Cloudscale Technology Logo Cloudscale Technology

Terms of Use

Please read these Terms of Use carefully before accessing or using Cloudscale Technology's IT services, website, and managed security solutions.

Last Updated: January 31, 2026
Table of Contents
  • Acceptance of Terms
  • Definitions
  • Description of Services
  • User Accounts
  • Acceptable Use Policy
  • Intellectual Property
  • Confidentiality
  • Limitation of Liability
  • Indemnification
  • Termination
  • Governing Law
  • Contact Information

Acceptance of Terms

By accessing or using the services provided by Cloudscale Technology ("Company," "we," "us," or "our"), you ("Client," "you," or "your") agree to be bound by these Terms of Use ("Terms"). If you do not agree to all the terms and conditions of this agreement, you may not access the website or use any services.

We reserve the right to modify these Terms at any time. We will notify you of significant changes by posting the new Terms on this page and updating the "Last Updated" date. Your continued use of the services after any such changes constitutes your acceptance of the new Terms.

Important: These Terms constitute a legally binding agreement between you and Cloudscale Technology regarding your use of our IT infrastructure, cybersecurity, data backup, and managed services.

Definitions

For the purposes of these Terms:

"Services"

Refers to all IT solutions provided by Cloudscale Technology, including but not limited to cybersecurity monitoring, firewall management, data backup and recovery, vulnerability assessment, security audits, compliance management, and IT infrastructure support.

"Client Data"

Means all data, files, software, information, or content provided by you or on your behalf for storage, processing, or management through our Services.

"Service Level Agreement (SLA)"

Refers to the specific performance standards, uptime guarantees, and support response times agreed upon in your service contract.

"Confidential Information"

Includes all non-public, proprietary, or sensitive information disclosed by either party, including but not limited to security configurations, network architectures, and business data.

Description of Services

Cloudscale Technology provides comprehensive IT and cybersecurity services designed to protect and optimize your business technology infrastructure. Our services include:

  • Managed Security Services: 24/7 monitoring, threat detection, incident response, and firewall management
  • Data Protection: Automated backup solutions, disaster recovery planning, and data replication
  • Compliance & Audit: Regulatory compliance assessments (HIPAA, PCI-DSS, SOC 2), security audits, and risk evaluations
  • Infrastructure Support: Network management, system administration, and cloud infrastructure maintenance
  • Consulting Services: Security architecture design, IT strategy, and vulnerability remediation

Service Availability

We strive to maintain 99.9% uptime for critical services as specified in your individual SLA. Scheduled maintenance windows will be communicated at least 48 hours in advance. Emergency maintenance may be required for critical security patches and will be communicated as soon as practicable.

Third-Party Services

We may utilize third-party vendors and service providers to deliver certain components of our services. We maintain strict vetting processes and contractual obligations to ensure these providers meet our security and privacy standards.

User Accounts

To access certain features of our services, you may be required to create an account. You are responsible for:

  • Maintaining the confidentiality of your account credentials
  • All activities that occur under your account
  • Notifying us immediately of any unauthorized use or security breach
  • Ensuring all account information is accurate and up-to-date

We reserve the right to terminate accounts, remove content, or cancel services at our sole discretion if we suspect fraudulent, abusive, or illegal activity.

Acceptable Use Policy

You agree not to use our services for any purpose that is illegal or prohibited by these Terms. Specifically, you may not:

  • Attempt to gain unauthorized access to any portion of our systems or networks
  • Use our services to transmit malware, viruses, or malicious code
  • Engage in activities that interfere with or disrupt the integrity or performance of our services
  • Attempt to probe, scan, or test the vulnerability of our security systems
  • Use our services to store or process data that violates any applicable laws or regulations
  • Reverse engineer, decompile, or disassemble any software provided as part of our services
  • Use our infrastructure for cryptocurrency mining without explicit written permission

Security Responsibilities

While we provide robust security measures, you are responsible for maintaining appropriate internal security practices, including user access management, endpoint protection, and security awareness training for your employees.

