Nucleus Cyber, INC.
Terms and Conditions
“Authorized Users” means Customer’s employees and authorized independent contractors for whom Customer has purchased a license to use Customer’s subscription to the Nucleus Cyber NC Protect software, the number of which is as set forth in the Order Form.
“Customer Data” means any data or information resulting from Customer’s use of the NC Protect Software.
“Documentation” means NC Protect Software user manuals, handbooks and installation guides, if any, relating to the NC Protect Software made available by Nucleus Cyber or its authorized representatives to Customer.
“Effective Date” means the date the Order from the Customer is accepted by Nucleus Cyber or such other date as stated in the Order Form.
“Error” means a reproducible failure of the Nucleus Cyber Software to materially perform in accordance with the Documentation.
“Major Improvements” means material feature changes or improvements that Nucleus Cyber offers its customers for additional fees.
“NC Protect Software” means Nucleus Cyber’s advanced information protection software licensed in accordance with Section 1.1 of this Agreement, as ordered by Customer pursuant to the Order Form.
‘Order Form” means the order accepted by Nucleus Cyber from the Customer for the right to use the NC Protect Software and Documentation on the terms and conditions of this Agreement.
“Subscription Period” means the period as stated in the Order Form unless terminated earlier in accordance with this Agreement.
“Usage Data” means usage data and statistics related to the NC Protect Software.
1. NC PROTECT SOFTWARE
1.1. License. Subject to the terms and conditions of this Agreement, including the payment by Customer of all fees pursuant the Order Form and Section 5 hereof, Nucleus Cyber hereby grants to Customer a limited, revocable, non-exclusive, non-sublicensable, non-transferable (except as provided in Section 11.12) license during the Subscription Period to use the NC Protect Software in connection with a subscription as designated on the Order Form, solely for its internal business purposes, and to use and make a reasonable number of copies of the Documentation solely for its internal business purposes in connection with Customer’s use of the NC Protect Software. As directed by Customer, Nucleus Cyber shall (a) deliver the NC Protect Software electronically, on tangible media, or by other means on a date agreed to by the Parties, for Customer to install the NC Protect Software into its infrastructure, or (b) install the NC Protect Software into Customer’s account in Microsoft Azure.
1.2. Restrictions on Usage. Customer shall not use the NC Protect Software or Documentation for any purposes beyond the scope of the license granted in this Agreement. Without limiting the foregoing and except as otherwise expressly set forth in this Agreement, Customer shall not, and shall not permit any Authorized User or other party to, (a) reverse engineer, disassemble, or decompile any component of the NC Protect Software; (b) rent, lease, lend, sell, sublicense or otherwise distribute any Customer rights under this Agreement (except as expressly authorized hereunder) or otherwise use the NC Protect Software for or to operate a service bureau, application service provider service, or any software-as-a-service offering in any way related to this Agreement; (c) modify, copy or make derivative works based on any part of the NC Protect Software or Documentation; (d) use the NC Protect Software to build a competitive offering; (e) remove any proprietary notices from the NC Protect Software or Documentation; or (f) use the NC Protect Software in any manner or for any purpose that infringes, misappropriates, or otherwise violates any intellectual property right or other right of any person, or that violates any applicable law.
1.3. Open-Source Software. Certain software code incorporated into or distributed with the NC Protect Software may be licensed by third parties under various “open-source” or “public-source” software licenses (such as the GNU General Public License, the GNU Lesser General Public License, the Apache License, the Berkeley Software Distribution License, and the Sun Public License) (collectively, the “Open Source Software”). Notwithstanding anything to the contrary in this Agreement, the Open Source Software is not licensed under Section 1.1, and instead is separately licensed pursuant to the terms and conditions of their respective open-source software licenses. Customer agrees to comply with the terms and conditions of such open-source software license agreements.
