Laserfiche WebLink
b. Generally. EXCEPT AS OTHERWISE EXPRESSLY SET <br />FORTH IN THIS AGREEMENT, TO THE MAXIMUM EXTENT <br />PERMITTED BY APPLICABLE LEGAL REQUIREMENTS, NEITHER <br />PARTY: (1) WILL BE LIABLE TO THE OTHER PARTY OR ANY <br />THIRD PARTY FOR ANY LOSS ATTRIBUTABLE TO ANY ACT, <br />OMISSION OR MISREPRESENTATION BY SAID OTHER PARTY, <br />ITS DIRECTORS, EMPLOYEES OR AGENTS; AND (2) WILL BE <br />LIABLE TO THE OTHER, WHETHER A CLAIM BE IN TORT, <br />CONTRACT OR OTHERWISE, FOR ANY SPECIAL, <br />CONSEQUENTIAL, PUNITIVE, INDIRECT, LOST PROFIT, <br />BUSINESS INTERRUPTION, LOSS OF DATA OR SIMILAR <br />DAMAGES RELATING TO OR ARISING FROM THE SERVICES <br />PROVIDED UNDER THIS AGREEMENT, REGARDLESS OF <br />WHETHER SUCH PARTY RECEIVES NOTICE OF THE POTENTIAL <br />FOR SUCH DAMAGES. THIS AGREEMENT ALLOCATES RISKS <br />BETWEEN PROVIDER AND CLIENT, AND PROVIDER'S PRICING <br />REFLECTS THIS ALLOCATION OF RISK AND THE LIMITATION <br />OF LIABILITY SPECIFIED IN THIS SECTION. <br />(9) Client's Consent to Network Intrusion and Waiver of <br />Claims. <br />a. Some of the techniques Provider will employ in providing <br />the Services would constitute improper and unauthorized access, <br />absent the consent thereto given by Client to Provider herein. <br />Accordingly, on the condition that Provider performs the <br />Services in accordance with the terms of this Agreement <br />(including the provisions of Section 6.b hereof), Client provides <br />its consent to Provider's employment of such invasive and/or <br />intrusive techniques as being part of the Services to be <br />performed at Client's request pursuant to this Agreement. <br />b. Client acknowledges that, notwithstanding Provider's <br />performance of the Services in accordance with the terms of this <br />Agreement (including the provisions of Section 6.b hereof), <br />Provider may inadvertently cause damage to Client's System or <br />data, including causing Client's System to suffer degraded <br />performance or responsiveness. art ryg r tSxPg),pltfaSl I�l�..l�sig,! <br />lvd,lrim tjAti�IT watlp:....,tht d, rlli .-aL t <br />1ling t7c„Incrft,arn,unp��ndarlas td�a�It <br />l gcs rl _rtl ti a xc�Iitlivag any QClion (If tv.Y <br />dcseriq� Rn Scctip_n Tir 1 rgp,,(, Client agrees to waive any and <br />all claims against Provider and Provider's Related Parties for <br />any such damage, including damage that may be caused by <br />Provider actually gaining access to such System. <br />C. Client's conditional consent to Provider's actions and <br />conditional waiver of claims are based on Client's understanding <br />of its own System as well as its understanding of the Services to <br />be provided pursuant to this Agreement. Client further warrants <br />and represents that it has had the opportunity to question <br />Provider regarding the Services and the techniques involved in <br />implementing the Services, and therefore agrees that its <br />conditional consent and waiver constitute an informed <br />conditional consent and waiver. <br />d. Notwithstanding any provision of this Article 9 to the <br />contrary, Provider remains obligated to indemnify Client <br />and its Related Parties from and against Losses pursuant to <br />the provisions of Section 7.a of this Agreement. <br />(10) Dispute Resolution & Escalation Policy. The Parties agree to <br />seek to resolve any and all claims, controversies and disputes between <br />them arising out of or related to this Agreement in accordance with the <br />procedures set forth in this Section 10. <br />a. Designation of Dispute. A Party (the "Complaining <br />Party") that believes that the other (the "Responding Party") is in <br />breach of this Agreement in any particular, will deliver written <br />notification to the Responding Party, setting forth in reasonable <br />detail the breach for which the Complaining Party seeks redress, <br />along with a specific request for relief. The Responding Party <br />will have fifteen (15) business days from receipt to provide a <br />written reply. The reply will contain a response to the <br />allegations contained in the notice or any agreement to provide <br />the relief requested. Upon receipt of the reply, the Complaining <br />Party will provide written notice to the Responding Party either <br />that the dispute has been resolved satisfactorily or that the <br />Complaining Party is invoking the escalation procedure set forth <br />in Section 10.b. <br />b. Escalation Procedure. In the event that the Parties are <br />unable to resolve a dispute in the manner