What are cookies?
Cookies are small data files that are placed on your computer or mobile device when you visit a website. Cookies are widely used by website owners in order to make their websites work, or to work more efficiently, as well as to provide reporting information.
Cookies set by the website owner (in this case, SonicWall) are called “first party cookies”. Cookies set by parties other than the website owner are called “third party cookies”. Third party cookies enable third party features or functionality to be provided on or through the website (e.g. like advertising, interactive content and analytics). The parties that set these third-party cookies can recognise your computer both when it visits the website in question and also when it visits certain other websites.
We use first party and third-party cookies for several reasons. Some cookies are required for technical reasons in order for our Websites to operate, and we refer to these as “essential” or “strictly necessary” cookies. Other cookies also enable us to track and target the interests of our users to enhance the experience on our Websites. Third parties serve cookies through our Websites for advertising, analytics and other purposes. This is described in more detail below.
The specific types of first and third party cookies served through our Websites and the purposes they perform are described in the table below (please note that the specific cookies served may vary depending on the specific Website you visit):
|Types of cookie||Who serves these cookies||How to refuse|
|Essential website cookies: These cookies are strictly necessary to provide you with services available through our Websites and to use some of its features, such as access to secure areas.||SonicWall||Because these cookies are strictly necessary to deliver the Websites to you, you cannot refuse them.|
You can block or delete them by changing your browser settings however, as described below under the heading "How can I control cookies?".
|Performance and functionality cookies: These cookies are used to enhance the performance and functionality of our Websites but are non-essential to their use. However, without these cookies, certain functionality may become unavailable.||Clicky|
|To refuse these cookies, please follow the instructions below under the heading "How can I control cookies?"|
|Analytics and customisation cookies: These cookies collect information that is used either in aggregate form to help us understand how our Websites are being used or how effective are marketing campaigns are, or to help us customise our Websites for you.||Google Analytics - Universal Analytics|
|To refuse these cookies, please follow the instructions below under the heading "How can I control cookies?"|
|Advertising cookies: These cookies are used to make advertising messages more relevant to you. They perform functions like preventing the same ad from continuously reappearing, ensuring that ads are properly displayed for advertisers, and in some cases selecting advertisements that are based on your interests.||Google Ads Conversion Tracking|
Google Floodlight Counter
|To refuse these cookies, please follow the instructions below under the heading "How can I control cookies?"|
Targeted Display Advertising
What about other tracking technologies, like web beacons?
Cookies are not the only way to recognise or track visitors to a website. We may use other, similar technologies from time to time, like web beacons (sometimes called “tracking pixels” or “clear gifs”). These are tiny graphics files that contain a unique identifier that enable us to recognise when someone has visited our Websites.
The information we collect through web beacons may include some limited Personal Information, and web beacons allow us to recognize users by accessing our cookies. We may also combine the information that we collect through web beacons with other information we have collected from you. Web beacons help us measure the effectiveness of our Website and our advertising in various ways. For example, web beacons may count the number of individuals who visit our Website from a particular advertisement or who make a purchase from our Website after viewing a particular advertisement or they may tell us when a web page is viewed and provide a description of the page where the web beacon is placed. Web beacons may also measure the effectiveness of our email campaigns, by counting the number of individuals who open or act upon an email message, determining when an email message is opened and determining how many times an email message is forwarded.
We prohibit web beacons on our Website from being used by third parties to access Personal Information. We may allow Business Partners to compile individual information or aggregated statistics from the use of web beacons on our Website to determine the effectiveness of online marketing and to develop statistics on how often clicking on an advertisement results in a purchase or other action on the advertiser’s site. “Business Partners” means subcontractors, vendors or other entities with whom we have ongoing business relationships to provide products, services or information, as well as our distributors and resellers. Aggregate information is anonymous and may include demographic and usage information. No Personal Information about you is shared with Business Partners for this research.
You can make some web beacons unusable by rejecting cookies in your web browser.
Do you serve targeted advertising?
Third parties may serve cookies on your computer or mobile device to serve advertising through our Websites. These companies may use information about your visits to this and other websites in order to provide relevant advertisements about goods and services that you may be interested in. They may also employ technology that is used to measure the effectiveness of advertisements. This can be accomplished by their using cookies or web beacons to collect information about your visits to this and other sites in order to provide relevant advertisements about goods and services of potential interest to you. The information collected through this process does not enable us or them to identify your name, contact details or other personally identifying details unless you choose to provide these.
“Do Not Track” Signals
How can I control cookies?
You have the right to decide whether to accept or reject cookies. You can exercise your cookie preferences by clicking on the appropriate opt-out links provided in the cookie table above.
In addition, most advertising networks offer you a way to opt out of targeted advertising. If you would like to find out more information, please visit http://www.aboutads.info/choices/ or http://www.youronlinechoices.com.
How often will you update this Cookie Statement?
The date at the top of this Cookie Statement indicates when it was last updated.
Where can I get further information?
Last updated: January 12, 2022
© 2022 SonicWall Inc.
ALL RIGHTS RESERVED
The materials and information contained on the Site, including, but not limited to, the text, graphics, photographs, artwork, icons, images, logos, audio, video, downloads, data and compilations, belong to SonicWall or the original creator and are protected by applicable law, including, but not limited to, United States and international copyright law and regulations.
For any questions or requests to reproduce or redistribute our materials, please contact the Legal Department.
End User Product Agreements
Unless a product specific end user agreement is posted here or otherwise provided with the product(s) or service(s), the provisions of the sonicwall end user general product agreement will apply to the download, installation, or use of sonicwall products and services. if you do not agree to the provisions of the applicable end user agreement, do not download or use the product or service.
SonicWall Regulatory Compliance
SonicWall Inc. strives to comply with laws and regulations in the countries our products are shipped to and used in. SonicWall products are designed and tested to meet many standards for Product Safety, Electromagnetic Compatibility, Radio Frequency (WLAN/RLAN) and other requirements when used for their intended purpose. In some cases, SonicWall Inc. will be the responsible party certificate holder and in other cases, it could be a SonicWall distributor or contracted agent.
Please contact SonicWall Sales with specific questions about your country.
General Regulatory documents that apply to all Products
- EU and UK Authorized Representatives
- REACH (Registration, Evaluation, Authorization and Restriction of Chemicals, EC 1907/2006) – European Union
- WEEE Directive 2002/96/EC – European Union
- IATA Battery Declaration for Transportation
- SERI (Safety Environmental Regulatory Information)
- ISO 9001 and ISO 14001 certificates can be requested from SonicWall Sales
Product Specific Regulatory Documentation
Regulatory documentation listed below is specific to each product and can be obtained from the support page for that specific product at the SonicWall Support site. For questions, please contact Regulatory@SonicWall.com
- ECHA SCIP IUCLID
- European Declaration of Conformity/CE DoC
- Regulatory and Environmental Data Sheets
- External Power Supply (EPS) Ecodesign Data (EPS efficiency data)
SonicWall European Union CE DoC by Product
ECHA SCIP IUCLID
Files to support importers to obtain IUCLID IDs and register SonicWall products for import.
|*.xlsx files||*.pdf files|
Environmental Data Sheets (EDS)
For questions, please contact Regulatory@SonicWall.com
SonicWall Environmental Data Sheets by Product
SonicWall Export Control
SonicWall® products are subject to Export Control laws of the United States and other applicable jurisdictions. Many SonicWall products are subject to export restrictions due to their use of encryption technology. SonicWall uses this portion of its website to communicate Export Control information about its products. This information may be required for license and license exception compliance, shipping documentation, record keeping, or post-shipment reporting.
Due to the dynamic nature of the export control regulations, as well as differences in local country laws, SonicWall makes this material available for informational purposes only. It may not reflect the most current legal developments, and SonicWall does not represent, warrant or guarantee that it is complete, accurate or up-to-date. This information is subject to change without notice. The materials on this site are not intended to constitute legal advice or substitute for consultation with your own. You should not act (or refrain from acting) based upon information in this site without obtaining professional advice regarding your particular facts and circumstances.
Prohibited End Users
Absent U.S. government authorization, ALL SonicWall products are prohibited for export and re-export to:
- The Crimea region of Ukraine, Cuba, Iran, North Korea, and Syria, or any entity or national thereof.
- Parties listed on any U.S. Government Denied Party/Person List, such as the Denied Persons List and the Entity List maintained by the US Department of Commerce, Bureau of Industry and Security (BIS), and the Specially Designated Nationals List maintained by the US Department of the Treasury, Office of Foreign Assets Control (OFAC).
- Any customer, whom you know or have reason to know, is involved in the design, development, manufacture or production of nuclear technology, nuclear, biological or chemical weapons, missiles, or other restricted end uses under US law.
