Best IT Support for | Conyers | Covington | Madison | McDonough | DeKalb

We provide IT Support for your Business.

Call Us, and a live person will answer the phone to help you.

770-929-1155

Cybersecurity

1. Mandatory Comprehensive Device Protection.

  1. Customer understands that, unless the network is fully protected across all endpoints, this creates uncertainty and risk for both our organization and yours.
  2. All computing devices that connect to, access, or operate on the Client’s network or data environment—including but not limited to workstations, desktops, laptops, and servers—must be protected under the Provider’s cybersecurity services.
  3. No device may be excluded from coverage. Opt-outs, partial deployments, or selective protection are not permitted under this Agreement.
  4. The Client acknowledges that cybersecurity protections are only effective when applied consistently across all systems.

2. Notification of New Devices

  1. The Client agrees to notify the Provider promptly of any new or replacement computers, laptops, servers, or other applicable devices added to the network.
  2. Failure to notify the Provider of new devices may result in those devices being unprotected and may constitute a breach of this Agreement.

3. Acknowledgement of Cybersecurity Risk

  1. The Client understands and acknowledges that no cybersecurity solution can guarantee complete prevention of cyber incidents or breaches.
  2. Cybersecurity services are designed to reduce risk, detect threats, and improve response capabilities, but cyberattacks, system compromises, and data breaches may still occur.

4. Limitation of Liability

In the event of a cybersecurity incident, breach, ransomware attack, or other security-related event, Selective Solutions LLC shall not be liable for:

  1. Loss of data.
  2. Business interruption or downtime.
  3. Loss of revenue or profits.
  4. Financial losses, penalties, or consequential damages.
  5. The Client agrees that cybersecurity risk cannot be entirely eliminated and accepts responsibility for maintaining appropriate cyber insurance and business continuity planning.

5. Client Responsibility and Compliance

  1. The Client agrees not to disable, bypass, or interfere with any cybersecurity tools deployed by the Provider and to comply with all reasonable security recommendations.
  2. Failure to comply with this Agreement may result in suspension or termination of cybersecurity services.

6. Term.

  1. The term of this agreement is 12 months, after which it will auto-renew for an additional term of 12 months.

7. Payment.

  1. Payment is due for the term of the contract, payable in 12 equal installments. Payment will be adjusted periodically to reflect the addition or removal of endpoints.

8. Changes and Updates.

  1. This document is the entire agreement between the parties with respect to the subject matter hereof and supersedes all other communications, whether written or oral.
  2. The terms and conditions of this agreement may be updated or modified, and the Cybersecurity provided may be updated or modified to address evolving threats in the Cybersecurity landscape.

9 Independent Contractor Status.

Each party and its people are independent contractors in relation to the other party with respect to all matters arising under this Agreement. Nothing herein shall be deemed to establish a partnership, joint venture, association or employment relationship between the parties.

10. Disputes.

THIS AGREEMENT SHALL BE GOVERNED BY AND CONSTRUED IN ACCORDANCE WITH THE SUBSTANTIVE LAWS OF THE UNITED STATES AND GEORGIA, AND ANY ACTION SHALL BE INITIATED AND MAINTAINED IN A FORUM OF COMPETENT JURISDICTION IN SUCH DESIGNATED STATE.