-
Notifications
You must be signed in to change notification settings - Fork 2
Expand file tree
/
Copy pathterms.html
More file actions
1293 lines (1230 loc) · 51.2 KB
/
terms.html
File metadata and controls
1293 lines (1230 loc) · 51.2 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
<!doctype html>
<html lang="en">
<head>
<meta charset="utf-8" />
<title>XposedOrNot Terms and Conditions | Service Agreement</title>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
<meta http-equiv="X-UA-Compatible" content="IE=edge" />
<meta
name="viewport"
content="width=device-width, maximum-scale=5.0, initial-scale=1.0"
/>
<meta
name="description"
content="Terms and conditions for using XposedOrNot's data breach monitoring and alerting service. Clear guidelines for free and premium services."
/>
<meta
name="keywords"
content="terms of service, user agreement, data breach monitoring, XposedOrNot terms"
/>
<meta name="author" content="Devanand Premkumar" />
<link rel="icon" href="/favicon.ico" sizes="16x16 32x32 48x48 64x64 128x128 256x256" type="image/x-icon" />
<link rel="icon" href="/static/images/logos/logo.svg" type="image/svg+xml" />
<link rel="icon" href="/static/images/logos/logo-96x96.png" sizes="96x96" type="image/png" />
<link rel="icon" href="/static/images/logos/logo-32x32.png" sizes="32x32" type="image/png" />
<link rel="icon" href="/static/images/logos/logo-192x192.png" sizes="192x192" type="image/png" />
<link rel="icon" href="/static/images/logos/logo-512x512.png" sizes="512x512" type="image/png" />
<link rel="apple-touch-icon" href="/static/images/logos/logo-180x180.png" />
<link rel="dns-prefetch" href="cdnjs.cloudflare.com" />
<link rel="dns-prefetch" href="static.hotjar.com" />
<link rel="preconnect" href="https://fonts.gstatic.com" />
<meta property="og:title" content="XposedOrNot Terms and Conditions" />
<meta
property="og:description"
content="Terms and conditions for using XposedOrNot's data breach monitoring service."
/>
<meta
property="og:image"
content="https://xposedornot.com/static/images/xon.png"
/>
<meta property="og:image:alt" content="XposedOrNot Logo" />
<meta property="og:url" content="https://xposedornot.com/terms" />
<meta property="og:type" content="website" />
<meta property="og:site_name" content="XposedOrNot" />
<meta name="twitter:card" content="summary_large_image" />
<meta name="twitter:site" content="@XposedOrNot" />
<meta name="twitter:creator" content="@DevaOnBreaches" />
<meta name="twitter:title" content="XposedOrNot Terms and Conditions" />
<meta
name="twitter:description"
content="Terms and conditions for using XposedOrNot's data breach monitoring service."
/>
<meta
name="twitter:image"
content="https://xposedornot.com/static/images/xon.png"
/>
<link href="/static/css/style-new.css" type="text/css" rel="stylesheet" />
<link
rel="stylesheet"
href="https://cdnjs.cloudflare.com/ajax/libs/bootstrap/4.6.2/css/bootstrap.min.css"
integrity="sha512-rt/SrQ4UNIaGfDyEXZtNcyWvQeOq0QLygHluFQcSjaGB04IxWhal71tKuzP6K8eYXYB6vJV4pHkXcmFGGQ1/0w=="
crossorigin="anonymous"
referrerpolicy="no-referrer"
/>
<link
href="https://unpkg.com/boxicons@2.1.2/css/boxicons.min.css"
rel="stylesheet"
/>
<link
rel="stylesheet"
href="https://cdnjs.cloudflare.com/ajax/libs/font-awesome/5.8.2/css/all.min.css"
integrity="sha256-BtbhCIbtfeVWGsqxk1vOHEYXS6qcvQvLMZqjtpWUEx8"
crossorigin="anonymous"
/>
<link
rel="stylesheet"
href="https://fonts.googleapis.com/css?family=Poppins%3A300%2C400%2C500%2C600%2C700%2C900&subset&display=swap"
type="text/css"
media="all"
/>
<link rel="author" href="humans.txt" />
<style>
#banner {
min-height: 150px !important;
padding-bottom: 30px;
}
.terms-content {
background-color: white;
padding: 60px 0;
}
.terms-section {
max-width: 900px;
margin: 0 auto;
padding: 0 15px;
}