Export Control Classification Numbers
Below is a list of the ECCNs and related information for the current releases of SonicWall products.
|All ACCESSORIES, ACCESSORY PACKS AND PERIPHERALS||EAR99||N/A|
|ANALYZER/ANALYZER SOFTWARE - ALL MODELS||5D002||ENC (b)(1)|
|ANTI-SPAM DESKTOP||5D002||ENC (b)(1)|
|APP FIREWALL||5D002||ENC (b)(1)|
|CAPTURE CLIENT||5D002||ENC (b)(1)|
|CAPTURE SECURITY APPLIANCE (CSA)||5A002||ENC (b)(1)|
|CENTRAL MANAGEMENT SERVER (CMS)||EAR99||N/A|
|CLIENT CONNECT - REMOTE DEVICE||5D992||NLR Mass Market(b)(1)|
|CLIENT CONNECT - TUNNEL||5D002||ENC (b)(1)|
|CLOUD APP SECURITY (CAS) - LOCAL SOFTWARE (WHEN CLOUD HOSTED SaaS, SEE "SERVICES" MATRIX)||5D002||ENC (b)(1)|
|CLOUD EDGE SECURE ACCESS (FORMERLY CLOUD EDGE ZTNA)||5D002||ENC (b)(1)|
|CLOUD MANAGEMENT AND ANALYTICS||5D002||ENC (b)(1)|
|COMPREHENSIVE ANTI-SPAM||5D002||ENC (b)(1)|
|CONTENT FILTER CLIENT||5D002||ENC (b)(1)|
|EMAIL SECURITY APPLIANCE SERIES - 3300, 4300, 5000, 5050, 7000, 7050, 9000, ES8300||5A002||ENC (b)(1)|
|EMAIL SECURITY VIRTUAL APPLIANCE||5D002||ENC (b)(1)|
|GLOBAL MANAGEMENT SYSTEM (GMS)||EAR99||N/A|
|GLOBAL SECURITY CLIENT||5D002||ENC (b)(1)|
|GLOBAL VPN CLIENT||5D002||ENC (b)(1)|
|LOCAL CFS RESPONDER VIRTUAL APPLIANCE||5D002||ENC (b)(1)|
|MOBILE CONNECT - ALL VERSIONS||5D992||NLR Mass Market(b)(1)|
|NETEXTENDER VPN CLIENT||5D002||ENC (b)(1)|
|NETWORK SECURITY MANAGER (NSM) 2.0||5D002||ENC (b)(1)|
|NSA E SERIES - E5500, E6500, E8500, E8510||5A002||ENC (b)(2)|
|NSA SERIES - 3500, 4500, 5000, 4600, 2600, 2650, 3600, 3650, 4600, 4650, 5600, 5650, 6600, 6650, 2700, 3700, 4700, 6700||5A002||ENC (b)(2)|
|NSsp PRODUCT FAMILY - 13700, 15700||5A002||ENC (b)(2)|
|NSv - LIMITED USER SERIES||5D992||NLR Mass Market(b)(1)|
|NSv - LIMITED USER SERIES - SONICOSv||5D992||NLR Mass Market(b)(1)|
|NSv 10/25/50/100||5E992||NLR Mass Market(b)(1)|
|NSv 200/270/300/400/470/800/870/1600||5E002||ENC (b)(2)|
|NSv ENTERPRISE SERIES||5D002||ENC (b)(2)|
|ON-PREM ANALYTICS||5D002||ENC (b)(1)|
|SCRUTINIZER SOFTWARE||5D002||ENC (b)(1)|
|SMA - SRA ECLASS VIRTUAL APPLIANCE||5D002||ENC (b)(2)|
|SMA - SRA EX6000, EX7000, EX9000||5A002||ENC (b)(2)|
|SMA 100 SERIES - HARDWARE||5A992||NLR Mass Market(b)(1)|
|SMA 100 SERIES - OS SOFTWARE||5D992||NLR Mass Market(b)(1)|
|SMA 100 SERIES - VIRTUAL||5D992||NLR Mass Market(b)(1)|
|SMA 1000 SERIES - HARDWARE||5A002||ENC (b)(2)|
|SMA 1000 SERIES - OS SOFTWARE||5D002||ENC (b)(2)|
|SMA 1000 SERIES - VIRTUAL||5D002||ENC (b)(2)|
|SMA 200, 400, 210, 410||5A992||NLR Mass Market(b)(1)|
|SMA 500v||5D992||NLR Mass Market(b)(1)|
|SMA 6200, 7200, 6210, 7210||5A002||ENC (b)(2)|
|SMA 8200v||5D002||ENC (b)(2)|
|SMA VIRTUAL APPLIANCE||5D002||ENC (b)(2)|
|SONICOS - OPERATING SYSTEM||5D002||ENC (b)(2)|
|SONICOS FOR NSA PRODUCT FAMILY||5D002||ENC (b)(2)|
|SONICOS FOR SUPERMASSIVE||5D002||ENC (b)(2)|
|SONICOS FOR TZ PRODUCT FAMILY||5D992||NLR Mass Market(b)(1)|
|SONICOSv OPERATING SYSTEM (ENTERPRISE)||5D002||ENC (b)(1)|
|SONICOSv OPERATING SYSTEM (LIMITED NODES)||5D992||NLR Mass Market(b)(1)|
|SONICPOINT - ALL MODELS||5A002||ENC (b)(3)|
|SONICWAVE ACCESS POINTS||5A992||NLR Mass Market(b)(1)|
|SRA 1600||5A002||ENC (b)(3)|
|SRA 4600||5A002||ENC (b)(2)|
|SRA EX6000, EX7000, EX9000||5A002||ENC (b)(2)|
|SRA VIRTUAL APPLIANCE||5D002||ENC (b)(1)|
|SSL-VPN 200||5A002||ENC (b)(3)|
|SUPERMASSIVE E SERIES - E10200, E10400, E10800||5A002||ENC (b)(2)|
|SUPERMASSIVE NSSP 10000 SERIES - 12200, 12400, 12800, 15700, 14700||5A002||ENC (b)(2)|
|SUPERMASSIVE NSSP 9000 SERIES - 9200, 9250, 9400. 9450. 9600. 9650. 9800||5A002||ENC (b)(2)|
|SWS - SONICWALL SWITCH SERIES||5A991|
|TZ GEN 6 SERIES INCLUDING WIRELESS - 300, 300P, 300W, 350, 350W, 400, 400W, 500, 500W, 600, 600P||5A992||NLR Mass Market(b)(1)|
|TZ GEN 6 SOHO 250||5A992||NLR Mass Market(b)(1)|
|TZ GEN7 SONICOS||5D992||NLR Mass Market(b)(1)|
|TZ270,370,470(W),570(W, P),670||5A992||NLR Mass Market(b)(1)|
|UMA EM5000||5A002||ENC (b)(3)|
|WEB APPLICATION FIREWALL (WAF) PRODUCT FAMILY||5D002||ENC (b)(1)|
|WXA 2000, 4000||5A002||ENC (b)(1)|
|WXA 500 SOFTWARE||5D002||ENC (b)(1)|
|WXA 5000 VIRTUAL APPLIANCE||5D002||ENC (b)(1)|
|WXA 6000 SOFTWARE SUBSCRIPTION||5D002||ENC (b)(1)|
At SonicWall, we are proud of our inventions and take appropriate steps to protect our intellectual property. The following is a list of SonicWall patents. This list may not be all inclusive, and other inventions not listed here may be protected by one or more patents.