1.4. Customer Data. Customer shall own all Customer Data. Customer may choose to log its Customer Data in its sole discretion. Nucleus Cyber will not collect or store Customer Data, other than Usage Data. Customer hereby grants to Nucleus Cyber a royalty-free, non-exclusive license, with the right to sublicense to its affiliates, to use the Usage Data related to Customer’s use of the NC Protect Software, in aggregate and anonymous format only, for any business or commercial purpose, including statistical analysis with respect to usage and traffic patterns, improving the NC Protect Software, in connection with the further development of the NC Protect Software, or for marketing purposes. NUCLEUS CYBER HAS NO LIABILITY UNDER THIS AGREEMENT FOR THE PROTECTION OF CUSTOMER DATA EXCEPT TO THE EXTENT RESULTING FROM NUCLEUS CYBER’S BREACH OF THIS SECTION 1.4.
1.5. Support Services. Subject to Customer’s compliance with this Agreement, Nucleus Cyber will provide Customer with the following support services:
A. Support. Nucleus Cyber will provide Authorized Users with web support at https://www.archtis.com/nc-protect-support/ for problem resolution assistance, and will respond to all support requests within one (1) business day.
B. Error Corrections. Nucleus Cyber will use commercially reasonable efforts to correct material Errors in the NC Protect Software reported by Customer in via web support at https://www.archtis.com/nc-protect-support/. Nucleus Cyber will use reasonable commercial efforts to diagnose and remediate bug fixes or workarounds to correct the Error. Nucleus Cyber may not issue Error Corrections for all Errors.
C. Enhancements. During the Subscription Period, Nucleus Cyber will provide Customer with updates and enhancements that Nucleus Cyber generally offers to other subscribers of the NC Protect Software. Major Improvements to the NC Protect Software that Nucleus Cyber offers for additional fees will not be automatically provided to Customer.
D. Support Exclusions. Nucleus Cyber will have no responsibility or liability of any kind, whether for breach of warranty or otherwise, arising or resulting from: (a) Customer’s or Authorized Users’ use of any version of the NC Protect Software other than the then-current unmodified version provided to Customer; (b) any problems which are not Errors; (c) problems caused by failed Internet connections or other hardware, software or equipment which is not owned, controlled or operated by Nucleus Cyber; (d) nonconformities resulting from abuse, negligence, or improper or unauthorized use of all or any part of the NC Protect Software; (e) problems or Errors caused by Customer’s, or other third parties’ products, services or equipment; or (f) material modification, amendment, revision, or change to the NC Protect Software by any party other than Nucleus Cyber or Nucleus Cyber-authorized representatives. Any use of or reliance on data or data output contained in the NC Protect Software is Customer’s sole responsibility.
From time to time during the Subscription Period, either Party may disclose or make available to the other Party information about its business affairs, products, confidential intellectual property, trade secrets, third-party confidential information, and other sensitive or proprietary information, whether orally or in written, electronic or other form or media, and whether or not marked, designated or otherwise identified as “confidential” (collectively, “Confidential Information”). Confidential Information does not include information that, at the time of disclosure is: (a) in the public domain; (b) known to the receiving Party at the time of disclosure; (c) rightfully obtained by the receiving Party on a non-confidential basis from a third party; (d) independently developed by the receiving Party; or (e) required to be disclosed under applicable federal, state or local law, regulation or a valid order issued by a court or governmental agency of competent jurisdiction. The receiving Party shall not disclose the disclosing Party’s Confidential Information to any person or entity, except to the receiving Party’s employees who have a need to know the Confidential Information for the receiving Party to exercise its rights or perform its obligations hereunder. On the expiration or termination of the Agreement, the receiving Party shall promptly return to the disclosing Party all copies, whether in written, electronic, or other form or media, of the disclosing Party’s Confidential Information, or destroy all such copies and certify in writing to the disclosing Party that such Confidential Information has been destroyed. Each Party’s obligations of non-disclosure with regard to Confidential Information are effective as of the Effective Date and will expire five (5) years from the date first disclosed to the receiving Party; provided, however, with respect to any Confidential Information that constitutes a trade secret (as determined under applicable law), such obligations of non-disclosure will survive the termination or expiration of this Agreement for as long as such Confidential Information remains subject to trade secret protection under applicable law. Notwithstanding the foregoing, if the receiving Party is required to disclose the disclosing Party’s Confidential Information pursuant to a duly authorized subpoena, court order or other government authority, the receiving Party will provide prompt written notice to the disclosing Party prior to such disclosure so that the disclosing Party may seek a protective order or other appropriate remedy. The Parties agree that the disclosing Party would be irreparably injured by a breach or threatened breach of this Agreement by the receiving Party and that the disclosing Party would not have an adequate remedy at law. Therefore, in the event of a breach or threatened breach by the receiving Party of this Section 3, the disclosing Party shall be entitled, in addition to any and all other remedies, to seek injunctive relief and specific performance. The receiving Party further agrees not to resist such application for relief on the basis that the disclosing Party has an adequate remedy at law and agrees to waive any requirement for the securing or posting of any bond in connection with such remedy.
