Skip to content

Latest commit

 

History

History
309 lines (214 loc) · 10.9 KB

File metadata and controls

309 lines (214 loc) · 10.9 KB

Terms of Service

VXControl Cloud Intelligence Platform

Effective Date: September 27, 2025
Version: 2.0


1. Scope and Application

These Terms of Service ("Terms") govern your access to and use of the VXControl Cloud Intelligence Platform services, APIs, and data accessible through the VXControl Cloud SDK (the "Services"). These Terms are separate from and in addition to the MIT License governing the SDK code itself.

By using the Services, you acknowledge that you have read, understood, and agree to be bound by these Terms. If you do not agree, you must not access or use the Services.

The Services provide access to sensitive cybersecurity data, threat intelligence, vulnerability information, computational resources, and AI-powered assistance that require strict adherence to ethical and legal standards.


2. Permitted Uses and Legal Compliance

2.1 Authorized Security Activities

The Services and data obtained through them may ONLY be used for:

  • Defensive Cybersecurity: Protecting systems under your control or management
  • Authorized Penetration Testing: Security assessments with explicit written permission
  • Security Research: Academic or professional research following responsible disclosure
  • Incident Response: Investigating actual security incidents affecting your infrastructure
  • Education and Training: Learning cybersecurity practices in controlled environments
  • Compliance Assessment: Evaluating security posture for regulatory requirements
  • Threat Hunting: Proactive detection of threats within authorized scope

2.2 Data Usage Restrictions

All data obtained through the Services (threat intelligence, vulnerability data, AI responses, etc.) must be used solely for:

  • Improving security of systems you are authorized to protect
  • Educational purposes within academic or professional settings
  • Research that benefits the broader cybersecurity community
  • Defensive security operations and incident response

2.3 Legal Compliance Requirements

You must:

  • Comply with all applicable laws, regulations, and legal obligations
  • Obtain necessary authorizations before conducting security testing
  • Respect intellectual property rights of data sources and third parties
  • Follow data protection and privacy laws (GDPR, CCPA, etc.)
  • Adhere to export control regulations

3. Strictly Prohibited Uses

3.1 Unauthorized and Malicious Activities

You are expressly prohibited from using the Services or obtained data for:

  • Unauthorized Access: Accessing systems without explicit permission
  • Malicious Attacks: Creating, deploying, or facilitating cyber attacks
  • Criminal Activities: Any illegal activities or violations of applicable law
  • Harmful Targeting: Attacks on individuals, organizations, or critical infrastructure
  • Data Exploitation: Unauthorized collection or misuse of personal or sensitive data
  • Service Disruption: Attempts to disrupt or damage the Services or third-party systems
  • Intelligence Misuse: Using threat intelligence for offensive operations without authorization

3.2 Commercial and Competitive Restrictions

You may not:

  • Resell, redistribute, or commercialize threat intelligence data without authorization
  • Use the Services to develop competing threat intelligence platforms
  • Share access credentials or API keys with unauthorized parties
  • Exceed rate limits or attempt to circumvent usage restrictions

3.3 AI and Data Processing Restrictions

When using AI-powered features, you must not:

  • Submit data you do not own or are not authorized to process
  • Attempt to extract proprietary algorithms or training data
  • Use AI responses for activities outside the permitted scope
  • Submit malicious queries designed to compromise the AI system

4. Data Handling and Privacy

4.1 User Data Processing

When you submit data to the Services:

  • Anonymization: Sensitive data is automatically anonymized before AI processing
  • Retention: Data may be retained for service operation and improvement
  • Security: Data is encrypted in transit and at rest
  • Access Control: Strict access controls limit data exposure

4.2 Privacy Protection

You must:

  • Only submit data you are authorized to process
  • Ensure compliance with applicable privacy laws
  • Implement appropriate data protection measures
  • Respect individual privacy rights and data subject requests

4.3 Threat Intelligence Data

Threat intelligence provided through the Services:

  • Is sourced from public and commercial feeds
  • Should be validated before operational use
  • May not be suitable for all environments
  • Is provided for defensive purposes only

5. Ethical Use and Professional Standards

5.1 Responsible Security Practices

You agree to:

  • Follow established cybersecurity professional standards
  • Practice responsible vulnerability disclosure
  • Minimize potential harm during security testing
  • Respect system owners and administrators
  • Maintain confidentiality of sensitive information discovered

5.2 Community Standards

  • Contribute positively to the cybersecurity community
  • Share knowledge and improvements where appropriate
  • Report misuse of the Services when encountered
  • Support defensive cybersecurity initiatives

5.3 Incident Reporting

You must promptly report:

  • Suspected misuse of the Services by other users
  • Security vulnerabilities affecting the Services
  • Data breaches or unauthorized access incidents
  • Any criminal activity observed through the Services

