top of page

Terms of Service

East Coast Cybersecurity LLC

 

Effective Date: 1/13/2026
Last Updated: 1/13/2026
Company: East Coast Cybersecurity LLC
Website: https://www.eastcoastcybersecurity.com/
Email: support@eastcoastcybersecurity.com
Phone: (508) 635,0169

These Terms of Service govern all purchases, subscriptions, renewals, software licenses, cybersecurity products, support services, professional services, managed services, consulting services, and related services provided, sold, resold, facilitated, provisioned, supported, or made available by East Coast Cybersecurity LLC.

By purchasing from East Coast Cybersecurity LLC, submitting payment, checking a terms acceptance box, accepting a quote, approving an invoice, signing an order form, using a payment link, accessing a product, installing a product, activating a subscription, renewing a subscription, receiving services, or otherwise engaging with East Coast Cybersecurity LLC, you agree to these Terms of Service.

If you do not agree to these Terms of Service, do not purchase, access, install, activate, renew, or use any product or service provided through East Coast Cybersecurity LLC.

1. Important Notice

East Coast Cybersecurity LLC provides and resells cybersecurity products and services intended to help reduce cybersecurity risk.

Cybersecurity risk cannot be eliminated.

No cybersecurity product, service, software, vendor, reseller, managed service provider, endpoint protection tool, antivirus product, EDR product, XDR product, MDR service, firewall, email security product, monitoring tool, security recommendation, or professional service can guarantee complete protection.

By purchasing from East Coast Cybersecurity LLC, you acknowledge and agree that malware, ransomware, phishing, credential theft, account compromise, unauthorized access, data loss, business interruption, fraud, and other security incidents may still occur, even when products are properly installed, configured, maintained, monitored, or supported.

2. Our Role As A Reseller

East Coast Cybersecurity LLC is an independent reseller, technology provider, and service provider.

East Coast Cybersecurity LLC may resell, facilitate access to, provision, support, manage, administer, or assist with third party cybersecurity products, including but not limited to:

  1. SentinelOne products

  2. CrowdStrike products

  3. Microsoft products

  4. Proofpoint products

  5. Endpoint protection products

  6. Antivirus products

  7. Endpoint detection and response products

  8. Extended detection and response products

  9. Managed detection and response products

  10. Email security products

  11. Vulnerability management tools

  12. Security monitoring tools

  13. Identity protection tools

  14. Cloud security tools

  15. Backup or recovery related tools

  16. Other cybersecurity or technology products

East Coast Cybersecurity LLC is not the manufacturer, developer, publisher, owner, operator, or guarantor of any third party product unless expressly stated in writing.

Third party products are owned, operated, maintained, updated, licensed, and controlled by their respective vendors.

Customer understands that East Coast Cybersecurity LLC’s role may be limited to resale, procurement, license provisioning, billing, account setup, vendor coordination, optional technical assistance, and optional paid support services.

3. Third Party Vendor Terms Apply

All third party products are subject to the applicable vendor’s then current terms, license agreements, end user license agreements, subscription agreements, data protection terms, privacy policies, acceptable use policies, support terms, documentation, product specific addenda, and other legal terms.

Vendor terms may include, but are not limited to, terms from SentinelOne, CrowdStrike, Pax8, distributors, manufacturers, software publishers, security vendors, or other applicable technology providers.

By purchasing, accessing, installing, activating, renewing, or using any third party product through East Coast Cybersecurity LLC, Customer agrees to comply with all applicable vendor terms.

Customer is responsible for reviewing and understanding the applicable vendor terms before using any third party product.

If there is any conflict between these Terms of Service and the applicable vendor’s terms regarding the third party product itself, including product usage, license scope, data processing, product functionality, documentation, renewal, suspension, termination, support, warranty, acceptable use, or permitted use, the applicable vendor’s terms will control.

East Coast Cybersecurity LLC is not responsible for Customer’s failure to comply with vendor terms.

4. No Authority To Bind Vendors

Customer understands that East Coast Cybersecurity LLC is an independent reseller and does not have authority to modify vendor terms, waive vendor requirements, guarantee vendor performance, approve vendor refunds, extend vendor deadlines, alter vendor license restrictions, make vendor warranties, or bind any vendor unless expressly authorized in writing by that vendor.

No statement, message, email, website content, advertisement, quote, support response, recommendation, or communication by East Coast Cybersecurity LLC may be interpreted as changing, waiving, replacing, or overriding any vendor term.

5. Customer Authority

Customer represents and warrants that Customer has full legal authority to purchase, access, install, activate, configure, manage, and use all products and services purchased through East Coast Cybersecurity LLC.

If Customer purchases products or services on behalf of another person, business, household member, organization, client, employer, employee, contractor, tenant, family member, or third party, Customer represents and warrants that Customer has full authority to bind that person or entity to these Terms of Service and all applicable vendor terms.

If Customer does not have such authority, Customer may not purchase, install, access, activate, renew, or use the products or services.

Customer is solely responsible for ensuring that products are installed only on devices, accounts, systems, networks, and environments that Customer owns, controls, or is legally authorized to manage.

6. License Scope

Customer’s right to use any third party product is limited to the specific product, license quantity, subscription term, endpoint count, user count, workload count, account count, and usage rights purchased.

Customer may not exceed the number of purchased licenses, endpoints, users, accounts, devices, systems, containers, virtual machines, workloads, or environments.

