Terms and Conditions

"Hacking Secrets Exposed" Product/Service Agreement.


The "Hacking Secrets Exposed" website (this "Site") is an online information service that facilitates the sale and marketing of the eBook ("Hacking Secrets Exposed"). The usage of this site or the eBook (after purchase) is subject to your compliance with the terms and conditions set forth below.

PLEASE READ THIS DOCUMENT CAREFULLY BEFORE ACCESSING OR USING THE SITE OR ANY OF IT'S AFFILIATED PRODUCTS. BY ACCESSING OR USING THE SITE, YOU AGREE TO BE BOUND BY THE TERMS AND CONDITIONS SET FORTH BELOW. IF YOU DO NOT WISH TO BE BOUND BY THESE TERMS AND CONDITIONS, YOU MAY NOT ACCESS OR USE THE SITE OR ANY OF IT'S AFFILIATED PRODUCTS. The "Hacking Secrets Exposed" WEBSITE MAY MODIFY THIS AGREEMENT AT ANY TIME, AND SUCH MODIFICATIONS SHALL BE EFFECTIVE IMMEDIATELY UPON POSTING OF THE MODIFIED AGREEMENT ON THE SITE. YOU AGREE TO REVIEW THE AGREEMENT PERIODICALLY TO BE AWARE OF SUCH MODIFICATIONS AND YOUR CONTINUED ACCESS OR USE OF THE SITE SHALL BE DEEMED YOUR CONCLUSIVE ACCEPTANCE OF THE MODIFIED AGREEMENT.

1. Copyright and Licensing.

Copyright 2015 by Srikanth Ramesh. All rights reserved. This eBook ("Hacking Secrets Exposed") or any portion thereof shall not be reproduced or used in any manner whatsoever without the express written permission of the author (or publisher) except for the use of brief quotations in a book review.

2. Use of the Product/Service.

You understand that except for information, products or services clearly identified as being supplied by "Hacking Secrets Exposed", the eBook or its creators does not operate, control or endorse any information, products or services on the Internet in any way. Except for the "Hacking Secrets Exposed" - identified information, products or services, all information, products and services offered through the site or on the Internet generally are offered by third parties, that are not affiliated with "Hacking Secrets Exposed". You also understand that The "Hacking Secrets Exposed" cannot and does not guarantee or warrant that files available for downloading through the sites (mentioned/referred in the eBook) will be free of infection or viruses, worms, Trojan horses or other code that manifest contaminating or destructive properties. You are responsible for implementing sufficient procedures and checkpoints to satisfy your particular requirements for accuracy of data input and output, and for maintaining a means for the reconstruction of any lost data.

LIMITATION OF LIABILITY

IN NO EVENT WILL "Hacking Secrets Exposed" BE LIABLE FOR (I) ANY INCIDENTAL, CONSEQUENTIAL, OR INDIRECT DAMAGES (INCLUDING, BUT NOT LIMITED TO DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION, LOSS OF PROGRAMS OR INFORMATION, AND THE LIKE) ARISING OUT OF THE USE OF OR INABILITY TO USE THE PRODUCT/SERVICE, OR ANY INFORMATION, OR TRANSACTIONS PROVIDED ON THE PRODUCT/SERVICE, OR DOWNLOADED FROM THE PRODUCT/SERVICE, OR ANY DELAY OF SUCH INFORMATION OR SERVICE. EVEN IF "Hacking Secrets Exposed" OR ITS AUTHORIZED REPRESENTATIVES HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES, OR (II) ANY CLAIM ATTRIBUTABLE TO ERRORS, OMISSIONS, OR OTHER INACCURACIES IN THE SERVICE AND/OR MATERIALS OR INFORMATION DOWNLOADED THROUGH THE SERVICE. BECAUSE SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES, THE ABOVE LIMITATION MAY NOT APPLY TO YOU. IN SUCH STATES, "Hacking Secrets Exposed" LIABILITY IS LIMITED TO THE GREATEST EXTENT PERMITTED BY LAW.

3. Indemnification.

You agree to indemnify, defend and hold harmless "Hacking Secrets Exposed", its officers, directors, employees, agents, licensors, suppliers and any third party information providers to the Product/Service from and against all losses, expenses, damages and costs, including reasonable attorneys' fees, resulting from any violation of this Agreement (including negligent or wrongful conduct) by you or any other person accessing the Product/Service.

4. Third Party Rights.

The provisions of paragraphs 2 (Use of the Product/Service), and 3 (Indemnification) are for the benefit of "Hacking Secrets Exposed" and its officers, directors, employees, agents, licensors, suppliers, and any third party information providers to the Service. Each of these individuals or entities shall have the right to assert and enforce those provisions directly against you on its own behalf.

5. Termination.

This Agreement may be terminated by either party without notice at any time for any reason. The provisions of paragraphs 1 (Copyright and Licensing), 2 (Use of the Product/Service), 3 (Indemnification), 4 (Third Party Rights) and 6 (Miscellaneous) shall survive any termination of this Agreement.

6. Miscellaneous.

This Agreement shall all be governed and construed in accordance with the laws of India (The Republic of India) applicable to agreements made and to be performed in India. You agree that any legal action or proceeding between "Hacking Secrets Exposed" and you for any purpose concerning this Agreement or the parties' obligations hereunder shall be brought exclusively in a federal or state court of competent jurisdiction sitting in India. Any cause of action or claim you may have with respect to the Product/Service must be commenced within one (1) year after the claim or cause of action arises or such claim or cause of action is barred. "Hacking Secrets Exposed's" failure to insist upon or enforce strict performance of any provision of this Agreement shall not be construed as a waiver of any provision or right. Neither the course of conduct between the parties nor trade practice shall act to modify any provision of this agreement. The "Hacking Secrets Exposed" may assign its rights and duties under this agreement to any party at any time without notice to you.

Any rights not expressly granted herein are reserved.