R.O. WRITER®
END USER LICENSE AGREEMENT

If this End User License Agreement (“EULA” or “GTCs”) is incorporated by reference into an Order Form or Statement of Work, then these GTCs are binding as of the date the Order Form or Statement of Work takes effect (the “Effective Date”) between the customer identified on the Order Form or Statement of Work in which these GTCs are referenced (the “Customer”), and Constellation R.O. Writer Inc. (the “Supplier”), each of whom may be referred to herein as a “Party” and collectively as the “Parties.”

IF THESE GTCs ARE PRESENTED ELECTRONICALLY INDEPENDENT OF AN ORDER FORM OR SOW, THEN BY CLICKING ON THE “I ACCEPT” BUTTON, OR BY TAKING SIMILAR ACTION WHICH INDICATES ASSENT TO THESE GTCs (“ACCEPTANCE”), THESE GTCs BECOME BINDING ON THE DATE OF ACCEPTANCE (THE “EFFECTIVE DATE”) BETWEEN SUPPLIER AND (1) THE LEGAL ENTITY ON WHOSE BEHALF THE INDIVIDUAL IS ACCEPTING THESE GTCs IN THEIR CAPACITY AS AN AUTHORIZED REPRESENTATIVE OF THAT LEGAL ENTITY, OR (2) IN THE EVENT THE INDIVIDUAL ACCEPTING THESE GTCs IS A SOLE PROPRIETOR, THEN THAT INDIVIDUAL (IN EITHER CASE, THE “CUSTOMER”). UPON ACCEPTANCE OF THESE GTCs, CUSTOMER (A) ACKNOWLEDGES THAT THEY HAVE READ AND UNDERSTAND THESE GTCs; (B) REPRESENTS AND WARRANTS THAT THE INDIVIDUAL WHO ACCEPTS THESE GTCs HAS THE RIGHT, POWER, AND AUTHORITY TO ENTER INTO THESE GTCs ON BEHALF OF CUSTOMER AND CAN BIND CUSTOMER HERETO; AND (C) AGREES THAT CUSTOMER IS LEGALLY BOUND BY ITS TERMS. IF CUSTOMER DOES NOT AGREE TO THESE GTCs, THE INDIVIDUAL SHALL NOT ACCEPT THESE GTCs, AND CUSTOMER MAY NOT ACCESS OR USE THE PRODUCTS.

SUPPLIER’S ENTIRE LIABILITY UNDER THE AGREEMENT IN THE AGGREGATE OR IN ANY WAY RELATED TO THE PRODUCTS WILL BE LIMITED TO DIRECT DAMAGES IN AN AMOUNT EQUAL TO THE FEES PAID BY CUSTOMER TO SUPPLIER UNDER THE AGREEMENT DURING THE TWELVE (12) MONTH PERIOD IMMEDIATELY PRECEDING THE FIRST EVENT GIVING RISE TO THE CLAIM. IN NO EVENT WILL SUPPLIER BE LIABLE FOR: (a) ANY SPECIAL, INDIRECT, EXEMPLARY, PUNITIVE, INCIDENTAL, OR CONSEQUENTIAL DAMAGES ARISING FROM OR RELATED TO THE AGREEMENT OR IN ANY WAY RELATED TO THE PRODUCTS; OR (b) ANY LOSS OF REVENUE, PROFITS, GOODWILL OR DATA (INCLUDING DUE TO A VIRUS OR OTHERWISE), BUSINESS INTERRUPTION, FAILURE TO REALIZE EXPECTED SAVINGS, CORRUPTION OF DATA, OR CLAIMS AGAINST CUSTOMER BY ANY THIRD PARTY OTHER THAN AS SET OUT IN SECTION 8, EVEN IF SUPPLIER IS ADVISED OF THE POSSIBILITY OF SUCH DAMAGES IN ADVANCE. THESE LIMITATIONS WILL APPLY REGARDLESS OF HOW THE CLAIM ARISES, INCLUDING FOR BREACH OF CONTRACT, TORT, NEGLIGENCE OR OTHERWISE, AND WILL APPLY TO ALL ORDER FORMS, SOWS, AND ANY OTHER DOCUMENT RELATED TO THE AGREEMENT. THE PARTIES AGREE THAT THE LIMITATIONS AND EXCLUSIONS OF LIABILITY SET FORTH IN THIS SECTION OF THE AGREEMENT WILL SURVIVE AND APPLY EVEN IF ANY LIMITED REMEDY SPECIFIED IN THIS AGREEMENT IS FOUND TO HAVE FAILED OF ITS ESSENTIAL PURPOSE. THE FOREGOING LIMITATIONS OF LIABILITY ALLOCATE THE RISKS BETWEEN SUPPLIER AND CUSTOMER AND FORM A MATERIAL BASIS OF THE BARGAIN BETWEEN THE PARTIES. CUSTOMER MUST NOTIFY SUPPLIER THAT IT IS PURSUING A CLAIM UNDER THIS AGREEMENT WITHIN ONE (1) YEAR OF THE DATE IT KNEW OR SHOULD HAVE KNOWN OF THE BASIS FOR ANY SUCH CLAIM. SUPPLIER’S PRICING REFLECTS THIS ALLOCATION OF RISK AND THE LIMITATION OF LIABILITY SPECIFIED HEREIN.