Customer agrees to use all products only in accordance with:

  1. These Terms of Service

  2. The applicable vendor terms

  3. The applicable product documentation

  4. The applicable license restrictions

  5. The applicable acceptable use policies

  6. Any quote, invoice, order form, or written agreement

  7. All applicable laws and regulations

Customer may not share, resell, transfer, sublicense, assign, distribute, or make available any product, license, subscription, console access, credential, installer, token, or entitlement unless expressly authorized in writing by East Coast Cybersecurity LLC and the applicable vendor.

7. Documentation And Current Releases

Customer agrees to use all products in accordance with the applicable vendor’s then current documentation, technical guidance, setup instructions, installation requirements, support terms, and product limitations.

East Coast Cybersecurity LLC is not responsible for issues caused by Customer’s failure to follow documentation, failure to use supported versions, failure to install updates, failure to maintain current releases, failure to meet system requirements, or use of unsupported devices, systems, or configurations.

8. No Security Guarantee

Customer understands and agrees that cybersecurity products and services reduce risk but do not eliminate risk.

East Coast Cybersecurity LLC does not guarantee that any product, service, software, configuration, support response, managed service, recommendation, or vendor solution will prevent, detect, block, stop, contain, remediate, recover from, restore, or eliminate any threat, vulnerability, compromise, attack, loss, or incident.

This includes, but is not limited to:

  1. Malware

  2. Ransomware

  3. Viruses

  4. Trojans

  5. Spyware

  6. Adware

  7. Phishing attacks

  8. Credential theft

  9. Password compromise

  10. Account takeover

  11. Business email compromise

  12. Unauthorized access

  13. Data breach

  14. Data loss

  15. Identity theft

  16. Financial fraud

  17. Device compromise

  18. Network compromise

  19. Cloud account compromise

  20. Insider threats

  21. Zero day attacks

  22. Supply chain attacks

  23. Social engineering

  24. Unauthorized software installation

  25. Data exfiltration

  26. Configuration errors

  27. Vulnerabilities

  28. Suspicious activity

  29. Security policy violations

  30. Business interruption

Customer acknowledges that no cybersecurity solution is perfect and that security incidents may occur despite the use of products or services purchased through East Coast Cybersecurity LLC.

9. Product Only Purchases

Unless otherwise stated in a written quote, invoice, order form, statement of work, managed service agreement, support package, or professional services agreement, purchases from East Coast Cybersecurity LLC are product only purchases.

A product only purchase includes access to the purchased license, subscription, product, or software entitlement only.

A product only purchase does not include:

  1. Installation support

  2. Technical support

  3. Help desk support

  4. Security monitoring

  5. Alert review

  6. Threat hunting

  7. Incident response

  8. Forensic investigation

  9. Malware removal

  10. Ransomware recovery

  11. Data recovery

  12. Backup recovery

  13. Device cleanup

  14. System rebuilds

  15. Policy tuning

  16. Console administration

  17. Ongoing management

  18. Compliance consulting

  19. Regulatory guidance

  20. Security consulting

  21. Emergency support

  22. After hours support

  23. Vendor escalation management

  24. User training

  25. Remediation services

  26. Breach response

  27. Insurance assistance

  28. Legal support

  29. Data restoration

  30. Security architecture review

Any product or service not expressly listed as included is excluded.

Purchasing a license does not create a managed service relationship.

Purchasing a license does not obligate East Coast Cybersecurity LLC to monitor, manage, support, investigate, remediate, notify, alert, escalate, or respond to any customer device, account, alert, event, detection, issue, or security incident.

10. Support Is Not Included Unless Purchased

Support is not included unless Customer purchases a support package, managed service package, professional services package, or East Coast Cybersecurity LLC expressly agrees in writing to provide support.

If Customer requests support without an active support package, support may be billed hourly.

The standard hourly support rate is:

$150 per hour

East Coast Cybersecurity LLC may update its hourly support rate at any time.

Support may be billed in minimum time increments determined by East Coast Cybersecurity LLC.

Support may include, depending on the request and package purchased:

  1. Product installation assistance

  2. Agent deployment assistance

  3. Basic troubleshooting

  4. License assignment assistance

  5. Product configuration assistance

  6. Console assistance

  7. Policy adjustment assistance

  8. Alert explanation

  9. Basic vendor coordination

  10. General technical assistance

East Coast Cybersecurity LLC has no obligation to provide free support.

East Coast Cybersecurity LLC may decline support requests at its discretion, including requests that are outside scope, unlawful, abusive, unsafe, technically unreasonable, unsupported by the vendor, or not covered by Customer’s purchased package.

11. Managed Services Are Separate

Managed services are only included if specifically purchased and listed in writing.

Managed services may include services such as:

  1. Security monitoring

  2. Alert review

  3. Managed detection

  4. Managed response

  5. Ongoing administration

  6. Security reporting

  7. Policy tuning

  8. Threat hunting

  9. Vendor coordination

  10. Response guidance

  11. Monthly reviews

  12. Security recommendations

Unless Customer has purchased a managed service package, East Coast Cybersecurity LLC is not responsible for monitoring alerts, reviewing detections, responding to threats, managing consoles, tuning policies, escalating alerts, notifying Customer of events, or managing Customer’s security environment.

A product license purchase by itself does not include managed services.

12. Incident Response Is Separate

Incident response is not included in product only purchases, standard product subscriptions, basic support, or general support unless expressly stated in writing.

