Fees, if any;
provided, however
, if a Change Proposal covers multiple customers, Provider will offer to perform the Change Proposal for Customer at a cost which takes into account Customer’s proportional share of the pro-ratable costs;
|
(4)
|
the resources (including without limitation human resources, hardware, Software and other Equipment) required for implementing the Change;
|
(5)
|
timeline, milestones and delivery dates for implementing the Change;
|
(6)
|
evaluation testing, development, Acceptance Testing, Acceptance Testing period, and acceptance criteria (which must be included in the final Change Order);
|
(7)
|
DR Plan and/or changes to the applicable DR plan;
|
(8)
|
impacts to, additions or deletions of, Third-Party Contracts;
|
(9)
|
any impacts on Customer Equipment, Customer Software, Customer Property, Provider Equipment, Provider Software, Provider Property, or any member of Customer Group’s, Customer Agents’ (in the case of Customer), Provider’s or Provider Agents’ business operations, personnel requirements or other services;
|
(10)
|
any related technical or human resource Systems/procedures;
|
(11)
|
any legal and regulatory compliance issues;
|
(12)
|
any other matter reasonably requested by Customer at the time of preparation of the impact analysis or reasonably considered by Provider to be relevant;
|
(13)
|
the Transition Plan and/or changes to the applicable Transition Plan;
|
(14)
|
any additional terms and conditions applicable to the Change;
|
(15)
|
where the Change relates to New Services to be provided, how the business objectives of Customer and Provider will be achieved in the provision of those Services;
|
(16)
|
any additional contractual terms and conditions which would apply to the Change, any changes to the contractual terms and conditions of the Agreement, together with details of the effect (if any) those terms and conditions will have on the Agreement; and
|
(17)
|
an analysis of the potential risks (if any) to Customer or Provider if the Change Proposal is not implemented.
|
(D)
|
Change Proposal Review
.
|
(1)
|
Once submitted by Provider, Customer will review the Change Proposal and as soon as reasonably practicable, and in any event not more than [***] calendar days (or as otherwise agreed in writing by the Parties, e-mail to suffice) after receipt of the Change Proposal, either:
|
(a)
|
Customer may notify Provider that it does not wish to proceed with the Change, in which case no further action will be taken in respect of the Change Proposal; or
|
(b)
|
Customer may request that it and Provider meet to discuss the Change Proposal (such meeting to be referred to as the “
Change Proposal Meeting
”).
|
(2)
|
At the Change Proposal Meeting, the Parties will use reasonable efforts to agree to:
|
(a)
|
take no further action in respect of the proposed Change, in which case no further action will be taken in respect of the Change Proposal and it will be deemed to be “rejected” on the action log;
|
(b)
|
acquire further information before deciding whether to proceed with the Change;
|
(c)
|
amend some or all of the contents of the Change Proposal, which Provider will incorporate into a revised version of the Change Proposal; or
|
(d)
|
proceed with the Change as detailed in the Change Proposal, in which case the Change Proposal will be signed and the Change incorporated in accordance with
Section 2.4
(Effectiveness of a Change) below.
|
(3)
|
If the Parties agree to proceed in accordance with one of the options detailed in
Section 2.3(D)(2)
above, then the Parties will gather any necessary information and/or Provider will prepare a revised version of the relevant Change Proposal, upon which the Parties will decide whether to proceed in accordance with
Section 2.3(D)(2)
above. The Parties will continue to go through the process detailed above until such time as a final resolution is made by the Parties. The Parties will act in good faith at all times during such process.
|
(4)
|
The Parties anticipate that not all Changes will result in increases in the Fees. Nevertheless, the Parties intend that all Changes will be documented under this this
Schedule 6
(Change Control Procedures). Additional Fees for Changes will apply in general when Provider reasonably demonstrates that the implementation or adoption of the Change requires Provider to supply additional resources or perform Services that are not otherwise covered by the existing Fees.
|
(5)
|
Notwithstanding anything else, (a) all Changes that do not materially increase the cost of Provider for performing the Services; (b) all Changes to Services for which Provider can mitigate the impact of the Change by re-ordering, re-using or otherwise re-prioritizing or mitigating the impact without incurring material additional cost, (c) all Changes caused by a failure of Provider to perform any of its obligations under the Agreement, and (c) all other Operational Changes initiated (i) by Provider or (ii) by Customer that do not incur a material additional cost for Provider, will be made at no cost to Customer but
provided, however,
that for Changes with increases in volumes of existing Services where such increased volumes would subject Customer to additional Fees pursuant to the applicable Fees Exhibit, Customer shall pay additional Fees pursuant to the applicable Fees Exhibit.
|
2.4
|
Effectiveness of a Change.
|
(A)
|
Signed Change Orders.
Upon the signature of a Change Proposal by both Parties’ Authorized Representatives, the contents of such Change Proposal will be deemed to be agreed and incorporated into the Agreement on the date of the last signature or as the Parties may otherwise agree (each such accepted Change Proposal will become a “
Change Order
”). All services added or modified by a Change Order will be Services under the Agreement, and the performance of Change Orders will in all respects be governed by the Agreement. Except as expressly provided herein, no part of the discussions or interchanges between the Parties will obligate the Parties to approve any Change or will constitute an amendment or waiver of the Agreement unless and until reflected in a Change Proposal and adopted in accordance with this
Schedule 6
(Change Control Procedures). Neither Party will have any obligation to commence or comply with any Change, perform services that would be covered by any Change, or pay any Fees that would be covered by any Change, until such time as the Parties’ Authorized Representatives have signed the appropriate Change Order. Disputes (as defined in
Schedule 4
(Governance) of the Agreement) regarding a Change will be subject to the Dispute resolution process in
Schedule 4
(Governance) of the Agreement.
|
(B)
|
Acceptance Criteria.
To the extent specified in a Change Order or the work under such Change Order is otherwise related to a Reviewable Item, Customer’s acceptance of, and payment for, work under such Change Orders will be subject to Customer’s acceptance in accordance with the acceptance process in
Section 3.20
(Acceptance Testing) –
Section 3.24
(No Deemed Acceptance) of the Agreement.
|
(C)
|
Failure to Agree
. If the Party initiating a Change Request believes that the requested Change is required or necessary, the requesting Party will inform the other Party in writing of the reasons why the Change is required and the impact if it is not implemented or the reasons why a Change to the Fees is justified and equitable. If the other Party does not agree to implement the Change, the requesting Party will be entitled to consider the other Party’s refusal to agree to implement the Change as a Dispute, and the requesting Party may escalate such Dispute for resolution in accordance with
Schedule 4
(Governance) of the Agreement.
|
2.5
|
Emergency Change Process
. In the event that either Party requires a Change in order to respond to an emergency and such Change would, in the reasonable opinion of the requesting Party, if it was not implemented until Change Control Procedures had been followed, have a detrimental effect generally on Customer Group, including without limitation Customer Group’s financial interests, Customer Group’s welfare or public safety, or specifically impacting Provider‘s ability to meet its obligations pursuant to the Agreement, the requesting Party will make all reasonable efforts to contact the other Party’s Authorized Representative, and if the requesting Party is unable to contact the other Party’s Authorized Representative after reasonable efforts, the requesting Party may make temporary Changes to the Services without the prior consent of the other Party. The requesting Party will notify the other Party as soon as practicable but no later than twenty-four (24) hours after the event of such Change and will, as soon as reasonably practicable (but no later than two (2) business days thereafter) document and report in writing on such Changes to the other Party. Any agreed Change as a result will be agreed in accordance with Change Control Procedures. Disputes regarding any additional Fees for Changes under this
Section 2.5
are subject to the Dispute resolution process in the Agreement.
|
2.6
|
Mandatory Changes
. Notwithstanding the Change consideration and implementation process outlined in this
Schedule 6
(Change Control Procedures) but in all events subject to
Section 2.4(C)
above, if a Change requested by Customer is a Mandatory Change, Provider will immediately begin implementing the Mandatory Change upon request by Customer
provided
Customer agrees to pay any upfront one-time charges related to such change (for example, hardware, software or similar investments) that are approved in writing in advance by Customer. Provider will also prepare and deliver to Customer a Change Proposal related to the Mandatory Change on an expedited basis, where appropriate, and the Parties will work together in good faith to determine the impact on the Agreement (including without limitation, any impact on the Fees) as a result of implementing the Mandatory Change. If the Parties are unable to agree on the impact on the Agreement within [***] calendar days after Customer has received the Change Proposal from Provider, either Party may consider such failure to agree to be a Dispute, and may escalate such Dispute for resolution in accordance with
Schedule 4
(Governance) of the Agreement. If the Parties are unable to resolve the Dispute within [***] calendar days of the escalation of such Dispute, then Provider may discontinue implementing the Mandatory Change. “
Mandatory Change
” means (A) any Change requested by Customer, that, in the reasonable judgment of Customer is required (1) to comply with any Customer Law; (2) as a result of any new Customer Policy or updated, amended or modified Customer Policy that Customer issues to comply with any Law; or (3) for
|
3.1
|
Provider will provide Customer, as part of its monthly reporting obligations, a summary specifying the status of all pending Change Requests and Change Proposals.
|
3.2
|
Each entry made in the Change Request Log will consist of the following fields:
|
(A)
|
number of the Change Request;
|
(B)
|
name of the originating Party;
|
(C)
|
a brief description of the Change;
|
(D)
|
the current status of the Change; and
|
(E)
|
the date of registration of the Change Request in the Change Request Log.
|
3.3
|
The status of the Change Request at any stage in Change Control Procedures will be one of the following:
|
(A)
|
raised (
i.e.
, that the Change Request has been entered in the Change Request Log, but no Change Proposal has been issued);
|
(B)
|
pending (
i.e.
, that the Change Request has been raised and the Change Proposal has been issued);
|
(C)
|
approved (
i.e.
, awaiting implementation);
|
(D)
|
closed (
i.e.
, all implementation tasks have been completed); or
|
(E)
|
rejected (
i.e.
, closed and not implemented).
|
Change Request Information
|
Comments
|
Reasons for approving
|
Explanation supporting the approval
|
Other proposed solution
|
Customer may propose a different solution from the one presented by Provider
|
Customer Sign-Off
|
Customer individual who has signed the Change Request
|
Customer Sign-Off Date
|
Date of sign-off of the Change Request
|
Provider Sign-Off
|
Provider individual who has signed the Change Request
|
Provider Sign-Off Date
|
Date of sign-off of the Change Request
|
Change Request Identification
|
|||
Document Number:
|
|
Version:
|
|
Creation Date:
|
|
||
Beneficiary:
|
|
Request Date:
|
|
Requested by:
|
|
Position:
|
|
Change Request Description
|
|
Requested Priority:
|
|
Impacted Service Location(s):
|
|
Overall Description:
|
|
Overall Impact Evaluation:
|
|
Estimated costs for detailed analysis:
|
|
Estimated Costs for Implementation:
|
|
Submission Date:
|
|
Change Request Approval
|
|||
|
|||
Approval:
|
|
Approval Date:
|
|
Approver Name:
|
|
Target Implementation Date:
|
|
Approved Priority:
|
|
||
Reasons for Approving:
|
|
||
Other Proposed Solution:
|
|
||
Change Request Sign-Off
|
|||
Customer Sign-off:
|
|
Date of Sign-off:
|
|
Provider Sign-off:
|
|
Date of Sign-off:
|
|
1.
|
INTRODUCTION
|
2.
|
PROGRAM MANAGEMENT SYSTEM CREATION AND UPDATES
|
2.1
|
Provider Responsibilities
.
|
(A)
|
Provider will incorporate into the Program Management System relevant business processes, applicable standards, policies and requirements employed by Provider in providing the Services, including:
|
(1)
|
Existing approved policies, procedures and data of and/or collected from Customer Group, including Customer Policies (including forms and instructions contained therein); and
|
(2)
|
New policies, procedures and data, subject to Customer’s prior written authorization, required for the operation and governance of the Agreement.
|
(B)
|
Provider will maintain the Project Management System in a current state during the Term. Updates will include:
|
(1)
|
Revised approved policies, procedures and data, including Customer Policies (including forms and instructions contained therein) collected from Customer;
|
(2)
|
New policies, procedures and data, subject to Customer’s prior written authorization, required for the operation and governance of the Agreement; and
|
(3)
|
Deletion of obsolete policies, procedures and data, subject to Customer’s prior written authorization. Deleted policies, procedures and data will be logged with the date and reason for deletion.
|
(C)
|
Changes to the Program Management System will be made in accordance with the Change Control Procedures.
|
Content
|
Brief Description
|
(b) Key Contacts – Customer
|
List of contacts within Customer that are key users of the Services and/or perform a liaison function in regard to the Services.
|
(c) Key Contacts – Provider Agents
|
List of key Provider Agent contacts.
|
2. PERFORMANCE MANAGEMENT PROCEDURES
|
Ongoing, “steady state” processes, procedures and policies including information on coordination activities, responsibilities of each party (by title/function).
|
(a) Performance Monitoring and Reporting Procedures
|
Procedures Provider will use to verify Service delivery on a day‑to‑day basis, including internal reporting and reporting to Customer.
|
(b) Problem Management and Escalation Procedures
|
Procedures Provider will use to identify problems, report and resolve problems, and escalate as necessary within Provider organization and/or Customer.
|
(c) Root Cause Analysis Procedures
|
Procedures Provider will use to determine root cause of problems, including involvement of (and/or support to) Customer, End Users or other applicable third parties.
|
(d) Service Level Measurement and Reporting Procedures
|
Procedures Provider will use to measure and report Service Levels (including Performance Indicators and Critical Performance Indicators) to Customer.
|
(e) Project Management Procedures
|
Description of the methodology and procedures Provider will use to manage and report on Projects.
|
(f) Change Management Procedures
|
Description of the methodology and procedures Provider will use to implement Improvements and bug fixes into its environment.
|
(g) Physical Access & Security Procedures
|
Physical access and security procedures Provider will use at Service Locations.
|
(h) Network Access & Security Procedures
|
Network access and security procedures to which Provider will adhere.
|
Content
|
Brief Description
|
(i) DR Plan
|
Procedures Provider will use in regard to disaster recovery and business continuity developed in accordance with the requirements specified in
Section 10.1
(Disaster Recovery Plan) of the MSA. Provider may reference other documents containing comprehensive procedures, including
Schedule 12
(Disaster Recovery and Business Continuity Requirements) but should provide a general overview within the Procedure Guide.
|
(j) Other relevant procedures
|
Description of any other procedures required to deliver the Services as agreed to by the Parties.
|
3. FINANCIAL MANAGEMENT PROCEDURES
|
Ongoing, “steady state” procedures and policies, including information on coordination activities and responsibilities of each Party (by title/function).
|
(a) Invoicing
|
Procedures for invoicing and verification of invoice by Customer.
|
(b) Project Milestones
|
Procedures for reporting on Project Milestone progress, measurement and achievement.
|
(c) Other relevant procedures
|
Description of any other procedures required to deliver the Services as mutually agreed to by the Parties.
|
4. CONTRACT MANAGEMENT PROCEDURES
|
Ongoing, “steady state” procedures and policies, including information on coordination activities, responsibilities of each Party (by title/function).
|
(a) Provider Key Personnel and Subcontractors
|
Procedures for Customer’s authorization regarding replacement or removal of Provider Key Personnel, Provider Staff and Provider Agents in compliance with the Agreement.
|
(b) Problem Resolution
|
Any further description of the procedures regarding the problem resolution process in the Agreement and the Parties’ respective representatives.
|
(c) Other relevant procedures
|
Other procedures required to deliver the Services as mutually agreed to by the Parties.
|
5. RELATIONSHIP MANAGEMENT PROCEDURES
|
Ongoing, “steady state” procedures and policies, including information on coordination activities and responsibilities of each Party (by title/function).
|
Content
|
Brief Description
|
(a) Satisfaction Surveys
|
Description of the process to be used for conducting satisfaction surveys.