Neither Party may assign or otherwise transfer any of its rights, or delegate or otherwise transfer any of its obligations or performance, under this Agreement, in each case whether voluntarily, involuntarily, by operations of law, or otherwise, without the prior written consent of the other Party, except Supplier may assign or otherwise transfer any of its rights, or delegate or otherwise transfer any of its obligations or performance, under the Agreement to any of its Affiliates without consent of Customer, provided that the Agreement will bind and inure to the benefit of any Supplier successor or assignee. If Customer is acquired by, sells substantially all of its assets to, or undergoes change of control in favor of, a direct competitor of Supplier, then Supplier may terminate the Agreement with immediate effect upon written notice. For purposes of the preceding sentence, and without limiting its generality, any amalgamation, arrangement, or reorganization involving Customer will be deemed to be a transfer of rights, obligations, or performance under this Agreement for which Supplier’s prior written consent is required.

Customer Country of Incorporation:Governing Law:Courts Having Jurisdiction:
The United States of America, Mexico or a Country in Central or South America or the CaribbeanThe laws of the State of Delaware and the federal laws of the United States applicable in that state.(a) The United States District Court for the District of Delaware (to the extent it has subject matter jurisdiction), or (b) the Delaware Court of Chancery
CanadaThe laws of the Province of Ontario and the federal laws of Canada applicable in that province.The provincial and federal courts located in Toronto, Ontario
The United Kingdom or Another Country in Europe, the Middle East or AfricaThe laws of England and Wales.The courts located in London, England
Australia or a Country in Asia or the Pacific RegionThe laws of the State of New South Wales and the laws of the Commonwealth of Australia applicable in that state.The state and federal courts located in Sydney, Australia

Upon any dispute, controversy or claim between the parties, each of the parties will designate a representative from senior management to attempt to resolve such dispute. The designated representatives will negotiate in good faith in an effort to resolve the dispute over a period of thirty (30) days. If the dispute is not resolved in this 30-day period, the parties will submit the dispute to binding arbitration under the applicable arbitration law and rules identified in the table below, by a single arbitrator independent of both parties who is skilled in the legal and business aspects of the software industry. Notwithstanding the foregoing, the Delaware Uniform Arbitration Act shall supplant the Delaware Rapid Arbitration Act in the event that (a) the Delaware Rapid Arbitration Act is not available to the Parties, (b) the subject matter of the dispute includes allegations that Customer has infringed, or has permitted others to infringe, Supplier’s IP Rights, or (c) the amount in dispute is greater than or equal to one million dollars ($1,000,000). The parties agree that the arbitrator’s fee shall be shared equally between the parties and that each Party shall be responsible for its costs, legal and otherwise, in relation to the arbitration, unless the arbitrator decides that the circumstances justify an award of costs. Any award by an arbitrator pursuant to arbitration, whether for costs, expenses, damages, or otherwise, is final and may be entered in and enforceable by the court having jurisdiction over the Agreement, as set forth in Section 13(a) above. The arbitration shall be conducted in the English language and shall take place in accordance with arbitration rules and in the location set forth in the below chart, depending on the country of incorporation or organization, as applicable, of Customer. Nothing in this Section 14 shall limit the ability of a Party to seek injunctive relief. Notwithstanding the foregoing, any Supplier claim which alleges that Customer has not paid an undisputed invoice is not subject to the binding arbitration process set forth in this Section.