Security incidents may include, but are not limited to:

  1. Malware infections

  2. Ransomware events

  3. Phishing attacks

  4. Business email compromise

  5. Account takeover

  6. Credential theft

  7. Unauthorized access

  8. Data breach

  9. Data loss

  10. Device compromise

  11. Network compromise

  12. Cloud compromise

  13. Identity theft

  14. Financial fraud

  15. Suspicious activity requiring investigation

  16. Insider threats

  17. Unauthorized software installation

  18. Data exfiltration

  19. Security policy bypass

  20. Fraudulent transactions

Incident response services may require a separate agreement, separate statement of work, separate pricing, advance payment, and acceptance by East Coast Cybersecurity LLC.

East Coast Cybersecurity LLC has no obligation to provide emergency incident response services unless it expressly agrees in writing.

13. Customer Responsibilities

Customer is responsible for the security, operation, maintenance, and lawful use of Customer’s own devices, accounts, users, passwords, networks, systems, backups, data, applications, and environments.

Customer responsibilities include, but are not limited to:

  1. Keeping devices updated

  2. Keeping operating systems updated

  3. Keeping applications updated

  4. Maintaining strong passwords

  5. Using multi factor authentication where available

  6. Maintaining reliable backups

  7. Testing backups

  8. Protecting accounts and credentials

  9. Avoiding suspicious links, downloads, websites, and attachments

  10. Ensuring products are installed on intended devices

  11. Maintaining internet connectivity required for product functionality

  12. Not disabling, bypassing, uninstalling, tampering with, or interfering with security products

  13. Maintaining proper licensing

  14. Providing accurate billing information

  15. Providing accurate contact information

  16. Promptly notifying East Coast Cybersecurity LLC of issues

  17. Complying with all vendor terms

  18. Complying with all applicable laws

  19. Ensuring Customer has authority to install software on all protected devices

  20. Following reasonable security practices

  21. Reviewing vendor documentation

  22. Maintaining supported systems

  23. Avoiding unauthorized or illegal activity

  24. Ensuring users understand monitoring and security software may be installed

  25. Obtaining all required user consent

East Coast Cybersecurity LLC is not responsible for any issue, loss, compromise, incident, outage, or damage caused by Customer action, Customer inaction, unsupported systems, outdated software, weak passwords, unsafe behavior, lack of backups, failure to update, failure to use multi factor authentication, misconfiguration, lack of internet connectivity, Customer tampering, Customer negligence, or failure to follow reasonable security practices.

14. Home Use And Personal Use Customers

East Coast Cybersecurity LLC may sell certain products to individuals, families, home offices, personal use customers, and power users, subject to vendor rules and product availability.

Customer understands that products such as SentinelOne and CrowdStrike are business grade cybersecurity products and may not function like traditional consumer antivirus software.

Business grade cybersecurity products may include:

  1. Management consoles

  2. Administrative policies

  3. Background agents

  4. Automated detections

  5. Automated prevention actions

  6. Technical alerts

  7. Licensing minimums

  8. Vendor specific requirements

  9. Limited end user visibility

  10. Additional technical complexity

  11. Product terminology unfamiliar to consumers

  12. Automated actions that may affect files, applications, or device behavior

Home use and personal use customers acknowledge that product only purchases do not include consumer style technical support unless support is purchased separately.

Customer agrees not to hold East Coast Cybersecurity LLC responsible for confusion, lack of technical knowledge, product complexity, user error, unsupported home environments, unsupported devices, lack of consumer style user interface, or expectations inconsistent with business grade software.

15. Minimum License Quantities

Certain products may require minimum license quantities.

East Coast Cybersecurity LLC may require a minimum purchase of five endpoints or another minimum quantity for certain products.

Minimum license quantities may be based on vendor rules, reseller rules, distributor rules, administrative requirements, billing requirements, or East Coast Cybersecurity LLC business policy.

Customer is responsible for purchasing the correct number of licenses for the devices Customer intends to protect.

Customer may not share, split, transfer, sublicense, resell, distribute, or pool licenses unless expressly permitted in writing by East Coast Cybersecurity LLC and the applicable vendor.

16. Subscription Increases, Overages, And True Ups

If Customer’s usage exceeds the number of licenses, endpoints, users, devices, workloads, accounts, subscriptions, storage amounts, usage limits, or entitlements purchased, Customer agrees to pay for the additional usage.

East Coast Cybersecurity LLC may invoice Customer for any additional usage, overage, excess deployment, true up, additional endpoint, additional user, additional workload, or additional subscription at the then current rate, applicable vendor rate, distributor rate, or previously quoted rate.

Customer is responsible for monitoring license usage and ensuring that usage does not exceed the purchased quantity.

No refund, credit, offset, or reduction will be provided for unused licenses unless East Coast Cybersecurity LLC expressly agrees in writing.

17. Billing And Payment

Customer agrees to pay all fees, charges, taxes, subscription costs, setup fees, support fees, renewal fees, overage fees, true up fees, professional service fees, and other amounts associated with Customer’s purchase.

Payments may be processed through Stripe or another third party payment processor.

By submitting payment, Customer authorizes East Coast Cybersecurity LLC and its payment processor to charge Customer’s selected payment method for the purchased products and services.

Customer is responsible for ensuring billing information is accurate and current.

Failure to pay may result in suspension, cancellation, non renewal, loss of access, collection activity, or termination of products and services.

18. Subscriptions And Renewals

Certain products and services are sold as subscriptions.

Subscriptions may renew automatically unless canceled in accordance with the applicable cancellation terms.

