Terms Of Service Last Updated: 4/18/2024

Customer/Subscriberss Compliance with Prerecorded Message and Consent Requirements

Customer/Subscriber understands and acknowledges that Cyber Strategies AI provides tools for Customer/Subscribers responsible use, and it is Customer/Subscribers sole responsibility for such use. Continued access and use of the Cyber Strategies AI Services is subject to Customer/Subscribers compliance with these Terms of Use. Cyber Strategies AI may monitor, but is not obligated to and bears no responsibility for, uploading of information, databases or audio messages. In addition to other requirements set forth in these Terms of Use, Customer/Subscriber agrees that it shall comply with all applicable laws and the following requirements.

          Compliance with Applicable Telemarketing and Dialing Laws

          Customer/Subscriber agrees that it shall comply with and abide by all applicable Federal and State laws, rules and regulations governing the use of automated dialer or prerecorded/artificial voice calls or texts including but not limited to the Telephone Consumer Protection Act, the Telemarketing Sales Rule and accompanying Do-Not-Call regulations, and, without limitation, any and all current or future equivalent state telemarketing laws regulating the use of prerecorded or automated calls/texts, state do-not-call regulations, and state telemarketer registration requirements.

          Customer/Subscriber shall provide accurate, correct, and truthful Caller ID information.

          Customer/Subscriber shall provide all disclosures required by law.

          Customer/Subscriber agrees and acknowledges that compliance with such laws is Customer/Subscribers sole responsibility.

          Affirmative Consent Where Required

          Customer/Subscriber acknowledges and understands that recipient consent is required for certain types of communications. Customer/Subscriber understands that there may be different levels” of consent for different communications.

          Without limiting the foregoing sections, if Customer/Subscriber does not have either consent or a business relationship with a recipient as required by applicable law or legally valid exemption from, or legally valid exception to, such laws, Customer/Subscriber shall not make that communication.

          Customer/Subscriber (i) has and maintains personally or via a third-party the records to prove that Customer/Subscriber had the necessary consent, business relationship or legally valid exemption from, or legally valid exception to, such laws at the time of the communication and (ii) will provide certified copies of such records to Cyber Strategies AI promptly on Cyber Strategies AIs email request.

Terms of Use

The following Terms of Service (the "Agreement") are entered into by and between Premiere Business Alliance, LLC ("Cyber Strategies AI") and the person or entity on whose behalf the Services (as defined below) are used or accessed (the "Customer/Subscriber") governing our platform services, including our programs, features, account portals, and technical support (the "Services"). For clarification, Customer/Subscriber includes both those who do and who do not pay for Services. If you do not agree to this Agreement, you are prohibited from using or accessing our Services. We may modify these terms at any time by posting the revised terms to our website. Your continued use of our Service means that you have accepted the changed terms.

Cyber Strategies AI may at any time, without notice to you, revise this Agreement and any other information contained in this website by updating this posting. Cyber Strategies AI may also make improvements or changes in Services at any time without notice.

General

This website and all content in this website (the "Site") may not be copied, reproduced, republished, uploaded, posted, transmitted, distributed, or used for the creation of derivative works without Cyber Strategies AI's prior written consent, except that Cyber Strategies AI grants Customer/Subscriber non-exclusive, non-transferable, limited permission to access and display the Web pages within this Site. This permission is conditioned on Customer/Subscriber not modifying the content displayed on this Site, your keeping intact all copyright, trademark, and other proprietary notices, and your acceptance of any terms, conditions, and notices accompanying the content or otherwise set forth in this Site. Notwithstanding the foregoing, any software and other materials that are made available for downloading, access, or other use from this Site with their own license terms, conditions, and notices will be governed by such terms, conditions, and notices.

