CGetty Technologies LLC
  • Home
  • Services
    • All Services
    • Cybersecurity
    • Remote Support
    • Microsoft 365 & Cloud
    • Backup & Recovery
    • Security Policies
    • Managed IT & Security
    • Emergency Support
    • IT System Review
    • Cyber Posture Review
    • Security Awareness Training
  • Industry Compliance
    • View All Industries
    • Healthcare & Medical
    • Financial Services
    • CPA / Accounting / Tax
    • Legal / Law Firms
    • Defense Contractors
    • Insurance Agencies
    • Retail / E-Commerce
    • Hospitality / Restaurants
    • Manufacturing
    • Education
    • Government / Public Sector
    • Real Estate / Title
    • Energy / Utilities
    • Nonprofit / Religious
    • Construction / Trades
    • Professional Services
  • Resources
  • About
  • FAQ
  • Contact

Terms of Service

Effective Date: January 1, 2026

Last Updated: May 8, 2026

These Terms of Service (“Terms”) govern the provision of information technology, cybersecurity consulting, remote support, and related services (“Services”) by CGetty Technologies LLC (“CGetty,” “Company,” “we,” “us,” or “our”) to the client (“Client,” “you”).

By requesting services, accepting an estimate, or submitting payment, Client agrees to these Terms in effect at the time of acceptance.

1. Scope of Services

CGetty provides on-demand IT services, cybersecurity consulting, remote support, and related professional services. Unless covered by a separate managed services agreement (see Section 13), Services are provided on a best-effort, on-demand basis.

Specific service details, pricing, and timelines may be outlined in estimates, invoices, or written communications accepted by Client.

2. Client Responsibilities

Client remains responsible for:

  • Their systems, devices, data, backups, and licensing
  • Compliance with applicable laws and regulations
  • Business continuity and disaster recovery planning

Client agrees to provide accurate information, necessary access, and cooperation required to perform Services.

3. Confidentiality & Sensitive Information

During the course of Services, CGetty may have access to confidential, proprietary, or sensitive business information, including system data, credentials, internal documentation, or customer information (“Confidential Information”).

CGetty agrees to:

  • Use Confidential Information solely to perform Services
  • Not disclose Confidential Information to unauthorized third parties
  • Apply reasonable safeguards consistent with industry best practices

Client acknowledges that no service can guarantee absolute security, and CGetty does not warrant that all threats, vulnerabilities, or data exposure can be prevented.

4. Remote Access & Consent

All remote support sessions require explicit client initiation or authorization. CGetty does not retain persistent or unattended access after completion of a session unless separately agreed in writing.

5. Fees & Payment

Fees are as stated on estimates or invoices. Payment is due per the terms stated on the invoice unless otherwise agreed.

Failure to pay may result in suspension or refusal of Services.

6. Advisory Nature of Services

All recommendations, guidance, or security advice are advisory in nature unless explicitly contracted for implementation or managed services.

CGetty does not guarantee specific outcomes, compliance status, or uninterrupted operation.

7. Limitation of Liability

To the maximum extent permitted by law:

  • CGetty is not responsible for pre-existing issues, third-party failures, or events outside reasonable control
  • CGetty shall not be liable for indirect, incidental, or consequential damages, including loss of profits, business interruption, or loss of data

Total aggregate liability for any claim or series of related claims shall not exceed the greater of (a) ten thousand U.S. dollars ($10,000) or (b) the fees paid by Client to CGetty in the twelve (12) months immediately preceding the event giving rise to the claim.

8. Termination

On-demand engagements may be terminated by either party at any time without notice.

Managed services or recurring service agreements require thirty (30) days’ written notice from the terminating party, except in cases of material breach (which may be terminated immediately upon written notice).

Outstanding fees for Services rendered remain payable upon termination. Treatment of client data following termination is addressed in our Privacy Policy, Section 8 (Data Retention).

9. Changes to These Terms

CGetty may update these Terms from time to time. Updates apply only to future Services or transactions and do not retroactively alter terms previously accepted.

Continued use of Services after an update constitutes acceptance of the revised Terms for future engagements.

10. Governing Law

These Terms are governed by the laws of the Commonwealth of Pennsylvania, without regard to conflict of law principles.

11. Third-Party Products & Services

CGetty may recommend, resell, configure, or assist with third-party software, hardware, cloud services, telecommunications, payment processors, or other vendor solutions. Such products and services are governed by the respective third-party provider’s terms and policies.

CGetty is not responsible for third-party outages, vendor security incidents, licensing disputes, product defects, or changes in pricing or service availability. Procurement-specific terms are addressed in Section 15.

12. Data Backup & Data Loss Disclaimer

Client acknowledges that data loss may occur due to hardware failure, software malfunction, cyber attack, user error, or other unforeseen events.

Unless expressly contracted for managed backup services, Client is solely responsible for maintaining verified backups of all data. CGetty shall not be liable for data loss, corruption, or recovery costs.