Customer Country of Incorporation:Applicable Arbitration Law and Rules:Location of Arbitration:
The United States of America, Mexico, or a Country in Central or South America or the CaribbeanDelaware Rapid Arbitration Act and Delaware Rapid Arbitration Rules whenever possible; otherwise, the Delaware Uniform Arbitration Act and Commercial Arbitration Rules of the American Arbitration AssociationWilmington, Delaware
CanadaOntario Arbitration Act (1991) and the rules of the Canadian Arbitration AssociationToronto, Ontario
The United Kingdom or Another Country in Europe, the Middle East, or AfricaUK Arbitration Act (1996) and the rules of the London Court of International ArbitrationLondon, England
Australia or a Country in Asia or the Pacific RegionAustralia International Arbitration Act (1974) and the rules of the Australian Centre for International Commercial ArbitrationSydney, Australia

Appendix A: Product Specific Terms

The following “Product Specific Terms,” or “PSTs,” apply to (i) the Product or functionality specified in the headings below, to the extent that such Product or functionality is purchased or otherwise licensed by Customer (including any successor versions of the Product); and/or (ii) Midas franchisees.

Appendix B: Data Processing Agreement (DPA)

This Data Processing Agreement including its Attachments (“DPA”) is between Constellation R.O. Writer Inc., if Customer is located in the United States, or R.O. Writer, a division of Perseus Group Software Corp., if Customer is located in Canada (“Supplier”) and the entity that receives any Products from Supplier (“Customer”) pursuant to a written or electronic agreement which governs the provision of those Products (“Agreement”), and shall apply to the extent that (i) Supplier Processes Personal Data on behalf of the Customer, and (ii) either the Agreement expressly incorporates this DPA by reference or the parties sign this DPA.

This DPA is supplemental to, and forms an integral part of, the Agreement and is effective upon the earlier of signature or its incorporation into the Agreement (“Effective Date”), which incorporation may be specified in the Agreement or an executed amendment to the Agreement. In case of any conflict or inconsistency between the terms of the Agreement and this DPA, this DPA shall take precedence over the terms of the Agreement to the extent of such conflict or inconsistency.

The term of this DPA shall follow the Term of the Agreement. Terms not otherwise defined herein shall have the meaning as set forth in the Agreement.

California Personal Information” means Personal Data that is subject to the CCPA.

“Canadian Privacy Laws” means the data protection and privacy laws applicable in Canada and/or its provinces, in each case as hereinafter amended, supersede, or replaced, including:

“Consumer,” “Business,” “Sell” and “Service Provider” shall have the meanings given to them in the CCPA. 

Controller means the natural or legal person, public authority, agency or other body which, alone or jointly with others, determines the purposes and means of the Processing of Personal Data.

Data Privacy Laws means all applicable legislation relating to data protection and privacy which applies to the respective party in the role of Processing Personal Data in question under the Agreement, including without limitation US Privacy Laws, and Canadian Privacy Laws; in each case to the extent applicable and as amended, repealed, consolidated or replaced from time to time. 

Data Subject means the individual to whom Personal Data relates.

Instructions means the written, documented instructions issued by Customer to Supplier and directing the same to perform a specific or general action with regard to Personal Data.

Permitted Affiliates means any of Customer’s Affiliates (as defined under the Agreement):

Personal Data means any information provided by or collected on behalf of Customer relating to an identified or identifiable individual where such information is protected under applicable Data Privacy Laws as personal data, personal information, personally identifiable information, or any equivalent thereof.

