EXHIBIT 10.16
SOFTWARE LICENSE, SOURCE CODE, AND
DERIVATIVE PRODUCT DISTRIBUTION AGREEMENT
License Agreement No. ______________
This Software License, Source Code, and Derivative Product Distribution
Agreement (the "Agreement") is entered into this _27th day of November, 2002, by
and between M2, INC., a Florida corporation with its principal place of business
at 000 Xxxxxxxxx Xxxxx, Xxxxx 000, Xxxxxxxx, Xxxxxxx 00000, (hereinafter
referred to as "LICENSEE" or "M2") and DIGITAL COURIER TECHNOLOGIES, INC., a
Delaware corporation with its principal place of business at 348 East 0000
Xxxxx, Xxxxx 000, Xxxx Xxxx Xxxx, Xxxx 00000, and all of its affiliates and
subsidiaries, (hereinafter collectively referred to as "DCTI" or "DCTi").
WHEREAS, DCTI owns the Licensed Software (as defined below);
WHEREAS, DCTI desires to License its software in the ways set forth below;
and
WHEREAS, LICENSEE desires to acquire a license to use the Licensed
Software subject to the terms and conditions set forth below.
NOW, THEREFORE, for good and valuable consideration, the receipt and
sufficiency of which are hereby acknowledged, the parties agree as follows:
1. DEFINITIONS
1.1 "Documentation" shall mean such manuals and other standard end
user and technical documentation that DCTI ordinarily makes
available with a program, including amendments and revisions
thereto.
1.2 "Licensed Materials" means one copy of the Source Code, one copy
of the executable code (i.e. object code) of the Licensed Software
and a copy of all Documentation relating to the Licensed Software,
including, without limitation, textual and/or graphic material,
perceivable directly by humans and/or with the aid of a device or
a machine, and all of the documentation reasonably necessary for a
user to operate the Licensed Software.
1.3 "Licensed Software" means the collection of computer programs
described in the attached Exhibit A.
1
1.4 "Source Code" means software in human-readable form, including but
not limited to, programmers' comments, data files and structures,
macros, object libraries, programming tools not commercially
available, technical specifications, flowcharts and logic
diagrams, schematics, annotations and documentation reasonably
required or necessary to enable an independent third party
programmer with reasonable programming skills to create, operate,
maintain, modify and improve the software without the help of any
other person. Data files containing Source Code must be in
standard ASCII format and be readable by a text editor.
1.5 "Transaction" shall mean that function by which a single message
exchange is processed, facilitated and/or completed by or through
the licensed material.
2. DELIVERY AND ACCEPTANCE
2.1 Delivery. DCTI agrees to deliver to LICENSEE the Licensed
Materials listed on Exhibit A within three (3) business days of
the execution of this Agreement.
2.2 Acceptance. LICENSEE shall have five (5) days from the date of
receipt of the Licensed Materials to evaluate the Licensed
Materials for substantial conformity with the specifications set
forth on Exhibit A, and either accept, return for rework, or
reject the Licensed Materials. LICENSEE shall be entitled to test
and evaluate the Licensed Materials by whatever means it deems
appropriate consistent with DCTI's rights in the Licensed
Materials, and DCTI hereby grants to LICENSEE any licenses
necessary for LICENSEE to perform its evaluation. If LICENSEE
returns Licensed Materials for rework, DCTI agrees to correct the
listed defects and resubmit the Licensed Materials for evaluation
by LICENSEE under the same acceptance procedure. In the event
LICENSEE rejects the Licensed Materials, it shall give DCTI
written notice of rejection stating the reasons for its
unacceptability. No payment shall be payable to DCTI until the
Licensed Materials have been accepted by LICENSEE in writing or
LICENSEE fails to reject the Licensed Materials within such 5 day
period at which time the Licensed Materials will have been deemed
accepted.
3. RIGHTS GRANTED AND RESTRICTIONS
License Grant. DCTI hereby grants to LICENSEE a fully-paid, perpetual,
non-exclusive, irrevocable, transferable, assignable, worldwide
license, with limited rights to sublicense as more fully set out in
paragraph 3.1 of this Agreement (the "License") to the Licensed
Materials for the uses set forth in Section 1.2. This License has no
limitation as to seats or site.
3.1 Uses. LICENSEE has the right to use for any and all purposes,
market, transfer, assign, and/or resell the Licensed Materials
under its own name or that of DCTI , at its sole discretion.
LICENSEE may further sublicense any and all licensed materials
that LICENSEE or its agents have enhanced or from which the
2
LICENSEE has made derivative products, programs, applications or
code. The License granted herein shall be for the use of the
Licensed Materials by LICENSEE in connection with any or all of
its business operations, including without limitation, the
operations of its affiliates, wherever the same may be located
from time to time and specifically includes the right to install,
execute, use, copy, test, display, distribute and perform the
Licensed Software. The License granted herein shall additionally
include the right to make back-up copies of the Licensed Materials
for back-up purposes and the right to create derivative or
compatible works of the Licensed Materials, as well as the right
to sub-license, resell, transfer, and/or assign the Licensed
Materials and derivative works thereof to LICENSEE's customers,
under DCTI or LICENSEE's name.
