The following terms apply only to the Service(s) indicated in the section title.
Compute
1. Compute Engine.
a. Additional Security. If Customer requires greater than eight static IP addresses, Google may file a SWIP report with the American Registry for Internet Numbers (ARIN). Google may log DNS lookups, as well as source and destination IP addresses, for security purposes.
b. Sustained Usage Discounting. Any credits provided to Customer in connection with sustained usage discounting have no cash value and can only be applied to offset future Compute Engine Fees. Upon termination or expiration of the Agreement, such credits will expire.
c. Google Cloud Marketplace. If Customer uses Compute Engine tools or APIs to deploy or otherwise use any software or services from Google Cloud Marketplace (or Google Cloud Launcher), then Customer’s related deployment or use will be subject to the Google Cloud Marketplace Terms of Service.
d. Sole-Tenant Nodes. Customer may select that Google provide the Compute Engine Service on physical Google host hardware dedicated to a single Project. While no other Google customer virtual machine instance will share that host hardware with Customer’s virtual machine instances, Compute Engine’s virtualization software will reside on that host hardware and continue to manage Customer’s virtual machine instances on that host hardware.
2. Compute Engine, Google Kubernetes Engine, and Container Registry Service - Docker Hub. If Customer or a Customer End User requests container(s) from the Docker Hub for its Project or Customer Application, Customer instructs Google to cache a copy of such container in the Container Registry for future use.
3. App Engine - Data Location. Customer may configure App Engine to store Customer Data in the United States or European Union, and Google will store that Customer Data at rest only in that location. The Service does not limit the locations from which Customer or Customer End Users may access Customer Data or to which they may move Customer Data. For clarity, Customer Data does not include resource identifiers, attributes, or other data labels.
4. Google Cloud VMware Engine (GCVE).
a. Customer Security Obligations. Google may not have access to Customer's VMware environment. As such, (i) Customer acknowledges that, notwithstanding Section 7.1.1 (Google's Security Measures) of the Data Processing and Security Terms, Google may not be able to encrypt personal data in Customer's VMware environment and (ii) Customer will enable vSAN encryption and take other appropriate measures to protect and maintain the security of Customer Data stored on or processed through GCVE.
b. Customer Responsibilities. Customer is solely responsible for obtaining and maintaining all licenses, rights, consents, and permissions that are required for Customer's use of any Operating Systems, software, applications, or other content that Customer uploads to or uses in connection with GCVE. For the purposes of this Section, "Operating System" means any operating system that (i) Customer uploads to, hosts on, or uses in connection with GCVE, or (ii) Customer instructs Google to pre-load onto GCVE servers.
5. BigQuery. The ODBC and JDBC drivers for BigQuery (as described here) are “Software” as defined in the Agreement and any use of them is subject to the “General Software Terms” above. These drivers may only be used with BigQuery and may not be used with any other product or service.
Storage
6. Cloud Storage - Bucket Lock. Customer will comply with applicable laws and regulations with respect to the retention of Bucket Lock Customer Data, including determining and applying the appropriate retention and hold periods and, if applicable, promptly furnishing any Bucket Lock Customer Data in a usable format. Customer is also responsible for keeping its Account in good standing during any retention and hold period. Upon deletion of a Project or Account, or termination of the Agreement, Google may delete the applicable Bucket Lock Customer Data.
a. Definitions.
“Bucket Lock” means the feature of Cloud Storage that allows Customer to set and lock a retention or hold period applicable to Customer Data in a Cloud Storage bucket.
“Bucket Lock Customer Data” means Customer Data stored in Cloud Storage with Bucket Lock activated.
Networking
7. Cloud Interconnect - Partner Interconnect. Customer will independently engage a network service provider (“Cloud Interconnect Partner”) who has agreed with Google to supply connectivity between Customer and Google under Google’s partner terms for Partner Interconnect. Customer is responsible for any charges for connectivity by the Cloud Interconnect Partner. Google is not responsible for any aspects of Partner Interconnect provided by the Cloud Interconnect Partner or any issues arising outside of Google’s network.
