{"id":927,"date":"2022-04-17T22:52:30","date_gmt":"2022-04-17T22:52:30","guid":{"rendered":"https:\/\/securitybytestech.com\/?page_id=927"},"modified":"2022-07-10T16:47:03","modified_gmt":"2022-07-10T16:47:03","slug":"terminos-y-condiciones","status":"publish","type":"page","link":"https:\/\/securitybytestech.com\/en\/terms-conditions\/","title":{"rendered":"Terms and Conditions"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"927\" class=\"elementor elementor-927\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-72b59ee5 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"72b59ee5\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-6c177db8\" data-id=\"6c177db8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-42c1671d de_scroll_animation_no elementor-widget elementor-widget-heading\" data-id=\"42c1671d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Terms and Conditions\n\n\n<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-5c6a1e60 elementor-hidden-tablet elementor-hidden-phone\" data-id=\"5c6a1e60\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-21b7150a elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"21b7150a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2aaeb922\" data-id=\"2aaeb922\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-740a2db1 de_scroll_animation_no elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"740a2db1\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>SECURITY BYTES TECH LIMITADA<\/strong><\/p><p>Last update: March 1st, 2022<\/p><ol><li><strong> DEFINITIONS<\/strong><\/li><\/ol><p>1.1 SECURITY BYTES TECH LIMITADA is an I.T. and technologic services Company. Hereinafter referred to as \u2018SECURITY BYTES TECH\u2019.<\/p><p>1.2 These Terms of Engagement are the Terms of Engagement referred to in, the Proposal, Contract or any other documents (this \u201cAgreement\u201d) signed, acknowledged, and agreed by the Client.<\/p><p><strong>\u00a0<\/strong><\/p><ol start=\"2\"><li><strong> CONFIDENTIAL INFORMATION<\/strong><\/li><\/ol><p>2.1 Both Parties agree not to disclose at any time any confidential information, which becomes known to either Party as a result of this Agreement, unless required by law, by any court of competent jurisdiction, or by any official regulatory body provided that the Party required to disclose shall notify the other Party of such expected disclosure as soon as possible.<\/p><p><strong>\u00a0<\/strong><\/p><ol start=\"3\"><li><strong> DURATION OF AGREEMENT<\/strong><\/li><\/ol><p>3.1 The appointment of SECURITY BYTES TECH shall commence from the date of receipt of the order by SECURITY BYTES TECH. If this Agreement is for a fixed term or fixed price project then the agreement shall terminate when SECURITY BYTES TECH has completed the Services. If this Agreement is for an ongoing rolling Service, then at the beginning of each financial year the agreed fees for the Services will be automatically be revised in alignment with any issued changes in the standard SECURITY BYTES TECH Package Rates, as referred to in 4.3 below and as circulated to all clients as and when modified.<\/p><p>3.2 In the event of the failure of the Client to comply with any of his obligations under this Agreement, or upon the occurrence of any circumstances beyond the control of SECURITY BYTES TECH which impede the carrying out by SECURITY BYTES TECH of the Services, SECURITY BYTES TECH may upon not less than 7 days\u2019 notice in writing to the Client terminate this Agreement. It is hereby agreed that non-payment or unreasonably delayed payment of agreed fees shall entitle SECURITY BYTES TECH to terminate this agreement.<\/p><p>3.3 In the event of the failure of SECURITY BYTES TECH to comply with any of its obligations under this Agreement, or upon the occurrence of any circumstances beyond the control of the Client which prevent the Client from progressing or completing the Project, the Client may terminate this Agreement.<\/p><p>3.4 Any termination of this Agreement shall not prejudice or affect the accrued rights or claims of either party to this Agreement.<\/p><p><strong>\u00a0<\/strong><\/p><ol start=\"4\"><li><strong> SERVICES<\/strong><\/li><\/ol><p>4.1 The Services to be provided by SECURITY BYTES TECH under this Agreement shall be as described in the Proposal, Contract, or other documents signed by the Client and SECURITY BYTES TECH.<\/p><p><strong>\u00a0<\/strong><\/p><ol start=\"5\"><li><strong> CARE AND DILIGENCE<\/strong><\/li><\/ol><p>5.1 SECURITY BYTES TECH shall exercise reasonable skills, care, and diligence in the discharge of the services.