• Login
  • Status
  • Support
  • Partners
  • Pricing
  • Careers
  • ENLanguages
    • English
    • Deutsch
    • Français
    • 日本
    • 简体中文
    • العربية
    • 한국
    • Español
Customer Experience (CX) AI Platform
  • Customer Experience (CX) AI Platform×
  • Platform

      CXone Mpower Platform

      • Platform Overview

        Complete AI platform for customer service automation

      • Enlighten AI

        Powering smarter CX with AI-driven insights and automation.

      • Cloud Architecture

        Innovative cloud-native foundation to rapidly scale extraordinary CX

      • Dashboards & Reporting

        Gain a full operational picture of your contact center, with enhanced visualization of real-time and historical insights

      • Integrations

        Seamlessly connect your business systems with our platform

      • Trust & Compliance

        Securing your trust with every interaction

      Discover the full value of AI in customer service

      Understand the benefits and cost savings you can achieve by embracing AI, from automation to augmentation.

      Calculate your savings

    • Products
      • Explore all Products

      • Capabilities

      • Interaction Orchestration

        Interaction Orchestration

        Orchestrate all interactions and workflows across every customer service touchpoint.

        Learn more

        • Omnichannel Routing

          Reduce wait times and boost conversions with smart customer-agent matching.

        • Proactive Engagement

          Generate more revenue, minimize hang-ups, and proactively connect to reduce friction.

        • AI Orchestrator

          Unify and optimize every customer service workflow from intent to fulfillment.

      • Workforce Augmentation

        Workforce Augmentation

        Amplify team performance with specialized AI copilots for every role.

        Learn more

        • Specialized AI Copilots

          Elevate human performance with specialized AI copilots for every role.

        • Workforce Engagement Management

          Elevate employees, adapt to flexible work, and meet expectations - without compromise.

        • Automated Agent Notetaking

          Instantly summarize interactions - accelerating resolution times and agent efficiency.

        • Voice of the Customer

          Unlock customer insights to enhance experiences, drive loyalty, and boost business growth.

        • Interaction Analytics

          Gain AI-powered insights from 100% of interactions to drive continuous improvement.

      • Service Automation

        Service Automation

        Automated customer self-service solutions increasing retention rates.

        View Products

        • Intelligent Virtual Agent

          Boost self-service satisfaction and conversion with conversational AI agents.

        • Experience Optimization (XO)

          Synthesize real customer conversations to identify your top automation opportunities.

        • Proactive AI Agent

          Keep customers engaged in conversation from onboarding to installation, service, and retention.

        • Knowledge Management

          Activate AI-powered enterprise knowledge to increase self-resolution rates and loyalty.


      • Solutions

      • By Industry

        By Industry

        • BPO

          Business Process Outsourcers

        • Financial Services

          Customer experiences that count

        • Government

          Elevate citizen trust

        • Healthcare

          Healthy patient experiences

        • Insurance

          Secure policyholder experiences

        • Retail

          Delight customers where they shop

        • Telecom

          CX for Telecommunications

        • Travel & Hospitality

          Boost traveler and guest loyalty

        Discover the full value of AI in customer service

        Understand the benefits and cost savings you can achieve by embracing AI, from automation to augmentation.

        Calculate your savings

      • By Business Initiative

        By Business Initiative

        • Grow Revenue

          Boost conversions and win rates to accelerate growth

        • Engage & Empower Employees

          Create a workplace of truly engaged employees

        • Boost Customer Loyalty

          Improve customer loyalty on interactions across the journey

        • Drive Digital Transformation

          Integrate digital technology at the center of CX

        • Small and Medium Business

          Drive growth and boost revenue with smarter, cost-effective customer service built for SMBs.

