Warrant Builder
Website Terms of Use
Legal Information & NoticesPLEASE READ THESE TERMS OF USE CAREFULLY BEFORE USING THIS SITE.
Effective Date: 11/29/2025
1. Acceptance of Terms
By accessing or using this website or any Warrant Builder services, you agree to these Terms of Use and all referenced documents. If you do not agree, do not use the services.
2. Changes to Terms
We may update these Terms of Use. We will provide notice of material changes related to security, data handling, privacy, or service availability before the updated terms take effect.
3. Definitions
“You” and “your” refer to the user or customer.
“We,” “us,” and “our” refer to Maverick Data Systems and Warrant Builder.
“Services” means any software, website, or system we provide.
4. Use of Services
Users must maintain strong passwords and protect login credentials.
Multi-factor authentication must be used when enabled.
Users are responsible for reviewing and managing access within their organization.
5. User Content and Ownership
You retain ownership of all documents, data, and content you upload or generate through the service.
You grant us a limited right to process this data to operate the service, deliver support, improve performance, ensure security, and meet legal obligations.
You may export your data upon request. When an account closes, we delete customer data according to our Data Retention and Deletion Policy.
6. Privacy and Data Handling
Our Privacy Policy explains how we collect and use personal information.
We process personal data as a data processor when applicable and will follow a written Data Processing Addendum when required.
We maintain safeguards designed to protect data, including encryption in transit and encryption at rest.
7. Security Commitments
We maintain an information security program that includes:
• Encryption in transit
• Encryption at rest
• Multi-factor authentication for administrative access
• Role-based access controls
• Background checks for employees with production access
• Logging and monitoring of system access
• Regular vulnerability scanning
• Incident response procedures
• Vendor security reviews
We will notify customers of a confirmed security incident involving their data without unreasonable delay, consistent with applicable law.
8. Service Availability
We take reasonable steps to maintain service availability.
We maintain backups and continuity procedures designed to support uptime.
Scheduled maintenance will be announced in advance when practical.
We do not guarantee uninterrupted service.
9. Acceptable Use
Users may not attempt unauthorized access, probe security controls, or interfere with the service.
Users may not upload malware or store illegal content.
Users may not misuse the service in any way that violates law or harms others.
10. Third-Party Services and Vendors
We rely on third-party providers for hosting and supporting infrastructure.
We assess these providers for security and require safeguards before allowing them to process customer data.
A list of sub-processors is available upon request.
11. Changes and Updates to the Service
We may update or modify the service. Significant changes that affect data handling or security controls will be communicated to customers when reasonably possible.
12. Termination
Either party may terminate use of the service.
Upon termination, you may request a data export.
Data is deleted following our Data Retention and Deletion Policy except where law requires longer retention.
13. Disclaimers
The services are provided on an “as is” and “as available” basis.
We disclaim all warranties to the fullest extent permitted by law.
This does not limit our responsibilities under any required data protection agreements.
14. Limitation of Liability
To the fullest extent permitted by law, our liability is limited as stated here.
These limits do not apply to confidentiality breaches caused by gross negligence or willful misconduct.
15. Indemnification
You agree to indemnify us against claims arising from your misuse of the services.
16. Governing Law
These terms are governed by the laws of the State of Wyoming unless otherwise required by applicable law. You are solely responsible for ensuring that your use of our SaaS (Software as a Service) complies with all applicable laws and regulations within your own state, jurisdiction, and location. We make no representations that our service is appropriate or available for use in all locations. The responsibility for ensuring legal compliance for your specific use case, including data privacy, content restrictions, and service utilization limits, rests entirely with you as the user. By using our service, you agree to comply with all relevant local, state, federal, and international laws.
17. Contact Information
For any questions about these Terms of Use, contact:
Maverick Data Systems
Email: contact@maverickdatasystems.com