described in Section <br />10.a, each Party agrees to designate a single representative to <br />attempt to resolve the dispute. Each Party's representative will <br />be a senior executive who will have all necessary authority to <br />commit the Party contractually and to resolve the dispute. The <br />designated representative will meet for a period of time <br />reasonably necessary to resolve the dispute, at a location to be <br />mutually agreed upon by the Parties, in an effort to resolve the <br />dispute. <br />C. Arbitration. In the event the Parties are unable to resolve <br />the dispute pursuant to the foregoing, either Party may submit <br />the dispute to binding arbitration under the rules of the American <br />Arbitration Association ("AAA") upon written notice to the <br />other Party. Any such arbitration shall be held in a location <br />mutually agreed to by the Parties, before a single arbitrator <br />agreed to by the Parties. In the event the Parties cannot agree on <br />a single arbitrator, each shall choose an arbitrator and the two <br />arbitrators shall choose an arbitrator to arbitrate the dispute. The <br />arbitrator shall award the prevailing Party with its attorney's fees <br />and costs of arbitration. The arbitrator's decision may be <br />enforced in any court of competent jurisdiction. <br />(11) Confidential Information. Each Party acknowledges that it and <br />its employees or agents may, in the course of the Agreement, be <br />exposed to or acquire information that is proprietary or confidential to <br />the other Party. <br />"Confidential Information" includes: (a) any information relating to a <br />Parry's research, development, trade secrets, processes, procedures, <br />formulas, business practices, business plans, strategies, budgets, client <br />and vendor relationships, personnel data, financial information and <br />other similar business information of a confidential nature; (b) other <br />proprietary information, results of remote assessments, technical <br />guides, technical data or know-how, including, but not limited to, that <br />which relates to Client's hardware, software, screens, specifications, <br />designs, plans, drawings, data, prototypes, discoveries, security <br />policies, passwords, access codes and the like, router, firewall and <br />other such equipment's configuration information, filtering <br />configurations, or any other information directly relating to the <br />integrity or security of the Client network or computer systems; and <br />(c) the methods, systems, data and materials used or provided by <br />Provider in the performance of Services pursuant to this Agreement. <br />Provider acknowledges and agrees that the presence, nature and extent <br />of any security vulnerabilities and other information that Provider <br />discovers regarding Client's information systems and networks during <br />the course of this engagement is Confidential Information of Client. <br />The term "Confidential Information" does not include information that <br />is: (a) known to the receiving Party prior to disclosure by the <br />disclosing Party or its personnel; (b) publicly available through no act <br />or omission of the receiving Party; (c) lawfully received by the <br />receiving Party from a third party (other than the disclosing Party's <br />former or current personnel) that is not under any confidentiality <br />obligation to the disclosing Party; or (d) comprised of statistical <br />information, or other aggregated information regarding security <br />vulnerabilities, security configurations and the like insofar as such <br />information does not identify Client or Client's computer network or <br />computer systems. <br />Except as otherwise expressly set forth herein, each Party will use <br />Confidential Information of the other Party which is disclosed to it <br />only for the purposes of this Agreement and will not disclose such <br />Confidential Information to any third party without the disclosing <br />Party's prior written consent. Each Party may disclose to its employees <br />the other Party's Confidential Information on a need -to -know basis in <br />connection with this engagement. Each Party agrees to take measures <br />to protect the confidentiality of the other Party's Confidential <br />Information that, in the aggregate, are no less protective than those <br />measures it uses to protect the confidentiality of its own Confidential <br />, "-il <br />Attacks are inevitable. Defense is imperative. Page 3 of 5 <br />n I <br />Initialss <br />