Cynetix LLC
Cyber Intelligence & Network Defense
contact@cynetix.io
Company Name:
Address:
Billing Contact:
Cynetix shall provide cybersecurity services including, but not limited to, network penetration testing, web application security testing, mobile application security assessments, red team operations, cloud security assessments, and social engineering simulations, as specified in each SOW. Each SOW shall be incorporated into and governed by this Agreement.
Each engagement shall be defined in a separate SOW executed by authorized representatives of both parties. In the event of a conflict between this Agreement and any SOW, the SOW shall control with respect to the specific engagement, unless expressly stated otherwise.
Any changes to the scope of an active engagement must be agreed to in writing by both parties via a signed Change Order before Cynetix is obligated to perform such additional work.
Client agrees to:
Fees for each engagement shall be set forth in the applicable SOW. All fees are stated in United States Dollars (USD) and are exclusive of applicable taxes.
Unless otherwise specified in the SOW, payment terms are as follows:
Invoices not paid within thirty (30) days of the due date shall accrue interest at the rate of 1.5% per month (or the maximum rate permitted by applicable law, whichever is less). Cynetix reserves the right to suspend services for accounts more than fifteen (15) days past due.
Unless included in the SOW fee, reasonable and pre-approved out-of-pocket expenses (travel, lodging, per diem) shall be reimbursed by Client within thirty (30) days of invoice.
If Client cancels or postpones a confirmed engagement with fewer than ten (10) business days' notice, the Kickoff Payment is non-refundable. If cancellation occurs after testing has commenced, Client shall pay for all work performed to date at Cynetix's standard hourly rates.
Each party agrees to maintain the confidentiality of the other party's Confidential Information as defined in any executed Non-Disclosure Agreement between the parties, or, in the absence of such an agreement, as defined herein. "Confidential Information" includes all non-public information relating to either party's business, technology, security posture, vulnerabilities, and engagement findings. Cynetix shall not disclose Client's vulnerabilities or assessment results to any third party without Client's prior written consent. Confidentiality obligations shall survive termination of this Agreement for five (5) years.
All Client data, systems, and infrastructure information remain the sole property of Client. Cynetix acquires no ownership rights in Client data by virtue of this Agreement.
Upon receipt of full payment, Cynetix grants Client a non-exclusive, perpetual license to use the written reports and deliverables produced for Client under this Agreement for Client's internal security purposes.
All tools, scripts, methodologies, frameworks, and know-how developed or used by Cynetix remain the sole and exclusive property of Cynetix, regardless of whether they were used or referenced in the delivery of services to Client. Nothing in this Agreement transfers ownership of Cynetix's pre-existing or independently developed intellectual property.
Cynetix represents and warrants that: (a) it has the authority to enter into this Agreement; (b) services will be performed by qualified personnel in a professional manner consistent with industry standards; and (c) Cynetix will comply with all applicable laws in the performance of services.
Client represents and warrants that: (a) it has the authority to enter into this Agreement; (b) it owns or has obtained all necessary authorizations for all systems included in any SOW; (c) engaging Cynetix does not violate any applicable law or third-party agreement; and (d) the information provided to Cynetix regarding in-scope systems is accurate and complete.
EXCEPT AS EXPRESSLY SET FORTH HEREIN, CYNETIX PROVIDES ALL SERVICES "AS IS" AND DISCLAIMS ALL OTHER WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT. CYNETIX DOES NOT WARRANT THAT TESTING WILL IDENTIFY ALL VULNERABILITIES OR THAT CLIENT'S SYSTEMS WILL BE SECURE FOLLOWING REMEDIATION.
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW:
Client shall indemnify, defend, and hold harmless Cynetix and its officers, employees, agents, and contractors from and against any claims, damages, liabilities, costs, and expenses (including reasonable attorneys' fees) arising out of or related to: (a) Client's breach of this Agreement; (b) Client's failure to obtain necessary third-party authorizations; (c) Client's gross negligence or willful misconduct; or (d) any claim by a third party arising from Client's use of the deliverables in a manner inconsistent with this Agreement.
This Agreement commences on the Effective Date and continues for a period of one (1) year, automatically renewing for successive one-year terms unless either party provides sixty (60) days' written notice of non-renewal.
Either party may terminate this Agreement or any SOW immediately upon written notice if the other party: (a) materially breaches this Agreement and fails to cure such breach within fifteen (15) days of written notice; (b) becomes insolvent or makes an assignment for the benefit of creditors; or (c) violates any applicable law in connection with this Agreement.
Upon termination, Cynetix shall cease all testing activities. Client shall pay for all services rendered up to the date of termination. Sections 4, 5, 7, 8, 10, and 11 shall survive any termination or expiration of this Agreement.
The parties acknowledge that penetration testing involves simulated cyberattack activities that would otherwise be unlawful without proper authorization. Client expressly authorizes Cynetix to conduct all activities described in each SOW and Rules of Engagement solely against the systems identified therein, and represents that all such systems are owned by or under the lawful control of Client. Cynetix shall conduct all services in compliance with applicable computer fraud and abuse laws, including but not limited to the Computer Fraud and Abuse Act (18 U.S.C. § 1030) and applicable state laws.
By signing below, each party agrees to be bound by the terms of this Master Service Agreement.