3.2 Trademarks. Neither party is granted any right or interest to the,
trademarks or trade names (collectively, "Marks") of the other
party. Neither party may use the other's Marks without the prior
written consent of the other party. Notwithstanding the foregoing,
DCTI agrees that LICENSEE may, in its discretion, use DCTI's name
and the Licensed Software name in identification of the existence
of the Licensed Software as bundled with a LICENSEE Product.
3.3 Licensed Software. LICENSEE shall not be an owner of any copies of
the Licensed Software, but, rather, is licensed pursuant to this
Agreement to use such copies. LICENSEE acknowledges and agrees
that, as between LICENSEE and DCTI, all right, title, and interest
in the Licensed Software and any part thereof, including, without
limitation, all rights to patent, copyright, trademark and trade
secret rights and all other intellectual property rights therein
and thereto, and all copies thereof, in whatever form, including
any written documentation and all other material describing such
Licensed Software, shall at all times remain solely with DCTI.
3.4 LICENSEE Modification. LICENSEE shall have the right, in its own
discretion, to independently modify the Licensed Software for its
own purposes and use, through the services of its own employees or
of independent contractors, provided that same agree not to
disclose or distribute any part of the Licensed Software to any
other person or entity or otherwise violate DCTI's proprietary
rights therein. LICENSEE SHALL BE THE OWNER OF ANY MODIFICATIONS,
DERIVATIVE OR COMPATIBLE WORKS. DCTI shall not incorporate any
such modifications into its software for distribution to third
parties without the prior written consent of the LICENSEE.
4. PAYMENT
Payment. In consideration for the rights and licenses granted to
LICENSEE under this Agreement, LICENSEE shall pay DCTI a one-time
license fee of Fifty Thousand Dollars ($50,000.00) within five (5)
business days of its acceptance of the Licensed Materials in accordance
with Section.
3
4.1 Royalty. For a period of two years from commencement of this
Agreement, LICENSEE shall pay DCTI 1/10 of a cent ($.001) for all
accounts receivable revenue generated by actual Transaction
processing as defined herein.
4.2 Taxes. DCTI shall be solely responsible for taxes on amounts paid
to DCTI by LICENSEE under this Agreement, including all state and
local use, sales, property (ad valorem) and similar taxes.
4.3 Right of First Refusal. In the event that DCTI endeavors to
transfer its title to the Licensed Materials, either by sale,
gift, private corporate restructuring, or in a voluntary
Bankruptcy proceeding, DCTI will first give LICENSEE notice and
opportunity to purchase ownership rights in the Licensed Materials
prior to obligating DCTI to the transfer of ownership rights to a
third party.
4.4 Right of Notice. DCTI hereby agrees to give LICENSEE 15 days
notice prior to conveying to any third party the right to
sub-license or resell the Licensed Materials.
5. WARRANTY AND INDEMNIFICATION
5.1 General Warranty. DCTI warrants and represents as follows:
(a) The Licensed Materials do not contain any unauthorized codes,
such as a virus, Trojan Horse, or other software routines designed
to provide unauthorized access, to disable, erase or otherwise
harm software, hardware or data, nor does it contain any self-help
code, such as any back door, time bomb, drop dead device or other
software routine designed to disable a computer program
automatically with passage of time or under the control of a
person other than the LICENSEE;
(b) DCTI has all right, title, ownership and other rights
necessary to grant the License to LICENSEE, free and clear of all
liens, security interests, pledges, encumbrances or charges of any
kind;
(c) The use of the Licensed Materials by LICENSEE in accordance
with this Agreement will not violate or infringe upon any patent,
copyright, trade secret or other intellectual property rights of
other persons or entities; and
(d) The Licensed Software will operate in accordance with and
substantially conform to the specifications set forth in the
Documentation and the specifications set forth on Exhibit A or as
subsequently modified by mutual agreement of the parties.
4
5.2 Indemnification. DCTI shall defend, indemnify and hold harmless
the LICENSEE, its corporate affiliates, and any employee or agent
thereof (each of the foregoing being hereinafter referred to
individually as the "Indemnified Party") against all liability to
third parties arising from (a) the negligence or willful or
intentional misconduct or omission of the DCTI or its agents, or
(b) the License granted herein to LICENSEE for use of the Licensed
Materials, including without limitation, the violation of any
third party's trade secrets, proprietary information, trademark,
copyright or patent rights in connection with the licensing of the
Licensed Materials. DCTI may, at its option, conduct a defense in
such third party action arising as described herein and LICENSEE
shall cooperate in good faith with such defense. This
indemnification is limited to the Licensed Software delivered to
the LICENSEE or as modified by DCTI and does not cover third party
claims arising from modifications to the Licensed Software not
authorized by DCTI. If a third party claim causes LICENSEE's quiet
enjoyment and use of the Licensed Materials to be seriously
endangered or disrupted, DCTI shall:
(a) replace the Licensed Materials, without any additional charge,
with a compatible, functionally equivalent and non-infringing
product;
(b) modify the Licensed Materials to avoid the infringement; or
(c) obtain a license for the LICENSEE to continue to use the
Licensed Materials and pay for any additional fee required for
such license.
