@networkpro/legal
Version:
Legal Document Portal — Network Pro Strategies
278 lines (181 loc) • 9.59 kB
Markdown
<!-- =========================================================================
SPDX-License-Identifier: CC-BY-4.0 OR GPL-3.0-or-later
This file is part of Network Pro.
========================================================================== -->
<!--
Copyright © 2025 Network Pro Strategies (Network Pro)
---
I. Creative Commons Attribution 4.0 International
Network Pro (the "Licensed Material") is licensed under Creative Commons Attribution 4.0 International ("CC BY 4.0"). To view a copy of this license, visit https://creativecommons.org/licenses/by/4.0/.
Per the terms of the License, you are free to distribute, remix, adapt, and build upon the Licensed Material for any purpose, even commercially. You must give appropriate credit, provide a link to the License, and indicate if changes were made.
The Licensor offers the Licensed Material as-is and as-available, and makes no representations or warranties of any kind concerning the Licensed Material, whether express, implied, statutory, or other. This includes, without limitation, warranties of title, merchantability, fitness for a particular purpose, non-infringement, absence of latent or other defects, accuracy, or the presence or absence of errors, whether or not known or discoverable.
Permissions beyond the scope of this License—or instead of those permitted by this License—may be available as further defined within this document.
SPDX Reference: https://spdx.org/licenses/CC-BY-4.0.html
Canonical URL: https://creativecommons.org/licenses/by/4.0/
---
II. GNU General Public License
Network Pro is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License ("GNU GPL") as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.
This material is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
FITNESS FOR A PARTICULAR PURPOSE.
See the GNU General Public License for more details.
SPDX Reference: https://spdx.org/licenses/GPL-3.0-or-later.html
Canonical URL: https://www.gnu.org/licenses/gpl-3.0.html
---
Author: Scott Lopez
Email: <contact@neteng.pro>
Web: <https://bio.neteng.pro>
-->
<section id="top">
[SPDX-License-Identifier](https://spdx.dev/learn/handling-license-info/):
`CC-BY-4.0 OR GPL-3.0-or-later`
# Consulting Terms and Conditions
**Network Pro Strategies**
**Effective Date:** April 20, 2025
</section>
<!-- markdownlint-disable MD001 -->
### Table of Contents
<!-- markdownlint-enable MD001 -->
<!-- markdownlint-disable MD051 -->
1. [Introduction](#1-intro)
2. [Scope of Services](#2-scope)
3. [Disclaimer of Warranties](#3-disclaimer)
4. [Assumption of Risk](#4-risk)
5. [Limitation of Liability](#5-liability)
6. [Indemnification](#6-indemnification)
7. [Client Responsibilities](#7-client)
8. [Governing Law and Jurisdiction](#8-law)
9. [Acceptance of Terms](#9-acceptance)
10. [Exceptions and Negotiation](#10-exceptions)
11. [Changes to These Terms](#11-changes)
<!-- markdownlint-enable MD051 -->
> _These Terms and Conditions apply exclusively to the provision of our consulting and implementation services. For all other uses of our website and associated platforms, please refer to the applicable [Website Terms of Use](https://netwk.pro/terms-of-use.html)._
---
**Formats Available:** [HTML](https://netwk.pro/terms-and-conditions.html) | Markdown
<section id="#1-intro">
## 1. Introduction
By engaging with the information security, network security,
cybersecurity, and digital privacy consulting and implementation
services provided by Network Pro Strategies ("Company," "we,"
"us," or "our"), you ("Client") agree to be bound by these Terms
and Conditions ("Terms"). **These Terms govern all engagements
except where explicitly superseded by a separate written agreement
or Statement of Work (SOW).** If you do not agree to these Terms,
please do not engage our services.
<sub>[Back to top](#top)</sub>
</section>
<section id="2-scope">
## 2. Scope of Services
These Terms apply to all consulting and implementation services
offered by the Company, including but not limited to assessment,
planning, risk analysis, technical implementation, and
configuration of third-party cybersecurity tools and systems.
