Strategy MCE Software

gafereview
- The Managed Cloud Enterprise service (“MCE” or “MCE Service”) is a Software-as-a-service (“SaaS”) offering that Strategy manages on its customers’ behalf in an Amazon Web Services, Microsoft Azure, or Google Cloud Platform environment that includes access to, collectively, (a) the “Cloud Platform” version of Strategy software products (an optimized version of the Strategy software platform built specifically for deployment in an Amazon Web Services, Microsoft Azure, or Google Cloud Platform environment) licensed by the customer; (b) Cloud Support, as described below; and (c) Cloud Architecture, as described below. Strategy’s SaaS delivery model is designed to allow businesses to consume the Strategy Analytics and
- Mobility platform in a single tenant architecture (unless otherwise described in AI Capabilities) without the need to deploy and manage the underlying infrastructure.
- MCE na-enye nhazi ihe nleba anya nkesa na-eji ọrụ igwe ojii nke Microsoft Azure, Amazon nyere Web Services or Google Cloud Platform. As this technology evolves, Strategy continually incorporates new services that allow for increased availability, security, or performance to ensure the latest architecture is available to our customers. At the core of the solution are Strategy Analytics and Mobility, a secure, scalable, and resilient business intelligence enterprise application platform.
- MCE also includes the elements needed to operate, access, and manage the intelligence architecture. Users are provisioned with their own dedicated intelligence architecture based on a reference architecture. Once provisioned, users can develop, tailor, and manage the application components to meet their respective needs. Based on this operating model, customers administer and control the Analytics and Mobility solution while Strategy maintains the supporting cloud-based infrastructure.
Nkwado igwe ojii
- As a Managed Cloud Enterprise service customer, you will receive “Cloud Application Support” (“Cloud Support”) in which our Cloud Support engineers will provide ongoing support over your MCE Service term to assist in maximizing the performance and agility—and minimizing the cost— of your Strategy Cloud Platform deployment.
- Cloud Support includes environment configuration (setting up customer accounts in a selected region and CIDR for VPC/VNETs/Subnets), enterprise data warehouse integration (including modifying the Strategy configuration for data warehouse connections and opening any connectivity for external data warehouses), authentication (SSO/OIDC), and application integration.
- Additionally, Standard Support for the Cloud Platform version of Strategy Products is provided with the licenses for such Products pursuant to your contract with Strategy and our Technical Support Policies and Procedures, except that all MCE customers are entitled to four Support Liaisons (as defined in the Technical Support Policies and Procedures). Strategy Cloud Elite Support is sold to MCE Service customers as an add-on offering to standard Cloud Support. A subscription to
- Cloud Elite Support provides MCE Service customers, among other benefits, with enhanced initial response times for P1 and P2 issues, four additional Support Liaisons (eight total), weekly case management meetings, and customizable system alerts. Strategy’s Cloud Support Offerings are detailed below in Appendix A.
- Copyright © 2026 Strategy. All Rights Reserved.
- Ọ bụrụ na a mmepụta ịtage issue occurs, Strategy reserves the right to fix the issue on behalf of the customer without pre-authorization. If a support issue is logged and determined through the diagnosis that the Root Cause Analysis (RCA) indicates the stated issue is due to a customer-specific customization of the Strategy application, the Cloud Support team will provide the customer with available options to resolve the issue. These solutions may require the purchase of Strategy Professional Services for additional assistance, depending on the complexity of the issue.
Architecture igwe ojii
Architecture Cloud Architecture enyere dị ka akụkụ nke Ọrụ MCE bụ ụlọ ntụaka ahaziri ahazi na-enye nhazi data ọkwa ọkwa ụlọ ọrụ yana ọchịchị mejupụtara (a) ihe akụrụngwa Cloud Architecture chọrọ iji mee ka gburugburu SaaS gị, ahaziri site na Single-Instance Architecture, ma ọ bụ nnweta dị elu (HA) MCE Architecture na-arụ nkọwa zuru ezu n'okpuru, na-akwado ọrụ ndị dị n'okpuru ebe a, na (bron) na-arụ ọrụ nke ọma. akụrụngwa na ihe owuwu nke onyinye ọrụ MCE.
Akụrụngwa igwe ojii
Our MCE Service offers a single-tenant platform architecture built based on industry, best practices for security, compliance, and availability. All offerings are fully managed cloud environments with 24/7 availability and separate metadata servers, load balancers, firewalls, data egress, and other services to ensure ease of use. This cloud infrastructure (“Additional SaaS Components”) is available in several configurations, as described below:
- Akụrụngwa igwe ojii nyere ya na Cloud Architecture - Tier 1 na-arụ ọrụ gburugburu ebe obibi (ahapụtara na usoro dị ka "Cloud Platform for AWS-Tier 1-MCE" ma ọ bụ "Cloud Platform for Azure-Tier 1-MCE" ma ọ bụ "Cloud Platform for GCP - Tier". 1 - MCE") gụnyere ihe ndị a:
- otu (1) mmepụta ihe nwere ihe ruru 256 GB Ram;
- otu (1) ihe atụ anaghị emepụta ihe nwere ihe ruru 128 GB Ram; na
- Otu (1) ihe atụ Windows anaghị emepụta ihe nwere ihe ruru 32 GB Ram
- The cloud infrastructure provided with the Cloud Architecture – Tier 2 operating environment (designated on an order as “Cloud Platform for AWS-Tier 2-MCE” or “Cloud Platform for Azure-Tier 2-MCE” or “Cloud Platform for GCP – Tier 2
- MCE") gụnyere ihe ndị a:
- abụọ (2) mmepụta ihe (HA) nwere ihe ruru 512 GB Ram nke ọ bụla;
- otu (1) ihe atụ anaghị emepụta ihe nwere ihe ruru 256 GB Ram; na
- Otu (1) ihe atụ Windows anaghị emepụta ihe nwere ihe ruru 32 GB Ram.
- The cloud infrastructure provided with the Cloud Architecture – Tier 3 operating environment (designated on an order as “Cloud Platform for AWS-Tier 3-MCE” or “Cloud Platform for Azure-Tier 3-MCE” or “Cloud Platform for GCP – Tier 3 MCE”) includes the following components:
- abụọ (2) mmepụta ihe (HA) nwere ihe ruru 1 TB RAM nke ọ bụla;
- otu (1) ihe atụ anaghị emepụta ihe nwere ihe ruru 512 GB Ram; na
- otu (1) ihe atụ anaghị emepụta ihe nwere ihe ruru 256 GB Ram; na
- Abụọ (2) Windows anaghị emepụta ihe nwere ihe ruru 64 GB Ram nke ọ bụla.
- Akụrụngwa igwe ojii nyere ya na Cloud Architecture - Tier 4 na-arụ ọrụ gburugburu ebe obibi (ahapụtara na usoro dị ka "Cloud Platform for AWS-Tier 4-MCE" ma ọ bụ "Cloud Platform for Azure-Tier 4-MCE" ma ọ bụ "Cloud Platform for GCP - Tier". 4 - MCE") gụnyere ihe ndị a:
- abụọ (2) mmepụta ihe (HA) nwere ihe ruru 2 TB RAM nke ọ bụla;
- otu (1) ihe atụ anaghị emepụta ihe nwere ihe ruru 1 TB RAM; na
- otu (1) ihe atụ anaghị emepụta ihe nwere ihe ruru 512 GB Ram; na
- Abụọ (2) Windows anaghị emepụta ihe nwere ihe ruru 64 GB Ram nke ọ bụla.
