Last Updated March 17, 2025
1. Introduction
Welcome to Porthas! We provide a range of data recovery, cybersecurity, incident response, and digital forensics services to individuals and organizations (“Clients”). By using our services, you agree to be bound by these Terms of Service (“Terms”). These Terms establish the contractual relationship between Porthas and our clients, outlining the rights and responsibilities of both parties during and after service engagement. We encourage you to read these Terms carefully before engaging with us, as they contain important information about the nature of our services, limitations of liability, and other critical aspects of our business relationship.
2. Scope of Services
Porthas offers a comprehensive suite of cybersecurity and data recovery services designed to address the complex challenges facing modern organizations. Our incident response services provide rapid and effective assistance during cybersecurity breaches, data breaches, and other security incidents, with the goal of minimizing damage and restoring system integrity as quickly as possible. These services utilize advanced methodologies and tools developed through years of experience in handling diverse security incidents across multiple industries and technological environments.
Our incident response retainer service provides clients with prepaid access to immediate incident response capabilities, ensuring that expert assistance is available within predetermined timeframes when cybersecurity incidents occur. This proactive approach to incident management helps organizations reduce response times and minimize the potential impact of security breaches. Retainer clients receive priority handling and benefit from established communication channels and familiarity with their technical environment.
In addition to incident response, Porthas delivers customized cybersecurity consulting and training solutions tailored to meet the specific needs of individual clients. These services include risk assessments, security program development, policy creation, and specialized training for technical and non-technical staff. Our approach emphasizes practical, implementable security measures that align with each organization’s unique risk profile and business objectives.
For organizations affected by ransomware, we offer specialized recovery services designed to restore data and systems compromised by these attacks. Our ransomware recovery methodology incorporates multiple recovery approaches depending on the specific situation, technical environment, and ransomware variant involved. While complete recovery cannot be guaranteed in all circumstances, our multifaceted approach maximizes recovery potential.
Our vulnerability testing services include comprehensive assessments and penetration testing to identify and address potential security weaknesses in client systems before they can be exploited by malicious actors. These assessments utilize both automated tools and manual testing techniques to provide a thorough understanding of existing vulnerabilities and practical recommendations for remediation.
Porthas also provides in-depth digital forensics investigations to analyze and recover digital evidence from various devices and systems. Our forensic methodologies adhere to industry standards for evidence collection and preservation, ensuring that findings can be used effectively in legal proceedings when necessary. Our investigators are experienced in working with diverse digital environments and recovering evidence from damaged or compromised systems.
For data loss situations, we offer recovery services for virtually any data storage device or system, including hard drives, solid-state drives, RAID arrays, flash drives, and more. Our data recovery engineers utilize specialized equipment and techniques to recover data from physically damaged, logically corrupted, or otherwise inaccessible storage media. We approach each recovery case with multiple methodologies to maximize the chances of successful data retrieval.
Beyond these core offerings, Porthas may provide additional related services as deemed appropriate based on client needs and technological developments. We continually evolve our service offerings to address emerging threats and technological changes in the cybersecurity landscape.
3. Client Obligations
Clients engaging with Porthas must provide accurate and complete information when requesting our services. This includes detailed information related to incidents, systems involved, data recovery needs, or any other aspects relevant to the requested services. The effectiveness of our response depends significantly on the completeness and accuracy of the information provided, and withholding or misrepresenting important details may compromise service outcomes.
Throughout the service engagement, clients agree to cooperate fully with Porthas, providing necessary access, permissions, and information to facilitate service delivery. This cooperation may include granting temporary system access, supplying authentication credentials, participating in interviews or discussions about the incident or recovery needs, and responding promptly to requests for additional information or clarification. Delays in providing required access or information may impact service timeframes and outcomes.
All clients must comply with applicable laws, regulations, and industry standards related to data privacy, cybersecurity, and any other relevant legal frameworks governing the services provided by Porthas. This includes adherence to data breach notification requirements, export control regulations, evidence handling procedures, and industry-specific compliance frameworks such as HIPAA, PCI-DSS, or GDPR when applicable. Porthas cannot participate in activities that violate applicable laws, even if requested by clients.
4. Service Limitations
While Porthas employs advanced methodologies and experienced professionals, we cannot guarantee the success of every data recovery, cybersecurity, or digital forensics engagement. Service outcomes may depend on various factors beyond our control, including the extent of damage, the sophistication of attacks, the availability of backups, the cooperation of third parties, and the technical characteristics of the affected systems. We commit to transparent communication about service progress and potential limitations throughout the engagement.