3. AUTHORIZED USERS
On or as soon as reasonably practicable after the Effective Date, Nucleus Cyber will provide Customer the applicable NC Protect Software to allow Customer’s Authorized Users to use and access the NC Protect Software. Customer agrees to limit the access to and use of the NC Protect Software to the maximum number of Authorized Users for NC Protect Software, and to ensure that all Authorized Users safeguard any usernames and passwords (“Credentials”) provided to them to use and access the NC Protect Software. Customer agrees that it is responsible for all acts and omissions of Authorized Users and any activities conducted using their Credentials. Customer will notify Nucleus Cyber promptly if it learns of any unauthorized use of any Credentials or any other known or suspected breach of security related to the NC Protect Software. Customer is responsible for all Authorized Users’ compliance with the terms of this Agreement, and for all acts or omissions of such Authorized Users. Customer and its Authorized Users will be fully and completely responsible for all changes to and deletions of Customer Data logged or maintained within the NC Protect Software, as well as for the security of all Credentials required to use and access the NC Protect Software.
4. FEES, PAYMENT AND SUSPENSION OF LICENSE
The fees to be paid by the Customer are as stated in the Order Form. All fees will be billed in advance, with payment due within thirty (30) days of receipt of invoice, unless otherwise agreed upon in the Order Form. If Customer fails to make any payment when due, in addition to all other remedies that may be available: (i) Nucleus Cyber may charge interest on the past due amount at the rate of 1.5% per month calculated daily and compounded monthly or, if lower, the highest rate permitted under applicable law; and (ii) Nucleus Cyber may suspend Customer’s license to the Nucleus Cyber Software for any period during which any payment owed to Nucleus Cyber has not been made by Customer. Nucleus Cyber also reserves the right to charge Customer a reinstatement fee of no more than one (1) month’s fee applicable to the suspended license in the event of suspension, at Nucleus Cyber’s sole discretion.
Customer acknowledges and agrees that Nucleus Cyber retains all right, title and interest, including all intellectual property rights, in and to the NC Protect Software, Documentation and all associated materials. Other than as expressly set forth in this Agreement, no licenses, subscriptions or other rights in the NC Protect Software are granted to Customer. Customer hereby grants Nucleus Cyber and its affiliates a royalty-free, worldwide, transferable, sublicenseable, irrevocable, perpetual license to use or incorporate into the NC Protect Software any suggestions, enhancement requests, recommendations or other feedback provided by Customer or its Authorized Users relating to the NC Protect Software.
6. TERM AND TERMINATION
6.1. Term. This Agreement commences on the Effective Date and continues for the duration of the Subscription Period, unless earlier terminated in accordance with this Section 6.