Content should include procedures regarding action items and attempts to resolve Customer’s issues.
|
(b) Customer / Provider Relationship Management
|
Procedures and responsibilities regarding the relationship between Customer, the Customer governance organization (including the Customer executive team) and Provider.
Content should include procedures regarding communication and coordination regarding work requests, Service delivery issues, budgeting and financial issues.
|
(c) Other relevant procedures
|
Other procedures required to deliver the Services as mutually agreed to by the Parties.
|
6. PROVIDER OPERATIONAL PROCEDURES
|
Ongoing, “steady state” procedures and policies, including information on coordination activities, responsibilities of each Party (by title/function).
|
(a) Operational Procedures
|
Operational processes and policies used by Provider for its interface with Customer in delivery of the Services will be set forth in the Process Interface Manual as described below in Section 4.
|
(b) Regulatory Compliance Policies
|
Customer’s regulatory compliance policies and Provider’s processes, procedures and methodologies utilized in the implementation of such regulatory compliance policies.
|
(c) Finance Policies and Procedures
|
Customer’s finance policies and procedures and Provider’s processes, procedures and methodologies utilized in the implementation of such finance policies and procedures.
|
(d) Quality Assurance Procedures
|
Provider’s quality management procedures relating to the provision of the Services including the checkpoint reviews, testing and acceptance procedures.
|
(e) Information Security Controls Procedures
|
Detailed data, network and physical access requirements and procedures that will define the security controls that Provider will implement as part of the Services will be set out in the Customer Security Document as set forth in
Schedule 9
.
|
4.
|
PROCESS INTERFACE MANUAL CREATION AND UPDATES
|
4.1
|
Provider Responsibilities
.
|
(A)
|
Provider will incorporate into the Process Interface Manual relevant operational processes, applicable standards, policies and requirements employed by Provider in providing the Services, including:
|
(1)
|
Existing approved operational processes collected from Customer Group, including interfaces between Customer and Provider Managed Operations service offerings; and
|
(2)
|
New operational process, subject to Customer’s prior written authorization, required for the operation and governance of the Agreement.
|
(B)
|
Provider will maintain the Process Interface Manual in a current state during the Term. Updates will include:
|
(1)
|
Regularly revise, subject to mutual agreement by Customer and Provider, to support enhancements and changes to operational processes and interfaces, to support the services as described in Infrastructure & End User SOWs;
|
(2)
|
Add new operational processes and interfaces, subject to mutual agreement by Customer and Provider, to support changes in contracted services required for the operation and governance of the Agreement; and
|
(3)
|
Deletion of obsolete operational processes and interfaces, subject to mutual agreement by Customer and Provider, to support changes in contracted services.
|
(4)
|
Deleted operational processes and interfaces will be logged with the date and reason for deletion.
|
(C)
|
Changes to the Process Interface Manual will be made in accordance with the Change Control Procedures.
|
Content
|
Brief Description
|
OPERATIONAL PROCESSES
|
Ongoing, “steady state” services and interfaces used by Provider Service Delivery to deliver agreed services for Customer. Chapters include description of services, scope, responsibility matrix, support requests, procedures, polices and guidelines and other relevant information needed by Provider to deliver the services.
|
a) Application Administration Account Details
|
Overview of services and interfaces related to Application Administration / Middleware Management
|
b) Asset Management Account Details
|
Overview of services and interfaces related to Asset Management
|
c) Availability Management Account Details
|
Overview of services and interfaces related to Availability Management
|
d) Backup and Restore Support Service Details
|
Overview of services and interfaces related to Backup and Restore Management
|
e) Capacity and Performance Management Account Details
|
Overview of services and interfaces related to Capacity and Performance Management.
|
f) Change / Release / Deployment Management Account Details
|
Overview of services and interfaces related to Change / Release / Deployment Management.
|
g) Console Operations Service Details
|
Overview of services and interfaces related to Console Operations Management.
|
h) Database Support Service Details
|
Overview of services and interfaces related to Database Management.
|
i) Disaster Recovery Account Details
|
Overview of services and interfaces related to Disaster Recovery Management.
|
j) Event Management Account Details
|
Overview of services and interfaces related to Event Management.
|
k) Identity and Access Management Account Details
|
Overview of services and interfaces related to Identity and Access Management.
|
l) Incident / Major Incident Support Service Details
|
Overview of services and interfaces related to Incident / Major Incident Management.
|
m) Infrastructure Support Service Details
|
Overview of services and interfaces related to Infrastructure Services Management.
|
n) Knowledge Management Account Details
|
Overview of services and interfaces related to Knowledge Management.
|
o) Network Support Service Details
|
Overview of services and interfaces related to Network Service Management.
|
1.1
|
General
|
(A)
|
For purposes of the Agreement, “
Affected Employees
” means all Customer Group personnel who would receive offers to transition to Provider and perform the in-scope information technology infrastructure activities. It is anticipated that the Affected Employees will include all Customer Group personnel in the following Customer information technology organization areas: (1) End User, (2) Infrastructure and (3) Applications.
|
(B)
|
Without limiting the foregoing,
Exhibit A
(Affected Employees) to this Schedule sets forth a list of known Affected Employees by name, title and information technology organization area. If an Affected Employee accepts the offer of employment made by Provider as described below in
Article 3
, such individual will become an employee of Provider or a Provider Agent engaged by Provider but only to the extent set forth in
Section 2.2
(hereafter referred to as “
New Provider Employee
”) and will be deemed Provider Staff for purposes of the Agreement. Provider must meet the following criteria with respect to the offers of employment to the Affected Employees and for the transition and employment to New Provider Employees. The “
Employment Effective Date
” for each such New Provider Employee will be the effective date on which Provider actually employs such individual. Provider will bear all Provider costs incurred in complying with the provisions set forth in this Schedule.
|
2.2
|
Anticipated Timeline of Events
|
•
|
Affected Employees will receive an offer of employment from Provider or a Provider Agent (in the case of Provider Agents, only with regard to countries other than the US or India) on the terms herein no later than March 1, 2019 (the date each such Affected Employee receives an offer of employment from Provider will be referred to herein as the “
Offer Date
”).
|
•
|
Affected Employees who accept Provider’s offer of employment will become New Provider Employees by May 1, 2019.
|
3.1
|
Offers of Employment
|
(A)
|
Provider understands and acknowledges the importance to Customer that all employees of Customer Group who may be affected by this Agreement are (1) treated with respect and dignity and (2) given employment opportunities with Provider in connection with the Services provided to Customer Group for at least twelve (12) months, at which time Provider may provide other opportunities.
|
(B)
|
No later than March 1, 2019, Provider (or a Provider Agent to the extent permitted under
Section 2.2
) will offer written offers of employment to all Affected Employees (including those on leave of absence or disability so long as Customer provides each such Affected Employee’s written consent to be contacted by Provider). Templates of written offers for each country with Affected Employees are attached as
Exhibit B
(Template Offer).
|
(C)
|
Provider is solely responsible for making any hiring decisions regarding Affected Employees;
provided, however
, Provider will hire each Affected Employee who:
|
(1)
|
receives an employment offer from Provider (or a Provider Agent to the extent permitted under
Section 2.2
) consistent with the terms and conditions set forth herein;
|
(2)
|
accepts such offer of employment in accordance with the terms of the offer;
|
(3)
|
is actively employed by Customer as of the date of such offer is extended and continues acceptable performance with the Customer, as determined by Customer in its sole discretion, up to the Employment Effective Date;
|
(4)
|
passes the following Provider pre-employment screening requirements: criminal background, export regulation controls review/embargoed countries, proof of identity evaluation, work authorization/residence permit and denied parties list, Provider rehire eligibility, and a review of any applicable non-compete agreement that may prevent hiring; and
|
(5)
|
is not on a leave of absence or disability leave from Customer as of the Employment Effective Date;
provided, however
, Provider will offer to hire any such Affected Employee if he/she returns to a temporary or permanent position with the Customer within six (6) months from the Employment Effective Date.
|
(D)
|
Such offers of employment will be on terms and conditions substantially similar in the aggregate (with respect to position, base salary and wages, variable compensation, equity compensation, vacation, paid time off and employee benefits) to those in effect for such Affected Employees immediately prior to the Effective Date, but in no event will they be less than the terms set forth in this
Schedule 8
(Employee Matters).
|
(E)
|
Each Affected Employee will have a seven (7) Business Day period following the Offer Date within which to accept any offer of employment from Provider;
|
(F)
|
Following the Employment Effective Date, the Affected Employees who accept the offer of employment will be deemed to be New Provider Employees and under the exclusive supervision and control of Provider, subject to Provider’s policies and procedures, and Customer Group will, except as otherwise provided for in this Schedule, have no further right to participate in or control the employment of such.
|
(G)
|
Notwithstanding the foregoing, Provider will have the responsibility to manage all New Provider Employees and Provider Staff as of the Service Commencement Date.
|
(A)
|
Provider will coordinate with Customer, and obtain its approval which will not be unreasonably withheld, regarding plans and schedules for conducting “one-on-one sessions”, “town hall sessions”, and other informational meetings with all Affected Employees. A detailed description of all such events, including a proposed schedule and timeline for such events, will be set forth in the employee transition plan agreed upon by the Parties pursuant to
Section 7
(Employee Transition). Provider will hold the first such informational meeting and/or program as soon as reasonably possible after the Effective Date of the Agreement and will hold additional events before and after the letters offering employment are received by the Affected Employees.
|
(B)
|
Provider may initiate special activities to generate goodwill with the Affected Employees with the prior written approval of such programs by Customer. These activities, including costs, are the responsibility of Provider. Customer will consider requests from Provider to assist in the roll-out and implementation of these activities.
|
5.1
|
Comparable Positions
|
5.2
|
Location
|
5.3
|
Status
,
Training and Long-Term Career Opportunities
|
6.1
|
Wages
|
(A)
|
Unvested Customer Equity
. For the first year following the Employment Effective Date, Provider will pay each New Provider Employee any previously granted but unvested equity as such equity vests, in accordance with Customer’s current vesting schedule, subject to Customer’s reimbursement to Provider of such amounts paid to each such New Provider Employee, in accordance with the invoicing and payment terms set forth in
Section 12.1
(General) of the MSA.
|
(B)
|
Provider’s Replacement for Customer’s Equity Compensation. New Provider Employees will be eligible to participate in Provider’s employee equity program as of the Employment Effective Date to the same extent as similarly situated Provider employees. Additionally, for each New Provider Employee, Provider will include an amount in the Benefit Equalization Adjustment described in
Section 6.3(B)
equivalent to (1) if such New Provider Employee was employed by Customer for three (3) or more years, the average annual value of the equity such New Provider Employee received under the Customer equity program over the three (3) years from 2016 through 2018 that vested during such period; (2) if such New Provider Employee was employed by Customer for less than
|
(C)
|
Bonus
. New Provider Employees will be eligible to participate in Provider’s established program designed to return a portion of revenue and pretax profit growth based on a predetermined model (“
Growth Driven Profit Sharing Plan
”) as of the Employment Effective Date to the same extent as similarly situated Provider employees. Additionally, for each New Provider Employee, Provider will include in the Benefit Equalization Adjustment described in
Section 6.3(B)
an amount equivalent to the difference between (1) Customer’s average annual bonus payout to the Affected Employees at the same salary grade as the New Provider Employee immediately prior to the Employment Effective Date, averaged for the calendar years 2015 through 2017, and (2) Provider’s average Growth Driven Profit Sharing Plan payout for the same period for non-executive employees in the same country as the New Provider Employee. Provider will pay each New Provider Employee any bonus amounts payable by Customer to such New Provider Employee covering the period between January 1, 2019 and April 30, 2019 as Customer notifies to Provider in writing, subject to Customer’s reimbursement to Provider of such amounts paid to each such New Provider Employee, in accordance with the invoicing and payment terms set forth in
Section 12.1
(General) of the MSA.
|
6.2
|
Compensation Increases
|
6.3
|
Benefits
|
(A)
|
Each New Provider Employee will be eligible as of his or her Employment Effective Date for participation in all Provider benefit plans in operation in that Provider entity and location and available to similarly situated employees, including health care coverage, dental, vision, employee assistance, tuition assistance, employee discount and stock purchase plan, life insurance, accidental death and dismemberment, short-term and long-term disability, flexible spending accounts, and 401(k), as well as vacation and sick leave in accordance with Provider’s time off policies.
|
(B)
|
In the event that the aggregate premium costs for benefits described in this Section incurred by any New Provider Employee under Provider’s benefit plans are greater than such employee’s aggregate premium costs for such benefits under Customer’s benefit plans, Provider will pay a benefit equalization adjustment of such difference (a “
Benefit Equalization Adjustment
”) to supplement such New Provider Employee’s pay. This equalization benefit will cover a period of twelve (12) months from the Employment Effective Date and be paid on a schedule agreed upon by the Parties in writing no later than one (1) week prior to the Offer Date.
|
(C)
|
Benefit Equalization Adjustments will be calculated based on a mapping to each of Customer’s benefits referred to in
Section 6.3(A)
of this Schedule, including, in the case of health care coverage and dental coverage, Provider’s medical or dental plans by type (
e.g.