8. Cloud Intrusion Detection System (Cloud IDS). Notwithstanding anything to the contrary in the “Benchmarking” section of the General Service Terms of these Service Specific Terms, Customer will not, and will not allow End Users to, disclose, publish, or otherwise make publicly-available any benchmark, or performance or comparison tests that are run on Cloud IDS and that are conducted by Customer or an End User (or a third party authorized by Customer or an End User).
9. Google Cloud Armor - Managed Protection Plus
a. Generally. If a Project enrolled in Managed Protection Plus experiences a third-party denial of service attack on a protected endpoint (“Qualified Attack”) and the conditions below are met, Google will provide a credit equivalent to the Covered Fees, provided that the Covered Fees incurred exceed the Minimum Threshold. Load tests and security assessments performed by or on behalf of Customer are not Qualified Attacks.
b. Conditions. Customer must submit a request to Cloud Billing Support within 30 days after the end of the Qualified Attack. The request must include evidence of the Qualified Attack, such as logs or other telemetry indicating the timing of the attack and the Projects and resources that were attacked, and an estimate of the Covered Fees incurred. Google will reasonably determine whether credits are due and the appropriate amount.
c. Credits. Any credits provided to Customer in connection with this Section have no cash value and can only be applied to offset future Fees for the Services. These credits will expire 12 months after being issued or upon termination or expiration of the Agreement.
d. Definitions.
“Covered Fees” means any Fees incurred by Customer as a direct result of the Qualified Attack for:
i. ingress data processing for the Google Cloud Load Balancer Service;
ii. Managed Protection Plus data processing for the Google Cloud Armor Service; and
iii. network egress, including inter-region, inter-zone, internet, and carrier peering egress.
“Minimum Threshold” means the minimum amount of Covered Fees that are eligible to be credited under this Section as determined by Google from time to time and disclosed to Customer on request.
AI and Machine Learning
10. AI Building Blocks. Customer will not (either directly or intentionally via third parties) use these Services to create, train, or improve (directly or indirectly) a similar or competing product or service to the specific Service being used by Customer (and specifically covered by this section). In addition to any other available remedies, Google may immediately suspend or terminate Customer's use of these Services based on any suspected violation of these terms, and violation of these terms is deemed violation of Google's Intellectual Property Rights. Customer will provide Google with any assistance Google requests to reasonably confirm compliance with these terms. In addition to this section applying to the AI Building Blocks, this section will also apply to any AutoML-related functionality accessible in Vertex AI. These terms will survive termination or expiration of the Agreement.
11. AI Platform Training and Prediction (AITP). Customer owns the model weights that Customer trains in AITP and can export such model weights in the supported output of the AITP supported machine learning library Customer used to train them (e.g., TensorFlow, XGBoost, scikit-learn, PyTorch).
12. Celebrity Recognition (via functionality of Cloud Vision and Video Intelligence API). Customer will only use Celebrity Recognition functionality (i) with professionally filmed media content that Customer owns or has adequate consent to use with the functionality under applicable law and (ii) on individuals whose primary profession involves voluntarily being the subject of public media attention (“Celebrities”). Customer will not use this functionality for any surveillance–based purpose or on individuals who are not Celebrities.
13. AutoML Tables. Customer can export a frozen model graph and related features via the formats supported by AutoML Tables. No license to retrain or reverse engineer such model graph is granted or implied to Customer.
14. AutoML Video Edge. Customer can download a frozen model graph and TFlite model and any related Customer-provided video labels via the formats supported by AutoML Video. No license to retrain or reverse engineer such model graph or the TFLite model is granted or implied to Customer.
15. AutoML Vision Edge. Customer can download a frozen model graph and any related Customer provided image labels via the formats supported by AutoML Vision. No license to retrain or reverse engineer such model graph is granted or implied to Customer.