- Architecture Cloud – Onyinye ọkọlọtọ (ahapụtara n'usoro dị ka “Cloud Architecture – AWS” ma ọ bụ “Cloud Architecture – Azure) gụnyere ihe ndị a:
- otu ọnụ (1) mmepụta nke nwere ihe ruru 512 GB Ram;
- otu (1) oghere mmepe na-abụghị mmepụta nke nwere ihe ruru 64 GB Ram; na
- otu (1) ọnụ ụlọ ọrụ anaghị emepụta ihe nwere ihe ruru 32 GB Ram.
- Additional nodes are also available to purchase through the execution of an order as an add-on to this offering. Each additional node purchased is for use in either production or non-production environments and includes up to 512 GB RAM. A customer may purchase additional nodes to create a HA production instance (inclusive of a high-performance file Sistemu) ma ọ bụ maka ojiji dị ka iche iche, gburugburu ebe kwụ ọtọ maka mmesi obi ike ma ọ bụ mmepe.
- The Cloud Architecture – Small offering (designated on an order as “Cloud Architecture – AWS Small” or “Cloud Architecture – Azure Small”) is available for purchase by certain small to medium-sized customers with less complex requirements and includes the following components:
- otu ọnụ (1) mmepụta nwere ihe ruru 128 GB Ram; na
- otu (1) ọnụ ụlọ ọrụ anaghị emepụta ihe nwere ihe ruru 16 GB Ram.
- Ihe owuwu igwe ojii - onyinye ọkọlọtọ GCP (ahapụtara n'usoro dị ka "Cloud Architecture - GCP") gụnyere ihe ndị a:
- otu ọnụ (1) nwere ihe ruru 640 GB Ram; na
- otu (1) ọnụ ụlọ ọrụ anaghị emepụta ihe nwere ihe ruru 32 GB Ram.
- Additional GCP nodes are also available to purchase through the execution of an order as an add-on to this offering. Each additional node purchased includes up to 640 GB RAM. A customer may purchase additional nodes to create a HA production instance (inclusive of a high-performance file Sistemu) ma ọ bụ maka ojiji dị ka iche iche, gburugburu ebe kwụ ọtọ maka mmesi obi ike ma ọ bụ mmepe.
- H. The Cloud Architecture – GCP Obere onyinye (ahapụtara na usoro dị ka “Cloud Architecture – GCP Small”) dị maka ịzụrụ site n'aka ụfọdụ ndị na-azụ ahịa pere mpe na ndị nwere obere ihe achọrọ ma gụnye ihe ndị a:
- otu ọnụ (1) nwere ihe ruru 128 GB Ram; na
- otu (1) ọnụ ụlọ ọrụ anaghị emepụta ihe nwere ihe ruru 16 GB Ram.
A na-enweta onyinye ndị a n'aha gị site na Microsoft Azure, Amazon Web Services, or Google Cloud Platform to host the Strategy Cloud Platform in an MCE and will be operated out of a mutually determined data center location. As part of these additional SaaS components, we will also provide you with Cloud Environment Support for your instance-based deployments and container-based deployments, as further described in this Guide, which includes support of your Strategy Cloud Platform managed by Strategy experts in the MCE. Such support also includes 24/7/365 system monitoring and alerting, daily backups for streamlined disaster recovery, updates and quarterly system reviews, na nlele nnabata na asambodo nchekwa kwa afọ. Na mgbakwunye, ndị ahịa MCE niile ga-anata ihe ruru 1 TB kwa ọnwa nke egress data na-akwụghị ụgwọ ọzọ. Dị ka akụkụ nke MCE nkeji iri na ise ọrụ review, we will advise you if your monthly data egress usage is close to or exceeds 1 TB for each MCE environment. Environments showing consistent high usage may be subject to overage charges or tier adjustments.
MCE Architecture
Customers who purchase either the AWS, Azure, or GCP Cloud Architecture – Standard or Cloud Architecture – Tier 1 offering of Strategy’s MCE Architecture will receive one Production instance, one non-Production instance, and one Windows instance from either Microsoft Azure or Amazon Web Services or GCP. Each instance consists of a single server for Strategy Intelligence Server, Web, Library, Mobile, and Collaboration. There is also a database for the Strategy metadata, statistics, insights, and collaboration services. The MCE Architecture is built to scale to thousands of end users. Deployments post June 2025 leverage container-based architecture. Some of the benefits of the two are highlighted below:
| Otu | Container-Based Deployment | Instance-Based Deployment |
| Provisioning & Security | New provisioning console with MFA for secure, streamlined access and management. | Traditional provisioning with no MFA options for customers. |
| Maintenance & Updates | Monthly updates combined with maintenance — fewer events and shorter downtime. | Separate maintenance and update cycles — more frequent events and longer downtime. |
| Iweghachite Ọdachi | Enhanced DR with shorter targets: RTO ~4 hours / RPO ~4 hours, enabling faster recovery. | Longer recovery targets: RTO ~6 hours / RPO ~24 hours. |
| scalability | Horizontal scaling enables seamless capacity expansion, with | Primarily vertical scaling, typically requiring downtime. |
| vertical scaling requiring minimal downtime. | ||
| Mgbanwe arụmọrụ | Rolling updates and restarts support configuration changes (License Key, SSO, etc.) with minimal downtime. | Many configuration changes require longer planned downtime. |
Nrụpụta MCE dị elu
Strategy’s High-Availability MCE Architecture consists of a HA Cloud Architecture spanned across multiple Availability Zones. Strategy Metadata database is also HA through a multi-Availability Zone architecture offered by cloud service providers. The High-Availability MCE Architecture is included in the Cloud Architecture Tier 2, Tier 3, and Tier 4 offerings. MCE customers may move to the next available Tier if additional non-production instances are required, listed under the Cloud Architecture section.
Gburugburu igwe ojii
As part of the Cloud Architecture, Strategy will provide Cloud Environment Support to you by maintaining your environments for the total number of instances purchased as part of an MCE Service subscription, including the following:
- Nnweta ọrụ
Service availability for both production and non-production instances is 24/7 by default. However, non-production instances may also be set to a minimum of 12/5 (aligned to the customer’s local time zone). These parameters can be adjusted based on mutual agreement. - Nyocha ihe kpatara mgbọrọgwụ (RCA)
Maka mmepụta gịtages, an RCA can be requested by the customer. Customers will receive the RCA report within ten (10) business days of the request. Cloud Support will cover all aspects regarding the diagnosis of the RCA. It may also cover product defects, security updates, operating system updates, and changes. As noted, if an RCA determines an issue to be created by a customer-specific customization, Strategy will provide options outside of Cloud Support, such as Professional Services engagements, to remedy the issue. - 24/7 Igwe na-akwado igwe ojii
Maka ihe atụ mmepụta gịtages where system restoration is paramount, a global cloud team is mobilized for prompt resolution. The Strategy Cloud team functions around the clock to support customers and maintain service SLAs. - 24/7 nlekota na ịdọ aka ná ntị
Key system parameters are monitored for all production and non-production instances. Strategy has alerts on CPU utilization, RAM utilization, disk space, application-specific performance counters, VPN Tunnel, and ODBC warehouse sources monitoring. As part of Strategy’s Cloud Elite Support Offering, customers are eligible to receive system alert notifications. - Ndabere
Daily backups are performed for all customer systems, including system state and metadata. By default, MCE customers will have a thirty (30) day backup retention period, and a monthly backup archive for the preceding eleven (11) months. All backups are inclusive of metadata, cubes, caches, images, and plugins. Biko gaa na Onye isi Akaụntụ gị maka atụmatụ ọnụahịa ndị ọzọ ma ọ bụrụ na ị nwere nkwado ndabere ọzọ chọrọ. - Ntụle ikpo okwu
Strategy Platform Analytics is set up for all Strategy customers on MCE and maintained to allow for instant access to system performance metrics. Strategy will monitor the MCE Service-based data repository and/or cube memory requirement of the Platform Analytics database. In the event the space availability is less than 20% of the allocated storage, after receiving the customer’s consent, Strategy will purge older data from the MCE Service-based Platform Analytics database in 30-day increments until the disk availability is below the 80% capacity threshold. The amount of data that the customer chooses to keep may have a corresponding cost to the customer. Contact your Account team for a cost estimate to modify the MCE Service, including increases to the data repository and/or cube memory requirements.