, PPO, HMO). 401(k) employer match Benefit Equalization Adjustment will be based on contribution to Customer’s 401(k) plan as of January 1, 2019. Benefit Equalization Adjustments will be based on Customer’s tier level and benefits participation as of January 1, 2019, and will be calculated after actual election of benefits. Benefit Equalization Adjustments will be calculated in the aggregate based on New Provider Employee elections. If an Affected Employee goes through a Qualifying Event as defined by applicable provisions of the Employee Retirement Income Security Act of 1974 (“
ERISA
”) between January 1, 2019 and the Employment Effective Date, the Parties will agree to an equitable adjustment to any of the foregoing benefits as it relates to such Affected Employee.
|
(A)
|
Employee Transition Plan
|
Event/Activity
|
Timeframe
|
Initial informational meeting/program with all Affected Employees
|
Within two weeks of the Effective Date of Agreement
|
Additional informational meetings/activities with Affected Employees
|
Between the Effective Date and the Offer Date, and in any event no later than the Employment Effective Date
Meetings will include:
Career Discussions
1-on-1 meetings with IBM Functional Managers
|
Offer of employment to all Affected Employees
|
No later than March 1, 2019
|
Length of time that offers of employment will remain “open”
|
Seven (7) Business Days following receipt of offer or as otherwise provided in this Schedule
|
(A)
|
Customer will be responsible for all Claims asserted by Affected Employees arising out of their employment with Customer prior to the Employment Effective Date, but Provider will be responsible for all Claims asserted by Affected Employees arising out of their employment with Provider.
|
(B)
|
Customer will indemnify and hold Provider harmless from and against any and all Losses, including those incurred to enforce the terms of this Schedule, incurred or suffered by Provider relating to or resulting from third-party Claims arising out of (i) Customer’s employment of Affected Employees or (ii) the termination of such employment relationship by Customer with such Affected Employees, in each case, to the extent such Losses are caused by acts or omissions of Customer, including any of the following:
|
(1)
|
Claims alleging violations of federal, state, local, international, constitutional or other Laws or any common law protecting persons or members of a protected class or category, including, without limitation, Laws prohibiting discrimination or harassment on the basis of a protected characteristic;
|
(2)
|
Claims arising out of the California Labor Code, California’s Business & Professions Code, or any other Law relating to employment;
|
(3)
|
Claims alleging work-related injury, illness or death, except as may be covered by Customer’s workers’ compensation plan;
|
(4)
|
any claims, complaints or charges for wages, benefits, commissions, bonuses, compensation, penalties, interest, or damages and other payments (including but not limited to a claim for social contributions and/or government mandated payments into health and pension schemes) which are made against Provider by any Affected Employee or Affected Employee’s beneficiaries, successors or assigns or with respect to any Affected Employee by any tax or social security authorities and/or any other responsible authorities;
|
(5)
|
Claims for failure to provide severance or termination benefits;
|
(6)
|
Claims for workers or disability compensation or unemployment benefits; or
|
(7)
|
Claims arising out of a determination that any Affected Employee is an employee, co-employee or joint employee of Provider pursuant to any applicable Law, and/or otherwise;
|
(8)
|
any Claims in respect of the employment, treatment or termination of employment of any Affected Employee, including claims for unfair termination, wrongful termination, notice, redundancy and/or any claims for termination payments, discrimination, harassment or retaliation; and
|
(9)
|
Claims for accrued employee pension or welfare benefit obligations that arose under applicable Customer plans or policies.
|
(C)
|
Provider will indemnify and hold Customer Group harmless from and against any and all Losses, including those incurred to enforce the terms of this Schedule, incurred or suffered by Customer Group relating to or resulting from third-party Claims arising out of (i) Provider’s employment of Affected Employees or (ii) the termination of employment relationship by Provider with Affected Employees, in each case, to the extent such Losses are caused by acts or omissions of Provider in connection with Provider’s offers of employment or the acts or omissions of Provider from the Employment Effective Date of the Affected Employees, and including any of the following:
|
(1)
|
Claims alleging violations of federal, state, local, international, constitutional or other Laws or any common law protecting persons or members of a protected class or category, including Laws prohibiting discrimination or harassment on the basis of a protected characteristic.
|
(2)
|
Claims arising out of the California Labor Code, California’s Business & Professions Code, or any other Law relating to employment;
|
(3)
|
Claims alleging work-related injury, illness, or death, except as may be covered by Provider’s workers’ compensation plans;
|
(4)
|
any claims, complaints or charges for wages, benefits, commissions, bonuses, compensation, penalties, interest, or damages and other payments (including but not limited to a claim for social contributions and/or government mandated payments into health and pension schemes) which are made against Customer and/or any member of Customer Group by any Affected Employee or Affected Employee’s beneficiaries, successors or assigns or with respect to any Affected Employee by any tax or social security authorities and/or any other responsible authorities;
|
(5)
|
Claims for failure to provide severance or termination benefits;
|
(6)
|
Claims for workers or disability compensation or unemployment benefits; or
|
(7)
|
Claims arising out of a determination that any Affected Employee is an employee, co-employee or joint employee of Customer pursuant to any applicable Law and/or otherwise;
|
(8)
|
any Claims in respect of the employment, treatment or termination of employment of any Affected Employee, including claims for unfair termination, wrongful termination, notice, redundancy and/or any claims for termination payments, discrimination, harassment or retaliation; and
|
(9)
|
Claims for accrued employee welfare benefits that arose under applicable Provider plans or policies.
|
(A)
|
Provider will issue offers to Affected Employees in India for fixed-term contracts of employment of one (1) year only. At the end of this one-year period, their fixed-term contract of employment will cease/expire, and Provider will have no further liability or obligation towards such employees.
|
(B)
|
Customer will obtain resignations from Affected Employees in India after Provider issues offers of employment as set forth in
Section 11(A)
of this Schedule to such Affected Employees in India. In the event Customer does not obtain resignations from such Affected Employees or any such resignations are found to be ineffective under applicable Law in a final determination by a court or tribunal, Customer will indemnify Provider from and against any and all Losses relating to or resulting from third-party Claims arising out of Customer’s failure to obtain valid resignations.
|
(C)
|
Customer will make gratuity payments to all Affected Employees as prescribed under local Law, or in accordance with Customer policy. Customer agrees that such gratuity payments will also be made on a pro-rata basis to Affected Employees who have not yet completed any qualifying period of service under either local Law or Customer policy.
|
(D)
|
The Parties agree that the Affected Employees will join Provider on a “clean break” basis, and will not have any prior years of service recognized. No other liabilities or obligations that the Affected Employees were eligible for while employed with the Customer will transfer to their employment with Provider, including gratuity, superannuation, loan eligibility, leave accruals or entitlements, wages, bonuses, stocks and stock options, and any other entitlements or benefits whatsoever. Customer will settle all such benefits and entitlements directly with the Affected Employees.
|
(E)
|
The Parties will each provide additional amounts to be used as retention bonuses for New Provider Employees in India as follows. Provider’s and Customer’s respective contributions to the total funding amount from which retention bonuses will be paid to each such New Provider Employee (the “
Retention Bonus Fund
”) will each equal [***]. Each retention bonus payable to a New Provider Employee will be calculated based on fifteen (15) days’ salary per year of service at Customer (with the salary amount being determined as of the effective date of such employee’s resignation from Customer). The Parties will discuss and agree upon the timing of the notification of the retention bonus amounts to the Affected Employees in India. Provider will pay such amounts to the New Provider Employees in two equal lump sum payments on the following payment milestone dates: (1) six (6) months and (2) twelve (12) months after the Employment Effective Date of such New Provider Employees,
provided
the employee has not (a) voluntarily resigned from Provider or (b) been dismissed by Provider for misconduct (
e.g.
, fraud, drug abuse, theft) or failure to perform duties and responsibilities prior to either payment milestone date (in which case the New Provider Employee would not be paid the applicable payment amount on such payment milestone date). In the case of any such resignation or dismissal event set forth in (a) or (b), the payment amount the New Provider Employee would have otherwise received will be deducted from the contribution amounts payable by the Parties to the Retention Bonus Fund set forth above, and the Parties’ respective contributions
|
(A)
|
No Transfer of Personnel
|
(1)
|
It is not intended that the contract of employment of any person (or any liability relating thereto) will transfer pursuant to the Transfer Legislation either on:
|
(a)
|
the commencement of any Services under a SOW, or
|
(b)
|
the cessation of all or part of any Services under a SOW,
|
(B)
|
If the Transfer Legislation is deemed or held to apply in connection with the commencement of Services contemplated by a SOW (or part thereof):
|
(1)
|
Provider acknowledges that it will be liable for all liabilities resulting from the application of the Transfer Legislation;
|
(2)
|
Provider acknowledges that Customer has made no representation regarding the application of the Transfer Legislation and that Customer has not provided any warranty or indemnity of any nature regarding the application of the Transfer Legislation or otherwise;
|
(3)
|
Provider will comply with its statutory obligations under the Transfer Legislation; and
|
(4)
|
Provider will indemnify Customer Group from and against any and all Losses, including all Employment Liabilities resulting from, arising out of or relating to, any and all Claims arising out of the application of the Transfer Legislation. “
Employment Liabilities
” means all liabilities, compensation, awards, penalties, costs (including the cost of wages, salaries and other remuneration or benefits (including penalties and interest), social insurance, contributions, universal social charges, heath contributions, levies, losses, claims, demands, actions, fines, damages, and reasonable expenses (including reasonable legal costs), or other payments however arising which are connected with or arising from contract or all and any Laws, including directives, statutes, secondary legislation, orders, codes of practice and common law, whether of the European Community, the Republic of Ireland, the United Kingdom or any other jurisdiction, relating to or connected with the employment of employees or the engagement of other workers, including in each case their health and safety at work.
|
(C)
|
Where the Transfer Legislation applies in connection with the assignment, novation, suspension, expiration or termination of the Services contemplated by a SOW (or part thereof) then:
|
(1)
|
Provider will indemnify Customer Group from and against any and all Losses, including all Employment Liabilities resulting from, arising out of or relating to, any and all Claims arising out of:
|
(a)
|
any claim in connection with the termination of the employment of any of the Transferring Personnel by the Provider prior to the date of transfer of employment of the Transferring Personnel to Customer or any New Provider (as defined in
Schedule 4
(Termination Assistance) (as the case may be);
|
(b)
|
any claim by any of the Transferring Personnel related to the period during which they were employed by the Provider up to and including the date of transfer of their employment to Customer or any New Provider (as the case may be); and/or
|
(c)
|
any failure by Provider to comply with its obligations under the Transfer Legislation.
|
(D)
|
Stand-Still Period
. “
Stand-Still Period
” means (1) where any notice is given terminating this Agreement and/or a SOW prior to the date on which it would otherwise expire, the period commencing on the date of such notice and ending on the date on which this Agreement or the SOW expires pursuant to the terms of such notice or such later date on which Provider ceases to provide the Services; or (2) where no such notice has been given, the date which falls three months before the date on
|
(1)
|
not materially initiate or make any changes in the composition or identities of the personnel engaged in providing the Services without the prior written consent of Customer except where Provider is required to do so by applicable Law;
|
(2)
|
not materially amend or vary (or promise to amend or vary) the terms and conditions of employment (including for the avoidance of doubt, pay) of the personnel engaged in providing the Services without the prior written consent of Customer except where Provider is required to do so by applicable Law; and/or
|
(3)
|
make no commitments to personnel engaged in providing the Services whether under its information and consultation obligations under the Transfer Legislation or otherwise without Customer’s prior written consent.
|
1.1
|
This Information and System Security Requirements schedule sets forth the minimum requirements (“
Security Requirements Schedule
”) for Provider with respect to the Services provided for by Provider in this Agreement, and is incorporated in, and subject to, the Master Services Agreement, dated December 31, 2018 (the “
Agreement
”). These Security Requirements (“
Requirements
”) supplement Provider’s obligations under the Agreement and in no way reduces or limits Provider’s obligations under the Agreement.
|
1.2
|
Unless otherwise noted, terms used are defined in the Definitions section of the Master Services Agreement.
|
1.3
|
These Requirements are intended to protect the confidentiality of all Customer Confidential Information and Customer Data accessed, processed or transmitted (or otherwise available for same) by Provider, and the integrity and reliability of all Customer Systems, accessed, maintained, or managed by Provider and for which Provider has responsibility under the applicable Statement of Work, and for Provider Systems used to provide Services pursuant to the Agreement.
|
2.1
|
These Requirements shall govern the protection of Customer Confidential Information, Customer Data, and Systems (to the extent applicable) including, but not limited to:
|
(A)
|
Access to, and use of, Customer Confidential Information, Customer Data, and Systems;
|
(B)
|
Return and disposal of Customer Confidential Information and Customer Data;
|
(C)
|
Access to, maintenance, use, and return or disposal of Information Systems used to support the provision of Services; and
|
(D)
|
Access to, maintenance, and use of Information Systems or any off premises extensions of those systems and assets.
|
2.2
|
Provider agrees to comply with these Requirements at each Service Location (including,
e.g.
