TERMS OF SERVICE

By using our services and mobile application, you are agreeing to these terms. Please read them carefully.

 

Recitals

WHEREAS, Security Intel Ltd is the provider of the Services and Professional Services (as defined below); and

WHEREAS, Customer desires to access and use the Services and have Security Intel Ltd perform the Professional Services, all in accordance with the terms and conditions of the Agreement;

NOW, THEREFORE, in consideration of the foregoing, and in reliance on the mutual agreements and consideration contained herein, the parties agree as follows:

 

1. Definitions

 

In addition to any other definitions that may be found throughout these Terms of Service which will be recognizable as they will be bolded and in quotation marks, the following definitions apply:

 

1.1 “Agreement”. These Terms of Service (including any external terms or policy incorporated by reference herein) entered into by the parties, as amended from time to time.

 

1.2 “API.” The SIACONTROLROOM™  Application Programming Interface through which the Customer may be accessing the Services.

 

1.3 “Authorized Users.” The identifiable unique persons consisting of Customer’s employees and Customer’s clients who are authorized to access and use, as applicable, the Services and/or the Mobile Application.

 

1.4 “Customer Data.” Data and other information that Customer (or any of its Authorized Users) loads, transmits to, or enters into the Services via any means.

 

1.5 “Intellectual Property Rights.” (a) Any and all proprietary rights provided under: (i) patent law; (ii) copyright law (including moral rights); (iii) trade-mark law; (iv) design patent or industrial design law; (v) semi-conductor chip or mask work or integrated circuit topography law; or (vi) any other statutory provision or common law principle applicable to the Agreement, including trade secret law; (b) any and all applications, registrations, licenses, sub-licenses, franchises, agreements or any other evidence of a right in any of the foregoing; and (c) any and all licenses and waivers and benefits of waivers of the intellectual property rights set out in (a) and (b) above, all future income and proceeds from the intellectual property rights set out in (a) and (b) above, and all rights to damages and profits by reason of the infringement or violation of any of the intellectual property rights set out in (a) and (b) above.

 

1.6 “Mobile Application.” Any mobile applications for iOS or Android made available by Security Intel Ltd for use with the Services.

 

1.7 “Personal Information.” Also known as personally-identifiable information and personal data refers to information that can be used to identify, locate, or contact an individual, alone or when combined with other personal or identifying information.

 

1.8 “Professional Services.” Any consulting, implementation, training, or other professional services made available by Security Intel Ltd to Customer.

 

1.9 “Services.” The software services through which Security Intel Ltd  hosts and makes available the SIACONTROLROOM™  technology to Customer and its Authorized Users.

 

1.10 “Sites.” Websites and Landing Pages owned and / or used by Security Intel Ltd  to provide the Services, including but not limited to https://www.siacontrolroom.com or any subdomain or sub-page thereof, or any custom URL where the Services are made available.

 

1.11 “Technology.” The SIACONTROLROOM™ software, and any updates or upgrades to such software which may be generally released by Security Intel Ltd to its customers from time to time.

 

2.     Services And Professional Services; Restrictions

 

2.1   "Services". Subject to Customer’s compliance with the terms and conditions of the Agreement, Security Intel Ltd will make the Services (https://www.siacontrolroom.com) and the Mobile Application available to Customer and its Authorized Users on the terms and conditions set out in the Agreement.

 

2.2   "Modifications to the Services". Security Intel Ltd may, at its sole discretion, modify the Services or the Mobile Application, provided that such modifications do not materially decrease the functionality provided by the Services and Mobile Application. Customer is required to accept all patches, bug fixes and updates made by or on behalf of Security Intel Ltd to the Services and the Mobile Application.

 

2.3   "Suspension of the Services". Security Intel Ltd may, at its sole discretion, suspend Customer’s and Authorized Users’ access to or use of the Services or the Mobile Application or any component thereof for scheduled maintenance, if Customer or any Authorized User violates any provision of this Agreement, or to address any emergency security concerns.

 

2.4  "Restrictions on Use of Services". Customer must not itself, and will not permit others to: (i) sub-license, sell, rent, lend, lease or distribute the Services or the Mobile Application or any Intellectual Property Rights therein or otherwise make the Services or the Mobile Application available to others except as provided for in the Agreement; (ii) except as expressly agreed by Security Intel Ltd, use the Services or the Mobile Application to facilitate or provide timesharing, service bureau use or commercially exploit the Services or the Mobile Application; (iii) use or access the Services or the Mobile Application in violation of any applicable law or Intellectual Property Right; or (iv) use the Services or the Mobile Application in a manner that threatens the security or functionality of the Services or the Mobile Application.

 

2.5   "Restrictions on Customer Data". Customer must not itself, and will not permit others to use the Services or the Mobile Application to create, collect, transmit, store, use or process any Customer Data: (i) that contains any computer viruses, worms, malicious code, or any software intended to damage or alter a computer system or data; (ii) that Customer does not have the lawful right to create, collect, transmit, store, use or process; or (iii) that violates any applicable laws, or infringes, violates or otherwise misappropriates the Intellectual Property Rights or other rights of any third party (including any moral right, privacy right or right of publicity).