|1528743||Method and Apparatus for Datastream Analysis and Blocking||United Kingdom|
|1528743||Method and Apparatus for Datastream Analysis and Blocking||European Patent|
|2466425||Computer Networks||United Kingdom|
|2503128||Computer Networks||United Kingdom|
|6408336||Distributed Administration Of Access To Information||United States of America|
|6845374||System And Method For Adaptive Text Recommendation||United States of America|
|7010807||System and Method for Network Virus Protection||United States of America|
|7158986||Method And System Providing User With Personalized Recommendations By Electronic-Mail Based Upon The Determined Interests Of The User Pertain To The Theme And Concepts Of The Categorized Document||United States of America|
|7272625||Generalized Policy Server||United States of America|
|7299261||Message Classification Using A Summary||United States of America|
|7310815||Method And Apparatus For Datastream Analysis And Blocking||United States of America|
|7343624||Managing Infectious Messages As Identified By An Attachment||United States of America|
|7353380||Method And Apparatus For Providing Secure Streaming Data Transmission Facilities Using Unreliable Protocols||United States of America|
|7360075||Method And Apparatus For Providing Secure Streaming Data Transmission Facilities Using Unreliable Protocols||United States of America|
|7406502||Method And System For Classifying A Message Based On Canonical Equivalent Of Acceptable Items Included In The Message||United States of America|
|7412539||Method And Apparatus For Resource Locator Identifier Rewrite||United States of America|
|7451487||Fraudulent Message Detection||United States of America|
|7480264||Centralized Wireless LAN Load Balancing||United States of America|
|7509520||Network Interface Device Having Bypass Capability||United States of America|
|7539726||Message Testing||United States of America|
|7546348||Message Handling With Selective User Participation||United States of America|
|7562122||Message Classification Using Allowed Items||United States of America|
|7570765||Method And An Apparatus To Perform Secure Real-Time Transport Protocol-On-The-Fly||United States of America|
|7580919||Query Interface To Policy Server||United States of America|
|7600257||Method and Apparatus to Perform Multiple Packet Payloads Analysis||United States of America|
|7653698||Identifying E-Mail Messages From Allowed Senders||United States of America|
|7665140||Fradulent Message Detection||United States of America|
|7698388||Secure Access To Remote Resources Over A Network||United States of America|
|7738380||Reassembly-Free Rewriting Of Out-Of-Order Data Payload||United States of America|
|7739253||Link-Based Content Ratings Of Pages||United States of America|
|7752336||Method And Apparatus For Resource Locator Identifier Rewrite||United States of America|
|7769766||Method And An Apparatus To Store Content Rating Information||United States of America|
|7770222||Creating An Interrogation Manifest Request||United States of America|
|7779469||Provisioning An Operating Environment Of A Remote Computer||United States of America|
|7792846||Training Procedure For N-Gram-Based Statistical Content Classification||United States of America|
|7792850||On-The-Fly Pattern Recognition With Configurable Bounds||United States of America|
|7814545||Message Classification Using Classifiers||United States of America|
|7821926||Generalized Policy Server||United States of America|
|7823196||Method And An Apparatus To Perform Dynamic Secure Re-Routing Of Data Flows For Public Services||United States of America|
|7827590||Controlling Access To A Set Of Resources In A Network||United States of America|
|7835361||Method and Apparatus for Identifying Data Patterns in a File||United States of America|
|7870380||Providing Secure Connections For Data Transmission||United States of America|
|7882189||Using Distinguishing Properties To Classify Messages||United States of America|
|7908330||Message Auditing||United States of America|
|7912856||Adaptive Encryption||United States of America|
|7917522||Training Procedure for N-Gram-Based Statistical Content Classificatoin||United States of America|
|7921204||Message Testing Based On A Determinate Message Classification And Minimized Resource Consumption||United States of America|
|7925707||Declassifying Of Suspicious Messages||United States of America|
|7962560||Updating Hierarchical Whitelists||United States of America|
|7984495||Method And An Apparatus To Identify Security Association Of Virtual Private Network Tunnels||United States of America|
|7990974||Packet Processing On A Multi-Core Processor||United States of America|
|7991723||Data Pattern Analysis Using Optimized Deterministic Finite Automation||United States of America|
|7996415||On-The-Fly Pattern Recognition With Configurable Bounds||United States of America|
|7996894||MAC Address Modification Of Otherwise Locally Bridged Client Devices To Provide Security||United States of America|
|8005983||Rule-Based Routing To Resources Through A Network||United States of America|
|8015169||Method And An Apparatus To Request Web Pages And Content Rating Information Thereof||United States of America|
|8074259||Authentication Mark-Up Data Of Multiple Local Area Networks||United States of America|
|8086441||Efficient String Search||United States of America|
|8090827||Secure Access To Remote Resources Over A Network||United States of America|
|8108477||Message Classification Using Legitimate Contact Points||United States of America|
|8112486||Signature Generation Using Message Summaries||United States of America|
|8122508||Analyzing Traffic Patterns To Detect Infectious Messages||United States of America|
|8136143||Generalized Policy Server||United States of America|
|8150875||Method And An Apparatus To Store Information Regarding Web Pages||United States of America|
|8189608||Wireless Extender Secure Discovery And Provisioning||United States of America|
|8191134||Lockless Distributed IPSEC Processing||United States of America|
|8191148||Classifying A Message Based On Fraud Indicators||United States of America|
|8255973||Provisioning Remote Computers for Accessing Resources||United States of America|
|8266215||Using Distinguishing Properties To Classify Messages||United States of America|
|8271603||Diminishing False Positive Classifications Of Unsolicited Electronic-Mail||United States of America|
|8272057||Method And Apparatus for Identifying Data Patterns in a File||United States of America|
|8276202||Cloud-Based Gateway Security Scanning||United States of America|
|8285804||Declassifying Of Suspicious Messages||United States of America|
|8296382||Efficient use of resources in message classification||United States of America|
|8301769||Classifying an operating environment of a remote computer||United States of America|
|8321939||Method and Apparatus to Perform Multiple Packet Payloads Analysis||United States of America|
|8370374||On-The-Fly Pattern Recognition With Configurable Bounds||United States of America|
|8396926||Message Challenge Response||United States of America|
|8429301||Method And Apparatus For Resource Locator Identifier Rewrite||United States of America|
|8438254||Providing Distributed Cache Services||United States of America|
|8463861||Message Classification Using Legitimate Contact Points||United States of America|
|8484301||Using Distinguishing Properties To Classify Messages||United States of America|
|8522347||Real-Time Network Updates For Malicious Content||United States of America|
|8533457||Method And Apparatus For Providing Secure Streaming Data Transmission Facilities Using Unreliable Protocols||United States of America|
|8572249||Network Appliance For Balancing Load And Platform Services||United States of America|
|8577669||Efficient String Search||United States of America|
|8578484||Identification Of Content||United States of America|
|8578485||Identification Of Content By Metadata||United States of America|
|8578489||Method and Apparatus to Perform Multiple Packet Payloads Analysis||United States of America|
|8584238||Method and Apparatus for Identifying Data Patterns in a File||United States of America|
|8590032||Rule-Based Routing To Resources Through A Network||United States of America|
|8594109||Wireless Extender Secure Discovery And Provisioning||United States of America|
|8594131||Packet Processing On A Multi-Core Processor||United States of America|
|8601550||Remote Access To Resources Over A Network||United States of America|
|8612560||Message Classification Using Domain Name And IP Address Extraction||United States of America|
|8613041||Creating Rules For Routing Resource Access Requests||United States of America|
|8615796||Managing Resource Allocations||United States of America|
|8626689||Data Pattern Analysis Using Optimized Deterministic Finite Automation||United States of America|
|8645389||System And Method For Adaptive Text Recommendation||United States of America|
|8661158||Smart Tunneling To Resources In A Network||United States of America|
|8661545||Classifying A Message Based On Fraud Indicators||United States of America|
|8671447||Net-Based Email Filtering||United States of America|
|8676759||Continuous Data Backup Using Real Time Delta Storage||United States of America|
|8688794||Signature Generation Using Message Summaries||United States of America|
|8693782||Image Based Spam Blocking||United States of America|
|8700775||Routing Of Communications To A Platform Service||United States of America|
|8713110||Identification Of Protected Content In E-Mail Messages||United States of America|
|8718318||Fingerprint Development In Image Based Spam Blocking||United States of America|
|8732256||Message Challenge Response||United States of America|
|8769678||Cloud-Based Gateway Security Scanning||United States of America|
|8775164||Efficient String Search||United States of America|
|8776210||Statistical Message Classifier||United States of America|
|8813221||Reassembly-Free Deep Packet Inspection On Multi-Core Hardware||United States of America|
|8826388||Mobile Device Identify Factor For Access Control Policies||United States of America|
|8850566||Time Zero Detection of Infectious Messages||United States of America|
|8856239||Message Classification Based On Likelihood Of Spoofing||United States of America|
|8863286||Notification For Reassembly-Free File Scanning||United States of America|
|8886727||Message Distribution Control||United States of America|
|8892587||On-The-Fly Pattern Recognition With Configurable Bounds||United States of America|
|8908706||Wireless Extender Secure Discovery And Provisioning||United States of America|
|8910279||Reputation Based Threat Protection||United States of America|
|8914410||Query Interface To Policy Server||United States of America|
|8918870||Identification of Content by Metadata||United States of America|
|8924484||Active E-Mail Filter With Challenge-Response||United States of America|
|8935311||Generalized Policy Server||United States of America|
|8935348||Message Classification Using Legitimate Contact Points||United States of America|
|8955106||Managing Infectious Forwarded Messages||United States of America|
|8955136||Analyzing Traffic Patterns to Detect Infectious Messages||United States of America|
|8959384||Routing of Communications to One or More Processors Performing One or More Services According to a Load Balancing Function||United States of America|
|8977696||Declassifying Of Suspicious Messages||United States of America|
|8984268||Encrypted Record Transmission||United States of America|
|8984289||Classifying A Message Based On Fraud Indicators||United States of America|
|8990312||Active E-Mail Filter With Challenge-Response||United States of America|
|9015199||Method And An Apparatus To Request Web Pages And Content Rating Information Thereof||United States of America|
|9021039||Message Challenge Response||United States of America|
|9065848||Method and Apparatus to Perform Multiple Packet Payloads Analysis||United States of America|
|9069845||Personalized Electronic-Mail Delivery||United States of America|
|9071993||Centralized Wireless LAN Load Balancing||United States of America|
|9075804||On-The-Fly Pattern Recognition With Configurable Bounds||United States of America|
|9077671||Real-Time Network Updates For Malicious Content||United States of America|
|9077674||Identification of Content||United States of America|
|9092761||PROBABILITY BASED WHITELIST||United States of America|
|9094365||Method And Apparatus For Resource Locator Identifier Rewrite||United States of America|
|9098330||Packet Processing On A Multi-Core Processor||United States of America|
|9100335||Processing A Message Based On A Boundary Ip Address And Decay Variable||United States of America|
|9100427||Method and Apparatus to Perform Multiple Packet Payloads Analysis||United States of America|
|9119109||Method And Apparatus To Perform Multi-Connection Traffic Analysis And Management||United States of America|
|9152704||System And Method For Adaptive Text Recommendation||United States of America|
|9154489||Query Interface To Policy Server||United States of America|
|9154511||Time Zero Detection of Infectious Messages||United States of America|
|9189516||Using Distinguishing Properties To Classify Messages||United States of America|
|9197538||Rule-Based Routing to Resources Through a Network||United States of America|
|9203785||Net-Based Email Filtering||United States of America|
|9203853||Cloud-Based Gateway Security Scanning||United States of America|
|9215198||Efficient Use Of Resources In Message Classification||United States of America|
|9215241||Reputation Based Threat Protection||United States of America|
|9231767||IDENTIFICATION OF CONTENT BY METADATA||United States of America|
|9237129||A Method to Enable Deep Packet Inspection (DPI) in OpenFlow-based Software Defined Network (SDN)||United States of America|
|9237163||MANAGING INFECTIOUS FORWARDED MESSAGES||United States of America|
|9245013||MESSAGE RECOMMENDATION USING WORD ISOLATION AND CLUSTERING||United States of America|
|9268656||Network Appliance For Balancing Load And Platform Services||United States of America|
|9275047||Method And Apparatus For Multimedia Content Filtering||United States of America|
|9276920||Tunneling Using Encryption||United States of America|
|9294461||Virtual Private Network Dead Peer Detection||United States of America|
|9300670||Remote Access to Resources Over a Network||United States of America|
|9313158||Message Challenge Response||United States of America|
|9325649||Signature Generation Using Message Summaries||United States of America|
|9325724||Time Zero Classification Of Messages||United States of America|
|9331992||Access Control||United States of America|
|9386046||Statistical Message Classifier||United States of America|
|448387/137470||GENERALIZED POLICY SERVER||Taiwan|
|464812/145016||Query interface to policy server||Taiwan|
|D435044||Computer Network Appliance||United States of America|
|I378704||METHOD AND APPARATUS FOR DATASTREAM ANALYSIS AND BLOCKING||Taiwan|
Job Applicant Privacy Notice
When you apply to a job with SonicWall, Inc. (“SonicWall”) and/or on this SonicWall site, the personal data contained in your application will be collected by, which is located at 1033 McCarthy Blvd., Milpitas, CA 95035 USA and can be contacted by emailing firstname.lastname@example.org. SonicWall’s data protection officer may be contacted at email@example.com.