Nlekọta
Maintenance windows are scheduled monthly to allow for third-party security updates to be applied to the MCE platform. During these scheduled interruptions, the MCE systems may be unable to transmit and receive data through the provided services. Customers should plan to create a process that includes the pause and restart of applications, rescheduling subscriptions, and including, but not limited to, related data load routines. When it is necessary to execute emergency maintenance procedures, Strategy will notify customer-specific support liaisons via email as early as possible—identifying the nature of the emergency and the planned date and time of execution. Customers will normally receive a minimum of two weeks’ advance notification for planned maintenance windows. However, if emergency maintenance work is required, we will use commercially reasonable efforts to give 24-to 48-hour notice before applying a remedy. MCE customers are required to adhere to their monthly maintenance window. If the assigned window is not suitable, please contact your Cloud Technical Account Manager (TAM).
Ọrụ Quarterly Reviews
The assigned designated Technical Account Manager (TAM) for your MCE will conduct the Quarterly Service Reviews (QSR) with the business and technical contacts on a quarterly cadence. This may include an overview nke usoro akụrụngwa na aro dabere na hụrụ ọnọdụ.
Nnweta akụrụngwa
The MCE Service is architected to withstand the failure of an individual service to maintain availability. For HA environments, this is achieved by utilizing underlying application features and building on best practices. Strategy Cloud also utilizes the advantages nke Mpaghara nnweta (“AZ”) na AWS, Azure, na GCP.
Intra-Region Fail-Over (HA)
For Tier 2 and above, production environments are deployed across multiple Availability Zones. This provides physical separation of compute and data and allows the service to continue running if one AZ becomes unavailable.
Instance-based deployments
In the event of an AZ failure, the remaining Instance continues to run, and data remains intact (RDS and EFS are resilient across AZs). There is no data loss and no recovery downtime. Capacity may be temporarily reduced until the failed instance is replaced. Tier 1 will have an RPO (Recovery Point Objective) of 24 hours and an RTO (Recovery Time Objective) of 48 hours.
Container-based deployments
For container-based deployments in all Tiers, failover is automatic. If capacity is available in a third AZ, replacement workloads are started there. Some active sessions or jobs on the affected AZ may be interrupted, but services are restored automatically without manual intervention.
Inter-Region Disaster Recovery (DR)
Strategy’s MCE offering does not provide region failover in its standard offering. However, customers do have the option to purchase Inter-Region failover as an add-on to the standard offering at an additional cost. Strategy recommends having a
secondary data warehouse site available for Inter-Region failover when considering a disaster recovery purchase. Strategy provides the following options for Inter-region:
Instance-Based Deployments
- Hot-Cold: A failover environment is pre-provisioned in the secondary region but remains shut down until a disaster occurs in the primary region. Provides a targeted RPO of 24 hours and RTO of 6 hours.
- Hot-Warm: A failover environment is pre-provisioned in the secondary region and refreshed daily with metadata. The environment is shut down after each refresh. Provides a targeted RPO of 24 hours and RTO of 4 hours.
Container-Based Deployments
- Hot-Cold: A failover environment is provisioned in the secondary region only after a disaster occurs in the primary region. Provides a targeted RPO of 4 hours and RTO of 4 hours.
- Hot-Warm: A failover environment is provisioned in the secondary region upon disaster. Provides a targeted RPO of 30 minutes and RTO of 2 hours.
Mmelite na nkwalite
- Strategy is committed to providing the latest updates with security fixes, therefore all customers are required to take advantage of the fixes and new features. For each Product license, we will deliver to you every quarter for instance-based deployments and every month for container-based deployments at no charge and at your request, an update and/or upgrade as part of the Technical Support Services subscription. Major upgrades are completed in a free parallel environment for up to 30 days to allow for customer testing for instance-based deployments while it will be in place for container-based deployments. Updates may not include new separately marketed products. Customers requiring longer than 30 days to complete the upgrade should contact their Account Executive.
- Your TAM will work with you each quarter and/or month to schedule the updates. These updates are seamless and carry over all customizations in your Strategy environment. The customer is responsible for ensuring SDK Mobile apps are recompiled to comply with newer versions of Strategy. Customers are also encouraged to perform regression testing on the updated environment, along with data validation and testing other custom workflows.
Ọrụ na Ọrụ
The RACI (Responsible, Accountable, Consulted, Informed) Table in Appendix B highlights the roles and responsibilities of customers and Strategy. Please note that some responsibility relies on cloud service providers and, therefore, Strategy will comply with Cloud providers’ Service Level Agreement for service availability.
Non-Migrated Strategy Components
Stated below are the Strategy components that will not be hosted in the cloud. Customers are highly encouraged to move away from legacy components and leverage newer and modern replacements of such tools:
- Strategy Narrowcast Server replaced with Distribution Services
- Strategy Enterprise Manager replaced with Platform Analytics
- Legacy Office plugin (non-365 version)
The following items are supported only for connectivity to MCE. Strategy will not host them in the Cloud. These solutions may require additional assistance from Strategy Professional Services.
- IIS web ihe nkesa iji kwado MDX
- Nhazi abụghị n'ụdị ngwa mgbakwunye
Ọrụ nkesa
All Strategy Cloud customers are required to use their own SMTP server for delivery of email and history list subscriptions. File subscriptions are pushed to an Amazon S3 bucket, Azure BLOB Storage, or Google Cloud Storage, provided to the customer as part of the MCE infrastructure. Customers may pull file subscriptions from the storage locations provided during the onboarding process with their TAMs. Our Professional Services team is available to assist with any customizations that may be required to move File ndebanye aha sitere na Amazon S3, BLOB, ma ọ bụ Nchekwa igwe ojii ruo ebe achọrọ.
Akwụkwọ ikike MCE Migration
Two additional licenses are provided for Cloud operations and maintenance. These accounts are the ‘mstr’ and ‘Axx-administrator’ or ‘Cxx-administrator’ or ‘Gxx-administrator’. mstr user should never be deleted.
Ike AI
- The “AI Power User,” “AI Consumer User,” “AI Architect User,” “Strategy AI,” and “Strategy AI User” SKUs provide artificial intelligence capabilities as a part of your MCE Service (“AI Capabilities”).
- AI Capabilities are designed to accommodate various user roles, and provide AI-assisted data exploration, automated dashboard design processes, SQL generation tools, and ML-based visualization methods. The AI Capabilities within the framework of the Strategy analytics platform augment the platform’s data processing and presentation capabilities. The use of AI Capabilities may have limitations which impact the effectiveness, quality and/or accuracy of output from your MCE Service and should not replace human decision-making.
