“Service” shall mean the on-line “Software as a Service” business application known as Xano or similar or successor product, which Xano licenses to Customers.
Xano will make the Services available 99.95% of the time, excluding any Excused Downtime. In a given calendar month, we calculate “Service Availability” as follows:
“Excused Downtime” means the length of time the Services are unavailable due to:
A. Scheduled Maintenance; B. Emergency Maintenance; C. Beta Services D. Force Majeure events; and E. the actions or omissions of you, your Authorized Users, or any third-party acting on your behalf or at your direction, including any unauthorized use of the Services, breach of the Agreement or Acceptable Use Policy, or any use or configuration of the Services that exceeds Xano’s recommendations or advertised limits.
“Scheduled Maintenance” includes any maintenance performed during the following windows or for which we provide reasonable notice or coordination with you in advance of the maintenance.
“Emergency Maintenance” means any maintenance performed outside the Scheduled Maintenance windows without advance notice where such maintenance is reasonably and urgently required to protect the integrity, availability, or security of any online systems.
You are entitled to a credit of 5% of the applicable monthly Fees for each full hour of downtime in excess of the Service Availability targets. (For example, you will receive a 5% credit for between 1 and 60 minutes of downtime in excess of the Service Availability targets, a 10% credit for between 61 and 120 minutes, etc.) In order to receive a credit, you must contact Support within 30 days of the event giving rise to the credit. Credits are based on our monitoring, shall not exceed 100% of the applicable monthly Fees, may not be carried over or aggregated, are forfeited at the expiration or termination of the Agreement, and will not be paid or provided as a refund.
A. Advice regarding the setup and configuration of Xano when used by you. B. Facilities for bug tracking, escalation of problems for priority attention, and access to community-supported FAQs and Forums relating to Xano. C. Assistance with troubleshooting to diagnose and fix errors in Xano. D. Access to Xano documentation relating to Xano, including authorization to make copies of that documentation for internal use as specified in the Agreement.
A. Assistance in the development or debugging of your system or tools outside of Xano, including other services and support tools. B. Information and assistance on technical issues related to the installation, administration, and use of enabling external technologies such as external databases, APIs or servers. C. Assistance with the installation and configuration of hardware including, but not limited to computers, hard disks, networks, and printers.
Xano or its authorized resellers reserve the right to subcontract any or all of the work to be performed under these Support Terms, and Xano retains responsibility for any work so subcontracted.
You shall provide commercially reasonable cooperation and full information to Xano or its authorized resellers with respect to the furnishing of Support Services under this Agreement.
Xano or its authorized reseller shall exercise commercially reasonable efforts to meet the response times specified below for free basic support (unless you have upgraded to a premium support level through a separate agreement), following receipt of a Support issue properly submitted by you:
*From initial contact
Additional support options can be configured through a custom support package agreement.
Including but not limited to, the following parameters may be configured:
- Incident submission procedure
- Incident response time from initial contact
- Incident evaluation procedure
- Incident escalation procedures
Xano employs ISO 27001:2013 is the only auditable international standard that defines requirements of a information security management system (ISMS). An ISMS is a set of policies, procedures, processes and systems that manage information risks, such as cyber attacks, hacks, data leaks or theft.