16. Talent Solution. Customer will not (either directly or intentionally via third parties) use the Service to create, train, or improve (directly or indirectly) a similar or competing product or service without Google's prior written permission. Customer agrees to adhere to the service limits (e.g., "queries-per-second") as defined within the Documentation.
17. AI/ML Data Location. Customer may configure the Services listed at https://cloud.google.com/terms/data-residency to store and perform machine learning processing of Customer Data by the Service in a specific Multi-Region, and Google will store the Customer Data at rest and perform machine learning processing of it by the Service only in that Multi-Region. For clarity, Customer Data does not include resource identifiers, attributes, or other data labels. These Services do not limit the locations from which Customer, Customer End Users, or Customer-selected or Google managed labeling resources may access Customer Data, or to which they may move Customer Data.
18. Cloud Translation (v1, v2, or later) and Media Translation API.
a. HTML Markup and Attribution Requirements. Customer will comply with the HTML Markup Requirements found at https://cloud.google.com/translate/markup and the attribution requirements found at https://cloud.google.com/translate/attribution.
b. Limitation. Customer will not (either directly or intentionally via third parties) (i) use this Service to create, train, or improve (directly or indirectly) a similar product or service, including any other machine translation engine, or (ii) use or retain translated text or any other data from this Service for the purpose of creating, training, or improving (directly or indirectly) a translation system, product, or service.
Security and Identity
19. Assured Workloads. Assured Workloads enables Customer to apply location and Google personnel controls in an Assured Workloads environment via the Admin Console to support Customer’s compliance requirements. Google will provide TSS (including first level TSS from persons located in the United States) for Assured Workloads in accordance with such Customer-selected controls. It is Customer's responsibility to determine whether Customer-selected Admin Console controls are adequate for Customer’s purposes. Google’s data location commitments under General Service Terms Section 1 (Data Location) apply to Assured Workloads. In addition, Assured Workloads provides Customers the ability to prevent Google persons located outside the Customer-selected Region from accessing Customer Data in an Assured Workloads environment. The Service does not limit the locations from which Customer or Customer End Users may access Customer Data or to which they may move Customer Data.
20. Access Approval. Use of Access Approval may increase support response times, and Customer will be responsible for any disruption or loss as a result of Customer denying or delaying approval via Access Approval. The SLAs do not apply to any Service disruption impacted by Customer’s use of Access Approval.
21. Cloud Identity Services. The following terms apply only to the Cloud Identity Services provided under this Agreement:
a. Customer Domain Name. Customer is responsible for obtaining and maintaining any rights necessary for use of the Customer Domain Names in connection with the Cloud Identity Services.
b. Administration of the Cloud Identity Services. Customer may specify through the Cloud Identity Services one or more Administrators who will have the rights to access Admin Account(s) and to administer the Cloud Identity Services. Customer is responsible for all activities of the Administrators and in connection with the Admin Account(s).
c. Use of Google Workspace Components. Customer’s use of the Google Workspace Components are subject to any applicable provisions of the then-current Google Workspace Service Specific Terms at https://workspace.google.com/intl/en/terms/service-terms/, which provisions are incorporated by reference into this Agreement.
d. Additional Products. Google makes optional Additional Products available to Customer and Customer End Users through the Cloud Identity Services. Customer’s use of Additional Products is subject to the Additional Product Terms.
e. Governing agreement. If Customer has agreements in force governing its use of both of the Services and Google Workspace Services, this Section 21 (Cloud Identity Services) does not apply. Customer’s applicable agreement for Google Workspace Services governs its use of the Cloud Identity Services unless such agreement terminates, then this Agreement (including this Section 21 (Cloud Identity Services)) will govern Customer’s continued use of the Cloud Identity Services under the same Admin Account.
If Customer no longer has an agreement in force governing its use of the Services, then the then-current terms at https://cloud.google.com/terms/identity will apply to Customer’s continued use of the Cloud Identity Services under the same Admin Account.
f. Definitions.