Unless otherwise stated in writing, Customer must provide written notice of non renewal at least thirty days before the end of the then current subscription term.

If Customer fails to cancel before the applicable renewal deadline, Customer may be responsible for the renewal charge.

Vendor renewal rules may require payment even if Customer later decides not to continue using the product.

Customer understands that vendor renewals, reseller renewals, and distributor renewals may be binding once processed.

East Coast Cybersecurity LLC may charge renewal fees to Customer’s payment method on file unless Customer cancels before the applicable renewal deadline.

19. Refund Policy

Unless otherwise stated in writing, all sales are final once a license, subscription, product, renewal, setup, service, or support engagement has been ordered, provisioned, activated, assigned, delivered, made available, renewed, or performed.

Because third party cybersecurity licenses may be non refundable through the vendor or distributor, East Coast Cybersecurity LLC may deny refund requests for any product or service that has already been ordered, provisioned, activated, assigned, renewed, delivered, made available, or used.

Refunds, if any, are granted at the sole discretion of East Coast Cybersecurity LLC.

Customer is not entitled to a refund due to:

  1. Customer error

  2. Change of mind

  3. Lack of technical knowledge

  4. Device incompatibility

  5. Product complexity

  6. Unsupported systems

  7. Vendor limitations

  8. Security incidents

  9. False positives

  10. False negatives

  11. Missed detections

  12. Delayed detections

  13. Customer failure to install the product

  14. Customer failure to use the product

  15. Customer failure to follow documentation

  16. Customer failure to cancel before renewal

  17. Customer violation of these Terms of Service

  18. Customer violation of vendor terms

20. Taxes

Customer is responsible for all applicable taxes, fees, duties, assessments, and governmental charges associated with Customer’s purchase.

If East Coast Cybersecurity LLC is required to collect taxes, those taxes may be added to Customer’s invoice or checkout total.

Customer is responsible for paying all taxes not collected by East Coast Cybersecurity LLC.

21. License Activation And Provisioning

After payment, East Coast Cybersecurity LLC may provision, activate, assign, order, or make available purchased licenses or subscriptions.

Provisioning times may vary based on vendor availability, vendor systems, distributor systems, account setup, customer information, payment status, fraud review, and other factors.

East Coast Cybersecurity LLC is not responsible for delays caused by vendors, distributors, payment processors, incorrect customer information, failed payments, fraud reviews, account verification, or circumstances outside East Coast Cybersecurity LLC’s control.

22. Customer Data And Product Telemetry

Customer understands that third party cybersecurity products may collect, process, transmit, store, analyze, retain, or display data from Customer devices, accounts, users, systems, networks, files, logs, processes, detections, alerts, events, telemetry, metadata, indicators of compromise, security configurations, and other security related information.

Customer authorizes East Coast Cybersecurity LLC and applicable vendors, distributors, service providers, subcontractors, and integrations to process such information as reasonably necessary to provide, provision, support, secure, troubleshoot, bill, administer, monitor, manage, or improve the products and services.

Customer is responsible for ensuring that Customer has all required rights, notices, consents, and legal authority for such collection, processing, monitoring, and transmission.

East Coast Cybersecurity LLC is not responsible for Customer’s failure to obtain required consent from household members, employees, contractors, clients, users, family members, guests, tenants, or any other affected person.

23. Privacy

Customer’s use of products and services may involve the collection and processing of personal information.

Customer agrees to review East Coast Cybersecurity LLC’s Privacy Policy and the applicable vendor privacy policies.

Customer is responsible for ensuring that Customer’s use of products and services complies with all applicable privacy laws, employment laws, monitoring laws, consent requirements, contracts, and internal policies.

East Coast Cybersecurity LLC is not responsible for Customer’s failure to obtain required consent or comply with privacy obligations.

24. Special Information And Sensitive Data

Customer agrees not to intentionally submit, upload, transmit, or expose highly sensitive data, regulated data, special category data, protected health information, financial account information, payment card data, government identification numbers, confidential third party information, or other sensitive information to East Coast Cybersecurity LLC unless such data is necessary for the service and East Coast Cybersecurity LLC has expressly agreed in writing to receive or process such data.

Customer is responsible for determining whether Customer’s data is subject to HIPAA, GLBA, PCI DSS, FERPA, CJIS, state privacy laws, international privacy laws, or other legal or regulatory obligations.

East Coast Cybersecurity LLC does not provide regulated compliance services unless expressly agreed in writing.

25. Third Party Integrations

If Customer enables, connects, or uses any third party integration, application, service, platform, API, automation, data export, logging destination, SIEM, ticketing system, storage platform, or other third party service with a purchased product, Customer does so at Customer’s own risk.

East Coast Cybersecurity LLC is not responsible for third party integrations, data handling by third parties, integration failures, misconfigurations, unauthorized access caused by integrations, data exposure, data loss, downtime, charges, or damages resulting from third party products or services.

Customer is responsible for reviewing and complying with the terms and privacy policies of all third party integrations.

26. Third Party Service Providers

If Customer allows another person, consultant, contractor, managed service provider, IT provider, technician, administrator, or third party service provider to access or use any product or service purchased through East Coast Cybersecurity LLC, Customer remains fully responsible for that third party’s access, conduct, use, misuse, errors, omissions, and compliance with these Terms of Service and all vendor terms.

Customer is responsible for all actions taken using Customer’s accounts, credentials, consoles, tokens, installers, licenses, or administrative access.