This Notice sets out the personal data that we collect and process about you during the application and recruitment process, the purposes of the processing and the rights that you have in connection with it.
If you have any comments or questions about this Notice, please contact us at the contact details provided below.
Types of personal data we collect
During the application and recruitment process as the SonicWall, we may collect and/or process the following types of personal data about you (without limitation):
- identification and contact details (such as your name, address, telephone/email address and other contact information),
- educational and employment background (such as academic/professional qualifications, job qualifications, education, CV/résumé, transcripts and employment references),
- job application information (such as the roles for which you are applying, your job application and related documentation/communications, cover letters, information from interviews and phone screenings, compensation/benefits requests, relocation information),
- national identifiers (such as national ID/passport, immigration status, work authorizations, visas, social security numbers), and
- previous applications/roles (information relating to previous applications you have made to the SonicWall and/or any previous employment history at the SonicWall).
As a general rule, we do not request any information that reveals your racial or ethnic origin, religious, political or philosophical beliefs, trade union membership, genetic or biometric information, or information about your health/sex life or sexual orientation during the recruitment process, unless authorized by law or where necessary to comply with applicable laws.
Purposes for processing of personal data
SonicWall collects the personal data you provide through the application process for the purposes of managing the SonicWall’s recruitment related activities, for organizational planning purposes globally, as well as to comply with applicable laws and regulation. Consequently, the SonicWall may use your personal data in relation to:
- set up and conducting interviews and tests for applicants
- evaluate and assessing the results thereto, and as is otherwise needed in the recruitment and hiring processes.
- communicate with you during the recruitment process,
- verify your information and carrying our reference checks or background checks (where applicable),
- put in place necessary arrangements for your future employment, and
- to generally manage and improve our recruitment and hiring processes.
We may also collect information from third parties, for example, to obtain work references or to carry out background or criminal record checks (where permissible and in accordance with applicable laws).
If you are accepted for a job at the SonicWall, the information collected during the recruitment process will form part of your ongoing employment record.
If you are from the European Union, the legal basis for the processing of your personal data is the legitimate interests of the SonicWall. Such processing is legally permissible under Art. 6(1)(f) of Regulation (EU) 2016/679 (General Data Protection Regulation) as necessary for the purposes of the legitimate interests pursued by the SonicWall, which are the solicitation, evaluation, and selection of applicants for employment.
Who we share your personal data with
Transfers to other group companies
The SonicWall does not disclose your personal data to unauthorized third parties. However, as a global corporation consisting of multiple affiliated companies in various countries, the SonicWall has international sites and the SonicWall uses resources located throughout the world. Therefore, the SonicWall may from time to time, and in accordance with the purposes set out in this Privacy Notice share your personal data with our other affiliate companies.
Transfers to third party service providers
The SonicWall may from time to time also use third parties to act on the SonicWall’s behalf. We do so on a “need to know basis” and in accordance with applicable data privacy law. For example, some personal data will be available to our employee benefit plans service providers and third party companies who provide us with services such as payroll support services, background checking services or relocation support services. These service providers may change over time but we will always seek to ensure that any third parties who handle your personal data will do so in a manner consistent with this Notice and in accordance with applicable law.
Transfers to other third parties
We may also disclose personal data to other third parties on other lawful grounds, including:
- with your consent,
- to comply with our legal obligations, including where necessary to abide by law, regulation or contract, or to respond to a court order, administrative or judicial process, including, but not limited to, a subpoena or search warrant,
- in response to lawful requests by public authorities (including for national security or law enforcement purposes),
- as necessary to establish, exercise or defend against potential, threatened or actual litigation,
- where necessary to protect the vital interests of another person, and/or
- in connection with the sale, assignment or other transfer of all or part of our business.
Transfers of personal data abroad
Your personal data will be shared with Greenhouse Software, Inc., a cloud services provider located in the United States of America and engaged by SonicWall to help manage its recruitment and hiring process on SonicWall’s behalf. Accordingly, if you are located outside of the United States, your personal data will be transferred to the United States once you submit it through this site. Because the European Union Commission has determined that United States data privacy laws do not ensure an adequate level of protection for personal data collected from EU data subjects, the transfer will be subject to appropriate additional safeguards under the standard contractual clauses. You can obtain a copy of the standard contractual clauses by contacting us at firstname.lastname@example.org.
We retain personal information we collect from you only as long as is necessary to carry out the purposes described in this Notice or to comply with applicable legal, tax or accounting requirements.
If you are not successful, your personal data will be retained by SonicWall as long as SonicWall determines it is necessary to evaluate your application for employment. Candidate information is kept for two years.
Your data privacy rights
To the extent provided by the law of your jurisdiction, you may have the right to:
- access certain personal information we maintain about you and obtain a copy of that information,
- update or correct inaccuracies in that information,
- restrict processing or object to our use of your personal information
- block or delete your personal information from our database; and
- to data portability.
In addition, if you are a resident of the European Union, you may have the right to object to processing of your personal information, ask us to restrict processing of your personal information or to request portability of your personal information. You can exercise these rights by contacting us using the contact details provided below.
Similarly, if we have collected and process your personal information with your consent, then you can withdraw your consent at any time. Withdrawing your consent will not affect the lawfulness of any processing we conducted prior to your withdrawal, nor will it affect processing of your personal information conducted in reliance on lawful processing grounds other than consent.
You have the right to complain to your local data protection authority about our collection and use of your personal information. For more information, please contact your data protection authority. Contact details for data protection authorities in the European Economic Area, Switzerland and certain non-European countries, are available here.
To exercise these rights, please contact email@example.com and we will consider your request in accordance with applicable data protection laws. To help protect your privacy and maintain security, we may take steps to verify your identity before granting you access to the information.
Changes and Contact details
We may update this Notice from time to time in response to changing legal, technical or business developments. When we update this Notice, we will take appropriate measures to inform you, consistent with the significance of the changes we make. We will obtain your consent to any material changes if and where this is required by applicable data protection laws. You can see when this Notice was last updated by checking the “last updated” date displayed at the top of this Notice.
For the purposes of European data protection laws, the data controller of your personal data is the entity to which you are applying for a job.
If you have any questions or requests relating to your personal data, you can reach our data protection officer at firstname.lastname@example.org.
This is a partial list of trademarks owned by SonicWall Inc., its affiliates and/or its subsidiaries. Omission from this list does not constitute a waiver of any rights that SonicWall, its affiliates or subsidiaries may have established in product, feature, term or design.
SonicWall’s trademarks should be marked with the “ ® ” symbol and be accompanied by the attribution statement: “XYZ is a trademark of SonicWall Inc.”