        • Call Center Software

          Empower agents to provide better experiences

        • Increase Operational Efficiency

          Leverage AI and automation to increase agent retention

        • Move to the Cloud

          Elevate experiences by moving operations to the cloud

        • Improve Compliance

          Protect your consumers with pre-built compliance solutions

        • Proactive Customer Engagement

          Elevate customer satisfaction with proactive conversational AI

      • Integrations & Custom Solutions

        Integrations & Custom Solutions

        • CXexchange Marketplace

          Discover partner solutions to extend capabilities on our platform

        • Pre-Built Integrations

          Seamlessly connect your business systems with our platform

        • Developer Tools & APIs

          Endless customization options with RESTful APIs and robust SDKs

        • Partner Ecosystem

          Embark on a journey of shared success and collaboration

        91% of customers recommend NiCE as a preferred CCaaS vendor

        Gartner® named NiCE the only Customers’ Choice CCaaS vendor in its 2024 Peer Insights™ “Voice of the Customer for Contact Center as a Service” report.

        Get report


      • View All Products
    • Services
      • Explore all Services

      Professional Services

      • Professional Services

        Industry-leading expertise, tools and know-how

      • Implementation Partners

        NICE-certified implementation partners

      • Business Consulting

        Your partner for successful transformation

      Training

      • Contact Center Training

        Tailored education delivered by CX experts

      Support & Assistance

      • Customer Support

        Global support you can depend on

      Make the smartest buying decision with the latest Gartner analysis

      NiCE has been named a Gartner® Magic Quadrant™ Leader for Contact Center as a Service for the 10th consecutive year and is positioned furthest on Completeness of Vision.

      Get report

    • Resources

        Knowledge Base

        • All Resources

          Whitepapers, datasheets, demos and more

        • Analyst Perspectives

          Contact center reports from third party analysis

        • Terms Glossary

          Detailed descriptions of industry-related terms

        • FAQs

          Contact center focused frequently asked questions

        • Guides

          Expert insights for superior CX

        Learning & Insights

        • On-Demand Webinars

          Browse our extensive webinar catalog

        • Interactive Product Tours

          Explore the complete platform with our self-guided demos

        • Blog

          CX industry guidance by contact center experts

        • Why NiCE? Video Series

          Step Inside The Room Where It Happened to see CX AI in action

        • NiCE & Simple: Video Demo Series

          Brilliant, bite-sized videos from our top product pros

        Community

        • Events

          Upcoming events and webinars

        • Customer Stories

          Our customer's success is paramount. Read case studies about real CX transformation

        • NiCE Clubs

          Collaborate, learn, and share best practices for customer service excellence

        Join us at the Largest CX Event of the Year!

        Registration is open! Interactions 2025: June 16-18, 2025. Aria Hotel, Las Vegas

        Register now

      • Company

          Company

          • About Us

            Powering seamless cloud experiences

          • Investors

            Investors relations, reports and filings

          • Global Offices

            Interactive map of locations worldwide

          • Careers

            View job openings and learn about our culture

          • NiCE Leadership

            Meet our global leadership and executive team

          News & Media

          • Events

            Upcoming events and webinars

          • Press Releases

            Find the latest updates from NiCE

          • Media Center

            Media contacts and resources

          Corporate Governance

          • NiCE Trust Center

            Securing your trust with every interaction

          • Market Leadership

            Discover why NiCE is the market leader

          • Corporate Responsibility

            In a world where you can be anything, be NiCE

          Join us at the Largest CX Event of the Year!

          Registration is open! Interactions 2025: June 16-18, 2025. Aria Hotel, Las Vegas

          Register now

          • ENLanguages
            • English
            • Deutsch
            • Français
            • 日本
            • 简体中文
            • العربية
            • 한국
            • Español
          • Get Started
            • Login
            • Status
            • Support
            • Partners
            • Pricing
            • Careers
          • Home
          • Company
          • Legal Policies and Guidelines
          • Enterprise Terms and Conditions
          • Cloud Services Technical and Organizational Measures

          Company

          • About Us
          • Careers
          • Global Leadership
          • Media Center
          • Investors
          • Awards
          • Global Office Locations
          • Contact Us
          • CCaaS
          • Customer Experience
          • NiCE Public Safety
          • NiCE Actimize
          • NiCE RPA

          Partners

          • NiCE Partners Overview
          • Developer Partners (DEVone)
          • CXone Mpower Partner Portal
          • NiCE Help Partner Portal
          • NiCE User Group

