Terms and Conditions

A full copy of the Redstor terms and conditions of sale are available upon request. Please contact Redstor on the main office number to request a copy. A copy will be issued to recipients upon approval of the Redstor management team.

Service Descriptions

Online Backup

  1. The Online Backup/RBUSS hosted Service (“Service”), managed and maintained by Redstor, provides an online storage platform which enables an End User to Back up a specified Device (“Device”) to Redstor’s Service Platform (“Service Platform”). The associated software that is provided by Redstor to enable the use of the Service (“Software”) allows automated or manual backup, as well as End User, initiated data recovery.
  2. Backups can be scheduled to run unattended at a particular time or at a frequency defined by the End User. Before leaving the End User’s device, the Software shall compress the End User’s data (“Data”) and transfer the End User’s Data over a secure SSL connection to the Service Platform. A copy shall then be held at two of Redstor’s Data Centres. Data is stored in an encrypted format (256 bit AES) on the Service Platform and remains so until recovered by the End User.
  3. Only files that have been modified or added since the last backup will be identified for backup by the system. Data is transferred via any TCP-IP enabled network connection, over TCP port 443.
  4. The Software will undertake backup using advanced compression and efficiency algorithms. Changes to a file are extracted at a sub-file level so that if a document is edited, only the changed bytes of that document will be extracted and sent to the Service Platform. This process allows the Software to communicate only necessary file changes, rather than having to re-send an entire file to the Service Platform. A full copy of the most recent data is kept available for immediate recovery. At least one calendar month of backups will be kept online.
  5. The End User will install the Software on each Device and Redstor shall provide technical support to the End User as is reasonably required. The Software has a number of hardware and software requirements and Redstor shall provide details of such hardware and software requirements prior to installation. The End User shall be responsible for ensuring that the Devices meet the requirements.
  6. One set of Security Credentials (username, password and encryption key) are required for each Device, and the Security Credentials may not be shared between Devices.
  7. The backup username and password can consist of any keyboard combination between 4 and 20 characters. The encryption key can be any keyboard combination between 8 and 56 characters. The encryption key is used when the encryption algorithm encrypts files to keep data confidential. Without the encryption key, no one can access the Data.
  8. Backups shall run unattended by Redstor in accordance with the times and frequencies set by the End User. Redstor shall keep all Data available for immediate recovery by the End User on disk for at least one calendar month. Redstor will ensure that Data restores can be initiated by the End User at any time via the Software.
  9. All recoveries of Data are the responsibility of the End User and except in the situation of an Emergency Recovery, are offered online only. For a situation of emergency recovery as defined by Redstor (“Emergency Recovery”), suitable arrangements must be made to recover data from Redstor’s data centre.
  10. Redstor will undertake specific Emergency Recoveries in accordance with the Schedule of Charges or as otherwise notified by Redstor. Data can be copied locally at the data centre and shipped at cost, to a site of the End User’s choice for direct recovery. The End User shall have the option to collect Data from Redstor using their own preferred couriers. In these instances, no charge shall be made by Redstor for shipping costs.
  11. For all Emergency Recoveries, the End User must provide a Purchase Order number or written confirmation of the request for this service in advance of any local recovery being instigated and agreement to the costs incurred. Redstor will invoice the End User for the full amount following recovery whether successful or unsuccessful.
  12. The Online Backup/RBUSS Console, forming part of the Service enables the End User to monitor and control the Software and Backups centrally.
  13. Redstor shall apply within a reasonable period, any new release version or any patch created to address any bugs in the Software (“New Release”). The End User’s use of a New Release shall be governed by the provisions of the Agreement as if it were the Software originally provided.
  14. All updates to the Software are provided by Redstor and are applied automatically as long as the computer is connected to the internet.
  15. If requested by the End User, Redstor shall provide training and installation services for the End User in the use of the New Release as soon as reasonably practicable after the delivery (or the making available) of the New Release and at Redstor’s standard scale of charges from time to time in force.
  16. Following installation of the New Release, the New Release shall become the Software for the purposes of this Agreement.
  17. End User is not permitted to remove data, hardware or software components physically from any data centre owned or rented by Redstor or its partners.

