Work Wizard Security and Compliance

Organizational Security

At Work Wizard we prioritize the security of our platform and customer data. We have a dedicated team directly oversee and manage all aspects of our security objectives, risk assessments, and mitigation strategies. We are committed to maintaining high standards of security, availability, processing integrity, and confidentiality for our customer data.

We understand the importance of trust and security in our service and commit to upholding these principles in every aspect of our work.

Security Awareness and Privacy

Our commitment to security is not just organizational but also personal. Every one of us has signed a confidentiality agreement and adheres to a strict acceptable use policy. We regularly update our knowledge on information security, privacy, and compliance to ensure we are at the forefront of protecting our platform and our customers.

Security Infrastructure

Our platform is hosted on AWS, leveraging their robust security measures. We have built our system to utilize AWS's built-in security features to protect against threats and ensure data integrity.

Security and Privacy by Design

We don't just add security; we build it from the ground up. Our design and development processes incorporate security and privacy principles to ensure that these are integral components of our product.

Internal Controls

We handle internal reviews and audits amongst our team members, following industry best practices and standards. We proactively assess our policies and continuously strive to enhance our security measures.

Endpoint Security

We employ strict standards for any device that accesses our system. All devices are configured to adhere to stringent security configurations, including encryption, strong passwords, and automatic locking mechanisms.

Transparency and Trust

We believe in being transparent with our users about our security practices. As we grow, we will continue to update our community on our evolving security measures and practices.

Infrastructure security

Network Security

At Work Wizard our approach to network security is devised to build multiple layers of protection and defense. We are committed to employing best practices such as firewall implementations to prevent unauthorized access and control undesirable traffic. Our systems are logically segmented to ensure the integrity and security of sensitive data.

We maintain rigorous firewall monitoring, with the founding team regularly reviewing access logs and configurations. As we grow, we will establish a schedule for reviewing and updating firewall rules. Our infrastructure on AWS allows us to continuously monitor for discrepancies or suspicious activities, with automated notifications for any abnormal behavior detected in our production environment.

Network Redundancy

Our platform's components are designed with redundancy in mind. We leverage AWS's distributed grid architecture to safeguard our system against server failures, ensuring that our services remain accessible to users without interruption.

DDoS Prevention

We utilize DDoS mitigation services provided by established AWS technologies, designed to filter out malicious traffic while allowing legitimate requests to keep our platform highly available and performant.

Server Hardening

Our servers, used for development and testing, are hardened according to industry best practices, which include disabling unused ports and services, removing default passwords, and ensuring that the operating system images are secure by default.

Intrusion Detection and Prevention

We employ both host-based and network-based intrusion detection mechanisms to monitor for signs of unauthorized or malicious activity. Our team ensures that all administrative access and privileged commands are logged, with rules and analytics in place to alert us to potential security incidents.

Data Security

Secure by Design

We adhere to a rigorous change management policy, ensuring all updates and new features undergo a thorough security review before deployment. Our development processes align with secure coding guidelines and are complemented by code analysis tools and manual reviews to identify and remediate potential security vulnerabilities.

Data Isolation

Customer data is managed to ensure logical separation from other customers' data within our AWS-hosted environment, maintaining strict data privacy and integrity.

Encryption

Data in transit to our servers is protected using TLS encryption, and sensitive data at rest is encrypted using AES-256. We manage encryption keys using AWS Key Management Services, providing an additional layer of security.

Data Retention and Disposal

We retain customer data for as long as you engage with our services. Upon termination of your account, data will be purged from active databases and backups in line with our data retention policy. We also reserve the right to terminate inactive accounts after a specified period, with prior notice and an opportunity for you to back up your data.

Identity and Access control

Enhanced Security with Multi-Factor Authentication

With Work Wizard One-Auth, we bolster your account's defense layer by necessitating a second form of verification beyond your password. This multifaceted approach, supporting biometric recognition, push notifications, QR codes, and time-based OTPs, significantly minimizes the threat of unauthorized access.

For heightened security needs, we offer Yubikey Hardware Security Key integration for robust multi-factor authentication.

Regulated Administrative Access

Our commitment to data protection is demonstrated through stringent access controls and internal policies that limit employee access to user data. Adhering to least privilege and role-based access principles, we minimize exposure risks. Access to sensitive environments requires multiple authentication methods, including strong passwords, two-factor authentication, and SSH keys, all within a tightly secured and audited network.

