Terms of Service

This Master Subscription Agreement (“Agreement”) is entered into by and between Mezmo, Inc., a Delaware corporation with a business address at 2059 Camden Ave #297, San Jose, CA 95124 and Customer (defined below) and governs the Customer’s use of the Services (each as defined below).

Customer” means a person or entity that accepts and agrees to the terms of this Agreement as of the earlier date (“Start Date”) where such person or entity either clicks a box indicating acceptance of this Agreement or uses the Services. Mezmo reserves the right to modify or update this Agreement in its sole discretion, the effective date of such updates and/or modifications will be the earlier of: (i) 30 days from the date of such update or modification; or (ii) Customer’s continued use of the Service.

IF YOU DO NOT ACCEPT THIS AGREEMENT, YOU MAY NOT ACCESS OR USE THE SERVICES. THE SERVICES ARE INTENDED FOR THE CUSTOMER AND ITS AUTHORIZED USERS ONLY AND ARE NOT FOR USE BY CHILDREN UNDER 13 YEARS OF AGE. IF AN INDIVIDUAL IS ENTERING INTO THIS AGREEMENT ON BEHALF OF A LEGAL ENTITY, SUCH PERSON REPRESENTS AND WARRANTS THAT IT HAS THE LEGAL AUTHORITY TO BIND SUCH LEGAL ENTITY TO THIS AGREEMENT AND THIS AGREEMENT APPLIES TO SUCH ENTITY WHICH IS DEEMED THE CUSTOMER.

If Customer and Mezmo have executed a written agreement governing Customer’s access to and use of the Services as a Mezmo customer, then the terms of such signed agreement will govern and will supersede this Agreement.

1. Mezmo Services:
2. Customer Data:
3. Restrictions and Responsibilities:
Back Ups:
Disaster Recovery:
Intrusion Detection and Prevention:
Pentests & Vulnerability Scanning:
Security Incident Response:
Encryption:

Secure by Design - Application Security

Mezmo's products and capabilities have been designed to be foundationally secure.

Software Development Life Cycle (SDLC):
Framework Security Controls:
Separate Environments:

Organizational Security

Mezmo has established a security program dedicated to ensuring customers have the highest confidence in our custodianship of their data. Our security program is aligned with the SOC 2, ISO 27001:2013, HIPAA and PCI standards and is regularly audited and assessed by third parties.

Onboarding and Training:
Personnel Security:
Policies and Procedures:
Employee Screening:
Confidentiality:

Compliance