Memorandum of Understanding

Memorandum of Understanding between partner and Interversial System of Systems Pty Ltd.

This Memorandum of Understanding (MOU) sets for the terms and understanding between the partner and Interversial System of Systems Pty Ltd to implement the artificial intelligence platform, ai knowledge base design and accompaning software.

1. Background The artificial intelligence unification and digitization service provider has secured the necessary hardware, software and deployment orchestration services for the implementation of the platform, ai knowledge base design, various modular integration and accompaning software.

2. Purpose This MOU will establish the artificial intelligence platform within the organization. With the primary goal of digitalization with data driven economic activities and business models where the platform is the facilitator. The partner to procure the asset for the revolution in terms of the creation and capture of value for the digital economy main catalysts digital data and digital platforms. The first facilitator is the ability to collect, use and analyze massive amounts of machine-readable information, digital data, where value creation arises once data is transformed into digital intelligence and monetized through commercial use. Data becomes a new economic resource for creating and capturing value where control over data is strategically important to be able to transform data into digital intelligence. The second facilitator is platformization where the digital platform provides the mechanisms to bring together a set of parties to interact online where platform powered businesses have a major advantage in the data-driven economy. The main objective is therefore value creation by adding the intangible asset to your balance sheet but also value capture or distribution, so that the potential of the digital economy may be harnessed for all. The growth of digital platform is directly linked to the partners capacity to collect and analyze digital data, utilizing the training materials for various stakeholders to master digital transformations that varies considerably and depends on their levels of development and digital readiness. The platform utility in the ecosystem for innovation and digital infrastructure accelerating digital inclusion for a hyperconnected and hyper digitized digital economy. The digital economy labour market retaining the same level of control over the conditions of work as any other employer. The platform enables the organizations competitive advantage as is based on size and power to the view that it is based on corporate and especially rather intangible resources, such as competences and capabilities, and on the assimilation of knowledge. The expansion of digital data and platform can create many new development opportunities as a force for innovation and productivity growth were the infrastructure provided by the platform can enable more effective connections, exchanges of information and networking in your organization.

The partner agrees on the implementation of the following: ISO 27001 CONTROLS:

Information security policies: i. Security policies exist ii. All policies approved by management iii. Evidence of compliance

Organization of information security: i. Roles and responsibilities defined ii. Segregation of duties defined iii. Verification body / authority contacted for compliance verification iv. Establish contact with special interest groups regarding compliance v. Evidence of information security in project management vi. Defined policy for mobile devices vii. Defined policy for working remotely

Human resource security: i. Defined policy for screening employees prior to employment ii. Defined policy for HR terms and conditions of employment iii. Defined policy for management responsibilities iv. Defined policy for information security awareness, education and training v. Defined policy for disciplinary process regarding information security vi. Defined policy for change of employment policy regarding information security

Asset management: i. Complete inventory list of assets ii. Complete ownership list of assets iii. Defined acceptable use of assets policy iv. Defined return of assets policy v. Defined policy for classification of information vi. Defined policy for labeling information vii. Defined policy for handling of assets viii. Defined policy for management of remote media ix. Defined policy for disposal of media x. Defined policy for physical media transfer

Access control: i. Defined policy for user asset registration and deregistration ii. Defined policy for user access provisioning iii. Defined policy for management of privileged access rights iv. Defined policy for management of secret authentication information of users v. Defined policy for review of user access rights vi. Defined policy for removal or adjustment of access rights vii. Defined policy for use of secret authentication information viii. Defined policy for information access restriction ix. Defined policy for secure log in procedures x. Defined policy for password management systems xi. Defined policy for use of privileged utility programs xii. Defined policy for access control to program source code

Cryptographic controls: i. Policy on the use of cryptographic controls ii. Key management

Physical and environmental security: i. Secure Areas ii. Physical security perimeter iii. Physical entry controls iv. Securing offices, rooms and facilities v. Protection against external and environmental threats vi. Working in secure areas vii. Delivery and loading areas

Equipment: i. Equipment sitting and protection ii. Supporting utilities iii. Cabling security iv. Equipment maintenance v. Removal of assets vi. Security of equipment and assets off-premises vii. Secure disposal or re-use of equipment viii. Unattended user equipment ix. Clear desk and clear screen policy

Operations security: i. Operational procedures and responsibilities ii. Document operating procedures iii. Change management iv. Capacity management v. Separation of development, testing and operational environments

Protection from malware i. Controls against malware

Systems Backup i. Backup ii. Information Backup

Logging and monitoring i. Event logging ii. Protection of log information iii. Administrator and operator log iv. Clock synchronization

Control of operational software i. Installation of software on operational systems

Technical vulnerability management i. Management of technical vulnerabilities ii. Restriction of software installation

Information systems audit considerations i. Information system audit control

Communication security i. Network security management ii. Network controls iii. Security of network services iv. Segregation in networks

Information transfer i. Information transfer policies and procedures ii. Agreements on information transfer iii. Electronic messaging iv. Confidentiality or non-disclosure agreements v. System acquisition, development and maintenance

System acquisition, development and maintenance i. Security requirements of information systems ii. Information security requirements analysis and specification iii. Securing application services on public networks iv. Protecting application service transactions

Security in development and support processes i. In-house development

Suppliers relationships

Information security incident management ii. Information security management

Information security aspects of business continuity management iii. Information security continuity iv. Redundancies

Compliance i. Compliance with legal and contractual requirements ii. Identification of applicable legislation and contractual requirement iii. Intellectual property rights iv. Protection of records v. Privacy and protection of personally identifiable information vi. Regulation of cryptographic control vii. Independent review of information security viii. Compliance with security policies and standards ix. Technical compliance review.

The above goals will be accomplished in unison by undertaking the following: i. General Statutory requirement as POPIA ii. Software as a Service iii. Privacy Policy iv. Terms of Service v. Refund Policy vi. Training materials

The Partner agrees to these terms on the main domain interversialsystemofsystems.com.

Reporting The intangible asset falls within a broad category of intangible assets specifically computerized information, pertaining to software and databases, including the knowledge embedded in computer programs and computerized databases. Also encompassing innovative property as R&D, copyright, creative assets and economic competencies as brand building advertisement, market research and training of staff. The platform in the main functionaries of intangibles: (i) those created primarily through innovation and discovery, (ii) those that underlie organization practices including also investments in customer satisfaction, product quality and brand reputation, and (iii) those related to human capital.

Funding The Partner will obtain board approval with a resolution set forth on the agenda with diarized minutes of approval and financial disclosure to the internal treasury of accounting department of the organization to process the invoice for payment.

Duration This MOU is at-will and may be modified by mutual consent of authorized officials. This MOU shall become effective upon agreement though purchase by the authorized officials and will remain in effect until modified or terminated by any one of the partners by mutual consent. In the absence of mutual agreement by the authorized officials this MOU shall end on conclusion of the software as a service (SaaS) duration.