ANNEX 2
Approved Verification Methods for ****
It is anticipated that at least one of the primary, secondary and tertiary verification methods described below will be available via **** in all countries. Where only one such method is available in a particular country, that method shall be deemed approved by Label for such country as of the Amendment Effective Date. Where portal verification is available in a country, only that method shall be deemed approved by SME. Where portal verification is not available in a country, but campus ID verification is available, campus ID verification shall be deemed approved and manual verification may be used as aback-up solution if required.
Primary method: portal verification
This method requires individuals to prove their current student status by authenticating with their institutions’ learning portal through a Single Sign On (SSO) or, in the USA, by confirming their current status through the US National Clearing House database.
In order to confirm eligibility, the Approved Verification Partner shall collect data relating to the individual being verified, including:
Secondary method: campus ID verification
This method requires individuals to validate their student enrolment by being connected to a valid IP address (e.g. being connected to campus wifi) from the same eligible institution they declare as their university/college when they are registering for the Student Offer, and by verifying a valid email address available only to those that are or have been associated with the university/college concerned.
Tertiary method: manual verification
This method requires individuals to upload an official document issued by the school/university (e.g. university ID card) and including the full name of the student, an issue date within the current term, and the full name of the college/university that the student is attending. **** (or other approved Verification Partner) will manually check the content of the qualifying document submitted by the end user and will use ‘image manipulation fraud detection’ technology to detect whether the document was manipulated or altered.
**** Confidential portion omitted and filed separately with the Securities and Exchange Commission pursuant to a request for confidential treatment.
7