Customer/Subscribers failure to comply with this Agreement will result in automatic termination of any rights granted to Customer/Subscriber, without prior notice, and Customer/Subscriber must immediately destroy all copies of downloaded materials in Customer/Subscribers possession or control. Except for the limited permission in the preceding paragraph, Cyber Strategies AI does not grant Customer/Subscriber any express or implied rights or licenses under any patents, trademarks, copyrights, or other proprietary or intellectual property rights. Customer/Subscriber may not mirror any of the content from this Site on another website or in any other media.

Certain Disclaimers

Information on this website is not guaranteed to be correct, current, or complete, and this Site may contain technical inaccuracies or typographical errors. Cyber Strategies AI assumes no responsibility (and expressly disclaims responsibility) for updating this Site to keep information current or to ensure the accuracy or completeness of any posted information. Accordingly, Customer/Subscriber should confirm the accuracy and completeness of all posted information before making any decision related to any Services.

Customer/Subscriber Data

Customer/Subscriber provides to Cyber Strategies AI a non-exclusive, royalty-free, worldwide, perpetual, irrevocable, transferrable, sublicensable license to use, copy, perform, reproduce, display, and distribute, including to create derivative works or incorporate into other works, all Customer/Subscriber-owned data provided by Customer/Subscriber or which Customer/Subscriber makes available to Cyber Strategies AI in connection with Customer/Subscribers use of the Services (Customer/Subscriber Data”) for the limited purpose of fulfilling Cyber Strategies AIs obligations under this Agreement, including without limitation conducting research, development, usage monitoring, and other day-to-day business activities.

Usage Data

Customer/Subscriber acknowledges that Cyber Strategies AI may obtain certain usage, technical, and statistical data regarding Customer/Subscribers use of the Services and that such usage, technical, and statistical data is the sole property of Cyber Strategies AI and is not Customer/Subscriber Data. Cyber Strategies AI may use and disclose usage, technical, and statistical data without restriction.

Confidentiality

During the performance of the Services, each party may disclose (the Disclosing Party”) or receive (the Receiving Party”) information of a confidential nature that is of value to the Disclosing Party, whether written or oral, that is:

1.      marked as confidential,” or with a similar designation;

2.      identified by the Disclosing Party as confidential and/or proprietary before, during, or promptly after presentation or communication; or

3.      disclosed to (or otherwise acquired by) Receiving Party in a manner in which the Disclosing Party reasonably communicated, or the Receiving Party should reasonably have understood under the circumstances or from the nature of the information or data disclosed, that the information or materials should be treated as confidential, whether or not the specific designation confidential” or any similar designation is used (Confidential Information”).

Disclosure and Use:

          Except as provided below or with the prior written consent of the Disclosing Party, the Receiving Party will not:

1.      disclose any Confidential Information of the Disclosing Party other than on a need-to-know basis to its directors, officers, members, managers, employees, affiliates, attorneys, and contractors, solely to the extent and only for the purpose of performing or exercising the Receiving Partys rights and obligations under this Agreement;

2.      except as otherwise provided in this Agreement, use Confidential Information other than for fulfilling the obligations or exercising the rights of the Receiving Party under this Agreement;

3.      allow others to make copies of such Confidential Information except as is reasonably necessary to fulfill the Receiving Partys obligations or exercise its rights under this Agreement; or

4.      remove or export any such Confidential Information in violation of any applicable law. The Receiving Party shall treat the Confidential Information of the Disclosing Party, and will cause its directors, employees, attorneys, affiliates, and contractors to treat such Confidential Information, with at least the same degree of care and protection as it would use with respect to its own Confidential Information of a similar nature, but in no event less than reasonable care.

The obligations set forth above shall not apply with respect to the use or disclosure of information:

1.      previously known to the Receiving Party without obligation of confidence;

2.      independently developed by or for the Receiving Party without use of or access to the Disclosing Partys Confidential Information and without breaching this Agreement;

3.      acquired by the Receiving Party from a third party which is not under an obligation of confidence with respect to such information; or

4.      which is or becomes publicly available through no breach of this Agreement.