 

2.6   "General Restrictions". Customer must not itself, and will not permit others to: (i) modify the Services or the Mobile Application; (ii) reverse engineer, decompile or disassemble the Services or the Mobile Application; (iii) remove or obscure any proprietary notices or labels on the Services or the Mobile Application, including brand, copyright, trademark and patent or patent pending notices, unless otherwise authorized to do so by Security Intel Ltd; (iv) use the Services or the Mobile Application for the purpose of building a competitive product or service; (v) perform any vulnerability, penetration or similar testing of the Services or the Mobile Application, unless otherwise authorized to do so by Security Intel Ltd; or (vi) use the Services, Professional Services or the Mobile Application for any purpose or in any manner not expressly permitted in the Agreement.

 

3. Customer Acknowledgments And Obligations Regarding The Services

 

3.1  "Services and Customer Judgement and Experience". Customer acknowledges that the Services are provided solely to support Customer’s performance of security services and are not meant to be a substitute for Customer’s independent judgment regarding the manner by which security services should be conducted. The Services are not meant to be, and should not be used as, a substitute for emergency and law enforcement response.

 

3.2   "Access to the Services". The Services will be rendered in a manner that will permit Authorized Users to access the Services in accordance with the applicable requirements specified in their subscription. 

 

3.3 "Third-Party Technology". Customer acknowledges that the Services and the Mobile Application require the use of and integrate certain third-party technology, including Google Maps. The customer will accept and comply with the license terms for such third party technology, as applicable. Without limiting the generality of the foregoing, Customer’s use of Google Maps in the Services or on its own is subject to the current Google Maps/Google Earth Additional Terms of Service at https://maps.google.com/help/terms_maps.html and Google Privacy Policy at https://policies.google.com/privacy, both of which are incorporated by reference herein. Licensed third party technology may include APIs provided by third parties that provide integrations between the Services and third-party software used by Customer to manage its business, and Customer acknowledges and agrees to such integrations, as applicable.

 

3.4   "Hardware". Customer acknowledges and agrees that they are responsible for separately obtaining or licensing the hardware, including necessary software and systems (e.g. desktop computers, cell phones, current versions of internet browsers, collectively “Hardware”) required to access the Services and the Mobile Application. Customer shall ensure that all Hardware as is up to date as required to use the latest versions of the Services and Mobile Application. Security Intel Ltd shall not be responsible for any damages, pecuniary or otherwise, resulting or arising from the Services or Mobile Application not functioning or having reduced functionality as a result of Customer having insufficiently updated Hardware.

 

3.5   "Security". Customer acknowledges and agrees that they will be solely responsible for acquiring and maintaining technology and procedures for maintaining the security of its link to the Internet. Security Intel Ltd will implement reasonable security procedures consistent with the General Data Protection Regulation to protect Customer Data from unauthorized access (the “GDPR”). Provided that Security Intel Ltd is in compliance with the GDPR, the parties agree that Security Intel Ltd will not be held responsible or liable for situations: (a) where data or transmissions are accessed by third parties through illegal or illicit means; or (b) where the data or transmissions are accessed through the exploitation of security gaps, weaknesses, or flaws unknown to Security Intel Ltd at the time or any other matter beyond its control. Security Intel Ltd will promptly report to Customer any unauthorized access to Customer Data upon discovery by Security Intel Ltd, and Security Intel Ltd will use diligent efforts to promptly remedy any breach of security that permitted such unauthorized access. In the event notification to persons included in such Customer Data is required, the Customer will be solely responsible for any and all such notifications at its expense.

 

3.6   "Technical Contact". Customer acknowledges that it shall designate one of its employees as its principal contact for communicating with Security Intel Ltd regarding technical issues under the Agreement. Customer may change their technical contact from time to time by written notice to Security Intel Ltd.

 

3.7   "User Accounts". Upon Customer’s subscription, Security Intel Ltd will issue one Administrator account with the right to create Sub-Administrator or Controller accounts, collectively, the “Administrator Accounts” to Customer that provides Customer with the capability to create end-user accounts for security officers and clients (each, a “Customer User Account”) that Customer wishes to have access to and use of the Services and the Mobile Application (each, and each other person with an Administrator Account is, an Authorized User). Customer will ensure that Authorized Users only use the Services through the Customer User Account. Customer will not allow any Authorized User to share the Customer User Account with any other person.

 

3.8   "Responsibility for Authorized Users". Customer is responsible for identifying and authenticating all Authorized Users, for Authorized Users’ compliance with this Agreement, and for Authorized Users’ use or misuse of the Services or Mobile Application. The customer will promptly notify Security Intel Ltd of any actual or suspected unauthorized use of the Services or the Mobile Application including by anyone who is not an Authorized User. Security Intel Ltd reserves the right to suspend, deactivate, or replace any Administrator Account or Customer User Account if it determines that the Administrator Account or Customer User Account may have been used for an unauthorized or illegal purpose.