13. Managed or Recurring Services (If Offered)

If Client enters into a managed services or recurring subscription agreement, additional terms may apply, including service levels, response times, and minimum commitment periods as outlined in a separate agreement or service schedule.

14. Subcontractors

CGetty may engage qualified subcontractors or independent contractors to perform portions of the Services.

CGetty remains responsible for the performance of such subcontractors under these Terms.

15. Equipment & Procurement

If CGetty assists with procurement of equipment, software, or licenses:

  • All purchases are final unless otherwise stated by the vendor
  • Warranties are provided solely by the manufacturer or vendor
  • Risk of loss transfers to Client upon delivery

16. Indemnification

A. Client Indemnification

Client agrees to indemnify and hold harmless CGetty from claims arising out of:

  • Client’s misuse of Services
  • Client’s violation of law
  • Infringement of third-party rights by Client
  • Failure to maintain security or compliance obligations within Client’s environment

B. CGetty IP Indemnification

CGetty will indemnify Client against third-party claims that CGetty’s deliverables, as delivered, infringe a U.S. patent, copyright, or trade secret, provided Client gives CGetty prompt written notice of the claim and reasonable cooperation in defense. CGetty’s liability under this clause is subject to Section 7 (Limitation of Liability). This indemnity does not apply to claims arising from Client’s modification of deliverables or combination with materials not provided by CGetty.

17. Force Majeure

CGetty shall not be liable for failure or delay in performance due to causes beyond reasonable control, including acts of God, power outages, internet disruptions, governmental actions, natural disasters, or cyber incidents impacting third-party suppliers, telecommunications, or critical infrastructure outside CGetty’s reasonable control.

Force majeure does not include cyber incidents directly affecting CGetty’s own environment in a way that disrupts Service delivery, since responding to cyber incidents is part of CGetty’s professional responsibility.

18. Dispute Resolution

Any dispute arising under these Terms shall be brought in the courts located in the Commonwealth of Pennsylvania.

Both parties consent to personal jurisdiction and venue therein.

19. Intellectual Property

A. Pre-Existing IP and Templates

CGetty’s pre-existing intellectual property — including templates, methodologies, frameworks, software tools, checklists, and reusable components — remains the sole property of CGetty.

B. Client-Specific Deliverables

Custom-tailored deliverables created specifically for Client (including security assessments of Client’s environment, written policies tailored to Client’s operations, customized reports, and similar work product) are owned by Client upon full payment of fees.

CGetty retains a perpetual, irrevocable, non-exclusive, royalty-free license to use anonymized work product for portfolio, marketing, methodology improvement, and internal training purposes.

C. Internal Records

CGetty retains ownership of internal records, project notes, time logs, and operational documentation generated in the course of providing Services.

20. Contact

Questions regarding these Terms may be directed to:

CGetty Technologies LLC

Phone: (814) 273-6101

Email: info@cgetty.com

Website: https://www.cgetty.com

The following Acceptable Use Policy supplements the Terms above and applies to managed engagements.

Acceptable Use Policy

Effective Date: January 1, 2026

Last Updated: May 8, 2026

This Acceptable Use Policy (“AUP”) supplements the Terms of Service above and defines the standards governing Client use of systems, networks, platforms, and services that CGetty Technologies LLC manages, maintains, accesses, or has configured on Client’s behalf. It also governs Client use of any CGetty-provided portals, tools, or shared resources.

By engaging CGetty for any managed or ongoing service — and by accepting any estimate, invoice, or service agreement — Client accepts and agrees to comply with this AUP and to ensure that all of Client’s authorized users do the same.

AUP — 1. Scope

This AUP applies to:

  • All systems, networks, and infrastructure that CGetty manages or monitors on Client’s behalf
  • All cloud platforms, SaaS services, and applications configured or administered by CGetty for Client
  • All CGetty-provided portals, tools, or shared resources accessible to Client
  • All Client personnel, contractors, and agents who use the above

This AUP does not apply to systems, accounts, or services Client operates independently of CGetty’s management or administration.

AUP — 2. Permitted Use

Client and Client’s authorized users may use managed systems and services for:

  • Legitimate business operations consistent with the purpose for which the systems were designed and configured
  • Accessing business applications, data, and communications required for authorized work
  • Activities expressly authorized in writing by CGetty for specific engagements

All other uses require prior written authorization from CGetty.

AUP — 3. Prohibited Activities

The following activities are prohibited on any system, network, or service managed by CGetty.