, hosting, data center, or co-location facility of provider) used in the performance of the Services
|
2.3
|
Provider is responsible for ensuring that all subcontractors and vendors of Provider, and other Provider Agents comply with these Requirements to the extent applicable to providing services and products associated with the performance of this Agreement.
|
3.1
|
The security measures described in this document apply without prejudice to any other specific statutory requirements for technical and organizational measures that may be applicable.
|
3.2
|
Provider shall ensure that all Systems, applications, processes, and personnel, comply with current Customer Information Security Policies at the time of execution of this Agreement. Customer may, from time to time, amend its Information Security Policies; if such amendments result in changes to the security requirements and controls to Systems, such changes shall be implemented through the Change Control Procedures; upon notice of such Change, Provider and Customer will agree on the timeframe for compliance with amended Customer Information Security Polices.
|
3.3
|
The Requirements described in this Information and Systems Security Requirements Schedule are based on and consistent with the security program and controls found in NIST SP 800-53 Rev. 4. Such Requirements are required to the extent applicable to the Systems, personnel, and services, and other activity used to perform the Services under the Agreement.
|
4.1
|
Provider shall develop, implement, maintain, and monitor a comprehensive, written information security program that contains administrative, technical and physical safeguards to protect against anticipated threats or hazards to the security, confidentiality, integrity and availability of Customer Confidential Information and Customer Data, and Systems with measures that meet or exceed prevailing industry standards, as well as mandatory security requirements under Provider Laws, and other applicable laws as specified by Customer. Provider shall further ensure that its information security program covers all networks, systems, servers, computers, notebooks, laptops, PDAs, mobile phones, and other devices that process or handle Customer Confidential Information and Customer Data or allow access to Customer Systems.
|
(A)
|
Access Control
|
(1)
|
Account Management Policy
: Maintain written access control policies and procedures that –
|
(a)
|
Define and document the types of system accounts allowed for each system required for the business function;
|
(b)
|
Assign account managers for system accounts;
|
(c)
|
Authorize access to the system based on
|
(i)
|
A valid access authorization;
|
(ii)
|
Intended system usage; and
|
(iii)
|
On a need-to-know basis as required by the organization or based on the users’ business functions;
|
(d)
|
Establish conditions for group and role membership; determine access authorizations (
i.e.
, privileges) and other attributes (as required) for each account; require approvals for requests to create system accounts; establish criteria for creating, enabling, modifying, disabling accounts, particularly when users are terminated or transferred, or when individual system usage or need-to-know changes for an individual; and
|
(e)
|
Monitor the use of system accounts.
|
(2)
|
Access Enforcement
: Enforce approved authorizations for access to information and system resources in accordance with applicable access control policies.
|
(3)
|
Principle of Least Privilege
: Allow only authorized accesses for users which are necessary to accomplish assigned tasks in accordance with business functions.
|
(4)
|
Unsuccessful Login Attempts
: Enforce a limit on the consecutive number of invalid logon attempts by a user, and automatically locks the account when the maximum number of unsuccessful attempts is exceeded.
|
(5)
|
System Use Notification
: Display a banner to users before granting access to the system that provides privacy and security notices consistent with applicable laws.
|
(6)
|
Remote Access
: Establish and document usage restrictions, configuration/connection requirements, and implementation guidance for each type of remote access allowed; authorize remote access to the system prior to allowing such connections; and implement cryptographic mechanisms to protect the confidentiality and integrity of remote access sessions.
|
(7)
|
Wireless Access
: Establish usage restrictions, configuration/connection requirements, and implementation guidance for wireless access; and authorize wireless access to the system prior to allowing such connections.
|
(8)
|
Access Control for Mobile Devices
: Establish usage restrictions, configuration requirements, connection requirements, and implementation guidance for managed mobile devices; and authorize the connection of mobile devices to systems.
|
(B)
|
Awareness and Training
|
(1)
|
Provide annual security and privacy awareness training to system users (including managers, senior executives, and contractors), including
|
(a)
|
Onboarding and initial training for new system users;
|
(b)
|
Specific role-based system security and privacy training, as appropriate;
|
(c)
|
Notifying personnel of changes to security and privacy policies and procedures;
|
(d)
|
Retaining individual training records.
|
(2)
|
Publicly Accessible Content
: Designate individuals authorized to post information onto a publicly accessible system; train authorized individuals to ensure that publicly accessible information does not contain nonpublic information; and review the content on the publicly accessible system for nonpublic information and remove such information, if discovered.
|
(C)
|
Application Software Security
|
(D)
|
Audit and Accountability
|
(1)
|
Specify Audit Events
: Verify that the systems can audit specified events and logs are enabled and/or available for such events; coordinate the security audit function with other organizational entities requiring audit-related information to guide the selection of auditable event types; and assess the auditable events to ensure adequacy of audits for response and investigation of security and privacy incidents.
|
(2)
|
Content of Audit Records
: For those events and systems for which audit capabilities are specified ensure that the system generates audit records containing information that establishes what type of event occurred, when the event occurred (through time stamps based on internal system clocks set to consistent time zone standards), where the event
|
(3)
|
Audit Storage and Retention
:
|
(a)
|
Retain audit records for specified periods of time including to provide support investigations of security and privacy incidents and to meet regulatory and organizational information retention requirements.
|
(b)
|
Protect audit information and audit tools from unauthorized access, modification, and deletion.
|
(4)
|
Response to Audit Processing Failures
: Establish processes to alert security personnel in the event of an audit processing failure and for responding to such failures.
|
(5)
|
Audit Review, Analysis, and Reporting
: Periodically review and analyze system audit records for indications of suspicious or inappropriate activity, and adjust the level of audit review, analysis, and reporting for systems when there is a change in risk based on law enforcement information, intelligence information, or other credible sources of information.
|
(E)
|
Assessment, Authorization, and Monitoring
|
(1)
|
Assessments
: Assess the security and privacy controls of identified systems and their environments of operation on an annual basis to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting established security and privacy requirements.
|
(2)
|
Plan
: Develop a security and privacy assessment plan that describes the scope of the assessment including:
|
(a)
|
Security and privacy controls and control enhancements under assessment;
|
(b)
|
Assessment procedures to be used to determine control effectiveness;
|
(c)
|
Assessment environment, assessment team, and assessment roles and responsibilities; and
|
(d)
|
Ensure the assessment plan is reviewed and approved by the authorizing official or designated representative prior to conducting the assessment;
|
(3)
|
System Interconnections
: Authorize connections from the system to other systems using interconnection agreements and document, for each interconnection, the interface characteristics, security and privacy requirements, and the nature of the information communicated.
|
(4)
|
Plan of Action and Milestones
: Develop a plan of action and milestones for systems to document the planned remedial actions of the organization to correct weaknesses or deficiencies noted during the assessment of the controls and to reduce or eliminate known vulnerabilities in the system; and updating existing plans based on findings from control assessments, impact analyses, and continuous monitoring activities.
|
(5)
|
Authorization
: Assign a manager as the authorizing manager for the system and for any common controls inherited by the system; ensure that the authorizing manager, before commencing operations: (1) authorizes the system for processing; and (2) authorizes the common controls inherited by the system; and ensure regular updates to authorizations.
|
(6)
|
Continuous Monitoring
: Develop a security and privacy continuous monitoring strategy and implement security and privacy continuous monitoring programs in accordance with specified metrics and for ongoing assessment of security and privacy control effectiveness.
|
(7)
|
Internal System Connections
: Authorize internal connections to systems used to support Customer Services
,
and document, for each internal connection, the interface characteristics, security and privacy requirements, and the nature of the information communicated.
|
(F)
|
Configuration Management
|
(1)
|
Baseline Configuration
: Develop, document, and maintain under configuration control, a current baseline configuration of the system; and review and update the baseline configuration of the system when system components are installed or upgraded.
|
(2)
|
Configuration Change Control
:
|
(a)
|
Determine the types of changes to the system that are configuration-controlled;
|
(b)
|
Review proposed configuration-controlled changes to the system and approve or disapprove such changes with explicit consideration for security impact analyses;
|
(c)
|
Document configuration change decisions associated with the system;
|
(d)
|
Implement approved configuration-controlled changes to the system;
|
(e)
|
Retain records of configuration-controlled changes to the system; and
|
(f)
|
Monitor and review activities associated with configuration-controlled changes to the system.
|
(3)
|
Access Restrictions for Change
: Define, document, approve, and enforce physical and logical access restrictions associated with changes to the system.
|
(4)
|
Configuration Settings
: Establish and document configuration settings for components employed within the system that reflect the most restrictive mode consistent with operational requirements; implement the configuration settings; identify, document, and approve any deviations from established configuration settings; and monitor and control changes to the configuration settings in accordance with organizational policies and procedures.
|
(5)
|
Least Functionality
: Configure systems to provide only essential capabilities, and prohibit or restrict the use of specific functions, ports, protocols, and/or services.
|
(6)
|
System Component Inventory
: Develop and document an inventory of system components.
|
(7)
|
Software Usage Restrictions
: Use software and associated documentation in accordance with contract agreements and copyright laws; track the use of software and associated documentation protected by quantity licenses to control copying and distribution; and control and document the use of peer-to-peer file sharing technology to ensure that this capability is not used for the unauthorized distribution, display, performance, or reproduction of copyrighted work.
|
(8)
|
User Installed Software
: Maintain policies governing the installation of software by users and restrict unauthorized software installation; monitor and enforce policy compliance.
|
(G)
|
Business Continuity and Contingency Planning
|
(1)
|
Contingency Plan
: Develop a contingency plan for the system that --
|
(a)
|
Identifies essential missions and business functions and associated contingency requirements;
|
(b)
|
Provides recovery objectives, restoration priorities, and metrics;
|
(c)
|
Addresses contingency roles, responsibilities, assigned individuals with contact information;
|
(d)
|
Addresses maintaining essential missions and business functions despite a system disruption, compromise, or failure;
|
(e)
|
Addresses eventual, full system restoration without deterioration of the security and privacy controls originally planned and implemented;
|
(f)
|
Is reviewed and approved by appropriate senior management personnel in key business functions;
|
(g)
|
Distributes copies of the contingency plan and communicates changes to the plan to key contingency plan personnel and business functions;
|
(h)
|
Coordinates contingency planning activities with incident handling activities;
|
(i)
|
Review and update the contingency plan to address changes to the organization, system, or environment of operation and problems encountered during contingency plan implementation, execution, or testing;
|
(j)
|
Protects the contingency plan from unauthorized disclosure and modification.
|
(2)
|
Contingency Training
: Provide contingency training to system users consistent with assigned roles and responsibilities.
|
(3)
|
Contingency Plan Testing
: Test the contingency plan to determine the effectiveness of the plan and the organizational readiness to execute the plan; review the contingency plan test results; and initiate corrective actions, if needed.
|
(4)
|
System Backup
: Conduct backups of user-level information contained in systems; conduct backups of system-level information contained in the system; conduct backups of system documentation including security-related documentation; and protect the confidentiality, integrity, and availability of backup information at storage locations.
|
(5)
|
System Recovery and Reconstitution
: Provide for the recovery and reconstitution of the system to a known state after a disruption, compromise, or failure within defined time periods consistent with recovery time and recovery point objectives.
|
(H)
|
Identification and Authentication
|
(1)
|
Identification and Authentication Policy
: Maintain written identification and authentication policies and procedures to facilitate the implementation of identification and authentication controls:
|
(a)
|
Uniquely identify and authenticate organizational users or processes acting on behalf of organizational users.
|
(b)
|
Uniquely identify and authenticate devices before establishing a network connection.
|
(c)
|
Manage system identifiers by receiving authorization from management to assign an individual, group, role, or device identifier; selecting an identifier that identifies an individual, group, role, or device; assigning the identifier to the intended individual, group, role, or device; and preventing reuse of identifiers for a defined period of time.
|
(d)
|
Obscure feedback of authentication information during the authentication process to protect the information from possible exploitation and use by unauthorized individuals.
|
(2)
|
Strong Authentication
:
|
(a)
|
To the extent implemented under Existing Customer Security Controls, multi-factor authentication (“
MFA
”) shall be used to restrict access to Customer Confidential Information, Customer Data, and Customer Systems.
|
(b)
|
Where MFA is not an Existing Customer Security Control, Provider shall use authentication mechanisms and authentication methodologies described in the CSD, or if not described in the CSD, shall maintain the mechanism and methodologies in place for Customer Systems as of the Effective Date, subject to the Change Control Procedures if Customer subsequently requests a different mechanism or methodology.
|
(c)
|
Provider shall use strong authentication mechanisms and authentication methodologies that meet or exceed prevailing industry standards for similar systems as well as mandatory security requirements under applicable Provider Laws to restrict access to Provider Systems used to collect, store, or otherwise process Customer Confidential Information and Customer Data.
|
(I)
|
Incident Response
|
(1)
|
Incident Response Planning
: Maintain a written incident response plan and policies that
|
(a)
|
Implement an incident handling capability for all and privacy incidents that includes preparation, detection and analysis, containment, eradication, and recovery;
|
(b)
|
Clearly designates responsibilities for incident response and maintenance of the incident response plan;
|
(c)
|
Provides the organization with a roadmap for implementing its incident response capability;
|
(d)
|
Describes the structure and organization of the incident response capability, and roles and responsibilities;
|
(e)
|
Identifies reportable incidents within scope of the incident response plan;
|
(f)
|
Is reviewed and approved by executive management;
|
(g)
|
Is updated to address system and organizational changes or problems encountered during plan implementation, execution, or testing;
|
(h)
|
Coordinates incident handling activities with contingency planning activities;
|
(i)
|
Incorporate lessons learned from ongoing incident handling activities into incident response procedures, training, and testing, and implement the resulting changes accordingly;
|
(j)
|
Test incident response capabilities and effectiveness;
|
(k)
|
Provide incident response training and awareness across the organization, as appropriate;
|
(l)
|
Track and document system security and privacy incidents; and
|
(m)
|
Require personnel to report suspected security, privacy and product incidents to clearly identified organizational incident response teams through defined channels.
|
(J)
|
Maintenance
|
(1)
|
Schedule, document, and review records of maintenance, repair, or replacement on system components in accordance with manufacturer or vendor specifications and/or organizational requirements;
|
(2)
|
Approve and monitor all maintenance activities, whether performed on site or remotely and whether the system or system components are serviced on site or removed to another location;
|
(3)
|
Require explicit approval for the removal of the system or system components from organizational facilities for off-site maintenance, repair, or replacement;
|
(4)
|
Sanitize equipment to remove all information from associated media prior to removal from organizational facilities for off-site maintenance, repair, or replacement;
|
(5)
|
Check all potentially impacted security and privacy controls to verify that the controls are still functioning properly following maintenance, repair, or replacement actions;
|
(6)
|
Maintain maintenance records.
|
(K)
|
Media, End User Devices, Encryption, and Information Transmission
|
(1)
|
Customer Confidential Information and Customer Data shall not be stored or transmitted on non-managed external devices, removable media, remote and mobile devices, including but not limited to flash/USB/thumb drives, CDs, DVDs, external hard drives and smart phones, laptops, and tablets by Provider, and Provider will prohibit or disable the use of such non-managed external and removable media and devices to the extent such restrictions are implement under Existing Customer Security Controls, and monitor their use.
|
(2)
|
Personally Identifiable Information provided or
accessed as part of Provider's Services
, Controlled Unclassified Information and other information as specifically labelled to exclude such storage
shall not be stored in any email systems.
