Terms of Service
Effective Date: January 1, 2026
Last Updated: May 8, 2026
These Terms of Service (“Terms”) govern the provision of information technology, cybersecurity consulting, remote support, and related services (“Services”) by CGetty Technologies LLC (“CGetty,” “Company,” “we,” “us,” or “our”) to the client (“Client,” “you”).
By requesting services, accepting an estimate, or submitting payment, Client agrees to these Terms in effect at the time of acceptance.
1. Scope of Services
CGetty provides on-demand IT services, cybersecurity consulting, remote support, and related professional services. Unless covered by a separate managed services agreement (see Section 13), Services are provided on a best-effort, on-demand basis.
Specific service details, pricing, and timelines may be outlined in estimates, invoices, or written communications accepted by Client.
2. Client Responsibilities
Client remains responsible for:
- Their systems, devices, data, backups, and licensing
- Compliance with applicable laws and regulations
- Business continuity and disaster recovery planning
Client agrees to provide accurate information, necessary access, and cooperation required to perform Services.
3. Confidentiality & Sensitive Information
During the course of Services, CGetty may have access to confidential, proprietary, or sensitive business information, including system data, credentials, internal documentation, or customer information (“Confidential Information”).
CGetty agrees to:
- Use Confidential Information solely to perform Services
- Not disclose Confidential Information to unauthorized third parties
- Apply reasonable safeguards consistent with industry best practices
Client acknowledges that no service can guarantee absolute security, and CGetty does not warrant that all threats, vulnerabilities, or data exposure can be prevented.
4. Remote Access & Consent
All remote support sessions require explicit client initiation or authorization. CGetty does not retain persistent or unattended access after completion of a session unless separately agreed in writing.
5. Fees & Payment
Fees are as stated on estimates or invoices. Payment is due per the terms stated on the invoice unless otherwise agreed.
Failure to pay may result in suspension or refusal of Services.
6. Advisory Nature of Services
All recommendations, guidance, or security advice are advisory in nature unless explicitly contracted for implementation or managed services.
CGetty does not guarantee specific outcomes, compliance status, or uninterrupted operation.
7. Limitation of Liability
To the maximum extent permitted by law:
- CGetty is not responsible for pre-existing issues, third-party failures, or events outside reasonable control
- CGetty shall not be liable for indirect, incidental, or consequential damages, including loss of profits, business interruption, or loss of data
Total aggregate liability for any claim or series of related claims shall not exceed the greater of (a) ten thousand U.S. dollars ($10,000) or (b) the fees paid by Client to CGetty in the twelve (12) months immediately preceding the event giving rise to the claim.
8. Termination
On-demand engagements may be terminated by either party at any time without notice.
Managed services or recurring service agreements require thirty (30) days’ written notice from the terminating party, except in cases of material breach (which may be terminated immediately upon written notice).
Outstanding fees for Services rendered remain payable upon termination. Treatment of client data following termination is addressed in our Privacy Policy, Section 8 (Data Retention).
9. Changes to These Terms
CGetty may update these Terms from time to time. Updates apply only to future Services or transactions and do not retroactively alter terms previously accepted.
Continued use of Services after an update constitutes acceptance of the revised Terms for future engagements.
10. Governing Law
These Terms are governed by the laws of the Commonwealth of Pennsylvania, without regard to conflict of law principles.
11. Third-Party Products & Services
CGetty may recommend, resell, configure, or assist with third-party software, hardware, cloud services, telecommunications, payment processors, or other vendor solutions. Such products and services are governed by the respective third-party provider’s terms and policies.
CGetty is not responsible for third-party outages, vendor security incidents, licensing disputes, product defects, or changes in pricing or service availability. Procurement-specific terms are addressed in Section 15.
12. Data Backup & Data Loss Disclaimer
Client acknowledges that data loss may occur due to hardware failure, software malfunction, cyber attack, user error, or other unforeseen events.
Unless expressly contracted for managed backup services, Client is solely responsible for maintaining verified backups of all data. CGetty shall not be liable for data loss, corruption, or recovery costs.
13. Managed or Recurring Services (If Offered)
If Client enters into a managed services or recurring subscription agreement, additional terms may apply, including service levels, response times, and minimum commitment periods as outlined in a separate agreement or service schedule.
