Privacy & Intellectual Property Aspects
Comparative
Construction Contract Management
Legal AI Tools
Privacy and
Intellectual Property aspects For Construction Contract Management Legal AI
Tools
TABLE OF
CONTENTS
Privacy and IP considerations for Contract
Management Tools:
1. Kira Systems
1. Privacy
Considerations
a. Data
Security
b. Data
Ownership
c. Compliance
2. Intellectual
Property Considerations
a. Model
Training
b. Data
Confidentiality
2. Autodesk Construction Cloud
1. Privacy
Considerations
a. Data
Encryption
b. Data
Residency
c. Access
Controls
2. Intellectual
Property Considerations
a. IP
Ownership
b. Data
Use
3. PactSafe
1. Privacy
Considerations
a. Data
Privacy
b. User
Consent
c. GDPR
Compliance
2. Intellectual
Property Considerations
a. Ownership
of Data
b. Confidentiality
4. Oracle Textura Payment Management
1. Privacy
Considerations
a. Data
Protection
b. Access
Management
c. Regulatory
Compliance
2. Intellectual
Property Considerations
a. Data
Ownership
b. Intellectual
Property
5. Aconex by Oracle
1. Privacy
Considerations
a. Data
Encryption
b. Data
Access
c. Compliance
2. Intellectual
Property Considerations
a. User
Data
b. Technology
IP
6. Procore
1. Privacy
Considerations
a. Data
Encryption
b. User
Access Controls
c. Compliance
with Regulations
2. Intellectual
Property Considerations
a. Data
Ownership
b. Confidentiality
7. Gordian’s Construction Contract
Compliance Tool
1. Privacy
Considerations
a. Data
Security
b. Access
Management
c. Compliance
2. Intellectual
Property Considerations
a. Ownership
of Data
b. Technology
IP
8. TextIQ by
Relativity
1. Privacy
Considerations
a. Sensitive
Data Management
b. Data
Security
c. Compliance
2. Intellectual
Property Considerations
a. Confidentiality
b. Data
Ownership
9. ContractPodAi
1. Privacy
Considerations
a. Data
Protection
b. Access
Controls
c. Compliance
2. Intellectual
Property Considerations
a. Data
Ownership
b. Confidentiality
10. visort
1. Privacy
Considerations
a. Data
Encryption
b. User
Access Controls
c. Regulatory
Compliance
2. Intellectual
Property Considerations
a. Ownership
of Data
b. Confidentiality
11. DocuSign CLM (Contract Lifecycle
Management)
1. Privacy
Considerations
a. Data
Security
b. User
Consent and Access
c. Global
Compliance
2. Intellectual
Property Considerations
a. Data
Ownership
b. Technology
IP
12. GCPay
1. Privacy
Considerations
a. Data
Encryption
b. Compliance
with Financial Regulations
c. Access
Management
2. Intellectual
Property Considerations
a. User
Data
b. Confidentiality
13. LawGeex
1. Privacy
Considerations
a. Data
Protection
b. User
Access Controls
c. GDPR
Compliance
2. Intellectual
Property Considerations
a. Data
Ownership
b. Confidentiality
14. Lexion
1. Privacy
Considerations
a. Data
Security
b. Access
Management
c. Compliance
2. Intellectual
Property Considerations
a. Ownership
of Data
b. Confidentiality
15. LegalSifter
1. Privacy
Considerations
a. Data
Protection
b. User
Access Controls
c. Compliance
with Privacy Laws
2. Intellectual
Property Considerations
a. Data
Ownership
b. Confidentiality
16. Malbek
1. Privacy
Considerations
a. Data
Security
b. Access
Controls
c. Regulatory
Compliance
2. Intellectual
Property Considerations
a. Ownership
of Data
b. Confidentiality
17. Ironclad
1. Privacy
Considerations
a. Data
Encryption
b. User
Consent and Access
c. Global
Compliance
2. Intellectual
Property Considerations
a. Data
Ownership
b. Confidentiality
18. Concord
1. Privacy
Considerations
a. Data
Security
b. User
Access Controls
c. Compliance
2. Intellectual
Property Considerations
a. Ownership
of Data
b. Confidentiality
19. CoCounsel by Casetext
1. Privacy
Considerations
a. Data
Protection
b. User
Access Controls
c. Compliance
with Privacy Laws
2. Intellectual
Property Considerations
a. Data
Ownership
b. Confidentiality
20. Docubot by NextChapter
1. Privacy
Considerations
a. Data
Security
b. User
Consent
c. Compliance
2. Intellectual
Property Considerations
a. Ownership
of Data
b. Confidentiality
21. Juro
1. Privacy
Considerations
a. Data
Encryption
b. User
Access Controls
c. Regulatory
Compliance
2. Intellectual
Property Considerations
a. Ownership
of Data
b. Confidentiality
22. Luminance
1. Privacy
Considerations
a. Data
Security
b. User
Access Controls
c. Compliance
with Privacy Laws
2. Intellectual
Property Considerations
a. Data
Ownership
b. Confidentiality
23. Seal Software (DocuSign Insight)
1. Privacy
Considerations
a. Data
Protection
b. User
Access Controls