|
(3)
|
Cryptographic Protection, and Key Management with respect to Customer Systems: If and to the extent encryption is implemented under Existing Customer Security Controls,
|
(a)
|
Encrypt the transfer of Customer Confidential Information and Customer Data, including backups, over external networks.
|
(b)
|
Encrypt Customer Confidential Information and Customer Data when transferred via physical media.
|
(c)
|
Encrypt Customer Confidential Information and Customer Data, including backups, at rest.
|
(d)
|
Full-disk encryption must be implemented for all laptops, desktops and removable media.
|
(e)
|
Authentication credentials must be protected by encryption during transmission.
|
(4)
|
Cryptographic Protection and Key Management with Respect to Provider Systems:
|
(a)
|
Encrypt the transfer of Customer Confidential Information and Customer Data, including backups, over external networks.
|
(b)
|
Encrypt Customer Confidential Information and Customer Data when transferred via physical media.
|
(c)
|
Encrypt Customer Confidential Information and Customer Data, including backups, at rest.
|
(d)
|
Full-disk encryption must be implemented for all laptops, desktops and removable media.
|
(e)
|
Authentication credentials must be protected by encryption during transmission.
|
(5)
|
Collaborative Computing Devices and Applications: Provider will prohibit remote activation of collaborative computing devices and applications unless otherwise excepted, and provide an explicit indication of use to users physically present at the devices.
|
(6)
|
Provider will transfer Confidential Information and Customer Data only in accordance with and by means of specified sharing platforms and practices, including encryption protocols, as directed by Customer and to the extent implemented under Existing Customer Security Controls.
|
(7)
|
Provider will maintain written media protection policies and procedures to facilitate the implementation of media protection controls:
|
(a)
|
Restrict access to and secure digital and system media to personnel based on defined roles.
|
(b)
|
Sanitize digital media prior to disposal, release out of organizational control, or release for reuse using, and employ sanitization mechanisms with the strength and integrity commensurate with the security category or classification of the information.
|
(L)
|
Physical and Environmental Protection
|
(1)
|
Physical Access Authorizations
: Develop, approve, and maintain a list of individuals with authorized access to Provider Service Locations and Juniper facilities where Provider controls access to such facilities; issue authorization credentials for such access; review the access list detailing authorized facility access by individuals; remove individuals from the facility access list when access is no longer required.
|
(2)
|
Physical Access Control
: Enforce physical access authorizations by verifying individual access authorizations before granting access to the facility; controlling ingress and egress to the facility using access control systems; maintain and review physical access audit logs
|
(a)
|
Monitor Physical Access
: Monitor physical access to facilities through video camera and monitoring to detect and respond to physical security incidents.
|
(b)
|
Physical Environmental Controls
:
|
(i)
|
Protect power equipment and power cabling for the system from damage and destruction.
|
(ii)
|
Provide the capability of shutting off power to the system or individual system components in emergency situations and protect emergency power shutoff capability from unauthorized activation.
|
(iii)
|
Provide a short-term uninterruptible power supply in the event of a primary power source loss.
|
(iv)
|
Employ and maintain automatic emergency lighting for the system that activates in the event of a power outage or disruption and that covers emergency exits and evacuation routes within the facility.
|
(v)
|
Employ and maintain fire suppression and detection devices/systems for the system that are supported by an independent energy source.
|
(vi)
|
Maintain and monitor temperature and humidity levels within the facility where systems reside.
|
(vii)
|
Protect systems from damage resulting from water leakage by providing master shutoff or isolation valves that are accessible, working properly, and known to key personnel.
|
(viii)
|
Authorize, monitor, and control deliveries entering and exiting the facility.
|
(M)
|
Personnel Security
|
(1)
|
Establish screening criteria based on risk for individuals filling positions, and screen individuals prior to authorizing access to specified systems;
|
(2)
|
Develop and document access agreements for organizational systems, and verify that individuals requiring access to organizational information and systems: (1) Sign appropriate access agreements prior to being granted access; and (2) Re-sign access agreements to maintain access to organizational systems when access agreements have been updated.
|
(3)
|
Establish termination procedures that include disabling system access to immediately upon termination of employment or change in employment responsibilities or positions; terminate or revoke any authenticators and credentials associated with the individual; conducting exit interviews that include a discussion of obligations with respect to confidentiality and information ownership; retrieve all security-related organizational system-related property and devices.
|
(4)
|
Review and confirm ongoing operational need for current logical and physical access authorizations to systems and facilities when individuals are reassigned or transferred to other positions within the organization.
|
(5)
|
Establish personnel security requirements including security roles and responsibilities for external providers; require external providers to comply with documented personnel security policies and procedures established by the organization; and require external providers to notify Human Resources immediately of any personnel transfers or terminations of external personnel who possess organizational credentials and/or badges, or who have system privilege.
|
(6)
|
Employ a formal disciplinary process for individuals failing to comply with established information security policies and procedures.
|
(N)
|
Risk Assessment
|
(1)
|
Risk Assessment Policy
: Maintain written risk assessment policies and procedures to facilitate the implementation of risk assessment controls.
|
(2)
|
Security Categorization
: Categorize the Provider Systems and information it processes, stores, and transmits; document the security categorization results including supporting rationale, in the security plan for such system; and verify that an authorized manager approves the security categorization decision.
|
(3)
|
Risk Assessment
: Conduct a risk assessment, including the likelihood and magnitude of harm, from the unauthorized access, use, disclosure, disruption, modification, or destruction of the Provider Systems, the information it processes, stores, or transmits, and any related information; integrate risk assessment results and risk management decisions from the
|
(4)
|
Vulnerability Scanning and Penetration Testing (Pentest)
: perform vulnerability scans or pentests on Provider Systems in accordance with documented processes and schedules, and when new vulnerabilities potentially affecting the Provider Systems are identified and reported; assess vulnerability impact; analyze vulnerability scan or pentest reports and results from control assessments; and remediate legitimate vulnerabilities.
|
(5)
|
Risk Response
: Respond to findings from security and privacy assessments, monitoring, and audits.
|
(O)
|
Systems and Services Acquisition and Procurement
|
(1)
|
Allocation of Resources
: Determine information security and privacy requirements for the Provider Systems in mission and business process planning, and ensure and establish mechanisms to incorporate information and privacy considerations are included in organization programming and budget planning.
|
(2)
|
System Development Lifecycle
: Manage the Provider Systems incorporating information security and privacy considerations; define and document information security and privacy roles and responsibilities throughout the system development life cycle; and identify individuals having information security and privacy roles and responsibilities; and integrate the organizational information security and privacy risk management process into system development life cycle activities.
|
(3)
|
Acquisition Process
: Established processes for including security and privacy, and functional requirements, descriptions, and criteria, explicitly or by reference, in the acquisition contract for Provider Systems.
|
(4)
|
System Documentation
: With respect to Provider Systems,
|
(a)
|
Obtain administrator documentation for the system, system component, or system service that describes secure configuration, installation, and operation of the system, component, or service; use and maintenance of security and privacy functions and mechanisms; and known vulnerabilities regarding configuration and use of administrative or privileged functions.
|
(b)
|
Obtain user documentation for the system, system component, or system service that describes user-accessible security and privacy functions and mechanisms and how to effectively use those functions and mechanisms; methods for user interaction, which enables individuals to use the system, component, or service in a more secure manner and protect individual privacy; and user responsibilities in maintaining the security of the system, component, or service and privacy of individuals.
|
(c)
|
Document attempts to obtain system, system component, or system service documentation when such documentation is either unavailable or nonexistent, and actions taken in response.
|
(d)
|
Protect documentation.
|
(5)
|
Supply Chain Risk Management
: Establish a plan for managing supply chain risks associated with the development, acquisition, maintenance, and disposal of Provider Systems; implement the supply chain risk management plan consistently across the organization; and review and update the supply chain risk management plan to address development changes.
|
(6)
|
Unsupported System Components
: Replace system components for Provider Systems when support for the components is no longer available from the developer, vendor, or manufacturer.
|
(P)
|
System and Communications Protection with respect to Provider Systems
|
(1)
|
Denial of Service Protection
: Protect against or limit the effects of known types of denial of service events.
|
(2)
|
Boundary Protection
: Monitor and control communications at the external boundary of the system and at key internal boundaries within the system; implement subnetworks for publicly accessible system components that are
logically separated from internal organizational networks; and connect to external networks or systems only through managed interfaces consisting of boundary protection devices.
|
(3)
|
Provider employs current, industry-standard protection tools and techniques, including firewalls, antivirus, network monitoring, and intrusion detection systems: employs blacklisting or whitelisting to block known malicious IP connections; and retains audit records of logs for event analysis.
|
(4)
|
Provider agrees to use reasonable best practices to monitor, detect and assess unauthorized access, malicious code, suspicious exfiltration of data, and other anomalous network and system activity in a timely manner.
|
(5)
|
Secure Name/Address Resolution
|
(a)
|
Provide additional data origin authentication and integrity verification artifacts along with the authoritative name resolution data the system returns in response to external name/address resolution queries;
|
(b)
|
Request and perform data origin authentication and data integrity verification on the name/address resolution responses the system receives from authoritative sources.
|
(Q)
|
System and Information Integrity
with respect to Provider Systems
|
(1)
|
System and Information Integrity Policy
: Maintain written systems and information integrity policies and procedures to facilitate the implementation of system and information integrity controls.
|
(2)
|
Flaw Remediation (Patching)
: Identify, report, and correct system flaws; test software and firmware updates related to flaw remediation for effectiveness and potential side effects before installation; install security-relevant software and firmware updates promptly upon release of the updates; and incorporate flaw remediation into the organizational configuration management process.
|
(3)
|
Malicious Code Protection
: Implement malicious code protection mechanisms at system entry and exit points to detect and eradicate malicious code; automatically update malicious code protection mechanisms whenever new releases are available in accordance with organizational configuration management policy and procedures; configure malicious code protection mechanisms to perform periodic scans and real-time scans of files from external sources as the files are downloaded, opened, or executed in accordance with organizational policy; and quarantine malicious code
in response to malicious code detection.
|
(4)
|
System Monitoring
: Monitor the system to detect attacks and indicators of potential attacks; unauthorized local, network, and remote connections; and unauthorized use of systems.
|
(5)
|
Security Alerts, Advisories, and Directives
: Receive system security alerts, advisories, and directives on an ongoing basis, and implement protective measures in response to security alerts and directives.
|
(R)
|
Controlled Unclassified Data
|
Adjudication Request Status
|
Explanation
|
MEETS STANDARDS
(RECOMMENDED)
|
The individual’s background check results do not trigger any of the defined adjudication criteria, allowing the placement process to continue
|
DOES NOT MEET STANDARDS
(NOT RECOMMENDED)
|
The individual’s background check results have triggered the defined criteria for exclusion from Juniper projects.
|
1
|
Valid SSN Trace (SSN has been issued by the SSA)
|
Meets Standards
|
2
|
SSN has not been issued
(no data), belongs to deceased individual or invalid trace
|
Does Not Meet Standards
|
1
|
No Record Found or clear record
|
Meets Standards
|
2
2a
|
Traffic or vehicle code violation
More than one DUI/DWI within the past three years
|
Meets Standards
(refer to MVR if included)
Does Not Meet Standards
|
3
|
Misdemeanor convictions;
except for the following:
crimes involving weapons, violence, theft, robbery, burglary, embezzlement, dishonesty, misappropriation, fraud, or sex crimes
|
Meets Standards
|
4
|
Possession/Conviction of a controlled substance (Conviction for drug related crimes)
|
Does Not Meet Standards
|
5
|
Unresolved, active bench warrant
|
Does Not Meet Standards
|
6
|
Any felony or misdemeanor pending court disposition
|
Does Not Meet Standards
|
7
|
Any felony conviction involving: weapons, violence, theft (includes petty theft), robbery, burglary, larceny, embezzlement, dishonesty, misappropriation, fraud, or forgery, and sex crime
|
Does Not Meet Standards
|
8
|
Any “serious” misdemeanor conviction involving: weapons, violence, theft (includes petty theft), robbery, burglary, larceny, embezzlement, dishonesty, misappropriation, fraud, or forgery, and sex crime
|
Does Not Meet Standards
|
9
|
Three or more misdemeanor convictions (except excluded convictions in Item 6)
|
Does Not Meet Standards
|
10
|
Mob action (AKA gang activity) or Computer crimes
|
Does Not Meet Standards
|
2.1
|
In addition to Provider’s performance of any and all disaster recovery and business continuity responsibilities set forth in an SOW, with effect from the Effective Date and maintained for the duration of the Term, Provider will have in place Provider DR Plans, and with respect to all Customer Systems supported by Provider, Provider will maintain the disaster recovery and business continuity plans for such Customer Systems to the extent Customer has disaster recovery and business continuity plans in place for such Customer Systems as of May 1, 2019 (“
Customer DR Plans
”) and carry out Provider’s responsibilities under such Customer DR Plans if a disaster occurs.
|
2.2
|
All Provider DR Plans will, taking into account any and all relevant principles, including those set out below, at a minimum:
|
(A)
|
include content and principles no less robust and protective of Customer than Customer’s own business continuity and disaster recovery plans for its applications and/or IT environment so as not to degrade in any manner the Services and/or Customer’s applications and/or IT environment;
|
(B)
|
define the disaster against which Provider DR Plans are required, which definition will include, at a minimum, an event that causes material harm, loss or damage to a facility, its people or operations;
|
(C)
|
detail the steps that Provider will take, both on an ongoing basis throughout the Term (in anticipation of the possibility of a disaster occurring) and on the occurrence of a disaster, so as to:
|
(1)
|
prevent any loss of, destruction to or unavailability of Provider Systems, data (including Customer Data), or Service Locations;
|
(2)
|
minimize any disruption to Provider’s performance of its obligations under this Agreement that may be caused by the onset or continuance of a disaster;
|
(3)
|
restore the Services and the availability of Provider Systems, data (including Customer Data), or Service Locations which have been affected by a disaster within defined Service Levels where appropriate and describe how, when and where restoration will occur as well as the persons involved in restoring the Services;
|
(4)
|
provide a detailed plan with respect to the procedures to be used in order to return the affected Service, Provider System, or other items to their original location after the effects of the disaster have diminished to a satisfactory level as agreed by both Parties; and
|
(5)
|
describe how and when Provider will test Provider DR Plans.