Intellectual Property

All content, software, documentation, and materials provided by Cloudscale Technology remain the exclusive property of the Company or its licensors and are protected by intellectual property laws.

You retain all rights to your Client Data. By using our services, you grant us a limited license to access, process, and store your data solely for the purpose of providing and improving our services.

Any custom software, configurations, or documentation developed specifically for your environment remains your property upon full payment, unless otherwise specified in your service agreement.

Confidentiality & Data Protection

Both parties agree to protect each other's Confidential Information using commercially reasonable efforts and not less than the same degree of care used to protect their own sensitive information.

As a provider of cybersecurity services, we adhere to strict confidentiality standards. Our personnel are bound by non-disclosure agreements, and we implement technical safeguards to prevent unauthorized access to your data.

Data Handling

  • All Client Data is encrypted at rest using AES-256 and in transit using TLS 1.3
  • Access to production systems requires multi-factor authentication
  • We maintain comprehensive audit logs of all data access
  • Upon termination of services, we will return or securely destroy your data per your instructions

Limitation of Liability

To the fullest extent permitted by applicable law, Cloudscale Technology shall not be liable for any indirect, incidental, special, consequential, or punitive damages, including lost profits, data loss, or business interruption, arising out of or relating to your use of our services.

Our total liability for any claim arising from these Terms or your use of the services shall not exceed the amount you paid us for the service giving rise to the liability in the twelve (12) months preceding the claim.

Security Limitations: While we employ industry-best security practices, no system is completely immune to cyber threats. We cannot guarantee absolute prevention of all security incidents, including zero-day exploits or advanced persistent threats.

Force Majeure

Neither party shall be liable for any failure or delay in performance due to circumstances beyond reasonable control, including acts of God, natural disasters, cyberattacks by state-sponsored actors, or infrastructure failures of third-party utilities.

Indemnification

You agree to indemnify, defend, and hold harmless Cloudscale Technology, its officers, directors, employees, and agents from and against any claims, liabilities, damages, losses, and expenses (including reasonable attorneys' fees) arising out of or in any way connected with:

  • Your access to or use of the services
  • Your violation of these Terms
  • Your violation of any third-party right, including intellectual property or privacy rights
  • Any content or data you submit or transmit through our services

Termination

Either party may terminate the service agreement with thirty (30) days written notice. We may terminate services immediately if you breach these Terms or engage in illegal activities using our infrastructure.

Effect of Termination

Upon termination:

  • Your right to use the services will immediately cease
  • We will provide data export assistance for thirty (30) days following termination
  • All provisions of these Terms which by their nature should survive termination shall survive
  • You remain liable for all charges incurred prior to termination

Data Return and Deletion

During the transition period following termination, we will work with you to return your data in a standard format. After this period, we may securely delete all copies of your data from our active systems in accordance with our data retention policies.

Governing Law and Dispute Resolution

These Terms shall be governed by and construed in accordance with the laws of the State of California, without regard to its conflict of law principles.

Any dispute arising from these Terms shall first be addressed through good faith negotiation. If unresolved within thirty (30) days, disputes shall be submitted to binding arbitration in San Francisco, California, in accordance with the rules of the American Arbitration Association.

Notwithstanding the above, either party may seek injunctive relief in a court of competent jurisdiction for breaches of confidentiality or intellectual property rights.

Contact Information

If you have any questions about these Terms of Use, wish to report a violation, or need to contact us for any legal matter, please reach out to us:

Cloudscale Technology
Legal Department
Email: sales@cloudscaletechnology.com
Phone: +1 (925)-215-5445
Address: 2426 Second St, STE #1 Livermore, CA 94550

For general inquiries or support requests, please use our standard support channels. For legal notices requiring physical delivery, certified mail to the address above is required.

We aim to respond to all legal inquiries within five (5) business days.