Legal
Terms of Service
These Terms govern the use of the Customer Delivery Portal for managing cybersecurity engagements, project workflows, vulnerability tracking, remediation, and reporting.
Effective date: April 23, 2026
1. Acceptance of Terms
By accessing or using this portal, you agree to these Terms and any applicable organization policies. If you do not agree, do not use the service.
2. Authorized Use
You may use the portal only for lawful business and security operations. You must not misuse, disrupt, reverse engineer, or attempt unauthorized access to the platform, its APIs, or other tenant data.
3. Accounts and Credentials
You are responsible for safeguarding account credentials and MFA codes. You must immediately report any unauthorized access or suspected credential compromise to your administrator.
4. Role-Based Permissions
Access and functionality are controlled by role assignments and tenant context. Actions performed through your account are attributable to your account and role.
5. Customer and Engagement Data
You retain responsibility for the legality, accuracy, and appropriateness of submitted project, vulnerability, and evidence data. Do not upload prohibited or unlawful content.
6. Availability and Changes
We may modify, update, suspend, or discontinue features as needed for security, maintenance, or product evolution. Planned changes may occur without prior notice unless contractually required.
7. Disclaimers
The service is provided on an "as is" and "as available" basis to the maximum extent permitted by law. No guarantee is made that the service will be uninterrupted, error-free, or suitable for every use case.
8. Limitation of Liability
To the extent permitted by law and contract, we are not liable for indirect, incidental, special, consequential, or punitive damages arising from service use.
9. Termination
Access may be suspended or terminated for policy violations, unauthorized use, security risks, or contractual changes.
10. Governing Terms
These Terms are supplemented by applicable master agreements, statements of work, and organization-level security policies. In case of conflict, executed contractual terms prevail.