Terms of Service

Last Updated: March 24, 2026

1. Agreement to Terms

These Terms of Service ("Terms") constitute a legally binding agreement between you ("Client," "you," or "your") and 7Stack Solutions ("Company," "we," "us," or "our") governing your access to and use of our managed security services, website, client portals, and related offerings (collectively, the "Services").

By accessing or using our Services, you acknowledge that you have read, understood, and agree to be bound by these Terms. If you are entering into these Terms on behalf of an organization, you represent that you have the authority to bind that organization to these Terms.

If you do not agree to these Terms, you must not access or use our Services.

2. Description of Services

7Stack Solutions provides managed security services including, but not limited to:

2.1 Managed SIEM Services

  • Security Information and Event Management (SIEM) deployment and management
  • Log collection, aggregation, and analysis
  • Custom detection rule development and tuning
  • Security alerting and notification
  • Compliance reporting and audit support

2.2 Endpoint Detection and Response (EDR)

  • Endpoint monitoring and threat detection
  • Malware prevention and remediation
  • Behavioral analysis and anomaly detection
  • Vulnerability assessment and management

2.3 Security Operations Center (SOC) Services

  • 24/7 security monitoring and analysis
  • Incident detection, triage, and response
  • Threat hunting and intelligence
  • Security advisory and consultation

2.4 Service Scope

The specific scope, features, and service levels applicable to your engagement are defined in your Master Service Agreement (MSA) and Statement of Work (SOW). In the event of any conflict between these Terms and your MSA/SOW, the MSA/SOW shall prevail.

3. Client Responsibilities and Obligations

To enable effective delivery of our Services, you agree to:

3.1 Access and Cooperation

  • Provide necessary access to systems, networks, and data sources as required for service delivery
  • Maintain valid credentials and access permissions for our security analysts
  • Respond promptly to security alerts, incident notifications, and information requests
  • Designate authorized contacts for security communications and escalations

3.2 Infrastructure Requirements

  • Maintain compatible systems and infrastructure as specified in service documentation
  • Ensure adequate network connectivity and bandwidth for log transmission
  • Install and maintain required agents, connectors, or software components
  • Notify us of any significant infrastructure changes that may affect service delivery

3.3 Compliance and Legal

  • Ensure you have legal authority to grant us access to systems and data
  • Comply with all applicable laws, regulations, and industry standards
  • Obtain necessary consents for data processing activities
  • Notify us of any legal or regulatory requirements affecting service delivery

4. Service Level Agreement

4.1 Availability

We commit to maintaining 99.9% availability for our core security monitoring services, excluding scheduled maintenance windows and circumstances beyond our reasonable control.

4.2 Response Times

Severity Description Initial Response
Critical Active breach, ransomware, data exfiltration 15 minutes
High Confirmed malware, unauthorized access attempts 30 minutes
Medium Suspicious activity, policy violations 2 hours
Low Informational alerts, minor anomalies 8 hours

4.3 Maintenance

Scheduled maintenance will be performed during designated maintenance windows with advance notice. Emergency maintenance may be performed as needed to address security vulnerabilities or critical issues.

5. Confidentiality

5.1 Confidential Information

Both parties agree to maintain the confidentiality of all non-public information disclosed during the engagement, including but not limited to: security configurations, vulnerability data, incident details, business processes, technical architecture, and proprietary methodologies.

5.2 Protection Obligations

  • Use confidential information solely for the purpose of providing or receiving Services
  • Protect confidential information with at least the same degree of care used to protect own confidential information
  • Limit access to personnel with a need to know
  • Not disclose confidential information to third parties without prior written consent

5.3 Exceptions

Confidentiality obligations do not apply to information that: (a) is or becomes publicly available without breach; (b) was known prior to disclosure; (c) is independently developed; or (d) is required to be disclosed by law.

6. Data Handling and Security

6.1 Data Processing

We will process your data solely as necessary to deliver the Services and in accordance with our Privacy Policy and any applicable Data Processing Agreement (DPA).

6.2 Security Measures

We implement industry-standard security measures to protect your data, including encryption, access controls, monitoring, and regular security assessments. Our security practices are aligned with SOC 2 Type II and ISO 27001 standards.

6.3 Data Ownership

You retain all ownership rights to your data. We acquire no ownership interest in your data through the provision of Services. Upon termination, we will return or securely delete your data as specified in your service agreement.