14. Subcontractors
CGetty may engage qualified subcontractors or independent contractors to perform portions of the Services.
CGetty remains responsible for the performance of such subcontractors under these Terms.
15. Equipment & Procurement
If CGetty assists with procurement of equipment, software, or licenses:
- All purchases are final unless otherwise stated by the vendor
- Warranties are provided solely by the manufacturer or vendor
- Risk of loss transfers to Client upon delivery
16. Indemnification
A. Client Indemnification
Client agrees to indemnify and hold harmless CGetty from claims arising out of:
- Client’s misuse of Services
- Client’s violation of law
- Infringement of third-party rights by Client
- Failure to maintain security or compliance obligations within Client’s environment
B. CGetty IP Indemnification
CGetty will indemnify Client against third-party claims that CGetty’s deliverables, as delivered, infringe a U.S. patent, copyright, or trade secret, provided Client gives CGetty prompt written notice of the claim and reasonable cooperation in defense. CGetty’s liability under this clause is subject to Section 7 (Limitation of Liability). This indemnity does not apply to claims arising from Client’s modification of deliverables or combination with materials not provided by CGetty.
17. Force Majeure
CGetty shall not be liable for failure or delay in performance due to causes beyond reasonable control, including acts of God, power outages, internet disruptions, governmental actions, natural disasters, or cyber incidents impacting third-party suppliers, telecommunications, or critical infrastructure outside CGetty’s reasonable control.
Force majeure does not include cyber incidents directly affecting CGetty’s own environment in a way that disrupts Service delivery, since responding to cyber incidents is part of CGetty’s professional responsibility.
18. Dispute Resolution
Any dispute arising under these Terms shall be brought in the courts located in the Commonwealth of Pennsylvania.
Both parties consent to personal jurisdiction and venue therein.
19. Intellectual Property
A. Pre-Existing IP and Templates
CGetty’s pre-existing intellectual property — including templates, methodologies, frameworks, software tools, checklists, and reusable components — remains the sole property of CGetty.
B. Client-Specific Deliverables
Custom-tailored deliverables created specifically for Client (including security assessments of Client’s environment, written policies tailored to Client’s operations, customized reports, and similar work product) are owned by Client upon full payment of fees.
CGetty retains a perpetual, irrevocable, non-exclusive, royalty-free license to use anonymized work product for portfolio, marketing, methodology improvement, and internal training purposes.
C. Internal Records
CGetty retains ownership of internal records, project notes, time logs, and operational documentation generated in the course of providing Services.
20. Contact
Questions regarding these Terms may be directed to:
CGetty Technologies LLC
Phone: (814) 273-6101
Email: info@cgetty.com
Website: https://www.cgetty.com
The following Acceptable Use Policy supplements the Terms above and applies to managed engagements.
Acceptable Use Policy
Effective Date: January 1, 2026
Last Updated: May 8, 2026
This Acceptable Use Policy (“AUP”) supplements the Terms of Service above and defines the standards governing Client use of systems, networks, platforms, and services that CGetty Technologies LLC manages, maintains, accesses, or has configured on Client’s behalf. It also governs Client use of any CGetty-provided portals, tools, or shared resources.
By engaging CGetty for any managed or ongoing service — and by accepting any estimate, invoice, or service agreement — Client accepts and agrees to comply with this AUP and to ensure that all of Client’s authorized users do the same.
AUP — 1. Scope
This AUP applies to:
- All systems, networks, and infrastructure that CGetty manages or monitors on Client’s behalf
- All cloud platforms, SaaS services, and applications configured or administered by CGetty for Client
- All CGetty-provided portals, tools, or shared resources accessible to Client
- All Client personnel, contractors, and agents who use the above
This AUP does not apply to systems, accounts, or services Client operates independently of CGetty’s management or administration.
AUP — 2. Permitted Use
Client and Client’s authorized users may use managed systems and services for:
- Legitimate business operations consistent with the purpose for which the systems were designed and configured
- Accessing business applications, data, and communications required for authorized work
- Activities expressly authorized in writing by CGetty for specific engagements
All other uses require prior written authorization from CGetty.