.terms-section h2 {
color: #3f71f3;
margin-bottom: 20px;
font-size: 1.8em;
font-weight: 600;
}
.terms-section h3 {
color: #3f71f3;
margin-top: 40px;
margin-bottom: 15px;
font-size: 1.4em;
font-weight: 600;
}
.terms-section p {
line-height: 1.8;
margin-bottom: 20px;
text-align: justify;
font-size: 1.05em;
}
.terms-section ul {
line-height: 1.8;
margin-bottom: 20px;
padding-left: 25px;
}
.terms-section ul li {
margin-bottom: 10px;
}
.terms-section ul li a {
white-space: nowrap;
}
.terms-section ol {
line-height: 1.8;
margin-bottom: 20px;
padding-left: 25px;
}
.terms-section ol li {
margin-bottom: 15px;
}
.highlight-box {
background-color: #f0f4ff;
border-left: 4px solid #3f71f3;
padding: 20px;
margin: 25px 0;
border-radius: 5px;
}
.important-notice {
background-color: #fff3cd;
border-left: 4px solid #ffc107;
padding: 20px;
margin: 25px 0;
border-radius: 5px;
}
.last-updated {
color: #666;
font-style: italic;
font-size: 0.9em;
margin-bottom: 30px;
}
/* Dark mode styles */
[data-theme="dark"] .terms-content {
background-color: #1a1a1a;
}
[data-theme="dark"] .terms-section h2,
[data-theme="dark"] .terms-section h3 {
color: #5c8aff;
}
[data-theme="dark"] .terms-section p,
[data-theme="dark"] .terms-section li {
color: #e0e0e0;
}
[data-theme="dark"] .highlight-box {
background-color: #2a2a4a;
border-left-color: #5c8aff;
color: #e0e0e0;
}
[data-theme="dark"] .important-notice {
background-color: #3a3020;
border-left-color: #ffc107;
color: #e0e0e0;
}
[data-theme="dark"] .last-updated {
color: #999;
}
[data-theme="dark"] .contact-card {
background: #2a2a4a !important;
}
[data-theme="dark"] .contact-card h4 {
color: #5c8aff !important;
}
[data-theme="dark"] .contact-card a {
color: #5c8aff !important;
}
@media (max-width: 768px) {
.terms-section h2 {
font-size: 1.5em;
}
.terms-section h3 {
font-size: 1.2em;
}
.terms-section p {
font-size: 1em;
}
}
</style>
<meta name="robots" content="index, follow" />
<meta name="theme-color" content="#3f71f3" />
<style>
@font-face {
font-family: "Font Awesome 5 Free";
font-style: normal;
font-weight: 400;
font-display: swap;
src: url("https://cdnjs.cloudflare.com/ajax/libs/font-awesome/5.8.2/webfonts/fa-regular-400.woff2") format("woff2");
}
@font-face {
font-family: "Font Awesome 5 Free";
font-style: normal;
font-weight: 900;
font-display: swap;
src: url("https://cdnjs.cloudflare.com/ajax/libs/font-awesome/5.8.2/webfonts/fa-solid-900.woff2") format("woff2");
}
@font-face {
font-family: "Font Awesome 5 Brands";
font-style: normal;
font-weight: normal;
font-display: swap;
src: url("https://cdnjs.cloudflare.com/ajax/libs/font-awesome/5.8.2/webfonts/fa-brands-400.woff2") format("woff2");
}
</style>
</head>
<body data-spy="scroll" data-target=".menu" data-offset="50">
<div class="xon">
<div class="searchMe">
<div class="banner" id="banner">
<canvas id="canvas"></canvas>
<div class="grid">
<nav
class="navbar navbar-expand-md navbar-dark justify-content-center"
>
<a
class="navbar-brand abs"
href="/"
style="text-decoration: none"
>
<span
style="
font-size: 1.5em;
font-weight: bold;
display: block;
color: white;
"
>XposedOrNot</span
>
<span
style="
font-size: 0.8em;
display: block;
color: white;
opacity: 0.85;
margin-top: -10px;
"
>Community Edition</span
>
</a>
<button
class="navbar-toggler"
type="button"
data-toggle="collapse"
data-target="#collapsingNavbar"
>
<span class="navbar-toggler-icon"></span>
</button>
<div class="navbar-collapse collapse" id="collapsingNavbar">
<ul class="navbar-nav ml-auto">
<li class="nav-item active px-4">
<a class="nav-link" href="password.html">Password</a>
</li>
<li class="nav-item active px-4">
<a class="nav-link" href="faq.html">FAQ</a>
</li>
<li class="nav-item active px-4">
<a
class="nav-link"
href="https://plus.xposedornot.com"
target="_blank"
>xonPlus</a
>