All trademarks should only be used as adjectives and never as nouns. Use of any SonicWall trademarks, including the SonicWall logo, may not be used without prior, written permission from SonicWall. Third-party usage of the SonicWall logo is limited to authorized users and only in accordance with SonicWall Logo guidelines provided under the authorization.
Any questions concerning the use of these trademarks or any other SonicWall names, marks or logos should be directed to the Legal Department.
Participants in the SonicWall SecureFirst Partner Program should follow the terms of the license provided as part of such program.
- Real Time Deep Memory Inspection (Pending)
- ReAssembly-Free Deep Packet Inspection
- RTDMI (Pending)
- SonicWall GMS
- SonicWall Real Time Deep Memory Inspection (Pending)
- SonicWall Viewpoint
This Privacy Statement is applicable to the SonicWall.com website (“this Website,” “we”, “our” or “us”) and our products and services. If you live in the European Economic Area, the controller responsible for your information is SonicWall International Limited, an Irish registered company who can be contacted at City Gate Park, Mahon, Co. Cork and if you live anywhere else, the company responsible for your information is SonicWall, Inc. which is headquartered in California. This Privacy Statement does not apply to the websites of our Business Partners or to the websites of any other third parties, even if links to their websites are on our website. We recommend that you review the privacy statements of the other parties with which you interact.
This Privacy Statement governs information we collect from you when you use our products and services or this Website.
For purposes of this Privacy Statement, “Business Partners” means subcontractors, vendors or other entities with whom we have ongoing business relationships to provide products, services or information, as well as our distributors and resellers. “Personal Information” means information relating to individuals who can be identified or who are identifiable, directly from the information in question, such as your name, telephone number, address and email address; or who can be indirectly identified from that information in combination with other information.
We recommend that you read this Privacy Statement in full to ensure you are fully informed. However, if you only want to access a particular section of this Privacy Statement, then you can click on the relevant link below to jump to that section.
- INFORMATION WE COLLECT
- COOKIES AND WEB BEACONS
INFORMATION WE COLLECT
Information you may provide us
We may ask you to provide Personal Information when you:
- Use this Website;
- Register our products or services or for an account;
- Use our products or services as specified in our documentation;
- Download software or update;
- Contact Us, including for sales or technical support;
- Participate in a marketing/sales promotion or an online survey;
- Subscribe to our newsletters, promotional emails or other materials;
- Request information about our products, quotes, downloads or white papers;
- Apply for credit or financing;
- Register or attend a webinar or other event;
- Participate in programs we may offer from time to time; or
- Participate in a forum or chat room.
Personal Information we collect from you can include your email address, name, address, billing information and telephone number. We may also collect your business or company information, interests, preferences, and geographic location. If you choose to purchase certain products from our Website, we may also collect a taxpayer identification number and credit card information for you or your company. Forms that you choose to complete will indicate whether information requested is mandatory or voluntary.
If you choose to provide us with a third party’s Personal Information (such as the person’s name, email, and phone number), you represent that you have the third party’s permission to do so. For example, you might forward marketing material to a friend or send us a job referral.
Information we collect automatically
We may collect information about your visits to this Website, including the pages you view, the links and advertisements you click, search terms you enter, and other actions you take in connection with this Website. We may also collect certain information when you visit this Website or third-party websites, such as your Internet Protocol (IP) address, browser type and language, access times, the Uniform Resource Locator (URL) of the website that referred you to our website and to which URL you browse away from our sites if you click on a link on our sites. We may also collect information when you open email messages from us or click on links within those email messages.
Information we collect from third parties
We may combine the information we collect as a result of your interactions with us with information obtained through other sources within our affiliated and subsidiary companies for various reasons including to offer you a more consistent and personalized experience in your interactions with us. We may also supplement the information we collect with information obtained from other sources.
The types of information we collect from third parties include details about individuals and companies. We use this information to maintain and improve the accuracy of the records we hold about you. We also obtain lists from third parties about individuals and companies that may be interested in our products. Such information may include, without limitation, your name, business email address, business address, job title, company name and telephone number.
How We Use Personal Information
We use your Personal Information to:
- Deliver products, services, training, support, and other offers or carry out the transactions you have requested;
- Send communications to you, such as your transaction status (for example, order confirmations), information about products and services available from our portfolio and from our affiliated and subsidiary companies, event announcements, important product notices including those announcing changes to our terms or policies, information about particular programs in which you have chosen to participate, promotional offers and surveys;
- Advertise and market our products and services which may include delivering targeted advertisements on this Website and other sites;
- Administer, customize, personalize, analyze and improve our products, services (including the content and advertisements on this Website), technologies, communications and relationship with you;
- Enforce our conditions of sale, website terms and/or separate contracts (if applicable) with you;
- Prevent fraud and other prohibited or illegal activities;
- Protect the security or integrity of this Website, our business, or our products or services; or
- Otherwise, as disclosed to you at the point of collection or as required or permitted by law.
Legal basis for processing Personal Information (EEA visitors only)
If you are a visitor from the European Economic Area, our legal basis for collecting and using the Personal Information described above will depend on the Personal Information concerned and the specific context in which we collect it.
However, we will normally collect Personal Information from you only (i) where we need the Personal Information to perform a contract with you, (ii) where the processing is in our legitimate interests and not overridden by your rights, or (iii) where we have your consent to do so. In some cases, we may also have a legal obligation to collect Personal Information from you or may otherwise need the Personal Information to protect your vital interests or those of another person.
If we ask you to provide Personal Information to comply with a legal requirement or to perform a contract with you, we will make this clear at the relevant time and advise you whether the provision of your Personal Information is mandatory or not (as well as of the possible consequences if you do not provide your Personal Information).
If we collect and use your Personal Information in reliance on our legitimate interests (or those of any third party). This interest will normally be to support the products you obtained from us and communicating with you as necessary to provide our services to you and for our legitimate commercial interest, for instance, when responding to your queries, improving our platform, undertaking marketing, or for the purposes of detecting or preventing illegal activities. We may have other legitimate interests, and we will make clear to you at the relevant time what those legitimate interests are.
If you have questions about or need further information concerning the legal basis on which we collect and use your Personal Information, please contact us using the contact details provided under the “Contact Us” heading below.
Disclosing Personal Information
We may share Personal Information with our affiliated and subsidiary companies, Business Partners, or third party suppliers. We will do this in order to carry out transactions you request, to make our business more responsive to your needs, to provide you with information about our products and services, for research and analysis or for data processing and storage.
We may also disclose Personal Information in connection with legal orders from law enforcement or other government bodies; as required by law or regulation; to protect our rights as well as those of our affiliated and subsidiary companies, our customers, the public, or others; to combat fraud or criminal activity; or with your consent.
In addition, we may share Personal Information with Business Partners that help us or our affiliated and subsidiary companies customize, analyze and/or improve our communications or business relationship with you. Such Business Partners may include payment processors to bill you for services or email service providers to send out emails on our behalf. These communications may include requests relating to our products or services. We will only share Personal Information with Business Partners who share our commitment to protecting your Personal Information. Except as described above, we will not disclose Personal Information to third parties for their own marketing purposes unless you have provided consent.
We may share information with a potential or actual purchaser of all or part of the companies or products comprising our portfolio, including our affiliated and subsidiary companies.
We may anonymize information so that it does not identify you and share that and other non-Personal Information with third parties for any purpose.
Selecting Your Communications Preferences and Opting Out of Marketing
You may change your name and contact information by logging into the appropriate website location and making alterations. You may choose to receive or not receive marketing communications from us by indicating your preferences. If you would prefer not to receive future marketing communications, or wish to change or modify information previously provided or delete inaccuracies, please contact us at hello@SonicWall.com. Upon receipt of your request, your information will be updated as soon as possible, but no later than ten (10) days after our receipt of your request. Even if you opt out of receiving marketing communications, we may still communicate with you in connection with security and privacy issues, servicing your account, fulfilling your request, or administering any promotion or any program in which you may have elected to participate. We may attempt to notify you electronically by posting a notice on our websites, by sending an email, or otherwise contacting you.
Collection and Use of Children’s Personal Information
We take children’s privacy seriously. We do not knowingly collect Personal Information from children under the age of 13 through this Website. If you are under 13 years of age, please do not submit any Personal Information through this Website without the express consent and participation of a parent or guardian.
Cookies and Web Beacons
How We Secure Personal Information
We are committed to protecting the security of Personal Information. We use a a variety of physical, administrative, and technical safeguards designed to help protect Personal Information from unauthorized access, use and disclosure. When you provide us with sensitive Personal Information (such as financial information) we encrypt that information via SSL. While we strive to protect your Personal Information, we cannot ensure or guarantee that the Personal Information or private communications you transmit to us will always remain confidential, and you do so at your own risk. If you have any questions regarding security, you can contact us at webmaster@SonicWall.com.
Social Media Features
This Website offers publicly accessible blogs or community forums. You should be aware that any information you provide in these areas may be read, collected, and used by others who access them. To request removal of your Personal Information from our blog or community forum, contact us at webmaster@SonicWall.com. In some cases, we may not be able to remove your Personal Information, in which case we will let you know if we are unable to do so and why.
