New
Introducing Hook Minute - A Free Daily Phishing Quiz - Play Now

Terms of Service

HOOK SECURITY INC., A DELAWARE CORPORATION, AND/OR ITS AFFILIATES (“HOOK SECURITY”) IS WILLING TO GRANT ACCESS TO ITS SAAS (SOFTWARE AS A SERVICE) PRODUCTS TO YOU AS THE COMPANY OR THE LEGAL ENTITY THAT WILL BE UTILIZING THE SAAS PRODUCTS (REFERENCED BELOW AS “CUSTOMER”) ON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS OF THIS AGREEMENT. BY ENTERING INTO THIS AGREEMENT ON BEHALF OF AN ENTITY OR ORGANIZATION, YOU REPRESENT THAT YOU HAVE THE LEGAL AUTHORITY TO BIND THAT ENTITY OR ORGANIZATION TO THIS AGREEMENT. CUSTOMER AND HOOK SECURITY MAY EACH ALSO BE REFERRED TO AS A “PARTY” AND TOGETHER, THE “PARTIES.”

PLEASE READ THIS AGREEMENT CAREFULLY BEFORE USING THE SAAS PRODUCTS. THIS SAAS TERMS OF SERVICE (“AGREEMENT”) CONSTITUTES A LEGAL AND ENFORCEABLE CONTRACT BETWEEN THE CUSTOMER AND HOOK SECURITY BY INDICATING CONSENT ELECTRONICALLY,OR ACCESSING OR OTHERWISE USING THE SAAS PRODUCTS, THE CUSTOMER AGREES TO THE TERMS AND CONDITIONS OF THIS AGREEMENT. IF THE CUSTOMER DOES NOT AGREE TO THIS AGREEMENT, DO NOT INDICATE CONSENT ELECTRONICALLY AND MAKE NO FURTHER USE OF THE SAAS PRODUCTS.

  1. Access and Use

  1. Access and Use. Subject to payment of all applicable fees, including subscription fees and the terms and conditions of this Agreement, Hook Security grants Customer, during the Subscription Term, a non-exclusive, non-transferable right to access and use (and permit Authorized Users to access and use) the SaaS Products and applicable Documentation solely for Customers and its Affiliates’ internal business purposes in accordance with the Documentation and in the quantity specified in the applicable Order. The Customer will operate the SaaS Products in accordance with the Documentation and be responsible for the acts and omissions of its Authorized Users, who must also agree to the terms and conditions specified herein.

  1. Access and Restrictions. Customer shall not, directly or indirectly: (a) copy or reproduce the SaaS Products or the Documentation except as permitted under this Agreement; (b) exceed the subscribed quantities, users or other entitlement measures of the SaaS Products as stated in the applicable Order; (c) remove or destroy any copyright, trademark or other proprietary marking or legends placed on or contained in the SaaS Products, Documentation, or Hook Security Intellectual Property including, but not limited to, the PsySec™ unless specifically granted such right in a duly executed agreement with Hook Security; (d) assign, sell, resell, sublicense, rent, lease, time-share, distribute, or otherwise transfer the rights granted to Customer under this Agreement to any third party except as expressly set forth herein or specifically granted such right in a duly executed agreement with Hook Security; (e) modify, reverse engineer, or disassemble the SaaS Products; (f) except to the limited extent applicable laws specifically prohibit such restriction, decompile, attempt to derive the source code, or underlying ideas or algorithms of any part of the SaaS Products, attempt to recreate the SaaS Products or use the SaaS Products for any competitive purpose; (g) create, translate or otherwise prepare derivative works based on the SaaS Products, Documentation, or Hook Security Intellectual Property; (h) interfere with or disrupt the integrity or performance of the SaaS Products; (i) attempt to gain unauthorized access to the SaaS Products or its related systems or networks, or perform unauthorized penetration testing on the SaaS Products; (j) use the SaaS Products to infringe on the Intellectual Property rights, publicity rights, or privacy rights of any third party, or to store or transfer defamatory, trade libelous or otherwise unlawful data; or (k) send, store or process in the SaaS Products any personal health data, credit card data, personal financial data or other such sensitive regulated data not required by the Documentation, or any Customer Data that is subject to the International Traffic in Arms Regulations maintained by the United States Department of State. The Customer’s authorized use of the SaaS Products is subject to the purchased quantities and features set forth in the applicable Order for the SaaS Products.

