Common use of Network Security and Malicious Events Clause in Contracts

Network Security and Malicious Events. Unless specifically otherwise agreed to in an applicable Service Attachment, it is Client’s sole responsibility to determine whatever actions deemed necessary to make Client’s data and voice networks and circuits secure from unauthorized access. Hardware firewall must be in place. Wireless data traffic in the environment must be securely encrypted. Provider is not responsible for the security of your network and circuits from third parties, or for any damages that may result from any unauthorized access to your network. You have an affirmative obligation to protect your network environment, and to train your employees for spam, malware, virus protection, and prevention from criminal acts of third parties. Provider is not responsible for criminal acts of third parties, including but not limited to hackers, phishers, crypto-locker, and any network environment subject to xxxxxx. You agree to pay xxxxxx or hold provider harmless for any activity effecting network security on your environment. If a security system for Client’s network is included within the Services to be provided by Provider, Provider agrees to use commercially reasonable efforts to protect Client’s network from malicious attack by computer viruses, computer worms and/or computer hackers (collectively, “malicious activities”). However, Client understands that no security system can guaranty complete protection against malicious activities as such attacks often involve the intentional action by third parties to invade and injure computer systems. THEREFORE, CLIENT AGREES TO HOLD PROVIDER HARMLESS FROM ANY LOSS, INJURY OR DAMAGE TO CLIENT OR ANY HARDWARE, SOFTWARE, AND/OR COMPUTER DATA OF CLIENT CAUSED BY SUCH MALICIOUS ACTIVITIES. Theft of Service Client shall notify us immediately, in writing, by electronic mail or by calling the Provider customer support line, if Client becomes aware at any time that the Services are being stolen or used fraudulently. Failure to do so in a timely manner may result in the immediate termination of the Services and additional charges to billed to you. Client will be liable for all use of the Service using Equipment stolen from you and any and all stolen Service or fraudulent use of the Services. Credits will not be issued for charges resulting from fraud that arises out of third parties hacking into any Equipment. This includes, but is not limited to, modem hijacking, wireless hijacking or other fraud arising out of a failure of your internal/corporate procedures. Provider will not issue credit for invoiced charges for fraudulent use resulting from your negligent or willful acts or those of an authorized user of your service. THEREFORE, CLIENT AGREES TO HOLD PROVIDER HARMLESS FROM ANY LOSS, INJURY OR DAMAGE TO CLIENT OR ANY THEFT OF SERVICE AND OR CLIENT CAUSE BY SUCH THEFT OF SERVICE. Hardware Equipment Client equipment must be maintained under manufactures warranty or maintenance contract or is in working order. Provider is not responsible for client equipment that is not maintained under manufacturer’s warranty or maintenance contract or that is otherwise out of order. All fees, warranties, and liabilities against Provider assumes equipment is under manufactures warranty or maintenance contracts or is in working order. Provider in its reasonable opinion and supported by manufacturer information, may designate certain equipment as obsolete or defective, and therefore exclude it from coverage under this Agreement.