          Customer Support

          • Customer Support Overview
          • CXone Mpower Support Login
          • NiCE Customer Support
          © 2025 NiCE
          • Terms of Use
          • Site Map
          • Privacy Policy
          • Legal
          • Cookies Settings
          • Accessibility

          Stay Connected

          © 2025 NiCE

          Cloud Services Security Terms

          This Cloud Services Security Terms (“Security Terms”) are incorporated into and made a part of the Master Relationship Agreement or such other written or electronic agreement between NiCE and Customer for the purchase of Cloud Services (“Agreement”). Except as otherwise set forth herein, defined terms used in these Security Terms shall have the meanings provided in the Agreement.

          I. Purpose

          These Security Terms describes the information security standards NiCE implements and follows in its business and in the provision of Cloud Services. These Cloud Security Terms do not apply to trial, beta, evaluation, or free Cloud Services, nor to third-party products or services sold but not developed by NiCE. NiCE may update these Security Terms from time to time to reflect changes in NiCE’s security program provided such changes do not materially diminish the level of security provided herein.

          II. Company Security

          1. Overview. This Section II (Company Security) describes the information security controls NiCE implements and follows for the protection of its IT systems, networks, facilities and assets (“Company Systems”), and any Confidential Information accessed or processed therein, from anticipated threats or hazards, unauthorized or unlawful access, use, disclosure, alteration, or destruction, and accidental loss, destruction or damage (“Company Security Program”). The Company Security Program has technical and organizational measures that are appropriate to the nature, size, and complexity of NiCE’s business operations, the resources available to NiCE, the type of information that NiCE stores, and the need for security and confidentiality of such information.
          2. Company Security Policies. NiCE has and maintains company information security policies (“Company Security Policies”) designed to educate its employees, contractors, and vendors on the appropriate use, access, and storage of Confidential Information. The Company Security Policies include access restrictions for personnel who have a ‘need to know’ such information, policies preventing terminated employees from accessing NiCE’s information and information systems post-termination and imposing disciplinary measures for failure to abide by the Company Security Policies.
          3. Risk Assessment and Change Management. NiCE uses a risk-based methodology to help it reasonably identify internal and external risks to the Company Systems and information resources and decide whether the Company Security Program is sufficient or needs to be updated to address any identified risks. NiCE uses a change management process to ensure any changes to the Company Security Program or Company Security Policies are reviewed, tested, and approved.
          4. System Access Controls. NiCE uses monitoring and logging tools to help detect and prevent unauthorized access to its networks and systems. NiCE’s monitoring includes a review of Company Systems use through authentication and privileged access controls based upon the principle of least privilege through secure authentication, authorization mechanisms, and access control rules that take into account the risk associated with the particular information system, and the type of information stored therein. Access logs are maintained on a centralized repository, to allow for security review and analysis by the security team. Such logs include log-on, failover attempts and log off attempts. Users must authenticate with two-factor authentication prior to accessing NiCE servers or systems. Personal devices used to access NiCE systems must be enrolled in the NiCE portal for security and access controls.
          5. Threat and Vulnerability Management. NiCE monitors the Company Systems and the technology implemented therein for vulnerabilities that are acknowledged by third-party vendors, reported by researchers, or discovered internally. Any such vulnerabilities are identified for mitigation or fixes based on severity level. NiCE or third parties acting at its direction periodically perform network vulnerability and penetration tests on the Company Systems. NiCE uses real-time anti-virus and malware solutions to protect the Company Systems and its personnel’s computers against viruses, worms, and other forms of malicious code that may cause damage. Definition updates are performed and monitored on an automated basis.