<\/p><p><strong>\u00a0<\/strong><\/p><ol start=\"6\"><li><strong> ALTERATION OR MODIFICATION TO SERVICES<\/strong><\/li><\/ol><p>6.1 If at any time after the commencement of SECURITY BYTES TECH\u2019s appointment, any of the Services whether completed by SECURITY BYTES TECH or in progress shall require to be modified or revised because of clear written instructions from or on behalf of the Client, or because of circumstances which could not reasonably have been foreseen by SECURITY BYTES TECH, then the Client shall make such additional payment to SECURITY BYTES TECH for making any necessary modifications or revisions as shall be agreed between SECURITY BYTES TECH and the Client before such additional work is carried out.<\/p><p>6.2 Any Services to be provided by SECURITY BYTES TECH, which is not specified in this Agreement, shall be paid at the hourly charge-out rates details in the Payment Schedule unless otherwise agreed in writing between the Parties. The terms and conditions of this Agreement apply to such additional services in the absence of any further agreement.<\/p><p>6.3 The hourly charge rates referred to above (and tabled in the appendices of this Agreement) will be reviewed annually at the start of the financial year (April 1st). If said rates are amended in any way then they will automatically become applicable to this contract from the start of the financial year.<\/p><p><strong>\u00a0<\/strong><\/p><ol start=\"7\"><li><strong> CLIENT INFORMATION &amp; INSTRUCTIONS<\/strong><\/li><\/ol><p>7.1 The Client shall supply to SECURITY BYTES TECH, without charge and in such reasonable time as not to cause delay or disruption to SECURITY BYTES TECH in the performance of the Services, all necessary and relevant data and information required for the performance of the Services.<\/p><p><strong>\u00a0<\/strong><\/p><ol start=\"8\"><li><strong> GOVERNING LAW AND SETTLEMENT OF DISPUTES<\/strong><\/li><\/ol><p>8.1 This Agreement shall bind and inure to the benefit of the Parties hereto and their successors and assigns. This Agreement is construed and governed by the laws of Costa Rica without reference to the conflict of law principles.<\/p><ol start=\"9\"><li><strong> INTELLECTUAL PROPERTY<\/strong><\/li><\/ol><p>9.1 SECURITY BYTES TECH retains the intellectual property rights to the Software, Trademark, and any other intellectual property used and\/or developed in the performance of Services to the Client. Subject to terms and conditions separately agreed upon by the Parties in writing, SECURITY BYTES TECH may grant the Client a limited right to use the Software (\u201cDevelopment License\u201d). The Client is under no circumstance entitled to obtain the program (source) code to Software.<\/p><p>9.2 Any licenses for the Client to use SECURITY BYTES TECH intellectual property shall be expressly specified in the documents constituting this Agreement.<\/p><p>9.3 SECURITY BYTES TECH reserves the right to make use of finished and published products in its marketing, including, but not limited to, promotion on SECURITY BYTES TECH operated websites, Facebook, Twitter, and other social media platforms as well as in printed media.<\/p><p><strong>\u00a0<\/strong><\/p><ol start=\"10\"><li><strong> PAYMENT<\/strong><\/li><\/ol><p>10.1 Payment for the Services shall be made by the Client in agreed installments. Such installments shall constitute no more than payments on account.<\/p><p>10.2 If any item or part of an item of an invoice rendered by SECURITY BYTES TECH is disputed or subject to question by the Client, the payment by the Client of the remainder of that account shall not be withheld. SECURITY BYTES TECH reserves the right to suspend the provision of the Services until the disputed or questioned item has been agreed or determined.<\/p><p>10.3 Hosting fees are payable in full in advance of the hosting period.  Hosting fees are non-refundable should the client terminate the hosting within the paid period.  SECURITY BYTES TECH reserves the right to terminate any hosting which has not been paid by giving the client 7 days prior notice of termination.  Termination of hosting will occur unless payment is received within 7 days.  Reinstatement fees are chargeable in advance of a request to reinstate the hosting once termination has occurred.<\/p><p>10.4 SECURITY BYTES TECH reserve the right to terminate any hosting provided as part of our services to a client should any invoice, even for unrelated services, remain outstanding over 90 days<\/p><p><strong>\u00a0<\/strong><\/p><ol start=\"11\"><li><strong> TAXES, DUTIES, AND OTHER CHARGES<\/strong><\/li><\/ol><p>11.1 The amounts specified in the Payment Schedule are exclusive of any taxes, duties, and charges which may be required by law. The Client shall be responsible for all such taxes, duties, and charges for which it is liable as a result of this Agreement or any payment to SECURITY BYTES TECH.