Fees for the SaaS Products are based on the use of the SaaS Products in a manner consistent with the Documentation including the invoice and subscription receipt. If Customer uses the SaaS products in a manner that is outside or in violation of the Documentation, then Customer will cooperate with Hook Security to address any applicable burden on the SaaS Products or pay an additional fee as required to maintain the subscription.

  1. Login Access to the SaaS Products. Customer is solely responsible for ensuring: (i) that only appropriate Authorized Users have access to the SaaS Products, (ii) that such Authorized Users have been trained in the proper use of the SaaS Products, and (iii) proper usage of passwords, tokens, and access procedures with respect to logging into the SaaS Products. Hook Security reserves the right to refuse registration of, or to cancel, login IDs that it reasonably believes to violate the terms and conditions set forth in this Agreement, in which case Hook Security will promptly inform Customer in writing of such refusal or cancellation. In addition to the rights set forth in this Agreement, Hook Security may suspend Customer’s access and use of the SaaS Products if there is an unusual and material spike or increase in Customer’s use of the SaaS Products and Hook Security reasonably suspects or knows that such traffic or use is fraudulent or materially and harming the operating capability of the SaaS Products. Hook Security will provide notice before such suspension unless Hook Security reasonably believes that providing such notice poses a risk to the security of the SaaS Products or a risk of harm to or interference with Hook Security customers, operations, or third-parties. Hook Security will promptly reinstate the Customer’s access and use once the issue has been resolved.

  1. Trial Services. If Customer is using a free trial, a proof of concept version of the SaaS Products, a beta version of the SaaS Products, or using the SaaS Products on any other free-of-charge basis as specified in an Order including any related support services to the extent provided by Hook Security in its sole discretion (collectively, “Trial Services”), Hook Security makes such Trial Services available to Customer until the earlier of: (i) the end of the free trial, proof of concept period, or beta testing period as communicated by Hook Security specified in an Order; (ii) the start date of any purchased version of such SaaS Products; or (iii)written notice of termination from Hook Security (“Trial Services Period”). Hook Security grants Customer, during the Trial Services Period, a non-exclusive, non-transferable right to access and use the Trial Services for Customer’s internal evaluation purposes in accordance with the Documentation and subject to the access and use restrictions set forth in this Agreement. Customers are authorized to use Trial Services only for evaluation and not for any business or productive purposes unless otherwise authorized by Hook Security in writing. Any data Customer enters into the Trial Services and any configurations made to the Trial Services by or for Customer during the term of such Trial Services will be permanently lost unless Customer: (a) has purchased a subscription to the same SaaS Products as covered by the Trial Services; or (b) exports such data or configurations before the end of the free period. There is no guarantee that features or functions of the Trial Services will be available, or if available will be the same, in the general release version of the SaaS Products, and Customer should review the SaaS Products features and functions before making a purchase. Hook Security will be under no obligation to provide Customer any maintenance or support services with respect to the Trial Services. Notwithstanding anything to the contrary, Hook Security provides the Trial Services “as is” and “as available” without any warranties or representations of any kind. To the extent permitted by law, Hook Security disclaims all implied warranties and representations, including, without limitation, any implied warranty of merchantability, fitness for a particular purpose, and non-infringement. The Customer assumes all risks and all costs associated with its use of the Trial Services. The Customer’s sole and exclusive remedy in case of any dissatisfaction or Hook Security’s breach of the Agreement with respect to such Trial Services is the termination of the Trial Services. Any obligations on behalf of Hook Security to indemnify, defend, or hold harmless under this Agreement do not apply to Customers using Trial Services.

  1. Third-Party Materials. The SaaS Products include Third-Party Materials subject to their respective OSS (“Open Source”) Licenses as indicated in the Documentation, if applicable. Hook Security warrants that such Third-Party Materials will not diminish the license rights provided to Customer herein or limit Customer’s ability to use the SaaS Products in accordance with the Documentation, or create any obligation on the part of Customer to license Customer’s software or products under any open source or similar license. Nothingherein shall derogate from mandatory rights Customer may have under any OSS Licenses, if any.

  1. Support. As part of its provision of the SaaS Products, Hook Security shall make available technical support to the Customer in accordance with Hook Security 's then-applicable support terms. Upon notification from Hook Security, Customer shall promptly update any Agents on Customer systems that interact with the SaaS Products. Customer acknowledges and agrees that its failure to timely install such an update may result in disruptions to or failures of the SaaS Products, security risks, or suspension of Customer’s access to the SaaS Products, without any liability for Hook Security to Customer.