          6. Training. All NiCE employees and contractors are required to receive training on Company Security Policies upon hiring/onboarding and on an annual basis thereafter to maintain compliance with the Company Security Policies. Additional, more in-depth training may be required based on the roles and responsibilities performed by such personnel. NiCE also implements periodic security awareness campaigns to educate its personnel and to maintain a secure work environment.
          7. Secure Product Development. When developing its software and technologies, NiCE employs a methodology for the acquisition, development, configuration, maintenance, modification, and management of such technology with the intent of maximizing its inherent security. Source code access is restricted to authorized personnel only. NiCE uses a risk-based approach when applying such methodology to production software, which may include activities such as performing security architecture reviews, open-source security scans, dynamic application security testing, network vulnerability scans, code review, and external penetration testing in the development environment. NiCE scans packaged software to ensure it’s free from trojans, viruses, malware and other malicious threats.
          8. Storage and Secure Disposal. NICE’s Company Security Policies contain procedures and controls regarding the secure disposal of tangible and intangible materials containing Confidential Information, which are designed to ensure such Confidential Information cannot be viewed or reconstructed when possible.
          9. Third-Party Vendors. NiCE puts each third-party vendor and its partners through a rigorous due diligence process, including privacy and security reviews for those with access to Confidential Information, including Content and personal data (as defined under the General Data Protection Regulation (EU) 2016/679 (“GDPR”)) (“Personal Data”), prior to contracting with any such third party. Third-party vendors are subject to contractual obligations of confidentiality and risk assessments to determine the sensitivity of information being shared. Vendors are expected to comply with any pertinent contract terms relating to the confidentiality and security of data, as well as any applicable NiCE policies or procedures such as the NiCE Supplier Code of Conduct. Periodically, NiCE may re-evaluate a vendor and its security posture to help ensure compliance.
          10. Personnel Security. NiCE requires each employee and contractor to enter into confidentiality agreements upon hire or engagement, as applicable, and to agree to its Code of Ethics and Business Conduct. NiCE performs background checks on its potential employees prior to hiring, as permitted by applicable law. In addition to the Company Security Policies, NiCE also requires its employees and contractors to agree and adhere to teleworking, internet acceptable use, social media, electronic messaging, clear desk/clear screen, and other work policies.
          11. Facilities. NiCE grants physical access to its facilities based on role and logs visitor access. NiCE removes physical access when access is no longer required, including upon termination. Employees and visitors must visibly display and wear identity badges when in a NiCE facility. Visitors must always be accompanied while at a NiCE facility. NiCE reviews data center physical access, including remote access, on a regular basis to confirm that access is restricted to authorized personnel. NiCE employs additional measures to protect its employees and assets, including video surveillance systems and onsite security personnel.
          12. Company Business Continuity and Disaster Recovery. NiCE endeavors to maintain continuity of its operations through business continuity, redundancy, appropriate staffing of incident response personnel, and timely recovery of critical NiCE processes and systems. NiCE has a business continuity and disaster recovery plan for its business operations (“BCP/DRP”), which is reviewed and approved by management at least annually. The BCP/DRP includes actions and procedures for NiCE facilities, business functions/operations, HR, IT, and communications, which are designed to ensure the survivability for NiCE’s internal services, mission-critical applications, infrastructure and data, and enable the recovery thereof to effective service levels as soon as possible to minimize the impact the business should a reasonably foreseeable event occur, which causes significant operational disruption and crisis to NiCE’s business and Company Systems. Training exercises and tests of the BCP/DRP are performed to ensure it is reliable and effective, and updates are made to the plan based on findings of these tests.
          13. Certifications. NiCE strives to align its Company Security Policies to ISO 27001 standards for information security where practical.