Appears in 2 contracts

Samples: Master Services Agreement, Master Services Agreement

AutoNDA by SimpleDocs

Network Security and Malicious Events. Unless specifically otherwise agreed to in an applicable Service AttachmentOrder, it is Client’s sole responsibility to determine whatever actions deemed necessary to make Client’s data and voice networks and circuits secure from unauthorized access. Hardware firewall must be in place. Wireless data traffic in the environment must be securely encrypted. Provider is not responsible for the security of your network and circuits from third parties, or for any damages that may result from any unauthorized access to your network. You have an affirmative obligation to protect your network environment, and to train your employees for spam, malware, virus protection, and prevention from criminal acts of third parties. Provider is not responsible for criminal acts of third parties, including but not limited to hackers, phishers, crypto-locker, and any network environment subject to xxxxxx. You agree to pay xxxxxx or hold provider harmless for any activity effecting affecting network security on your environment. If a security system for Client’s network is included within the Services to be provided by Provider, Provider agrees to use commercially reasonable efforts to protect Client’s network from malicious attack by computer viruses, computer worms and/or computer hackers (collectively, “malicious activities”). However, Client understands that no security system can guaranty complete protection against malicious activities as such attacks often involve the intentional action by third parties to invade and injure computer systems. THEREFORE, CLIENT AGREES TO HOLD PROVIDER HARMLESS FROM ANY LOSS, INJURY OR DAMAGE TO CLIENT OR ANY HARDWARE, SOFTWARE, AND/OR COMPUTER DATA OF CLIENT CAUSED BY SUCH MALICIOUS ACTIVITIES. Theft of Service Client shall notify us immediately, in writing, by electronic mail or by calling the Provider customer support line, if Client becomes aware at any time that the Services are being stolen or used fraudulently. Failure to do so in a timely manner may result in the immediate termination of the Services and additional charges to billed to you. Client will be liable for all use of the Service using Equipment stolen from you and any and all stolen Service or fraudulent use of the Services. Credits will not be issued for charges resulting from fraud that arises out of third parties hacking into any Equipment. This includes, but is not limited to, modem hijacking, wireless hijacking or other fraud arising out of a failure of your internal/corporate procedures. Provider will not issue credit for invoiced charges for fraudulent use resulting from your negligent or willful acts or those of an authorized user of your service. THEREFORE, CLIENT AGREES TO HOLD PROVIDER HARMLESS FROM ANY LOSS, INJURY OR DAMAGE TO CLIENT OR ANY THEFT OF SERVICE AND OR CLIENT CAUSE BY SUCH THEFT OF SERVICE. Hardware Equipment Client equipment Equipment must be maintained under manufactures warranty or maintenance contract or is in working order. Provider is not responsible for client equipment that is not maintained under manufacturer’s warranty or maintenance contract or that is otherwise out of order. All fees, warranties, and liabilities against Provider assumes equipment is under manufactures warranty or maintenance contracts or is in working order. Provider in its reasonable opinion and supported by manufacturer information, may designate certain equipment as obsolete or defective, and therefore exclude it from coverage under this Agreement.

Appears in 1 contract

Samples: Master Services Agreement

Network Security and Malicious Events. Unless specifically otherwise agreed to in an applicable Service AttachmentQuote, it is Client’s sole responsibility to determine whatever actions deemed necessary to make Client’s data and voice networks and circuits secure from unauthorized access. Hardware firewall must be in place. Wireless data traffic in the environment must be securely encrypted. Provider is not responsible for the security of your network and circuits from third parties, or for any damages that may result from any unauthorized access to your network. You have an affirmative obligation to protect your network environment, and to train your employees for spam, malware, virus protection, and prevention from criminal acts of third parties. Provider is not responsible for criminal acts of third parties, including but not limited to hackers, phishers, crypto-locker, and any network environment subject to xxxxxx. You agree to pay xxxxxx or hold provider harmless for any activity effecting affecting network security on your environment. If a security system for Client’s network is included within the Services to be provided by Provider, Provider agrees to use commercially reasonable efforts to protect Client’s network from malicious attack by computer viruses, computer worms and/or computer hackers (collectively, “malicious activities”). However, Client understands that no security system can guaranty complete protection against malicious activities as such attacks often involve the intentional action by third parties to invade and injure computer systems. THEREFORE, CLIENT AGREES TO HOLD PROVIDER HARMLESS FROM ANY LOSS, INJURY OR DAMAGE TO CLIENT OR ANY HARDWARE, SOFTWARE, AND/OR COMPUTER DATA OF CLIENT CAUSED BY SUCH MALICIOUS ACTIVITIES. Theft of Service Client shall notify us immediately, in writing, by electronic mail or by calling the Provider customer support line, if Client becomes aware at any time that the Services are being stolen or used fraudulently. Failure to do so in a timely manner may result in the immediate termination of the Services and additional charges to billed to you. Client will be liable for all use of the Service using Equipment stolen from you and any and all stolen Service or fraudulent use of the Services. Credits will not be issued for charges resulting from fraud that arises out of third parties hacking into any Equipment. This includes, but is not limited to, modem hijacking, wireless hijacking or other fraud arising out of a failure of your internal/corporate procedures. Provider will not issue credit for invoiced charges for fraudulent use resulting from your negligent or willful acts or those of an authorized user of your service. THEREFORE, CLIENT AGREES TO HOLD PROVIDER HARMLESS FROM ANY LOSS, INJURY OR DAMAGE TO CLIENT OR ANY THEFT OF SERVICE AND OR CLIENT CAUSE BY SUCH THEFT OF SERVICE. Hardware Equipment Client equipment Equipment must be maintained under manufactures warranty or maintenance contract or is in working order. Provider is not responsible for client equipment that is not maintained under manufacturer’s warranty or maintenance contract or that is otherwise out of order. All fees, warranties, and liabilities against Provider assumes equipment is under manufactures warranty or maintenance contracts or is in working order. Provider in its reasonable opinion and supported by manufacturer information, may designate certain equipment as obsolete or defective, and therefore exclude it from coverage under this Agreement.