“Additional Products” means products, services and applications that are not part of the Services but that may be accessible for use in conjunction with the Services.
“Additional Product Terms” means the then-current terms at https://workspace.google.com/intl/en/terms/additional_services.html.
“Admin Account(s)” means the administrative account(s) provided to Customer by Google for the purpose of administering the Cloud Identity Services. The use of the Admin Account(s) requires a password, which Google will provide to Customer.
“Administrators” mean the Customer-designated technical personnel who administer the Services on Customer’s behalf.
“Customer Domain Names” mean the domain names owned or controlled by Customer, which will be used in connection with the Cloud Identity Services and specified in the applicable order form.
“Google Workspace Components” has the meaning given in the then-current services summary for Cloud Identity Services at https://cloud.google.com/terms/identity/user-features.
“Google Workspace Services” means the then-current services described at https://workspace.google.com/terms/user_features.html
22. Security Command Center.
a. Service Configuration. Customer acknowledges and agrees that (i) Customer must exclude individual resources by following the instructions described in the Documentation if Customer doesn’t want Security Command Center to scan Customer’s entire Organization, and (ii) Security Command Center will not detect all misconfigurations, vulnerabilities and threats in Customer’s Organization.
b. Access Control. Customer acknowledges and agrees that the Security Command Center Standard dashboard only supports granting roles at the Organization level, while Security Command Center Premium supports granting IAM roles at the Organization, Folder, or Project levels. Organization-level roles are not suitable for all use cases, particularly for sensitive applications or compliance standards that require strict access controls. Customer acknowledges and agrees that, to create fine-grained access policies, Customer must grant roles at the Folder or Project levels by following the instructions described in the Documentation.
c. Active Scanners. Customer acknowledges and agrees that active scanners may adversely affect the reliability of a Customer Application and may not be suitable for use in a production environment.
23. Firebase Authentication and Identity Platform.
a. Phone Authentication. Google temporarily stores phone numbers provided for authentication to improve spam and abuse prevention across Google services. Phone numbers are not logically isolated for a given customer's end users. Customer should obtain appropriate end-user consent before using the Firebase Authentication or Identity Platform phone number sign-in service.
b. Other Authentication Services. Use of Google Sign-In for authentication is subject to Google’s API Services: User Data Policy. Google is not responsible for any third-party sign-in service used with Firebase Authentication or Identity Platform.
c. reCAPTCHA Notice Requirement. Customer agrees to explicitly inform Customer End Users of phone authentication features that their use of reCAPTCHA is subject to the Google Privacy Policy and Terms of Use. For users in the European Union, you and your Application(s) must comply with the EU User Consent Policy. Customer acknowledges and understands that reCAPTCHA works by collecting hardware and software information, such as device and application data, and sending this data to Google for analysis. The information collected in connection with Customer End Users' use of reCAPTCHA will be used for improving reCAPTCHA and for general security purposes. It will not be used for personalized advertising by Google.
24. Web Security Scanner. Customer acknowledges that Web Security Scanner may adversely affect the reliability of a Customer Application and may not be suitable for use in a production environment. Web Security Scanner will not detect all vulnerabilities in a Customer Application.
25. reCAPTCHA Enterprise.
a. Information. reCAPTCHA Enterprise works by collecting hardware and software information, such as device and application data, and sending this data to Google for analysis. The information collected in connection with Customer's use of the reCAPTCHA Enterprise Service will be used for providing, maintaining, and improving reCAPTCHA Enterprise and for general security purposes. It will not be used for personalized advertising by Google.
b. Privacy Policy. Customer will provide and adhere to a privacy policy for its API client that clearly and accurately describes to applicable Customer End Users what user information Customer collects and how Customer uses and shares such information (including for advertising) with Google and third parties. Customer will be responsible for providing any necessary notices or consents for the collection and sharing of this data with Google. Customer and its API client(s) will comply with the EU User Consent Policy.
c. Terms. Customer agrees to explicitly inform applicable Customers End Users that Customer has implemented reCAPTCHA Enterprise on its properties and that Customer End Users' use of reCAPTCHA Enterprise is subject to the Privacy Policy and Terms of Use. reCAPTCHA Enterprise may only be used to fight spam and abuse on Customer's properties, and not for any other purposes, such as determining credit worthiness, employment eligibility, financial status, or insurability of a user.