c. Compliance
with Privacy Laws
2. Intellectual
Property Considerations
a. Ownership
of Data
b. Confidentiality
24. Onit
1. Privacy
Considerations
a. Data
Security
b. User
Consent and Access
c. Global
Compliance
2. Intellectual
Property Considerations
a. Data
Ownership
b. Confidentiality
25. Icertis Contract Intelligence (ICI)
1. Privacy
Considerations
a. Data
Encryption
b. User
Access Controls
c. Compliance
with Privacy Laws
2. Intellectual
Property Considerations
a. Ownership
of Data
b. Confidentiality
Privacy & Intellectual Property Aspects
Comparative
Construction Contract Management
Legal AI Tools
Privacy & Intellectual Property
Aspects May Change Please do Check Any Terms and
Conditions when Signing on to these Services,
Privacy and Intellectual Property aspects For
Construction Contract Management Legal AI Tools |
· Privacy and
Intellectual Property (IP) are critical considerations when using any
AI-driven tool, especially in the context of construction contract
management, where sensitive information and proprietary data are often
involved. · Each of the
mentioned construction contract management legal AI tools takes privacy and
intellectual property concerns seriously, with features designed to protect
sensitive information and ensure compliance with relevant regulations. o
These tools generally provide robust encryption,
access controls, and adherence to global privacy laws like GDPR. · In terms of
intellectual property, users typically retain ownership of their data, while
the platforms maintain the IP rights to the underlying technology. o
Confidentiality is a key focus for all tools, with
contractual data being used only within the scope of the services provided,
ensuring that proprietary information remains protected. · When selecting a
tool, it's important to consider both privacy and IP aspects to ensure that
the tool aligns with your organization’s requirements and complies with all
relevant regulations. |
Privacy
and IP considerations for Contract Management Tools: |
|
· 1.
Kira Systems |
|
|
|
Privacy
Considerations |
|
Data Security |
· Kira Systems uses
encryption to protect data both at rest and in transit. The platform is
designed to ensure that sensitive contract data is securely stored and
processed. |
Data Ownership |
· Users retain
ownership of their data. Kira Systems does not claim ownership of the data
processed through its platform. |
Compliance |
· Kira Systems is
compliant with global data protection regulations, including GDPR, ensuring
that personal and sensitive information is handled in accordance with legal
standards. |
|
|
Intellectual
Property Considerations |
|
Model Training |
· Kira Systems
allows users to train AI models on their own data, but the IP rights to the
underlying AI technology and models remain with Kira Systems. |
Data
Confidentiality |
· The platform is
designed to ensure that proprietary contract data is not used to train models
for other customers, protecting users' IP. |
|
|
2.
Autodesk Construction Cloud |
|
Privacy
Considerations |
|
Data Encryption |
· Autodesk
Construction Cloud employs encryption protocols to secure data both in
transit and at rest, safeguarding sensitive project information. |
Data Residency |
· Users can choose
where their data is stored, which is crucial for complying with regional data
protection laws. |
Access Controls |
· The platform
provides granular access controls, allowing organizations to manage who has
access to specific data and documents. |
|
|
Intellectual
Property Considerations |
|
IP Ownership |
· Users retain
ownership of all content, including BIM models and contract documents, uploaded
to the platform. |
Data Use |
· Autodesk does
not use user data for purposes outside of providing the service, ensuring
that users' IP rights are respected. |
|
|
3. PactSafe |
|
|
|
Privacy
Considerations |
|
Data Privacy |
· PactSafe adheres to
strict data privacy standards and offers encryption to protect data in
transit and at rest. |
User Consent |
· The platform
provides mechanisms to ensure that all parties involved in contract execution
have provided their consent, as required by privacy laws. |
GDPR Compliance |
· PactSafe is compliant
with GDPR and other data protection regulations, ensuring the lawful
processing of personal data. |
|
|
Intellectual
Property Considerations |
|
Ownership of
Data |
· Users maintain
ownership of all data and content processed through PactSafe.