6. MAINTENANCE.
During the term of this Agreement, DCTI shall, at no additional cost,
(a) provide to LICENSEE all upgrades, modifications and enhancements to
the Licensed Materials created by DCTI, and (b) correct any defects or
malfunctions in the Licensed Materials. For purposes of this Section 6,
"Upgrade" shall mean any correction of any defect or malfunction in the
Licensed Materials, "Modification" shall mean any change to the
Licensed Materials which improves the efficiency and effectiveness of
the basic program functions, but which do not change such functions or
create one or more new functions, and "Enhancement" shall mean any
changes in the Licensed Materials that modify the basic program
functions of the Licensed Materials or add one or more new ones. All
such Upgrades, Modifications, Enhancements, new releases and
corrections shall constitute Licensed Materials.
7. LIMITED LIABILITY
EXCEPT FOR ANY DAMAGES CAUSED BY WILLFUL OR INTENTIONAL MISCONDUCT OR
OMISSION, OR GROSS NEGLIGENCE, NEITHER DCTI NOR LICENSEE, NOR ANY
5
PERSON ACTING ON ITS BEHALF (AS AN EMPLOYEE, OFFICER, DIRECTOR, AGENT
OR OTHERWISE), SHALL HAVE ANY LIABILITY HEREUNDER FOR ANY
CONSEQUENTIAL, INCIDENTAL, SPECIAL OR PUNITIVE DAMAGES, OR ANY DAMAGES
BASED ON THIRD PARTY CLAIMS RELATING TO THE USE OF THE LICENSED
MATERIALS, INCLUDING LOSS OF PROFITS ARISING OUT OF THIS AGREEMENT,
WHETHER ANY SUCH CLAIM IS BASED UPON CONTRACT OR TORT.
8. CONFIDENTIAL INFORMATION
8.1 Licensed Materials. All Licensed Software in object code form and
related Documentation provided to LICENSEE hereunder are deemed
non-confidential, and LICENSEE is not under any obligation to DCTI
to restrict access to or use of such Licensed Software in object
code form or related Documentation, provided LICENSEE otherwise
complies with the terms of this Agreement.
8.2 Confidential Information. During the term of this Agreement,
either party may receive or have access to technical information,
as well as information about product plans and strategies,
promotions, customers and related non-technical business
information which the disclosing party considers to be
confidential ("Confidential Information"). In the event
Confidential Information is disclosed, the disclosing party shall
(i) xxxx the information as confidential at the time of
disclosure, or (ii) if disclosed orally but stated to be
confidential, designate such information as confidential in
writing by summarizing the Confidential Information disclosed and
sending such summary to the receiving party within a reasonable
period of time after such oral disclosure. Notwithstanding any
provision to the contrary, all source code provided by either
party to the other, and all business information with respect to
any unpublished or future DCTI or LICENSEE products, are deemed
Confidential Information for the purposes of this Section 8.
8.3 Nondisclosure. Confidential Information may be used by the
receiving party only in a manner consistent with such party's
rights and obligations under this Agreement. The receiving party
shall protect the Confidential Information of the disclosing party
by using the same degree of care (but not less than a reasonable
degree of care) to prevent the unauthorized use, dissemination or
publication of such Confidential Information, as the receiving
party uses to protect its own Confidential Information of like
nature. The receiving party's obligation under this Section 8
shall be for a period of three (3) years after the date of
disclosure except for either party's source code which shall be
held confidential in perpetuity. The foregoing obligation shall
not apply to any information that is: (i) already known by the
receiving party prior to disclosure; (ii) publicly available
through no fault of the receiving party; (iii) rightfully received
from a third party without a duty of confidentiality; (iv)
disclosed by the disclosing party to a third party without a duty
6
of confidentiality on such third party; (v) independently
developed by the receiving party prior to or independent of the
disclosure; (vi) disclosed under operation of law; or (vii)
disclosed by the receiving party with the disclosing party's prior
written approval.
8.4 Notification. Each party agrees to notify the other promptly on
the event of any breach of security under conditions in which it
would appear that any Confidential Information was prejudiced or
exposed to loss. Each party shall, upon request of the other, take
all other reasonable steps necessary to recover any compromised
Confidential Information disclosed to or placed in the possession
of each party by virtue of this Agreement. Each party shall
individually bear the cost of taking any such steps.
8.5 Remedies. Each party acknowledges that any breach of any of its
obligations under this section 8 is likely to cause or threaten
irreparable harm to the other, and accordingly, agree that in such
event, the aggrieved party shall be entitled to equitable relief
to protect its interest therein, which will be limited to
preliminary and permanent injunctive relief for both LICENSEE and
DCTI but will not limit the aggrieved party from seeking expanded
remedies from other unrelated third parties.
9. OTHER PROVISIONS
9.1 Authorization. This Agreement has been duly authorized by all
necessary corporate action on the part of the each party. The
Agreement constitutes the parties' valid and legally binding
obligation, enforceable against it in accordance with its terms.
DCTI has the full corporate power and authority to enter into this
Agreement. LICENSEE has the full corporate power and authority to
enter into this Agreement.