Links to Third-Party Websites and Services
This Website may contain links to third-party sites. We cannot control and are not responsible for the privacy practices of such third-party sites. We encourage users to be aware when they leave this Website, and to read the privacy statements of each website they visit. This Privacy Statement applies only to this Website.
International data transfers
Your Personal Information may be transferred to the United States or other countries, and processed in, countries other than the country in which you are resident. These countries may have data protection laws that are different to the laws of your country (and, in some cases, may not be as protective).
Specifically, our Website servers are located in the United States and other countries , and our group companies and third-party service providers and partners operate around the world. This means that when we collect your Personal Information, we may process it in any of these countries.
However, we have taken appropriate safeguards to require that your Personal Information will remain protected in accordance with this Privacy Statement. These include implementing the European Commission’s Standard Contractual Clauses for transfers of Personal Information between our group companies, which require all group companies to protect Personal Information they process from the EEA in accordance with European Union data protection law. If you have any questions about our international data transfers or would like to get a copy of our Standard Contractual Clauses, then contact us using the details provided under the “Contact Us” heading below.
We retain Personal Information we collect from you where we have an ongoing legitimate business need to do so (for example, to provide you with a service you have requested, to comply with applicable legal, tax or accounting requirements, or to resolve disputes).
When we have no ongoing legitimate business need to process your Personal Information, we will either delete or anonymise it or, if this is not possible (for example, because your Personal Information has been stored in backup archives), then we will securely store your Personal Information and isolate it from any further processing until deletion is possible.
Your data protection rights
If you are located in the European Economic Area, you have the following data protection rights:
- If you wish to access, correct, update or request deletion of your Personal Information, you can do so at any time by contacting us using the contact details provided under the “Contact Us” heading below.
- In addition, you can object to processing of your Personal Information, ask us to restrict processing of your Personal Information or request portability of your Personal Information. Again, you can exercise these rights by contacting us using the contact details provided under the “Contact Us” heading below.
- Similarly, if we have collected and process your Personal Information on the basis of your consent, then you can withdraw your consent at any time. Withdrawing your consent will not affect the lawfulness of any processing we conducted prior to your withdrawal, nor will it affect processing of your Personal Information conducted in reliance on lawful processing grounds other than consent.
- You have the right to complain to a data protection authority about our collection and use of your Personal Information. For more information, please contact your local data protection authority.
We respond to all requests we receive from individuals wishing to exercise their data protection rights in accordance with applicable data protection laws.
Effective Date and Notification of Changes to our Privacy Statement
This Privacy Statement is effective as of March 2021. We reserve the right to change this Privacy Statement at any time. If we materially change this Privacy Statement, we will either notify you by email (sent to the e-mail address specified in your account) or post a prominent notice on this Website. Changes are effective as of the date we post them on the Privacy Statement page of this Website. We encourage you to periodically review this Privacy Statement.
If you have questions or concerns regarding this Privacy Statement, please contact our Data Privacy Officer at dataprivacy@SonicWall.com or via postal mail at SonicWall Inc., 1033 McCarthy Blvd, Milpitas, CA 95035. If you wish to cancel your account or request that we no longer use your information to provide you services, contact us at webmaster@SonicWall.com.
Last updated: January 12, 2022
Purchase Order Terms and Conditions
The following terms and conditions, together with such terms as are set forth in the Purchase Order Form (“Form”), with such plans, specifications or other documents as are incorporated by reference, as amended in any subsequent authorized writing from Buyer, shall constitute the entire contract (the “Purchase Order”) between SonicWall Inc. and its subsidiaries (“Buyer”) and Supplier. If bid documents, performance specifications, technical product descriptions or other similar descriptive materials submitted by Supplier in connection with the Purchase Order, or Supplier’s proposal, have been incorporated by reference, these shall not be deemed to supersede any contrary requirements of Buyer, but to the extent that such materials are not inconsistent with Buyer’s requirements, they shall constitute a part of the basis of this agreement. If this Purchase Order is construed as an offer, this offer expressly limits acceptance to the terms of this offer and notice of objection to any different or additional terms in any response to this offer is hereby given. If this Purchase Order is construed as an acceptance of an offer, this acceptance is expressly conditioned upon the offeror’s assent to any different or additional terms contained or referenced in this Purchase Order. If this Purchase Order is construed as a confirmation of an existing contract, the parties agree that this confirmation states the exclusive terms of any contract between the parties. This Purchase Order shall be deemed to have been accepted by the Supplier upon receipt by the Buyer of any writing, including a writing transmitted by fax or other means of electronic transmission, indicating acceptance, or by any of the following: (i) shipment of the goods or any portion thereof, (ii) commencement of any work on site or (iii) performance of any services hereunder.
2. Electronic/Facsimile Transmission
If this Purchase Order is transmitted by fax or by other means of electronic transmission, such transmission shall have the legal significance of a duly executed original delivered to the Supplier, but only if the Transmit Terminal Identification on the Form includes the notation “SonicWall Inc.”
Discount terms are as set forth in the Form. If no terms are specified, the net amount shall be payable within 60 days after the later of (i) delivery and acceptance of goods or other performance conforming with the terms of this Purchase Order and (ii) receipt of accurate invoicing (note: inaccurate invoices received from supplier will be returned unpaid). Except as otherwise provided in the Purchase Order, the price includes all applicable taxes and duties. Unless expressly otherwise provided in the Form, Buyer shall not be liable for any shipping, handling, fuel surcharges or similar fees.
If delivery or completion dates cannot be met, Supplier shall inform Buyer immediately. Such notice shall not, however, constitute a change to the delivery or completion terms of this Purchase Order unless Buyer modifies this Purchase Order in writing. If any item is not received or if any element of the work is not completed by the date specified, the Buyer, at Buyer’s option and without prior notice to Supplier, may either approve a revised date or may cancel this Purchase Order and may obtain such goods or work elsewhere and in either event the Supplier shall be liable to the Buyer for any resulting loss incurred by the Buyer. Supplier’s sole remedy for a delay caused by Buyer shall be an extension in the time for Supplier’s performance equal to the duration of Buyer’s delay. Supplier shall not be liable for damages resulting from Supplier’s failure to deliver or complete, or for delays in delivery or completion, caused solely by strikes not caused by or within the control of Supplier, lock-outs not caused by or within the control of Supplier, fires, war or acts of God. TIMING OF DELIVERY AND/OR PERFORMANCE OF THE WORK IS OF THE ESSENCE OF THIS PURCHASE ORDER.
5. Improper Performance and Disputes
In addition to other remedies provided by law, Buyer reserves the right to reject any goods or to revoke any previous acceptance and to cancel all or any part of the Purchase Order if Supplier fails to deliver all or any part of the goods or perform any of the work in accordance with the terms and conditions of this Purchase Order. Acceptance of any part of the Purchase Order shall not bind the Buyer to accept any future shipments or work, nor deprive it of the right to return goods already accepted. At Buyer’s option, if Buyer so elects in its sole discretion with regard to any particular dispute, any dispute arising in connection with this Purchase Order shall be resolved by arbitration in California in accordance with the rules of the American Arbitration Association; and all disputes shall otherwise be resolved in and only in the Court of Orange County, CA as the exclusive judicial forum. BUYER AND SELLER WAIVE THEIR RIGHT TO A JURY TRIAL WITH REGARD TO ANY DISPUTE ARISING IN CONNECTION WITH THIS PURCHASE ORDER.
Supplier expressly warrants all (i) goods delivered under this Purchase Order to be new and free from defects in material and workmanship and to be of the quality, size and dimensions ordered and (ii) work performed under this Purchase Order to be in conformity with all plans, specifications and other data incorporated as part of this Purchase Order. Notwithstanding any limitation of warranty, Supplier further represents and warrants that the supply, quality and fitness for the purpose of the goods or services will not be impaired, disrupted or interrupted in whole or in part by the occurrence of any leap year. These express warranties shall not be waived by reason of acceptance or payment by the Buyer. This Purchase Order incorporates by reference all terms of the Uniform Commercial Code as adopted in the state of California (the “UCC”) providing any protection to Buyer for goods, including but not limited to all warranty protection (express or implied) and all of Buyer’s remedies under the UCC. All goods and work shall also be subject to any stricter warranties specified in the Purchase Order or in other materials incorporated by reference.
7. Risk of Loss
Unless the Purchase Order expressly states otherwise, all goods shall be shipped FOB: the “Ship to” location designated in the Form. Risk of loss shall not pass to Buyer until goods called for in this Purchase Order actually have been received and accepted by the Buyer at the destination specified herein. Supplier assumes full responsibility for packing, crating, marking, transportation and liability for loss and/or damage even if Buyer has agreed to pay freight, express or other transportation charges.
8. Indemnity and Hold Harmless
From and after the date of this Purchase Order, the Supplier agrees to indemnify, defend and hold harmless the Buyer, its affiliates and subsidiaries and each of their employees, officers, directors and agents (“Indemnified Party”) from any and all claims and liabilities, regardless of by whom such claim or liability may be asserted, for personal injury (including death), or loss or damage to property, or otherwise that may result directly or indirectly from the use, possession or ownership of the goods or from the services provided by Supplier pursuant to this Purchase Order.