  1. Mobile Applications. With regard to SaaS Products that require the use of mobile applications by an Authorized User, the Customer shall ensure that all Authorized Users promptly download and install all available updates for the mobile applications. The Customer further acknowledges and agrees that the SaaS Products may not properly operate should any Authorized User fail to do so, and that Hook Security is not liable for any damages caused by a failure to update mobile applications accordingly.

  1. Payment and Taxes

  1. Payment Terms. Customer shall pay all invoices and subscriptions due immediately and automatically debited through Hook Security’s payment processor, without any deduction or set-off (except for any amount disputed promptly and in writing by Customer in good faith). Any amounts arising in relation to this Agreement not paid when due will be subject to a late charge of one and one-half percent (1½ %) per month on the unpaid balance or the maximum rate allowed by law, whichever is less. Without prejudice to Customer’s rights set out elsewhere in this Agreement, all SaaS Products fees are non-refundable and payable in advance. Hook Security may invoice for purchases of SaaS Products upon delivery.

  1. Taxes. The fees and charges covered by this Agreement are exclusive of any Indirect Taxes imposed or levied, currently or in the future based on applicable legislation, on the SaaS Products. Unless otherwise agreed between the Parties, Customer will be liable for compliance with reporting and payment of such Indirect Taxes in its tax jurisdiction. Hook Security shall include the Indirect Taxes on its invoice to Customer and remit such Indirect Taxes collected to the relevant authority if required by applicable law. For the avoidance of doubt, Hook Security will be responsible for direct taxes imposed on Hook Security’s net income or gross receipts in its tax jurisdiction.

  1. Indirect Orders. If Customer places an Indirect Order, then Hook Security grants the rights described in this Agreement in consideration for and subject to: (a) Customer’s agreement to comply with the pricing and payment terms of the Indirect Order, to be separately agreed between Customer and the applicable Channel Partner; and (b) Customer’s agreement to comply with its obligations set forth in this Agreement (including the restrictions on use of the SaaS Products). Notwithstanding the foregoing, the final sales price or rate shall be freely and independently determined between the applicable Channel Partner and Customer. For the avoidance of doubt, in the case of such an Indirect Order, any indication in this Agreement of an agreement between Customer and Hook Security for the price payable by Customer for such Indirect Order shall be null and void and not form a binding part of this Agreement and the provisions of this Agreement related to payment terms, pricing and/or order procedures shall not apply.

  1. Rights in Intellectual Property

  1. Intellectual Property. Except for the rights granted in this Agreement, all rights, title, and interest in and to the SaaS Products, Documentation, and Hook Security’s Intellectual Property are reserved by Hook Security, its Affiliates, and licensors. Except as provided for herein, all rights, title, and interest in and to Customer Intellectual Property are reserved by Customer, its Affiliates, or licensors. Nothing in this Agreement shall (a)transfer ownership of any Intellectual Property rights from one Party to the other, or (b)provide either Party a right to use the other Party’s trade names, logos, or trademarks.

  1. Customer Data. Hook Security may only access and utilize Customer Data for the sole purpose of delivering the SaaS Products. Hook Security is prohibited from utilizing Customer Data for any other purpose, including but not limited to product development, product enhancement, training machine learning algorithms, or any internal use.

  1. Usage Data and Suggestions. Hook Security shall be permitted to collect and use the Usage Data for its reasonable business purposes and for Customer’s benefit. In the event Hook Security wishes to disclose the Usage Data or any part thereof to third parties (either during the Subscription Term or thereafter), such data shall be anonymized and presented in the aggregate so that it will not identify Customer or its Authorized Users. The foregoing shall not limit in any way Hook Security’s confidentiality obligations pursuant to Section 4 below. To the extent that Customer provides Hook Security with Suggestions, such Suggestions shall be free from any confidentiality restrictions that might otherwise be imposed on Hook Security pursuant to this Agreement, and may be implemented by Hook Security in its sole discretion. Customer acknowledges that any Hook Security products or materials incorporating any such Suggestions shall be the sole and exclusive property of Hook Security.