- You remain responsible for judgments, decisions, and actions you make or take based on the output of your MCE Service. You must use our AI capabilities only for the intended purpose set forth in this Guide and in the Strategy AI Security Whitepaper, available here: Strategy AI Security Whitepaper. To the extent your use of our AI offerings could potentially be classified as high risk under the EU AI Act or other applicable laws and regulations governing AI, such use is undertaken solely at your own risk and you must comply with all applicable laws and regulations governing its use and Strategy has no responsibility or liability for any loss, damage, claim, cost, or other consequence arising from or related to such use.
- Notwithstanding anything to the contrary, we may provide AI Capabilities to you from an environment that is different from the operating environment specified on your MCE Service order. You may not perform any penetration testing on the artificial intelligence service powering the AI Capabilities. Consumption-Based Licensing and Auto-Replenishment of the Strategy AI SK
- For each Strategy AI SKU quantity you license, you may consume up to twenty thousand (20,000) Questions (as defined below) for a period of up to twelve (12) months beginning on the order effective date and, in the case of a replenishment, from the beginning of the replenishment effective date (each period, a “Use Period”). Unconsumed Questions are automatically forfeited at the earlier of (a) the end of the Use Period, or (b) termination or expiry of the MCE Service term, and do not carry over to any subsequent Use Periods. Upon the earlier of the expiration of the Use Period or the full consumption of 20,000 Questions, we will automatically replenish your right to consume an additional 20,000 Questions for each licensed Strategy AI SKU quantity for a subsequent Use Period, each at the then current list price for such Strategy, unless you provide written notice to us that you desire not to auto-replenish (a) at least ninety (90) days before the expiration of the then current Use Period, or (b) before 18,000 Questions have been consumed, whichever occurs first. Strategy AI is otherwise non-cancelable by you and non-refundable.
- • For the avoidance of doubt, the foregoing does not apply to the licensing of the other AI Capability SKUs, which are licensed on a named user basis, with no limit on the number of questions. Customers purchasing the Strategy AI SKU will have access to Platform Analytics, which will include your usage in its reporting.
- One “Question” is defined as any input action taken while using the Strategy AI SKU. Below are examples nke ajụjụ:
- Azịza akpaaka (ọtụtụ nhọrọ oriri):
- One action submitted to Strategy’s Auto chatbot that returns a response constitutes consumption of one Question.
- One click on auto-populated suggestions below Strategy’s Auto chatbot input box constitutes consumption of one Question.
- Nhọrọ(s) ọ bụla na-esote nke nyocha data akwadoro bụ oriri nke ajụjụ agbakwunyere.
- SQL akpaaka:
- One action submitted to Strategy’s Auto chatbot that returns a response constitutes consumption of one Question.
- Dashboard akpaaka (nhọrọ oriri ọtụtụ):
- One action submitted to Strategy’s Auto chatbot that returns a response constitutes consumption of one Question.
- One click on auto-populated suggestions below the Strategy’s Auto chatbot input box constitutes consumption of one Question.
- Any subsequent selection(s) of the recommended data analysis constitutes consumption of an additional Question.
Agent Activation
For configurations that include any combination of “AI Power User,” “AI Consumer User,” or “AI Architect User,” customers may request additional advisory assistance related to getting started with their Agentic features (Agent Activation Advisory). Agent Activation Advisory assistance can be requested only once and is limited to the following 2 Agents, as detailed below:
- 1 Structured Agent includes: 2 datasets, 15 attributes per dataset, 15 metrics per dataset, 5 derived metrics, 1 language, and up to 5M rows per dataset.
- 1 Unstructured Agent includes: up to 3 PDF/Doc files with up to 250 pages per document.
If additional advisory services are needed, Strategy will provide options outside of Cloud Support, such as Professional Services engagements.
Nchekwa
A na-eji ngwá ọrụ nchekwa dị iche iche arụ ọrụ iji mee nnwale na nhazigharị ntinye, ntinye ihe omume sistemụ, yana njikwa adịghị ike. Ọrụ MCE na-edobe ọnọdụ nchekwa dị elu dịka ụkpụrụ nchekwa ndị a si dị:
Njikwa Òtù Ọrụ Ọrụ (SSAE-18)
- SSAE-18 bụ ụkpụrụ nyocha nke nzukọ ọrụ nke AICPA na-edobe. Ọ na-enyocha njikwa ụlọ ọrụ Ọrụ maka nchekwa, ịdị adị, na nhazi nhazi nke sistemu yana nzuzo na nzuzo nke ozi a na-ahazi. Ọrụ MCE anyị na-edobe akụkọ SOC2 Ụdị 2.
- Iwu Mbugharị na Akaụntụ Ahụike (HIPAA)
- Controls designed to protect health information
- .Payment Card Industry Data Security Standards (PCI DSS)
- Ọkọlọtọ nchekwa data ụlọ ọrụ ịkwụ ụgwọ (PCI DSS) bụ ụkpụrụ nchekwa ozi nkeonwe maka ndị otu na-ejikwa ozi ndị nwere kaadị. MCE na-edobe SAQ-D maka ndị na-enye ọrụ.
- International Organisation for Standardization (ISO 27001-2)
- International Organisation for Standardization (ISO 27001-2) bụ ọkọlọtọ njikwa nchekwa nke na-akọwapụta usoro njikwa nchekwa kachasị mma yana njikwa nchekwa zuru oke na-eso ntuziaka omume kacha mma ISO 27002.
Nyocha nchekwa MCE
Strategy will conduct a security review on all custom components provided by the customers, such as plugins, drivers, etc. Customer is responsible for the remediation of all security findings.
Ngwa ekekọrịtara igwe ojii
Dị ka akụkụ nke usoro nhazi ikpo okwu nke MCE Service na nkwado nke gburugburu igwe ojii, anyị na-ejikọta ngwọta ndị ọzọ iji nyere aka na njikwa, ntinye, na nchekwa nke akụrụngwa, na iji mezue ọrụ arụ ọrụ. Ndị a na-agụnye ngwọta nzaghachi nchịkwa na nchọpụta nchọpụta, ngwọta nlekọta ọnọdụ nchekwa igwe ojii, nlekota ngwa / akụrụngwa, ịdọ aka ná ntị na ngwọta nchịkwa oku, na ọrụ na-arụ ọrụ na ngwa ntinye aka na-aga n'ihu.
Nnweta ọrụ
MCE na-enye nkwekọrịta ọkwa ọrụ nke 99.9% maka gburugburu mmepụta HA yana ọkwa ọrụ 99% maka otu ihe atụ na-abụghị HA mmepụta gburugburu. A na-agbakọ nnweta kwa ọnwa kalịnda dị ka ndị a:

Nkọwa ọrụ
“Total Minutes”: the total number of minutes in a calendar month. “Production Instance”: an MCE Intelligence Architecture that users are running in production, in support of an operational business process.
“Unavailability”: for each Production Instance, the total number of minutes in a calendar month during which (1) the Production Instance(s) has no external connectivity; (2) the Production Instance(s) has external connectivity but is unable to process requests (i.e., has attached volumes that perform zero read- write IO, with pending IO in the queue); or (3) all connection requests made by any component of the Production Instance(s) fail for at least five consecutive minutes. “Unavailability” does not include minutes when the MCE is unavailable due to issues related to applications built on the Strategy software platform, including project, report, and document issues; migration problems related to user design; ETL application problems; improper database logical design and code issues; downtime related to scheduled maintenance; downtime experienced as a result of user activity; general internet unavailability; and other factors out of Strategy’s reasonable control.