3.1 Security and system integrity

  • Attempting to gain unauthorized access to any system, account, network, or data
  • Installing, executing, or distributing malware, ransomware, spyware, or any other malicious software
  • Modifying, disabling, or circumventing any security control, monitoring system, encryption, or authentication mechanism
  • Conducting penetration testing, vulnerability scanning, or network reconnaissance on managed environments without prior written authorization from CGetty
  • Intentionally introducing vulnerabilities, backdoors, or unauthorized remote access tools
  • Sharing credentials, multi-factor authentication tokens, or access codes with unauthorized individuals

3.2 Data and privacy

  • Accessing, copying, transmitting, or storing data beyond what is necessary for authorized job functions
  • Storing sensitive, regulated, or confidential data on unencrypted personal devices or unauthorized cloud platforms
  • Transmitting personally identifiable information (PII), protected health information (PHI), or payment card data in violation of applicable regulatory requirements
  • Attempting to access another user’s accounts, files, or communications without authorization

3.3 Network and system resources

  • Using managed systems or network resources for cryptocurrency mining or other resource-intensive unauthorized purposes
  • Deliberately consuming excessive bandwidth, storage, or processing resources in a manner that degrades service availability
  • Connecting unauthorized devices to managed networks without prior approval from CGetty

3.4 Legal and compliance

  • Using managed systems or services in violation of any applicable federal, state, or local law or regulation
  • Engaging in harassment, fraud, phishing, spam, or any other form of abuse through managed systems
  • Violating any third-party intellectual property rights, license terms, or terms of service
  • Storing, transmitting, or processing illegal content of any kind

3.5 Unauthorized changes

  • Making configuration changes to managed systems, networks, or security settings without prior written coordination with CGetty
  • Installing software, applications, or browser extensions on managed devices without authorization

AUP — 4. Client Responsibilities Under This AUP

Client is responsible for:

  • Ensuring that all authorized users are informed of and comply with this Acceptable Use Policy
  • Promptly reporting any suspected policy violations, security incidents, or unauthorized access to CGetty
  • Maintaining accurate and current user access lists, and promptly notifying CGetty when user access should be modified or revoked
  • Ensuring that any third-party contractors or vendors accessing managed systems comply with this policy

AUP — 5. Monitoring and Audit

Client acknowledges and agrees that:

  • CGetty may monitor managed systems, networks, and services for security events, performance, compliance, and service delivery purposes
  • Monitoring activities may include log review, alert analysis, traffic analysis, and periodic security assessments
  • Such monitoring is conducted solely for the purpose of delivering and protecting managed services
  • CGetty will handle any information obtained through monitoring in accordance with applicable confidentiality agreements

AUP — 6. Consequences of Violations

Violations of this AUP may result in:

  • Immediate suspension of access to affected systems pending investigation
  • Termination of the applicable service agreement in accordance with its termination provisions
  • Notification of appropriate law enforcement authorities where criminal activity is suspected
  • Civil legal action to recover damages arising from the violation

CGetty will investigate suspected violations promptly and will communicate findings to Client in accordance with the applicable service agreement. Client shall cooperate with any investigation and shall preserve all relevant evidence upon notification of a suspected violation.

AUP — 7. Reporting

Client personnel who become aware of a potential AUP violation, security incident, or misuse of managed systems should report it immediately to CGetty using the support contact information provided in the applicable service agreement, or by emailing info@cgetty.com. CGetty will treat reports in confidence to the extent permitted by law and applicable agreements.

AUP — 8. Updates to This AUP

CGetty may update this Acceptable Use Policy from time to time. Material changes will be communicated to active clients in writing with at least thirty (30) days’ notice before the updated policy takes effect. Continued use of CGetty-managed services after the notice period constitutes acceptance of the updated policy.

AUP — 9. Relationship to the Terms of Service

This AUP is incorporated into and governed by the Terms of Service above, including the sections on Limitation of Liability, Governing Law, and Dispute Resolution. In the event of any inconsistency between this AUP and the Terms of Service, the Terms of Service control unless the inconsistency relates specifically to acceptable use of managed systems, in which case this AUP controls.

CGetty Technologies LLC

Cybersecurity and IT Support for Homes and Small Businesses. Veteran-owned. Pennsylvania-based.

Facebook

SERVICES

  • All Services
  • Cybersecurity
  • Remote Support
  • Microsoft 365 & Cloud
  • Backup & Recovery
  • Security Policies
  • Managed IT & Security
  • Emergency & After-Hours Support
  • IT System Review
  • Cyber Posture Review
  • Security Awareness Training
  • Website Services

INDUSTRIES

  • All Industries
  • Healthcare & Medical
  • Financial Services
  • CPA / Accounting
  • Legal / Law Firms
  • Defense Contractors
  • Insurance Agencies
  • Real Estate / Title

COMPANY

  • About
  • FAQ
  • Industry Compliance
  • Contact Us

CONTACT

(814) 273-6101
By appointment only.
We respond within 24 hours.
Pennsylvania


SERVICE AREAS

Proudly serving small businesses and homeowners across Pennsylvania, including Edinboro, Erie, Meadville, Cambridge Springs, Waterford, Albion, Girard, Towanda, Sayre, Athens, Wysox, Wyalusing, Troy, Canton, Wellsboro, and Mansfield.

© 2026 CGetty Technologies LLC — All Rights Reserved.

Terms of Service  |  Privacy Policy