9.2 Publicity. Each party agrees not to publicize or disclose the
existence or terms of this Agreement to any third party (except as
allowed in this agreement in Section 3) without the prior written
consent of the other except as required by law. In particular, no
press releases shall be made without the written consent of each
party.
9.3 Independent Contractors. The relationship of the parties under
this Agreement is that of independent contractors, and neither
party is an employee, agent, partner or joint venturer of the
other.
9.4 Relationship Managers. Each party designates the person(s) set
forth on Exhibit B as the primary contact(s) of each party with
respect to this Agreement, which person(s) may be redesignated by
a party by written notice to the other.
7
Disputes and Governing Law.
(a) Dispute Resolution. In the event of a dispute between the parties,
the issue will first be escalated to the individuals identified on Exhibit B. If
these individuals cannot resolve the dispute within two (2) weeks of notice, the
issue will be escalated to the legal counsel of each party and/or the parties'
principals. Either party may initiate dispute resolution by notice to the other
party. Such notice will be without prejudice to the invoking party's rights to
any other remedy permitted hereunder. The parties will use commercially
reasonable efforts to arrange meetings or telephone conferences, as needed at
mutually convenient times and places, to facilitate negotiations between the
parties. In the event that the parties fail or are unable to resolve a dispute
between them after exhausting the escalation process set forth above, then
either party may declare that a deadlock exists. In the event of a deadlock
after undertaking the forgoing steps to resolve the dispute in good faith, the
parties shall attempt to resolve the dispute through mediation prior to
instituting litigation or other adversary proceeding.
(b) Mediation. A party shall initiate a mediation by serving written
notice on the other party by overnight mail. The parties may select any mediator
mutually agreeable to them. If the parties cannot agree on a mediator within
fifteen (15) days, they will, within five (5) days thereafter submit a joint
request for mediation to the Orlando, Florida office of the American Arbitration
Association ("AAA") and request the AAA to select an appropriate mediator with
experience in resolving software development and licensing disputes. The
mediation session shall occur within thirty (30) days of the selection of the
mediator unless the parties mutually agree to extend this time, and shall be
scheduled for not less than one day. Each party agrees to send a representative
with full settlement authority to the mediation. The mediation shall be
conducted exclusively in Tampa, Florida or within 100 miles thereout, unless
otherwise agreed by the parties. The parties agree to hold the content of the
mediation in confidence and further agree that the mediator is disqualified as a
litigation witness for any party to the mediation. The parties further agree
that the mediation shall be considered to be a form of settlement negotiations,
the content of which shall not be admissible as evidence of liability in any
judicial proceeding. Each party shall bear its own expenses and an equal share
of the expenses of the mediator and, where applicable, the AAA. The parties
agree that any refusal to mediate under this section is a breach of contract for
which damages may be recovered in litigation between the parties. Except as
provided below, if the party who ultimately prevails in any litigation
institutes a court action or other adversary proceeding without first attempting
mediation as required hereby, SUCH PREVAILING PARTY SHALL NOT BE ENTITLED TO
ATTORNEYS' FEES OR COSTS THAT MIGHT OTHERWISE BE AVAILABLE TO IT UNDER THIS
CONTRACT OR IN COURT ACTION.
(c) Litigation. In the event a dispute is not resolved by such
mediation, the parties shall have the right to initiate a suit, action or other
adversary proceeding before the appropriate court exclusively within the
jurisdiction of the state and federal courts in the state of Florida. In the
event of such suit, action or other adversary proceeding, the Parties hereto (a)
submit to the exclusive personal jurisdiction of the federal and state courts in
the State of Florida, County of Orange and (b) expressly waive any right they
8
may have to a jury trial and agree that any such proceeding shall be tried by a
judge without a jury. All defenses based on passage of time shall be tolled
pending mediation, unless otherwise prohibited by law.
(d) Applicable Law. This Agreement shall be governed by, construed,
enforced and interpreted in accordance with the internal substantive laws of the
State of Florida.
(e) Interim Relief. Nothing in this Section shall be construed to
preclude any party from seeking injunctive or other provisional relief in order
to protect its rights pending mediation, provided however that such relief may
only be sought within the appropriate judicial forum as provided in Subsection
(c) above. In the event a party seeks interim relief without first attempting
mediation, such party shall not forfeit its entitlement to legal fees and costs
that would otherwise be available to it only if such party initiates mediation
within fifteen (15) days after initiating the action seeking interim relief. A
request to a court for interim relief shall not be deemed a waiver of the
obligation to mediate.
9.5 Notice. Any notice or other communication required or otherwise
provided for under this Agreement shall be in writing and shall be
deemed given when delivered by hand or by courier or express mail
or by registered or certified United States mail, return receipt
requested, postage prepaid, or by facsimile if receipt is
acknowledged (except that a notice of termination or default shall
not be sent by facsimile) and shall be addressed to the
appropriate relationship manager as set forth on Exhibit B.