</li>
<li class="nav-item active px-4">
<a class="nav-link" href="api_doc.html">API</a>
</li>
<li class="nav-item active dropdown px-4">
<a
aria-expanded="false"
class="nav-link dropdown-toggle"
data-toggle="dropdown"
href="#"
id="navbarDropdownMenuLink"
role="button"
>
Language <i class="fas fa-caret-down"></i
></a>
<style>
.dropdown-toggle::after {
display: none;
}
</style>
<div
aria-labelledby="navbarDropdownMenuLink"
class="dropdown-menu"
>
<a class="dropdown-item" href="/zh/">中文 (Chinese)</a>
<a class="dropdown-item" href="/es/">Español (Spanish)</a>
<a class="dropdown-item" href="/hi/">हिन्दी (Hindi)</a>
<a class="dropdown-item" href="/bn/">বাংলা (Bengali)</a>
<a class="dropdown-item" href="/pt/"
>Português (Portuguese)</a
>
<a class="dropdown-item" href="/ru/">Русский (Russian)</a>
<a class="dropdown-item" href="/ja/">日本語 (Japanese)</a>
<a class="dropdown-item" href="/de/">Deutsch (German)</a>
<a class="dropdown-item" href="/ta/">தமிழ் (Tamil)</a>
</div>
</li>
</ul>
</div>
</nav>
</div>
</div>
</div>
<div class="terms-content">
<div class="container terms-section">
<h2 align="center">Terms and Conditions</h2>
<p align="center" class="last-updated">Last Updated: October 2025</p>
<div class="highlight-box">
<p style="margin: 0">
<strong>Welcome to XposedOrNot!</strong><br />
These terms explain how you can use our service and what we expect
from you. We've written them in plain English to make them easy to
understand. For details on how we handle your data, visit our
<a href="transparency" style="color: #3f71f3"
>Transparency Report</a
>.
</p>
</div>
<h3>1. Agreement to Terms</h3>
<p>
By accessing or using <strong>XposedOrNot</strong> (including this
website, our API, mobile applications, or any related services), you
enter into a binding agreement and accept these terms in full. If
you disagree with any part of these terms, you must discontinue use
of our service immediately.
</p>
<p>
We reserve the right to modify these terms periodically to reflect
changes in our services, legal requirements, or operational
practices. When we make significant changes that materially affect
your rights or obligations, we'll post a prominent notice on the
website at least 14 days before the changes take effect. Your
continued use of our service after such changes become effective
constitutes your acceptance of the modified terms.
</p>
<h3>2. What We Provide</h3>
<p>
<strong>XposedOrNot</strong> is a comprehensive data breach
monitoring and alerting service designed to help individuals and
organizations stay informed about data security incidents. Our
service includes:
</p>
<ul>
<li>
Email breach lookups that allow you to check if your email address
has appeared in any known data breaches in our database
</li>
<li>
Continuous monitoring for new breaches affecting your email
address or your organization's verified and validated domains
</li>
<li>
Automated alerts delivered via email when your information appears
in newly discovered or reported breaches, enabling you to take
timely protective action
</li>
<li>
Comprehensive breach information including affected data types,
breach dates, and security insights to help you understand the
scope and impact
</li>
<li>
API access for programmatic integration, allowing developers and
organizations to incorporate breach data into their own security
workflows and applications
</li>
<li>
Domain monitoring tools for organizations to track breach exposure
across their entire email infrastructure
</li>
</ul>
<p>
We offer both free community tools accessible to everyone and
premium features with enhanced capabilities. The availability of
specific features depends on your service level, with premium
subscriptions providing additional functionality, higher rate
limits, and priority support.
