Services Policy
VAEL Direct-to-Consumer Cybersecurity Monitoring Service Agreement
Effective Date:
Provider: SecurityInsecurity LLC (“Provider,” “we,” “us”)
Customer: (“Customer,” “you”)
By purchasing, activating, or using this Service, you acknowledge that you have read, understood, and agreed to every term in this agreement.
Scope of Service
-
Provider will provide software, active licenses, and will remotely assist with the installation and initial configuration of ESET PROTECT agents (“Software”) on Customer devices to support remote cybersecurity monitoring. The purpose of which is to identify and remediate malware, ransomware, spyware, and other notable threats.
-
The Service is limited to monitoring, alerting, reporting, and cybersecurity recommendations. Provider does not guarantee detection, prevention, removal, or remediation of any threats, malware, or unauthorized access.
-
Customer is solely responsible for following Provider recommendations, implementing security best practices, and acting on alerts. Provider is not liable for Customer inaction or failure to remediate detected issues.
Customer Obligations
-
Customer shall provide accurate device information, maintain reliable internet connectivity, system power, and regular software updates on all covered devices.
-
Customer shall not interfere, modify, reverse-engineer, bypass, or tamper with the Software or monitoring systems. Such activities nullify any warrantees and can result in termination of this agreement, without refund.
-
Customer acknowledges that failure to comply may limit Service effectiveness, and Provider is not liable for resulting security breaches, data loss, or device issues.
-
In the event that Customer non-compliance results in the ineffective operation of the Software, the Provider is not responsible for remediation activities.
-
Customer is responsible for frequent backup of all personal and critical data; Provider does not perform backups or data restoration except as explicitly agreed to in a separate contract.
-
Customer agrees to be bound by the End User Licensing Agreements (EULA) and terms and conditions of all ESET tools utilized (https://legal.eset.com/)
-
Customer systems must be configured with an approved operating system, per the ESET Supported Operating Systems list (https://help.eset.com/protect_cloud/en-US/operating_systems.html)
-
Customer acknowledges that Software automations may change the normal operation of their systems to a minor degree and that these impacts are outside of the control of the Provider.
On-Demand Risk Reports
Provider may generate and deliver risk reports from its monitoring software only upon Client’s request, up to twice per contract cycle. Delivery timelines for on-demand reports will be determined based on the complexity of the request and Provider’s current workload. Provider is not obligated to provide risk reports on a regular or recurring basis unless otherwise agreed in writing.
Limitations:
-
The Provider will support the Customer with one annual consultation for remediation activities resulting from a hack, breach, compromise, or data spill. This consultation shall not exceed a total of 5 combined hours.
-
Additional incident response support can be purchased by the Customer for subsequent security incidents/events.
Fees, Billing, and Termination
-
Service fees are $175.00 USD per year, unless otherwise discounted.
-
Fees are non-refundable, except as required by law.
-
Provider may suspend or terminate the Service immediately for nonpayment, misuse, breach of terms, or illegal activity.
-
Termination does not absolve Customer of prior obligations, including payment or indemnification.
Privacy and Data Collection
-
Provider collects system, security, and threat-related data from Customer devices.
-
Provider will not access personal files, emails, communications, passwords, or financial data without explicit written consent.
-
Provider will never control the Customer devices, remotely or in-person.
-
Data analyzed may include system logs, threat alerts, configuration data, and Software status.
-
Provider uses industry-standard security practices, but cannot guarantee complete protection of collected data.
-
Customer consents to data collection, processing, storage, and analysis, including cross-device monitoring if multiple devices are enrolled.
Incident Response and Service Timelines
Provider will respond to up to one reported security incident per annual contract cycle according to the following priority levels. Note that Incident Response support will not be automatic and must be initiated by the Customer via a direct request via electronic mail or phone call:
-
Critical Issues (e.g., system outages, confirmed security breaches, or issues resulting in complete loss of service): Provider will respond within 24 hours of notification.
-
High Priority Issues (e.g., significant service degradation, suspected security events, or issues severely impacting business operations): Provider will respond within 2 business days of notification.
-
Medium Priority Issues (e.g., functionality impaired but business operations are not critically impacted): Provider will respond within 5 business days of notification.
-
Low Priority Issues (e.g., general questions, non-urgent requests, or cosmetic issues): Provider will respond within 10 business days of notification.
For purposes of this Agreement, “respond” means that Provider will acknowledge receipt of the issue and initiate investigative or remedial action. Resolution times may vary depending on the complexity and severity of the incident.