A Receiving Party may make a disclosure of Confidential Information if required either by applicable law or legal process (as a result of legal compulsion or in order to advance a defense to a claim), in response to a request by a governmental authority or in connection with a proceeding before a court, adversary proceeding, administrative proceeding, governmental or regulatory proceeding if:

1.      the Receiving Party only discloses that portion of the Confidential Information reasonably required to be disclosed; and

2.      unless prohibited by law, the Receiving Party provides reasonable notice to the Disclosing Party in advance of the disclosure so that the Disclosing Party may seek confidential treatment for the Confidential Information, a protective order or other appropriate remedy, relief or reliable assurances that confidential treatment will be afforded the information so disclosed at the sole cost and expense of the Disclosing Party or consent in writing to having the Confidential Information so produced or so disclosed (which consent will extend solely to the disclosure and production in question).

Return and Remedies

Upon the request of the Disclosing Party, or upon termination of this Agreement, Receiving Party will promptly return (or, with written permission from the Disclosing Party, destroy) all copies of any Confidential Information in its possession or control and, upon request, will acknowledge to the Disclosing Party in writing that such delivery or destruction has been fully effected. The Receiving Party acknowledges that the unauthorized disclosure or use of such Confidential Information would cause irreparable harm and significant injury, the degree of which may be difficult to ascertain. Accordingly, the Receiving Party agrees that the Disclosing Party will have the right to obtain an immediate injunction enjoining any breach of the Disclosing Partys confidentiality obligations, as well as the right to pursue any and all other rights and remedies available at law or in equity for such a breach.

Indemnification

Customer/Subscriber will defend (at Cyber Strategies AIs option), indemnify, and hold Cyber Strategies AI and its affiliates, subsidiaries, successors, assignees, owners, directors, officers, employees, contractors, representatives, and agents (collectively, Cyber Strategies AI Indemnitees”) harmless from and against any and all claims, governmental investigations, demands, actions, and proceedings, real or threatened, and all losses, judgments, awards, settlements, damages, fines, injuries, penalties, and costs (including, without limitation, reasonable attorneysfees and expenses) arising out of or related to:

1.      any breach or alleged breach of this Agreement, including the representations and warranties contained herein, by Customer/Subscriber,

2.      Customer/Subscribers negligence or misconduct, or

3.      Customer/Subscribers use of the Services or information obtained therefrom (including without limitation Customer/Subscriber transmitting or receiving communications through the Service).

If Cyber Strategies AI elects for Customer/Subscriber to provide defense, Customer/Subscriber will:

1.      obtain legal counsel reasonably acceptable to Cyber Strategies AI;

2.      permit Cyber Strategies AI to participate in the defense using separate counsel at Cyber Strategies AIs cost; and

3.      not settle any action without the prior written consent of Cyber Strategies AI (which may not be unreasonably withheld).

The foregoing indemnification obligations represent the sole indemnification protections intended, and the Parties waive all right to any other indemnification protections provided by common law, statute, or otherwise.

Warranty Disclaimer

USE OF THIS SITE AND SERVICES IS AT Customer/SubscriberS SOLE RISK. ALL MATERIALS, INFORMATION, CONTENT, PRODUCTS, SOFTWARE, PROGRAMS, AND SERVICES ARE PROVIDED "AS IS," WITH NO WARRANTIES OR GUARANTEES WHATSOEVER. Cyber Strategies AI EXPRESSLY DISCLAIMS TO THE FULLEST EXTENT PERMITTED BY LAW ALL EXPRESS, IMPLIED, STATUTORY, AND OTHER WARRANTIES, GUARANTEES, OR REPRESENTATIONS, INCLUDING, WITHOUT LIMITATION, THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT OF PROPRIETARY AND INTELLECTUAL PROPERTY RIGHTS. WITHOUT LIMITATION, Cyber Strategies AI MAKES NO WARRANTY OR GUARANTEE THAT THIS WEBSITE WILL BE UNINTERRUPTED, TIMELY, SECURE, OR ERROR-FREE.