</p>
<h3>3. Your Account and Responsibilities</h3>
<p>
Certain features of our service, including email alerts, domain
monitoring, and premium tools, require you to create an account.
When you register and use an account, you accept the following
responsibilities:
</p>
<ul>
<li>
Provide accurate, current, and complete information during the
registration process, and maintain the accuracy of this
information throughout your use of the service. This includes
keeping your contact email address up to date.
</li>
<li>
Maintain the security and confidentiality of your account
credentials, particularly API keys if you use our API services.
Treat these credentials as sensitive and never share them publicly
or embed them in client-side code.
</li>
<li>
Refrain from sharing your account access with others or allowing
unauthorized use of your account. Each account is intended for use
by a single individual or organization as specified during
registration.
</li>
<li>
Accept full responsibility for all activities that occur under
your account, whether or not you personally authorized such
activities. You are accountable for any actions taken using your
credentials.
</li>
<li>
Notify us immediately at
<strong>deva[@]xposedornot.com</strong> if you suspect any
unauthorized access to your account, discover your API keys have
been exposed, or become aware of any security breach related to
your account.
</li>
</ul>
<h3>4. Acceptable Use</h3>
<p>
To maintain a safe, fair, and legal service for all users, you agree
NOT to engage in the following activities:
</p>
<ul>
<li>
Use the service for any illegal purpose, to facilitate unlawful
activities, or to cause harm to others. This includes using breach
data for harassment, extortion, or unauthorized access to
accounts.
</li>
<li>
Attempt to access data you're not authorized to view, including
trying to bypass access controls, authentication mechanisms, or
privacy protections.
</li>
<li>
Scrape, harvest, or collect breach data in bulk without explicit
written permission. Automated bulk collection violates our terms
and places undue strain on our infrastructure.
</li>
<li>
Intentionally overload our systems, attempt denial-of-service
attacks, or engage in any activity designed to disrupt service
availability for other users.
</li>
<li>
Resell, redistribute, or sublicense our breach data without
explicit written authorization. Commercial use of our data
requires a proper licensing agreement.
</li>
<li>
Use automated tools, scripts, or bots to abuse our free tier
services or circumvent rate limits, API restrictions, or usage
quotas.
</li>
<li>
Impersonate other users, organizations, or
<strong>XposedOrNot</strong> staff, or misrepresent your
affiliation with any entity.
</li>
<li>
Upload malware, viruses, malicious code, or any content designed
to compromise the security of our service or other users.
</li>
<li>
Engage in activity that violates the privacy rights of individuals
whose information appears in breach data, including using the data
for unsolicited marketing or spam.
</li>
</ul>
<p>
We reserve the right to suspend or terminate accounts that violate
these rules, and we may report serious violations to law enforcement
authorities when appropriate. While our codebase is open source and
available for review, our infrastructure, data, and services remain
subject to these acceptable use restrictions.
</p>
<h3>5. API Usage</h3>
<p>
Our API provides programmatic access to breach data for developers
and organizations. If you use our API, you must comply with these
additional requirements:
</p>
<ul>
<li>
Strictly adhere to the rate limits specified in our API
documentation. These limits are in place to ensure fair access and
system stability for all users
</li>
<li>
Do not attempt to circumvent usage restrictions, rate limits, or
access controls through technical means such as using multiple API
keys, rotating IP addresses, or any other method
</li>
<li>
Provide clear attribution to <strong>XposedOrNot</strong> when
displaying our breach data in your applications, websites, or
services. This helps users understand the source of the
information
</li>
<li>
Understand that we may modify API endpoints, adjust rate limits,
or change available features with reasonable advance notice to
maintain service quality and security
</li>
<li>
Be aware that certain premium API features with higher rate limits
or additional functionality may require a paid subscription
</li>
</ul>
<h3>6. Intellectual Property</h3>
<p>
<strong>XposedOrNot</strong> is an open-source project, and we
actively encourage community participation and contributions.