 

4. Technical Support

 

4.1   "Technical Support". Security Intel Ltd will provide technical support in the form of responses to Services-related questions by email or telephone at no additional charge. If additional Professional Services are required for the proper use and operation of the Services or if other Professional Services are requested by Customer, such services will be provided pursuant to a separate agreement entered into by the parties. Security Intel Ltd will provide such Professional Services on a time and materials (“T&M”) basis as follows: (a) Customer will pay Security Intel Ltd for all the time spent performing such Professional Services (including all travel time), plus materials, taxes, and reimbursable expenses; and (b) the rates for such Professional Services will be Security Intel Ltd’s then-current standard rates when such services are provided. Any monetary amount stated in an estimate for T&M services will be an estimate only for Customer’s budgeting and Security Intel Ltd resource scheduling purposes. If the estimate is exceeded, Security Intel Ltd will cooperate with the Customer to provide continuing Professional Services on a T&M basis. Security Intel Ltd will invoice Customer for T&M Professional Services on a monthly basis. All such charges will be payable upon receipt of invoice by Customer. Security Intel Ltd reserves the right to require a non-refundable fee and/or cost deposit prior to the commencement of any such Professional Services.

 

4.2   "Backups". At no additional charge to Customer, Security Intel Ltd will make daily incremental backups (each, a “Daily Backup”) of Customer Data archived with www.siacontrolroom.com. Daily Backups are encrypted and stored off-site in multiple secure facilities designed to store and maintain backups for emergency use. Daily Backups are deleted after 10 days.

 

5. Term And Termination Of Agreement

 

5.1   "Term". The term of the Agreement will commence as of the Effective Date of the paid-up subscription and will continue for the period of one calendar month (the “Initial Term”). The Initial Term will automatically renew for an additional term of one calendar month, (the “Renewable Term”) unless either party notifies the other in writing not less than 15 days prior to the expiration of the current term, of its intention not to renew. Either the Initial Term or any Renewal Term may be referred to in this Agreement as a “Term”.

 

5.2   "Termination for Cause". If either party fails to comply with any of the material terms and conditions of the Agreement (including, in the case of Customer failure to pay any Fee or other amounts payable to Security Intel Ltd under the Agreement when due), the non-defaulting party may terminate the Agreement upon 15 days’ written notice to the defaulting party specifying any such breach unless within the period of such notice all breaches specified therein will have been remedied.

 

5.3   "Effects of Termination". For clarity, termination for any reason terminates the Terms of Service and any outstanding T&M Agreement. Upon the termination of the Agreement: (a) Customer will immediately cease all access, receipt and use of the Services and Mobile Application; (b) all rights and licenses granted to Customer under the Agreement be immediately revoked; (c) within 30 days following termination, Customer will return any Security Intel Ltd property and all copies thereof, in its possession or under its control to Security Intel Ltd or at the direction of Security Intel Ltd destroy such materials; and (d) each party will return or destroy Confidential Information of the other party in accordance with this Agreement.

 

5.4   "Surviving Provisions". All provisions of these Terms of Service which by their nature should survive termination the Agreement shall survive termination, including without limitation intellectual property provisions, disclaimers, indemnification, and limitations of liability

 

5.5   "Transition Services". Upon termination of the Agreement, Customer will no longer have rights to access or use the Services. Within 90 days following termination, Security Intel Ltd will, at Customer’s option, return to Customer or delete or otherwise render inaccessible any Customer Data that remains in the hardware or systems used by Security Intel Ltd to provide the Services.

 

6. Subscriptions

 

6.1  "Subscriptions". Customer will pay to Security Intel Ltd the subscription fees set out in the ‘Subscriptions’ section of their dashboard (the “Subscription”) in accordance with the payment terms set out therein. Subscriptions are payable in advance. Unless otherwise specified, all Subscriptions are non-refundable and Security Intel Ltd shall have no obligation to issue refunds or credits for any unused Services, partial months or in connection with any downgrade, cancellation, termination or otherwise.

 

6.2   "Taxes; Currency". The Subscription fees and other amounts payable by Customer in accordance with the Agreement do not include any applicable taxes or duties, which shall be added at the time of payment, and which Customer is solely responsible for paying. The currency of the Subscription fees shall be specified in the ‘Subscription’ section of the Customer’s dashboard.

 

6.3   "Invoicing". Security Intel Ltd will prepare and send to the Customer, at the then-current contact information on file with Security Intel Ltd, an invoice for any Subscription fees that have become due and payable. Unless otherwise expressly stipulated in an invoice, all invoiced amounts are due upon receipt of the invoice.

 

6.4   "Additional Authorised Users". If Customer’s use of the Services requires the payment of additional Subscription fees (pursuant to the terms of the Agreement) due to additional authorised users being added, Customer will be billed for such usage and Customer will pay the additional Subscription fees in accordance with the Agreement. 

 

6.5   "Expenses". Any additional expenses that are incurred by Security Intel Ltd in providing the Services on behalf of Customer, and for which Security Intel Ltd seeks reimbursement, will be pre-approved in writing by Customer.

 

6.6   "Disputed Charges". If Customer believes Security Intel Ltd has charged or invoiced Customer incorrectly, Customer must contact Security Intel Ltd no later than 90 days after having been charged by Security Intel Ltd or receiving such an invoice in which the error or problem appeared in order to request an adjustment or credit. In the event of a dispute, Customer will pay any undisputed amounts in accordance with the payment terms herein, and the parties will discuss the disputed amounts in good faith in order to resolve the dispute.