Services may be delivered in-person, remotely, or via digital
communication platforms. **All deliverables and timelines will be
governed by individual SOWs when applicable.**
<sub>[Back to top](#top)</sub>
</section>
<section id="3-disclaimer">
## 3. Disclaimer of Warranties
All services are provided "as is" and "as available" without
warranties of any kind, whether express, implied, statutory, or
otherwise. The Company expressly disclaims all implied warranties,
including but not limited to merchantability, fitness for a
particular purpose, and non-infringement. We do not warrant that
our services or recommendations will detect or prevent all
security threats or achieve legal or regulatory compliance unless
specifically agreed in writing.
<sub>[Back to top](#top)</sub>
</section>
<section id="4-risk">
## 4. Assumption of Risk
Client acknowledges that cybersecurity and privacy-related
services inherently involve risk. The Company does not guarantee
uninterrupted service, error-free implementation, or complete
immunity from breaches or attacks. Client assumes full
responsibility for decisions based on our recommendations and
agrees to maintain appropriate internal controls and backup
protocols.
<sub>[Back to top](#top)</sub>
</section>
<section id="5-liability">
## 5. Limitation of Liability
To the maximum extent permitted by law, the Company shall not be
liable for any indirect, incidental, consequential, special, or
punitive damages, including without limitation loss of profits,
data, business interruption, or reputational harm, arising from or
related to the use or performance of the services, even if advised
of the possibility of such damages. Direct damages, if any, shall
be limited to the amount paid by Client for the specific services
giving rise to the claim.
<sub>[Back to top](#top)</sub>
</section>
<section id="6-indemnification">
## 6. Indemnification
Client agrees to indemnify, defend, and hold harmless the
Company, its officers, employees, contractors, and affiliates from
and against any claims, damages, liabilities, losses, and expenses
(including reasonable legal fees) arising out of or related to (i)
Client's misuse of the services, (ii) misconfiguration of systems
by Client, or (iii) third-party claims related to services
rendered under these Terms.
<sub>[Back to top](#top)</sub>
</section>
<section id="7-client">
## 7. Client Responsibilities
**Client shall provide valid, secure, and licensed infrastructure,
access credentials, and third-party tools necessary for service
delivery.** The Company shall operate exclusively within
client-owned or designated environments and shall not
independently host, process, or store client data. Compliance with
any regulatory frameworks (e.g., HIPAA, GDPR, PCI-DSS) is the sole
responsibility of the Client unless explicitly agreed otherwise in
a separate written agreement.
<sub>[Back to top](#top)</sub>
</section>
<section id="8-law">
## 8. Governing Law and Jurisdiction
These Terms shall be governed by and construed under the laws of
the State of Arizona and applicable U.S. federal laws. Any
disputes shall be resolved exclusively in the state or federal
courts located in Maricopa County, Arizona, and both parties
consent to such jurisdiction and venue.
<sub>[Back to top](#top)</sub>
</section>
<section id="9-acceptance">
## 9. Acceptance of Terms
Engagement with the Company's services constitutes acceptance of
these Terms. Continued use of services after any updates indicates
continued acceptance. These Terms are effective unless and until
terminated or modified in writing by mutual agreement.
<sub>[Back to top](#top)</sub>
</section>
<section id="10-exceptions">
## 10. Exceptions and Negotiations
**The Company is open to negotiating specific terms upon mutual
agreement.** Exceptions to these Terms must be documented in writing
and signed by both parties. Flexibility may be offered provided
such changes do not impose undue liability or regulatory
obligations on the Company.
<sub>[Back to top](#top)</sub>
</section>
<section id="11-changes">
## 11. Changes to These Terms
The Company reserves the right to revise these Terms at any time.
Updated versions will be posted on our website or delivered via
direct notice. Clients are responsible for reviewing Terms
periodically for updates.
<sub>[Back to top](#top)</sub>
</section>
---
<div style="font-size: 12px; font-weight: bold; text-align: center;">
[Home](https://netwk.pro) | Terms of Use
[Privacy Policy](https://netwk.pro/privacy.html) | [Legal](https://netwk.pro/legal.html)
</div>
<div style="font-size: 12px; text-align: center;">
Copyright © 2025
**[Network Pro Strategies](https://netwk.pro/)** (Network Pro™)
Network Pro™, the shield logo, and the "Locking Down Networks™" slogan are [trademarks](https://netwk.pro/legal.html#trademark) of Network Pro Strategies.
Licensed under **[CC BY 4.0](https://netwk.pro/legal.html#cc-by)** and the **[GNU GPL](https://netwk.pro/legal.html#gnu-gpl)**, as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.
</div>