"Ngụkọta enweghị nnweta": mkpokọta enweghị n'ofe usoro mmepụta niile.
Maka ọnwa kalenda ọ bụla nke ndị ahịa debanyere aha na MCE, a ga-agbakọ nnweta ya dabere na ọnwa kalenda niile, ọ bụghị naanị akụkụ nke ha debanyere aha.
Ọgwụgwọ ọrụ
Ọ bụrụ na emezughị ọkọlọtọ nnweta nke 99.9% (maka oge mmepụta HA) na 99% (maka ndị na-abụghị HA Production Instance) na ọnwa kalenda enyere, ndị ahịa nwere ike iru eru maka kredit ọrụ, dịka nkọwa ndị dị n'okpuru. A ga-agbakọ kredit ọrụ ọ bụla dị ka pasentịtage of the total fees paid by customers for the MCE Service, managed by Strategy within the calendar month that a Service Credit has been accrued. This is the exclusive remedy available to customers in the event Strategy fails to comply with the service level requirements set forth in the availability designed in the Service Availability section.
Ebe e si nweta ọrụ
Ihe atụ mmepụta HA:
• Availability less than 99.9% but equal to or greater than 99.84%: 1% Service Credit
• Availability less than 99.84% but equal to or greater than 99.74%: 3% Service Credit
• Availability less than 99.74% but equal to or greater than 95.03%: 5% Service Credit
• Availability less than 95.03%: 7% Service Credit
Ihe ngosi mmepụta nke na-abụghị HA:
• Availability less than 99% but equal to or greater than 98.84%: 1% Service Credit
• Availability less than 98.84% but equal to or greater than 98.74%: 3% Service Credit
• Availability less than 98.74% but equal to or greater than 94.03%: 5% Service Credit
• Availability less than 94.03%: 7% Service Credit
Usoro kredit ọrụ
- To receive a Service Credit, customers must submit a Strategy case on or before the 15th day of the calendar month following the calendar month in which the Service Credit allegedly accrues that includes the following information: (a) the words “SLA Credit Request” in the “Case Summary/ Error Message” field; (b) a detailed description of the event(s) that resulted in unavailability; (c) the dates, times, and duration of the unavailability; (d) the affected system or component ID(s) provided to customers by Strategy during onboarding and Intelligence Architecture delivery activities; and (e) a detailed description of the actions taken by users to resolve the unavailability.
- Once Strategy receives this claim, Strategy will evaluate the information provided and any other information relevant to determining the cause of the Unavailability (including, for example, information regarding the availability performance of the Intelligence Architecture, third-party software or services, dependencies on customer-hosted or subscribed software or services, operating system, and software components of the MCE). Thereafter, Strategy will determine in good faith whether a Service Credit has accrued and will notify customers of its decision. If Strategy determines that a Service Credit has accrued, then at its discretion, it will either (1) apply the Service Credit to the next MCE Service invoice sent or (2) extend the MCE Service Term for a period commensurate with the Service Credit amount. Customers may not offset any fees owed to Strategy with Service Credits.
Mwepu
In the context of Strategy MCE services delivered via a SaaS model, the following are considered exclusions for service as it concerns all matters of impacts to availability:
- Scheduled Maintenance: Service interruptions during scheduled maintenance, announced in advance, are excluded from the SLA.
- Customer Configurations: Service issues caused by customer actions, such as misconfigurations or excessive API requests, are not covered. Issues related to applications built on the Strategy software platform, including project, report, and document issues; migration problems related to user design; downtime experienced as a result of user activity.
- ETL Application: Outages caused through degradation or failure of ETL processes in the application.
- Database Issues and Configuration: Improper database logical design and code issues.
- Hyper scaler or other Third-party Services: Downtime related to third-party services or dependencies outside control is excluded.
- Force Majeure: Events beyond control of Strategy, such as natural disasters or government actions, do not qualify for SLA coverage.
- Unauthorized Access: Issues not originated by Strategy like unauthorized access or credential compromised
- Customer-Based Migration Issues: Migration problems and outages related to customer or user design.
- SSO or other Custom Security Configuration or Policies: Implementation and management of custom security policies and compliance measures outside the pre-configured, standard security settings are not included.
- Network Connectivity Issues: Issues related to the customer’s internal network or internet connectivity, including VPN configurations and local firewall settings, fall under the customer’s responsibility.
These exclusions ensure a clear boundary of responsibilities and help manage expectations for the scope and limits of Strategy MCE services within a SaaS delivery model.
Usoro dị maka ịhazi data nkeonwe
This section will apply only to the extent there is no other executed agreement in place regarding the same subject between Strategy and the customer (“Customer”), including any order(s) and/or a master agreement between the customer and Strategy (collectively, the “Governing Agreement”), and shall be considered a Data Processing Addendum (DPA). Except as amended by this DPA, the Governing Agreement will remain in full force and effect.
Nkọwa
- “Customer Group” means Customer and any affiliate, subsidiary, subsidiary undertaking and holding company of Customer (acting as a Controller) accessing or using the MCE Service on Customer’s behalf or through Customer’s systems or any other third party who is permitted to use the MCE Service pursuant to the Governing Agreement between Customer and Strategy, but who has not signed its own Order Form with Strategy.
- “Iwu Nzuzo Nzuzo data” pụtara, dị ka ọ dị mkpa, (i) Framework nke EU-US Data Nzuzo dị ka Ngalaba Azụmahịa US na-elekọta yana nke European Commission kwadoro dị ka ịgba mbọ hụ na nchekwa zuru oke maka data nkeonwe maka ebumnuche nke edemede 45 GDPR; (ii) Mgbakwunye UK na EU-US Data Framework nke ndị ikike tozuru etozu nke United Kingdom kwadoro dị ka ịgba mbọ hụ na nchekwa zuru oke maka data nkeonwe maka ebumnuche nke Nkeji edemede 45 UK GDPR; na (iii) Usoro Nzuzo data Switzerland-US dị ka Ngalaba Azụmahịa US na-elekọta ma kwadokwara ya site n'aka gọọmentị Switzerland Federal dị ka ịgba mbọ hụ na nchekwa zuru oke maka data nkeonwe maka ebumnuche nke iwu nchekwa data Switzerland dị, n'ọnọdụ nke ọ bụla dị ka ike, emezigharịrị, jikọta, megharịa ma ọ bụ dochie anya site n'oge ruo n'oge.
- “EU/UK Privacy Laws” means, as applicable: (a) the General Data Protection Regulation 2016/679 (the “GDPR”); (b) the Privacy and Electronic Communications Directive 2002/58/EC; (c) the UK Data Protection Act 2018, the UK General Data Protection Regulation as defined by the UK Data Protection Act 2018 as amended by the Data Protection, Privacy and Electronic Communications (Amendments etc.) (EU Exit) Regulations 2019 (together with the UK Data Protection Act 2018, the “UK GDPR”), and the Privacy and Electronic Communications Regulations 2003; and (d) any relevant law, directive, order, rule, regulation or other binding instrument which implements any of the above, in each case, as applicable and in force from time to time, and as amended, consolidated, re-enacted or replaced from time to time.
- “Personal Data” means any information that Strategy processes on behalf of Customer to provide the Services that is defined as “personal data” or “personal information” under any Privacy Law. “Privacy Laws” means, as applicable, EU/UK Privacy Laws, US Privacy Laws, and any similar law of any other jurisdiction which relates to data protection, privacy, or the use of Personal Data, in each case, as applicable and in force from time to time, and as amended, consolidated, re-enacted or replaced from time to time.