 

6.7   "No Withholding or Setoff; Late Payment". Customer may not withhold or setoff any amounts due under the Agreement. Any late payment will be increased by the costs of collection (if any) and will incur interest at the rate of one and a half percent (1.5%) compounded monthly (19.56% annually), or the maximum legal rate (if less), plus all expenses of collection, until fully paid.

 

6.8   "Right to Audit". Upon 10 days prior written notice and during Customer’s regular business hours, Security Intel Ltd may inspect, either directly or through the use of a third party, Customer’s records related to Customer’s use of the Services to ensure that Customer complies with the Agreement. Customer will pay Security Intel Ltd for any underpaid Fees within 30 days of the issuance of the audit findings.

 

6.9   "Suspension of Services for Non-Payment of Subscription Fees". In the event of unpaid Subscription fees by Customer, Security Intel Ltd reserves the right to suspend Customer’s access to and use of the Services and the Mobile Application further to this sub-section. In the event of non-payment of Subscription fees, Security Intel Ltd shall provide a notice giving Customer 10-day notice to remedy the non-payment. In the event the non-payment is not remedied within the 10-day notice period, Security Intel Ltd reserves the right to automatically suspend Customer’s access to and use of the Services and the Mobile Application without any further notice to Customer.

 

7. Proprietary Rights Ownership

 

7.1   "Security Intel Ltd Property". Security Intel Ltd (or its licensors, as applicable) retains all right, title, and interest (including Intellectual Property Rights) in and to: (a) the Services, Mobile Application, Sites (if owned by Security Intel Ltd), and Security Intel Ltd Technology (including all data, content, and other information and materials contained therein other than Customer Data); (b) anything else provided or made available by Security Intel Ltd pursuant to the Agreement; and (c) any corrections, bug fixes, enhancements, adaptations, translations, derivative works, modifications or new versions of the foregoing (a) and (b). No rights are granted to Customer pursuant to the Agreement other than as expressly set out in the Agreement. The Services are licensed, not sold.

 

7.2   "Customer Ownership and Licenses". Customer retains all right, title, and interest (including Intellectual Property Rights) in and to Customer Data and any branding elements (including but not limited to Customer logos) used with permission of the Customer for Security Intel Ltd to include in the Services (the “Customer Branding”). Customer grants to Security Intel Ltd a nonexclusive, worldwide, royalty-free, irrevocable, fully paid-up right to use, process and transmit Customer Data and Customer Branding to provide the Services. Security Intel Ltd may remotely track Customer’s and it’s Authorized Users’ use of the Services and collect and analyze metadata and other information relating to the provision, use, and performance of the Services as it relates to Customer and its Authorized Users’ (the “Metadata”), and may create anonymized and aggregated versions of Customer Data (i.e. specific persons are not identified, the “Unidentifiable Customer Data”). During and after the term of the Agreement, Customer grants Security Intel Ltd a nonexclusive, perpetual, worldwide, royalty-free, irrevocable, fully paid-up right to: (a) use, process, and transmit the Metadata and Unidentifiable Customer Data to improve and enhance the Services and for other development, diagnostic and corrective purposes in connection with the Services and other Security Intel Ltd offerings; and (b) disclose the Metadata and the Unidentifiable Customer Data in connection with its business.

 

7.3   "Feedback". If Customer chooses to communicate to Security Intel Ltd (via any means) suggestions for improvements to any of the Services, Products, or business generally (collectively, “Feedback”), Security Intel Ltd shall own all right, title, and interest in and to the Feedback and will be entitled to use the Feedback without restriction. Customer hereby irrevocably assigns all rights, title and interest in and to the Feedback to Security Intel Ltd and agrees to waive in favour of Security Intel Ltd, its successors and assigns all moral rights in the Feedback and agrees to provide Security Intel Ltd such assistance as Security Intel Ltd may require, to document, process, and maintain Security Intel Ltd’s rights to the Feedback. The customer acknowledges and agrees that, by providing any Feedback to Security Intel Ltd, they are not entitled to any compensation, emolument or reimbursement of any kind from Security Intel Ltd under any circumstances.

 

8. License 

 

8.1   "Mobile Application License". The Mobile Application is licensed, not sold. Security Intel Ltd grants Customer and its Authorized Users the non-exclusive, non-transferable, non-sublicensable, limited right and license to download, install and use the Mobile Application onto a handheld device solely and exclusively for use under these Terms of Service, and as permitted by the usage rules set forth in the App Media Services Terms and Conditions for the Mobile Application for iOS or the Google Play Terms of Service for the Mobile Application for Android.

