top of page
Abstract Digital Wave

Legal Notice
 

This Legal Notice outlines the terms, policies, and conditions governing the use of Safe & Secure Cyber Solutions (“SYSCS”) services and website. By using our services, you agree to the terms described below.

TERMS OF SERVICE

SYSCS 

Effective Date: 2-13-2026

 

1. Services

Safe & Secure Cyber Solutions (“SYSCS”) provides preventative cybersecurity services, including network-level threat filtering, endpoint protection, and security reporting. Services are designed to reduce risk but cannot guarantee complete protection against all cyber threats.

 

2. No Surveillance or Content Monitoring

SYSCS does not read, record, or monitor private communications, including messages, emails, voice calls, or content. SYSCS services operate at the network and security-metadata level only.

3. Client Responsibilities

Clients are responsible for:

  • Proper installation and configuration of devices

  • Ensuring authorized use of services

  • Compliance with all applicable local, state, and federal laws

  • Parental or organizational consent where required

 

4. Third-Party Infrastructure

SYSCS utilizes secure third-party infrastructure providers, including enterprise-grade cloud and security platforms (including providers such as Zorus), operating under audited compliance standards.

5. No Guarantee

SYSCS does not warrant that services will detect or prevent all cyber threats, inappropriate content, or unauthorized activity.

6. Limitation of Liability

To the maximum extent permitted by law, SYSCS shall not be liable for indirect, incidental, or consequential damages arising from use of its services.

7. Billing & Cancellation

Services are offered on month-to-month or annual terms as selected. Clients may cancel according to the cancellation policy stated at signup.

8. Governing Law

These Terms are governed by the laws of the State of Texas.

PRIVACY POLICY

(Plain-English, Parent-Friendly)


Your Privacy Matters

SYSCS is committed to protecting privacy while delivering effective cybersecurity.
 

Information We Collect

  • Account and contact information

  • Device and network security metadata

  • Website category access attempts (frequency and duration)


Information We DO NOT Collect

  • ❌ Message content

  • ❌ Chat logs or call recordings

  • ❌ Keystrokes or screen recordings

  • ❌ Personal conversations


How Data Is Used

  • To block harmful or risky online destinations

  • To identify security trends and patterns

  • To provide clear, high-level activity reports


Data Storage & Security

Data is stored using secure, enterprise-grade cloud infrastructure with encryption, access controls, and audit logging.


Data Sharing

SYSCS does not sell or share personal data for advertising or marketing purposes.


Data Retention

Data is retained only as long as necessary to provide services and meet legal obligations.


Questions

Privacy inquiries may be sent to:
support@syscsusa.com

ACCEPTABLE USE POLICY

(Very important for protection)


Purpose

SYSCS services must be used ethically, legally, and responsibly.
 

Acceptable Use

Clients agree to:

  • Use services for lawful purposes only

  • Obtain appropriate consent for monitoring minors or employees

  • Use data for safety, compliance, and protection—not punishment or harassment


Prohibited Use

Clients may not:

  • Conduct unlawful surveillance

  • Harass, intimidate, or discriminate

  • Attempt to bypass security controls

  • Use SYSCS services to violate privacy laws


Enforcement

SYSCS reserves the right to suspend or terminate services if misuse is identified.

DISCLAIMER

SYSCS provides preventative cybersecurity services designed to reduce risk. No system can guarantee complete protection against all online threats. SYSCS does not monitor private communications or content.

Contact SYSCS

512-910-5336

support@syscsusa.com

Serving TEXAS and Clients Nation Wide

Get Cybersecurity Tips & Alerts

Follow Us On:

  • Facebook
  • X

© 2026 Safe & Secure Cyber Solutions. All rights reserved.
Governing Law: State of Texas.

Get Your Free Cybersecurity Assessment

Find out where your home or business may be exposed — no obligation, no pressure.
bottom of page