- “Security Incident” means the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, any Personal Data. For the avoidance of doubt, an unsuccessful attempt that does not result in the unauthorized access to Personal Data or to any of Strategy’s or Strategy’s Sub-Processors’ equipment or facilities storing Personal Data, including, without limitation, pings and other broadcast attacks on firewalls or edge servers, port scans, unsuccessful logon attempts, denial of service attacks, packet sniffing (or other unauthorized access to traffic data that does not result in access beyond headers), or similar incidents shall not be considered a Security Incident. “Sub-Processor” means any third party appointed by Strategy to process personal data.
- “Third Country” means any country or territory outside of the scope of the data protection laws of the European Economic Area or the UK, as relevant, that has not been approved as providing adequate protection for Personal Data by the
- relevant competent authority from time to time.
“US Privacy Laws” means, as applicable, the California Consumer Privacy Act, Colorado Privacy Act, Connecticut Data Privacy Act, Delaware Personal Data Privacy Act, Florida Digital Bill of Rights, Indiana Consumer Data Protection Act, Iowa Consumer Data Protection Act, Montana Consumer Data Privacy Act, Oregon Consumer Privacy Act, Tennessee Information Protection Act, Texas Data Privacy and Security Act, Utah Consumer Privacy Act, and Virginia Consumer Data Protection Act, and any similar law of any other state related to the processing of Personal Data.
Nhazi data
As a Processor, Strategy will process the Personal Data that is uploaded or transferred to the MCE Service as instructed by Customer or provided by Customer as Controller in accordance with Customer’s documented instructions. Customer authorizes Strategy, on its own behalf and on behalf of the other members of its Customer Group, to process Personal Data during the term of this DPA as a Processor for the purpose set out in the table below.
Data nkeonwe n'ihe metụtara Ọrụ MCE
| Data nkeonwe n'ihe metụtara Ọrụ MCE | |
| Isiokwu okwu nhazi | Storage of data, including, without limitation Personal Data, provided by Customer for its business purpose |
| Ogologo oge nhazi | Oge ọrụ MCE na ụbọchị 90 na-esote njedebe nke okwu a |
| Ụdị nhazi | Nchekwa, ndabere, mgbake, na nhazi nke data nkeonwe n'ihe metụtara Ọrụ MCE. |
| Ebumnuche nke nhazi | Enyemaka nke Ọrụ MCE |
| Ụdị data nkeonwe | Data nkeonwe ebugoro ma ọ bụ bufee maka nhazi site na Ọrụ MCE site n'aka onye ahịa |
| Otu nke isiokwu data | Employees or agents of the Customer and Customer’s customers, prospects, business partners, vendors, and those individuals who have been authorized to use the MCE Service by the Customer |
Strategy may aggregate and/or anonymize Personal Data such that it no longer constitutes Personal Data under Privacy Laws and process such data for its own purposes. To the extent Strategy receives de-identified data (as such term is defined under applicable US Privacy Laws) from Customer, Strategy shall:
- take commercially reasonable measures to ensure that the data cannot be associated with an identified or identifiable individual;
- publicly commit to maintain and use the data only in a de-identified form and not attempt to re-identify the data; and
- otherwise comply with applicable US Privacy Laws with respect to such de-identified data. Customer will take all measures possible to avoid transferring or providing us with any access to any Personal Data to the extent possible while continuing to use the MCE Service.
In processing Personal Data under the Agreement, Strategy will:
- only process Personal Data on documented instructions from Customer which the Parties agree that this DPA is Customer’s complete and final documented instruction to Strategy in relation to Personal Data (which the parties agree are reflected in full in this DPA), for the limited and specific purpose described in the table above, and at all times in compliance with Privacy Laws, unless required to process such Personal Data by applicable law to which Strategy is subject; in such a case, Strategy shall inform Customer of that legal requirement before processing, unless that law prohibits such information on important grounds of public interest;
- mee ka onye ahịa mara n'egbughị oge ma ọ bụrụ na ọ: (i) mee mkpebi na ọ nweghịzi ike iru ọrụ ya n'okpuru Iwu Nzuzo US ma ọ bụ (ii) kwenyere na ntuziaka onye ahịa, na-emebi iwu nzuzo dị;
- to the extent required by Privacy Laws, and upon reasonable written notice that Customer reasonably believes Strategy is using Personal Data in violation of Privacy Laws or this DPA, grant Customer the right to take reasonable and appropriate steps to help ensure that Strategy uses the Personal Data in a manner consistent with Customer’s obligations under Privacy Laws, and stop and remediate any unauthorized use of the Personal Data; and
- chọrọ ka onye ọrụ ọ bụla ma ọ bụ onye ọzọ na-ahazi data nkeonwe nọ n'okpuru ọrụ nzuzo dabara adaba n'ihe gbasara data nkeonwe.
- To the extent required by applicable Privacy Laws, Strategy will not:
- ree Data nkeonwe ma ọ bụ kesaa data nkeonwe maka ebumnuche mgbasa ozi omume cross-context;
- retain, use, or disclose the Personal Data outside of the direct business relationship between Strategy and Customer and for any purpose other than for the specific purpose of performing the Services; and
- combine the Personal Data received from, or on behalf of, Customer with any Personal Data that may be collected from Strategy’s separate interactions with the individual(s) to whom the Personal Data relates or from any other sources, except to perform a business purpose or as otherwise permitted by Privacy Laws.
Ọrụ ndị ahịa
Customer shall comply with all Privacy Laws in providing Personal Data to Strategy in connection with the Services. Customer represents and warrants that:
- the Privacy Laws applicable to Customer do not prevent Strategy from fulfilling the instructions received from Customer and performing Strategy’s obligations under this DPA;
- all Personal Data was collected and at all times processed and maintained by or on behalf of Customer in compliance with all Privacy Laws, including with respect to any obligations to provide notice to and/or obtain consent from individuals; and
- Customer has a lawful basis for disclosing the Personal Data to Strategy and enabling Strategy to process the Personal Data as set out in this DPA. Customer shall notify Strategy without undue delay if Customer makes a determination that the processing of Personal Data under the Agreement does not or will not comply with Privacy Laws, in which case, Strategy shall not be required to continue processing such Personal Data.
Sub-nhazi
To the extent Strategy engages any Sub-Processors to process Personal Data on its behalf:
- Customer hereby grants Strategy general written authorization to engage the Sub-Processors set out on the Strategy’s websaịtị, ugbu a na: https://community.strategy.com/article/strategy-sub-processors (as such website addresses may be amended or replaced from time to time), subject to the requirements of this section.
- If Strategy appoints a new Sub-Processor or intends to make any changes concerning the addition or replacement of any Sub-Processor which will process Personal Data that Strategy is processing on behalf of Customer, Strategy shall update the websites set out in Section 5.4(a) above and inform Customer of such update via e-mail if the new or replacement Sub-Processor will process any Personal Data. If Customer fails to object to the appointment or replacement within thirty (30) days of its posting on reasonable and documented grounds related to the confidentiality or security of Personal Data or the subcontractor’s compliance with Privacy Laws, Strategy may proceed with the appointment or replacement. If Customer reasonably objects to a new Sub-Processor, Customer shall inform Strategy in writing within thirty (30) days following the update of the applicable Sub-Processor list and such objection shall describe Customer’s legitimate reasons for objection. Strategy shall have the right to cure any objection by, in its sole discretion, either choosing to (i) take any corrective steps requested by Customer in its objection (which steps will be deemed to resolve Customer’s objection) and proceed to use the Sub-Processor or (ii) suspend and/or terminate any product or service that would involve the use of the Sub-Processor.