AUP — 3. Prohibited Activities
The following activities are prohibited on any system, network, or service managed by CGetty.
3.1 Security and system integrity
- Attempting to gain unauthorized access to any system, account, network, or data
- Installing, executing, or distributing malware, ransomware, spyware, or any other malicious software
- Modifying, disabling, or circumventing any security control, monitoring system, encryption, or authentication mechanism
- Conducting penetration testing, vulnerability scanning, or network reconnaissance on managed environments without prior written authorization from CGetty
- Intentionally introducing vulnerabilities, backdoors, or unauthorized remote access tools
- Sharing credentials, multi-factor authentication tokens, or access codes with unauthorized individuals
3.2 Data and privacy
- Accessing, copying, transmitting, or storing data beyond what is necessary for authorized job functions
- Storing sensitive, regulated, or confidential data on unencrypted personal devices or unauthorized cloud platforms
- Transmitting personally identifiable information (PII), protected health information (PHI), or payment card data in violation of applicable regulatory requirements
- Attempting to access another user’s accounts, files, or communications without authorization
3.3 Network and system resources
- Using managed systems or network resources for cryptocurrency mining or other resource-intensive unauthorized purposes
- Deliberately consuming excessive bandwidth, storage, or processing resources in a manner that degrades service availability
- Connecting unauthorized devices to managed networks without prior approval from CGetty
3.4 Legal and compliance
- Using managed systems or services in violation of any applicable federal, state, or local law or regulation
- Engaging in harassment, fraud, phishing, spam, or any other form of abuse through managed systems
- Violating any third-party intellectual property rights, license terms, or terms of service
- Storing, transmitting, or processing illegal content of any kind
3.5 Unauthorized changes
- Making configuration changes to managed systems, networks, or security settings without prior written coordination with CGetty
- Installing software, applications, or browser extensions on managed devices without authorization
AUP — 4. Client Responsibilities Under This AUP
Client is responsible for:
- Ensuring that all authorized users are informed of and comply with this Acceptable Use Policy
- Promptly reporting any suspected policy violations, security incidents, or unauthorized access to CGetty
- Maintaining accurate and current user access lists, and promptly notifying CGetty when user access should be modified or revoked
- Ensuring that any third-party contractors or vendors accessing managed systems comply with this policy
AUP — 5. Monitoring and Audit
Client acknowledges and agrees that:
- CGetty may monitor managed systems, networks, and services for security events, performance, compliance, and service delivery purposes
- Monitoring activities may include log review, alert analysis, traffic analysis, and periodic security assessments
- Such monitoring is conducted solely for the purpose of delivering and protecting managed services
- CGetty will handle any information obtained through monitoring in accordance with applicable confidentiality agreements
AUP — 6. Consequences of Violations
Violations of this AUP may result in:
- Immediate suspension of access to affected systems pending investigation
- Termination of the applicable service agreement in accordance with its termination provisions
- Notification of appropriate law enforcement authorities where criminal activity is suspected
- Civil legal action to recover damages arising from the violation
CGetty will investigate suspected violations promptly and will communicate findings to Client in accordance with the applicable service agreement. Client shall cooperate with any investigation and shall preserve all relevant evidence upon notification of a suspected violation.
AUP — 7. Reporting
Client personnel who become aware of a potential AUP violation, security incident, or misuse of managed systems should report it immediately to CGetty using the support contact information provided in the applicable service agreement, or by emailing info@cgetty.com. CGetty will treat reports in confidence to the extent permitted by law and applicable agreements.
AUP — 8. Updates to This AUP
CGetty may update this Acceptable Use Policy from time to time. Material changes will be communicated to active clients in writing with at least thirty (30) days’ notice before the updated policy takes effect. Continued use of CGetty-managed services after the notice period constitutes acceptance of the updated policy.
AUP — 9. Relationship to the Terms of Service
This AUP is incorporated into and governed by the Terms of Service above, including the sections on Limitation of Liability, Governing Law, and Dispute Resolution. In the event of any inconsistency between this AUP and the Terms of Service, the Terms of Service control unless the inconsistency relates specifically to acceptable use of managed systems, in which case this AUP controls.