Personal Data Breach means an event that leads to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, Personal Data transmitted, stored or otherwise Processed by Supplier and/or its Sub-Processors in connection with the provision of the Products, subject to any limitations, exclusions, exceptions, or safe harbors provided for by applicable Data Privacy Laws. “Personal Data Breach” shall not include (a) any such events for which notification is not required pursuant to applicable Data Privacy Laws, or (b) unsuccessful attempts or activities that do not compromise the security of Personal Data, including unsuccessful log-in attempts, pings, port scans, denial of service attacks, and other network attacks on firewalls or networked systems, except to the extent that any such unsuccessful attempts or activities must be disclosed pursuant to applicable Data Privacy Laws.

Processing means any operation or set of operations which is performed on Personal Data, encompassing the collection, recording, organization, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction or erasure of Personal Data. The terms “Process”, “Processes” and “Processed” will be construed accordingly.

Processor means a natural or legal person, public authority, agency or other body which Processes Personal Data on behalf of the Controller.

“Products” means the goods and services provided by Supplier to Customer under the Agreement.

Sub-Processor means any third-party engaged by Supplier to carry out specific Processing activities in accordance with the Instructions and subject to further limitations set forth in this DPA.

“US Privacy Laws” means the applicable legislation of the United States of America that are in effect as of the Effective Date relating to data protection and privacy which applies to the respective party in the role of Processing Personal Data in question under the Agreement, in each case as hereinafter amended, superseded, or replaced, including the following:

As part of Supplier’s obligation under Section 4(f) above, where required by applicable Data Privacy Laws, Supplier will assist Customer with Customer’s obligation to respond to requests from data protection authorities and Data Subjects that seek to exercise their rights under applicable Data Privacy Laws (“Data Subject Requests”). All Data Subject Requests must provide sufficient information for Supplier to verify the identity of the Data Subject. Customer shall reimburse Supplier for any commercially reasonable costs that arise from any such assistance that is in addition to that which Supplier normally provides to its customers.

If a Data Subject Request or other communication regarding the Processing of Personal Data under the Agreement is made directly to Supplier, Supplier will, to the extent that Supplier can identify Customer as the source of the Personal Data in question through its standard due diligence processes, promptly inform Customer of such Data Subject Request and will advise the Data Subject to submit their request to Customer. Customer shall otherwise be solely responsible for responding to any Data Subject Requests.

To the extent required by applicable law, Supplier will provide reasonable assistance to Customer to enable Customer to conduct and document data protection assessments, provided that the required information is reasonably available to Supplier, and Customer does not otherwise have access to the required information.

Customer agrees that Supplier may engage Sub-Processors to Process Personal Data on Customer’s behalf.

Where Supplier engages Sub-Processors, Supplier will execute a written agreement with any Sub-Processor that imposes data protection and privacy terms on the Sub-Processors that provide at least the same level of protection for Personal Data as those in this DPA and that requires the Sub-Processor to meet the obligations of the Supplier with respect to the Personal Data, to the extent applicable to the nature of the services provided by such Sub-Processors. Supplier will remain responsible for each Sub-Processor’s compliance with the obligations of this DPA and for any acts or omissions of such Sub-Processor that cause Supplier to breach any of its obligations under this DPA.

For those Customers that provide Personal Data of Data Subjects who are subject to CoPA, Customer has the right to object to the use of any particular Sub-Processor, in which case Customer may request a list of Supplier’s Sub-Processors

Customer acknowledges and agrees that Supplier may Process Personal Data on a global basis as necessary to provide the Products in accordance with the Agreement. Supplier shall ensure such transfers are made in compliance with the requirements of applicable Data Privacy Laws.

Attachment 1 – Details of Processing

Supplier will Process Personal Data for the limited and specific purposes identified in the Agreement, including as necessary to provide the Products pursuant to the Agreement, as further specified in an Order Form or SOW, and as further instructed by Customer in its use of the Products. Without limiting the generality of the foregoing, Personal Data may be subject to the following Processing activities: (a) storage and other Processing as necessary to provide, maintain and improve the Products provided to Customer; and/or (b) disclosure to third-parties in accordance with the Agreement, this DPA, or as compelled by applicable laws, which may include sending Personal Data to Customer’s partners and service providers on Customer’s behalf and at their direction.