  1. Confidentiality

  1. Confidential Information. The Parties acknowledge that each may disclose (the “Disclosing Party”) certain valuable confidential and proprietary information to the other (the “Receiving Party”). The Receiving Party may only use the Disclosing Party’s Confidential Information to fulfill the purposes of this Agreement. The Receiving Party will protect the Disclosing Party’s Confidential Information by using at least the same degree of care as the Receiving Party uses to protect its own Confidential Information of a like nature (but no less than a reasonable degree of care) to prevent the unauthorized use, dissemination, disclosure, or publication of such Confidential Information. Notwithstanding the foregoing, the Receiving Party may disclose Confidential Information to its(and its Affiliates) employees, advisors, consultants, and agents on a need-to-know basis and provided that such party is bound by obligations of confidentiality substantially similar to those contained herein. This Section 4 supersedes any and all prior or contemporaneous understandings and agreements, whether written or oral, between the Parties with respect to Confidential Information and is a complete and exclusive statement thereof.

  1. Exceptions. Information will not be deemed Confidential Information if it: (i) is known to the Receiving Party prior to receipt from the Disclosing Party directly or indirectly from a source other than one having an obligation of confidentiality to the Disclosing Party; (ii) becomes known (independently of disclosure by the Disclosing Party) to the Receiving Party directly or indirectly from a source other than one having an obligation of confidentiality to the Disclosing Party; (iii) becomes publicly known or otherwise ceases to be secret or confidential, except through a breach of this Agreement by the Receiving Party; or (iv) is independently developed by the Receiving Party without the use of or reliance on the Disclosing Party’s Confidential Information, and the Receiving Party can provide evidence to that effect. The Receiving Party may disclose Confidential Information pursuant to the requirements of a court, governmental agency, or by operation of law but shall (to the extent permissible by law) limit such disclosure only the information requested and give the Disclosing Party prior written notice sufficient to permit the Disclosing Party to contest such disclosure.

  1. Advertising and Publicity. Neither Party shall make or permit to be made any public announcement concerning the relationship between the Parties without the prior written consent of the other Party.

  1. Security and Processing of Personal Data

  1. Customer Data Content. As between Hook Security and Customer, Customer owns and is solely responsible for: (i) the content, quality, and accuracy of Customer Data as made available by Customer and by Authorized Users; (ii) providing notice to Authorized Users with regards to how Customer Data will be collected and used for the purpose of the SaaS Products; (iii) ensuring Customer has a valid legal basis for processing Customer Data and for sharing Customer Data with Hook Security (to the extent applicable); and (iv) ensuring that the Customer Data as made available by Customer complies with applicable laws and regulations including Applicable Data Protection Laws.

  1. Security of Customer Data. Hook Security shall: (i) ensure that it has in place appropriate administrative, physical, and technical measures designed to protect the security and confidentiality of Customer Data against any accidental or illicit destruction, alteration, or unauthorized access or disclosure to third parties; (ii) have measures in place designed to protect the security and confidentiality of Customer Data; and (iii) access and use the Customer Data solely to perform its obligations in accordance with the terms of this Agreement, and as otherwise expressly permitted in this Agreement. Hook Security shall not materially diminish its security controls with respect to Customer Data during a particular SaaS Products term.

  1. Warranties

  1. SaaS Products Warranty. During the Subscription Term, Hook Security warrants that the SaaS Products will perform in substantial conformity with the Documentation and that the SaaS Products are not designed to, and do not, contain viruses, worms, Trojan horses, or other unintended malicious or destructive code. The above warranties are void if the failure of the SaaS Products has resulted from negligence, error, or misuse of the SaaS Products by Customer, the Authorized User, or by anyone other than Hook Security Customer shall be required to report any breach of warranty to Hook Security within a period of three (3) days of the date on which the incident giving rise to the claim occurred. Hook Security’s sole and exclusive liability, and Customer’s sole and exclusive remedy, for breach of these warranties, will be for Hook Security, at its expense, to use reasonable commercial efforts to correct such nonconformity within thirty (30) days of the date that notice of the breach was provided; and, if Hook Security fails to correct the breach within cure period, Customer may terminate the affected Order and, in such event, Hook Security shall provide Customer with a pro-rata refund of any unused pre-paid fees paid for the period following termination as calculated on a monthly basis for the affected SaaS Products.

  1. Compliance with Law. Each Party shall comply with all applicable laws and regulations in connection with the performance of its obligations and the exercise of its rights under this Agreement.