However, certain intellectual property rights are retained:
</p>
<ul>
<li>
Our source code is publicly available on GitHub and is licensed
under the terms specified in the repository. You are free to
review, modify, and contribute to the code in accordance with that
license.
</li>
<li>
The <strong>XposedOrNot</strong> name, logo, branding elements,
and visual design are our intellectual property and may not be
used without permission to create competing services or in ways
that could cause confusion about affiliation or endorsement.
</li>
<li>
Breach data in our database comes from various public sources and
is aggregated for the public benefit. While the underlying breach
data is not our creation, our database compilation, organization,
and presentation represent substantial effort and investment.
</li>
<li>
You may not claim ownership of our service, rebrand it as your
own, or create substantially similar services using our brand
identity in a manner that causes marketplace confusion.
</li>
<li>
As an open-source project, we welcome forks and derivative works
of our code, provided they comply with our software license and do
not misuse our trademarks or brand identity.
</li>
</ul>
<h3>7. Privacy and Data</h3>
<p>
Your privacy is fundamental to our service. We believe in complete
transparency about how we handle your personal information and have
designed our systems with privacy as a core principle:
</p>
<ul>
<li>
We collect only the minimum data absolutely necessary to provide
our service effectively. We do not collect extraneous information
or data that doesn't serve a direct purpose for the functionality
you're using.
</li>
<li>
We never sell your personal information to third parties, data
brokers, or advertisers. Your privacy is not for sale, and your
data will not become a revenue stream.
</li>
<li>
Search queries are processed in memory and are not stored in any
identifiable form that could be linked back to you. We do not
maintain logs of what email addresses you search for.
</li>
<li>
Email alert subscriptions require us to store your email address
so we can send you notifications. You maintain full control and
can unsubscribe at any time through the link in every alert email
or through your account settings.
</li>
<li>
For domain monitoring features, organizations that verify domain
ownership receive breach information for email addresses within
those domains. This is done with proper authorization and serves
the legitimate security interests of the organization.
</li>
<li>
Read our comprehensive
<a href="privacy" style="color: #3f71f3">Privacy Policy</a> and
<a href="transparency" style="color: #3f71f3"
>Transparency Report</a
>
for complete details on our data collection practices, security
measures, and legal compliance.
</li>
</ul>
<h3>8. Accuracy and Limitations</h3>
<div class="important-notice">
<strong>Important Notice:</strong> While we make every reasonable
effort to provide accurate and timely information, our service
operates within inherent limitations that all users should
understand before relying on our data.
</div>
<ul>
<li>
We can only report on data breaches that have been publicly
disclosed or that we have received through our sources. Many
breaches remain unreported, undiscovered, or are kept confidential
under legal agreements. The absence of a result does not mean your
data has never been compromised.
</li>
<li>
Breach data may be incomplete, outdated, or contain inaccuracies
inherited from the original source. We aggregate data from various
sources, and we cannot guarantee the completeness or accuracy of
every data point.
</li>
<li>
While we verify major breaches, we do not have the resources to
independently verify every single data breach reported in our
system. We rely substantially on the security research community
and public disclosures.
</li>
<li>
A search result showing no breaches does not guarantee that your
information has never been compromised. It only indicates that we
have no record of breaches affecting the searched identifier in
our current database.
</li>
<li>
Our service is designed to be one tool in your overall security
strategy, not a complete security solution. You should employ
multiple security measures including using strong, unique
passwords for each account, enabling two-factor authentication
wherever available, and using a reputable password manager to
securely store your credentials.
</li>
</ul>
<h3>9. No Warranties</h3>
<p>
Our service is provided on an "as is" and "as available" basis
without warranties of any kind, whether express or implied,
including but not limited to warranties of merchantability, fitness
for a particular purpose, or non-infringement. Specifically, we do
not guarantee:
</p>
<ul>
<li>
That the service will be available at all times, be uninterrupted,
or operate without errors. Maintenance, technical issues, or
circumstances beyond our control may cause temporary disruptions.