Operational Security

Observation and Vigilance

Our operational security framework includes comprehensive monitoring of service operations, network traffic, and device utilization. Through diligent log collection and analysis — event, audit, fault, and administrative — we proactively detect anomalies and safeguard against unauthorized activities. These logs are securely stored, with access meticulously controlled to guarantee availability and integrity.

Customers have access to detailed audit logs for all update and delete actions within Work Wizard services.

Proactive Vulnerability Management

We employ a thorough vulnerability management protocol, utilizing third-party and proprietary scanning tools complemented by manual and automated penetration testing. Our security team remains vigilant, monitoring various security channels to address potential threats preemptively.

Identified vulnerabilities are systematically logged, prioritized, and managed until resolution, ensuring our systems are fortified against identified risks.

Robust Malware and Spam Defense

Work Wizard actively scans all files with a sophisticated anti-malware system, regularly updated with the latest threat intelligence. We maintain a robust stance against malware and enforce DMARC to curtail spam, supplemented by our proprietary detection system against phishing and other abuses, with a dedicated team overseeing these protections.

Reliable Backup Procedures

Our backup protocol includes daily incremental and weekly comprehensive backups via the Work Wizard Admin Console, with all data encrypted and stored in a secure, accessible format for a standard retention period.

We employ RAID technology to safeguard backup integrity, conducting regular scheduling and integrity verifications to assure data resilience.

We advocate for clients to conduct regular local backups to further ensure data security.

Assured Disaster Recovery and Business Continuity

We ensure application data robustness through real-time replicated storage across data centers. Our infrastructure boasts multiple ISPs and critical physical safeguards like power backups, climate controls, and fire prevention systems to guarantee uninterrupted service.

Incident Management and Notification

Our dedicated incident response team ensures prompt communication and resolution of security events. We engage with affected parties directly, providing necessary documentation and taking steps to prevent future occurrences.

In compliance with GDPR, we promptly notify Data Protection Authorities and affected parties in the event of a breach.

Customer Security Empowerment

In conjunction with our stringent security measures, there are pivotal actions you, as our esteemed customer, can undertake to fortify your defenses:

· Establish and safeguard a robust, unique password.

· Activate multi-factor authentication.

· Consistently update to the newest versions of web browsers, mobile operating systems, and mobile apps to leverage the latest security patches and features.

· Apply discernment when disseminating data from our cloud-based services.

· Categorize your data as personal or sensitive and label them distinctly.

· Vigilantly monitor the devices connected to your account, active web sessions, and third-party access to identify any unusual activities, and adeptly manage roles and privileges associated with your account.

· Stay vigilant against phishing and malware threats by scrutinizing unfamiliar emails, websites, and links that may mimic Work Wizard or other trusted services aiming to compromise your sensitive information.

Conclusion 

As we navigate the evolving landscape of cyber threats, we pledge to remain vigilant, transparent, and proactive in our security endeavors. Together, with your collaboration and our relentless dedication to security, we forge a partnership that not only anticipates threats but also fortifies our collective defenses against them.

We thank you for entrusting us with your data and pledge to advance our security measures to exceed industry standards and your expectations.

GDPR Compliance

· Data Processing Justification: We will only process personal data where we have a legal basis to do so (e.g., consent necessary for a contract, compliance with a legal obligation, protection of vital interests, or for legitimate business interests).

· Data Protection Measures: We will implement strict security protocols, including encryption, access control, and regular employee security training.

· Data Minimization: Only the minimum personal data required to deliver our services will be processed.

· Data Subject Rights: We will uphold all data subjects' rights under GDPR, including access, rectification, erasure, restriction of processing, data portability, and objection.

· Data Breach Notification: In the event of a data breach, we will follow GDPR requirements for notifying supervisory authorities and affected individuals when there is a high risk to their rights and freedoms.

· Cross-Border Data Transfers: Personal data will only be transferred outside the EU with adequate protection.

· Data Protection Officer (DPO): A DPO will be appointed to oversee GDPR compliance and act as a point of contact for supervisory authorities and data subjects.