- Strategy shall engage Sub-Processors only pursuant to a written agreement that contains obligations on the subcontractor which are no less onerous on the relevant subcontractor than the obligations on Strategy under this DPA.
- In the event Strategy engages a Sub-Processor to carry out specific processing activities on behalf of Customer pursuant to EU/UK Privacy Laws, where that Sub-Processor fails to fulfil its obligations, Strategy shall remain fully liable under applicable EU/UK Privacy Laws to Customer for the performance of that Sub-Processor’s obligations.
Nyefe nke data nkeonwe
Customer acknowledges and agrees that Strategy may appoint an affiliate or third-party Sub-Processor to process the Personal Data in a Third Country, in which case, Strategy shall ensure that any Personal Data transferred to such affiliate or third-party shall be done so pursuant to a valid data transfer mechanism under EU/UK Privacy Laws, such as the Data Privacy Framework (if applicable) or the standard contractual clauses for the transfer of Personal Data to third countries.
Nchekwa nke nhazi data
Strategy shall, taking into account the state-of-the-art, the costs of implementation and the nature, scope, context and purpose of the processing, implement appropriate technical and organizational measures designed to provide a level of security appropriate to the risk. Customer may also elect to implement appropriate technical and organizational measures in relation to Customer Personal Data, directly from Strategy’s Sub-Processor. Such appropriate technical and organizational measures include:
- Pseudonymization na nzuzo iji hụ na ọkwa nchekwa kwesịrị ekwesị;
- Usoro iji hụ na nzuzo na-aga n'ihu, iguzosi ike n'ezi ihe, nnweta, na nkwụghachi nke usoro nhazi na ọrụ ndị ahịa nyere ndị ọzọ;
- Usoro iji mee ka onye ahịa nwee nkwado ndabere na mpaghara nchekwa nke ọma iji weghachi nnweta na ịnweta data nkeonwe onye ahịa n'oge n'oge ihe omume anụ ahụ ma ọ bụ nka; na
- Usoro maka ịnwale mgbe niile, nyocha na nyocha ịdị irè nke usoro teknụzụ na nhazi nke ndị ahịa mejuputara.
Ozi Mmebi Nchekwa
To the extent required by Privacy Laws, Strategy shall without undue delay notify Customer of any Security Incident, with further information about the Security Incident provided in phases as more details become available. For the avoidance of doubt, Strategy’s obligation to report or respond to a Security Incident, including without limitation, under this section, is not and will not be construed as an acknowledgement by Strategy of any fault or liability of Strategy with respect to the Security Incident.
Nyocha
Upon reasonable request of Customer, Strategy shall make available to Customer such information in its possession as is reasonably necessary to demonstrate Strategy’s compliance with its obligations under this DPA, and allow for and contribute to audits by providing written responses to questionnaires and copies of relevant documents. As an alternative to an audit performed by the Customer, to the extent permitted by Privacy Laws, Strategy may arrange for a qualified and independent auditor to conduct, at Customer’s expense, an assessment of Strategy’s policies and technical and organizational measures in support of its obligations under Privacy Laws using an appropriate and accepted control standard or framework and assessment procedure for such assessment, and will provide a report of such assessment to Customer upon reasonable request. Notwithstanding the foregoing, in no event shall Strategy be required to give Customer access to information, facilities, documents or systems to the extent doing so would cause Strategy to be in violation of confidentiality obligations owed to other customers or its legal obligations.
Customer acknowledges and agrees that our rights to audit our Sub-Processors referred to in the Transfers of Personal Data section above will be subject to the terms we have in place with each such Sub-Processor and will likely involve: (i) using external auditors to verify the adequacy of security measures including the security of the physical data centers from which the Sub-Processor provides the Services; (ii) ISO 27001 standards or other such alternative standards that are substantially equivalent to ISO 27001; and (iii) the generation of an audit report (“Report”), which will be the Sub-Processor’s confidential information or otherwise be made available subject to a mutually agreed upon non-disclosure agreement covering the Report (“NDA”). Strategy may not be able to disclose such Report to Customer without permission from the Sub-Processor. At Customer’s reasonable written request during the exercise of its audit rights under the Independent Determination section below, Strategy will request the permission to provide Customer with a copy of such Report so that Customer can reasonably verify the Sub-Processor’s compliance with its security obligations, provided that Customer acknowledges that the Sub-Processor may require Customer to enter into an NDA with such Sub-Processor before releasing the same.
Mkpebi nnwere onwe
Onye ahịa na-ahụ maka reviewing the information made available by Strategy and its Sub-Processor relating to data security and making an independent determination as to whether the MCE Service meets Customer’s requirements and legal obligations, as well as Customer’s obligations under this DPA.
Enyemaka
To the extent required by Privacy Laws, and taking into account the nature of the processing, Strategy shall, in relation to the processing of Personal Data and to enable Customer to comply with its obligations which arise as a result thereof, provide reasonable assistance to Customer, through appropriate technical and organizational measures, in: responding to requests from individuals pursuant to their rights under Privacy Laws, including by providing, deleting, or correcting the relevant Personal Data, or by enabling the Customer to do the same, insofar as this is possible;
- responding to requests from individuals pursuant to their rights under Privacy Laws, including by providing, deleting, or correcting the relevant Personal Data, or by enabling the Customer to do the same, insofar as this is possible;
- imejuputa usoro nchekwa ezi uche dị na ya na omume dabara adaba na ọdịdị nke data nkeonwe iji kpuchido data nkeonwe site na ịnweta ikike na-akwadoghị ma ọ bụ mmebi iwu, mbibi, ojiji, mgbanwe, ma ọ bụ mkpughe;
- ịgwa ndị ọchịchị tozuru oke na/ma ọ bụ ndị o metụtara ihe mberede nchekwa ọ bụla;
- na-eduzi ntule mmetụta nchedo data na, ọ bụrụ na achọrọ ya, tupu ya na ndị ọchịchị tozuru etozu kparịta ụka; na
- ịbanye na DPA a.
Nlaghachi ma ọ bụ ihichapụ data ndị ahịa
Due to the nature of the MCE Service, Strategy’s Sub-Processor provides Customer with controls that Customer may use to retrieve Customer Data in the format in which it was stored as part of the MCE Service or delete Customer Data. Up to the termination of the Governing Agreement between Customer and MicroStrategy, Customer will continue to have the ability to retrieve or delete Customer Data in accordance with this section For 90 days following that date, Customer may retrieve or delete any remaining Customer Data from the MCE Service, subject to the terms and conditions set out in the Governing Agreement, unless (i) it is prohibited by law or the order of a governmental or regulatory body, (ii) it could subject MicroStrategy or its Sub-Processors to liability, or (iii) Customer has not paid all amounts due under the Governing Agreement. No later than the end of this 90-day period, Customer will close all MicroStrategy accounts. MicroStrategy will delete Customer Data when requested by Customer through the MCE Service controls provided for this purpose.