6.2. Termination for Cause. Except for breach of payment terms as specified in Section 4, for which no notice period shall be necessary, either Party may terminate this Agreement for a material breach by the other Party of any of its terms and conditions upon a minimum of thirty (30) days written notice, provided the breach is not remedied during the notice period. Termination of this Agreement for cause shall result in automatic termination of Customer’s right to use NC Protect Software.
6.3. Updated Nucleus Cyber Software Due to Deprecation of Software. In the event of any deprecation of any portion of the NC Protect Software, Nucleus Cyber will provide Customer with an updated version of the NC Protect Software with such portion deleted and will notify Customer at least five (5) days in advance of providing such updated version. Upon receipt of the updated version of the NC Protect Software from Nucleus Cyber, Customer shall immediately cease use of the prior version of the NC Protect Software and use only the updated version of the NC Protect Software for the remainder of the Subscription Period.
6.4. Effect of Termination. Upon any termination of this Agreement, Customer shall immediately discontinue all use of the NC Protect Software and Documentation and each Party shall (i) immediately discontinue all use of the other Party’s Confidential Information; (ii) delete the other Party’s Confidential Information from its computer storage or any other media, including, without limitation, Customer Data, as applicable, but excluding Usage Data; (iii) return to the other Party or destroy (with written certification), all copies of such other Party’s Confidential Information then in its possession; and (iv) promptly pay all amounts due and remaining payable hereunder.
7. WARRANTY; DISCLAIMER
7.1. Limited Warranties.
A. Each Party represents and warrants to the other Party that: (i) it has all necessary right, power and authority to enter into this Agreement and to perform its obligations hereunder, (ii) the execution and delivery of this Agreement, and the performance of its obligations hereunder, do not conflict with and will not result in a breach of any other agreement to which it is a party or by which its assets are bound, and (iii) this Agreement constitutes the legally valid and binding obligation of such Party, enforceable against it in accordance with its terms, except as such enforcement may be limited by applicable law.
B. Nucleus Cyber represents and warrants that the NC Protect Software will substantially conform to the Documentation for the ninety (90) days following the date that the NC Protect Software are made available to Customer for Customer’s use. This warranty does not apply if the NC Protect Software (i) has been altered, except by Nucleus Cyber or its authorized representative; (ii) has not been installed, operated, repaired, or maintained in accordance with instructions supplied by Nucleus Cyber; or (iii) has been subjected to abnormal physical or electrical stress, abnormal environmental conditions, misuse, negligence, or accident. In the event of a breach of this section, as Customer’s sole and exclusive remedy, Nucleus Cyber shall repair, replace or cause the refund of the fees paid for the non-conforming NC Protect Software. This remedy is conditioned upon Customer reporting the non-conformance in writing within the warranty period.
C. Nucleus Cyber represents and warrants that prior to delivery of any NC Protect Software, Nucleus Cyber will use generally available commercial virus scanning technology to detect any known viruses contained within the NC Protect Software as delivered by Nucleus Cyber to Customer. Nucleus Cyber further represents, warrants and covenants that it will use commercially reasonable efforts to not introduce any virus into its products or services. In the event a breach of this section, as Customer’s sole and exclusive remedy, Nucleus Cyber will use commercially reasonable efforts, at no charge to Customer, to assist Customer in eradicating and mitigating the effects of the virus; provided, however, Customer acknowledges and agrees that Nucleus Cyber makes no warranties with respect to its ability to eradicate or mitigate such effects of the virus.
D. If Nucleus Cyber is unable to correct any breach of this section within thirty (30) days after receipt of Customer’s written notice, Customer may terminate this Agreement with respect to such NC Protect Software and receive a refund of the unearned portion of all amounts paid under this Agreement in respect of the terminated NC Protect Software. Such refund will be payable within thirty (30) days after the effective date of termination of the NC Protect Software.
