Legal Information and Resources

Welcome to Teleopti Legal. There are some legal documents that are key to Teleopti, our customers, and those visiting our website. To make it easy to find the information you’re looking for, we’ve pulled them together in this legal hub so you can find the right documents for you.

The agreements found here are the most up to date version. The information contained on this website is subject to change at any time, without prior notice. Any changes that are made will not apply retroactively and will not apply to disputes or events occurring before the change is published.

Contact information

General Legal legal-(_sm3Remove)-_-(_a)-_teleopti-(d_)-_com
Privacy privacy-(_sm3Remove)-_-(_a)-_teleopti-(d_)-_com


CUSTOMERS

Important agreements and statements for those using Teleopti WFM Cloud.
 The Master Subscription Agreement is the main agreement.

This agreement has certain add on provisions:

Service Specification

Support Offering

Security Overview

Professional Services Terms

Service Privacy Policy

These documents form a part of the Master Subscription Agreement. You will find links to the documents within the Master Subscription Agreements but for your convenience we have also put them here for Your easy access.

The Customer Data Processing Agreement applies to You if you are domiciled within the EEA area and/or are conducting business within this area.
 Contractual Clauses Teleopti AB Data Processor or
 Contractual Clauses Teleopti Inc. Data Processor supplement this agreement. 

For your convenience, the Customer Data Processing Agreement is already signed by us, ready to be signed by you and sent to privacy-(_sm3Remove)-_-(_a)-_teleopti-(d_)-_com

The upcoming European Union General Data Protection Regulation (EU GDPR) impacts many Teleopti customers. This GDPR Compliance page describes the effects of GDPR on your use of Teleopti WFM.

 

 

 


EVERYONE

Here we have some terms about use and privacy for those visiting our website

Privacy Policy

Cookie Policy

Report a security vulnerability