Appears in 1 contract

Samples: www.centretechnologies.com

Network Security and Malicious Events. Unless specifically otherwise agreed to in an applicable Service AttachmentOrder or Schedule of Services, it is Client’s sole responsibility to determine whatever actions deemed necessary to make Client’s data and voice networks and circuits secure from unauthorized access. Hardware firewall must be in place. Wireless data traffic in the environment must be securely encrypted. Provider is not responsible for the security of your network and circuits from third parties, or for any damages that may result from any unauthorized access to your network. You have an affirmative obligation to protect your network environment, and to train your employees for spam, malware, virus protection, and prevention from criminal acts of third parties. Provider is not responsible for criminal acts of third parties, including but not limited to hackers, phishers, crypto-locker, and any network environment subject to xxxxxx. You agree to pay xxxxxx or hold provider harmless for any activity effecting network security on your environment. If a security system for Client’s network is included within the Services to be provided by Provider, Provider agrees to use commercially reasonable efforts to protect Client’s network from malicious attack by computer viruses, computer worms and/or computer hackers (collectively, “malicious activities”). However, Client understands that no security system can guaranty complete protection against malicious activities as such attacks often involve the intentional action by third parties to invade and injure computer systems. THEREFORE, CLIENT AGREES TO HOLD PROVIDER HARMLESS FROM ANY LOSS, INJURY OR DAMAGE TO CLIENT OR ANY HARDWARE, SOFTWARE, AND/OR COMPUTER DATA OF CLIENT CAUSED BY SUCH MALICIOUS ACTIVITIES. Theft of Service Client shall notify us immediately, in writing, by electronic mail or by calling the Provider customer support line, if Client becomes aware at any time that the Services are being stolen or used fraudulently. Failure to do so in a timely manner may result in the immediate termination of the Services and additional charges to billed to you. Client will be liable for all use of the Service using Equipment stolen from you and any and all stolen Service or fraudulent use of the Services. Credits will not be issued for charges resulting from fraud that arises out of third parties hacking into any Equipment. This includes, but is not limited to, modem hijacking, wireless hijacking or other fraud arising out of a failure of your internal/corporate procedures. Provider will not issue credit for invoiced charges for fraudulent use resulting from your negligent or willful acts or those of an authorized user of your service. THEREFORE, CLIENT AGREES TO HOLD PROVIDER HARMLESS FROM ANY LOSS, INJURY OR DAMAGE TO CLIENT OR ANY THEFT OF SERVICE AND OR CLIENT CAUSE BY SUCH THEFT OF SERVICE. Hardware Equipment Client equipment must be maintained under manufactures warranty or maintenance contract or is in working order. Provider is not responsible for client equipment that is not maintained under manufacturer’s warranty or maintenance contract or that is otherwise out of order. All fees, warranties, and liabilities against Provider assumes equipment is under manufactures warranty or maintenance contracts or is in working order. Provider in its reasonable opinion and supported by manufacturer information, may designate certain equipment as obsolete or defective, and therefore exclude it from coverage under this Agreement.