 

Online Backup Plus

  1. The Online Backup Plus Hosted Service (“Service”), managed and maintained by Redstor, provides an online storage platform which enables a Customer to back up a specified device to Redstor’s Service Platform (“Service Platform”). The associated software that is provided by Redstor to enable the use of the Service (“Software”) allows automated or manual backup, as well as Customer-initiated data recovery.
  2. Backups can be scheduled to run unattended at a time or at a frequency defined by the Customer. The Software shall fully encrypt the Customer’s data (“Data”) using 128-bit AES, 256-bit AES or 448-bit Blowfish encryption and transfer the Customer’s fully encrypted data via any TCP-IP enabled network connection over TCP port 443. A copy shall then be held at two of Redstor’s Data Centres. Data is encrypted before leaving the Customer’s device in relation to which the Service is provided (“Device”) and remains so until recovered by the Customer.
  3. The Software will undertake backup using advanced compression and efficiency algorithms. Changes to a file are extracted at the block level so that if a document is edited, only the unique blocks of that document will be extracted and sent to the Service Platform. The Software performs recoveries on the block level and will try to find each required data block first in its original location and only when it is not found there, will retrieve it from the Service Platform. Only files that have been modified or added since the last Backup and any that is part of a new selection, i.e. data that may have previously been explicitly excluded or not selected will be identified for Backup by the Software.
  4. The Customer will install the Software on each Device in relation to which Redstor will provide the Service and Redstor shall provide support and assistance to the Customer as is reasonably required. The Software has a number of hardware and software requirements and Redstor shall provide details of such hardware and software requirements prior to installation. The Customer shall be responsible for ensuring that the Devices meet the requirements.
  5. One set of Security Credentials (account name, password and encryption key) is required for each Device, and the Security Credentials may not be shared between Devices. Redstor shall provide the account name and password for each Device on the Operational Service Date, and such other details as are necessary to allow the Customer to use the Service.
  6. Security credentials include an encryption key. The key can be a combination of alphanumeric characters of the Customer’s choosing and is used when the encryption algorithm encrypts files to keep Data confidential. Without the key, no one can access the Data. The maximum length is 30, and the minimum is 6. Keep your encryption key safe. If the key is lost Data is unrecoverable. Not even the developers of the software can access your Data without that key.
  7. Backups shall run unattended by Redstor from the Operational Service Date in accordance with the times and frequencies set by the Customer. Redstor shall keep all Data available for immediate recovery by the Customer on disk for the agreed retention period. Redstor will ensure that Data restores can be initiated by the Customer at any time via the Software.
  8. All recoveries of Data are the responsibility of the Customer and except in the situation of an Emergency, Recovery is offered online only. For a situation of emergency recovery as defined by Redstor (“Emergency Recovery”), suitable arrangements must be made to recover data from Redstor’s data centre.
  9. Redstor will undertake specific Emergency Recoveries in accordance with the Schedule of Charges or as otherwise notified by Redstor. Data can be copied locally at the data centre and shipped at cost, to a site of the Customers’ choice for direct recovery. Data will be copied to a local disk or similar device and couriered depending on the severity of the need for data recovery. The Customer shall have the option to collect Data from Redstor using their own preferred couriers, in these instances, no charge shall be made by Redstor for shipping costs.
  10. A service option exists where a dedicated Recovery Device will be hosted in a secondary data centre which contains all, or Customer specified part of, the Data. Where an emergency recovery is initiated and where this service option exists, the Dedicated Recovery Device will be shipped to the site for direct recovery. Costs for the hosting of a dedicated Recovery Device and costs for specific Emergency Recoveries are set out in the Schedule of Charges or as otherwise notified by Redstor.
  11. For all Emergency Recoveries, the Customer must provide a Purchase Order number or written confirmation of the request for this service in advance of any local recovery being instigated and agreement to the costs incurred. Redstor will invoice the Customer for the full amount following recovery whether successful or unsuccessful.
  12. The Online Backup Plus Console, forming part of the Service enables the Customer to centrally monitor and control the Software and Backups.
  13. All updates to the Software are provided by Redstor and are applied automatically as long as the computer is connected to the internet.
  14. Redstor shall apply within a reasonable period, any new release version or any patch created to address any bugs in the Software (“New Release”). All such New Releases, versions or patches along with the release notes, planned install date and time is to be notified prior by Redstor to the Customer in writing at no cost to the Customer. The Customer’s use of a New Release shall be governed by the provisions of the Agreement as if it were the Software originally provided.
  15. If requested by the Customer, Redstor shall provide training and installation services for the Customer in the use of the New Release as soon as reasonably practicable after the delivery (or the making available) of the New Release and at Redstor’s standard scale of charges from time to time in force.
  16. Following installation of the New Release, the New Release shall become the Software for the purposes of this Agreement.
  17. The customer is not permitted to physically remove data, hardware or software components from any data centre owned or rented by Redstor or its partners.