 

8.2   "iOS Mobile Application". If the Mobile Application is provided to Customer or Authorized Users through the Apple Inc. (Apple Inc. together with all of its Affiliates, “Apple”) App Store, the following terms and conditions apply in addition to all the other terms and conditions of these Terms of Service related to the Mobile Application: (a) the parties acknowledge this Terms of Service is concluded between Customer and Security Intel Ltd, and not with Apple. The responsibility for the Mobile Application and content thereof is governed by these Terms of Service; (b) Customer or any Authorized User may use the Mobile Application only on an iPhone or iPad that they own or control; (c) Customer and Security Intel Ltd acknowledge that Apple has no obligation to furnish any maintenance or support services with respect to the Mobile Application; (d) in the event of any failure of the Mobile Application to conform to any applicable warranty, Customer may notify Apple, and Apple will refund the purchase price for the Mobile Application (if any). Except for the foregoing, to the maximum extent permitted by applicable law, Apple will have no other warranty obligation whatsoever with respect to the Mobile Application, and any other claims, losses, liabilities, damages, costs or expenses attributable to any failure to conform to any warranty will be governed by this Terms of Use; (e) any claim in connection with the Mobile Application related to product liability, a failure to conform to applicable legal or regulatory requirements, claims under consumer protection or similar legislation is governed by these Terms of Service, and Apple is not responsible for such claim; (f) any third party claim that the Mobile Application or Customer or any Authorized User’s possession and use of the Mobile Application infringes that third party’s intellectual property rights will be governed by these Terms of Service, and Apple will not be responsible for the investigation, defence, settlement and discharge of such intellectual property infringement claim; (g) Customer represents and warrants that they, or any of their Authorized Users, are not: (i) located in any country that is subject to a U.S. Government embargo, or that has been designated by the U.S. Government as a terrorist supporting country; or (ii) listed on any U.S. Government list of prohibited or restricted parties; (h) Customer may contact Security Intel Ltd in writing regarding any notices, questions, complaints, or claims with respect to the Mobile Application at the addresses in the Notice section of these Terms of Service; (i) Apple is a third party beneficiary to these Terms of Service as it relates to the Mobile Application and may enforce these Terms of Service against Customer; and (j) If any of the terms and conditions in these Terms of Service are inconsistent or in conflict with Apple’s applicable instructions for Minimum Terms for Developer’s End User License Agreement or the App Store Terms of Service as of the Effective Date, the terms and conditions of Apple’s instructions for Minimum Terms for Developer’s End User License Agreement or App Store Terms of Service, as applicable, will apply to the extent of such inconsistency or conflict.

 

8.3   "Android Mobile Application". If the Mobile Application is provided to Customer or Authorized Users through the Google Inc. (Google Inc. together with all of its affiliates, “Google”) Play Store, the following terms and conditions apply in addition to all the other terms and conditions of these Terms of Service related to the Mobile Application: (a) Customer acknowledges that Google is not responsible for providing support services for the Mobile Application; and (b) if any of the terms and conditions in these Terms of Service are inconsistent or in conflict with the Google Play Terms of Service as of the date these Terms of Service were accepted, the terms and conditions of the Google Play Terms of Service will apply to the extent of such inconsistency or conflict.

 

9. Privacy

 

Customer agrees (on Customer’s behalf and on behalf of each Authorized User) to Security Intel Ltd’s access, use, collection, storage, and disclosure of Customer’s and each Authorized User’s Personal Information for the purposes authorized under the Agreement. The customer understands that Personal Information, including the Personal Information of Authorized Users, will be treated in accordance with Security Intel Ltd’s privacy policy located at https://www.siacontrolroom.com/privacy/ (the “Privacy Policy”).

 

10. Mutual Exchange Of Confidential Information

 

"Definition of Confidential Information". For purposes of the Agreement, “Confidential Information” means: (a) in the case of Security Intel Ltd: (i) all trade secrets, know how, software, software updates and enhancements, and other financial, business, or technical information of Security Intel Ltd or of any of its Affiliates, licensees, suppliers, and contractors that is disclosed by Security Intel Ltd, or on its behalf, in relation to the Agreement; (ii) terms and conditions of the Agreement; and (iii) non-public aspects of Security Intel Ltd’s websites and the operation thereof, Security Intel Ltd’s technology, technical information, data, the Services, Mobile Application, and Professional Services provided by Security Intel Ltd; (b) in the case of Customer, non-public Customer Data and non-public aspects of Customer’s technology, computer programs, and business and technical information, and data; and (c) in the case of both parties, all other information which is provided by a party (the “Owner”) to the other party (the “Recipient”) and is marked as confidential or which, by the nature of the circumstances surrounding the disclosure, ought to be treated as confidential. Confidential information does not include information (other than Personal Information) that: (a) is in the possession or control of Recipient at the time of its disclosure hereunder; (b) is, or becomes, publicly known, through no wrongful act of Recipient; (c) is received by Recipient from a third party free to disclose it without obligation to Owner; or (d) is independently developed by a party as evidenced by its written and dated records and without any breach of the Agreement.

 

"Restrictions on Use and Disclosure". Recipient may use Confidential Information only for the purpose of performing its obligations under the Agreement and will protect such Confidential Information from disclosure to others, using the same degree of care used to protect its own proprietary information of like importance but in any case, using no less than a reasonable degree of care given the nature of the Confidential Information. The recipient may disclose Confidential Information received hereunder only as reasonably required to perform its obligations or exercise its rights under the Agreement and only to its employees, representatives, and contractors who have a need to know for such purposes and who are bound by signed agreements to protect the received Confidential Information from unauthorized use and disclosure.

