Laserfiche WebLink
replacement Hardware, the replacement Hardware will be <br />warranted in accordance with the provisions of this <br />Agreement for the remainder of the original warranty period <br />or thirty (30) days, whichever is longer. Outside the United <br />States, neither these remedies nor any product support <br />services offered by Company are available without proof of <br />purchase from an authorized non -U.S. source. <br />7.2 TO THE MAXIMUM EXTENT PERMITTED BY LAW, IN NO <br />EVENT WILL COMPANY BE LIABLE FOR ANY CONSEQUENTIAL, <br />INDIRECT, EXEMPLARY, PUNITIVE, SPECIAL, OR INCIDENTAL <br />DAMAGES, INCLUDING BUT NOT LIMITED TO, ANY LOST DATA <br />AND LOST PROFITS, ARISING FROM OR RELATING TO THIS <br />AGREEMENT, THE SERVICES PROVIDED OR CONTEMPLATED <br />HEREUNDER, AND THE HARDWARE AND RELATED <br />DOCUMENTATION. COMPANY'S TOTAL CUMULATIVE LIABILITY <br />IN CONNECTION WITH THIS AGREEMENT, THE SERVICES <br />PROVIDED OR CONTEMPLATED HEREUNDER, AND THE <br />HARDWARE AND RELATED DOCUMENTATION, WHETHER IN <br />CONTRACT OR TORT OR OTHERWISE, WILL NOT EXCEED THE <br />AMOUNT OF FEES ACTUALLY PAID TO COMPANY HEREUNDER <br />IN THE TWELVE- (12 -) MONTH PERIOD IMMEDIATELY <br />PRECEDING THE ACTION THAT GAVE RISE TO THE CLAIM. <br />CUSTOMER ACKNOWLEDGES THAT THE FEES REFLECT THE <br />ALLOCATION OF RISK SET FORTH IN THIS AGREEMENT AND <br />THAT COMPANY WOULD NOT ENTER INTO THIS AGREEMENT <br />WITHOUTTHESE LIMITATIONS ON ITS LIABILITY. <br />8. Indemnification (See Section 7 —Santa Ana Agreement) <br />9. Network Security Disclaimer <br />9.1 Internet Security. <br />Company's products may include software that connects to <br />the Internet. The software is designed to operate within <br />Customer's secure network environment, and the software <br />does not provide any mechanism for security or privacy. <br />Specifically, the software relies fully on the Customer's <br />security measures and implements no further security <br />infrastructure. Company makes no representations or <br />warranties to Customer regarding (i) the security or privacy of <br />Customer's network environment; or (ii) any third -party <br />technologies' or services' ability to meet Customer's security <br />or privacy needs. These third -party technologies and services <br />may include, but are not limited to, operating systems, <br />database management systems, web servers, and payment <br />processing services. Customer is solely responsible for <br />ensuring a secure network environment. <br />9.2 Remote Access Security. <br />In order to enable code development, and Customer support <br />and maintenance of the software (if purchased by Customer <br />pursuant to a separate support and maintenance agreement), <br />Company requires remote access capability. Remote access is <br />normally provided by installing PC- Anywhere, ControllT, or <br />other industry standard remote access software. It may also <br />be provided through a Customer solution such as VPN access. <br />Regardless of what method is used to provide remote access, <br />or which party provides remote access software, it is <br />Customer's responsibility to ensure that the remote access <br />method meets Customer's security requirements. Company <br />makes no representations or warranties to Customer <br />regarding the remote access software's ability to meet <br />Customer's security or privacy needs. Company also makes no <br />recommendation for any specific package or approach with <br />regard to security. Customer is solely responsible for ensuring <br />a secure network environment. <br />9.3 Outbound Services Disclaimer. <br />Outbound services are intended to create additional methods <br />of communication to Customer's employees who use the <br />Software in support of existing processes. These services are <br />not intended to replace all interaction with Customer's <br />employees or become critical path. While the outbound <br />services have been created with the best available tools and <br />practices, they are dependent on infrastructure that is <br />inherently not fail - proof, including but not limited to <br />infrastructure such as software, computer hardware, network <br />services, telephone services, and e-mail. Examples of <br />situations that could cause failure include but are not limited <br />to: down phone lines, all lines busy, equipment failure, email <br />address changes, internet service disruptions. For this reason, <br />while outbound services are valuable in providing enhanced <br />communication, they are specifically not designed to be used <br />as the sole method to deliver critical messages. Customer <br />acknowledges that it is aware of the potential hazards <br />associated with relying on an automated outbound service <br />feature, when using the Software, and Customer <br />acknowledges and agrees that it is giving up in advance any <br />right to sue or make any claim against Company, and that <br />Customer forever releases Company from any and all liability, <br />if Customer, or Customer's employees, suffer injury or damage <br />due to the failure of outbound services to operate, even <br />though Customer does not know what or how extensive those <br />injuries or damages might be. <br />10. Term and Termination. <br />10.1 Term. <br />This Agreement shall commence on the date of last signature <br />below and shall continue until terminated (the "Term "), <br />10.2 Termination. <br />(a) Either party may terminate this Agreement at any time that <br />there is no uncompleted Project in effect upon fifteen (15) days' <br />prior written notice to other party. Upon such termination by <br />either party, all amounts owed to Company shall become <br />immediately due and payable. <br />(b) The parties agree that Customer's failure to pay any <br />undisputed Fees is a material breach of this Agreement. In the <br />event of Customer's failure to pay or other material breach of <br />this Agreement, Company may immediately terminate this <br />Agreement, the Software License Agreement, and any other <br />agreements between the parties, for cause, provided that <br />Customer has failed to cure the breach within sixty (60) days' of <br />