With regard to Supplier’s obligation to defend, the Buyer shall have the right to select the legal counsel whom Supplier shall provide to defend any Indemnified Party, subject to Supplier’s approval of the qualifications of such legal counsel and the reasonableness of counsel’s hourly rates as compared to the rates of attorneys with similar experience and qualifications in the relevant area of legal expertise and in the jurisdiction where the claim will be adjudicated. If the Buyer elects, in its sole discretion, to retain separate legal counsel, in addition to or in lieu of the counsel to be provided by Supplier, then all costs and expenses incurred by the Buyer for such separate counsel shall be borne by the Buyer and the Supplier shall reasonably cooperate with the Buyer and its separate legal counsel in the investigation and defense of any such claim or action. Supplier shall not settle or compromise any claim or action giving rise to Claims in a manner that imposes any restrictions or obligations on Buyer without Buyer’s prior written consent. If the Buyer elects to require that Supplier defend a Claim pursuant to this paragraph, and Supplier fails or declines to assume the defense of such Claim within thirty (30) days after notice thereof, the Buyer may assume the defense of such Claim for the account and at the risk of Supplier, and any liabilities related thereto shall be conclusively deemed a liability of Supplier. The indemnification rights of the Indemnified Parties contained herein are in addition to all other rights which such Indemnified Party may have at law or in equity or otherwise.
Neither party shall have any right to assign this Purchase Order or any benefits arising from this Purchase Order without prior written consent of the other and, unless otherwise agreed upon in writing, the rights of any assignee shall be subject to all set-offs, counterclaims, and other comparable rights arising hereunder. Notwithstanding the foregoing, Buyer shall have the right to assign this Purchase Order or any benefits arising from this Purchase Order, without the need to obtain consent, to an affiliate or subsidiary of Supplier or to a successor following a merger, acquisition, asset sale or change of control. Supplier shall not, except in the case of raw materials, castings, forgings or rough welded structures, or standard commercial goods, or except as otherwise agreed in writing by the Buyer, delegate or subcontract the work on any item of material or service to be delivered or performed under this Purchase Order.
In connection with the Purchase Order, Supplier, at its own cost and expense, shall obtain and maintain in force during the term of this Purchase Order, the following insurance coverage:
- A policy of workers’ compensation insurance, in amounts required by law, covering all officers and employees of Supplier who are in any way engaged in or connected with the Purchase Order, and employer’s liability insurance in an amount of not less than Five Hundred Thousand Dollars ($500,000). Supplier shall require its agents, sub-suppliers and subcontractors, who are in any way engaged in or connected with the Purchase Order to maintain the same insurance as required herein of Supplier.
- A policy of commercial general liability insurance with broad form property damage endorsement, personal injury and products completed operations coverage, affording protection in an amount of not less than Two Million Dollars ($2,000,000) per incident and in the aggregate, with respect to personal injury, death, or damage to property.
- If this Purchase Order contemplates professional services, a policy of professional liability insurance, including errors and omissions, affording protection of not less than One Million Dollars ($1,000,000) per incident and One Million Dollars ($1,000,000) in the aggregate.
- A policy of comprehensive automobile liability insurance covering the operation of all motor vehicles used by Supplier or its agents in connection with this Purchase Order, affording protection in an amount of not less than One Million Dollars ($1,000,000) combined single limit with respect to personal injury, death, or damage to property.
All of these insurance policies shall be issued by insurance companies with an AM Best rating of “A” or higher and a financial strength rating of VII or higher, or equivalent ratings provided by a disinterested, generally recognized rating agency, which companies shall be licensed or permitted to conduct business. The commercial general liability policy shall name SonicWall Inc. as an additional insured, and shall be written as primary coverage and not contributing with or in excess of any coverage that the Buyer may carry. Upon request, Supplier shall furnish to Buyer a current certificate of insurance for each of the policies required above. Insurance coverage(s) provided under this Purchase Order shall not limit or restrict in any way the liability of Supplier arising under or in connection with this Purchase Order. Such insurance shall not be canceled or terminated without ten (10) days prior written notice of any cancellation or termination.
11. Examination of Records
The Supplier agrees that Buyer, or any of their duly authorized representatives, shall have access to and the right to examine any pertinent books, documents, papers and records of the Supplier involving transactions related to this Purchase Order to the extent necessary to verify the nature and extent of costs incurred under this Purchase Order until the expiration of two (2) years after final payment under this Purchase Order. The preceding sentences shall not apply if this Purchase Order does not involve a sum in excess of One Thousand Dollars ($1,000).
12. Compliance with Laws and Regulations
The Supplier agrees to comply with all applicable federal, state, and local laws and regulations.
13. Termination Without Cause
Buyer, in its sole discretion and without cause, may terminate this Purchase Order, in whole or in part, at any time without incurring liability to Supplier for lost profits, or any other costs or damages, other than the proportionate value of the purchase price for work completed on site or goods delivered. Payment due shall be a percentage of the purchase price equal to the percentage of the work completed and/or any unit prices in the purchase price specified for goods delivered. Supplier’s warranties, and Supplier’s liability for defective or non-conforming work or goods, shall survive termination and remain in full force and effect.
14. Confidentiality and Privacy Requirements
The parties agree to keep all information and/or data received or obtained from the other party confidential and not to disclose such information to any third party.
The parties hereby incorporate the requirements of 41 C.F.R. 60-1.4 (a) (7), 60-250.5 and 60-741.5, if applicable.
We invest significant resources in ensuring that our solutions and products comply with existing government certifications and mandates.
A security and compliance architect assesses the security capabilities of all our products using a detailed checklist. The architect cross-references those capabilities to the categories specified by the National Institute of Standards and Technology (NIST) in publication 800-53. These internal assessments are available upon request to customers who wish to review the security capabilities of a product. Publication 800-53 serves as the basis for most FISMA controls, meaning our product capabilities also map to FISMA requirements.
We have a long history of working with federal agencies, and are committed to achieving working government security standards—including the requirements of FIPS Publications 140/201, FISMA, and other information assurance processes. We use technologies that comply with FIPS 140-2 to protect data and limit system access. It provides documentation to help agencies determine if products meet their unique security requirements, and assists agency efforts to perform Certification & Accreditation (C&A) of our solutions.
Some of our products have received Federal Desktop Core Configuration (FDCC) certifications. Others are certified under the Cryptographic Algorithm Validation Program (CAVP). Additionally, our R&D organization uses NIST-certified Security Content Automation Protocol (SCAP) vulnerability scanning and certification technologies.
Compliance is an ongoing effort in a changing landscape. We commit to staying as current as possible with our certifications so that your organization can confidently leverage our solutions to save time and money across physical, virtual and cloud environments.
SECTION 508 & VPATS
In recognition and support of the “Electronic and Information Accessibility Standards” defined by Section 508 of the Rehabilitation Act, we publish accessibility self-assessments of our products using Voluntary Product Accessibility Templates (VPATs). The VPAT criteria influence the product roadmaps, and our Research and Development teams update the VPATs for their products during each major release cycle to reflect accessibility improvements contained in the latest release.
Below you will find VPATs for our software solutions. If the software VPAT you seek is not listed below, please Contact Us.
HSPD-12 & OMB 11-11
Homeland Security Presidential Directive 12, or HSPD-12, was issued by President George W. Bush in August of 2004. HSPD-12 calls for common identification standards for federal employees and contractors.
“…it is the policy of the United States to enhance security, increase Government efficiency, reduce identity fraud, and protect personal privacy by establishing a mandatory, Government-wide standard for secure and reliable forms of identification issued by the Federal Government to its employees and contractors (including contractor employees).”
HSPD-12 calls on executive branch departments and agencies to ensure that their organizations meet those standards. HSPD-12 requires agencies to follow specific technical standards and business processes for the issuance and routine use of Federal Personal Identity Verification (PIV) smartcard credentials including a standardized background investigation to verify employees’ and contractors’ identities. Specific benefits of the standardized credentials required by HSPD-12 include secure access to federal facilities and disaster response sites, as well as multi-factor authentication, digital signature and encryption capabilities.
In 2011, the Office of Management and Budget (OMB) issued OMB Memorandum 11-11, which calls on agencies to accelerate their adoption of PIV credentials, the enablement of applications to use those credentials, and the upgrading of existing physical and logical access control systems to use those credentials.
Certification & Accreditation (C&A) is a requirement for all federal IT systems. C&A applies to complete systems – hardware and software – in a specific environment, associated with specific policies and procedures. Certification is the technical evaluation of the system components as they relate to security, and accreditation is the formal acceptance of that system in its specific environment.
Since C&A is environment-specific, no software, including our solutions, can be generically certified and accredited, but must go through that process for each environment in which it is installed. Upon request, we will provide copies of our products and assist organizations in their specific C&A efforts for our solutions.