 

Safeguarding

  1. The Safeguarding hosted Service (“Service”), managed and maintained by Redstor provides an online, Service Platform (“Service Platform”), which enables an End User to safeguard their pupils online.
  2. Associated software that is provided to enable the use of the Service (“Software”), analyses all text and images appearing on screen. The End User will install the Software on each Device in relation to which Service is provided (“Device”).
  3. Text contained within a website, email or computer program is analysed and inappropriate content is identified by checking all text against a library of keywords and phrases. When the system detects a word or phrase which suggests a concern, it takes a screen capture as evidence of what was taking place at that moment in time, along with detailed information about the time, date, source and user.
  4. Images are also analysed to assess how closely they resemble pornographic content, based on their shape, colour and composition.
  5. All screen captures are sent to the Safeguarding Platform where they are stored securely. If the Device is not connected to the or Internet at that time, the captures are still made by the Software and stored locally on the Device until a connection to the Safeguarding Platform can be re-established.
  6. End User or Reseller staff review the captures stored on the Safeguarding Platform by logging into the Safeguarding Management console via a web browser. Staff can be alerted immediately to serious or high-risk incidents by setting an email alert.
  7. Additional or bespoke Keywords, phrases and applications can be added to the library by an administrator.
  8. The Software fully encrypts the captures using 128-bit AES encryption and transfer the fully encrypted captures via any TCP-IP enabled network connection over TCP ports 80 and 87 TCP. Port 87 UDP must be open to inbound and outbound traffic on any internal and external firewalls. All devices to be monitored must have internet access.
  9. Captures are encrypted before leaving the End User device and remains encrypted on the Safeguarding Platform. Data cannot be altered or permanently deleted.
  10. Redstor shall provide support, training and assistance to the Reseller as is reasonably required. The Software has a number of hardware and software requirements and Redstor shall provide details of such hardware and software requirements to the Reseller prior to installation. The Reseller shall be responsible for ensuring that the Devices meet the requirements.
  11. The Management console, forming part of the service is a web-based console used to view the data captured and stored by the system. A username and password are provided by Redstor for each End User to allow them to access their own information using the console.
  12. The Reseller is provided with the client software as a customised MSI file for each End User. This incorporates a DNS Name to ensure each Device being monitored communicates correctly with the Safeguarding Platform.
  13. All updates to the Software are provided by Redstor and are applied automatically, as long as the computer is connected to the internet. This includes any updates to the library of keywords and phrases contained within the system.
  14. Redstor shall apply within a reasonable period, any new release version or any patch created to address any bugs in the Software (“New Release”). The End User’s use of a New Release shall be governed by the provisions of the Agreement as if it were the Software originally provided.
  15. If requested by the End User or Reseller, Redstor shall provide training and installation services for the End User in the use of the New Release as soon as reasonably practicable after the delivery (or the making available) of the New Release and at Redstor’s standard scale of charges from time to time in force.
  16. Following installation of the New Release, the New Release shall become the Software for the purposes of this Agreement.
  17. Neither Reseller nor End User is permitted to physically remove data, hardware or software components from any data centre owned or rented by Redstor or its partners.