6.4 Breach Notification

In the event of a security incident affecting your data, we will notify you within 72 hours of becoming aware of the incident and provide information about the nature, scope, and remediation efforts.

7. Intellectual Property

7.1 Company IP

We retain all rights to our proprietary tools, methodologies, detection rules, playbooks, threat intelligence, and other intellectual property developed independently or prior to the engagement. Any improvements or derivatives created during service delivery remain our property.

7.2 Client IP

You retain all rights to your pre-existing intellectual property and any custom configurations, rules, or content created specifically for your environment as specified in your service agreement.

7.3 License Grant

During the term of your engagement, we grant you a limited, non-exclusive, non-transferable license to use our tools and deliverables solely in connection with the Services.

8. Limitation of Liability

8.1 Disclaimer

No security solution can guarantee complete protection against all threats. While we employ industry-leading technologies and methodologies, we cannot guarantee that our Services will detect or prevent all security incidents, breaches, or attacks.

8.2 Liability Cap

To the maximum extent permitted by law, our total liability for any claims arising from or related to these Terms or the Services shall not exceed the fees paid by you during the twelve (12) months preceding the claim.

8.3 Exclusion of Damages

In no event shall either party be liable for any indirect, incidental, special, consequential, or punitive damages, including but not limited to loss of profits, data, business opportunities, or goodwill, regardless of the cause of action or whether such damages were foreseeable.

8.4 Exceptions

These limitations do not apply to: (a) breaches of confidentiality obligations; (b) violations of intellectual property rights; (c) gross negligence or willful misconduct; or (d) indemnification obligations.

9. Indemnification

9.1 Client Indemnification

You agree to indemnify, defend, and hold harmless 7Stack Solutions and its officers, directors, employees, and agents from any claims, damages, losses, or expenses arising from: (a) your breach of these Terms; (b) your violation of applicable laws; (c) your data or content; or (d) your use of the Services in an unauthorized manner.

9.2 Company Indemnification

We agree to indemnify, defend, and hold harmless you from any third-party claims alleging that our Services infringe their intellectual property rights, provided you promptly notify us of such claims and cooperate in the defense.

10. Term and Termination

10.1 Term

These Terms remain in effect for the duration specified in your service agreement. Unless otherwise specified, agreements automatically renew for successive periods unless either party provides written notice of non-renewal at least 30 days prior to the renewal date.

10.2 Termination for Cause

Either party may terminate for cause if the other party materially breaches these Terms and fails to cure such breach within 30 days of written notice.

10.3 Termination for Convenience

Either party may terminate for convenience with 60 days written notice, subject to payment of fees for services rendered through the termination date.

10.4 Effect of Termination

Upon termination: (a) all licenses and access rights cease; (b) outstanding fees become immediately due; (c) each party shall return or destroy confidential information; (d) we will provide transition assistance as specified in your agreement.

11. Dispute Resolution

11.1 Negotiation

The parties agree to attempt to resolve any dispute through good-faith negotiations before initiating formal proceedings.

11.2 Arbitration

Any dispute not resolved through negotiation shall be settled by binding arbitration in accordance with the rules of the American Arbitration Association. The arbitration shall be conducted in English, and the decision shall be final and binding.

11.3 Governing Law

These Terms shall be governed by and construed in accordance with the laws of the State of Delaware, without regard to its conflict of laws provisions.

12. General Provisions

12.1 Entire Agreement

These Terms, together with your MSA, SOW, and any referenced policies, constitute the entire agreement between the parties and supersede all prior agreements relating to the subject matter.

12.2 Amendments

We may modify these Terms by posting updated terms on our website. Material changes will be communicated via email or through our client portal. Continued use of Services after changes constitutes acceptance.

12.3 Severability

If any provision of these Terms is found to be unenforceable, the remaining provisions shall continue in full force and effect.

12.4 Assignment

You may not assign these Terms without our prior written consent. We may assign these Terms in connection with a merger, acquisition, or sale of assets.

12.5 Force Majeure

Neither party shall be liable for delays or failures in performance resulting from circumstances beyond their reasonable control, including natural disasters, war, terrorism, riots, embargoes, acts of government, or failures of third-party infrastructure.

12.6 Notices

All notices must be in writing and sent to the addresses specified in your service agreement. Notices are effective upon receipt.

13. Contact Information

For questions about these Terms of Service, please contact us:

7Stack Solutions

Legal Department

Email: info@7stacksolutions.org