The platform does not claim ownership of user data. |
Confidentiality |
· PactSafe ensures that
contract data is kept confidential and is not used for any purpose other than
providing the contracted services. |
|
|
4.
Oracle Textura Payment Management |
|
|
|
Privacy
Considerations |
|
Data Protection |
· Oracle Textura
uses industry-standard encryption and security practices to protect financial
and contract-related data. |
Access
Management |
· The platform
provides robust access management controls, ensuring that only authorized
users can access sensitive financial data. |
Regulatory
Compliance |
· Oracle Textura
is compliant with major data protection regulations, including GDPR and CCPA. |
|
|
Intellectual
Property Considerations |
|
Data Ownership |
· Users retain
ownership of their financial and contract data. Oracle does not use user data
for purposes beyond providing the payment management services. |
Intellectual
Property |
· The underlying
technology and IP related to Oracle Textura remain with Oracle, while users
retain ownership of their proprietary data. |
|
|
5.
Aconex by Oracle |
|
|
|
Privacy
Considerations |
|
Data Encryption |
· Aconex uses
encryption to protect data both at rest and in transit, ensuring that
sensitive project information is secure. |
Data Access |
· The platform
allows users to set permissions and control access to project documents,
protecting sensitive information. |
Compliance |
· Aconex complies
with global data protection standards, including GDPR, ensuring that personal
data is handled lawfully. |
|
|
Intellectual
Property Considerations |
|
User Data |
· Users retain
ownership of all documents and data uploaded to Aconex. Oracle does not use
this data for any purposes outside of providing the service. |
Technology IP |
· Oracle retains
the IP rights to the Aconex platform, but users maintain ownership of their
proprietary project and contract data. |
|
|
6.
Procore |
|
|
|
Privacy
Considerations |
|
Data Encryption |
· Procore uses
advanced encryption methods to secure data, protecting sensitive project and contract
information. |
User Access
Controls |
· Procore provides
robust access controls, allowing users to manage who can view and edit
specific documents. |
Compliance with
Regulations |
· Procore complies
with GDPR, CCPA, and other relevant data protection regulations, ensuring the
lawful handling of personal data. |
|
|
Intellectual
Property Considerations |
|
Data Ownership |
· Users retain
ownership of all content and data uploaded to Procore. The platform does not
claim ownership of user data. |
Confidentiality |
· Procore ensures
that project data, including contracts, remains confidential and is not used
outside the scope of the services provided. |
|
|
7.
Gordian’s Construction Contract Compliance Tool |
|
|
|
Privacy
Considerations |
|
Data Security |
· Gordian employs
industry-standard security measures, including encryption, to protect
sensitive contract data. |
Access
Management |
· The platform
offers access controls to ensure that only authorized users can view or
modify sensitive information. |
Compliance |
· Gordian is
compliant with GDPR and other relevant data protection laws, ensuring the
protection of personal data. |
|
|
Intellectual
Property Considerations |
|
Ownership of
Data |
· Users retain
ownership of their contract data. Gordian does not use this data for purposes
other than providing compliance services. |
Technology IP |
· Gordian retains
the IP rights to its compliance tool, while ensuring that users' proprietary
contract data is kept confidential. |
|
|
8. TextIQ by Relativity |
|
|
|
Privacy Considerations |
|
Sensitive Data
Management |
· TextIQ is designed to
identify and protect sensitive data within contracts, ensuring that privacy
obligations are met. |
Data Security |
· The platform
uses encryption to protect data in transit and at rest, safeguarding
sensitive information. |
Compliance |
· TextIQ complies with
major data protection regulations, including GDPR, ensuring lawful data
processing. |
|
|
Intellectual
Property Considerations |
|
Confidentiality |
· TextIQ ensures that
sensitive information identified within contracts is kept confidential and is
not used for any other purpose. |
Data Ownership |
· Users maintain
ownership of their data, and TextIQ does not use
this data beyond the scope of providing contract analysis services. |
|
|
9. ContractPodAi |
|
|
|
Privacy
Considerations |
|
Data Protection |
· ContractPodAi uses encryption
and other security measures to protect data stored and processed on the