7.2. Disclaimer. EXCEPT AS EXPRESSLY PROVIDED IN SECTION 7.1, AND TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW: (A) THE NC PROTECT SOFTWARE AND DOCUMENTATION ARE PROVIDED “AS IS” AND “AS AVAILABLE” AND (B) Nucleus Cyber EXPRESSLY DISCLAIM ALL OTHER WARRANTIES, EXPRESS OR IMPLIED, BY OPERATION OF LAW OR OTHERWISE, INCLUDING, WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, TITLE, NON-INFRINGEMENT, QUIET ENJOYMENT OR FROM A COURSE OF PERFORMANCE, COURSE OF DEALING OR USAGE IN TRADE. Nucleus Cyber DOES NOT WARRANT, AND SPECIFICALLY DISCLAIMS, THAT THE NC PROTECT SOFTWARE AND DOCUMENTATION WILL BE ACCURATE, WITHOUT INTERRUPTION OR ERROR FREE.
8.1. By Nucleus Cyber. If any action is instituted by a third party against Customer based upon a claim that the NC Protect Software, as delivered without modification and used as specified in all applicable documentation, infringes any third party’s U.S. intellectual property rights, Nucleus Cyber shall defend such action at its own expense on Customer’s behalf and will pay all damages attributable to such claim which are finally awarded against Customer or paid in settlement, provided that Nucleus Cyber agrees in writing to such settlement.
8.2. Exceptions. Section 8.1 will not apply if the alleged claim arises, in whole or in part, from (a) a use or modification of the NC Protect Software by Customer in a manner inconsistent with any applicable documentation or outside the scope of any right granted or in breach of this Agreement, (b) a combination, operation or use of the NC Protect Software with other software, hardware or technology not specifically authorized by Nucleus Cyber, or (c) the Customer Data (the “Customer Indemnity Responsibilities”).
8.3. Infringement or Likely Infringement. If the NC Protect Software is enjoined or, in Nucleus Cyber’s determination is likely to be enjoined or otherwise infringing, Nucleus Cyber may, at its option and expense (a) procure for Customer the right to continue using the NC Protect Software, (b) replace or modify the NC Protect Software so that it they are no longer infringing but continue to provide comparable functionality, or (c) terminate Customer’s access to the NC Protect Software and refund any amounts previously paid for the NC Protect Software attributable to the remainder of the then-current term. This section sets forth the entire obligation of Nucleus Cyber and Customer’s exclusive remedy against Nucleus Cyber for any claim that the NC Protect Software infringes a third party’s intellectual property right.
9.4. By Customer. If any action is instituted by a third party against Nucleus Cyber or its affiliates (collectively the “Nucleus Cyber Indemnitees”) relating to (i) Customer’s negligent or willful misconduct, (ii) Customer’s or Authorized Users’ use of the NC Protect Software or Documentation in a manner not authorized or contemplated by this Agreement, (iii) use of any version of the NC Protect Software other than the most current version of the NC Protect Software and Documentation delivered by Nucleus Cyber to Customer or (iv) Customer Indemnity Responsibilities, Customer will defend such action at Customer’s own expense on the Nucleus Cyber Indemnitees’ behalf and will pay all damages attributable to such claim which are finally awarded against the Nucleus Cyber Indemnitees or paid in settlement of such claim. This subsection will not apply to the extent that Nucleus Cyber has any indemnification obligation with respect to such claim pursuant to Section 8.1.
8.5. Procedure. Any Party that is seeking to be indemnified under the provision of this Section 8 (an “Indemnified Party”) must (a) promptly notify the other Party (the “Indemnifying Party”) of any third-party claim, suit, or action for which it is seeking an indemnity hereunder (a “Claim”) and (b) give the Indemnifying Party the sole control over the defense of such Claim.