Service Level Agreement
SonicWall and GDPR
SonicWall works hard to ensure compliance with data privacy requirements including, without limitation, GDPR (by which we mean both the EU’s original version and the version in effect in the UK after Brexit, which is substantively the same).
SonicWall takes data protection and information security seriously and has implemented policies and procedures for safeguarding personal data that is stored, processed and/or transferred by SonicWall. For instance, SonicWall has implemented physical and logical access restrictions, access rights restrictions, credentialing programs, and training programs to ensure staff are made aware of our and their responsibilities to comply with data protection law. SonicWall also works to ensure it has the necessary network security for its product offers that operate in a hosted environment.
To learn more about how SonicWall collects, uses, and shares the personal data that we collect through our website and the use of our products and services, please review the SonicWall Privacy Statement.
How do data privacy requirements apply to SonicWall products?
For the most part, SonicWall does not access, collect, or use the personal data of individuals via our products. Rather, SonicWall products help customers enable security in their networks and to better comply with the various data privacy regulations, including GDPR.
However, SonicWall may be subject to certain aspects of data privacy regulations where, for example, SonicWall hosts a customer solution that allows a customer to process, access or use personal data in that hosted environment. In those cases, SonicWall must ensure that adequate security is in place to protect that personal data.
For instance, data privacy regulations do not apply to SonicWall firewall hardware appliances without a subscription to the SonicWall Capture Advanced Threat Protection sandbox service. Privacy regulations may apply to the SonicWall Capture Cloud Platform and SonicWall’s Cloud Edge Secure Access to the extent it enables end-user designated personnel to access their network data in an environment hosted by SonicWall.
SonicWall hosted solutions
SonicWall maintains systems used for its hosted solutions and also leverages third parties, such as Amazon Web Services (AWS). SonicWall uses a number of technological and operational approaches in its physical security program to mitigate security risks to the extent reasonably practicable. In addition, SonicWall works to ensure that it and its third-party providers have the appropriate safeguards in place to protect personal data as required by applicable privacy regulations.
Our team works to determine the appropriate measures to be used to prevent unauthorized persons from gaining access to systems within which data is processed and continually monitors any changes to our physical infrastructure, business and known threats.
SonicWall also considers best practice measures used by others in the industry while balancing its approach toward security by considering elements of control that include architecture, operations and systems.
SonicWall customers are given the opportunity to choose the location of their primary data center where their information will be hosted. However, limited data may be transferred to other SonicWall locations for the purpose of providing services to our customers.
Can SonicWall help companies become compliant with privacy regulations?
SonicWall acts as a provider of network security and content-based security solutions, and security of data is a key aspect in achieving data privacy principles.
We assist companies to secure their data in a smarter way. In the wake of burgeoning legislation and increased hacker intelligence, it is vital for organizations to secure their networks. Using high-performance Deep Packet Inspection, SonicWall can spot ransomware and other nefarious traffic and behavior from among encrypted files, further safeguarding an organization.
SonicWall provides industry-leading machine learning technology to detect and block ‘never-before-seen’ malware and protect against zero-day vulnerabilities.
How can I find a copy of the data processing agreement applicable to my use of SonicWall’s products?
You may download and sign our Data Processing Agreement (DPA) using our online version found here.
Who are your sub-processors, what do you use them for, and where are they located?
The sub-processors we use that are relevant to our hosted products depend on the specific SonicWall products and services you use. You may view our sub-processor list by clicking here.
Who can I contact if I have additional questions?
You may contact SonicWall directly by sending an email to email@example.com or you may contact your sales representative.
General Disclaimer: The information on the SonicWall website is not an exhaustive review of all elements of applicable privacy regulations, nor is it legal advice. Please seek guidance from your own legal consultants.
|Rockwell Information Services||Training & Education|
|Oracle Eloqua||Marketing Tool|
APPLICATION AND ACCEPTANCE OF TERMS
The Site is controlled and operated by SonicWall or its subsidiaries or affiliates from its offices within the United States. SonicWall makes no representation that materials in the Site are appropriate or available for use in other locations, and access to them from territories where their contents are illegal is prohibited. Those who choose to access the Site from other locations do so on their own initiative and are responsible for compliance with applicable local laws.
TERMS OF PURCHASE AND SALE
License and Use Restrictions
Use of Communities and Public Communication
“Community” means a discussion group, chat area, bulletin board, news group, letter to SonicWall, its webmaster or employees, or e-mail function offered as part of the Site.
U.S. Government Restricted Rights
In addition to the restrictions on use provided above, the materials on the Site are provided with “RESTRICTED RIGHTS”. Use, duplication or disclosure by any federal, state or local government or authority is subject to further restrictions as set forth in applicable laws and regulations. Use of the materials by such government or authority constitutes acknowledgment of SonicWall’s proprietary rights in them.
The materials and information contained on the Site, including, but not limited to, the text, graphics, photographs, artwork, icons, images, logos, audio, video, downloads, data and compilations, belong to SonicWall or the original creator and is protected by applicable law, including, but not limited to, United States and international copyright law and regulations.
The Site and all information and material contained on the Site or made available through the Site are provided on an “as is” and “as available” basis. Any software made available on the Site is warranted, if at all, only according to the additional terms and conditions that accompany the software. SonicWall makes no other representations or warranties of any kind whatsoever and disclaims all other warranties and representations, express or implied, including, but not limited to, warranties of merchantability, fitness for a particular use or purpose, accuracy, non-infringement or operation. SonicWall does not guarantee the Site and the material and information contained on the Site will be without error or defect. You agree that you take full responsibility for your use of the Site.
Limitation of Liability
TO THE FULLEST EXTENT PERMITTED BY APPLICABLE LAW, UNDER NO CIRCUMSTANCES, INCLUDING, BUT NOT LIMITED TO, NEGLIGENCE, SHALL SONICWALL BE LIABLE FOR ANY DIRECT, INDIRECT, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES, INCLUDING, BUT NOT LIMITED TO, LOSS OF DATA OR PROFIT, ARISING OUT OF THE USE, OR THE INABILITY TO USE, THE MATERIALS ON THE SITE, EVEN IF SONICWALL OR A SONICWALL-AUTHORIZED REPRESENTATIVE HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. IF YOUR USE OF MATERIALS FROM THE SITE RESULTS IN THE NEED FOR SERVICING, REPAIR OR CORRECTION OF EQUIPMENT OR DATA, YOU ASSUME ANY AND ALL COSTS THEREOF. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THE ABOVE LIMITATION OR EXCLUSION MAY NOT APPLY TO YOU.
SonicWall’s Privacy Statement will apply to your use of the Site. The terms of SonicWall’s Privacy Statement are made a part of these terms; please review SonicWall’s Privacy Statement and related information about your privacy and SonicWall’s use of your information by clicking on the Privacy Statement link on this Site. You acknowledge and agree that you are responsible at all times for maintaining the confidentiality and protection of your account and password information if such information is applicable to your use of the Site. You are also responsible for adequately restricting the use and access to your computer, smartphone, or other device used to access the Site and all activity that occurs under your account due to your failure to protect such information.
Export Controls/Legal Compliance
None of the software or underlying information or technology available on the Site may be downloaded or otherwise exported or re-exported in violation of the laws and administrative regulations of the United States or any other applicable jurisdiction; or to any prohibited party (e.g., those listed on the U.S. Treasury Department’s List of Specially Designated Nationals or the U.S. Commerce Department’s Table of Denial Orders) without obtaining all required prior approvals. By downloading, installing or using the software, you are agreeing to the foregoing and you are representing and warranting that you are not located in a region subject to U.S. embargo or comprehensive sanctions and you are not a prohibited party.
As a convenience to you, the Site may provide links to other websites operated by other entities (collectively, the “Linked Sites”). If you use any Linked Site, you will leave the Site. If you decide to visit any Linked Site, you do so at your own risk. Linked Sites, regardless of the linking form (e.g., hotlinks, hypertext links, IMG links) are not maintained, controlled or otherwise governed by SonicWall. The content, accuracy, opinions expressed and other links provided by Linked Sites are not investigated, verified, monitored or endorsed by SonicWall. SonicWall does not endorse or make any representation regarding or warrant any information, goods and/or services appearing or offered on any Linked Site. Links do not imply that SonicWall or the Site sponsors, endorses, is affiliated or associated with, or is legally authorized to use any trademark, trade name, logo or copyright symbol displayed in or accessible through the Linked Sites, or that any Linked Site is authorized to use any trademark, trade name, logo or copyright symbol of SonicWall or any of its affiliates or subsidiaries. SonicWall is neither responsible for nor will it be liable under any theory based upon any Linked Site, any information or content found on any Linked Site, or any site linked to or from any Linked Site.
You agree that any claim relating to the Site and the materials contained on the Site and related to your access and use of the Site will be governed by the laws of the state of California without regard to conflicts of laws principles. You agree to submit to the personal and exclusive jurisdiction of the courts located within Santa Clara, California.
Term of Use Revisions
Third Party Licenses
Our products include some components obtained from third parties. Some of these third-party components are governed by licenses that obligate us to provide our customers with the text of the applicable license. Click on any of the licenses listed below to view the license text.