Security Storm
 
     



Legal Statement for Security Storm (www.securitystorm.net)

This web site may contain other proprietary notices and copyright information, the terms of which must be observed and followed. Information on this Web site may contain technical inaccuracies or typographical errors.

Information may be changed or updated without notice. Security Storm may also make improvements and/or changes in the products and/or the programs described in this information at any time without notice.

Security Storm does not want to receive confidential or proprietary information from you through our Web site. Please note that any information or material sent to Security Storm will be deemed NOT to be confidential. By sending Security Storm any information or material, you grant Security Storm an unrestricted, irrevocable license to use, reproduce, display, perform, modify, transmit and distribute those materials or information, and you also agree that Security Storm is free to use any ideas, concepts, know-how or techniques that you send us for any purpose.

Security Storm makes no representations whatsoever about any other Web site which you may access through this one. When you access a non-Security Storm Web site, even one that may contain the Security Storm logo, please understand that it is independent from Security Storm, and that Security Storm has no control over the content on that Web site. In addition, a link to a non Security Storm Web site does not mean that Security Storm endorses or accepts any responsibility for the content, or the use, of such Web site. It is up to you to take precautions to ensure that whatever you select for your use is free of such items as viruses, worms, trojan horses and other items of a destructive nature. IN NO EVENT WILL SECURITY STORM BE LIABLE TO ANY PARTY FOR ANY DIRECT, INDIRECT, SPECIAL OR OTHER CONSEQUENTIAL DAMAGES FOR ANY USE OF THIS WEB SITE, OR ON ANY OTHER HYPER LINKED WEB SITE, INCLUDING, WITHOUT LIMITATION, ANY LOST PROFITS, BUSINESS INTERRUPTION, LOSS OF PROGRAMS OR OTHER DATA ON YOUR INFORMATION HANDLING SYSTEM OR OTHERWISE, EVEN IF WE ARE EXPRESSLY ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

CERTIFICATION OF ELIGIBILITY
UNDER U.S. EXPORT CONTROL LAWS
TO RECEIVE SOFTWARE CONTROLLED FOR EXPORT

I warrant that I/we:
understand that the Subject Product is subject to export controls under the U.S. Commerce Department's Export Administration Regulations ("EAR").

am/are not located in a prohibited destination country under the EAR or U.S. sanctions regulations (currently Cuba, Iran, Iraq, Libya, North Korea, Sudan, Syria, the Federal Republic of Yugoslavia (including Serbia, but not Kosovo or Montenegro), and Afghanistan).

am/are not listed on the Commerce Department's Denied Persons List, the Commerce Department's Entity List, or the Treasury Department's Lists of Specially Designated Nationals.
will not export, re-export, or transfer the Subject Product to any prohibited destination, entity, or individual without the necessary export license(s) or authorization(s) from the U.S. Government.

will not use or transfer the product for use in any sensitive nuclear, chemical or biological weapons, or missile technology end-uses unless authorized by the U.S. Government by regulation or specific license.

understand that countries other than the United States may restrict the import, use, or export of encryption products, and agree that we shall be solely responsible for compliance with any such import, use, or export restrictions and shall indemnify and hold you harmless with respect to any violations of such restrictions.

understand and agree that if we are in the U.S. and we export or transfer the Subject Product to eligible end-users, we will, as required by EAR § 740.17(e), submit semi-annual reports to the Commerce Department’s Bureau of Export Administration (BXA).

You may not download any software from this site unless you acknowledge and agree to the above stipulations.

Privacy Statement for Security Storm (www.securitystorm.net)

IP Address
We use your IP address to help diagnose problems with our server, and to administer our Web site. Your IP address is used to help identify you and your shopping cart and to gather broad demographic information.

Registration Forms
Our site's registration forms requires users to give us contact information (like their name and email address) and financial information (like their account or credit card numbers). The customer's contact information is used to contact the visitor when necessary. Users may opt-out of receiving future mailings; see the choice/opt-out section below. Financial information that is collected is used to bill the user for products and services. Security Storm does not share its customer databases with any third party vendors.

Links
This site contains links to other sites. Security Storm is not responsible for the privacy practices or the content of such Web sites.

Security
This site has security measures in place to protect the loss, misuse and alteration of the information under our control.

Correct/Update
This site gives users the following options for changing and modifying information previously provided. You can send email to webmaster@securitystorm.net

Contacting the Web Site
If you have any questions about this privacy statement, the practices of this site, or your dealings with this Web site, you can contact:

Webmaster @ Security Storm
SLP, Ltd.
330 Forevergreen Dr. Suite 101
Falling Waters, WV 25419
webmaster@securitystorm.net

 
Copyright © 1998-2002 Security StormSM. Security Storm is a service of SLP, Ltd.