9. LIMITATION OF LIABILITY
9.1. IN NO EVENT WILL EITHER PARTY OR ITS AFFILIATES BE LIABLE TO THE OTHER PARTY FOR ANY INCIDENTAL, INDIRECT, SPECIAL, CONSEQUENTIAL, PUNITIVE, OR OTHER INDIRECT DAMAGES, REGARDLESS OF THE NATURE OF THE CLAIM, INCLUDING, WITHOUT LIMITATION, LOST PROFITS, COSTS OF DELAY, ANY FAILURE OF DELIVERY, BUSINESS INTERRUPTION, COSTS OF LOST OR DAMAGED DATA OR DOCUMENTATION, OR LIABILITIES TO THIRD PARTIES ARISING FROM ANY SOURCE, EVEN IF THE OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
9.2. THE CUMULATIVE LIABILITY OF EACH PARTY TO THE OTHER PARTY FOR ALL CLAIMS, INCLUDING NEGLIGENCE, ARISING FROM OR RELATING TO THIS AGREEMENT, AND INCLUDING, WITHOUT LIMITATION, ANY CAUSE OF ACTION SOUNDING IN CONTRACT, TORT, OR STRICT LIABILITY, WILL NOT EXCEED, THE TOTAL AMOUNT OF ALL FEES PAID BY CUSTOMER TO NUCLEUS CYBER UNDER THIS AGREEMENT DURING THE TWELVE (12)-MONTH PERIOD PRIOR TO THE ACT, OMISSION OR OCCURRENCE GIVING RISE TO SUCH LIABILITY. THE LIMITATIONS OF LIABILITY ARE INTENDED TO APPLY WITHOUT REGARD TO WHETHER OTHER PROVISIONS OF THIS AGREEMENT HAVE BEEN BREACHED OR HAVE PROVEN INEFFECTIVE.
9.3. Exclusions from Limitation on Liability. The limitations on liability in Sections 9.1 and 9.2 will not apply to any payment obligation under Section 4, misappropriation of the other Party’s intellectual property, a breach of a Party’s confidentiality obligations, or liability arising from a Party’s indemnification obligations.
9.4. Essential Basis of the Agreement. The limitations of liability set forth in sections 9.1, 9.2 and 9.3 are intended to apply without regard to whether other provisions of this Agreement have been breached or proven ineffective. The disclaimers, exclusions and limitations of liability set forth in this Agreement form an essential basis of the bargain between the Parties, and, absent any of such disclaimers, exclusions or limitations of liability, the provisions of this Agreement, including, without limitation, the economic terms, would be substantially different.
10. AUDIT RIGHT
During the Term and for a period of two (2) years thereafter, Nucleus Cyber may audit Customer’s facilities, records, and use of the NC Protect Software to determine Customer’s compliance with the terms and conditions of this Agreement. Such audits will occur during regular business hours and must be conducted in a manner designed to limit disruption to Customer’s business. In the event an audit reveals that Customer has underpaid any fees or charges owing to Nucleus Cyber (such as by exceeding the maximum number of Authorized Users), or that Customer is using the NC Protect Software in an unauthorized manner, Customer must immediately pay to Nucleus Cyber any amounts due, together with interest thereon at the lesser of the maximum amount chargeable by law or one and one-half percent (1-1/2%) per month commencing with the date payment was due, and Customer must reimburse Nucleus Cyber for all reasonable costs of conducting the audit.
11. GENERAL PROVISIONS
11.1. Publicity. Except with Customer’s prior written consent, Nucleus Cyber may not use any name, trademark, logo, or trade name of Customer (or any contraction, abbreviation, adaptation, or other variant thereof), or the name or likeness of any of Customer employees or staff, in any news/press/publicity release, advertising, publication, promotional material, or other commercial communication. Notwithstanding the foregoing, Nucleus Cyber may identify Customer as a customer of Nucleus Cyber, provided that Nucleus Cyber makes no statement that could reasonably be construed as an endorsement of Nucleus Cyber or the NC Protect Software by Customer.
11.2. Right to Subcontract. Customer agrees that Nucleus Cyber may subcontract any aspect of its obligations under this Agreement to qualified third parties; provided that any such subcontracting arrangement will not relieve Nucleus Cyber of any of its obligations hereunder.
