Establishes the terms and conditions for customers of our Security Assurance service.
Last Updated: November 19, 2025
1. Introduction
This Security Assurance Terms and Conditions agreement ("Agreement") establishes the terms governing the security services provided by Ryan Davis LLC, doing business as WebOps ("WebOps", "we", "us", or "our"), to you ("Customer", "you", or "your").
This document operates as a supplement to our General Terms & Conditions, Acceptable Use Policy (AUP), and Privacy Policy. By ordering, accessing, or utilizing our Security Assurance services, you acknowledge that you have carefully read, understood, and agree to be bound unconditionally by these terms. Ordering the service constitutes your legal acceptance.
2. Service Description
The WebOps Security Assurance service is engineered to protect your websites and digital infrastructure from emerging and established security threats. This comprehensive suite of protections works proactively to secure your perimeter and endpoints.
Our service offering integrates multiple layers of defense, including proactive monitoring, automated and manual vulnerability scanning, advanced malware detection and removal, specialized firewall management, and expert security consulting tailored to your specific hosting environment.
3. Scope of Services
The specific features included in your Security Assurance package may vary depending on the specific plan tier you have purchased. Generally, the scope of services includes:
- Vulnerability Assessments: Regular scanning of your applications and infrastructure to identify potential weaknesses before they can be exploited.
- 24/7 Monitoring: Continuous oversight of your network traffic and server health to detect anomalous behavior indicative of a security event.
- Firewall Management: Configuration, maintenance, and optimization of Web Application Firewalls (WAF) to block malicious traffic.
- Malware Operations: Automated detection, quarantine, removal, and future prevention of malicious software payloads.
- Incident Response & Remediation: Expert intervention during active security events to mitigate damage and restore normal operations.
- Security Consulting: Guidance on implementing industry best practices for application architecture and access management.
4. Customer Responsibilities
Security is a shared responsibility. While WebOps implements rigorous protections, the effectiveness of the Security Assurance service relies heavily on the Customer fulfilling the following obligations:
- Information Accuracy: Provide complete and accurate information regarding all digital assets, applications, and network architectures under our protection.
- Implementation of Measures: Promptly implement all mandatory security measures and configurations recommended by the WebOps security team.
- Incident Reporting: Immediately report any suspected security incidents, unauthorized access, or newly discovered vulnerabilities to our team.
- Data Backups: Maintain independent, verified, and up-to-date backups of all critical data and system configurations.
- Software Maintenance: Ensure that all third-party software, content management systems (CMS), plugins, and themes are kept updated to their latest stable and secure versions.
5. Security Incident Response
In the event of a confirmed security breach or active attack, WebOps will initiate our Incident Response protocol. Our primary objective is immediate containment and mitigation of the threat to minimize impact on your operations.
Actions taken may include, but are not limited to: isolating affected systems from the network, removing identified malware, applying emergency security patches, and temporarily suspending compromised accounts to prevent lateral movement. We will work closely and transparently with the Customer throughout the incident lifecycle to securely restore full operations.
6. Limitations of Service
Customer acknowledges that the cybersecurity landscape is constantly evolving, and no system, network, or security protocol can be guaranteed to be 100% immune to compromise.
WebOps cannot and does not guarantee that all potential threats, zero-day vulnerabilities, or sophisticated targeted attacks will be detected or prevented. Furthermore, the overall effectiveness of the Security Assurance service is fundamentally dependent upon the Customer's strict adherence to security best practices and the responsibilities outlined in Section 4 of this Agreement.
7. Service Availability
WebOps strives to provide our Security Assurance monitoring and protection systems on a continuous, 24/7/365 basis. We target maximum uptime for all defensive infrastructure.
However, the service may be temporarily unavailable for emergency maintenance, critical updates, or scheduled infrastructure upgrades. Whenever feasible, WebOps will provide advance notice of scheduled maintenance windows that may impact service availability.
8. Limitation of Liability
To the maximum extent permitted by applicable law, WebOps shall not be liable for any indirect, incidental, special, consequential, or punitive damages, including but not limited to loss of profits, data, use, goodwill, or other intangible losses resulting from security breaches, malware infections, or the failure of the Security Assurance service to prevent an attack.
In no event shall the aggregate liability of WebOps arising out of or related to this Agreement exceed the total amount of service fees paid by the Customer for the Security Assurance service in the twelve (12) months immediately preceding the event giving rise to the claim.
9. Termination
Either party may terminate this Security Assurance service agreement by providing thirty (30) days prior written notice to the other party.
WebOps reserves the right to terminate this service immediately and without prior notice in the event of a material breach of these terms by the Customer, including non-payment of fees or violation of our Acceptable Use Policy. Upon termination, all outstanding fees for services rendered through the effective date of termination shall become immediately due and payable.
10. Governing Law & Jurisdiction
This Agreement shall be governed by, construed, and enforced in accordance with the laws of the State of Delaware, without regard to its conflict of law principles. Any legal action or proceeding arising under this Agreement will be brought exclusively in the federal or state courts located in Delaware, and the parties hereby irrevocably consent to the personal jurisdiction and venue therein.
11. Amendments
WebOps reserves the right to modify, amend, or update these terms at any time to reflect changes in our services, industry standards, or legal requirements. We will notify customers of significant changes via email or through an announcement in the customer portal.
Your continued use of the Security Assurance service after any such modifications have been published constitutes your binding acceptance of the updated terms.
12. Contact Information
If you have any questions regarding these Security Assurance Terms & Conditions, need to report a security incident, or require legal clarification, please contact us through the appropriate channels:
Email Departments
- Support: support@webops.host
- Abuse/Security: abuse@webops.host
- Legal: legal@webops.host
Phone
Effective Date: November 9, 2025