CCPA Compliance

· Transparency: We will provide a clear and accessible privacy notice outlining our data collection, processing, and sharing practices.

· Consumer Rights: We will recognize and facilitate the rights of California consumers, including the right to know about personal information collected, disclosed, or sold, the right to request deletion of personal information, and the right to opt out of the sale of personal information.

· Service Provider Agreements: We will ensure that any service providers with whom personal information is shared are contractually bound to respect the privacy and confidentiality of such data in line with CCPA requirements.

· Training: Employees who handle personal information will be trained on the provisions of the CCPA.

· Non-Discrimination: We will not discriminate against any consumer for exercising their CCPA rights.

WORK WIZARD SOFTWARE COMPANY, LLC USER LICENSE AGREEMENT

WORK WIZARD SOFTWARE COMPANY, LLC

USER LICENSE AGREEMENT

THIS COMPUTER SOFTWARE LICENSE AGREEMENT (the “Agreement”) is entered into this ____ day of __________, 20__, by and between, Work Wizard Software Company, LLC (“Licensor”), a Missouri Limited Liability Company and ______________________, a _______________ (“Licensee”). The Agreement shall be on the terms and conditions set forth on this covering sheet and in the licensing, form attached, which together shall constitute the entire agreement of the parties.

WHEREAS, Licensor owns Work Wizard, a software intended to assist in estimating facility maintenance and janitorial services across a diverse range of facility types (the “Software”); and

WHEREAS, Licensee wishes to be granted use of such software;

WHEREAS, for good and valuable consideration, the receipt of which is hereby acknowledged, Licensor is willing to license the Software to Licensee; and

WHEREAS, Licensee is willing to accept the Software under the terms and conditions set forth herein.

NOW, THEREFORE the parties agree as follows:

I. Scope of License

a. The Software consists of a graphical user interface intended to collect information through input by an individual manually operating a mouse, keyboard, touch screen, or similar device and display various information on a screen (the “Frontend”), as well as a collection of software code encompassing methods, processes, and datasets which analyze the information being entered and determine the information to be displayed (the “Backend”).

b. This Agreement grants Licensee a nonexclusive, nontransferable right to access to the Frontend only, and is not intended to grant access to Backend, either via direct access of the software code or the associated methods, processes, and datasets, or by the use of software which interacts directly with the Backend or interacts with the Frontend in a manner other than that intended by Licensor, as described above. This right of access, subject to the terms and conditions contained in this Agreement, shall hereinafter be referred to as the “License.”

c. Licensee hereby agrees to access the Frontend only in the manner consistent with the License acknowledges that attempts to access the Backend violates this Agreement and may result in economic damage to Licensor.

II. Length of License

a. Time-Limited License. The License granted herein is intended to grant access for a limited period of time and does not entitle Licensee to use beyond such time, including but not limited to accessing any information previously entered by Licensee or reports previously generated by the Software and saved therein.

b. Initial License. The License granted herein shall commence on the later of [the date first stated above in this agreement]/[DATE] and the date on which payment of the amount described in Schedule A is received by Licensor, and shall continue for a period of [twelve (12) months], terminating at midnight UTC on the same day of the month first stated or referenced in this paragraph, provided however that if the month in which this license would otherwise terminate does not contain such day by nature of having fewer total days than the day on which the License commenced, this license shall terminate at midnight on the first day of the following month.

c. Early Termination. In the event that Licensee fails to make any payment described in Schedule A, Licensor may immediately terminate the License before the expiration of the term described above. Such termination shall not relieve Licensee of its obligation to make the missed payment, or any other additional payments required by this Agreement.

d. Automatic Renewal. Should Licensee make payment equal to the amount described in Schedule A prior to the expiration of the License term then in affect, and should Licensor accept such payment and fail to return it within five (5) business days, the License shall be renewed for an additional term under the same conditions as described herein. Provided, however, that this subsection does not apply if Licensor informs Licensee of its intent not to renew the License under the same terms prior to the expiration of the License term then in effect.

III. Method of Access

a. Limitation on Users. The Software may be accessed solely through the web based graphical Frontend hosted by Licensor, and access to the Frontend shall require the use of a unique username and password, which shall be assigned by Licensor to the specific individuals (“Licensed Users”) designated by Licensee. Each username may only be used by the specific individual to whom it is assigned, and the sharing or use by multiple individuals shall be a violation of this agreement.

b. Number of Users. This License entitles Licensee to access by up to [NUMBER] Licensed Users.