9.6 Assignment. This Agreement shall be binding upon and inure to the
benefit of the parties hereto and their respective affiliates,
successors and permitted assigns. DCTI may not assign this
Agreement or its interest or obligations hereunder without the
prior consent of LICENSEE. LICENSEE may assign this Agreement or
its interest or obligations hereunder without DCTI's consent
including, but not limited to, in connection with a change of
control of LICENSEE, a merger of LICENSEE with another entity, or
the sale of all or substantially all of the assets of LICENSEE.
9.7 Severability. The terms of this Agreement shall be applicable
severally to each Licensed Software program, if more than one, and
any dispute affecting either party's rights or obligations as to
one or more Licensed Software program(s) shall not affect the
rights granted hereunder as to any other Licensed Software
program(s). If any provision of this Agreement is held to be
invalid or unenforceable by a court of competent jurisdiction,
then the remaining provisions will nevertheless remain in full
force and effect, and the parties will negotiate in good faith a
substitute, valid and enforceable provision which most nearly
effects the parties' intent in entering into this Agreement.
9
9.8 Headings. The captions and headings used in this Agreement are for
convenience in reference only, and are not to be construed in any
way as terms or be used to interpret the provisions of this
Agreement.
9.9 Distribution Obligation. LICENSEE may in its sole discretion
decide to distribute or not distribute the Licensed Software or
derivative products created from the Licensed Software as it deems
appropriate.
9.10 Relationship of Parties. In performing under this Agreement, the
parties are acting as independent contractors and this Agreement
shall not be construed as imposing liability upon one party for
the acts or omissions of the other or as providing either party
with the right, power or authority to impose any duty or
obligation on the other except as expressly provided herein.
9.11 Modifications. This Agreement may be modified only by a writing
signed by an authorized representative of each party.
9.12 Waiver. Neither party's failure to exercise any of its rights
hereunder shall constitute or be deemed a waiver or forfeiture of
any such rights.
9.13 Force Majeure. Nonperformance of either party will be excused to
the extent that performance is rendered impossible by strike,
fire, flood, governmental acts or orders or restrictions or other
similar reason where failure to perform is beyond the control and
not caused by the negligence of the non performing party, provided
that the non performing party gives prompt notice of such
conditions to the other party and makes all reasonable efforts to
perform.
9.14 Entire Agreement. This document represents the entire agreement
between the parties as to the matters set forth herein and
supersedes all prior discussions, representations or
understandings between them.
9.15 Exhibits. Each of the Exhibits referred to in this Agreement is
incorporated in full in this Agreement wherever reference to it is
made.
9.16 Counterparts. This Agreement may be executed in counterparts, each
of which shall be deemed an original.
9.17 Items 8.1 through 8.5 of this Agreement shall survive the
Agreement.
10
IN WITNESS WHEREOF, this Agreement has been executed below on behalf of
each corporation's duly authorized officer as of the date first set forth above.
M2, INC DIGITAL COURIER
TECHNOLOGIES, INC
By: /s/ Xxxxxx X. Xxxxx By: /s/ Xxx Xxxxxxxx
------------------------- ---------------------
Print Name: Xxxxxx X. Xxxxx Print Name: Xxx Xxxxxxxx
Title: President and CEO Title: CEO
11
EXHIBIT A
iGuard - Fraud monitor and management systems for acquiring merchant
transaction processing. Includes a Transaction Processing Rules Engine,
Fraud Alert Case Engine, and Fraud Alert Case Work Flow Queue manager
system.
netClearing - An Internet Payment Gateway process (IPG). Includes the
i24Admin merchant administration system, a merchant-agent portfolio
reporting system (PRS), and a merchant reporting and administrative
system (MRS).
SecureCharge - A transaction authorization and settlement reporting
system, including a batch-based transaction authorization and
settlement system (SecureBatch).
ePos - A consumer-to-merchant payments processing module.
eBatch - A merchant payments module permitting batch submissions for
transaction authorization, capture, settlement and reporting.
SecureCart - An internet shopping cart application including various
security provisions
SecureTrans - Used in conjunction with SecureCart, this module provides
for processing secure payments transactions.
OFS - An order fulfillment system which includes payments processing,
order management and tracking, shipping reports and product back-order
and tracking logic.
SMS - A subscription management system which tracks orders and acquires
payments for products or services on a recurring billing basis.
1
DCTI
e-payment services
DCTi netClearing and iGuard
Version 1.0
Table of Contents
Payment Processing with DCTI................................................3
The SecureCharge(R)and SecureBatch(R)Payment Plug-In........................3
ePOS........................................................................3
eBATCH......................................................................3
iGuard Fraud Control........................................................3
Merchant Tools and Reports..................................................4
NetClearing Payment Services for Financial Institutions.....................4
Internet Payment Gateway....................................................4
Risk Management.............................................................5
Tools and Reports...........................................................5
Risk Management and Internet Fraud Control..................................6
Credit Card Clearing Process................................................8
Technology..................................................................9
Performance and attributes..................................................9
2
Payment Processing with DCTI
----------------------------
DCTI offers credit-card processing services for Visa(R), MasterCard(R), American
Express(R), Discover(R), Diners Club(R), and can support all other major card
schemas. Payment features of the DCTI service include authentication, fraud
control, authorization, settlement handling, and real-time reporting.