26. Web Risk.
a. Attribution. Customer may display a warning about unsafe web resources for a particular site based on verification against Google’s list of unsafe sites, if Customer provides attribution and conspicuous notice that the reliability and accuracy of the protection cannot be guaranteed using language similar to the “Advisory Notice” subsection below.
b. Data Refresh. Customer will not treat a URL from Google’s list as an unsafe web resource, such as by showing users a warning about the site or blocking access to it, unless the applicable Customer Application has received from Google updated information (via the applicable API method) before the expiration time provided by the applicable API response or within 30 minutes if no expiration time is specified.
c. Advisory Notice. Google works to provide the most accurate and up-to-date information about unsafe web resources, but cannot guarantee that its information is comprehensive and error-free: some risky sites may not be identified, and some safe sites may be identified in error.
d. Evaluate and Submission APIs. The Evaluate API gives Customer client applications the option to evaluate the maliciousness of URLs by receiving a score instead of a binary result. The Submission API provides Customer with the ability to voluntarily send to Google URLs Customer suspects are unsafe. Google uses URLs and associated data submitted through the Evaluate API or Submission API (“Submitted URLs”) and corresponding scores to provide, maintain, protect and improve Google's products and services, including Google's list of unsafe web resources. Google may also share Submitted URLs with third parties, including other Google customers and users. Submitted URLs are not Customer Confidential Information or Customer Data.
27. BeyondCorp Enterprise
a. Chrome Browser Cloud Management. In order to use BeyondCorp Enterprise Threat and Data Protection Services:
i. Customer agrees to the online Chrome Browser Cloud Management License Agreement (available at https://cloud.google.com/terms/chrome-enterprise/chrome-browser-cloud-management) (the “CBCM Agreement”); and
ii. Customer acknowledges and agrees that Customer must enable "Chrome Enterprise Connectors" in the Chrome Browser Cloud Management section of the Admin Console.
b. Advisory Notice. Google works to provide the most accurate and up-to-date information about unsafe web pages and malware, but cannot guarantee that its information is comprehensive and error-free. Some potentially risky sites and files may not be identified, and some safe sites and files may be identified in error.
c. Threats. BeyondCorp Enterprise’s Threat and Data Protection Services (as described at https://cloud.google.com/terms/services) work by aggregating threat intelligence. BeyondCorp Enterprise analyzes (i) URLs visited by Customer’s End Users on supported browsers and proxies, to identify unsafe web pages and (ii) content of files uploaded and downloaded by Customer’s End Users to and from supported browsers and proxies, to identify malware (such unsafe web pages or malware, “Threats”). When BeyondCorp Enterprise checks for Threats, the URL or a file hash and the result of the analysis are temporarily stored in a Google global cache for performance-related purposes. Customer acknowledges and agrees that Customer URLs and file hashes that BeyondCorp Enterprise identifies as Threats are not Customer Confidential Information or Customer Data and Google may use such URLs and file hashes to provide, maintain, protect and improve Google's products and services, including Google's lists of Threats.
Migration
28. Transfer Appliance Service. In performing the Transfer Appliance Service, Google will attempt to provide Customer with the requested Transfer Appliance model, subject to availability. Google will provide technical support for the Transfer Appliance Service only as described in the Documentation. Google may use Subprocessors (as defined in the Data Processing and Security Terms) in providing the Transfer Appliance Service. The Transfer Appliance Materials are at all times owned by Google, with no transfer of title to Customer.
In case of cross-border shipments of Transfer Appliance Materials, Customer may be responsible for export clearance, Google may designate a carrier to act as Customer's agent with the relevant customs and tax authorities to import or export the Transfer Appliance Materials, and Customer will cooperate with Google and its carrier, including providing export classification information and acting as the importer or exporter of record.
