Cybersecurity Assessment Agreement


Table of Contents


1. Effective Date

2. Definitions

3. Scope of Services

3.1. Free Cybersecurity Assessment

3.2. Pro Cybersecurity Assessment

3.3. Exclusions


4. Fees and Payment

4.1. Free Cybersecurity Assessment

4.2. Pro Cybersecurity Assessment

4.3. Refund Policy

4.4. Payment Methods

4.5. Currency


5. Client Obligations

5.1. Accurate Information

5.2. Timely Completion

5.3. Participation

5.4. Compliance

5.5. Technology Requirements


6. Confidentiality and Data Protection

6.1. Non-Disclosure

6.2. Survival

6.3. Exclusions


7. Disclaimer and Limitation of Liability

7.1. No Guarantees

7.2. Liability for Free Assessments

7.3. Limitation for Pro Assessments

7.4. No Absolute Security


8. Dispute Resolution

8.1. Good Faith Negotiations

8.2. Arbitration


9. Miscellaneous

9.1. Privacy Policy

9.2. Governing Law

9.3. Severability

9.4. Notices

10. Contact InformationEffective Date

This Cybersecurity Assessment Agreement (“Agreement”) is effective as of the date the Client submits the completed signup form on the Provider’s website and checks the box indicating acceptance of this Agreement (“Effective Date”).


Definitions


For the purposes of this Agreement:

  • “Client” refers to the individual or entity accepting this Agreement.
  • “Provider” refers to K9 Webops LLC, a single-member LLC with a registered address at 651 Scroggy Rd., Oxford, PA 19363.
  • Assessment” includes the Free Cybersecurity Assessment and Pro Cybersecurity Assessment as outlined in Section 1.


1. Scope of Services


1.1. Free Cybersecurity Assessment

The Free Cybersecurity Assessment provides an introductory overview of the Client’s current cybersecurity practices, including:


  • Pre-Assessment Form: The Client provides preliminary information about their cybersecurity practices.
  • Evaluation: The Provider identifies gaps or vulnerabilities based on the submitted information.
  • Consultation: A 30-minute video call to discuss findings and provide general recommendations.
  • Deliverables: Verbal feedback and a brief summary of recommendations during the call.


1.2. Pro Cybersecurity Assessment


The Pro Cybersecurity Assessment offers a detailed and actionable evaluation, including:


  • In-Depth Pre-Assessment Form: Comprehensive information about cybersecurity policies, training, incident response plans, and more.
  • Evaluation: A thorough analysis of vulnerabilities and compliance gaps.
  • Consultation: A 60–90-minute video call with tailored recommendations.
  • Deliverables: A detailed written report covering findings, actionable recommendations, and alignment suggestions with industry standards (e.g., NIST or CMMC).


1.3. Exclusions


Both assessments exclude:


Penetration testing or system scanning.


  • Implementation of recommendations.
  • Ongoing cybersecurity monitoring or subscription services.


2. Fees and Payment


2.1. Free Cybersecurity Assessment


Provided at no cost. No hidden fees or obligations.


2.2. Pro Cybersecurity Assessment


Priced at $99. Payment must be made in full before services commence.


2.3. Refund Policy


No refunds are provided once payment is made. Exceptions are solely at the Provider’s discretion. The Client must schedule and complete the consultation within seven (7) business days of receiving instructions. Failure to do so will result in the consultation being considered closed, with no refunds issued.


2.4. Payment Methods


Payments are accepted via credit or debit card through a secure link.


2.5. Currency


All payments are processed in USD.


3. Client Obligations


3.1. Accurate Information


The Client must complete the pre-assessment form accurately and notify the Provider of any changes.


3.2. Timely Completion


The pre-assessment form must be submitted promptly, and the consultation scheduled within seven (7) business days.


3.3. Participation


The Client is responsible for active engagement during the consultation.


3.4. Compliance


The Client must ensure shared information complies with applicable laws and that they are authorized to engage in the assessment.


3.5. Technology Requirements


The Client must have reliable internet access and use secure communication channels.


4. Confidentiality and Data Protection


4.1. Non-Disclosure


The Provider will not share the Client’s confidential information without consent, except as required by law.


4.2. Survival


Confidentiality obligations remain in effect for five (5) years after service completion.


4.3. Exclusions


Confidentiality does not apply to publicly available, independently developed, or legally disclosed information.


5. Disclaimer and Limitation of Liability


5.1. No Guarantees


The Provider does not guarantee complete cybersecurity protection or compliance.


5.2. Liability for Free Assessments


The Provider is not liable for any outcomes of the Free Cybersecurity Assessment.


5.3. Limitation for Pro Assessments


Liability is limited to the $99 service fee.


5.4. No Absolute Security


The Client acknowledges that cybersecurity is a dynamic field, and no service can guarantee complete protection.


6. Dispute Resolution


6.1. Good Faith Negotiations


The parties agree to resolve disputes through good-faith discussions.


6.2. Arbitration


If unresolved, disputes will proceed to binding arbitration in Chester County, PA, under the American Arbitration Association’s rules.


7. Miscellaneous


7.1. Privacy Policy


The Provider’s Privacy Policy is available at https://k9cybersecurity.com/privacy-policy.


7.2. Governing Law


This Agreement is governed by Pennsylvania law.


7.3. Severability


Invalid provisions will be modified or removed without affecting the remainder of the Agreement.


7.4. Notices


Notices must be sent via email, certified mail, or courier.


Contact Information

For questions or assistance, contact:

Email: support@k9webops.com

Phone: (866) 592-9237