  1. Disclaimer. Any and all warranties, expressed, incorporated, or implied, are limited to the extent and period in this Agreement. To the maximum extent allowed by applicable law, Hook Security disclaims all other warranties, conditions, and other terms, whether express or implied or incorporated into this Agreement by statute, common law or otherwise, including the implied conditions and warranties of merchantability and fitness for a particular purpose. Hook Security will have no liability for delays, failures, or losses attributable or related in any way to the use or implementation of third-party software or services not provided by Hook Security.

  1. Indemnification

  1. Infringement Indemnity. Customer shall defend and indemnify Hook Security and/or its Affiliates and their officers, directors, and employees against all third-party claims, suits, and proceedings resulting from the violation, misappropriation, or infringement of such third-party’s patent, copyright, trademark, or trade secret caused by Customer’s use of the SaaS Products, including all directly related losses, liabilities, damages, costs, and expenses (including reasonable attorneys’ fees) incurred by Hook Security.

  1. Hook Security shall defend and indemnify Customer and/or its Affiliates and their officers, directors, and employees against all third-party claims, suits, and proceedings resulting from the violation, misappropriation, or infringement of such third-party’s patent, copyright, trademark, or trade secret caused by Hook Security’s SaaS Products, including all directly related losses, liabilities, damages, costs, and expenses (including reasonable attorneys’ fees) incurred by Hook Security.

  1. Customer Data and Use Indemnity. Customer shall defend and indemnify Hook Security and/or its Affiliates and their officers, directors, and employees against any third-party claims, suits, and proceedings (including those brought by a government entity) resulting from: (i) an alleged infringement or violation by the Customer Data of such third-party’s patent, copyright, trademark, trade secret; or (ii) Hook Security’s use of the Customer Data, in accordance with the terms of this Agreement and (where applicable) with the terms of the DPA, violates applicable law; and all directly related losses, liabilities, damages, costs, and expenses (including reasonable attorneys’ fees).

  1. Process. Each Party’s defense and indemnification obligations herein will become effective upon, and are subject to: (a) the indemnified Party’s prompt notification to the indemnifying Party of any claims in writing; and (b) the indemnified Party providing the indemnifying Party with full and complete control, authority and information for the defense of the claim, provided that the indemnifying Party will have no authority to enter into any settlement or admission of the indemnified Party’s wrongdoing on behalf of the indemnified Party without the indemnified Party’s prior written consent (not to be unreasonably withheld).At the indemnifying Party’s request, the indemnified Party shall reasonably cooperate with the indemnifying Party in defending or settling any claim.

  1. Exclusions. The above Hook Security obligations to defend and indemnify will not apply in the event that a claim arises from or relates to: (a) use of the SaaS Products not in accordance with the Documentation and this Agreement; (b) Customer’s use of the SaaS Products in violation of applicable laws; (c) any modification, alteration or conversion of the SaaS Products not created or approved in writing by Hook Security ; (d) any combination or use of the SaaS Products with any computer, hardware, software, data or service not required by the Documentation; (e) Hook Security’s compliance with specifications, requirements or requests of Customer; or (f) Customer’s gross negligence or willful misconduct.

  1. Remedies. If the SaaS Products becomes, or Hook Security reasonably determines that the SaaS Products is likely to become, subject to a claim of infringement for which Hook Security must indemnify Customer as described above, Hook Security may at its option and expense: (a) procure for Customer the right to continue to access and use the SaaS Products, (b) replace or modify the SaaS Products so that it becomes non-infringing without causing a material adverse effect on the functionality provided by the infringing SaaS Products, or (c) if neither of the above options is available in a timely manner on commercially reasonable terms, terminate the affected Order and provide Customer with a pro-rata refund of any unused pre-paid fees paid for the period following termination as calculated on a monthly basis for the affected SaaS Product. This Section states the sole liability of Hook Security and the exclusive remedy of Customer with respect to any indemnification claims arising out of or related to this Agreement.

  1. Limitation of Liability

  1. Maximum Liability. Except for liability caused by Hook Security’s intellectual property infringement indemnification obligations in Section 7.2, Customer’s infringement as specified in Section 7.1, Customer’s data infringement indemnity in Section 7.3, and Customer’s payment obligations herein, in no event will either Party’s maximum aggregate liability arising out of or related to this Agreement, regardless of the cause of action and whether in contract, tort (including negligence), warranty, indemnity or any other legal theory, exceed the total amount paid or payable to Hook Security under this Agreement during the twelve (12) month period preceding the date of the initial claim.