          III. Cloud Services Security

          1. Overview. This Section III (Cloud Services Security) describes the information security standards and administrative, technical and organizational safeguards NiCE implements and follows to protect the confidentiality, integrity, and availability of Confidential Information, including Content, in the Cloud Services (“Cloud Services Security Program”). The Cloud Services Security Program is designed to protect the Confidential Information, including Content, in the Cloud Service from and against anticipated or actual threats or hazards, unauthorized or unlawful access, use, disclosure, alteration, or destruction, and accidental loss, destruction or damage, in accordance with laws applicable to NiCE’s provision of the Cloud Service to Customer under the Agreement.
          2. Cloud Services Security Program. NICE’s Cloud Services Security Program: (a) is consistent with industry recognized information security standards; (b) includes technical, administrative, physical and organizational measures designed to protect the confidentiality, integrity and availability of Confidential Information, including Content, as well as the processing of such data by NiCE’s employees, subcontractors, and sub-processors; and (c) is appropriate given the nature, scope, and complexity of the Cloud Services and NiCE’s business operations.
          3. Cloud Services Security Policies. NiCE will maintain appropriate policies, standards, and procedures designed to support the Cloud Services Security Program (“Cloud Services Security Policies”) and will review and update them from time to time to ensure relevance, accuracy, and to maintain industry standard security standards.
          4. Risk Assessment and Management. NiCE uses a risk-based methodology to help it reasonably identify cybersecurity risks to its information assets. NiCE security teams review the risks identified by it to understand potential impact to the business, determine appropriate risk levels, and treatment options. Risk mitigation plans are implemented by NiCE to address material risks to business operations, including data protection.
          5. Change Management. NiCE follows documented change management policies and procedures for requesting, testing and approving application, infrastructure and product related changes to the Cloud Services. These changes undergo appropriate levels of review and testing, including security and code reviews, regression testing and user acceptance prior to approval for implementation. Software development and testing environments are maintained and logically separated from the production environment.
          6. Data Storage and Backup. The Cloud Services contain functionality to allow backups of Content. Depending on the Cloud Service, this may include both the ability to backup Content and store within the Cloud Service, and/or to backup and store Content with an external storage provider of Customer. Backups of Content in the Cloud Services will not be stored on portable media. The timing and cadence for backups of Content, the storage duration, and capacity, are different for each Cloud Service. Information on the foregoing may be found in the Documentation for the applicable Cloud Service.
          7. Data Management, Deletion and Destruction. NiCE has data disposal policies in place to guide personnel on the procedure for disposal of Confidential Information, including Content in accordance with the terms of the Agreement. If deletion is required, Content will be securely deleted. For Content in a Cloud Service hosted by NiCE in Amazon Web Services (“AWS”), AWS procedures include a decommissioning process that is designed to prevent Content from being exposed to unauthorized individuals. AWS uses the techniques detailed in DoD 5220.22-M (“National Industrial Security Program Operating Manual”) or NIST 800-88 (“Guidelines for Media Sanitization”) to destroy data as part of the decommissioning process. All decommissioned magnetic storage devices are degaussed and physically destroyed in accordance with industry-standard practices. For certain Cloud Services, which make recordings of voice calls, recording retention policies may be determined by Customer and used as part of its routine deletion process for such Content. For example, a recording retention policy can be created within the Cloud Service to delete conversations that occurred within a range of dates.
          8. Vulnerability Management. NiCE continuously monitors for vulnerabilities discovered through scans, offensive exercises, employees or externally reported by vendors or researchers. NiCE follows industry best practices to discover and address vulnerabilities in accordance with their severity level.
          9. Incident Response and Breach Notification. NiCE has an Information Security Incident Response Plan (the “ISIRP”) and a Cyber Incident Response Team (“CIRT”) in place to prepare for, detect, analyze, contain, eradicate, recover, and gain lessons learned from (as appropriate) identified information security incidents affecting NiCE. NiCE reviews and updates the ISIRP at least annually to reflect emerging risks and changes to NiCE’s operations and systems. Should a breach of security, which leads to the unauthorized or unlawful destruction, loss, modification, disclosure of or access to Content, including Personal Data, while being transmitted, stored, or otherwise processed (as defined under GDPR) by NiCE (“Data Incident”) occur, NiCE will notify Customers without undue delay after its confirmation of such Data Incident. As appropriate, NiCE will provide affected customer(s) with known details regarding the Data Incident, including the date it was identified and confirmed, the nature and impact of the Data Incident to their Content, actions NiCE intends to take or has already taken to contain, eradicate, and/or recover from effects of the Data Incident, and any impending next steps. In the event of a Data Incident involving Personal Data to which Customer is the data owner or controller, if Customer reasonably determines notification is required by applicable data breach notification laws, NiCE will provide reasonable assistance to the extent required for Customer to comply with such laws, including assistance in notifying the relevant supervisory authority and providing a description of the Data Incident. Nothing in these Cloud Services Security Terms shall prohibit or limit NiCE from complying with any obligations it may have under the data breach notification laws.