IV. [Limitation on Territory]

a. [Location of Users. This License shall entitle individuals to access the Software only from areas within the following geographical area(s): United States of America (the “Access Territory”). Licensee acknowledges that accessing the Software from an area outside of the Access Territory violates this Agreement and may result in economic damage to Licensor. Additionally, Licensor may utilize IP Adress-based location blocking to restrict access from outside of the Access Territory, and the use of technology intended to change or obscure the location of the individual user accessing the Software violates the terms of this Agreement.]

V. Intellectual Property

a. “TRADE SECRET” means the program structure, logic, data structures, design, processes, procedures, formulae, and algorithms contained in the ordered set of instructions which together constitute the Software that may be disclosed by either the Software or the Documentation. Trade Secret does not include information which is publicly known through no fault of Licensee or Licensee’s employees, contractors, or agents, nor does it include information which is lawfully received by Licensee from a third party not bound in a confidential relationship to LICENSOR, nor information disclosed by Licensor to a third party without obligation of confidentiality.

b. Licensee agrees not to disclose or use any Trade Secrets which are provided to Licensee in Licensee’s Software, technical manuals, or documentation except in accordance with the terms of this License. In addition, Licensee agrees not to seek to discover or to disclose any of Licensor’s Trade Secrets by disassembling, decompiling, or otherwise reverse engineering the Software.

VI. Licensee Responsibility for Users

a. Licensee agrees to take all reasonable steps to ensure that the Software shall not be accessed by anyone other than the Licensed Users granted access under this License, and to otherwise protect the Software from use by others contrary to the terms of this License.

b. Licensee agrees that the License contained herein shall inure for its exclusive benefit, and that while that access thereunder shall be granted to the Licensed Users it shall designate, it shall only designate individuals who are its employees, contractors, or agents, and that such individuals shall not be entitled to access the Software for any other purposes than for the business operations of the Licensee.

c. Licensee agrees to adopt policies and procedures to ensure that the Licensed Users given access under the terms of this License comply with its terms and agrees that any violation of the terms of this License by a Licensed User shall be deemed to be a violation by the Licensee, and that Licensee shall be responsible for any damages resulting from such violation.

d. Nothing in this section shall limit Licensee’s right to pursue against any Licensed User any other remedies or recovery of damages as may otherwise be available to Licensor under any proceeding of law or equity.

VII. Transfer or Reproduction of Software

a. The License granted herein is nontransferable, and Licensee is NOT licensed to rent, lease, transfer, network, reproduce, display, or distribute this Software to any parties not specifically described in this Agreement. Licensee acknowledges that unauthorized access or copying of the Software may constitute a serious crime; such actions may also result in a suit for damages, injunctive relief, and attorney fees.

b. This License shall terminate immediately in the event of a sale or other transfer of Licensee’s business without the express written consent of Licensor. In addition, this License shall terminate immediately in the event of a sale or other transfer of stock, partnership, or other interests in Licensee, that results in Licensee’s original shareholders or their families owning, in the aggregate, less than fifty-one percent (51%) of the voting stock of the Licensee. Any required consents shall not be unreasonably withheld or delayed.

VIII. Revocation of License

a. In addition to and without limiting any other remedies or recovery of damages as may otherwise be available to Licensor under any proceeding of law or equity, Licensor retains the right to revoke Licensee’s License and/or restrict access to specific Licensed Individuals should it know of or have reason to believe that there has been a breach of the terms of this Agreement by Licensee or such Licensed Individual.

IX. Non-Assumption of Economic Risk

a. While the Software created by Licensor is intended to generate comprehensive estimates for the labor and supplies required for facility maintenance and to aid in creating budgets for such tasks, it is intended for internal use, and not to provide bids directly to Licensee’s customers.

b. Licensor makes no warranty or guarantee that the estimates generated by the Software will match the labor and supplies actually required for such tasks, or that it will be free from any errors or omissions and does not make any guarantee that any bid or offer of services developed by Licensee with the assistance of the Software will be profitable for Licensee.