platform. |
Access Controls |
· Provides robust
access management features, allowing organizations to control who can access
and modify contracts. |
Compliance |
· ContractPodAi is
GDPR-compliant and adheres to other global data protection regulations. |
|
|
Intellectual
Property Considerations |
|
Data Ownership |
· Users retain
ownership of all contract data processed through the platform. ContractPodAi does not claim ownership of user data. |
Confidentiality |
· The platform
ensures that proprietary contract information remains confidential and is not
used outside the scope of the services. |
|
|
10. visort |
|
|
|
Privacy
Considerations |
|
Data Encryption |
· Evisort uses encryption
to protect contract data both at rest and in transit, ensuring that sensitive
information is secure. |
User Access
Controls |
· Provides
granular access controls, allowing users to manage who can view and edit
contract documents. |
Regulatory
Compliance |
· Evisort complies with
GDPR and other relevant data protection laws, ensuring that personal data is
handled lawfully. |
|
|
Intellectual
Property Considerations |
|
Ownership of
Data |
· Users retain
ownership of all contract data processed through Evisort.
The platform does not use this data for purposes outside of providing the
contracted services. |
Confidentiality |
· Evisort ensures that
contract data is kept confidential and is not used for any purpose beyond the
scope of the services. |
|
|
11.
DocuSign CLM (Contract Lifecycle Management) |
|
|
|
Privacy
Considerations |
|
Data Security |
· DocuSign CLM
uses strong encryption protocols to secure contract data during storage and
transmission. |
User Consent and
Access |
· Provides tools
for obtaining user consent and managing access to sensitive contract data,
ensuring compliance with privacy regulations. |
Global
Compliance |
· DocuSign CLM is
compliant with GDPR, CCPA, and other global data protection regulations. |
|
|
Intellectual
Property Considerations |
|
Data Ownership |
· Users retain
ownership of their contract data. DocuSign does not use this data outside the
scope of providing CLM services. |
Technology IP |
· DocuSign retains
the IP rights to its CLM technology, while users maintain ownership of their
proprietary contract data. |
|
|
12. GCPay |
|
|
|
Privacy
Considerations |
|
Data Encryption |
· GCPay uses encryption
to protect financial and contract data both in transit and at rest. |
Compliance with
Financial Regulations |
· GCPay complies with
financial data protection regulations, ensuring that sensitive payment
information is handled securely. |
Access
Management |
· The platform
provides access controls to ensure that only authorized users can access
payment and contract data. |
|
|
Intellectual
Property Considerations |
|
User Data |
· Users retain
ownership of all payment and contract data processed through GCPay. The platform does not claim ownership of this
data. |
Confidentiality |
· GCPay ensures that
financial data and contract information remain confidential and are not used
for any purposes beyond providing the payment management services. |
|
|
13. LawGeex |
|
|
|
Privacy
Considerations |
|
Data Protection |
· LawGeex uses encryption
and other security measures to protect contract data processed on its
platform. |
User Access
Controls |
· Allows
organizations to control who can access and modify contract data, ensuring
that sensitive information is protected. |
GDPR Compliance |
· LawGeex is compliant
with GDPR and other data protection regulations, ensuring that personal data
is processed lawfully. |
|
|
Intellectual
Property Considerations |
|
Data Ownership |
· Users retain
ownership of all contract data processed through LawGeex.
The platform does not use this data for any purposes outside of providing
contract review services. |
Confidentiality |
· LawGeex ensures that
contract data is kept confidential and is not used for any purpose beyond the
scope of the services. |
|
|
14. Lexion |
|
|
|
Privacy
Considerations |
|
Data Security |
· Lexion employs
encryption to protect contract data both at rest and in transit, safeguarding
sensitive information. |
Access
Management |
· The platform
provides granular access controls, allowing users to manage who can view and
edit contract documents. |
Compliance |
· Lexion complies with
GDPR and other relevant data protection regulations, ensuring lawful data
processing. |
|
|
Intellectual
Property Considerations |
|
Ownership of
Data |
· Users retain
ownership of all contract data processed through Lexion.