27. Confidentiality

Customer may receive confidential, proprietary, non public, or sensitive information from East Coast Cybersecurity LLC, vendors, distributors, or product platforms.

Confidential information may include, but is not limited to:

  1. Pricing

  2. Quotes

  3. Product details

  4. Product documentation

  5. Security configurations

  6. Console information

  7. Detection logic

  8. Product telemetry

  9. Credentials

  10. Access methods

  11. Tokens

  12. Installer links

  13. Non public vendor information

  14. Business information

  15. Technical information

  16. Communications

  17. Security findings

  18. Support information

  19. Internal processes

  20. Customer specific security information

Customer agrees not to disclose, publish, share, copy, misuse, sell, distribute, or make available confidential information except as expressly authorized in writing.

Customer agrees to protect confidential information using at least reasonable care.

Customer’s confidentiality obligations survive termination, expiration, cancellation, and non renewal.

28. Product Feedback

If Customer provides suggestions, ideas, enhancement requests, recommendations, comments, issue reports, product feedback, service feedback, testing results, or other feedback to East Coast Cybersecurity LLC, Customer grants East Coast Cybersecurity LLC a worldwide, perpetual, irrevocable, royalty free right to use that feedback for business, service, product, operational, marketing, or improvement purposes without compensation to Customer.

Customer understands that feedback regarding third party products may also be shared with the applicable vendor or distributor.

29. Publicity And Use Of Names

East Coast Cybersecurity LLC will not publicly identify Customer as a customer without Customer’s consent, except as necessary for billing, support, vendor coordination, legal compliance, or service delivery.

Customer may not use East Coast Cybersecurity LLC’s name, logo, trademarks, website content, materials, or branding without prior written permission.

Customer may not imply that East Coast Cybersecurity LLC, SentinelOne, CrowdStrike, Pax8, any distributor, or any vendor endorses Customer unless expressly authorized in writing.

30. Prohibited Use

Customer may not use any product or service purchased through East Coast Cybersecurity LLC for any malicious, unlawful, abusive, unauthorized, deceptive, harmful, invasive, or fraudulent purpose.

Customer agrees not to use any product or service for:

  1. Hacking

  2. Unauthorized access

  3. Unauthorized scanning

  4. Unauthorized testing

  5. Unauthorized monitoring

  6. Credential theft

  7. Password attacks

  8. Phishing

  9. Malware development

  10. Malware deployment

  11. Ransomware activity

  12. Botnet activity

  13. Data theft

  14. Data exfiltration

  15. Identity theft

  16. Fraud

  17. Financial crime

  18. Harassment

  19. Stalking

  20. Surveillance without authorization

  21. Spying

  22. Circumventing security controls

  23. Attacking third party systems

  24. Disrupting third party systems

  25. Violating privacy rights

  26. Violating intellectual property rights

  27. Violating export control laws

  28. Violating sanctions laws

  29. Violating any applicable law or regulation

  30. Testing malware against vendor products without authorization

  31. Testing evasion methods without authorization

  32. Attempting to bypass detections

  33. Attempting to bypass prevention controls

  34. Attempting to interfere with security software

  35. Attempting to compromise East Coast Cybersecurity LLC, vendor, distributor, or third party systems

Customer may only use products and services on systems Customer owns, controls, or is expressly authorized to manage.

31. Reverse Engineering And Product Abuse

Customer may not, directly or indirectly:

  1. Reverse engineer any product

  2. Decompile any product

  3. Disassemble any product

  4. Modify any product

  5. Copy any product except as permitted by vendor terms

  6. Clone any product

  7. Create derivative works from any product

  8. Bypass licensing restrictions

  9. Circumvent technical controls

  10. Disable security features

  11. Tamper with agents

  12. Tamper with detections

  13. Tamper with telemetry

  14. Interfere with vendor systems

  15. Interfere with East Coast Cybersecurity LLC systems

  16. Extract product logic

  17. Extract detection methods

  18. Extract signatures

  19. Extract rules

  20. Extract source code

  21. Extract trade secrets

  22. Extract proprietary data

  23. Use products to build competing products

  24. Use products to test malware against detection systems without authorization

  25. Use products for evasion research without authorization

  26. Share access credentials without authorization

  27. Resell, sublicense, or distribute access without authorization

  28. Remove proprietary notices

  29. Defeat technical restrictions

  30. Attempt to gain unauthorized access to consoles, APIs, systems, or data

Customer agrees that any reverse engineering, tampering, abuse, misuse, or unauthorized use may result in immediate suspension or termination without refund.

East Coast Cybersecurity LLC may report suspected malicious, unlawful, or abusive activity to vendors, distributors, payment processors, affected parties, law enforcement, regulators, or other appropriate parties.

32. Authorized Security Testing Only

Customer may not use products or services purchased through East Coast Cybersecurity LLC to conduct penetration testing, vulnerability scanning, red team activity, exploit testing, malware testing, phishing simulations, social engineering tests, evasion testing, bypass testing, or security research against any system unless Customer has full legal authorization to do so.

Customer is solely responsible for obtaining written authorization before conducting any security testing.

East Coast Cybersecurity LLC is not responsible for unauthorized testing conducted by Customer.

Customer agrees to indemnify and hold East Coast Cybersecurity LLC harmless from any claim, loss, damage, investigation, penalty, legal demand, enforcement action, or third party claim arising from Customer’s unauthorized security testing, hacking, scanning, research, misuse, or illegal activity.