Ihe mgbakwunye A – Onyinye Nkwado igwe ojii
| Support Detail | Nkwado igwe ojii | Nkwado Cloud Elite |
| Onye njikwa akaụntụ nka nka igwe ojii ahapụtara | Ee | Ee |
| Ọnụọgụ nke Mmekọrịta Nkwado ahọpụtara | 4 | 8 |
| Ngafe agụmakwụkwọ Architect | 0 | 8 |
| Oge nzaghachi mbụ maka okwu P1 na P2* | P1 <2 awa P2 < 2 awa | P1 <15 nkeji P2 <1 elekere |
| P1 na P2 na-ewepụta mmelite | Ka ọnọdụ na-agbanwe ma ọ bụ kwa ụbọchị | P1 every 1 hour P2 as statuschanges or twice aday |
| Nzukọ nchịkwa ikpe | Mba | Kwa izu |
| Amamọkwa ọkwa sistemụ | Mba | Ee |
| Mkpesa ọrụ nke anọ | Site na email | Site nzukọ |
| Location-based 24/7 support | Mba | Ee |
Ihe mgbakwunye B - eserese RACI
| Ọrụ | Nkọwa | MCEỌkọlọtọ | Onye ahịa |
| Igwe ojii Platform | |||
| Wulite gburugburu | Ihe nrụpụta akpaaka, oke nchekwa, wdg. | RA | CI |
| Nlekọta akụrụngwa | Monthly/EmergencyMaintenance Windows, OS Updates | RA | I |
| Nhazigharị gburugburu | Na-ewelite/Mbelata nke VM | RA | CI |
| Njikwa akụrụngwa | All cloud components, such as VMs, Storage, DBMS (for MD/PA) | RA | |
| Ndabere | Gbakọọ ihe atụ, cache/cubes files, MD Repository, ODBC, and Configfiles | RA | |
| weghachi | Gbakọọ ihe atụ, cache/cubes files, MD Repository, ODBC na Configfiles | RA | CI |
| 24/7 Nkwado | RA | ||
| Nchekwa & nnabata | |||
| ISO27001 | Certifications with 3rd-party audit | RA | I |
| SOC2/ụdị 2 | Certifications with 3rd-party audit | RA | I |
| GDPR | Asambodo nwere nyocha nke ime | RA | I |
| PCI | Asambodo nwere nyocha nke ime | RA | I |
| HIPAA | Certifications with 3rd-party audit | RA | I |
| 24/7 SecurityIncident Event Management | Security logs sent to SIEM for automatic analysis | RA | I |
| Njikwa adịghị ike | Nyochaa, mmezigharị na-agbaso ụkpụrụ NIST | RA | I |
| Nnwale ịbanye | Nyocha gburugburu ebe obibi nke anọ kwa nkeji | RA | I |
| Data ezoro ezo na ezumike | AES 256 izo ya ezo na mpịakọta nchekwa na MD DB | RA | I |
| nlekota oru | |||
| Ngwa akụrụngwa akụrụngwa | VM, Nchekwa, DBMS (maka MD/PA), Ngwa netwọkụ | RA | I |
| Ọrụ Ngwa | Strategy Components like I- Server, WebNgwa, wdg. | RA | I |
| Njikọta data | VPN, PrivateLink | RA | CI |
| Nchọpụta mbubata | SIEM | RA | I |
| Ịbanye | Ibu ibu ndekọ ndekọ ego, wdg. | RA | |
| Isi iyi data na njikọ ọdụ data | Nkwanye / nhazi nke ọwara VPN, njikọ nkeonwe, ụzọ Express, wdg. | RA | RA |
| Strategy Application Administration | |||
| Nrụtụ aka Architecture | MCE Architecture | RA | I |
| Nkwalite | Nkwalite nyiwe site na gburugburu ndị yiri ya | R | ACI |
| Mmelite | N'elu mmelite kachasị elu - ọ nweghị ebe yiri ya achọrọ | R | ACI |
| Post Upgrade QA(Availability of the Services) | Nnwale na nkwado nke ahụike/ọdịdị ọrụ | RA | CI |
| Nnwale nlọghachi azụ mgbe nkwalite | Ndaghachi azụ ndị ahịa na ule / asambodo ọrụ | I | RA |
| Data ndị ahịa | Data ndị ahịa | RA | |
| Strategy Project Development | Ụlọ ọdịnaya na nnyefe | RA | |
| Strategy Project and I- Server Configuration | Ntọala Project na I-Server kpọmkwem | RA | |
| Nhazi | Usoro ọrụ nkeonwe, plugins/SDK Customizations, Strategy Web nhazi ngwa ọdịnala | CI | RA |
| Strategy Application User Permissions | Ndị ahịa na-achịkwa onye nwere ike ịnweta ihe akụkọ | RA | |
| Haziri nyocha | Ụzọ nyocha nke SSO na OIDC kwadoro | R | ACI |
| Ụdị metadata | Iwu ụlọ | RA | |
| Ntụle ikpo okwu | Initial configuration only +Monitoring of availability of the services | RA | |
| Ihe nkesa SMTP maka ọrụ nkesa | DS nke MCE gị zitere site na sava SMTP nke gị | CI | RA |
| FileNdebanye aha | Ndị ahịa na-ahazi iziga ọdịnaya gaa files on disk (Blob or Amazon S3, or Google CloudStorage) | RA | CI |
| Plugins | CI | RA | |
| Ngwa ngwaahịa/POC | |||
| Njikwa ọrụ | Aligning internal resources to complete activities. Highlighting areas of customer responsibility(SE led) | RA | CI |
| BuildEnvironment (Vanilla) | Dabere na ikpo okwu na mpaghara nhọrọ | RA | CI |
| Strategy MD Restore | Weghachite MD na ihe ndị ọzọ | RA | CI |
| Nhazi gburugburu | Ntọala I-Serva, URL nhazi, nhazi nyocha, Web Ngwa Bugharịa, Ndị ọkwọ ụgbọ ala ODBC omenala | RA | CI |
| Njikọ netwọkụ | Njikọta na ogige maka ịnweta ime | RAC | ACI |
| Nhazi | Usoro ọrụ nkeonwe, plugins/SDK Customizations, Strategy Web nhazi ngwa ọdịnala | CI | RAC |
| Nnwale | Testing to ensure the success criteria are met (SE led with the customer) | CI | RA |
| Mbugharị | |||
| Njikwa ọrụ | Aligning internal resources tocomplete activities. Highlighting areas of customer responsibility | R | ACI |
| Nkwalite ngwa | Nweta nkwalite MD na ihe ndị ọzọ na ụdị kachasị ọhụrụ | RA | CI |
| Strategy MD Restore/Refresh | Weghachite/Megharịa MD na arịa ndị ọzọ | RA | CI |
| Nhazi gburugburu | Ntọala I-Serva, URL customization ,Authentication setup, Web Ngwa Bugharịa, Ndị ọkwọ ụgbọ ala ODBC omenala | RA | CI |
| Njikọ netwọkụ | Njikọta na ogige maka ịnweta ime | RAC | ACI |
| Nhazi | Usoro ọrụ nkeonwe, plugins/SDK Customizations, StrategyWebnhazi ngwa ọdịnala | CI | RAC |
| Post Upgrade QA(Availability of the Services) | Nnwale na nkwado nke ahụike/ọdịdị ọrụ | RA | CI |
| Nnwale nlọghachi azụ mgbe nkwalite | Ndaghachi azụ ndị ahịa na ule / asambodo ọrụ | CI | RA |
Akwụkwọ / akụrụngwa
![]() |
Strategy MCE Software [pdf] Ntuziaka onye ọrụ MCE Software, MCE, Software |