Customer/Subscriber UNDERSTANDS AND AGREES THAT IF Customer/Subscriber DOWNLOADS OR OTHERWISE OBTAINS MATERIALS, INFORMATION, CONTENT, PRODUCTS, SOFTWARE, PROGRAMS, OR SERVICES, Customer/Subscriber DOES SO AT Customer/SubscriberS OWN DISCRETION AND RISK AND THAT Customer/Subscriber WILL BE SOLELY RESPONSIBLE FOR ANY DAMAGES THAT MAY RESULT, INCLUDING WITHOUT LIMITATION LOSS OF DATA OR DAMAGE TO Customer/SubscriberS COMPUTER SYSTEM.

SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OF WARRANTIES. IN THOSE INSTANCES, THE ABOVE EXCLUSIONS MAY NOT APPLY TO Customer/Subscriber.

Limitation of Liability

UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL OR EQUITABLE THEORY, WHETHER IN TORT, CONTRACT, STRICT LIABILITY OR OTHERWISE, SHALL Cyber Strategies AI OR ANY OF ITS EMPLOYEES, DIRECTORS, OFFICERS, AGENTS, SHAREHOLDERS, SUBSIDIARIES, OR AFFILIATES BE LIABLE TO YOU OR TO ANY OTHER PERSON FOR ANY DIRECT OR INDIRECT LOST PROFITS OR LOST BUSINESS DAMAGES, OR INDIRECT, SPECIAL, PUNITIVE, INCIDENTAL OR CONSEQUENTIAL DAMAGES OF ANY NATURE, ARISING OUT OF OR IN CONNECTION WITH THE SERVICE OR THE AGREEMENT, EVEN IF AN AUTHORIZED REPRESENTATIVE OF Cyber Strategies AI HAS BEEN ADVISED OF OR SHOULD HAVE KNOWN OF THE POSSIBILITY OF SUCH DAMAGES.

Compliance with Law

Customer/Subscriber agrees to use the Services in accordance with all applicable federal, state, and local laws and regulations and industry standards. Without limiting the generality of the foregoing, Customer/Subscriber will use the Services in compliance with the Telephone Consumer Protection Act of 1991 (TCPA”) and all regulations implementing the TCPA, other teleservices laws and regulations, and privacy and data security laws and regulations.

Customer/Subscriber acknowledges that all calls are recorded on the platform. Without limiting the generality of the foregoing, Customer/Subscriber agrees to comply with all state recording and wiretapping laws.

Customer/Subscriber bears sole responsibility for compliance with applicable laws and regulations and sole liability for any and all communications sent using the Services.

Third Party Content + Sites

The Service may contain or may interact with or otherwise be associated with third party platforms, services, plug-ins, applications, ads, tools and/or other content, and/or links to third-party websites or other services that are not owned, controlled or operated by Cyber Strategies AI (collectively, "Third Party Services"), including services operated by advertisers, licensors, licensees, and certain other third parties who may have business relationships with Cyber Strategies AI. Cyber Strategies AI may also host our content, apps and tools on Third Party Services. Cyber Strategies AI is not responsible for the content of any Third Party Services. Customer/Subscribers use of a Third Party Service linked from the Service is at Customer/Subscribers own risk and will be governed by such third party's terms and policies.

References on the Service to any names, marks, products, or services of third parties, or links to Third Party Services or information are not an endorsement, sponsorship, or recommendation of the third party, its information, products, or services. Cyber Strategies AI is not responsible for the quality or delivery of the products or services offered, accessed, obtained by or advertised at such Third Party Services. Some Third Party Services may impose fees for access to their resources through our Service and/or your account and you are responsible for all such fees. Finally, Cyber Strategies AI will under no circumstances be liable for any direct, indirect, incidental or special loss or other damage, whether arising from negligence, breach of contract, defamation, infringement of copyright or other intellectual property rights, caused by the exhibition, distribution or exploitation of any information or content contained within these Third Party Services.