The SecureCharge(R) and SecureBatch(R) Payment Plug-In
------------------------------------------------------
Designed for ease of use, DCTI's SecureCharge(R) and SecureBatch(R) "Payment
Plug-in" software delivers transaction processing capabilities in a small,
easy-to-install, thin-client format. Because the Payment Plug-ins are built with
technology based on open standards, clients can quickly and easily integrate
them into a wide range of e-commerce server platforms, software packages, and
financial systems infrastructure. Once installed, these lightweight software
libraries enable application programming interfaces (API) that can be
implemented in a secure yet simple manner. Once implemented, the payment
plug-ins handle all security protocols, communication protocols, and message
formatting. The payment plugins securely transmit transaction data to the DCTI
Internet Payment Gateway, discussed below. The gateway examines the transaction
for potential fraudulent activity, logs the transaction in a database for
reporting, and routes the transaction to the card networks for authorization.
The plug-ins are available in a variety of languages on all major operating
systems and are provided in a concise SDK (Software Development Kit). The DCTI
SecureCharge and SecureBatch SDK contain the plug-in software libraries, API
documentation, software languages and sample code for implemention in CGI,
ISAPI, NSAPI, COM/Active-X, Visual Basic, C/C++, Java, and Perl for both Unix
and Windows platforms.
ePOS
----
DCTI's ePOS(R) is an easy-to-use, Web-based point-of-sale terminal application.
Merchants can use ePOS from a desktop computer to submit credit card and order
information to the DCTI Internet Payment Gateway, discussed below. With its
Web-based functionality, ePOS provides flexibility for multiple station
processing facilities such as call centers and customer service centers. Most
importantly, because ePOS accesses DCTI's Payment Plug-in, transactions can be
processed with the same rapid response times, Web-based reporting, and access to
important fraud protection service.
eBATCH
------
DCTI's eBATCH(R) is an easy-to-use Web-based point-of-sale terminal application
designed for multi-transaction processing. Merchants can use eBATCH from a
desktop computer to submit files of credit card transactions and order
information to the DCTI Internet Payment Gateway. With its Web-based
functionality, eBATCH provides flexibility for multiple station processing
facilities such as call centers and customer service centers to upload recurring
transactions. Most importantly, because eBATCH accesses DCTI's Internet Payment
Gateway, transactions can be processed with the same rapid response times,
Web-based reporting, and access to important fraud protection services as are
available for other credit card transactions.
iGuard Fraud Control
--------------------
All transactions passed to DCTI's Internet Payment Gateway are guarded by DCTI's
iGuard Payment Protection System, a suite of fraud-detection software routines
and applications. The iGuard System constantly monitors for suspicious
transactions and data entry errors. Merchants are alerted to evidence of the
misuse of card information, detected by such metrics as the verification of
addresses, velocity of purchases, and bad card histories.
3
Merchant Tools and Reports
--------------------------
DCTI offers its merchant clients 24/7 access to account information on a secure,
password-protected Web site called MRS(R) (Merchant Reporting Suite). The
security sub system of MRS is a tool and resource rights based system made up of
users and groups. With the appropriate login and password information, an
authorized user can access this Web site via a desktop computer with and a web
browser. Because DCTI's system captures and displays transaction data in
real-time, all reports provide an accurate reflection of account activity. The
primary categories of information and functionality available to the users of
the MRS(R) system include:
o My Account
o Account Profiles
o User and Group Security Sub-System Management
o Processing Profiles
o Account Activity Reports
o Transaction Summaries
o Detailed Transaction Reports
o Account Velocity Reporting
o Advanced Ad Hoc Transaction Searches
o Customer Risk and Valuation Tools
o Reconciliation Reports
o Chargeback and Exceptions Management
o Account Ledgers
o EPOS
o eBATCH
o Secure Electronic Document Delivery System
o Integrated System News
o Extensive Online Help
NetClearing Payment Services for Financial Institutions
DCTI's payment services for financial institutions provide an outsource solution
for electronic payment services and merchant portfolio management tools. The
payment services software suite is called PRS(R) (Portfolio Reporting Suite) and
includes a white labeled netClearing Internet Payment Gateway, direct
connections to credit card networks, and an extensive array of portfolio
management tools that provide reliable transaction processing services for
institutions with an existing merchant acquiring program. With DCTI's Web-based
portfolio management tools, financial institutions can better control the level
of risk associated with their portfolio, a merchant category, or an individual
merchant.
Internet Payment Gateway
------------------------
The Internet Payment Gateway is a term used to describe the collection of DCTI's
risk management, reporting, and merchant account management tools that interact
directly with legacy financial and banking networks, operating systems,
acquiring gateways, and credit-card networks. The gateway is comprised of a
commerce server located at one DCTI's data centers in Salt Lake City, Utah or
Clearwater, Florida, a transaction database, and fraud screening software that
seamlessly integrate into existing systems.
Integrating a portfolio of merchants with the Internet Payment Gateway is
straightforward and efficient. Online account management tools come with an
easy-to-use administration interface that helps users perform functions that
include adding and updating merchants, accessing reports, and monitoring fraud.