While Transfer Appliance Materials are in its control, Customer is responsible for any loss or damage and will use appropriate security measures to protect them. Customer will not permit any Transfer Appliance Materials to leave the U.S. state or non-U.S. country to which they were shipped (except as directed in writing by Google or its Subprocessors).
As part of the Transfer Appliance Service, Google may temporarily move the applicable Customer Data to a staging bucket within a Google-owned project accessible to Customer and shortly after delete such Customer Data from the Transfer Appliance Materials. Completion of Customer's decompression and decryption of such Customer Data (or failure to do so within a reasonable number of days specified by Google) will constitute an instruction to Google to delete the applicable Customer Data from the staging bucket. Customer is solely responsible, under its own Project, for any virtual machine instance and destination buckets in which Customer desires to decompress and decrypt the applicable Customer Data.
Proper functioning of the Transfer Appliance Service is highly dependent on Customer's computing environment. Customer's sole remedy in connection with any unsuccessful attempt to complete the Transfer Appliance Service is for Google to use reasonable efforts to re-perform the Transfer Appliance Service.
“Transfer Appliance Materials” means the materials provided by Google or its Subprocessors in connection with the Transfer Appliance Service, including hardware and software.
Bare Metal
29. Bare Metal Solution
a. Admin Console. The Admin Console will not be available to Customer for management, monitoring, or administration of Bare Metal Solution.
b. Data Processing and Security Terms. Bare Metal Solution provides non-virtualized access to underlying infrastructure resources and, by design, has characteristics different from the other Services offered under the Agreement.
i. Amendments. The Data Processing and Security Terms are amended solely with respect to Bare Metal Solution as stated in this subsection b.
A. Google's Third Party Auditor. The definition of "Google's Third Party Auditor" is amended as follows: "Google's Third Party Auditor means a qualified and independent third party auditor appointed by Google or a Bare Metal Solution Subprocessor, whose then-current identity Google will disclose to Customer upon request."
B. Audited Services. Bare Metal Solution is not an Audited Service. With respect to Bare Metal Solution, Google or its Subprocessor will: (1) obtain (x) ISO 27001 certification and PCI DSS Attestation of Compliance (the "Compliance Certifications"); and (y) a SOC 1 Report and SOC 2 Report (the "SOC Reports") and update such Compliance Certifications and SOC Reports at least once every 12 months, and (2) provide the Compliance Certifications and SOC Reports to Customer in accordance with Section 7.5.3 (Additional Business Terms for Reviews and Audits) of the Data Processing and Security Terms. Google may add standards at any time. Google may replace a Compliance Certification or SOC Report with an equivalent or enhanced alternative.
ii. Subprocessors. Customer specifically authorizes Google to engage the entities listed at the Bare Metal Solution Subprocessors Page as of the Services Start Date ("Bare Metal Solution Subprocessors") as Subprocessors for Bare Metal Solution. Information about the Bare Metal Solution Subprocessors, including their functions and locations, is available at the Bare Metal Solution Subprocessors Page (as may be updated by Google from time to time in accordance with the Data Processing and Security Terms).
iii. Inapplicable Terms. The following terms in the Data Processing and Security Terms (or similar successor terms) are excluded with respect to Bare Metal Solution:
A. From Section 7.1.1 (Google's Security Measures): the phrase "encrypt personal data";
B. The subsections from Appendix 2 Section 1(a), titled "Server Operating Systems" and "Business Continuity";
C. The subsections from Appendix 2 Section 1(b), titled "External Attack Surface," "Intrusion Detection," and "Encryption Technologies"; and
D. From Appendix 2 Section 3(a): the sentences "Google stores data in a multi-tenant environment on Google-owned servers. Subject to any Customer instructions to the contrary (for example, in the form of a data location selection), Google replicates Customer Data between multiple geographically dispersed data centers."; or, if the Agreement authorizes the resale or supply of Google Cloud Platform under a Google Cloud partner or reseller program, the sentences "Google stores data in a multi-tenant environment on Google-owned servers. Subject to any Partner instructions to the contrary (for example, in the form of a data location selection), Google replicates Partner Data between multiple geographically dispersed data centers."