|
2.3
|
With respect to Customer DR Plans governing each of the Customer Systems within scope of the Agreement,
|
(A)
|
Customer confirms such Customer DR Plans will:
|
(1)
|
identify essential missions and business functions and associated contingency requirements;
|
(2)
|
provide recovery objectives, restoration priorities, and metrics;
|
(3)
|
address disaster recovery/contingency roles and responsibilities, and identify assigned individuals with contact information;
|
(4)
|
address maintaining essential missions and business functions despite a Customer System disruption, compromise, or failure;
|
(5)
|
provide for the recovery and reconstitution of the Customer System to a known state after a disruption, compromise, or failure within defined time periods consistent with recovery time and recovery point objectives; and
|
(6)
|
address eventual, full Customer System restoration without deterioration of the security and privacy controls originally planned and implemented.
|
(B)
|
If and to the extent described in a Statement of Work, Provider will conduct backups of user-level information contained in Customer Systems; conduct backups of system-level information contained in Customer Systems; conduct backups of system documentation including security-related documentation; and protect the confidentiality, integrity, and availability of backup information at storage locations.
|
2.4
|
Provider will review, update and test Provider DR Plans at such intervals as Provider considers appropriate in its reasonable opinion (but will do so at least once annually), taking into account any changes in the way that Provider provides or proposes to provide the Services or the way that Customer receives or proposes to receive the Services, and will throughout the Term update and revise Provider DR Plans as appropriate to take into account any newly identified threats to the provision of the Services or Customer Group’s interests (including where any changes are contemplated to the manner in which Provider provides the Services or in which Provider interacts with Provider Agents, Provider Staff or Customer Agents or the way that Customer
|
2.5
|
Provider will comply with and take all steps set out in Provider DR Plans and, with regard to Customer Systems supported by Provider, subject to the following sentence, will comply with and take all steps set out as Provider’s responsibilities under Customer DR Plans as well as those disaster recovery steps set forth in an SOW, including in each case steps that are required to be taken in the absence of and on the occurrence of a disaster. Upon the occurrence of a disaster triggering the implementation of a Customer DR Plan, Provider will notify Customer in writing prior to taking such steps set out in the applicable Customer DR Plan and Provider must obtain Customer’s prior written approval of any restoration of Services pursuant to such Customer DR Plan. Provider will reinstate the Services within the defined recovery time periods, which time periods for Provider Systems at Service Locations will be equal to or less than seventy-two (72) hours (three (3) days) unless otherwise set forth in an SOW or agreed in writing by the Parties and which time periods, if any, for Customer Systems supported by Provider will be as set forth in an SOW unless otherwise agreed in writing by the Parties.
|
3.1
|
The Customer DR Plans under this Agreement will be the most recently dated Customer DR Plans as of May 1, 2019. For any new Service Locations from which Provider will deliver Services, Provider will have an appropriate Provider DR Plan in place prior to the Effective Date relating to such Service Locations. If a Provider DR Plan relates to a location used only for providing services to Customer, the Provider DR Plans for such location (“
Dedicated Provider DR Plans
”) will also be submitted for approval.
|
3.2
|
Provider will take into account any reasonable comments made by any member of Customer Group regarding Dedicated Provider DR Plans, but the Parties acknowledge that Provider ultimately retains control of the content of its DR Plans subject to
Section 3.4
hereof and Provider’s adherence to the minimum requirements set forth in this Schedule.
|
3.3
|
The obligations of Provider under this Schedule do not affect Provider’s other obligations under this Agreement (including its obligations as part of the Services), except that no obligation of Provider under this Agreement will be suspended under
Section 10.2
(Force Majeure) or excused under
Section 3.19
(Excuse from Performance) of the main body of this Agreement if Provider would have been able to perform that obligation had it performed its obligations under this Schedule. Notwithstanding
Section 3.2
, if Provider chooses not to implement any changes to its Provider DR Plans despite comments by members of Customer Group to the effect that changes to its Provider DR Plans may be required, Provider will not be excused under
Section 10.2
(Force Majeure) or under
Section 3.19
(Excuse from Performance) of the main body of this Agreement or any other provision of this Agreement from any failure to perform any of its obligations under this Agreement by reason of the occurrence or continuation of an event or circumstances, the consequences of which would have been avoided had Provider implemented such changes.
|
3.4
|
Customer will have the right to audit all Provider DR Plans. In the event any changes need to be made to a Provider DR Plan, Provider will implement the changes agreed with Customer into the relevant Provider DR Plan, within such timeframes as agreed upon between Customer and Provider in accordance with the applicable Change Control Procedure.
|
4.1
|
Provider will ensure that:
|
(A)
|
its activities relating to business continuity and disaster recovery form an integral part of the technology selection, elimination and decision-making process of Provider;
|
(B)
|
its activities relating to business continuity and disaster recovery are included in the development life cycle of each Provider System and in accordance with the Change Control Procedures for all the Services;
|
(C)
|
its activities relating to business continuity and disaster recovery include an adequate assessment of technology related risks in connection with the Services and an assessment of impact by those risks on the overall continuity risk for Customer;
|
(D)
|
its activities relating to business continuity and disaster recovery are organized in such a manner as to ensure the functionality of its DR Plans and contain appropriate technology solutions required to support business functions;
|
(E)
|
Provider’s DR Plans are documented and contain clear definitions of Provider’s responsibilities for technology continuity, including responsibilities for the ownership of Provider DR Plans, test co-ordination and the initiation and co-ordination of real-life continuity efforts;
|
(F)
|
Provider DR Plans are addressed as part of development life cycle of each Provider Service Location;
|
(G)
|
Provider DR Plans are regularly maintained in a ready state that accurately reflects changes in Provider Systems’ requirements, procedures, organizational support structures;
|
(H)
|
in the event any changes to technology continuity solutions are required in connection with the changes set out under
Section 4.1(D)
above, Provider’s DR Plans are promptly amended in order to reflect such changes in accordance with the Change Control Procedures;
|
(I)
|
Provider DR Plans are tested as part of pre-production testing relating to any and all enhancements and on an annual basis in connection with the Service Locations.
|
1.
|
[***]
|
2.
|
[***]
|
3.
|
[***]
|
4.
|
[***]
|
5.
|
[***]
|
6.
|
[***]
|
7.
|
[***]
|
8.
|
[***]
|
9.
|
[***]
|
10.
|
[***]
|
11.
|
[***]
|
12.
|
[***]
|
13.
|
[***]
|
14.
|
[***]
|
15.
|
[***]
|
16.
|
[***]
|
17.
|
[***]
|
18.
|
[***]
|
19.
|
[***]
|
20.
|
[***]
|
21.
|
[***]
|
22.
|
[***]
|
23.
|
[***]
|
24.
|
[***]
|
25.
|
[***]
|
26.
|
[***]
|
27.
|
[***]
|
28.
|
[***]
|
29.
|
[***]
|
30.
|
[***]
|
31.
|
[***]
|
32.
|
[***]
|
1.1
|
“
Controller
” means an entity which, alone or jointly with others, determines the purposes and means of the Processing of personal data.
|
1.2
|
“
Customer Personal Data
” means the “personal data” (meaning information about or relating to an identified or identifiable individual) described in Annex 2 and any other personal data or Personally Identified Information that Provider processes on behalf of Customer in connection with Provider’s provision of the Services.
|
1.3
|
“
EU Data Protection Laws
" means the EU General Data Protection Regulation 2016/679 of the European Parliament and of the Council ("
GDPR
"), any applicable national legislation implementing or supplementing the GDPR, including in each case as amended, replaced or superseded from time to time.
|
1.4
|
“
European Economic Area
” or “
EEA
” means the Member States of the European Union together with Iceland, Norway, and Liechtenstein.
|
1.5
|
“
Processing
” means any operation or set of operations which is performed on personal data such as collection, recording, organization, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure or destruction, and “
process
” will be interpreted accordingly.
|
1.6
|
“
Processor
” means an entity which Processes personal data on behalf of a Controller.
|
1.7
|
“
Standard Contractual Clauses
” means the Standard Contractual Clauses (processors) approved by European Commission Decision C(2010)593 set out in Annex 1 to this Data Processing Agreement or any subsequent version thereof released by the European Commission (which will automatically apply), and which includes Annex 2 (Details of the Processing and Transfer) and Annex 3 (Technical and Organisational Measures) to this Data Processing Agreement.
|
1.8
|
"
Subprocessor
" means any Processor engaged by Provider who agrees to receive from Provider Customer Personal Data.
|
1.9
|
“
Supervisory Authority
” has the meaning given in the EU Data Protection Laws.
|
2.1
|
If applicable data protection laws and corresponding obligations for Customer or its Affiliates change, Provider will support Customer and its Affiliates and execute additional written agreements as reasonably required by the circumstances, in good faith.
|
2.2
|
This Data Processing Agreement and any commercial agreement between Customer and Provider will not create any third-party beneficiary rights for any individual regarding their personal data unless otherwise specified herein. With respect to Customer Personal Data, this Data Processing Agreement will take precedence over any conflicting terms in any other commercial agreements entered into between Customer and Provider.
|
2.3
|
This Data Processing Agreement will apply in addition to, not in lieu of, any other terms and conditions agreed with Customer, except as specifically and expressly agreed in writing with explicit reference to this Agreement.
|
3.1
|
This Data Processing Agreement applies where Customer Personal Data is Processed by Provider. In this context, Provider will act as Processor to Customer who may act either as Controller or Processor with respect to Customer Personal Data.
|
4.1
|
Provider may not Process in any manner any Customer Personal Data, except (a) on behalf of Customer, and (b) as directed by authorized personnel of Customer in writing. Without limiting the generality of the foregoing,
Provider
may not make Customer Personal Data accessible to any subcontractors or relocate Customer Personal Data to new locations, except as set forth in written agreements with, or written instructions from Customer. Customer is not providing
Provider
with Customer Personal Data for any consideration for any service and any service
Provider
provides to Customer is not consideration for Customer providing
Provider
with Customer Personal Data.
|
5.1
|
Provider must implement and maintain organizational and technical security safeguards, and at a minimum, Provider must comply with Customer’s Information and System Security Requirements (
Schedule 9
of the Agreement), Disaster Recovery and Business Continuity Management requirements (
Schedule 12
of the Agreement), and Customer Information Security Policies provided in advance in writing, unless Customer has expressly approved Provider’s own information security policy in writing as an alternative (in which case Provider must comply with the approved version of Provider’s own policy, refrain from making any changes that reduce the level of security, and provide 30 days’ prior written notice to Customer of any significant changes to Provider’s own information security policy). If Provider adheres to SSAE 16 or similar or successor
|
5.2
|
Provider must allow for and contribute to reasonable data security and privacy compliance audits by Customer and/or, at Customer’s request, by an independent third party, to verify compliance with applicable Law, this Data Processing Agreement and any other applicable contractual undertakings to the extent set forth in the Agreement.
|
5.3
|
If Provider becomes aware of, or suspects that, a Security Incident has occurred, Provider must notify Customer without undue delay, consult and cooperate with investigations and potentially required notices, and provide any information reasonably requested by Customer.
|
6.1
|
At Customer’s reasonable request, Provider must (a) promptly cooperate with Customer to permit Customer to meet its obligations under applicable data protection and privacy laws including providing Customer with information necessary to demonstrate compliance and Customer Personal Data in a readily useable format within 30 days of Customer’s request, and (b) contractually agree to comply with the California Consumer Privacy Act, as well as similar and other frameworks, if and to the extent such frameworks apply to any Customer Personal Data that Provider comes into contact with in its provision of the Services, with any Change necessitated by such request handled through the Change Control Procedures. Where Provider indicates it is unwilling or unable to comply with the foregoing Customer request as it relates to California Consumer Privacy Act, as well as similar and other frameworks, in such law’s applicable to Customer Personal Data that Provider comes into contact with in its provision of the Services, Customer may terminate the affected Service Tower or SOW under which Provider has access to such Customer Personal Data, subject to a proportionate refund of any prepaid fees, offering Termination Assistance Services as set forth in the Agreement.
|
7.1
|
Provider will not permit, allow or otherwise facilitate Subprocessors to Process Customer Personal Data without the Customer’s prior written consent.
Customer agrees that Provider may use the following as Subprocessors to Process Customer Personal Data: Provider Affiliates set forth in
Schedule 11
(Provider Affiliates).
|
7.2
|
In respect of each Subprocessor, Provider will:
|
(A)
|
enter into a written agreement with the Subprocessor which imposes equivalent obligations on the Subprocessor with regard to its Processing of Customer Personal Data, as are imposed on Provider under this Data Processing Agreement; and
|
(B)
|
at all times remain responsible for compliance with its obligations under this Data Processing Agreement and will be liable to Customer for the acts and omissions of any Subprocessor as if they were Provider’s acts and omissions.
|
7.3
|
International Transfers of Customer Personal Data
. To the extent that the Processing of Customer Personal Data by Provider takes place in a country or territory outside the EEA, Switzerland or the UK, other than in a country or territory ensuring an adequate level of protection for the rights and freedoms of data subjects in relation to the Processing of personal data as determined by the European Commission, such Processing will be governed by the Standard Contractual Clauses. In the event of a conflict between any terms in the Standard Contractual Clauses, this Data Processing Agreement and the remainder of the Agreement, the Standard Contractual Clauses will prevail.
|
8.1
|
Provider will treat the Customer Personal Data as confidential, and will ensure that its employees or other personnel have agreed in writing (electronically or in any other manner) to protect the confidentiality and security of Customer Personal Data.
|
9.1
|
Where applicable, and taking into account the nature of the Processing, Provider will use reasonable endeavors to assist Customer by implementing technical and organizational measures in accordance with section 5.1 of this Data Processing Agreement insofar as this is possible, for the fulfilment of Customer’s obligation to respond to requests for exercising data subject rights laid down in the EU Data Protection Laws.
|
10.1
|
To the extent required under the EU Data Protection Laws, Provider will provide reasonable assistance to the Customer with any data protection impact assessments and with any prior consultations to any Supervisory Authority of Customer, in each case solely in relation to processing of Customer Personal Data and taking into account the nature of the Processing and information available to Provider.
|
11.1
|
Deletion of data
. Subject to Section 11.2 below, Provider will, at Customer’s election and within [***] days of the date of termination of the Agreement:
|
(A)
|
return to, or make available for retrieval by, the Customer, all Customer Personal Data Processed by Provider (and securely delete all other copies of Customer Personal Data Processed by Provider); or
|
(B)
|
securely delete the Customer Personal Data Processed by Provider.