</li>
<li>
That all data breaches affecting your information will be
detected, reported, or included in our database. Our coverage
depends on public disclosure and source availability.
</li>
<li>
That the information provided is 100% accurate, complete, current,
or free from errors. Data quality depends on our sources and the
inherent challenges of breach data aggregation.
</li>
<li>
That using our service will prevent future security incidents,
identity theft, or unauthorized access to your accounts. Our
service is informational and does not provide active protection.
</li>
</ul>
<p>
While we strive to provide a reliable and useful service, technology
has inherent limitations and unexpected issues can occur despite our
best efforts.
</p>
<h3>10. Limitation of Liability</h3>
<p>
To the maximum extent permitted by applicable law, our liability is
limited as follows:
</p>
<ul>
<li>
We are not liable for any indirect, incidental, consequential,
special, or punitive damages arising from your use of the service,
including but not limited to loss of profits, data, business
opportunities, or reputation.
</li>
<li>
We are not responsible for damages resulting from service outages,
interruptions, data inaccuracies, incomplete breach coverage, or
unauthorized access to accounts that results from your failure to
maintain security.
</li>
<li>
We are not liable for actions you take or fail to take based on
information obtained through our service. You are solely
responsible for how you respond to breach notifications and
security information.
</li>
<li>
These limitations apply regardless of the legal theory on which
your claim is based, whether contract, tort, negligence, strict
liability, or otherwise.
</li>
</ul>
<p>
These limitations do not affect any mandatory consumer rights you
may have under applicable law that cannot be contractually waived or
limited. Some jurisdictions do not allow certain liability
exclusions, so some of these limitations may not apply to you.
</p>
<h3>11. Premium Services and Payments</h3>
<p>
We offer premium features and subscriptions that provide enhanced
functionality, higher rate limits, and additional tools. The
following terms apply to all paid services:
</p>
<ul>
<li>
All pricing information is displayed transparently before
purchase, including any applicable taxes or fees. You will always
know the exact cost before completing a transaction.
</li>
<li>
Subscriptions automatically renew at the end of each billing
period (monthly, annually, etc.) using your payment method on
file, unless you cancel before the renewal date.
</li>
<li>
You may cancel your subscription at any time through your account
settings. Cancellation takes effect at the end of the current
billing period, and you will retain access to premium features
until that time.
</li>
<li>
Refund requests are evaluated on a case-by-case basis. While we
aim to be fair and reasonable, refunds are not guaranteed and
depend on factors such as usage and the reason for the request.
</li>
<li>
We reserve the right to modify pricing for our services. Existing
subscribers will receive at least 30 days advance notice before
any price changes take effect, and you may cancel before the new
pricing applies.
</li>
<li>
Failed or declined payments may result in immediate suspension of
premium features. You will be notified of payment issues and given
an opportunity to update your payment information.
</li>
</ul>
<h3>12. Service Availability</h3>
<p>
While we strive to maintain reliable and consistent service
availability, there are important limitations to understand:
</p>
<ul>
<li>
We may perform scheduled or emergency maintenance that temporarily
affects service availability. Where possible, we will provide
advance notice of planned maintenance windows.
</li>
<li>
We are not responsible for service downtime, degraded performance,
or interruptions caused by factors beyond our reasonable control,
including but not limited to internet outages, cloud provider
issues, DDoS attacks, or force majeure events.
</li>
<li>
You can monitor current service status and view historical uptime
data on our
<a
href="https://stats.uptimerobot.com/3zjQkZ2Caa"
target="_blank"
rel="noopener"
style="color: #3f71f3"
>Status Page</a
>, which provides real-time information about system health and
ongoing incidents.
</li>
<li>
We reserve the right to temporarily suspend service to specific
users who violate these terms, exhibit abusive usage patterns, or
pose a security risk to our infrastructure or other users.
</li>
<li>
While we work to maintain high availability, we do not guarantee
any specific uptime percentage or service level agreement (SLA)
for free tier users. Premium subscribers may have specific SLA
terms outlined in their subscription agreement.