Appears in 1 contract

Samples: Master Services Agreement

AutoNDA by SimpleDocs

Network Security and Malicious Events. Unless specifically otherwise agreed to in an applicable Service AttachmentOrder, it is Client’s sole responsibility to determine whatever actions deemed necessary to make Client’s data and voice networks and circuits secure from unauthorized access. Hardware firewall must be in place. Wireless data traffic in the environment must be securely encrypted. Provider is not responsible for the security of your network and circuits from third parties, or for any damages that may result from any unauthorized access to your network. You have an affirmative obligation to protect your network environment, and to train your employees for spam, malware, virus protection, and prevention from criminal acts of third parties. Provider is not responsible for criminal acts of third parties, including but not limited to hackers, phishers, crypto-locker, and any network environment subject to xxxxxx. You agree to pay xxxxxx or hold provider harmless for any activity effecting affecting network security on your environment. If a security system for Client’s network is included within the Services to be provided by Provider, Provider agrees to use commercially reasonable efforts to protect Client’s network from malicious attack by computer viruses, computer worms and/or computer hackers (collectively, “malicious activities”). However, Client understands that no security system can guaranty complete protection against malicious activities as such attacks often involve the intentional action by third parties to invade and injure computer systems. THEREFORE, CLIENT AGREES TO HOLD PROVIDER HARMLESS FROM ANY LOSS, INJURY OR DAMAGE TO CLIENT OR ANY HARDWARE, SOFTWARE, AND/OR COMPUTER DATA OF CLIENT CAUSED BY SUCH MALICIOUS ACTIVITIES. Theft of Service Client shall notify us immediately, in writing, by electronic mail or by calling the Provider customer support line, if Client becomes aware at any time that the Services are being stolen or used fraudulently. Failure to do so in a timely manner may result in the immediate termination of the Services and additional charges to billed to you. Client will be liable for all use of the Service using Equipment stolen from you and any and all stolen Service or fraudulent use of the Services. Credits will not be issued for charges resulting from fraud that arises out of third parties hacking into any Equipment. This includes, but is not limited to, modem hijacking, wireless hijacking or other fraud arising out of a failure of your internal/corporate procedures. Provider will not issue credit for invoiced charges for fraudulent use resulting from your negligent or willful acts or those of an authorized user of your service. THEREFORE, CLIENT AGREES TO HOLD PROVIDER HARMLESS FROM ANY LOSS, INJURY OR DAMAGE TO CLIENT OR ANY THEFT OF SERVICE AND OR CLIENT CAUSE BY SUCH THEFT OF SERVICE. Hardware Equipment Client equipment Equipment must be maintained under manufactures warranty or maintenance contract or is in working order. Provider is not responsible for client equipment that is not maintained under manufacturer’s warranty or maintenance contract or that is otherwise out of order. All fees, warranties, and liabilities against Provider assumes equipment is under manufactures warranty or maintenance contracts or is in working order. Provider in its reasonable opinion and supported by manufacturer information, may designate certain equipment as obsolete or defective, and therefore exclude it from coverage under this Agreement. Independent Backup Unless specifically otherwise agreed in to an applicable Order, Client must maintain an independent backup of all files that are sent to either the cloud or a data backup service. A backup solution must be in place, with backup copies stored off-site. It is the Client’s responsibility to verify that backups are made regularly, as well as the integrity of the backups. Provider shall not be held liable in the event of data loss, backup software failure, backup selection, backup hardware failure, backup media failure, or backup system failure even in the event that Provider was tasked to perform the backups. Client will be solely responsible for all lost data if it has not maintained an adequate independent backup. Third-Party Criminal Activity Provider is not responsible for criminal acts of third parties, including but not limited to intrusions or unauthorized access of any kind, hackers, phishers, crypto-locker, and any network environment subject to xxxxxx. You agree to pay xxxxxx or hold provider harmless for any activity effecting network security on your environment related to third-party criminal activity. Any costs or fees to rebuild or service machines are provided and sold separately by Provider. Viruses Anti-virus solution must be in place, updated, with valid update subscription. Provider is not responsible for any harm that may be cause by Client’s access to third party application programming interfaces or the execution or transmission of malicious code or similar occurrences, including without limitation, disabling devices, drop dead devices, time bombs, trap doors, Trojan horses, worms, viruses and similar mechanisms. Any costs or fees to rebuild or service machines are provided and sold separately by Provider. Client Virtual Machine Configurations All Client virtual machine data shall belong to Client. However, Client agrees that all virtual machines and configurations of Client’s network shall belong to Provider as Provider’s Intellectual Property, and Provider will not transfer to Client any virtual machines or information regarding configurations. Client also agrees to keep information regarding Provider’s virtual machines and configurations confidential. Client Data Security & Privacy In addition to its other confidentiality obligations under an applicable Service Attachment, Provider shall not use, edit, or disclose to any party other than Client any Client Data (defined below), except as otherwise requested by Client, or required by court order or applicable law. For purposes of this provision, all data stored on the virtualized machines assigned to Client, including locally stored personal data of individual employees, will be considered Client Data by Provider. As between Provider and Client, all Client Data is owned exclusively by Client. Client Data constitutes Confidential Information subject to the terms of the MSA. Provider may access Client's User accounts, including Client Data, solely to respond to service or technical problems or otherwise at Client's request.