The platform does not use this data outside the scope of providing contract
management services. |
Confidentiality |
· Lexion ensures that
proprietary contract information remains confidential and is not used beyond
the contracted scope. |
|
|
15. LegalSifter |
|
|
|
Privacy
Considerations |
|
Data Protection |
· LegalSifter uses encryption
and other security measures to protect contract data during storage and
transmission. |
User Access
Controls |
· Provides tools
for managing access to contract data, ensuring that only authorized users can
view and modify documents. |
Compliance with
Privacy Laws |
· LegalSifter complies with
GDPR and other global data protection regulations, ensuring lawful handling
of personal data. |
|
|
Intellectual
Property Considerations |
|
Data Ownership |
· Users retain
ownership of all data processed through LegalSifter.
The platform does not use this data for purposes outside the contracted
services. |
Confidentiality |
· LegalSifter ensures that
contract data remains confidential and is not used beyond the scope of
providing contract review services. |
|
|
16.
Malbek |
|
|
|
Privacy
Considerations |
|
Data Security |
· Malbek uses
encryption to protect contract data both at rest and in transit, safeguarding
sensitive information. |
Access Controls |
· Provides robust
access management features, allowing organizations to control who can access
and modify contracts. |
Regulatory
Compliance |
· Malbek is
compliant with GDPR and other data protection regulations, ensuring lawful
data processing. |
|
|
Intellectual
Property Considerations |
|
Ownership of
Data |
· Users retain
ownership of all contract data processed through Malbek. The platform does
not use this data for purposes outside the contracted services. |
Confidentiality |
· Malbek ensures
that contract data is kept confidential and is not used beyond the scope of
the services provided. |
|
|
17.
Ironclad |
|
|
|
Privacy
Considerations |
|
Data Encryption |
· Ironclad uses
strong encryption protocols to protect contract data during storage and
transmission. |
User Consent and
Access |
· Provides tools
for obtaining user consent and managing access to contract data, ensuring
compliance with privacy regulations. |
Global
Compliance |
· Ironclad is compliant
with GDPR, CCPA, and other data protection regulations, ensuring lawful data
processing. |
|
|
Intellectual
Property Considerations |
|
Data Ownership |
· Users retain
ownership of their contract data. Ironclad does not use this data outside the
scope of providing CLM services. |
Confidentiality |
· Ironclad ensures
that contract data remains confidential and is not used beyond the contracted
scope. |
|
|
18.
Concord |
|
|
|
Privacy
Considerations |
|
Data Security |
· Concord uses
encryption to protect contract data both at rest and in transit, safeguarding
sensitive information. |
User Access
Controls |
· Allows
organizations to manage access to contract data, ensuring that only
authorized users can view and modify documents. |
Compliance |
· Concord is
compliant with GDPR and other global data protection regulations, ensuring
lawful handling of personal data. |
|
|
Intellectual
Property Considerations |
|
Ownership of
Data |
· Users retain
ownership of all contract data processed through Concord. The platform does
not use this data outside the scope of providing contract management
services. |
Confidentiality |
· Concord ensures
that proprietary contract information remains confidential and is not used
beyond the scope of the services provided. |
|
|
19. CoCounsel by Casetext |
|
|
|
Privacy
Considerations |
|
Data Protection |
· CoCounsel uses encryption
and other security measures to protect contract data processed on its
platform. |
User Access
Controls |
· Provides tools
for managing access to contract data, ensuring that sensitive information is
protected. |
Compliance with
Privacy Laws |
· CoCounsel is compliant
with GDPR and other data protection regulations, ensuring lawful handling of
personal data. |
|
|
Intellectual
Property Considerations |
|
Data Ownership |
· Users retain
ownership of all contract data processed through CoCounsel.
The platform does not use this data outside the scope of providing legal
research and contract review services. |
Confidentiality |
· CoCounsel ensures that
contract data is kept confidential and is not used beyond the scope of the
services provided. |
|
|
20. Docubot by NextChapter |
|
|
|
Privacy
Considerations |
|
Data Security |
· Docubot uses encryption
to protect data during storage and transmission, ensuring the privacy of
sensitive contract information. |
User Consent |
· Ensures that
user consent is obtained for all interactions with the AI chatbot, in
compliance with privacy laws. |
Compliance |
· Docubot is compliant
with GDPR and other relevant data protection regulations, ensuring lawful
data processing. |
|
|
Intellectual
Property Considerations |
|
Ownership of
Data |
· Users retain
ownership of all data processed through Docubot.