          10. Cloud Services Security Program Audit and Assessments. NiCE conducts internal control assessments on an ongoing basis to validate that security and access controls are designed and operating effectively. Third party audits are performed as part of NiCE’s certification process to validate the ongoing governance of control operations and their effectiveness. Issues identified from assessments and audits are documented, tracked, and remediated as appropriate given the materiality.
          11. Security Audits. At least once a year, Cloud Services are subject to a security audit by an independent third party auditor that attests to the effectiveness of the controls NiCE has put in place to safeguard the systems and operations where Content is processed, stored, or transmitted (e.g., System and Organizational Control (SOC 2), Type 2). For those Cloud Services subject to a SOC 2, the audit will be in accordance with the Attestation Standards under Section 101 of the codification standards (AT 101) and at a minimum will cover the security, confidentiality, and availability control criteria developed by the American Institute of Certified Public Accountants (AICPA). Upon request, NiCE will supply Customer with a summary copy of NiCE’s most recent annual audit reports available for the applicable Cloud Service, which will be deemed NiCE’s Confidential Information under the Agreement.
          12. Penetration Testing. At least once a year NiCE performs, or employs a third party to perform, penetration testing on its applications and infrastructure of the Cloud Services. Issues identified during the engagement will be appropriately addressed within a reasonable time-frame given their materiality. Upon request, NiCE will provide Customer with a copy of the executive summary associated with such penetration testing results, which will be deemed NiCE’s Confidential Information under the Agreement.
          13. Password, Access, User Management and Authentication. Application access logs are maintained on a centralized repository, to allow for security review and analysis by the security team. NiCE maintains technical safeguards to prevent unauthorized access to Content through fraud or error. NiCE implements user access management functionality in the Cloud Services including requirements for user registration, access provisioning, management of privileged access rights to information and information systems, and the removal or adjustment of access rights. NiCE maintains policies and processes to control and secure access to the back-end production environment of the Cloud Service based upon the principle of least privilege through secure authentication, authorization mechanisms, and access control rules that take into account the risk associated with the particular information system and the type of information stored therein. These processes include multiple layers of access controls such as firewalls, tokens, security keys, and authentication.
          14. Encryption. NiCE employs encryption to mitigate the risk of unauthorized disclosure or alteration of Content in the Cloud Service. Cryptographic keys shall be protected against unauthorized access, disclosure, modification, and data loss.
          15. Cloud Service Business Continuity. The Cloud Services environment is separate and within a reasonable distance from Company Systems. NiCE has a written business continuity plan designed to manage significant disruptions to its Cloud Services operations and infrastructure (“BCP”). NiCE reviews (and, as necessary, updates) and approves the BCP at least annually. The BCP provides steps required and expected to recover NiCE’s operations should a reasonably foreseeable disaster or force majeure event occur. NiCE personnel perform annual tests of the BCP to assess effectiveness. Test results are documented, and corrective actions are noted. Data backup, replication, and recovery systems/technologies are deployed to support resilience and protection of Content. Backup systems are configured to encrypt backup media. Disaster recovery capabilities for recovery to separate hosting service provider regions may require an additional fee for certain Cloud Services.
          16. Data Center Physical Access. Data centers operated by NiCE, and those by its hosting service providers for the Cloud Services, have physical access control systems to permit only authorized personnel to have access to the secure areas. These physical controls include, but are not limited to, identification and signatures of all access requirements, escorted access of authorized personnel, intrusion detection systems, access control devices, closed circuit television cameras.
          17. Industry Specific Certifications. Certain Cloud Services include features and controls, which may assist Customers in their compliance with a particular law, regulation or security standard such as FedRamp, PCI, HIPAA etc. Information on the certifications of a particular Cloud Service may be found in the NiCE customer portal or by contacting Customer’s NiCE sales representative.