1.1 These terms and conditions govern the use of the cybersecurity services provided by HardenOS (referred to as "we", "us", or "our") to our clients (referred to as "you" or "your").
1.2 By using our services, you agree to be bound by these terms and conditions. If you do not agree to these terms and conditions, please do not use our services.
2.1 We offer a range of cybersecurity services, including but not limited to:
2.2 The specific services provided to you will be outlined in a separate agreement or proposal.
3.1 The fees for our services will be outlined in the agreement or proposal provided to you.
3.2 Payment terms will be specified in the agreement or proposal. Failure to make timely payments may result in suspension or termination of services.
4.1 We understand the importance of confidentiality in our work. We will take all reasonable steps to protect your confidential information.
4.2 You agree to keep confidential any information provided to you by us or our representatives.
5.1 To the extent permitted by law, we shall not be liable for any direct, indirect, incidental, special, or consequential damages arising out of or in any way connected with the use of our services.
5.2 Our liability for any breach of these terms and conditions shall be limited to the fees paid by you for the services.
6.1 These terms and conditions are governed by and construed in accordance with the laws of the United States of America. Any disputes arising out of or in connection with these terms and conditions shall be subject to the exclusive jurisdiction of the courts of the United States of America.
7.1 We reserve the right to change these terms and conditions at any time. Any changes will be effective immediately upon posting on our website.
8.1 If you have any questions about these terms and conditions, please contact us at gbingham3.gb@gmail.com.
Images: The images used in GIF and various other formats on this site are either created by us, sourced from royalty-free image websites, or used with permission. If you believe that an image has been used without proper permission, please contact us immediately so we can rectify the situation.
Open Source Software: We utilize various open-source software in our services. Open-source software is software that can be freely used, modified, and distributed by anyone. Some open-source software may have commercial versions available. We do not claim ownership of any open-source software used.
Links to Wikipedia.com: We may provide links to Wikipedia.com for reference purposes. Wikipedia is a free online encyclopedia that anyone can edit. We are not responsible for the content on Wikipedia.com.
Other Software: We may also use software that is not open source but is available freely to the public. Some of this software may have a fee for commercialized use. We will always strive to use software legally and ethically.