LeanKit`s service and support are great strengths, with fast reaction times and lots of teaching materials. 4. Terms of Payment. Invoices for software and services are submitted according to the schedule set out in the performance-use declarations. Unless otherwise agreed in the current SOW, payment of all invoices is due within thirty (30) days of receipt of the undisputed invoices. All invoices must be presented separately for physical personal property, professional or consulting services, shipping, processing or other similar charges, as well as all applicable sales and use taxes due for the transaction. If the customer pays in good faith any fees, charges or other fees, the customer will immediately inform ProcessMAP of this dispute and its reasons. The customer and ProcessMAP will do everything in their power to resolve the dispute without delay. Passwords are SHA1-hashed and salted with a unique value and only the salted + hashed version is stored. Form authentication tickets (cookies) use AES-256 CBC to encrypt the cookie. All our data is encrypted at rest with AES-256 CBC (with SQL Transparent Data Encryption protocol).
LeanKit access protocols are available in our Edge Proxy and authentication service. LeanKit`s HTTP API is composed of several services that are logically divided by the focus of the behavior they implement. These services are located behind multiple proxies and can be updated smoothly without the services being degraded. If necessary, LeanKit can prohibit misconduct/malicious data traffic. Subject to the conditions set out above, ProcessMAP becomes a non-transferable, non-transferable license (unless expressly provided herein) for the use of the software modules contained in the executed specifications (“SOW”), including documentation (as set out in section 12, point d) and (ii) application hosting, maintenance services and support for software accessible on the Internet (together the “Services” that enable the Clie nt to enter, store, upload, process and manage its data (defined in section 13 below) in the course of its activity. In short, software and services are called “systems.” All professional services desired by the client are listed and described in an amicable agreement with SOW(s). The information security team conducts regular internal audits. In addition, Planview enterprise systems and LeanKit services are audited annually by external audit firms to verify SOC 2 Type I and ISO 27001 compliance. . . .