33. Safety Critical Use Prohibited

Customer may not use products or services purchased through East Coast Cybersecurity LLC in any safety critical, life critical, mission critical, or high risk environment where failure, interruption, false positive, false negative, delay, malfunction, incorrect operation, or unavailability could result in death, personal injury, physical harm, property damage, environmental harm, or catastrophic loss.

Prohibited environments include, but are not limited to:

  1. Life support systems

  2. Medical devices

  3. Emergency response systems

  4. Aircraft navigation

  5. Aircraft control

  6. Transportation control systems

  7. Nuclear facilities

  8. Weapons systems

  9. Industrial control systems where failure could cause physical harm

  10. Critical infrastructure where failure could create serious public risk

  11. Any similar high risk use case

Customer assumes all risk for any prohibited or high risk use.

East Coast Cybersecurity LLC is not responsible for any loss, damage, injury, death, property damage, regulatory issue, or third party claim arising from prohibited safety critical use.

34. Export Controls And Sanctions Compliance

Customer agrees to comply with all applicable export control, trade control, sanctions, anti terrorism, and anti corruption laws and regulations.

Customer may not purchase, access, use, export, re export, transfer, or make available any product or service in violation of United States export control laws, OFAC sanctions, embargoes, restricted party rules, prohibited country rules, or any other applicable law.

Customer represents and warrants that Customer is not located in, organized under the laws of, ordinarily resident in, owned by, controlled by, or acting on behalf of any sanctioned country, prohibited jurisdiction, restricted party, denied party, blocked person, sanctioned person, or prohibited person.

Customer may not allow access to any product or service by any person or entity prohibited by applicable export control or sanctions laws.

East Coast Cybersecurity LLC may suspend or terminate access immediately if it believes continued service may violate export control, sanctions, vendor, legal, regulatory, or distributor requirements.

35. Suspension For Abuse, Nonpayment, Or Risk

East Coast Cybersecurity LLC may suspend, restrict, disable, or terminate access to products, services, subscriptions, support, accounts, licenses, or consoles immediately and without prior notice if East Coast Cybersecurity LLC believes, in its sole discretion, that:

  1. Customer violated these Terms of Service

  2. Customer violated vendor terms

  3. Customer failed to pay

  4. Customer used products for malicious activity

  5. Customer used products for unauthorized security testing

  6. Customer created legal risk

  7. Customer created security risk

  8. Customer created financial risk

  9. Customer created operational risk

  10. Customer created reputational risk

  11. Customer provided false information

  12. Customer abused support

  13. Customer threatened or harassed East Coast Cybersecurity LLC personnel

  14. A vendor required suspension

  15. A distributor required suspension

  16. A payment processor flagged the transaction

  17. Continued service may violate law or vendor policy

  18. Customer engaged in chargeback abuse

  19. Customer attempted unauthorized access

  20. Customer misused credentials, tokens, installers, or console access

Suspension or termination does not relieve Customer of payment obligations.

Suspension or termination for abuse, nonpayment, unlawful conduct, or violation of terms will not entitle Customer to a refund.

36. Termination And Post Termination Obligations

Upon expiration, cancellation, suspension, or termination of a subscription, Customer must immediately stop using the applicable product or service unless continued use is expressly allowed by East Coast Cybersecurity LLC and the applicable vendor.

Customer must uninstall, remove, delete, or disable all applicable software, agents, components, installers, scripts, documentation, credentials, tokens, console access, API keys, and access methods when required by East Coast Cybersecurity LLC or the vendor.

Customer agrees to provide written confirmation of uninstall, removal, or deletion upon request.

Customer remains responsible for any continued usage, unauthorized usage, overage charges, renewal charges, vendor charges, distributor charges, or other costs incurred after termination if Customer fails to uninstall, remove, disable, or stop using the product.

East Coast Cybersecurity LLC may charge Customer for continued use after termination at the then current rate, vendor rate, distributor rate, or renewal rate.

Sections of these Terms of Service that by their nature should survive termination will survive, including payment obligations, confidentiality, prohibited use, reverse engineering restrictions, export compliance, limitation of liability, indemnification, refund restrictions, intellectual property restrictions, and dispute provisions.

37. Vendor Changes, Outages, And Limitations

Customer understands that third party vendors may change pricing, product names, packages, features, licensing requirements, minimum quantities, support terms, service availability, detection logic, management consoles, documentation, renewal policies, terms, or product availability at any time.

East Coast Cybersecurity LLC is not responsible for:

  1. Vendor outages

  2. Vendor service interruptions

  3. Vendor support delays

  4. Vendor product changes

  5. Vendor pricing changes

  6. Vendor billing changes

  7. Vendor licensing changes

  8. Vendor false positives

  9. Vendor false negatives

  10. Vendor missed detections

  11. Vendor delayed detections

  12. Vendor performance issues

  13. Vendor console issues

  14. Vendor agent issues

  15. Vendor update issues

  16. Vendor decisions to suspend or terminate access

  17. Vendor refusal to provide refunds

  18. Vendor changes to minimum purchase requirements

  19. Vendor documentation errors

  20. Vendor data processing practices

  21. Vendor product limitations

  22. Vendor product compatibility issues

Customer agrees that East Coast Cybersecurity LLC is not liable for vendor acts, omissions, limitations, or failures.

38. No Warranty

To the maximum extent permitted by law, all products and services are provided “as is” and “as available.”