4
Risk Management
---------------
Both merchants and financial institutions are protected by DCTI's iGuard matrix
of fraud detection analysis and software. Through iGuard, an individual merchant
or an entire merchant portfolio can be monitored for potentially fraudulent
credit-card activity and data entry errors.
The risk management software alerts financial institutions to evidence of the
misuse of card information, detected by such metrics as the use of a compromised
Bank Identification Number (a "BIN"), unusual velocity or volume of
transactions, or the use of a compromised card number. Fraud control
administrators (such as risk management officers) can use DCTI's secure PRS Web
site to manage their merchant portfolio and to set fraud detection limits with a
graphical user interface.
Tools and Reports
-----------------
DCTI offers real-time activity reports and portfolio management tools through
the secure password-protected PRS Web site. The security sub system of PRS is a
tool and resource rights based system made up of users and groups. Clients can
log-on to the secure Web site to view and react to transactions as they occur.
All reports are generated from the live transaction database. Custom reports are
dynamically generated based on any of 16 user selected parameters such as
transaction number, cardholder, or BIN.
Because DCTI has direct access to the card networks the Company can record and
display transaction activity in real-time. Reporting functions available to
financial institution clients include:
o Portfolio Analysis
o General Overview
o Settlement Analysis
o Volume Analysis
o Per Ticket Analysis
o Merchant Activity
o Detailed Transaction Reports
o Transaction Summary Reports
o Deposit Baseline Reviews
o Merchant Velocity
o Violation Review
o Extensive Searching Capabilities
o Ad Hoc Transaction Searches
o Card Holder Name Searches
o Credit Card Number Searches
o Bin Searches
o Fraud and Reporting
o Card Holder Risk and Valuation Analysis
o By Portfolio or Merchant
o Stolen Card Activity
o Captured Transaction Report
o iGuard Fraud Profile Administration
o iGuard Fraud Case Management Suite
o iGuard Fraud Alert Engine
o Reconciliation Systems
o Settlement Report Management
o Merchant Ledger Management
o Adjustment Management
5
o Chargeback and Exceptions Management
o Merchant Management
o Merchant Account Management
o Processing Profile Management
o Security Sub System Controls
o User and Group Management
o Tool and Resource Management
Risk Management and Internet Fraud Control
------------------------------------------
DCTI's iGuard fraud-screening software suite helps merchants reduce their
exposure to losses generated by credit-card fraud or data entry errors. These
controls were developed specifically for e-commerce businesses, which typically
experience higher rates of credit-card fraud. The software provides added
protection for processing banks and merchants by scrubbing all transactions
through various fraud-detection software routines and databases. Potentially
fraudulent transactions are detected and rejected prior to authorization or
caught by a fraud alert engine and placed in a fraud case management system.
Following is a description of the primary fraud detection routines DCTI can use
to scrub its clients' transactions:
Checksum (Xxxx check)
A basic check of how many digits are in a credit card number to ensure
the customer's credit card is valid.
Address Verification System ("AVS")
Merchants can require customers to submit the billing address of their
credit card. The address supplied by the customer is compared to the
address on file with the issuing bank. Merchants may choose the degree
of match (between credit card number and address) at which the
transaction should be rejected.
Difference between name and card number
A credit card number can be matched to a cardholder's name for an
existing client. A mismatch may indicate that a card has been
compromised.
Unusual frequency of purchases
A merchant may record information about how frequently its product or
service is typically purchased with a particular card number. The
information is matched to actual activity so merchants are notified of
any significant variation from that mean.
Unusual time of day for purchases
A merchant may record typical transaction volumes for a particular time
of day. The information is matched to actual activity so merchants are
notified of any significant variation from that mean.
Compromised BIN and card database
All transactions can be checked against a database of BINs or card
numbers that may have been compromised. These options include:
BIN screening
A BIN corresponds to a whole set of cards that a card issuing bank has released.
When the security of a BIN is compromised, chances for fraud increase for all
cards bearing that BIN. DCTI BIN screens help to flag numbers that may be
compromised.
6
Card screening
Transactions may be checked against a database of invalid, compromised and
otherwise questionable credit card numbers.
Declined card screening
All transactions may be checked against a database of credit card numbers that
have declined charges recently. This service saves clients transaction fees by
declining the charge before it is submitted to the banking network.
Summary activity
Financial institutions can monitor activity of a single merchant or all
merchants to track sales, credits and single transactions. Even the
flow of money across credit cards can be reviewed to reveal customer
histories, purchasing habits, and money flow into or out of a card on a
daily basis or on an historical timeline.
Fraud reporting
Financial institutions can survey and analyze activity by BIN, card
number, AVS and velocity of purchases. Stolen credit cards and
questionable transactions present themselves on demand.
BIN check
Entire BINs can be reviewed for questionable activity and transactions.
Customer data associated with credit cards can be compared to locate
unreported, stolen or generated card usage. Related merchants are a
mouse click away from review of any suspicious transaction.
Unusual activity
DCTI also provides the ability to generate 90-day baseline data for any
merchant in a bank's portfolio. Side reports offer the ability to
locate transactions exceeding the baseline by whatever range a Bank
determines is valid for that merchant. Excessive tickets, unusual daily
deposits and more can be located quickly and reviewed 24/7.