In providing our services, Porthas may utilize third-party tools, software, or services as part of our methodology. While we select these tools based on their reliability and effectiveness, we cannot guarantee their continued availability, accuracy, or effectiveness in all scenarios. Changes in third-party offerings, licensing terms, or technical capabilities may occasionally impact our service delivery approaches.
5. Data Privacy and Security
Porthas prioritizes data privacy and security in all our operations. We handle and protect client data in accordance with our Privacy Policy and applicable laws governing data protection and confidentiality. All data received from clients is treated as confidential and is accessed only by personnel directly involved in service delivery on a need-to-know basis. We implement appropriate technical and organizational measures to safeguard client data throughout the service relationship.
During service delivery, Porthas may collect certain data from client systems for analysis, recovery, or forensic purposes. This data collection is limited to information necessary for the requested services and will not be used for purposes beyond the scope of the engagement without explicit client permission. We maintain detailed records of all data handling activities to ensure compliance with privacy regulations and to preserve chain of custody when applicable to forensic investigations.
6. Payment and Fees
The pricing structure for our services will be communicated to clients before engagement commences. Service fees may vary based on the type and complexity of the services requested, the urgency of response needed, the technological environment involved, and other factors specific to each client’s situation. For complex engagements, we may provide estimates based on initial assessment, with final pricing dependent on the actual scope discovered during service delivery.
Payment terms will be specified in the engagement contract or invoice provided to the client. Clients must adhere to the agreed-upon payment schedule to ensure uninterrupted service delivery. For incident response retainers, payment typically occurs before potential incidents to secure priority response capabilities. For post-incident services, payment terms may include deposits before work commences, particularly for new clients or extensive engagements.
7. Intellectual Property
Porthas retains all rights, title, and interest in any intellectual property, including proprietary tools, software, methodologies, and documentation used in the provision of services. This includes custom scripts, analytical approaches, reporting templates, and other materials developed by Porthas for service delivery. While clients receive the benefit of these resources during service engagement, they do not acquire ownership or ongoing usage rights to Porthas intellectual property unless explicitly provided through separate licensing agreements.
Reports, findings, and recommendations delivered to clients as service outcomes typically become the property of the client upon full payment for services rendered. However, Porthas retains the right to use anonymized, aggregated data derived from service engagements for research, improvement of services, threat intelligence development, and similar purposes that do not expose confidential client information.
8. Limitation of Liability
Porthas shall not be liable for any direct, indirect, incidental, consequential, or special damages arising from or related to the services provided, including but not limited to data loss, data breach, business interruption, loss of revenue, or system downtime. Our liability in any case shall not exceed the amount paid by the client for the specific services giving rise to the liability claim. This limitation applies regardless of whether potential damages were foreseeable and applies to all service categories, including incident response, data recovery, and cybersecurity consulting.
While we implement best practices and professional methodologies in all service delivery, the complexity of modern IT environments and cybersecurity threats means that absolute guarantees cannot be provided. Clients are advised to maintain appropriate insurance coverage related to cybersecurity risks and data loss scenarios as part of their overall risk management approach.
9. Governing Law and Jurisdiction
These Terms and any disputes arising from the use of our services shall be governed by the laws of the state of Ohio without regard to its conflict of law provisions. Any legal action, suit, or proceeding arising from these Terms or related to our services must be brought exclusively in the courts of the state of Ohio. Both Porthas and clients consent to this exclusive jurisdiction and venue for resolving any disputes related to these Terms or service engagements.
The unenforceability of any provision of these Terms shall not affect the enforceability of any other provision. If any provision is determined to be unenforceable, the remaining provisions shall continue in full force and effect, and the unenforceable provision shall be interpreted to reflect the original intent of the parties to the maximum extent permitted by applicable law.
10. Amendments
Porthas reserves the right to amend these Terms at any time without prior notice. Any changes will be effective immediately upon posting the updated Terms on our website. Clients engaged in ongoing services will be notified of significant changes to these Terms through email or other communication channels established during the engagement. Continued use of our services after amendments constitutes acceptance of the updated Terms.
For long-term service relationships or retainer agreements, the specific terms defined in signed contracts may supersede certain provisions of these General Terms. In case of any conflict between signed agreements and these Terms, the signed agreement provisions shall prevail for the duration of that specific engagement.
Contact Information
If you have any questions or concerns about these Terms or our services, please contact us:
By email: [email protected]
By phone: +1 (844) 969-6683