|

|

Legal Statement for Security
Storm (www.securitystorm.net)
This web site may contain other proprietary notices and copyright
information, the terms of which must be observed and followed.
Information on this Web site may contain technical inaccuracies or
typographical errors.
Information may be changed or updated without notice. Security Storm may also
make improvements and/or changes in the products and/or the programs
described in this information at any time without notice.
Security Storm does not want to receive confidential or proprietary
information from you through our Web site. Please note that any
information or material sent to Security Storm will be deemed NOT to be
confidential. By sending Security Storm any information or material, you
grant Security Storm an unrestricted, irrevocable license to use, reproduce,
display, perform, modify, transmit and distribute those materials or
information, and you also agree that Security Storm is free to use any ideas,
concepts, know-how or techniques that you send us for any purpose.
Security Storm makes no representations whatsoever about any other Web site
which you may access through this one. When you access a non-Security
Storm
Web site, even one that may contain the Security Storm logo, please
understand that it is independent from Security Storm, and that Security
Storm has
no control over the content on that Web site. In addition, a link to a
non Security Storm Web site does not mean that Security Storm endorses or accepts
any responsibility for the content, or the use, of such Web site. It is
up to you to take precautions to ensure that whatever you select for
your use is free of such items as viruses, worms, trojan horses and
other items of a destructive nature. IN NO EVENT WILL SECURITY STORM BE
LIABLE TO ANY PARTY FOR ANY DIRECT, INDIRECT, SPECIAL OR OTHER
CONSEQUENTIAL DAMAGES FOR ANY USE OF THIS WEB SITE, OR ON ANY OTHER
HYPER LINKED WEB SITE, INCLUDING, WITHOUT LIMITATION, ANY LOST PROFITS,
BUSINESS INTERRUPTION, LOSS OF PROGRAMS OR OTHER DATA ON YOUR
INFORMATION HANDLING SYSTEM OR OTHERWISE, EVEN IF WE ARE EXPRESSLY
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
CERTIFICATION OF ELIGIBILITY
UNDER U.S. EXPORT CONTROL LAWS
TO RECEIVE SOFTWARE CONTROLLED FOR EXPORT
I warrant that I/we:
understand that the Subject Product is subject to export controls under
the U.S. Commerce Department's Export Administration Regulations
("EAR").
am/are not located in a prohibited destination country under the EAR or
U.S. sanctions regulations (currently Cuba, Iran, Iraq, Libya, North
Korea, Sudan, Syria, the Federal Republic of Yugoslavia (including
Serbia, but not Kosovo or Montenegro), and Afghanistan).
am/are not listed on the Commerce Department's Denied Persons List, the
Commerce Department's Entity List, or the Treasury Department's Lists of
Specially Designated Nationals.
will not export, re-export, or transfer the Subject Product to any
prohibited destination, entity, or individual without the necessary
export license(s) or authorization(s) from the U.S. Government.
will not use or transfer the product for use in any sensitive nuclear,
chemical or biological weapons, or missile technology end-uses unless
authorized by the U.S. Government by regulation or specific license.
understand that countries other than the United States may restrict the
import, use, or export of encryption products, and agree that we shall
be solely responsible for compliance with any such import, use, or
export restrictions and shall indemnify and hold you harmless with
respect to any violations of such restrictions.
understand and agree that if we are in the U.S. and we export or
transfer the Subject Product to eligible end-users, we will, as required
by EAR 740.17(e), submit semi-annual reports to the Commerce
Departments Bureau of Export Administration (BXA).
You may not download any software from this site unless you acknowledge
and agree to the above stipulations.
Privacy Statement for Security
Storm
(www.securitystorm.net)
IP Address
We use your IP address to help diagnose problems with our server, and to
administer our Web site. Your IP address is used to help identify you
and your shopping cart and to gather broad demographic information.
Registration Forms
Our site's registration forms requires users to give us contact
information (like their name and email address) and financial
information (like their account or credit card numbers). The customer's
contact information is used to contact the visitor when necessary. Users
may opt-out of receiving future mailings; see the choice/opt-out section
below. Financial information that is collected is used to bill the user
for products and services. Security Storm does not share its customer
databases with any third party vendors.
Links
This site contains links to other sites. Security Storm is not
responsible for the privacy practices or the content of such Web sites.
Security
This site has security measures in place to protect the loss, misuse and
alteration of the information under our control.
Correct/Update
This site gives users the following options for changing and modifying
information previously provided. You can send email to
webmaster@securitystorm.net
Contacting the Web Site
If you have any questions about this privacy statement, the practices of
this site, or your dealings with this Web site, you can contact:
Webmaster @ Security Storm
SLP, Ltd.
330 Forevergreen Dr. Suite 101
Falling Waters, WV 25419
webmaster@securitystorm.net
|
|