The platform does not use this data for any purpose outside the scope of
providing contract drafting and review services. |
Confidentiality |
· Docubot ensures that
all contract data remains confidential and is not used beyond the scope of
the services provided. |
|
|
21.
Juro |
|
|
|
Privacy
Considerations |
|
Data Encryption |
· Juro uses
encryption to protect contract data both at rest and in transit, safeguarding
sensitive information. |
User Access Controls |
· Provides
granular access controls, allowing organizations to manage who can view and
edit contract documents. |
Regulatory
Compliance |
· Juro is
compliant with GDPR and other data protection regulations, ensuring lawful
data processing. |
|
|
Intellectual
Property Considerations |
|
Ownership of
Data |
· Users retain
ownership of all contract data processed through Juro. The platform does not
use this data outside the scope of providing contract management services. |
Confidentiality |
· Juro ensures
that contract data remains confidential and is not used beyond the scope of
the services provided. |
|
|
22.
Luminance |
|
|
|
Privacy
Considerations |
|
Data Security |
· Luminance
employs encryption and other security measures to protect contract data
during storage and transmission. |
User Access
Controls |
· Provides tools
for managing access to contract data, ensuring that only authorized users can
view and modify documents. |
Compliance with
Privacy Laws |
· Luminance is
compliant with GDPR and other global data protection regulations, ensuring
lawful data processing. |
|
|
Intellectual
Property Considerations |
|
Data Ownership |
· Users retain
ownership of all data processed through Luminance. The platform does not use
this data for any purpose outside the scope of providing contract review
services. |
Confidentiality |
· Luminance
ensures that all contract data remains confidential and is not used beyond
the scope of the services provided. |
|
|
23.
Seal Software (DocuSign Insight) |
|
|
|
Privacy
Considerations |
|
Data Protection |
· Seal Software
uses encryption to protect contract data during storage and transmission,
ensuring the privacy of sensitive information. |
User Access
Controls |
· Provides tools
for managing access to contract data, ensuring that only authorized users can
view and modify documents. |
Compliance with
Privacy Laws |
· Seal Software is
compliant with GDPR and other global data protection regulations, ensuring
lawful data processing. |
|
|
Intellectual
Property Considerations |
|
Ownership of Data |
· Users retain
ownership of all contract data processed through Seal Software. The platform
does not use this data outside the scope of providing contract discovery and
analysis services. |
Confidentiality |
· Seal Software
ensures that all contract data remains confidential and is not used beyond
the scope of the services provided. |
|
|
24.
Onit |
|
|
|
Privacy
Considerations |
|
Data Security |
· Onit uses
encryption and other security measures to protect contract data during
storage and transmission. |
User Consent and
Access |
· Provides tools
for obtaining user consent and managing access to contract data, ensuring
compliance with privacy regulations. |
Global
Compliance |
· Onit is
compliant with GDPR, CCPA, and other global data protection regulations, ensuring
lawful data processing. |
|
|
Intellectual
Property Considerations |
|
Data Ownership |
· Users retain
ownership of their contract data. Onit does not use this data outside the
scope of providing contract management services. |
Confidentiality |
· Onit ensures
that all contract data remains confidential and is not used beyond the
contracted scope. |
|
|
25.
Icertis Contract Intelligence (ICI) |
|
|
|
Privacy
Considerations |
|
Data Encryption |
· ICI uses
encryption to protect contract data both at rest and in transit, safeguarding
sensitive information. |
User Access
Controls |
· Provides
granular access controls, allowing organizations to manage who can view and
edit contract documents. |
Compliance with
Privacy Laws |
· ICI is compliant
with GDPR and other global data protection regulations, ensuring lawful data
processing. |
|
|
Intellectual
Property Considerations |
|
Ownership of
Data |
· Users retain
ownership of all contract data processed through ICI. The platform does not
use this data outside the scope of providing contract management services. |
Confidentiality |
· ICI ensures that
all contract data remains confidential and is not used beyond the scope of
the services provided. |
Construction
Contract Management Artificial Intelligence (AI) Services
AI
Knowledge Management Systems Limited
@Euro
Training Limited
Whatsapp +15512411304