X. Miscellaneous Provisions

a. Governing Law; Submission to Jurisdiction. This Agreement shall be governed by and construed in accordance with the laws of the State of Missouri, without giving effect to any conflicts or choice of law provisions. Licensee acknowledges that by obtaining the rights and access granted in this Agreement, Licensee has transacted business in the State of Missouri. Licensee hereby voluntarily submits to, consents to, and waives any defense to the jurisdiction of courts located in the State of Missouri as to all matters relating to or arising from this Agreement.

b. Attorney Fees. If any action is brought by any party to this Agreement against the other party regarding the subject matter of this Agreement, the prevailing party shall be entitled to recover, in addition to any other relief granted, reasonable attorney fees, costs, and expenses of litigation. Licensee agrees to pay all costs of collection, including reasonable attorney’s fees and costs, of any amount owing under this Agreement which are not paid when due.

c. Severability. If any provision or provisions of the Agreement shall be held to be invalid, illegal, or unenforceable, the validity, legality, and enforceability of the remaining provisions shall not in any way be affected or impaired thereby, unless it is reasonably assumed that the parties would not have entered into this Agreement without the invalid provisions.

d. Assignment/Delegation. Licensee may not assign their rights or delegate any of their duties to any agents or third parties. Any attempt to assign, transfer, or delegate any of the Licensee’s rights, duties, or obligations under this Agreement or enter into any sublicences without consent is void.

e. Waiver. The waiver by any part of, or the failure of any party to take action with respect to, any breach of any term, covenant, or condition contained in this Agreement shall not be deemed to be a waiver of such term, covenant, condition, or subsequent breach of the same, or any other term, covenant, or condition contained in this Agreement.

f. Entire Agreement; Inconsistency. This Agreement, including any amendments hereto, constitutes the entire agreement between Licensor and Licensee. This Agreement supersedes and replaces any contemporaneous or prior proposal, representation, agreement, or understanding between the parties regarding the License.

g. Third Party Beneficiaries. This Agreement is for the sole and exclusive benefit of Licensor and Licensee and is not intended to benefit any other third party, including any client of Licensee or any provider of third-party content, information, or resources. No third party may claim any right or benefit under or seek to enforce any of the terms and conditions of this Agreement.

h. Relationship of Parties. Nothing in this Agreement shall be construed to create a partnership, joint venture, or any other form of association, for tax purposes or otherwise, between Licensor and Licensee.

SCHEDULE A – License Fees

Products & Pricing

Bidding Module Annual Subscription Prices:

  • $500 per user per month / $6,000 per user, per year, paid annually at start of subscription and on renewal date

Quality Control Module upon release – Annual Subscription Prices:

  • $350 per location per month / $4,200 per location, per year, paid annually at start of subscription and on renewal date

SCHEDULE B – Training and Support

Training support for Work Wizard Software Company, LLC will contain the following. The length of the training will depend on the client’s needs. WWS will provide 2 training sessions per year and may charge an additional $500 per new user to train additional personnel. The goal of the training is to ensure the customer is comfortable with the software, understands and effectively utilizes the software. These components can vary based on the specific needs of the users.

1. Orientation / Demonstrations: An introductory session that provides an overview of the software, including its purpose, key features, and benefits. Live and/or recorded demonstrations of the software in action, showing how to use its main features. WWS (Work Wizard Software) prefers live one-on-one training sessions with users until they are comfortable with the software. WWS will work to accommodate client schedules as much as possible/reasonable.

2. Online Teams Session: Practical session where users can interact with the software under the guidance of an instructor. This is crucial for learning by doing, allowing users to experiment and apply what they’ve seen in the demonstrations.

3. Printed Guided Instruction: Step-by-step User Manual with guided instructions provided to all users.

4. Q&A Sessions: Dedicated sessions online or via email for users to ask questions and get clarifications on specific functions or problems they have encountered.

5. Support Resources / Updates / Continuing Education: Training can include sessions or materials on software updates and upgrades as they are released to ensure that users stay current with the latest versions and features.

Company: Work Wizard Software Company, LLC

Name: Chris Wright

Phone: 913-420-2818

Email: chris@workwizardsoftware.com

Signature: ___________________________

Company: ____________________________

Name: _________________________

Address: _____________________________

Phone: ______________________________

Email: ________________________________

Signature: ______________________________