Review merchant and portfolio activity in real-time
A financial institution's entire merchant portfolio or a single
merchant account can be viewed with DCTI's online charting tools. The
ability to graphically review a merchant's dollar and transaction count
can be a simple indicator of merchant or consumer fraud. Peak hours can
be located within hourly summaries that appear in easy to understand
bar charts.
7
1a Merchant Web Site
Real-time reporting
1b Internet Payment
Gateway
VISA MC AMEX Discover
Credit Card Network
3a Issuing Bank
2 Settlement Authority
3b Merchant Bank
Credit Card Clearing Process
To better understand DCTI's products and services, the following explanation and
diagram describe how the credit card clearing process works, and how the Company
simplifies the process. DCTI generates real-time reporting and transaction
management services through a secure Web server. Information such as
authorization notices and settlement data from the credit card companies are
stored in the DCTI database, which generates reports on the DCTI account
activity reporting sites. This means that merchants and financial institutions
can view real-time transaction information any time of the day via a Web
browser.
1 Authorization - When merchants are ready to begin accepting credit
cards as payment for goods or services on their Web site (1a),
they can download DCTI's Payment Plug-In and request DCTI's
assistance in establishing a merchant account. They are then ready
to begin accepting payments.
Once the customer submits a credit card number on the merchant's Web site,
the Payment Plug-in contacts the DCTI Internet Payment Gateway (1b) to
initiate fraud screening and then to request authorization, final sale or
credit.
2 If the transaction is not rejected for potential fraud, the DCTI
Internet Payment Gateway then sends the transaction information to
the credit card network (1c) for authorization or declination of
the charge. This process is completed in-house; the Company does
not use third party acquiring processors. If the transaction is
approved, an authorization code is returned to the merchant's Web
site and the authorization is complete. With DCTI's system, the
real-time authorization and capture process occurs within seconds.
Batch requests are completed within ten to thirty minutes.
3 Settlement - Once the product the customer ordered is shipped (or
downloaded), the authorization code is used to settle the amount
of the transaction. DCTI's Internet Payment Gateway and the credit
card network exchange information with the Settlement Authority
(2) to confirm the transaction.
8
4 Funds transfer - Finally the Settlement Authority requests a funds
transfer from the Issuing Bank (3a), which moves money through the
Settlement Authority into the merchant's bank (3b). The payment
process is now complete.
Technology
We have computer facilities in Salt Lake City, Utah to support all of our
products and services. This data center has redundant systems in place for
power, telecommunications, environmental controls, and fire suppression that
assure consistently optimal performance through state-of-the-art system
scalability and reliability. Features of the data center include:
o multiple fiber optic OC-3's from distinct Tier 1 Internet
Service Providers providing highly scalable bandwidth, load
balancing, fault tolerance, and data redundancy for e-commerce
and other Internet applications and customers;
o fully redundant network architecture composed of dual
switches, routers, firewalls, and load balancing devices
providing internet scalability, load balancing and fault
tolerance;
o a range of high availability multiprocessor servers from
various manufacturers including Hewlett-Packard, Dell, Sun
Microsystems and Tandem Computers supporting our business
operations. The super-scalar processing architecture of these
systems manages our service components including simultaneous
payment processing, real-time report generation and merchant
accounting; and
o modern fire retardant systems, security systems, quad-power
conditioners, and industrial battery backup arrays as well as
an 8-day backup diesel generator, which all guarantee
continuous power and environmental control to insure seamless,
around-the-clock systems uptime and availability.
Performance and attributes
DCTI's technology gives online businesses the high-speed performance they need.
Transactions are usually complete in 1-2 seconds. DCTi's Internet Payment
Gateway architecture provide fast, secure, and reliable performance.
o Capacity
The entire Internet Payment Gateway (IPG) is continually tracked for
availability. Once every minute, a test transaction is sent to Visa and
MasterCard. Also, all transaction servers are equipped with Redundant
Arrays of Independent Disks (RAID) and multiple power supplies to
ensure network availability.
o Security
Firewall systems exceed industry standards and work in tandem with a
state of the art intrusion detection system, which uses algorithms to
detect any hacking attempt. Connections and information are protected
by standard RSA encryption to SSLv3.0.
o Scalability
DCTI's infrastructure is highly scalable for future expansion and
increased performance requirements.
9
EXHIBIT B
NOTICE AND RELATIONSHIP MANAGERS
LICENSEE: DCTI:
Xxxxxx X. Xxxxx Xxx Xxxxxxxx
M2, Inc. Digital Courier Technologies, Inc.
000 Xxxxxxxxx Xxxxx, Xxxxx 000 348 East 0000 Xxxxx, Xxxxx 000
Xxxxxxxx, Xxxxxxx 00000 Xxxx Xxxx Xxxx, Xxxx 00000
Notices with respect to the administration of this Agreement shall be addressed
to the Business Manager set forth above and cc: to LICENSEE's legal department
at:
Xxxxxx X. Xxxxx
Xxxxxxxx, Loop & Xxxxxxxx, LLP
000 Xxxx Xxxxxxx Xxxxxxxxx, Xxxxx 0000
Xxxxx, XX 00000
10