Disclaimers
-
THE SERVICE IS PROVIDED “AS IS” AND “AS AVAILABLE.”
-
PROVIDER MAKES NO EXPRESS OR IMPLIED WARRANTIES, INCLUDING MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, NON-INFRINGEMENT, OR CONTINUOUS AVAILABILITY.
-
CUSTOMER ACKNOWLEDGES THAT CYBERSECURITY IS INHERENTLY RISKY, AND NO SERVICE CAN ELIMINATE ALL THREATS OR GUARANTEE DEVICE SECURITY.
-
Provider is not responsible for third-party software or operating system vulnerabilities, nor any security failures resulting from such vulnerabilities.
-
Provider will not assist with Software troubleshooting after the confirmation of a successful initial installation.
Reporting of Illegal Activity
Client acknowledges and agrees that if Provider, in the course of delivering services under this Agreement, discovers or reasonably suspects evidence of illegal activity, Provider may be legally or ethically obligated to report such activity to the appropriate law enforcement or regulatory authorities. Provider shall not be liable to Client for any disclosure made in good faith pursuant to such obligations.
Compliance with Law
Client acknowledges and agrees that if Provider becomes aware of evidence of illegal activity during the course of services, Provider shall comply with all applicable laws and regulations, which may include reporting such activity to the appropriate law enforcement or regulatory authorities. Provider shall not be liable to Client for any disclosure made in good faith in compliance with applicable legal requirements.
​
Limitation of Liability
TO THE MAXIMUM EXTENT PERMITTED BY LAW, PROVIDER IS NOT LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, CONSEQUENTIAL, OR PUNITIVE DAMAGES, INCLUDING:
-
Loss, corruption, or theft of data
-
Financial or business losses
-
Device malfunction, downtime, or reduced performance
-
Unauthorized access, hacking, or cyberattack events
Customer agrees that provider’s total liability for any claim is strictly limited to the total fees paid by customer in the 12 months prior to the claim. This limitation applies regardless of legal theory, including contract, tort, negligence, strict liability, or otherwise.
Indemnification
Customer shall indemnify, defend, and hold harmless Provider, its officers, directors, employees, agents, and affiliates from all claims, damages, losses, liabilities, costs, or expenses arising from:
-
Misuse or unauthorized use of the Service
-
Failure to follow Provider recommendations or alerts
-
Violation of laws or these Terms
-
Actions or inactions causing harm to devices, data, or third parties
Consent and Acknowledgment
Customer explicitly consents to:
-
Installation and operation of Software
-
Collection, storage, and analysis of system and security data
-
Remote monitoring, alerts, and guidance
-
Customer acknowledges that the Service does not prevent malware, cyberattacks, or unauthorized access.
-
Customer confirms understanding of risks, limitations, and responsibilities and agrees to assume all responsibility for any resulting consequences.
Regulatory Compliance
-
Provider is not responsible for compliance with HIPAA, GLBA, PCI-DSS, or other regulatory frameworks.
-
Customers in regulated industries must ensure the Service meets their obligations.
-
Provider may terminate service if Customer requests actions that violate law, regulation, or Software licensing agreements.
Force Majeure
Provider is not liable for delays or failures due to events beyond its reasonable control, including:
-
Natural disasters, power outages, internet failures
-
Cyberattacks, malware outbreaks, or other security incidents
-
Governmental actions, labor disputes, or acts of God
Dispute Resolution and Arbitration
-
All disputes will first attempt resolution via good faith negotiation.
-
Unresolved disputes are subject to binding arbitration in New York State.
-
Customer waives the right to participate in class actions or collective proceedings.
-
Arbitration costs will be allocated as determined by the arbitrator, except as prohibited by law.
Termination
-
Either party may terminate with written notice.
-
Termination does not release prior obligations or accrued fees.
-
Customer must uninstall Software and secure devices after termination.
-
Provider reserves the right to terminate immediately for illegal activity, violation of Terms, or misuse of Service.
Miscellaneous
-
This agreement is the entire agreement; no oral or written statements modify it.
-
Governing law is New York, with venue in East Northport, New York.
-
If any provision is invalid, the remainder is enforceable.
-
Customer confirms they have read, understood, and accepted every provision prior to purchase.
-
Customer acknowledges that they have had the opportunity to consult legal counsel before accepting.
-
Purchasing of this service constitutes a formal acknowledgement and agreement to all parts.
