Terms of Use for RockSec360 Managed Services 

RockSec Limited ("Company")

By registering for the RockSec360 cyber security and IT managed services (the "Services"), which include but are not limited to endpoint protection, security monitoring, security awareness training, phishing simulation, IT support services, cybersecurity consultancy, and managed data backup services, you agree to be bound by these Terms of Use (the "Agreement") in its entirety and without reservation. As such, this Agreement constitutes a binding legal document between you and the Company.

 

Glossary of Terms

  • Application – The software or web-based portal through which the RockSec Stack360 Services are accessed.
  • Client – The business or individual that has entered into an agreement with RockSec360 to receive the Services.
  • Company – Refers to RockSec Limited.
  • Consultancy Services – Professional services delivered by the Company, including but not limited to audits, assessments, compliance guidance, and support for certifications such as Cyber Essentials, Cyber Essentials Plus, and ISO 27001.
  • Device – The endpoint hardware or system on which the Application or Software is installed or accessed.
  • IT Support Services – Technical assistance provided to manage, troubleshoot, and maintain Client IT systems and devices.
  • Managed Data Backup Services – Services provided by the Company to back up and, where required, restore data on the Client’s systems and devices, as defined in the Client’s service plan.
  • Phishing Simulation – A cybersecurity exercise where fake phishing emails are sent to users to assess their awareness and response.
  • Security Awareness Training – Educational training delivered to end users to improve their knowledge of cybersecurity risks and good practices.
  • Services – The suite of cybersecurity and managed services provided by RockSec360, including endpoint protection, phishing simulation, IT support, awareness training, consultancy services, and data backup services.
  • Software – The digital tools, scripts, or applications used to deliver the Services.
  • Subcontractor – A third-party individual or business engaged by RockSec360 to deliver part of the Services under its direction and responsibility.

 

 

Acceptance of Terms and Conditions

  1. If you do not agree to any of the provisions of this Agreement you should immediately stop using the Company’s Application ("Software") and remove the Software from your Device.
  2. The Company may amend, modify, or update this Agreement at any time. Any updated version will be published on the Company website and become effective immediately upon posting. Continued use of the Services constitutes acceptance of any updated terms.

 

Scope of Right of Use and Intellectual Property

  1. The Company grants you a limited, revocable, non-exclusive, non-transferable, and non-sub-licensable right to use the Software solely in accordance with this Agreement.
  2. You may not reverse engineer, modify, copy, distribute, resell, or attempt to access the source code of the Software.
  3. All trademarks, content, and IP used in the Services remain the sole property of the Company or its licensors.

 

Your Representations and Undertakings

  1. You consent to the Company's data collection practices as outlined in the Privacy Policy.
  2. You agree to use the Services lawfully and in accordance with this Agreement.
  3. You are responsible for your own telecommunications, Internet access, and infrastructure.
  4. You will not expose the Company to harm, viruses, or abusive content.
  5. You must not misuse electronic communications functionality.
  6. Only authorised installations or upgrades by RockSec360 personnel are permitted.
  7. Phishing simulations and awareness training may form part of the Services. The Company disclaims liability arising from your internal HR or user disciplinary actions in response.
  8. IT support is provided on a best-effort basis. If managed data backup is not explicitly contracted, the Client remains responsible for data security.
  9. Where backup services are contracted, the Company will execute according to the agreed backup schedule and policy but is not responsible for data loss outside of this scope.
  10. The Client is responsible for maintaining accurate contact data and securing internal employee consents where required.
  11. Subcontractors may be used to deliver Services. RockSec360 ensures subcontractors follow equivalent confidentiality and data protection standards.
  12. Consultancy services are advisory and do not guarantee certification results. The Client remains responsible for submitting and passing external assessments.

 

Technical Support

  • Support is provided via email (success@rocksec360.com) under the scope of your service agreement.
  • Issues should be reported promptly with full context to ensure effective resolution.

 

Push Updates

  • RockSec360 may update, patch, or improve the Software without notice at any time.

 

Limitations of Liability

  • The Company is not liable for indirect, incidental, special, or consequential damages (including data loss, lost revenue, or system downtime).
  • Liability is capped at the total fees paid by the Client in the prior twelve (12) months.
  • The Company disclaims responsibility for the failure of third-party systems, subcontractor acts outside our control, or Client misuse of software, training, IT support, consultancy, or data backup services.
  • Force Majeure applies: Neither party is liable for non-performance due to events outside their reasonable control (e.g., natural disasters, war, pandemics, etc.).

 

Indemnification

The Client agrees to indemnify, defend, and hold harmless the Company and its employees, affiliates, and contractors from all claims, losses, and liabilities arising from:

  • Breach of this Agreement
  • Misuse of the Services
  • Violation of applicable law
  • Unauthorised actions or negligence related to use of the Software, IT support, or consultancy

 

Fees

  1. Fees are set out in the sales order form or published pricing and are payable in advance.
  2. All fees are non-refundable and exclude applicable taxes.
  3. Payment methods may include card, bank transfer, or as otherwise agreed.
  4. The Company may revise pricing with 14 days’ notice. Continued use constitutes acceptance.

 

Duration and Termination

  1. This Agreement begins at onboarding and renews monthly unless terminated.
  2. Either party may terminate by giving written notice before the end of a term.
  3. The Company may suspend or terminate the Services at its discretion. Upon termination, the Client must cease all use and delete the Software.

 

Governing Law

  • This Agreement is governed by the laws of England and Wales.
  • All disputes shall be resolved exclusively in the courts of England and Wales.

 

Compliance Disclaimer

The Services are designed to enhance your cybersecurity posture but do not constitute legal or compliance advice. The Client is solely responsible for maintaining compliance with GDPR, Cyber Essentials, ISO 27001, or any other regulation.

 

General

  1. If any provision is deemed invalid, it shall not affect the enforceability of the remainder.
  2. No waiver of any provision shall be construed as a waiver of any other provision or right.
  3. This Agreement does not create any third-party beneficiary rights.
  4. No agency, partnership, or joint venture relationship is created.
  5. RockSec360 may reference your logo or name in marketing unless otherwise agreed.
  6. This Agreement constitutes the entire agreement between the parties.
  7. The Company may assign the Agreement during a merger, acquisition, or restructuring.
  8. The Client may not assign or transfer their obligations without prior written consent.

 

End of Terms of Use 

Last revision date: May 2025