Appears in 1 contract

Samples: Master Services Agreement

Network Security and Malicious Events. Unless specifically otherwise agreed to in an applicable Service Attachment, it is Client’s sole responsibility to determine whatever actions deemed necessary to make Client’s data and voice networks and circuits secure from unauthorized access. Hardware firewall must be in place. Wireless data traffic in the environment must be securely encrypted. Provider is not responsible for the security of your network and circuits from third parties, or for any damages that may result from any unauthorized access to your network. You have an affirmative obligation to protect your network environment, and to train your employees for spam, malware, virus protection, and prevention from criminal acts of third parties. Provider is not responsible for criminal acts of third parties, including but not limited to hackers, phishers, crypto-locker, and any network environment subject to xxxxxx. You agree to pay xxxxxx or hold provider harmless for any activity effecting network security on your environment. If a security system for Client’s network is included within the Services to be provided by Provider, Provider agrees to use commercially reasonable efforts to protect Client’s network from malicious attack by computer viruses, computer worms and/or computer hackers (collectively, “malicious activities”). However, Client understands that no security system can guaranty complete protection against malicious activities as such attacks often involve the intentional action by third parties to invade and injure computer systems. THEREFORE, CLIENT AGREES TO HOLD PROVIDER HARMLESS FROM ANY LOSS, INJURY OR DAMAGE TO CLIENT OR ANY HARDWARE, SOFTWARE, AND/OR COMPUTER DATA OF CLIENT CAUSED BY SUCH MALICIOUS ACTIVITIES. Theft of Service Client shall notify us immediately, in writing, by electronic mail or by calling the Provider customer support line, if Client becomes aware at any time that the Services are being stolen or used fraudulently. Failure to do so in a timely manner may result in the immediate termination of the Services and additional charges to billed to you. Client will be liable for all use of the Service using Equipment stolen from you and any and all stolen Service or fraudulent use of the Services. Credits will not be issued for charges resulting from fraud that arises out of third parties hacking into any Equipment. This includes, but is not limited to, modem hijacking, wireless hijacking or other fraud arising out of a failure of your internal/corporate procedures. Provider will not issue credit for invoiced charges for fraudulent use resulting from your negligent or willful acts or those of an authorized user of your service. THEREFORE, CLIENT AGREES TO HOLD PROVIDER HARMLESS FROM ANY LOSS, INJURY OR DAMAGE TO CLIENT OR ANY THEFT OF SERVICE AND OR CLIENT CAUSE BY SUCH THEFT OF SERVICE. Hardware Equipment Client equipment must be maintained under manufactures warranty or maintenance contract or is in working order. Provider is not responsible for client equipment that is not maintained under manufacturer’s warranty or maintenance contract or that is otherwise out of order. All fees, warranties, and liabilities against Provider assumes equipment is under manufactures warranty or maintenance contracts or is in working order. Provider in its reasonable opinion and supported by manufacturer information, may designate certain equipment as obsolete or defective, and therefore exclude it from coverage under this Agreement.. Independent Backup Unless specifically otherwise agreed in to an applicable Service Attachment, Client must maintain an independent backup of all files that are sent to either the cloud or a data backup service. A backup solution must be in place, with backup copies stored off-site. It is the Client’s responsibility to verify that backups are made regularly, as well as the integrity of the backups. Provider shall not be held liable in the event of data loss, backup software failure, backup selection, backup hardware failure, backup media failure, or