 

"Exclusions". Each Recipient may, where permitted by applicable law, disclose Confidential Information of the Owner to the extent required by a governmental or regulatory authority or otherwise as required by applicable laws and regulations (provided that the Recipient must first give the Owner reasonable notice of such compelled disclosure so that the Owner has an opportunity to take such steps as it desires to challenge or contest such disclosure or seek a protective order). In addition, each Recipient may, where permitted by applicable law, disclose Confidential Information of the Owner: (a) to its professional advisors as required to enable such persons or entities to provide professional advisory services; and (b) to potential permitted assignees or successors but only as is necessary in connection with a potential corporate transaction involving the business or assets of the Recipient; provided in each case, that such person or entity is subject to confidentiality obligations in respect of such Confidential Information that are no less stringent than those contained in this Section 10.

 

"Return/Destruction of Confidential Information". Upon the expiration or termination of the Agreement or the Owner’s earlier request, the Recipient will, at the Owner’s option, return or destroy Confidential Information of the Owner. Notwithstanding the foregoing, it is understood that the Recipient’s computer systems may automatically back-up the Confidential Information of the Owner. To the extent that such computer back-up procedures create copies of any such Confidential Information, the Recipient may retain such copies in its regular archival or back-up computer storage system(s) for the period that such archives or back-ups are normally kept by the Recipient. All archived or backed-up Confidential Information will be subject to the remaining confidentiality restrictions under the Agreement.

 

11. Customer Representations And Warranties

 

11.1   Customer represents and warrants to, and covenants with Security Intel Ltd that the performance of its obligations under the Agreement and the use of the Services and Mobile Application (by Customer and its Authorized Users) will not violate any applicable laws or regulations.

 

11.2   Customer represents and warrants to, and covenants with Security Intel Ltd that the execution, delivery, and performance of the Agreement: (a) is within its corporate powers; (b) has been duly authorized by all necessary corporate action; and (c) does not and will not contravene or constitute a default under, and is not and will not be inconsistent with, any judgment decree or other, or any contract, agreement, or other undertakings, applicable to Customer.

 

11.3   Customer represents and warrants to, and covenants with Security Intel Ltd that: (a) for Authorized Users’ use of the Services and Mobile Application; and (b) for Personal Information contained in Customer Data, Customer has provided all notices and disclosures (including to each Authorized User), obtained all applicable third party consents and permissions and otherwise has all authority, in each case as required by applicable laws, to enable Security Intel Ltd to provide the Services and the Mobile Application, including with respect to the collection, storage, access, use, disclosure and transmission of personal information by or to Security Intel Ltd and to or from all applicable third parties in accordance with the Agreement.

 

12. Representations And Warranties

 

12.1   Security Intel Ltd represents and warrants to, and covenants with Customer that: (a) it has the legal right to enter into the Agreement and perform its obligations thereunder, and (b) the performance of its obligations will not violate any laws or regulations that are applicable to Security Intel Ltd or cause a breach of any agreements between Security Intel Ltd and any third parties.

 

12.2   Security Intel Ltd represents and warrants to, and covenants with Customer that the execution, delivery, and performance of the Agreement: (a) is within its corporate powers; (b) has been duly authorized by all necessary corporate action; and (c) does not and will not contravene or constitute a default under, and is not and will not be inconsistent with, any judgment decree or other, or any contract, agreement, or other undertaking, applicable to Security Intel Ltd.

 

12.3   Security Intel Ltd represents and warrants to, and covenants with Customer that: (a) Security Intel Ltd has the right to grant the rights and licenses specified in the Agreement; and (b) to Security Intel Ltd’s knowledge, the Services and Mobile Application, and their respective underlying technologies do not contain any material bugs or defects and do not contain or make available any viruses, worms, Trojan horses, web bugs, time bombs, “spyware,” or other harmful or invasive code or components.

 

13. Limited Warranty

 

Security Intel Ltd represents and warrants that the Services and Mobile Application will: (a) conform to all material operational features as described in the User Manual; and (b) be free of errors and defects that materially affect the performance of such features (the “Limited Warranty”), provided that Customer promptly notifies Security Intel Ltd in writing of any non-conformity, error, or defect. Customer’s sole and exclusive remedy for breach of the Limited Warranty will be, at Security Intel Ltd’s option, the correction of non-conforming Services at Security Intel Ltd’s expense or a pro-rata refund of the Fees paid by Customer for the non-conforming Services from the date that Security Intel Ltd was notified of such non-conformity, error or defect.

 

14. Warranty Disclaimers

 

Except as expressly provided herein, Security Intel Ltd does not warrant that the services will be uninterrupted or error free or that all errors can or will be corrected; nor does it make any warranty as to the results that may be obtained from use of the services. 

 

Except as specifically provided in the agreement, the services, professional services, mobile application, and any other products and services provided by Security Intel Ltd to customer are provided “as is” and “as available”.

