Terms and Conditions

Terms and Conditions for Pendragon Security Cybersecurity Consulting Company

Please carefully read the following Terms and Conditions before using the services provided by our cybersecurity consulting company. These Terms and Conditions govern your access to and use of our services. By engaging with our services, you accept and agree to be bound by these Terms and Conditions.

1. Services

Our cybersecurity consulting company offers a range of services, including but not limited to cybersecurity risk assessments, vulnerability assessments, penetration testing, incident response planning, and security awareness training. The specific details and scope of services will be agreed upon in writing between the client and our company.

2. Client Resposibilities

Clients engaging our services are responsible for providing accurate and complete information regarding their existing IT infrastructure, systems, and security requirements. Clients should cooperate with our consultants, provide necessary access, and promptly respond to requests for information or clarification.

3. Confidentiality

Our cybersecurity consulting company recognizes the confidential nature of the information shared by clients during the engagement. We will take reasonable measures to maintain the confidentiality and security of client information and will not disclose any confidential information to third parties without prior written consent, unless required by law.

4. Intelectual Property

Any intellectual property rights associated with the deliverables produced by our cybersecurity consulting company during the engagement will remain the property of our company unless otherwise agreed upon in writing. Clients will receive a non-exclusive, non-transferable license to use the deliverables solely for their internal security purposes.

5. Limitation of Liability

Our cybersecurity consulting company strives to provide accurate and effective services. However, we cannot guarantee the complete elimination of security risks or the prevention of all cybersecurity incidents. In no event shall our company be liable for any direct, indirect, incidental, consequential, or special damages arising from or in connection with our services.

6. Payment Terms

Clients engaging our services are responsible for paying the agreed-upon fees and expenses as outlined in the project agreement or statement of work. Payment terms, including invoicing schedules and accepted payment methods, will be specified in the project agreement. Our company reserves the right to suspend or terminate services in the event of non-payment or late payment.

7. Termination

Either party may terminate the engagement by providing written notice to the other party. In the event of termination, the client will be responsible for paying any outstanding fees or expenses incurred up to the termination date. Any provisions that, by their nature, should survive termination (such as confidentiality and intellectual property) shall remain in effect.

8. Governing Law and Jurisdiction

These Terms and Conditions shall be governed by and construed in accordance with the laws of the state of Louisiana. Any disputes arising out of or in connection with these Terms and Conditions shall be subject to the exclusive jurisdiction of the courts in Louisiana.

9. Amendments

Our cybersecurity consulting company reserves the right to modify or amend these Terms and Conditions at any time. Any changes will be effective upon posting the revised version on our website or providing notice to clients. Continued use of our services after such modifications constitutes acceptance of the updated Terms and Conditions.

10. Entire Agreement

These Terms and Conditions constitute the entire agreement between the client and our cybersecurity consulting company and supersede any prior agreements, understandings, or representations, whether oral or written.

If you have any questions or concerns about these Terms and Conditions, please contact us for clarification before engaging our services.