backup system failure even in the event that Provider was tasked to perform the backups. Client will be solely responsible for all lost data if it has not maintained an adequate independent backup. Third-Party Criminal Activity Provider is not responsible for criminal acts of third parties, including but not limited to intrusions or unauthorized access of any kind, hackers, phishers, crypto-locker, and any network environment subject to xxxxxx. You agree to pay xxxxxx or hold provider harmless for any activity effecting network security on your environment related to third-party criminal activity. Any costs or fees to rebuild or service machines are provided and sold separately by Provider. Viruses Anti-virus solution must be in place, updated, with valid update subscription. Provider is not responsible for any harm that may be caused by Client’s access to third party application programming interfaces or the execution or transmission of malicious code or similar occurrences, including without limitation, disabling devices, drop dead devices, time bombs, trap doors, Trojan horses, worms, viruses and similar mechanisms. Any costs or fees to rebuild or service machines are provided and sold separately by Provider. Client Virtual Machine Configurations All Client virtual machine data shall belong to Client. However, Client agrees that all virtual machines and configurations of Client’s network shall belong to Provider as Provider’s Intellectual Property, and Provider will not transfer to Client any virtual machines or information regarding configurations. Client also agrees to keep information regarding Provider’s virtual machines and configurations confidential. Client Data Security & Privacy In addition to its other confidentiality obligations under an applicable Service Attachment, Provider shall not use, edit or disclose to any party other than Client any electronic data or information stored by Provider, or transmitted to Provider, using the Services (“Client Data”), except as otherwise requested by Client, or required by court order or applicable law. For purposes of this provision, all data stored on the virtualized machines assigned to Client, including locally stored personal data of individual employees, will be considered Client Data by Provider. As between Provider and Client, all Client Data is owned exclusively by Client. Client Data constitutes Confidential Information subject to the terms of the MSA. Provider may access Client's User accounts, including Client Data, solely to respond to service or technical problems or otherwise at Client's request. Security and Regulatory Recommendations Although it is under no obligation to do so, from time to time, Provider may make recommendations regarding regulatory compliance, safety and security related to Client’s network and practices (e.g., multi-factored authentication). If Client fails to adopt or implement the recommended protocols, Client is responsible for any and all damages related to regulatory, security, privacy, or data protection, including but not limited to fines, data breach notification, malware or ransomware costs, restoration, forensic investigation, restoring backups, or any other costs or damages related to Client’s refusal to implement the recommended protocols. PROVIDER REPRESENTATIONS AND WARRANTY Internal Network Security Compromise Policy Provider monitors the availability and performance of its internal firewall and network security. This process involves monitoring for intrusion attempts and potential security breaches. In order to minimize a possible compromise of security, all services and applications exposed to the Internet on Provider's servers are updated with all commonly available security hotfixes and best practices. As appropriate, Provider proactively evaluates, investigates and reports security- related incidents to the appropriate authorities. Provider also monitors and proactively manages the anti-virus protection of its servers and applications using industry-recognized anti-virus software systems. Service Warranty We warrant that the Services will