 

To the extent permitted by applicable law, Security Intel Ltd hereby disclaims all express, implied, collateral or statutory warranties, representations and conditions, whether written or oral, including any implied warranties or conditions of merchantability, merchantable quality, compatibility, title, non-infringement, security, reliability, completeness, quiet enjoyment, accuracy, quality, integration or fitness for a particular purpose or use, or any warranties or conditions arising out of course of dealing or usage of trade. 

 

Without limiting the generality of any of the foregoing, Security Intel Ltd expressly disclaims any representation, condition or warranty that any data or information provided to customer in connection with customer’s use of the services, professional services, or mobile application is accurate, or can or should be relied upon by customer for any purpose whatsoever.

 

15. Disclaimer Of Third-Party Actions And Technology

 

Security Intel Ltd does not and cannot control the flow of data to or from Security Intel Ltd’s Technology and other portions of the Internet. Such flow of data depends on the performance of Internet services provided or controlled by third parties. At times, actions or inactions of such third parties can impair or disrupt customer’s connections to the Internet (or portions thereof). Although Security Intel Ltd will use commercially reasonable efforts to take all actions it deems appropriate to remedy and avoid such events, Security Intel Ltd cannot guarantee that such events will not occur. 

 

Security Intel Ltd disclaims any and all liability resulting from or related to the performance or non-performance of internet services, software or systems provided or controlled by third parties (including customer) which are not Security Intel Ltd’s, subcontractors. Without limiting the generality of the foregoing, Security Intel Ltd is not responsible for any third-party (including customer) software or systems (including third-party technology) used by customer in order to access and use the services.

 

16. Indemnification

 

16.1   "By Security Interims Ltd". Security Intel Ltd will defend, indemnify and hold harmless Customer, its employees, officers, directors, affiliates, agents, contractors, successors, and assigns against any and all losses (including damages, recoveries, deficiencies, interest, penalties and legal fees) arising out of a third party claim made against Customer that Customer’s or its Authorized Users’ use of the Services or Mobile Application infringes on any Intellectual Property Right of a third party; provided that Security Intel Ltd is notified in writing of such claim promptly after such claim is made upon Customer. Security Intel Ltd will have no liability or obligation if the claim arises from: (a) any alteration or modification to the Services or Mobile Application by Customer or a third party not authorized by Security Intel Ltd; (b) any third party software or technology that is not proprietary to Security Intel Ltd or any combination of the Services or Mobile Application by Customer with other software or technology not furnished by Security Intel Ltd; or (c) any use by Customer of the Services or Mobile Application that is prohibited by the Agreement or otherwise outside the scope of use for which the Services or Mobile Application are intended.

 

16.2   "By Customer". Customer will defend, indemnify and hold harmless Security Intel Ltd, its employees, officers, directors, affiliates, agents, contractors, successors, and assigns against any and all losses (including damages, recoveries, deficiencies, interest, penalties and legal fees) from third party claims directly or indirectly arising from or in connection with: (i) Customer Data; (ii) Customer’s breach of any of Customer’s obligations, representations or warranties under the Agreement; or (iii) use of the Security Intel Ltd Services (or any part thereof) by Customer or any Authorized User in combination with any third-party software, application or service not provided by Security Intel Ltd.

 

16.3   "Indemnification Procedures". The indemnified party will fully cooperate with the indemnifying party in the defence of any claim defended by the indemnifying party pursuant to its indemnification obligations under the Agreement and will not settle any such claim without the prior written consent of the indemnified party.

 

17. Options For Infringement Claims

 

Without limiting Security Intel Ltd’s obligations under Section 16.1, if Customer or an Authorized User is enjoined from using the Services or Mobile Application, or if Security Intel Ltd believes that the Services or Mobile Application may become the subject of a claim of intellectual property infringement, Security Intel Ltd, at its option and expense, may: (a) procure the right for Customer to continue to use the Services; (b) replace or modify the Services or Mobile Application so as to make it non-infringing; provided, however, that the Services and Mobile Application continue to materially conform to the descriptions and specifications provided in the applicable Order Form; or (c) terminate the Agreement, in which case Security Intel Ltd will refund to Customer any Fees paid by Customer for those Services not yet delivered. This Section 17 and the preceding Section 16 set forth the sole liability of Security Intel Ltd to Customer, and Customer’s sole remedy, for any infringement by the Mobile Application or Services of any Intellectual Property Right of any third party.

 

18. Exclusion Of Certain Damages

 

To the maximum extent permitted under applicable law, in no event will either party be liable to the other party or any authorized user for any: (a) special, exemplary, punitive, indirect, incidental or consequential damages; (b) lost savings, profit, data, use, or goodwill; (c) business interruption; (d) costs for the procurement of substitute products or services; (e) personal injury or death; or (f) personal or property damage arising out of or in any way connected to the agreement.

 

19. Limitation Of Liability

 

19.1   Subject to the remainder of this section, in no event will either party’s aggregate liability, if any, including liability arising out of or in connection with the contract, negligence, strict liability in tort or warrant, or otherwise, exceed the amount of the Fees paid to Security Intel Ltd for the 12-month period leading up to the date any such liability arises.