You hereby grant Cyber Strategies AI an irrevocable perpetual license to use, reproduce, edit, create derivative works from, distribute, display, copy, transmit or otherwise use in any way, commercially or otherwise, any material that you post to any social networking site or other Third Party Service in connection with Cyber Strategies AI or Service.

Relationship of the Parties

The parties hereto are independent contractors. Neither party is an employee, agent, partner, or joint venture of the other. Neither party shall have the right to bind the other to any agreement with a third party or to incur any obligation or liability on behalf of the other party.

Dispute Resolution

Any dispute, controversy, or claim arising out of, relating to, or in connection with this Agreement or any breach, termination, or validity thereof (a Dispute”) shall be solely and exclusively resolved by arbitration. The demand for arbitration shall be made within a reasonable time after the Dispute has arisen, but in no event shall it be made more than one year from when the aggrieved party knew or should have known of the controversy, claim, or facts forming the basis of the Dispute. The arbitration shall be initiated and conducted according to American Arbitration Association rules and procedures for commercial arbitration, including provisions for the resolution of consumer disputes, if applicable (the Arbitration Rules”). The arbitration shall be conducted in Ada County, Idaho before a single neutral arbitrator appointed in accordance with the Arbitration Rules. Either party may bring a Dispute in small claims court in Ada County, Idaho to the extent permitted by the Arbitration Rules. If the amount in controversy is less than $10,000, the parties agree that the Dispute will be decided on the basis of written submissions without a hearing. The decision of the arbitrator will be final without an option to appeal. To the fullest extent permitted by law, the arbitrator shall not have the power to award punitive, special, consequential, or indirect damages against any party. Arbitration costs and fees shall be divided in accordance with the Arbitration Rules. Each party shall be responsible for paying its own attorneysfees, costs, and expenses, regardless of which party prevails, but a party may recover any or all expenses from another party if the arbitrator, applying applicable law, so determines. No disputes may be arbitrated on a class or representative basis, and the arbitrator may not consolidate or join the claims of other persons or parties who may be similarly situated. BY AGREEING TO THIS AGREEMENT AND USING THE SERVICES, EACH PARTY IRREVOCABLY WAIVES ANY RIGHT IT MAY HAVE TO JOIN CLAIMS OR DISPUTES WITH THOSE OF OTHERS IN THE FORM OF A CLASS ACTION, CLASS ARBITRATION, OR SIMILAR PROCEDURAL DEVICE; AND WAIVES ANY RIGHT IT MAY HAVE TO PRESENT ITS CLAIM OR DISPUTE IN A COURT OF LAW OR BEFORE A JURY. Judgment on the award rendered by the arbitrator(s), if any, may be entered for enforcement purposes in any court having jurisdiction thereof.

Security

The Company maintains a formalized information security policy to comply with various regulatory and business requirements. This security policy protects all sensitive and confidential data stored, accessed, or transmitted by our software platform, including its applications, components, infrastructure, and underlying code.

The Company has designed a risk assessment program to assess the organizations enterprise-level risk at least annually or upon significant changes to the environment. This program is designed to identify and assess threats to and vulnerabilities in systems and in service.

The Company takes responsibility for implementing appropriate technical and organizational safeguards to ensure the protection of sensitive information. Employees of the Company are required to read and accept the terms of a confidentiality agreement upon hire that states they are prohibited from disclosing any company data from the systems and system components to which they have access.

The Company maintains strict control access to restrict private information to privileged users. These users are required to abide by their assigned responsibilities related to their elevated access.

The Company has established a Data Handling, Retention, and Disposal Program to manage information in accordance with applicable laws, regulations, policies, and standards. This program establishes a formal data retention schedule and implements a data classification standard to ensure the confidential data is secured.

The Company retains sensitive and confidential data only for as long as necessary to fulfill its purposes unless otherwise required by law or to meet legal and client contractual obligations.

The Company segments its network to prevent direct or unauthorized connections between an external network and its information systems, in particular confidential data in cloud environments.