  1. No Consequential Damages. Neither Party will have any liability to the other Party for any loss of profits or revenues, loss of goodwill, or for any indirect, special, incidental, consequential, or punitive damages arising out of, or in connection with this Agreement, however caused, whether in contract, tort (including negligence), warranty, indemnity or any other legal theory, and whether or not the Party has been advised of the possibility of such damages.

  1. Construction. This Agreement is not intended to and will not be construed as excluding or limiting any liability which cannot be limited or excluded by applicable law, including liability for (a) death or bodily injury caused by a Party’s negligence; or (b) gross negligence, willful misconduct, or fraud.

  1. Assignment

  1. Assignment. Either Party may assign any and all of its rights and obligations under this Agreement to a successor in interest in the event of a merger or acquisition, but, in the case of assignment to an Affiliate, only upon written notice to the other Party who, upon such notice, may terminate this Agreement immediately.

  1. Restricted Rights and Export Control

  1. Export Control. The exportation of the SaaS Products and Documentation, and all related technology and information thereof are subject to U.S. laws and regulations pertaining to export controls and trade and economic sanctions, including the U.S. Export Administration Act, Export Administration Regulations, the Export Control Reform Act, and the Office of Foreign Assets Control’s sanctions programs, the laws of the State of Israel, and the laws of any country or organization of nations within whose jurisdiction Customer (or its Authorized Users who may use or otherwise receive the SaaS Products as expressly authorized by this Agreement) operates or does business, as amended, and the rules and regulations promulgated from time to time thereunder. Customer agrees not to export, re-export, access, or grant access to the SaaS Products and all related technology, information, materials and any upgrades thereto to: (a) any Prohibited Persons; (b) any country to which such export, re-export or access from is restricted or prohibited per the foregoing applicable laws; or (c) otherwise in violation of any applicable export or import restrictions, laws or regulations. The Customer also certifies that it is not a Prohibited Person nor owned, controlled by, or acting on behalf of a Prohibited Person.

  1.  Commercial Computer Software. If Customer is an agency or contractor of the United States Government, Customer acknowledges and agrees that: (i) the SaaS Products (including any software forming a part thereof) were developed entirely at private expense; (ii) the SaaS Products (including any software forming a part thereof) in all respects constitute proprietary data belonging solely to Hook Security; (iii) the SaaS Products (including any software forming a part thereof) are not in the public domain; and (iv) the software forming a part of the SaaS Products is “Commercial Computer Software” as defined in subparagraph (a)(1) of DFAR section 252.227-7014 or FAR Part 12.212. Customer shall provide no rights in the Software(including any software forming a part thereof) to any U.S. Government agency or any other party except as expressly provided in this Agreement.

  1. Professional Services

  1.  Professional Services. Customers may separately purchase from Hook Security professional services in relation to the SaaS Products as may be generally available by Hook Security to Customers, pursuant to Hook Security’s then applicable professional services terms.

  1. Term and Termination

  1.  Term. This Agreement will be effective upon acceptance by Customer through the activation of the Subscription and shall remain in force during the applicable Subscription Term of the SaaS Products unless or until terminated by either Party pursuant to this Section. The successful submission of payment information on Hook Security’s subscription form constitutes the beginning of the Subscription Term. All Subscription Terms are a minimum of twelve (12) consecutive calendar months beginning on the day that payment is received.

  1.  Termination. Either Party may terminate this Agreement immediately upon notice to the other Party if the other Party: (i) materially breaches this Agreement and fails to remedy such breach within thirty (30) days after receiving written notice of the breach from the other Party; or (ii) commences bankruptcy or dissolution proceedings, has a receiver appointed for a substantial part of its assets or ceases to operate in the ordinary course of business. In addition, a Party may terminate this Agreement, a Statement of Work (“SOW”), or a Schedule, in whole or in part, or cease provision of the SaaS Products if required to comply with applicable law or regulation, and such termination will not constitute a breach of this Agreement by the terminating Party. Hook Security reserves the right to suspend Customer’s access to the applicable SaaS Products without written notice to Customer if: (i) an invoice is more than thirty (30) days past due; or (ii) if there is an uncured material breach of this Agreement. Hook Security will promptly reinstate the Customer’s access and use of the SaaS Products/provision of the Professional Services once the issue has been resolved. Any accrued rights and obligations will survive termination.