 

19.2   In no event will either party’s aggregate liability, if any, for breaches of Section 10 (Mutual Exchange of Confidential Information), exceed GB£1,000,000.

 

19.3   Section 19.1 will not apply to limit either party’s obligations or liability pursuant to Section 16 (Indemnification).

 

19.4   In jurisdictions where the applicable law does not allow for limitation of liability or certain damages, some or all of the limitations in this section 19 may not apply and customer may have additional rights. The parties acknowledge that the provisions of this Section 19 have been negotiated by them and reflect a fair allocation of risk and form an essential basis of the bargain and will survive and continue in full force and effect despite any failure of consideration or of an exclusive remedy.

 

20. Notices

 

Notices sent to either party will be effective upon receipt when delivered in person or by email, one day after being sent by overnight courier, or five days after being sent by first class mail postage prepaid to the official contact designated by the party to whom a notice is being given. Notices must be in writing (including by email) and sent:

 

(i) If to Security Intel Ltd, to the following address: 3rd Floor, Shaftesbury House, Colchester, Essex, CO1 1LS. Notices sent by email must be sent to notices@siacontrolroom.co.uk  

(ii) If to Customer, to the current postal or email address that Security Intel Ltd has on file with respect to Customer. The customer is solely responsible for keeping its contact information on file with Security Interims Ltd current at all times during the term of the Agreement.

Security Intel Ltd may change its contact information by posting the new contact information on the Sites or by giving notice thereof to the Customer.

 

21. Assignment

 

Neither party will assign the Agreement to any third party without the other party’s prior written consent. Notwithstanding the foregoing, either party may assign the Agreement, in whole or in part, without the other party’s consent, in connection with the transfer or sale of all or substantially all of the party’s business or assets to a third party, whether by merger, sale of stock, sale or donation of assets or otherwise. Subject to the first sentence, the rights and liabilities of the parties hereto are binding on and will enure to the benefit of, the parties and their respective successors and permitted assigns. Any attempted assignment other than in accordance with this Section 21 will be null and void.

 

22. Force Majeure

 

Neither party will be liable for delays caused by any event or circumstances beyond the parties’ reasonable control, including acts of God, acts of government, flood, fire, earthquakes, civil unrest, acts of terror, strikes, or other labour problems (other than those involving Security Intel Ltd’s employees), Internet service failures or delays, or the unavailability or modification by third parties of telecommunications or hosting infrastructure or third-party websites.

 

23. Miscellaneous

 

"Governing Law, Jurisdiction and Venue". The Agreement and any action related thereto shall be construed in accordance with and governed by the laws of the United Kingdom applicable therein, without regard to conflicts of law principles. Any legal suit, action or proceeding arising out of or relating to the Agreement will be commenced in a court in the United Kingdom, and each party hereto irrevocably submits to the exclusive jurisdiction and venue of such court in any such suit, action or proceeding. This choice of venue does not prevent Security Intel Ltd from seeking injunctive relief with respect to a violation of Intellectual Property Rights or confidentiality obligations in any competent court in any appropriate jurisdiction.

 

"Waiver". The waiver by either party of a breach of or a default under any provision of the Agreement, will be in writing and will not be construed as a waiver of any subsequent breach of or default under the same or any other provision of the Agreement, nor will any delay or omission on the part of either party to exercise or avail itself of any right or remedy that it has or may have hereunder operate as a waiver of any right or remedy.

 

"Severability". If any provision of the Agreement is be held to be invalid or unenforceable by a court of competent jurisdiction, such provision will be severed from the Agreement and all other provisions of the Agreement will remain in full force and effect.

 

"Relationship of the Parties". Nothing contained in the Agreement will be deemed or construed as creating a joint venture, partnership, agency, employment, or fiduciary relationship between the parties. Neither party, nor either party’s agents, have any authority of any kind to bind the other party in any respect whatsoever, and the relationship of the parties is, and at all times will continue to be, that of independent contractors.

 

"Public Announcements". Security Intel Ltd may issue a press release or make other public announcements concerning the Agreement, may use Customer’s name as a customer reference, or use Customer’s trademarks on Security Intel Ltd’s customer lists or any other materials.

 

"Headings; Interpretation". The section and sub-section headings used in these Terms of Service are inserted for convenience only and will not affect the meaning or interpretation of the Agreement. The term “including” means “including without limiting the generality of the foregoing”.

 

"Modification and Amendment". No amendment or modification of any provision of the Agreement will be effective unless in writing and signed by a duly authorized signatory of Security Intel Ltd and Customer.

 

"Entire Agreement". The Agreement, including any third-party service terms incorporated by reference herein, constitutes the entire agreement between the parties concerning the subject matter hereof, and supersedes: (a) all prior or contemporaneous representations, discussions, proposals, negotiations, conditions, agreements, and communications, whether oral or written, between the parties relating to the subject matter of the Agreement, except as otherwise specified; and (b) all past courses of dealing and industry custom. The Customer shall also be bound by any other applicable Security Interims Ltd terms or policy, including but not limited to the API Terms of Use and any Data Processing Addendum.

 

"Language". The parties acknowledge having expressly required that these Terms of Service and the Agreement including all related documents or policies are to be drawn up in English.