|
11.2
|
Provider and its Subprocessors may retain Customer Personal Data to the extent required by applicable Laws and only to the extent and for such period as required by applicable Laws and always provided that Provider will ensure the confidentiality of all such Customer Personal Data and will ensure that such Customer Personal Data is only Processed as necessary for the purpose(s) specified in the applicable laws requiring its storage and for no other purpose.
|
12.1
|
This Data Processing Agreement will be governed by, and construed in accordance with, the Law of the Member State in which the Controller is established.
|
(a)
|
“personal data”, “special categories of data”, “process/processing”, “controller”, “processor”, “data subject” and “supervisory authority” will have the same meaning as in Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data;
|
(b)
|
“the data exporter” means the controller or processor who transfers the personal data;
|
(c)
|
“the data importer” means the processor who agrees to receive from the data exporter personal data intended for processing on his behalf after the transfer in accordance with his instructions and the terms of the Clauses and who is not subject to a third country's system ensuring adequate protection within the meaning of Article 25(1) of Directive 95/46/EC;
|
(d)
|
“the sub-processor” means any processor engaged by the data importer or by any other sub-processor of the data importer who agrees to receive from the data importer or from any other sub-processor of the data importer personal data exclusively intended for processing activities to be carried out on behalf of the data exporter after the transfer in accordance with his instructions, the terms of the Clauses and the terms of the written subcontract;
|
(e)
|
“the applicable data protection law” means the legislation protecting the fundamental rights and freedoms of individuals and, in particular, their right to privacy with respect to the processing of personal data applicable to a data controller in the Member State in which the data exporter is established;
|
(f)
|
“technical and organisational security measures” means those measures aimed at protecting personal data against accidental or unlawful destruction or accidental loss, alteration, unauthorised disclosure or access, in particular where the processing involves the transmission of data over a network, and against all other unlawful forms of processing.
|
1.
|
The data subject can enforce against the data exporter this Clause, Clause 4(b) to (i), Clause 5(a) to (e), and (g) to (j), Clause 6(1) and (2), Clause 7, Clause 8(2), and Clauses 9 to 12 as third-party beneficiary.
|
2.
|
The data subject can enforce against the data importer this Clause, Clause 5(a) to (e) and (g), Clause 6, Clause 7, Clause 8(2), and Clauses 9 to 12, in cases where the data exporter has factually disappeared or has ceased to exist in law unless any successor entity has assumed the entire legal obligations of the data exporter by contract or by operation of law, as a result of which it takes on the rights and obligations of the data exporter, in which case the data subject can enforce them against such entity.
|
3.
|
The data subject can enforce against the sub-processor this Clause, Clause 5(a) to (e) and (g), Clause 6, Clause 7, Clause 8(2), and Clauses 9 to 12, in cases where both the data exporter and the data importer have factually disappeared or ceased to exist in law or have become insolvent, unless any successor entity has assumed the entire legal obligations of the data exporter by contract or by operation of law as a result of which it takes on the rights and obligations of the data exporter, in which case the data subject can enforce them against such entity. Such third-party liability of the sub-processor will be limited to its own processing operations under the Clauses.
|
4.
|
The parties do not object to a data subject being represented by an association or other body if the data subject so expressly wishes and if permitted by national law.
|
(a)
|
that the processing, including the transfer itself, of the personal data has been and will continue to be carried out in accordance with the relevant provisions of the applicable data protection law (and, where applicable, has been notified to the relevant authorities of the Member State where the data exporter is established) and does not violate the relevant provisions of that State;
|
(b)
|
that it has instructed and throughout the duration of the personal data processing services will instruct the data importer to process the personal data transferred only on the data exporter's behalf and in accordance with the applicable data protection law and the Clauses;
|
(c)
|
that the data importer will provide sufficient guarantees in respect of the technical and organisational security measures specified in Annex 3 to this contract;
|
(d)
|
that after assessment of the requirements of the applicable data protection law, the security measures are appropriate to protect personal data against accidental or unlawful destruction or accidental loss, alteration, unauthorised disclosure or access, in particular where the processing involves the transmission of data over a network, and against all other unlawful forms of processing, and that these measures ensure a level of security appropriate to the risks presented by the processing and the nature of the data to be protected having regard to the state of the art and the cost of their implementation;
|
(e)
|
that it will ensure compliance with the security measures;
|
(f)
|
that, if the transfer involves special categories of data, the data subject has been informed or will be informed before, or as soon as possible after, the transfer that its data could be transmitted to a third country not providing adequate protection within the meaning of Directive 95/46/EC;
|
(g)
|
to forward any notification received from the data importer or any sub-processor pursuant to Clause 5(b) and Clause 8(3) to the data protection supervisory authority if the data exporter decides to continue the transfer or to lift the suspension;
|
(h)
|
to make available to the data subjects upon request a copy of the Clauses, with the exception of Annex 3, and a summary description of the security measures, as well as a copy of any contract for subprocessing services which has to be made in accordance with the Clauses, unless the Clauses or the contract contain commercial information, in which case it may remove such commercial information;
|
(i)
|
that, in the event of subprocessing, the processing activity is carried out in accordance with Clause 11 by a sub-processor providing at least the same level of protection for the personal data and the rights of data subject as the data importer under the Clauses; and
|
(j)
|
that it will ensure compliance with Clause 4(a) to (i).
|
(a)
|
to process the personal data only on behalf of the data exporter and in compliance with its instructions and the Clauses; if it cannot provide such compliance for whatever reasons, it agrees to inform promptly the data exporter of its inability to comply, in which case the data exporter is entitled to suspend the transfer of data and/or terminate the contract;
|
(b)
|
that it has no reason to believe that the legislation applicable to it prevents it from fulfilling the instructions received from the data exporter and its obligations under the contract and that in the event of a change in this legislation which is likely to have a substantial adverse effect on the warranties and obligations provided by the Clauses, it will promptly notify the change to the data exporter as soon as it is aware, in which case the data exporter is entitled to suspend the transfer of data and/or terminate the contract;
|
(c)
|
that it has implemented the technical and organisational security measures specified in Annex 3 before processing the personal data transferred;
|
(d)
|
that it will promptly notify the data exporter about:
|
(i)
|
any legally binding request for disclosure of the personal data by a law enforcement authority unless otherwise prohibited, such as a prohibition under criminal law to preserve the confidentiality of a law enforcement investigation,
|
(ii)
|
any accidental or unauthorised access, and
|
(iii)
|
any request received directly from the data subjects without responding to that request, unless it has been otherwise authorised to do so;
|
(e)
|
to deal promptly and properly with all inquiries from the data exporter relating to its processing of the personal data subject to the transfer and to abide by the advice of the supervisory authority with regard to the processing of the data transferred;
|
(f)
|
at the request of the data exporter to submit its data processing facilities for audit of the processing activities covered by the Clauses which will be carried out by the data exporter or an inspection body composed of independent members and in possession of the required professional qualifications bound by a duty of confidentiality, selected by the data exporter, where applicable, in agreement with the supervisory authority;
|
(g)
|
to make available to the data subject upon request a copy of the Clauses, or any existing contract for subprocessing, unless the Clauses or contract contain commercial information, in which case it may remove such commercial information, with the exception of Annex 3 which will be replaced by a summary description of the security measures in those cases where the data subject is unable to obtain a copy from the data exporter;
|
(h)
|
that, in the event of subprocessing, it has previously informed the data exporter and obtained its prior written consent;
|
(i)
|
that the processing services by the sub-processor will be carried out in accordance with Clause 11;
|
(j)
|
to send promptly a copy of any sub-processor agreement it concludes under the Clauses to the data exporter.
|
1.
|
The parties agree that any data subject, who has suffered damage as a result of any breach of the obligations referred to in Clause 3 or in Clause 11 by any party or sub-processor is entitled to receive compensation from the data exporter for the damage suffered.
|
2.
|
If a data subject is not able to bring a claim for compensation in accordance with paragraph 1 against the data exporter, arising out of a breach by the data importer or his sub-processor of any of their obligations referred to in Clause 3 or in Clause 11, because the data exporter has factually disappeared or ceased to exist in law or has become insolvent, the data importer agrees that the data subject may issue a claim against the data importer as if it were the data exporter, unless any successor entity has assumed the entire legal obligations of the data exporter by contract of by operation of law, in which case the data subject can enforce its rights against such entity.
|
3.
|
If a data subject is not able to bring a claim against the data exporter or the data importer referred to in paragraphs 1 and 2, arising out of a breach by the sub-processor of any of their obligations referred to in Clause 3 or in Clause 11 because both the data exporter and the data importer have factually disappeared or ceased to exist in law or have become insolvent, the sub-processor agrees that the data subject may issue a claim against the data sub-processor with regard to its own processing operations under the Clauses as if it were the data exporter or the data importer, unless any successor entity has assumed the entire legal obligations of the data exporter or data importer by contract or by operation of law, in which case the data subject can enforce its rights against such entity. The liability of the sub-processor will be limited to its own processing operations under the Clauses.
|
1.
|
The data importer agrees that if the data subject invokes against it third-party beneficiary rights and/or claims compensation for damages under the Clauses, the data importer will accept the decision of the data subject:
|
(a)
|
to refer the dispute to mediation, by an independent person or, where applicable, by the supervisory authority;
|
(b)
|
to refer the dispute to the courts in the Member State in which the data exporter is established.
|
2.
|
The parties agree that the choice made by the data subject will not prejudice its substantive or procedural rights to seek remedies in accordance with other provisions of national or international law.
|
1.
|
The data exporter agrees to deposit a copy of this contract with the supervisory authority if it so requests or if such deposit is required under the applicable data protection law.
|
2.
|
The parties agree that the supervisory authority has the right to conduct an audit of the data importer, and of any sub-processor, which has the same scope and is subject to the same conditions as would apply to an audit of the data exporter under the applicable data protection law.
|
3.
|
The data importer will promptly inform the data exporter about the existence of legislation applicable to it or any sub-processor preventing the conduct of an audit of the data importer, or any sub-processor, pursuant to paragraph 2. In such a case the data exporter will be entitled to take the measures foreseen in Clause 5 (b).
|
1.
|
The data importer will not subcontract any of its processing operations performed on behalf of the data exporter under the Clauses without the prior written consent of the data exporter. Where the data importer subcontracts its obligations under the Clauses, with the consent of the data exporter, it will do so only by way of a written agreement with the sub-processor which imposes the same obligations on the sub-processor as are imposed on the data importer under the Clauses. Where the sub-processor fails to fulfil its data protection obligations under such written agreement the data importer will remain fully liable to the data exporter for the performance of the sub-processor's obligations under such agreement.
|
2.
|
The prior written contract between the data importer and the sub-processor will also provide for a third-party beneficiary clause as laid down in Clause 3 for cases where the data subject is not able to bring the claim for compensation referred to in paragraph 1 of Clause 6 against the data exporter or the data importer because they have factually disappeared or have ceased to exist in law or have become insolvent and no successor entity has assumed the entire legal obligations of the data exporter or data importer by contract or by operation of law. Such third-party liability of the sub-processor will be limited to its own processing operations under the Clauses.
|
3.
|
The provisions relating to data protection aspects for subprocessing of the contract referred to in paragraph 1 will be governed by the law of the Member State in which the data exporter is established.
|
4.
|
The data exporter will keep a list of subprocessing agreements concluded under the Clauses and notified by the data importer pursuant to Clause 5 (j), which will be updated at least once a year. The list will be available to the data exporter's data protection supervisory authority.
|
1.
|
The parties agree that on the termination of the provision of data processing services, the data importer and the sub-processor will, at the choice of the data exporter, return all the personal data transferred and the copies thereof to the data exporter or will destroy all the personal data and certify to the data exporter that it has done so, unless legislation imposed upon the data importer prevents it from returning or destroying all or part of the personal data transferred. In that case, the data importer warrants that it will guarantee the confidentiality of the personal data transferred and will not actively process the personal data transferred anymore.
|
2.
|
The data importer and the sub-processor warrant that upon request of the data exporter and/or of the supervisory authority, it will submit its data processing facilities for an audit of the measures referred to in paragraph 1.
|
1.
|
[***]
|
2.
|
[***]
|
3.
|
[***]
|
4.
|
[***]
|
5.
|
[***]
|
6.
|
[***]
|
7.
|
[***]
|
8.
|
[***]
|
9.
|
[***]
|
10.
|
[***]
|
11.
|
[***]
|
12.
|
[***]
|
13.
|
[***]
|
14.
|
[***]
|
15.
|
[***]
|
16.
|
[***]
|
17.
|
[***]
|
18.
|
[***]
|
19.
|
[***]
|
20.
|
[***]
|
21.
|
[***]
|
22.
|
[***]
|
23.
|
[***]
|
24.
|
[***]
|
25.
|
[***]
|
1.
|
INTRODUCTION
|
1.1
|
This
Schedule 17
(Extended Payment Plan) sets forth the terms and conditions governing an extended payment plan available to Customer (“
Extended Payment Plan
”).
|
(A)
|
Effective Date.
As of the Effective Date, Customer Permitted Entities (defined below) have elected to pay the amounts invoiced under the Agreement in accordance with the extended payment terms and conditions as set forth more particularly below.
|
(B)
|
Customer Permitted Entities
. The Extended Payment Plan applies only to the Customer and the following Customer Affiliates (
“Customer Permitted Entities”
) and does not extend to any other Customer Affiliate unless specifically agreed in writing by Provider or Provider Affiliate:
|
Customer Permitted Entities
|
Address
|
Juniper Networks, Inc.
|
1133 Innovation Way
Sunnyvale, California 94089
|
|
|
JUNIPER NETWORKS INDIA PRIVATE LIMITED*
|
Plot# 65/2, 3rd Floor, Bagmane Tridib
Bagmane Tech Park, C.V.Raman Nagar Bangalore, 560093
India
|
(C)
|
Order of Precedence.
Notwithstanding
Section 3.1(H)
of the MSA or any other provision in the Agreement or any other document to the contrary,
provided
the Extended Payment Plan set forth herein remain in effect or Undisputed EPP Fees (as defined in
Section 3.A.
of this
Schedule 17
)
|
(D)
|
EPP Definitions.
|
2.
|
INVOICING AND PAYMENT
|
2.1
|
Invoicing.