  1.  Effects of Termination/Expiration. Upon termination or expiration of an applicable Subscription Term: (i) Customer will have no further right to access or use the SaaS Products; and (ii) each Party shall within thirty (30) days after written request return or destroy any tangible Confidential Information of the other Party within its possession or control that is not contained on the SaaS Products. Any Customer Data contained on the SaaS Products will be deleted within sixty (60) days of termination or expiration of Customer’s Subscription Term. Customer acknowledges that it is responsible for exporting any Customer Data to which Customer desires continued access after termination/expiration, and Hook Security shall have no liability for any failure of Customer to retrieve such Customer Data and no obligation to store or retain any such Customer Data after such sixty (60) day period. Following the termination of the SaaS Products, Hook Security may immediately deactivate the Customer’s account. Any accrued rights and obligations will survive termination.

  1.  Miscellaneous

  1. Independent Contractors. Nothing in this Agreement will be construed to imply a joint venture, partnership, or principal-agent relationship between Hook Security and Customer, and neither Party will have the right, power, or authority to obligate or bind the other in any manner whatsoever.

Notice. All Notices will be in writing and will be deemed to have been duly given: (a) when delivered by hand; (b) three (3) days after being sent by registered or certified mail, return receipt requested and postage prepaid; (c) one (1) day after deposit with a nationally recognized overnight delivery or express courier service; or (d) when provided via email when the sender has received a delivery/read receipt. Notices for Hook Security should be sent to the following addresses: (i) for physical Notices to the following address:502 East Main Street, Lakeland, Florida 33801, U.S.A. and (ii) for electronic Notices to: support@hooksecurity.co.

  1. Force Majeure. With the exception of Customer’s payment obligations herein, neither Party will be liable to the other Party for any delay or failure to perform which is due to fire, pandemic, virus, epidemic, travel advisories as to health, security and/or terrorism, flood, lockout, transportation delay, war, acts of God, governmental rule or order, strikes or other labor difficulties, or other causes beyond its reasonable control. That said, after such an event, both Parties will resume performance promptly after the cause of such delay or failure has been removed.

  1. Governing Law and Jurisdiction. Each Party agrees and submits to the laws of the State of South Carolina, without regard to choice or conflicts of law rules, and to the exclusive jurisdiction of the state and federal courts of the State of South Carolina with respect to any dispute, claim, action, suit, or proceeding (including non-contractual disputes or claims) arising out of or in connection with this Agreement, or its subject matter or formation. To the extent not prohibited by applicable law, each of the Parties hereby irrevocably waives any and all rights to trial by jury in any legal proceeding arising out of or related to this Agreement.

  1. Entire Agreement, Execution, and Modification. This Agreement supersedes all prior agreements and representations between the Parties regarding the specific subject matter of this Agreement. The terms and conditions contained in any Order issued by Customer will be of no force or effect, even if the Order is accepted by Hook Security may make changes to these Terms of Service from time to time. If Hook Security makes a material change to any of the foregoing, Hook Security will inform Customer by email to the email address(es) noted on the Order (or subsequently designated by Customer in writing as a contact for notifications from Hook Security), or through a banner or other prominent notice within the SaaS Products, or through the Hook Security support platform. If Customer does not agree to the change, Customer must notify Hook Security by email to support@hooksecurity.co within thirty (30) days after Hook Security’s notice. If Customer so notifies Hook Security, then Customer will remain governed by the most recent terms of service applicable to Customer until the end of the then-current month of the Subscription Term and the updated terms shall apply upon the commencement of the subsequent Subscription Term.

  1. Severability and Waiver. This Agreement shall be deemed severable, and the invalidity or unenforceability of any term or provision hereof shall not affect the validity or enforceability of this Agreement or of any other term or provision hereof. Should any term or provision of this Agreement be declared void or unenforceable by any court of competent jurisdiction, the Parties intend that a substitute provision will be added to this Agreement that, to the greatest extent possible, achieves the intended commercial result of the original provision. The failure of either Party to enforce any rights granted to it hereunder or to take action against the other Party in the event of any breach hereunder will not be deemed a waiver by that Party as to subsequent enforcement of rights or subsequent actions in the event of future breaches.

  1. Definitions and Interpretation. The following definitions and rules of interpretation apply in this Agreement:

  1. “Affiliate” means a company controlling, controlled by, or under common control with a Party (an entity will be deemed to have control if it owns over 50% of another entity).

  1. “Agents” means Hook Security’s proprietary software, systems and locally-installed software agents and connectors that interact with the SaaS Products as may be provided by Hook Security in connection with the SaaS Products.