</li>
</ul>
<h3>13. Termination</h3>
<p>
You have the right to stop using our service at any time, for any
reason, without penalty:
</p>
<ul>
<li>
You may close your account permanently through your account
settings. Account closure deletes your profile information, though
anonymized usage data may be retained for statistical purposes.
</li>
<li>
You can unsubscribe from email alerts at any time using the
unsubscribe link included in every alert email, or by adjusting
your preferences in your account settings.
</li>
</ul>
<p>
We also reserve certain rights regarding service termination and
account management:
</p>
<ul>
<li>
We may suspend or terminate accounts that violate these terms,
engage in abusive behavior, or pose a security risk to our service
or other users. Where possible, we will provide notice and an
opportunity to remedy the violation.
</li>
<li>
We reserve the right to discontinue the service entirely, in whole
or in part, with reasonable advance notice to give users time to
export their data or make alternative arrangements.
</li>
</ul>
<h3>14. Third-Party Services</h3>
<p>
Our service may contain links to, integrate with, or reference
third-party websites, services, or resources. Your interactions with
these third parties are governed by separate terms:
</p>
<ul>
<li>
We are not responsible for the content, accuracy, availability,
privacy practices, or policies of third-party services. We do not
endorse or make any representations about third-party services
merely by linking to them.
</li>
<li>
Third-party services operate under their own independent terms of
service and privacy policies. You should review these documents
before using any third-party service.
</li>
<li>
Any data you share with third-party services is governed by their
privacy policies, not ours. We cannot control how third parties
handle your information.
</li>
<li>
You use third-party services at your own risk. We are not liable
for any damage or loss caused by your interactions with
third-party services accessed through or in connection with our
platform.
</li>
<li>
If you choose to integrate our service with third-party
applications or tools, you are responsible for ensuring such
integrations comply with both our terms and the third party's
terms.
</li>
</ul>
<h3>15. Community Contributions</h3>
<p>
As an open-source project, we actively welcome and encourage
community contributions. If you choose to contribute to
<strong>XposedOrNot</strong>, the following terms apply:
</p>
<ul>
<li>
You retain ownership and copyright of your original contributions.
We do not claim ownership of code, documentation, or other
materials you submit.
</li>
<li>
By contributing, you grant <strong>XposedOrNot</strong> and its
users a perpetual, worldwide, non-exclusive, royalty-free license
to use, modify, distribute, and incorporate your contribution into
the project under the project's open-source license.
</li>
<li>
You represent that you have the legal right to grant this license
and that your contribution does not infringe on the intellectual
property rights of others or violate any applicable laws.
</li>
<li>
Contributors should follow our contribution guidelines available
on GitHub, including code style conventions, documentation
requirements, and the pull request process.
</li>
<li>
We reserve the right to accept or reject contributions at our
discretion based on factors including code quality, alignment with
project goals, security considerations, and maintenance burden.
</li>
<li>
Contributors may be publicly credited for their work in release
notes, documentation, or project acknowledgments, though such
attribution is not guaranteed for all contributions.
</li>
</ul>
<h3>16. Dispute Resolution</h3>
<p>
We believe most disputes can be resolved through open communication.
If you have concerns about our service, we encourage the following
process:
</p>
<ul>
<li>
Contact us first at
<!--email_off--><a href="mailto:deva@xposedornot.com" style="color: #3f71f3"
><strong>deva[@]xposedornot.com</strong></a
><!--/email_off-->
with a clear description of your issue. We respond to good-faith
inquiries and complaints promptly.
</li>
<li>
We will work with you in good faith to understand your concerns
and reach a fair resolution. Our goal is to address issues
constructively rather than through adversarial processes.
</li>
<li>
Most problems can be resolved through friendly, professional
communication. We value our community and want to maintain
positive relationships with our users.
</li>
<li>
If we cannot resolve a dispute through direct communication, you
may have legal recourse depending on your jurisdiction. These
terms do not waive any rights you have under applicable consumer
protection laws.
</li>
</ul>
<h3>17. General Terms</h3>