Subject to Section 4(f) (Deletion or Return of Personal Data) of this DPA, Supplier will Process Personal Data for the duration of the Agreement only, unless otherwise agreed in writing.

Customer may provide the following categories of Personal Data to Supplier in the course of using the Products, or incident to the use thereof, the extent of which is determined and controlled by Customer in its sole discretion:

  • Contact Information, including name, mailing address, email address, online user name(s), telephone number, user agent, and similar information.
  • Internet or other similar network activity, including IP Address, and user agent/web browser information.
  • Commercial information, including records of products or services purchased, obtained, or considered.
  • Geolocation data, including imprecise physical location derived from IP address and/or wifi networks.
  • Professional or employment-related information, including job title and place of employment.
  • Any other Personal Data submitted by, sent to, or received by Customer, or Customer’s end users, via the Products.

The parties do not anticipate processing special categories of Personal Data or sensitive personal information, as those terms are defined under applicable Data Privacy Laws.

Attachment 2 – Technical and Organizational Measures

Supplier shall comply with its obligations as a Processor under the Data Privacy Laws to keep all Personal Data secure. Without limiting the foregoing, Supplier shall: (a) taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, implement appropriate technical and organizational measures to ensure a level of security appropriate to that risk, including, as appropriate, the measures referred to applicable Data Privacy Laws; and (b) in assessing the appropriate level of security, taking into account in particular of the risks that are presented by processing, in particular from accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to Personal Data transmitted, stored or otherwise processed. Such measures include (as applicable), without limitation:

Outsourced Processing: Supplier Processes Customer’s Personal Data, including Personal Data that is used in conjunction with its hosted Software and Cloud Services, using industry-leading, reputable cloud infrastructure vendors. Supplier maintains contractual relationships with these infrastructure vendors which obligates them to provide their infrastructure services in accordance with standards which conform to the requirements of applicable Data Privacy Laws and that are no less restrictive than this Data Processing Agreement. 

Physical and environmental security: Supplier hosts its Cloud Services in multi-tenant environments and deploys industry best practices with respect to isolating each tenant from one another.  Supplier hosts its hosted Software in separate multitenant environments for each Customer, each controlled in accordance with industry best practices.  All of Customer’s Personal Data that is not Processed in the hosted Software or Cloud Services is Processed in a virtual environment inaccessible to Customers and controlled in accordance with industry best practices.

Authentication: Supplier has implemented strong internal password policies for all systems that Process Customer’s Personal Data. Customers who interact with the Products via the user interface must set their own password policies and authenticate before accessing non-public Personal Data. 

Authorization: For Cloud Services, Personal Data is stored in multi-tenant storage systems accessible to Customers via only application user interfaces and application programming interfaces, and Customers are not allowed direct access to the underlying application infrastructure. For all systems that Process Customer’s Personal Data, the authorization model in each of Supplier’s products is designed to ensure that only the appropriately assigned individuals can access relevant features, views, and customization options. Authorization to data sets is performed through validating the user’s permissions against the attributes associated with each data set. 

Application Programming Interface (API) access: Public product APIs may be accessed using an API key or through JWT authorization. 

Access controls: Supplier implements industry standard access controls for all systems that Process Customer’s Personal Data.  Network access control mechanisms, such as Layer 7 firewalls and other security mechanisms, are designed to prevent network traffic using unauthorized protocols from reaching the product infrastructure. The technical measures implemented differ between infrastructure providers and include Virtual Public Cloud (VPC) implementations, security group assignment, and traditional firewall rules. 

Intrusion detection and prevention: Supplier implements industry standard intruder detection capabilities for all systems that Process Customer’s Personal Data.  Supplier has implemented a Web Application Firewall (WAF) solution to protect all internet-accessible systems that Process Customer’s Personal Data. The WAF is designed to identify and prevent attacks against publicly available network services. 

Static code analysis: Security reviews of code stored in Supplier’s source code repositories are performed on commit to the development source repository, checking for logical errors, security flaws, and performance flaws. 