be performed in a professional and workmanlike manner and as described in an applicable Service Attachment. All Services will be deemed to be accepted unless Client notifies Provider in writing within ten (10) working days after performance that the Services did not conform to this warranty. Provider promptly will correct any non-conformities and will notify Client in writing that the non-conformities have been corrected. DISCLAIMER OF WARRANTY PROVIDER DOES NOT WARRANT THAT THE SERVICES WILL BE PERFORMED ERROR- FREE OR UNINTERRUPTED, THAT PROVIDER WILL CORRECT ALL SERVICES ERRORS, OR THAT THE SERVICES WILL MEET YOUR REQUIREMENTS OR EXPECTATIONS, OR THAT THE SERVICE WILL BE COMPLETELY SECURE. THERE ARE RISKS INHERENT IN INTERNET CONNECTIVITY THAT COULD RESULT IN THE TEMPORARY LOSS OF SERVICE AVAILABILITY. PROVIDER IS NOT RESPONSIBLE FOR ANY ISSUES RELATED TO THE PERFORMANCE, OPERATION OR SECURITY OF THE SERVICES THAT ARISE FROM YOUR CONTENT OR THIRD PARTY CONTENT OR SERVICES PROVIDED BY THIRD PARTIES. PROVIDER SHALL HAVE NO OBLIGATION WITH RESPECT TO A WARRANTY CLAIM (i) IF NOTIFIED OF SUCH A CLAIM AFTER THE WARRANTY PERIOD OR (ii) IF THE CLAIM IS THE RESULT OF THIRD-PARTY HARDWARE OR SOFTWARE FAILURES, OR THE ACTIONS OF CLIENT OR A THIRD PARTY. FOR ANY BREACH OF THE SERVICES WARRANTY, YOUR EXCLUSIVE REMEDY AND OUR ENTIRE LIABILITY SHALL BE THE CORRECTION OF THE DEFICIENT SERVICES THAT CAUSED THE BREACH OF WARRANTY, OR, IF PROVIDER CANNOT SUBSTANTIALLY CORRECT THE DEFICIENCY IN A COMMERCIALLY REASONABLE MANNER, YOU MAY END THE DEFICIENT SERVICES AND PROVIDER WILL REFUND TO YOU THE FEES FOR THE TERMINATED SERVICES THAT YOU PRE-PAID TO US FOR THE PERIOD FOLLOWING THE EFFECTIVE DATE OF TERMINATION. TO THE EXTENT NOT PROHIBITED BY LAW, CUSTOMER ACKNOWLEDGES THESE WARRANTIES ARE EXCLUSIVE AND THERE ARE NO OTHER EXPRESS OR IMPLIED WARRANTIES OR CONDITIONS BY THE PROVIDER OR ANY THIRD-PARTY VENDORS’ INCLUDING FOR SOFTWARE, HARDWARE, SYSTEMS, NETWORKS OR ENVIRONMENTS OR FOR MERCHANTABILITY, SATISFACTORY QUALITY AND FITNESS FOR A PARTICULAR PURPOSE, AND THAT THOSE THIRD-PARTY VENDORS DISCLAIM ANY AND ALL LIABILITY, WHETHER DIRECT, INDIRECT OR CONSEQUENTIAL, ARISING FROM THE SERVICES. PROVIDER MAY LINK TO OR OFFER THIRD-PARTY SERVICES FOR RESALE. ANY PURCHASE, ENABLING, OR ENGAGEMENT OF THIRD-PARTY SERVICES, INCLUDING BUT NOT LIMITED TO IMPLEMENTATION, CUSTOMIZATION, CONSULTING SERVICES, E-MAIL, WEB HOSTING, SERVER HOSTING, PHONE SERVICE, AND ANY EXCHANGE OF DATA BETWEEN YOU AND ANY THIRD-PARTY SERVICE, IS SOLELY BETWEEN YOU AND THE APPLICABLE THIRD-PARTY SERVICE PROVIDER AND IS SUBJECT TO THE TERMS AND CONDITIONS OF SUCH THIRD-PARTY PROVIDER. PROVIVDER DOES NOT WARRANT THIRD-PARTY SERVICES AND IS NOT RESPONSIBLE OR LIABLE FOR SUCH SERVICES OR ANY LOSSES OR ISSUES THAT RESULT AS YOUR USE OF SUCH SERVICES. IF YOU PURCHASE, ENABLE OR ENGAGE ANY THIRD-PARTY SERVICE FOR USE IN CONNECTION WITH THE SERVICES, YOU ACKNOWLEDGE THAT COMPANY MAY ALLOW PROVIDERS OF THOSE THIRD-PARTY SERVICES TO ACCESS YOUR DATA USED IN CONNECTION WITH THE SERVICES AS REQUIRED FOR THE INTEROPERATION OF SUCH THIRD-PARTY SERVICES WITH THE SERVICES. YOU REPRESENT AND WARRANT THAT YOUR USE OF ANY THIRD-PARTY SERVICE SIGNIFIES YOUR INDEPENDENT CONSENT TO THE ACCESS AND USE OF YOUR DATA BY THE THIRD- PARTY SERVICE PROVIDER, AND THAT SUCH CONSENT, USE, AND ACCESS IS OUTSIDE OF PROVIDERS’S CONTROL. COMPANY WILL NOT BE RESPONSIBLE OR LIABLE FOR ANY DISCLOSURE, MODIFICATION OR DELETION OF DATA RESULTING FROM ANY SUCH ACCESS BY THIRD-PARTY SERVICE PROVIDERS. NO HIRING You shall not solicit any Provider employee with whom you have had direct contact in connection with the Services for employment with you or with any other person during the Term of this agreement and for twelve (12) months following termination of this agreement. Notwithstanding the foregoing, you shall not be precluded from (a) hiring an employee of Provider who independently approaches you, or (b) conducting general recruiting activities, such as participation in job fairs or publishing advertisements in publications or on Web sites