East Coast Cybersecurity LLC disclaims all warranties, express or implied, including but not limited to warranties of merchantability, fitness for a particular purpose, title, non infringement, compatibility, availability, uptime, performance, detection capability, security effectiveness, accuracy, completeness, error free operation, and uninterrupted service.

Any warranties for third party products, if available, are provided only by the applicable vendor and only according to that vendor’s own terms.

East Coast Cybersecurity LLC does not warrant that any product or service will meet Customer’s expectations, requirements, technical needs, compliance needs, insurance requirements, business needs, or security goals.

39. No Professional Advice Guarantee

Any information, configuration, recommendation, explanation, support, or guidance provided by East Coast Cybersecurity LLC is provided for general cybersecurity and technical purposes.

Unless expressly agreed in writing, East Coast Cybersecurity LLC does not provide legal advice, regulatory advice, tax advice, insurance advice, financial advice, or compliance certification.

Customer is responsible for consulting its own legal, compliance, tax, insurance, financial, or regulatory professionals as needed.

40. No Compliance Guarantee

East Coast Cybersecurity LLC does not guarantee that any product, service, configuration, recommendation, report, or support response will make Customer compliant with any law, regulation, framework, contract, insurance requirement, industry standard, or security questionnaire.

This includes, but is not limited to:

  1. HIPAA

  2. PCI DSS

  3. GLBA

  4. FERPA

  5. CJIS

  6. CMMC

  7. NIST

  8. SOC 2

  9. ISO 27001

  10. State privacy laws

  11. Cyber insurance requirements

  12. Contractual security requirements

Compliance services are only provided if expressly stated in a written agreement.

41. Limitation Of Liability

To the maximum extent permitted by law, East Coast Cybersecurity LLC will not be liable for any indirect, incidental, special, consequential, exemplary, enhanced, punitive, or similar damages.

This includes, but is not limited to:

  1. Lost profits

  2. Lost revenue

  3. Lost business

  4. Lost data

  5. Loss of goodwill

  6. Business interruption

  7. Device downtime

  8. System downtime

  9. Account downtime

  10. Identity theft

  11. Financial fraud

  12. Reputational harm

  13. Data breach costs

  14. Ransomware costs

  15. Recovery costs

  16. Forensic costs

  17. Notification costs

  18. Legal costs

  19. Regulatory costs

  20. Cost of substitute services

  21. Losses caused by malware

  22. Losses caused by ransomware

  23. Losses caused by phishing

  24. Losses caused by account compromise

  25. Losses caused by unauthorized access

  26. Losses caused by vendor failure

  27. Losses caused by customer error

  28. Losses caused by missed detections

  29. Losses caused by false positives

  30. Losses caused by false negatives

To the maximum extent permitted by law, East Coast Cybersecurity LLC’s total liability for any claim related to any product, service, subscription, support request, professional service, transaction, renewal, security incident, vendor issue, data issue, or agreement will not exceed the amount Customer actually paid to East Coast Cybersecurity LLC for the specific product or service giving rise to the claim during the three months immediately before the event giving rise to the claim.

Multiple claims will not increase this limit.

This limitation applies regardless of legal theory, including contract, tort, negligence, strict liability, warranty, statute, misrepresentation, or any other theory.

These limitations apply even if any remedy is found to have failed of its essential purpose.

42. No Responsibility For Security Incidents

Customer agrees that East Coast Cybersecurity LLC is not responsible for malware infections, ransomware events, phishing attacks, credential theft, account compromise, unauthorized access, data breach, data loss, business interruption, identity theft, financial fraud, device compromise, network compromise, cloud compromise, or any other security incident.

Customer understands that cybersecurity is a shared responsibility and that Customer’s behavior, device condition, account security, password practices, backups, network configuration, software updates, vendor limitations, and security practices materially affect security outcomes.

43. Indemnification

Customer agrees to defend, indemnify, and hold harmless East Coast Cybersecurity LLC, its owners, members, managers, officers, employees, contractors, vendors, distributors, partners, affiliates, successors, and assigns from and against any claims, damages, losses, liabilities, penalties, fines, costs, expenses, investigations, demands, lawsuits, settlements, judgments, and attorney fees arising out of or related to:

  1. Customer’s use of products or services

  2. Customer’s misuse of products or services

  3. Customer’s violation of these Terms of Service

  4. Customer’s violation of vendor terms

  5. Customer’s violation of law

  6. Customer’s malicious activity

  7. Customer’s unauthorized access or testing

  8. Customer’s hacking, scanning, phishing, malware activity, or security abuse

  9. Customer’s reverse engineering or product tampering

  10. Customer’s unauthorized installation or monitoring

  11. Customer’s failure to obtain consent

  12. Customer’s devices, accounts, systems, users, networks, or data

  13. Customer’s failure to follow reasonable security practices

  14. Customer’s security incidents or losses

  15. Customer’s privacy violations

  16. Customer’s intellectual property violations

  17. Customer’s payment disputes or chargebacks

  18. Customer’s acts, omissions, negligence, or misconduct

  19. Claims brought by Customer’s employees, contractors, clients, family members, household members, or users

  20. Claims relating to Customer’s use of third party integrations or services

44. Payment Processor

Payments may be processed by Stripe or another third party payment processor.

Customer’s payment information may be handled directly by the payment processor and may be subject to that processor’s own terms and privacy policy.

East Coast Cybersecurity LLC does not control Stripe or other payment processors and is not responsible for their systems, services, policies, errors, delays, chargebacks, account reviews, holds, declines, fraud determinations, or security incidents.