<\/p><p><strong>\u00a0<\/strong><\/p><ol start=\"12\"><li><strong> WEB MAINTENANCE<\/strong><\/li><\/ol><p>12.1 The hours specified in the contract or otherwise agreed upon can be accumulated on a three-month rolling basis. After three months any unused hours will be forfeited.<\/p><p>12.2 The hours specified in the contract or otherwise agreed upon are priced according to SECURITY BYTES TECH\u2019s current price schedule and can be adjusted by SECURITY BYTES TECH with one month\u2019s notice.<\/p><p>12.3 No refund, discount, or rebate will be given for hours not used.<\/p><p><strong>\u00a0<\/strong><\/p><ol start=\"13\"><li><strong> LIMITATION OF LIABILITY AND INDEMNITY<\/strong><\/li><\/ol><p>13.1 The Client hereby undertakes to indemnify and hold harmless SECURITY BYTES TECH and all its officers, employees, contractors, and agents against any loss, cost, damage, or expense which any of them may sustain or incur because of SECURITY BYTES TECH having entered into this Agreement or providing the Services hereunder. Neither SECURITY BYTES TECH nor its officers, employees, contractors, or agents shall in the performance of this Agreement be liable to the Client or any other person for any act or omission, negligent, tortious, or otherwise.<\/p><p>13.3 SECURITY BYTES TECH and the Client each acknowledge that the provisions of this Clause are reasonable and that had they not been included herein SECURITY BYTES TECH would not have entered into this Agreement.<\/p><p><strong>SECURITY BYTES TECH LIMITADA<\/strong><\/p><p><strong>RETURN &amp; REFUND POLICY<\/strong><\/p><p>Last update: March 1st, 2022<\/p><p>Thanks for shopping at SECURITY BYTES TECH.<\/p><p>If you are not entirely satisfied with your purchase, we're here to help.<\/p><p><strong>Returns <\/strong><\/p><p>You have 30 calendar days to return an item\/service from the date you received it in case you are not completely satisfied.<\/p><p>To be eligible for a return, your service\/product must be unused and should not be used or activated.<\/p><p>Your item needs to have a receipt or proof of purchase.<\/p><p><strong>Refunds<\/strong><\/p><p>Once we receive your products or cancellation of service, we will inspect them and notify you that we have received your refund request.<\/p><p>We will immediately notify you of the status of your refund after inspecting the matter.<\/p><p>If your refund is approved, we will initiate a refund to your credit card (or original method of payment).<\/p><p>You will receive the credit within a certain amount of days, depending on your card issuer's policies.<\/p><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-83e7ad8 elementor-align-center elementor-mobile-align-justify de_scroll_animation_no elementor-invisible elementor-widget elementor-widget-button\" data-id=\"83e7ad8\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;lightSpeedIn&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-grow\" href=\"https:\/\/securitybytestech.com\/en\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Home<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>T\u00e9rminos y Condiciones SECURITY BYTES TECH LIMITADA \u00daltima actualizaci\u00f3n: Marzo 1\u00ba del 2022 DEFINICIONES 1.1 SECURITY BYTES TECH LIMITADA es una empresa de I.T. y otros servicios tecnol\u00f3gicos. Se denominar\u00e1 en lo sucesivo &#8220;SECURITY BYTES TECH&#8221;. 1.2 Estos T\u00e9rminos de Compromiso son los T\u00e9rminos de Compromiso a los que se hace referencia en la Propuesta, [&hellip;]<\/p>","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-927","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/securitybytestech.com\/en\/wp-json\/wp\/v2\/pages\/927","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybytestech.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/securitybytestech.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/securitybytestech.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybytestech.com\/en\/wp-json\/wp\/v2\/comments?post=927"}],"version-history":[{"count":45,"href":"https:\/\/securitybytestech.com\/en\/wp-json\/wp\/v2\/pages\/927\/revisions"}],"predecessor-version":[{"id":1685,"href":"https:\/\/securitybytestech.com\/en\/wp-json\/wp\/v2\/pages\/927\/revisions\/1685"}],"wp:attachment":[{"href":"https:\/\/securitybytestech.com\/en\/wp-json\/wp\/v2\/media?parent=927"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}