for general circulation. You acknowledge that injury resulting from any breach of this provision would be significant and irreparable and that it would be extremely difficult to ascertain the actual amount of damages resulting from such breach. Therefore, in the event of a violation of this provision, in addition to any other right Provider may have at law or in equity, you shall make a one-time payment to Provider in the amount of one hundred and fifty percent (150%) of the affected employee's base salary for one year. We agree that such amount is not intended as a penalty and is reasonably calculated based upon the projected costs the injured party would incur to identify, recruit, hire and train suitable replacements for such personnel. DISPUTE RESOLUTION Arbitration Procedures Each of us shall attempt to settle amicably by mutual discussions any disputes, differences, or claims related to this agreement within sixty (60) days of the date any such dispute arises. Failing such amicable settlement, any such dispute, including claim related to the existence, validity, interpretation, performance, termination or breach of this agreement, is to be settled by arbitration in accordance with the Arbitration Rules of the American Arbitration Association (“AAA”). The arbitration will be conducted in English and will have one (1) arbitrator. The Arbitrator will not have the authority to award punitive damages to either party. Each of us will bear our own expenses, but we shall share equally the expenses of the Arbitration Tribunal and the AAA. Any arbitration award will be final, and judgment thereon may be entered in any court of competent jurisdiction. The arbitration will be held in Broward County, FL, or at another location upon which we may agree. Notwithstanding the foregoing, claims for preliminary injunctive relief, other pre-judgment remedies, and claims for your failure to pay for Services may be brought in a state or federal court in the United States with jurisdiction over the subject matter and parties. Period for Bringing Claim No claims to be resolved may be made more than six (6) months after the date by which the fault or failure should reasonably have been discovered; failure to make such a claim within the six (6) month period shall forever bar the claim. Continued Service Unless Provider is bringing an action for your failure to make payments for Services not otherwise in dispute, we will continue to provide Services under this agreement, and you shall continue to make payments to us, in accordance with this agreement, during the period in which the parties seek resolution of the dispute. Attorneys’ Fees In the event that there is any dispute, difference, or claim related to this agreement that is resolved either through arbitration or through litigation, if provider is prevailing party in such dispute we be entitled to an award of reasonable attorneys’ fees incurred while defending or prosecuting such dispute, difference, or claim. INDEMNIFICATION By Client Client shall defend, indemnify and hold Provider harmless against all costs and expenses, including reasonable attorney’s fees, associated with the defense or settlement of any claim that: • Provider’s use, access or modifications of any software that you have requested that we use, access or modify as part of the Services infringes any patent, copyright, trademark, trade secret or other intellectual property right, or • Any claim related to software licensing and software licensing compliance. • Any claim related to any data privacy, data protection, or data regulatory scheme which Client’s use of the Service violates any law or standard. You further shall pay any judgments or settlements based on any such claims. By Provider Subject to the limitation of liability set forth in the section titled LIMITATION OF LIABILITY, Provider agrees to indemnify and hold Customer harmless from and against all loss, liability, and expense including reasonable attorney’s fees caused by Provider’s:

Appears in 1 contract

Samples: Master Services Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!