  1. “Applicable Data Protection Laws” means the EU General Data Protection Regulation(2016/679) (“GDPR”), any applicable laws of EU member states implementing the GDPR, and the California Consumer Privacy Act (“CCPA”), in each case as amended, consolidated, re-enacted, or replaced from time to time and only if and insofar as they apply.

  1. “Authorized Users” means employees, agents, consultants, contractors, or vendors authorized by Customer to use the SaaS Products solely for the internal use of Customer and its Affiliates, subject to the terms and conditions of this Agreement.

  1. “Channel Partner” means a third-party business entity that Hook Security has appointed as an approved partner to as applicable, distribute, re-sell and support the SaaS Products.

  1. “Confidential Information” means all information provided by the Disclosing Party to the Receiving Party concerning the disclosing Party or its Affiliates’ business, products or services that is not generally known to the public, including information relating to customers, vendors, trade secrets, prices, products, services, computer programs and other intellectual property and any other information which a Party should reasonably understand to be considered Confidential Information whether or not such information is marked “Confidential” or contains such similar legend by the disclosing Party at the time of disclosure.

  1. “Customer Data” means all data and/or content uploaded to the SaaS Products by Customer (including where applicable Authorized Users), and all data derived from it, including personal data. For the avoidance of doubt, Customer Data does not include Usage Data.

  1. “Hook Security” means Hook Security, Inc., a Delaware corporation.

  1. “Documentation” means the user guides, installation documents, security fundamentals documentation, and specifications for the SaaS Products that are made available from time to time by Hook Security in electronic or tangible form, but excluding any sales or marketing materials.

  1. “Indirect Order” means an Order for the Software or Services from a Channel Partner of the Customer’s choosing pursuant to an independent commercial agreement.

  1. “Indirect Taxes” means excise, sales, use, gross-turnover, value-added, goods, and services tax, or other similar types of indirect taxes, duties, customs, or tariffs (however designated, levied or based and whether foreign or domestic, federal, or state).

  1. “Intellectual Property” means a Party’s proprietary material, technology, or processes (excluding the SaaS Products and Documentation), including services, software tools, proprietary framework and methodology, hardware designs, algorithms, objects and documentation (both printed and electronic), network designs, know-how, trade secrets and any related intellectual property rights throughout the world (whether owned or licensed by a third party) and any derivatives, improvements, enhancements or extensions of such Intellectual Property conceived, reduced to practice, or developed.

  1. “Notice” means any notice or other communication required or permitted under this Agreement.

  1. “Order” means Hook Security’s quote accepted by Customer via Customer’s purchase order or other ordering document submitted to Hook Security (directly or indirectly through a Channel Partner) to order Hook Security’s SaaS Products, which references the SaaS Products, pricing, payment terms, quantities, and other applicable terms set forth in an applicable Hook Security quote or ordering document.

  1. “OSS Licenses” means the respective open source licenses that the Third-Party Materials are subject to.

  1. “Prohibited Persons” means anyone on the U.S. Commerce Department’s Denied Persons, Entity, or Unverified Lists or the U.S. Treasury Department’s list of Specially Designated Nationals and Consolidated Sanctions list.

  1. “SaaS Products” means the software-as-a-service products specified in the Order as further described in the Documentation (including any updates and upgrades to the SaaS Products provided by Hook Security in its sole discretion, and any software, systems and locally-installed software agents and connectors that interact with the SaaS Products as may be provided by Hook Security in connection with the SaaS Products).

  1. “Subscription Term” means the period of time during which a Customer is subscribed to the SaaS Products, as specified in an Order and which shall begin upon delivery of the SaaS Products.

  1. “Suggestions” means, any ideas or suggestions for improvements, new features, functionalities, corrections, enhancements, or changes to the SaaS Products suggested by Customer to Hook Security, which constitute Intellectual Property rights under applicable law.

  1. “Third-Party Materials” means open-source software programs that are made available by third parties under their respective OSS Licenses.

  1. “Usage Data” means data generated in connection with the Customer’s access, use, and configuration of the SaaS Products and data derived from it (e.g., types of applications or accounts utilized or interacting with the SaaS Products).

  1. Any words following the terms ‘including’ or ‘include’ shall be regarded as examples only and not construed as an exhaustive list.

Should Customer have any questions concerning this Agreement, or if Customer desires to contact Hook Security for any reason, please email us at: support@hooksecurity.co

Last Updated: September 14, 2023