11.3. Applicable Law and Venue. This Agreement and the rights and obligations of the Parties hereunder shall be construed in accordance with, and governed by, the laws of the state of Delaware, without giving effect to such jurisdiction’s rules regarding conflicts of laws. The Parties expressly agree that the exclusive jurisdiction for any claim or dispute arising from this Agreement resides in the federal and state courts located in Delaware, and each Party consent to the personal jurisdiction thereof.
11.4. Independent Contractors. Customer and Nucleus Cyber acknowledge and agree that the relationship arising from this Agreement does not constitute or create any joint venture, partnership, employment relationship or franchise between them, and the Parties are acting as independent contractors in making and performing this Agreement.
11.5. Counterparts. This Agreement may be executed in any number of counterparts, each of which when so executed will be deemed to be an original, and electronically stored copies of such counterpart(s) will be deemed an original, so long as any such counterpart is in an unalterable format, such as a PDF file; all of which when taken together will constitute one Agreement.
11.6. Headings. The headings in this Agreement are inserted merely for the purpose of convenience and shall not affect the meaning or interpretation of this Agreement.
11.7. Entire Agreement. This Agreement sets forth the entire understanding between the Parties related its subject matter and supersedes all prior oral and written understandings between the Parties related thereto. Neither of the Parties will be bound by any conditions, inducements or representations other than as expressly provided for in this Agreement. This Agreement will govern the relationship of the Parties. Purchase orders provided by Customer including any additional or conflicting terms and conditions will be for administrative purposes only and will have no force or effect. Only signed Order Forms will have binding effect on the Parties. In the event of a conflict between these Terms and Conditions and the Order Form, the terms of the Order Form shall govern.
11.8. Modifications. This Agreement contains the entire understanding and agreement of the Parties and supersedes any and all previous and contemporaneous understandings. Only a writing signed by both Parties may modify this Agreement.
11.9. Severability. In the event that any provision of this Agreement is held to be invalid or unenforceable, the valid or enforceable portion thereof and the remaining provisions will remain in full force and effect. Any waiver or failure to enforce any provision of this Agreement on one occasion will not be deemed a waiver of any other provision or of such provision on any other occasion. All waivers must be in writing.
11.10. Export Compliance. The Parties represent that, except as allowed under applicable U.S. Government export laws and regulations, no technical data, hardware, software, technology, or other information furnished under this Agreement by either Party shall be disclosed to any foreign person, firm, or country, including foreign persons employed by or associated with Customer. Furthermore, both Parties shall not allow any re-export of any technical data, hardware, software, technology, or other information furnished, without first complying with all applicable U.S. Government export laws and regulations. Prior to exporting any technical data, hardware, software, technology, or other information furnished hereunder, and receive the other Party advance written approval. Each Party shall indemnify, defend, and hold the other Party harmless from and against any and all claims, demands, actions, suits, proceedings, losses, damages, penalties, obligations, liabilities, costs and expenses (including, without limitation, reasonable attorneys’ fees) arising directly or indirectly from breaches of this provision by the other Party.
11.11. Survival. The following Sections shall survive any termination of this Agreement: 1.2, 1.4, 2, 5, 6.4, 7.2, and 8-11.
11.12. Assignment. Neither Party may assign or transfer this Agreement without the other Party’s prior written approval, except that either Party may, upon written notice, assign this Agreement to an entity that acquires or is merged with the Party or that purchases all or substantially all of the assets of the Party, and with respect to Customer’s successor, such successor entity agrees to be bound by the terms of this Agreement.
11.13. Notice. All notices required by or relating to this Agreement will be in writing and will be sent by means of certified mail, postage prepaid, to Customer at the addresses set forth on the Order Form; if to Nucleus Cyber at: CEO, Nucleus Cyber, Inc., 177 Huntington Avenue, Ste 1703 #73999, Boston, MA 02115 USA, or addressed to such other address as the receiving Party may have given by written notice in accordance with this provision.
[End of Terms and Conditions]