iv. Other Amendments. Other than this Section b, no terms in the Agreement that expressly amend, modify, or supplement the Data Processing and Security Terms (as then-currently available at https://cloud.google.com/terms/data-processing-terms or, for partners, at https://cloud.google.com/terms/data-processing-terms/partner) will apply to Bare Metal Solution.
v. Customer Obligations. Without limiting Google's express obligations related to Bare Metal Solution, Customer will take reasonable steps to protect and maintain the security of Customer Data and any other content stored on or processed through Bare Metal Solution.
c. Representation and Warranty. Customer represents and warrants that it has all licenses, rights, consents, and permissions that are required for Customer's and any End User's use of any Operating Systems, software, applications, and any other content that Customer or any End User uploads to or uses in connection with Bare Metal Solution.
d. Limitation of Liability. Notwithstanding anything to the contrary in the Agreement (except subject to any unlimited liabilities expressly stated in the Agreement), to the maximum extent permitted by law, each party’s total aggregate Liability for damages arising out of or relating to Bare Metal Solution is limited to the greater of (a) the Fees Customer paid for Bare Metal Solution during the 12 month period before the event giving rise to liability and (b) $25,000.
e. Disclaimer. Notwithstanding anything to the contrary in the Agreement (including the Data Processing and Security Terms), Google and its subcontractors are not responsible for any of the following in relation to Bare Metal Solution: (i) non-physical security, such as access controls, encryption, firewalls, antivirus protection, threat detection, and security scanning; (ii) logging and monitoring; (iii) non-hardware maintenance or support; (iv) data backup, including any redundancy or high-availability configuration; or (v) business continuity and disaster recovery policies or procedures. Customer is solely responsible for securing (other than physical security of Bare Metal Solution servers), logging and monitoring, maintaining and supporting, and backing up any Operating Systems, Customer Data, software, and applications Customer uses with, uploads to, or hosts on Bare Metal Solution.
f. Survival. The following subsections of these Bare Metal Solution Service Specific Terms will survive expiration or termination of the Agreement: d (Limitation of Liability); e (Disclaimer); f (Survival); and i (Definitions).
g. Ordering. Except for Bare Metal POCs (as defined below), Customer must order Bare Metal Solution via an order form mutually executed by Customer and Google.
h. Bare Metal Solution Proof of Concepts. The following additional terms apply to Bare Metal Solution proof of concepts and trials ("Bare Metal Solution POCs"):
i. Bare Metal Solution POCs are deemed "Pre-GA Offerings" and are subject to the Pre-GA Offerings Terms in the General Services Terms of these Service Specific Terms.
ii. Customer may not use Bare Metal Solution POCs in connection with any production workloads.
i. Definitions.
“Bare Metal Solution Subprocessors Page” means the URL located at: https://cloud.google.com/bare-metal/subprocessors.
“Operating Systems” means any operating systems that: (i) Customer uploads to, hosts on, or uses in connection with Bare Metal Solution; or (ii) Customer instructs Google to pre-load onto Bare Metal Solution servers.
“Services Start Date” means the start date stated in the order form, or if no date is specified, the date Google first makes Bare Metal Solution available to Customer.
Additional Definitions
“Cloud Locations Page” means https://cloud.google.com/about/locations.
“Documentation” means the then-current Google documentation made available by Google to its customers for use with the Services at https://cloud.google.com/docs/.
“Multi-Region” means a defined set of Regions.
“Organization” and “Folder” have the meanings described at https://cloud.google.com/resource-manager/docs/cloud-platform-resource-hierarchy.
“Region” means a region from which a particular Service is offered, as identified at the Cloud Locations Page.
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4