Vulnerability testing: Supplier conducts regular vulnerability testing of systems that Process Customer’s Personal Data.  These vulnerability tests are intended to identify and resolve foreseeable attack vectors and potential abuse scenarios.

Product access: A subset of Supplier’s employees have access to the Products and other systems that Process Customer’s Personal Data via controlled interfaces. The intent of providing access to a subset of employees is to provide effective customer support, to troubleshoot potential problems, to detect and respond to security incidents, and implement data security measures. Access is enabled through “just in time” requests for access, and all such requests are logged. Employees are granted access by role, and reviews of high-risk privilege grants and roles are conducted regularly.

External access to Supplier systems that Process Customer’s Personal Data is restricted, following the same least privilege model, and requires authorization and authentication. External access controls are configured and monitored by Supplier IT and Security personnel.

Background checks: All Supplier employees who access systems that Process Customer’s Personal Data undergo a background check prior to being extended an employment offer, in accordance with and as permitted by the applicable laws. All employees are required to conduct themselves in a manner consistent with company guidelines, non-disclosure requirements, and ethical standards. 

Access control to premises and facilities: In addition to the access control measures stated above in this subsection (a), the following measures apply to any system that is hosted in Supplier’s data centers (including those which are co-located):

Physical access controls to enter premises include magnetic locks and badge readers. Physical access to interior is subdivided with restricted areas requiring addition badge access privileges. Building receptionists require guest sign-in, ID check, and printed visitor badges with visitor photograph and date of visit. Visitations are logged. Video surveillance in present at office spaces and coverage is present at interior and exterior, including face-level camera at headquarters receptionist entrance. As part of annual Security Awareness Training, Supplier staff are trained in concepts of physical security and understand procedures for contacting security personnel if needed.

In-transit: For Supplier Products that are accessible via the Internet, Supplier makes HTTPS encryption (also referred to as SSL or TLS) available on every one of its login interfaces. Supplier’s HTTPS implementation uses industry standard algorithms and certificates. 

At-rest: Supplier stores user passwords following policies that follow industry standard practices for security.  Supplier has implemented technologies to ensure that stored data is accessible only by staff which requires access.

Detection: Supplier designed its infrastructure to log extensive information about the system behavior, traffic received, system authentication, and other application requests. Internal systems aggregate log data and alert appropriate employees of malicious, unintended, or anomalous activities. Supplier personnel, including security, operations, and support personnel, are responsive to known incidents. 

Response and tracking: Supplier maintains a record of known security incidents that includes description, dates and times of relevant activities, and incident disposition. Suspected and confirmed security incidents are investigated by security, legal, operations, or support personnel, and appropriate resolution steps are identified and documented. For any confirmed incidents, Supplier will take appropriate steps to respond and notify Customer in accordance with the terms of this DPA.

Infrastructure availability: The infrastructure providers use commercially reasonable efforts to ensure a minimum of 99% uptime. The infrastructure providers maintain a minimum of N+1 redundancy to power, network, and HVAC services. 

Fault tolerance: Backup and replication strategies are designed to ensure redundancy and fail-over protections during a significant processing failure. Customer’s Personal Data is backed up to multiple durable data stores and replicated across multiple availability zones. 

Online replicas and backups: Where feasible, production databases are designed to replicate data between no less than 1 primary and 1 secondary database. All databases are backed up and maintained using at least industry standard methods.  Supplier’s systems that Process Customer’s Personal Data are designed to ensure redundancy and seamless failover. The server instances that support the Products are also architected with a goal to prevent single points of failure. This design assists Supplier operations in maintaining and updating the Product applications and backend while limiting downtime. 

Measures to ensure that personal data are protected from accidental destruction or loss: Supplier has business continuity, incident response, data backup, and disaster recovery procedures designed to maintain business operations and redundancy of systems that Process Customer’s Personal Data. Supplier performs regular testing to ensure that availability supporting systems function properly.

Upon request of Customer, Supplier will provide either (i) a copy of any available independently validated report of its security programs (i.e. SOC 2, Type II, ISO 27001, etc.), or (ii) written responses to all reasonable requests for information, along with copies of any related policies and other documentation.

(Last modified: 08.27.2025)

Scroll to Top