Notwithstanding the provisions of
Section 12.1
(Fees and Payments) of the MSA, Provider or Provider Affiliate shall invoice a Customer Permitted Entity for the fixed amounts due under the Agreement on a monthly basis on or before the [***]
day of each month for Services to be provided for that month, adjusted for any variable amounts due or credits owing from the previous month (including credits related to variable unit pricing (
e.g.,
RRCs) under the applicable Statement of Work). For those amounts that a Customer Permitted Entity has determined are Undisputed EPP Fees in accordance with
Section 3.B.
(Undisputed EPP Fees) of this
Schedule 17
(Extended Payment Plan), such Customer Permitted Entity shall pay the invoice amount in two equal payment installments, the first payment installment is due on the [***] day of the [***] month and the second payment installment is due on the [***] day of the [***] month, following the month in which the original invoice is issued (for example, if the invoice is issued on [***], the first payment installment is due on or before [***] and the second payment installment is due on or before [***]). The Extended Payment Plan shall be valid only if Customer maintains a Moody’s Credit Rating of a minimum Ba3 Senior Unsecured Rating or higher. In the event the rating falls below the defined level, then the Extended Payment Plan terms for Customer shall not apply and Customer shall instead pay Provider in accordance with
Article 12
(Fees and Payments) of the MSA.
|
2.2
|
Payments.
If any Customer Permitted Entity fails to pay any Undisputed EPP Fees within [***] Business Days following notice from Provider or Provider Affiliate that such payments are overdue, then Provider or Provider Affiliate reserves the right for such Customer Permitted Entity to: (1) charge interest at the rate of [***]% per [***] days calculated from the date the amount was due until the date of payment by such Customer Permitted Entity; (2) terminate the Extended Payment Plan and all outstanding amounts for Undisputed EPP Fees shall become immediately due and payable; and (3) any new invoices for Undisputed EPP Fees shall be payable to Provider or Provider Affiliate in accordance with
Article 12
(Fees and Payments) of the MSA. Notwithstanding the foregoing, in the event of: (i) any petition or proceeding is filed by or against any Customer Permitted Entity under any bankruptcy, insolvency, receivership or similar law; (ii) any Customer Permitted Entity admits in writing its insolvency or inability to pay its debts as they come due; or (iii) any Customer Permitted Entity or its directors or stockholders takes any action in connection with its dissolution, liquidation or the winding up of its affairs, including, without limitation, ceases doing business, or sells or disposes of all or substantially all its assets, then, the Extended Payment Plan terms set forth in
Section 2.A.
(Invoicing) of
|
2.3
|
Accounting Clause.
Neither Provider, nor any other Provider organization or Affiliate makes any representation whatsoever regarding Customer Permitted Entity’s accounting treatment applicable to the Extended Payment Plan. Provider accounts for the Extended Payment Plan receivables as a financing receivable for US reporting purposes.
|
3.
|
DISPUTED EPP FEES AND UNDISPUTED EPP FEES.
|
3.1
|
Disputed EPP Fees.
An amount shall be considered disputed if, on or prior to the last Business Day of the month in which the invoice was issued (“
Dispute Period
”), Provider or Provider Affiliate receives a written notice (“
Dispute Notice
”), from an authorized representative of a Customer Permitted Entity containing the following information: (i) the invoice number; (ii) the specific dollar amount of the Fees, that are not disputed (“
Undisputed EPP Fees
(
s
)
”); (iii) the specific dollar amount of the disputed EPP Fees (“
Disputed EPP Fees(s)
”); and (iv) a description in reasonable detail of the basis of the dispute. Any such Disputed EPP Fees shall be handled in accordance with and subject to
Section 12.3
(Disputed Fees and Right to Offset) and
Schedule 5
(Governance) of the MSA and are not eligible for the Extended Payment Plan.
|
3.2
|
Undisputed EPP Fees
: All Fees not disputed as specified in
Section 3.A.
(Disputed EPP Fees) of this
Schedule 17
, shall be an Undisputed EPP Fee and such Fees and Services shall be deemed accepted by a Customer Permitted Entity solely for the purposes of the Extended Payment Plan and no other purpose. Such Customer Permitted Entity’s obligation to pay the Undisputed EPP Fees in full and in accordance with the Extended Payment Plan shall be absolute and unconditional, notwithstanding any and all rights such Customer Permitted Entity may have to withhold, dispute, recoup or setoff against any Fees due or assert any Claim or counterclaim of any kind (including performance disputes, Claims against Provider or Provider Affiliate or any early termination rights that may be provided to such Customer Permitted Entity in the Agreement or at Law). The Extended Payment Plan terms have been established in order for Provider or Provider Affiliate to finance the Undisputed EPP Fees and, for the avoidance of doubt, neither this absolute and unconditional payment obligation nor any other term or condition of this
Schedule 17
(Extended Payment Plan) will prejudice Customer Permitted Entity’s ability to separately exercise any other rights to make any Claim against Provider or Provider Affiliate in accordance with the terms of the Agreement or at Law. For the avoidance of doubt, nothing in this
Schedule 17
(Extended Payment Plan) shall prohibit a Customer Permitted Entity from requiring Provider or Provider Affiliate to apply credits issued in accordance with this Agreement on subsequent invoices resulting from Claims related to Services previously invoiced, paid for or deemed accepted by a Customer Permitted Entity.
|
4.
|
REFUNDABLE ITEMS AND SET-OFFS
|
4.1
|
Refunds and Credits.
Notwithstanding any other provision in the Agreement, including
Section 7.4
(Performance Credits),
Section 7.5
(Deliverable Credits), and
Section 12.3
(Disputed Fees and Right to Offset) of the MSA, set-offs, refunds, credits (including Performance or Deliverable Credits) or other rebates may not be applied to any payments due for Undisputed EPP Fees.
|
5.
|
CONFIDENTIALITY
|
5.1
|
Confidentiality Obligations
. Nothing in the Agreement, including
Article 17
(Confidentiality and Customer Data) of the MSA, shall prohibit Provider or Provider Affiliate from disclosing this
Schedule 17
(Extended Payment Plan), or descriptions thereof, or any Attachment and documents related thereto to any assignee of Undisputed EPP Payments that agrees with Provider or Provider Affiliate to confidentiality terms that are no less restrictive than the confidentiality terms set forth in the Agreement.
|
6.
|
TERMINATION
|
6.1
|
Termination.
Notwithstanding any other termination rights set forth in the Agreement, including the termination rights provided in
Article 19
(Termination) of the MSA, (i) in the event of any termination of the Agreement for any reason or the termination of any SOW other than termination as set forth in
Section 19.1
(Termination for Convenience), all outstanding Undisputed EPP Fees are due and payable on the earlier of the Extended Payment Plan due date or the termination date of the Agreement or terminated SOW or (ii) in the event of any termination of a Local Services Agreement, all outstanding Undisputed EPP Fees for the terminated Local Services Agreement are due and payable on the earlier of the Extended Payment Plan due date or the termination date of the Local Services Agreement or (iii) in any event of termination of an SOW as set forth in
Article 19.1
(Termination for Convenience), all outstanding Undisputed EPP Fees for the terminated SOW are due and payable on the Extended Payment Plan due date. Upon notification of a termination pursuant to (i) or (ii) above or notice of termination by Provider pursuant to
Section 19.7
, Provider or Provider Affiliate will no longer offer the Extended Payment Plan terms for future Undisputed EPP Fees. Any new invoices for Undisputed EPP Fees shall instead be payable to Provider or Provider Affiliate in accordance with
Section 12
(Fees and Payments) of the MSA
.
Termination Fees, if any, are not eligible for the Extended Payment Plan.
|
7.
|
FORCE MAJEURE
|
7.1
|
Force Majeure.
Notwithstanding
Section 10.2
(Force Majeure) of the MSA, a Force Majeure Event does not excuse, limit or otherwise effect a Customer Permitted Entity’s obligation to pay Undisputed EPP Fees in accordance with this
Schedule 17
(Extended Payment Plan).
|
8.
|
ASSIGNMENT
|
8.1
|
Assignment
. Notwithstanding the assignment provisions specified in
Section 25.1
(Assignment) of the MSA, Provider or Provider Affiliate shall be permitted to assign, and intends to assign, all or a portion of its rights to receive the Undisputed EPP Fees hereunder to IBM Credit LLC or to a third party with such Customer Permitted Entities prior consent (which consent shall not be unreasonably withheld or denied). No such assignee shall be deemed a third-party beneficiary of the Agreement, except to the extent necessary to collect
|
9.
|
OTHER
|
9.1
|
Acquisitions and Divestitures.
Notwithstanding
Section 3.5
(Changes to Customer Group) of the MSA, the Extended Payment Plan terms shall not apply to any Acquired Entity, Divested Entity or New Entity unless approved by Provider or Provider Affiliate in writing.
|
9.2
|
Survival.
Notwithstanding
Section 25.9
(Survival) of the MSA, all Extended Payment Plan terms survive any termination or expiration of the Agreement or Local Services Agreement until satisfied in full.
|
1.
|
Capitalized Terms
. Capitalized terms not otherwise defined in this Amendment shall have the meaning assigned to such term in either
Schedule 1
(Definitions) to the MSA or
Appendix 1
(Technical Definitions) to
Schedule 3
(Cross-Functional Service Terms), as applicable.
|
2.
|
Amendment
.
Section 1.4
(Related to Joint Verification) is hereby added as follows:
|
3.
|
Except as expressly modified by this Amendment, all of the terms and conditions of the Agreement remain in full force and effect.
|
NAME
|
|
JURISDICTION OF INCORPORATION
|
Juniper Networks International B.V.
|
|
The Netherlands
|
Juniper Networks (US), Inc.
|
|
California, USA
|
Juniper Networks Systems Cayman Ltd.
|
|
Cayman Islands
|
*
|
All other subsidiaries would not in the aggregate constitute a “significant subsidiary” as defined in Regulation S-X.
|
1.
|
I have reviewed this Annual Report on Form 10-K of Juniper Networks, Inc.;
|
2.
|
Based on my knowledge, this report does not contain any untrue statement of a material fact or omit to state a material fact necessary to make the statements made, in light of the circumstances under which such statements were made, not misleading with respect to the period covered by this report;
|
3.
|
Based on my knowledge, the financial statements, and other financial information included in this report, fairly present in all material respects the financial condition, results of operations and cash flows of the registrant as of, and for, the periods presented in this report;
|
4.
|
The registrant's other certifying officer(s) and I are responsible for establishing and maintaining disclosure controls and procedures (as defined in Exchange Act Rules 13a-15(e) and 15d-15(e)) and internal control over financial reporting (as defined in Exchange Act Rules 13a-15(f) and 15d-15(f)) for the registrant and have:
|
(a)
|
Designed such disclosure controls and procedures, or caused such disclosure controls and procedures to be designed under our supervision, to ensure that material information relating to the registrant, including its consolidated subsidiaries, is made known to us by others within those entities, particularly during the period in which this report is being prepared;
|
(b)
|
Designed such internal control over financial reporting, or caused such internal control over financial reporting to be designed under our supervision, to provide reasonable assurance regarding the reliability of financial reporting and the preparation of financial statements for external purposes in accordance with generally accepted accounting principles;
|
(c)
|
Evaluated the effectiveness of the registrant's disclosure controls and procedures and presented in this report our conclusions about the effectiveness of the disclosure controls and procedures, as of the end of the period covered by this report based on such evaluation; and
|
(d)
|
Disclosed in this report any change in the registrant's internal control over financial reporting that occurred during the registrant's most recent fiscal quarter (the registrant's fourth fiscal quarter in the case of an annual report) that has materially affected, or is reasonably likely to materially affect, the registrant's internal control over financial reporting; and
|
5.
|
The registrant's other certifying officer(s) and I have disclosed, based on our most recent evaluation of internal control over financial reporting, to the registrant's auditors and the audit committee of the registrant's board of directors (or persons performing the equivalent functions):
|
(a)
|
All significant deficiencies and material weaknesses in the design or operation of internal control over financial reporting which are reasonably likely to adversely affect the registrant's ability to record, process, summarize, and report financial information; and
|
(b)
|
Any fraud, whether or not material, that involves management or other employees who have a significant role in the registrant's internal control over financial reporting.
|
1.
|
I have reviewed this Annual Report on Form 10-K of Juniper Networks, Inc.;
|
2.
|
Based on my knowledge, this report does not contain any untrue statement of a material fact or omit to state a material fact necessary to make the statements made, in light of the circumstances under which such statements were made, not misleading with respect to the period covered by this report;
|
3.
|
Based on my knowledge, the financial statements, and other financial information included in this report, fairly present in all material respects the financial condition, results of operations and cash flows of the registrant as of, and for, the periods presented in this report;
|
4.
|
The registrant's other certifying officer(s) and I are responsible for establishing and maintaining disclosure controls and procedures (as defined in Exchange Act Rules 13a-15(e) and 15d-15(e)) and internal control over financial reporting (as defined in Exchange Act Rules 13a-15(f) and 15d-15(f)) for the registrant and have:
|
(a)
|
Designed such disclosure controls and procedures, or caused such disclosure controls and procedures to be designed under our supervision, to ensure that material information relating to the registrant, including its consolidated subsidiaries, is made known to us by others within those entities, particularly during the period in which this report is being prepared;
|
(b)
|
Designed such internal control over financial reporting, or caused such internal control over financial reporting to be designed under our supervision, to provide reasonable assurance regarding the reliability of financial reporting and the preparation of financial statements for external purposes in accordance with generally accepted accounting principles;
|
(c)
|
Evaluated the effectiveness of the registrant's disclosure controls and procedures and presented in this report our conclusions about the effectiveness of the disclosure controls and procedures, as of the end of the period covered by this report based on such evaluation; and
|
(d)
|
Disclosed in this report any change in the registrant's internal control over financial reporting that occurred during the registrant's most recent fiscal quarter (the registrant's fourth fiscal quarter in the case of an annual report) that has materially affected, or is reasonably likely to materially affect, the registrant's internal control over financial reporting; and
|
5.
|
The registrant's other certifying officer(s) and I have disclosed, based on our most recent evaluation of internal control over financial reporting, to the registrant's auditors and the audit committee of the registrant's board of directors (or persons performing the equivalent functions):
|
(a)
|
All significant deficiencies and material weaknesses in the design or operation of internal control over financial reporting which are reasonably likely to adversely affect the registrant's ability to record, process, summarize, and report financial information; and
|
(b)
|
Any fraud, whether or not material, that involves management or other employees who have a significant role in the registrant's internal control over financial reporting.
|