The Company maintains a vulnerability management program to ensure the confidentiality, integrity, and availability (CIA) of the organizations information systems landscape, which includes all critical system resources. The program includes internal and external scans, penetration testing, and issue remediation for the purposes of identifying, detecting, classifying, prioritizing, remediating, validating, and continuously monitoring vulnerabilities.

The Company conducts independent third-party penetration tests at least annually on any systems with Confidential data or with a critical risk rating to identify security vulnerabilities.

Governing Law

This Agreement is governed according to the laws of the State of Idaho, without regard to its conflicts of law principles. Subject to the dispute resolution process described above, all claims, disputes, and suits must be brought exclusively in the state or federal courts located in Ada County, Idaho, and the parties agree to the jurisdiction thereof.

Export Laws and International Privacy

Customer/Subscriber agrees to fully comply with all U.S. and other applicable export laws and regulations. Customer/Subscriber is not permitted to use the Services in connection with the processing of personal data of an EU, EEA, UK, or Swiss data subject or of any person located outside the United States of America.

Severability and Survivability

If a court of competent jurisdiction holds any provision of this Agreement to be contrary to law or public policy or otherwise unenforceable, the remaining provisions shall remain in full force and effect; and the invalid provision shall remain in force as reformed by the court. Portions of this Agreement which by their nature would survive termination thereof (e.g., disclaimer of warranties, limitation of liability, indemnification) shall be deemed to survive.

Waiver

No term or provision of this Agreement shall be deemed waived, and no breach consented to or excused unless such waiver, consent, or excuse is in writing and signed by the party claiming to have waived, consented, or excused. Should either party consent, waive, or excuse a breach by the other party, such shall not constitute a consent to, waiver of, or excuse of any other different or subsequent breach whether or not of the same kind as the original breach.

Miscellaneous

Each party represents and warrants to the other party that such party has the legal power to enter into this Agreement, that the signatory hereto has the authority to bind the applicable party, and this Agreement will constitute a legal, valid, and binding obligation of each party in accordance with its terms. Except for the payment of fees by Customer/Subscriber, if either party is rendered unable, wholly or in part, to carry out its obligations hereunder due to a force majeure event (i.e., act of God, strike, industrial disturbance, fire, storm, flood, epidemic/pandemic, utility failure, governmental restraint, war, or another similar event), such partys obligations under this Agreement will be suspended during the force majeure event. Customer/Subscriber agrees that ambiguities in this Agreement will not be construed against Cyber Strategies AI by attribution of drafting. Cyber Strategies AI may assign any of its rights or obligations to others at any time without notice to Customer/Subscriber. Customer/Subscriber may not assign any of its rights or obligations to others without Cyber Strategies AIs prior written consent.

Earnings Disclaimer:

Please be aware that any discussions regarding potential earnings or income through the use of conversational AI technology are estimates and speculative in nature, offering no guarantee of specific results or levels of success. Our assertions strictly concern the technical capabilities of our AI technology, without implying potential revenue, implementation outcomes, or distribution success. The effectiveness and success you realize with our technology are significantly influenced by many factors including but not limited to, your business model, execution strategies, lead sources, and other individual factors outside our purview.

Individual outcomes can vary widely, influenced by personal dedication, business acumen, expertise, and notably, the quality and effectiveness of your lead sources. We offer no assurances that examples of past earnings will be repeatable in your specific situation. Testimonials and instances of exceptional results are not indicative of average experiences and should not be interpreted as guarantees of comparable success.

Undertaking any business venture, particularly online, involves inherent risks, with outcomes that may not align with expectations. We disclaim responsibility for your decisions and the consequences of those decisions, including those related to the use of our technology. By engaging with our products and services, you recognize that achieving success is reliant upon your own efforts, decision-making, and the quality of your lead sources. You agree that our company bears no liability for any successes or failures encountered as a result of utilizing our provided conversational and other AI technology.