6. Service Limitations and Disclaimers

6.1 Service Availability

VXControl does not guarantee:

  • Continuous availability of the Services
  • Accuracy or completeness of threat intelligence
  • Real-time updates of vulnerability data
  • Immediate response to support requests

6.2 Data Accuracy Disclaimer

The Services provide information from various sources:

  • No Warranty: No warranty is provided regarding data accuracy
  • Validation Required: Users must validate information before operational use
  • False Positives/Negatives: Detection systems may produce incorrect results
  • Third-Party Sources: External data sources may contain errors or biases

6.3 Security Limitations

You acknowledge that:

  • No security tool provides complete protection
  • The Services supplement but do not replace comprehensive security programs
  • Human expertise and judgment remain essential
  • Security effectiveness varies based on implementation and environment

7. Enforcement and Violations

7.1 Monitoring and Detection

VXControl reserves the right to:

  • Monitor usage patterns for compliance and security
  • Investigate suspected violations of these Terms
  • Cooperate with law enforcement when required by law
  • Implement technical measures to prevent misuse

7.2 Violation Consequences

Violations may result in:

  • Immediate suspension or termination of access
  • Reporting to relevant authorities
  • Legal action to protect VXControl and third parties
  • Permanent ban from the Services

7.3 Appeals Process

If you believe your access was suspended in error:

  • Contact info@vxcontrol.com with "Appeals" in the subject line
  • Provide detailed explanation and supporting evidence
  • Allow reasonable time for investigation
  • Accept final determination by VXControl

8. Liability and Indemnification

8.1 Limitation of Liability

TO THE MAXIMUM EXTENT PERMITTED BY LAW, VXCONTROL SHALL NOT BE LIABLE FOR:

  • Damages resulting from misuse of the Services or obtained data
  • Security incidents not prevented by the Services
  • Third-party actions based on information provided by the Services
  • Consequential, indirect, or special damages

8.2 User Indemnification

You agree to indemnify VXControl from claims arising from:

  • Your use or misuse of the Services
  • Your violation of these Terms or applicable laws
  • Security testing activities conducted using Service data
  • Unauthorized access or activities performed using the Services

9. International Use and Export Controls

9.1 Export Compliance

The Services may be subject to export control laws:

  • You must comply with all applicable export regulations
  • Certain features may be restricted in specific jurisdictions
  • Users in sanctioned countries may have limited access
  • Commercial use may require additional licenses

9.2 Jurisdiction-Specific Requirements

Different jurisdictions may have specific requirements for:

  • Cybersecurity data handling and processing
  • Threat intelligence sharing and usage
  • Security testing authorization and documentation
  • Incident reporting and disclosure obligations

10. Updates and Modifications

10.1 Terms Updates

VXControl reserves the right to modify these Terms:

  • Updated Terms will be posted with effective dates
  • Continued use constitutes acceptance of new Terms
  • Material changes will be communicated to active users
  • Users may terminate access if they disagree with updates

10.2 Service Evolution

As the Services evolve:

  • New features may be subject to additional restrictions
  • Usage limitations may be adjusted based on capacity
  • Data sources and intelligence feeds may change
  • Technical requirements may be updated

11. Termination and Data Retention

11.1 Termination Rights

Either party may terminate access:

  • Users may stop using the Services at any time
  • VXControl may terminate access for Terms violations
  • Termination does not relieve obligations under these Terms
  • Post-termination restrictions continue to apply

11.2 Data Handling After Termination

Upon termination:

  • Access to new data through the Services ceases
  • Previously obtained data remains subject to these Terms
  • Users must continue to comply with usage restrictions
  • VXControl may retain data as required by law or policy

12. Contact and Legal Information

12.1 Terms Questions and Violations

For questions about these Terms or to report violations:

VXControl LLC
Email: info@vxcontrol.com
Subject: "Cloud Services Terms"
Website: https://vxcontrol.com

12.2 Legal Process

These Terms are governed by the laws of the United Arab Emirates. Disputes will be resolved through binding arbitration under Dubai International Arbitration Centre (DIAC) rules.


13. Acknowledgment and Agreement

By using the VXControl Cloud Intelligence Platform Services, you acknowledge that:

  1. You have read and understood these Terms of Service
  2. You agree to use the Services only for lawful, ethical purposes
  3. You understand the sensitive nature of cybersecurity data and tools
  4. You accept responsibility for your actions and their consequences
  5. You will comply with all applicable laws and professional standards

These Terms are essential for maintaining the security, integrity, and lawful use of advanced cybersecurity capabilities. Violations undermine the security community and may result in serious legal consequences.


Last updated: March 25, 2026 Version 2.1 - Updated for MIT Licensed SDK with cloud services focus