45. Chargebacks And Payment Disputes

Customer agrees to contact East Coast Cybersecurity LLC first regarding any billing issue before initiating a chargeback or payment dispute.

Improper chargebacks may result in suspension or termination of products and services.

Customer remains responsible for all amounts owed, including costs, fees, collection expenses, chargeback fees, and reasonable attorney fees incurred by East Coast Cybersecurity LLC in connection with unpaid amounts or improper disputes.

A chargeback does not cancel a subscription unless East Coast Cybersecurity LLC confirms cancellation in writing.

46. Collections

If Customer fails to pay amounts owed, East Coast Cybersecurity LLC may refer the account to collections, suspend services, terminate services, recover products or access, and pursue legal remedies.

Customer agrees to pay all reasonable costs of collection, including collection agency fees, court costs, and attorney fees.

47. Intellectual Property

East Coast Cybersecurity LLC and its vendors retain all rights, title, and interest in their respective names, logos, websites, materials, documentation, processes, configurations, scripts, templates, reports, service methods, know how, intellectual property, and proprietary information.

Customer receives only the limited rights expressly granted through the applicable purchase and vendor terms.

No rights are granted by implication, estoppel, or otherwise.

48. Independent Contractors

East Coast Cybersecurity LLC and Customer are independent contractors.

Nothing in these Terms of Service creates a partnership, joint venture, agency, franchise, employment relationship, fiduciary relationship, or legal representation relationship.

Customer may not represent that it has authority to bind East Coast Cybersecurity LLC, any vendor, any distributor, or any partner.

49. Assignment

Customer may not assign, transfer, sublicense, delegate, or resell any rights, licenses, subscriptions, products, or services purchased from East Coast Cybersecurity LLC without prior written approval from East Coast Cybersecurity LLC and, where applicable, the third party vendor.

East Coast Cybersecurity LLC may assign or transfer its rights and obligations under these Terms of Service in connection with a merger, acquisition, reorganization, sale of assets, change in control, or business transfer.

50. Force Majeure

East Coast Cybersecurity LLC will not be responsible for any delay, failure, outage, interruption, or inability to perform caused by events outside its reasonable control.

This includes, but is not limited to, acts of God, natural disasters, power outages, internet outages, vendor outages, distributor outages, cyberattacks, labor disputes, war, terrorism, civil unrest, government action, supply chain disruption, payment processor issues, hosting provider issues, telecommunications failures, malicious acts by third parties, or other events beyond East Coast Cybersecurity LLC’s reasonable control.

51. Governing Law And Venue

These Terms of Service are governed by the laws of the State of Florida, without regard to conflict of law principles.

Customer agrees that any dispute arising out of or related to these Terms of Service, products, services, subscriptions, payments, renewals, support, or purchases from East Coast Cybersecurity LLC will be handled in the state or federal courts located in Florida, unless otherwise required by law.

Customer agrees to the personal jurisdiction of such courts.

52. Attorney Fees

In any dispute, claim, lawsuit, collection action, arbitration, mediation, or legal proceeding arising out of or related to these Terms of Service, the prevailing party may recover its reasonable attorney fees, court costs, collection costs, and related expenses to the maximum extent permitted by law.

53. Changes To Products, Pricing, And Terms

East Coast Cybersecurity LLC may change products, pricing, packages, support rates, service descriptions, minimum quantities, billing methods, renewal terms, and offerings at any time.

Third party vendors may also change their products, pricing, packages, licensing terms, features, or availability at any time.

Changes may apply to future purchases, renewals, or continued use.

East Coast Cybersecurity LLC may update these Terms of Service from time to time. The updated version will be posted on East Coast Cybersecurity LLC’s website with a revised effective date or last updated date.

Customer’s continued purchase, renewal, access, or use after updated terms are posted constitutes acceptance of the updated terms.

54. Notices

Customer may contact East Coast Cybersecurity LLC using the contact information listed in these Terms of Service.

East Coast Cybersecurity LLC may provide notices by email, invoice, website posting, customer portal, payment processor notice, or other reasonable method.

Customer is responsible for keeping contact information accurate and current.

Notices sent to Customer’s provided email address will be considered delivered when sent.

55. Severability

If any section, sentence, clause, or provision of these Terms of Service is found invalid, illegal, or unenforceable, the remaining sections will remain in full force and effect.

The invalid or unenforceable provision will be interpreted or modified to the minimum extent necessary to make it enforceable while preserving the original intent as closely as possible.

56. No Waiver

Failure by East Coast Cybersecurity LLC to enforce any section of these Terms of Service does not waive its right to enforce that section later.

Any waiver must be in writing and signed by an authorized representative of East Coast Cybersecurity LLC.

57. Entire Agreement

These Terms of Service, together with any applicable quote, invoice, order form, statement of work, privacy policy, reseller product terms, vendor terms, support package description, managed service agreement, professional services agreement, or written agreement, make up the entire agreement between Customer and East Coast Cybersecurity LLC regarding the products and services purchased.

If any written agreement signed by East Coast Cybersecurity LLC conflicts with these Terms of Service, the signed written agreement controls only to the extent of the specific conflict.

58. Contact

Questions about these Terms of Service may be sent to:

East Coast Cybersecurity LLC
Email: support@eastcoastcybersecurity.com
Phone: (508) 635,0169
Website: https://www.eastcoastcybersecurity.com/

bottom of page