Terms of Service
DefendTech
23 Makariou Street, 3030 Limassol, Cyprus
Phone: +357 25 694 182
Email: info@domain.com
Terms of Service Scope and Purpose
These Terms of Service govern your use of DefendTech's cybersecurity engineering services and website. By accessing our services or website, you agree to be bound by these terms and our commitment to professional cybersecurity solutions.
DefendTech provides specialized cybersecurity engineering services including security architecture design, threat detection systems, and security automation solutions. These terms establish the framework for professional service delivery and mutual obligations.
Effective date: September 15, 2025
Service Usage Terms
1. Acceptable Use Policy
When using our cybersecurity services and website, you agree to:
- Use services exclusively for legitimate cybersecurity and business protection purposes
- Provide accurate and complete information during service engagements
- Cooperate with security assessments and implementation procedures
- Maintain confidentiality of proprietary security methodologies and findings
- Comply with all applicable laws and regulations regarding cybersecurity
- Report security incidents promptly to enable effective response
2. Permitted and Prohibited Uses
Permitted uses include:
- Requesting cybersecurity assessments and consulting services
- Implementing recommended security controls and architectures
- Accessing educational cybersecurity content and resources
- Participating in authorized security testing and validation
- Using provided security tools within specified parameters
Prohibited uses include:
- Attempting to compromise or test security of our systems without authorization
- Using services for illegal activities or to harm others
- Reverse engineering proprietary security tools or methodologies
- Sharing confidential security findings with unauthorized parties
- Interfering with service delivery to other clients
- Misrepresenting service outcomes or capabilities
3. Service Access Requirements
- Valid business contact information and organizational authority
- Completion of initial security assessment questionnaire
- Agreement to service-specific terms and security protocols
- Provision of necessary system access for authorized assessments
- Compliance with minimum security standards for collaboration
- Acknowledgment of service scope and limitation disclosures
4. Fair Usage Guidelines
- Reasonable use of support resources and consultation time
- Timely response to service requests and security recommendations
- Appropriate scheduling of assessments and implementation activities
- Efficient utilization of security tools and monitoring systems
- Respectful interaction with cybersecurity engineering team
- Adherence to agreed service delivery timelines and milestones
Account and Access Terms
5. Account Creation Requirements
- Verification of business identity and organizational authority
- Designation of authorized security contacts and decision makers
- Establishment of secure communication channels and protocols
- Configuration of access controls for service platforms
- Completion of cybersecurity baseline assessment
- Agreement to ongoing service terms and security requirements
6. Account Security Responsibilities
You are responsible for:
- Maintaining confidentiality of account credentials and access tokens
- Implementing multi-factor authentication where available
- Promptly reporting suspected account compromise or unauthorized access
- Regularly updating contact information and authorized user lists
- Monitoring account activity and reporting suspicious behavior
- Ensuring compliance with organizational security policies
7. Account Suspension and Termination
We may suspend or terminate accounts in cases of:
- Violation of acceptable use policies or service terms
- Non-payment of service fees or breach of contractual obligations
- Security concerns or potential compromise of account integrity
- Misuse of cybersecurity tools or unauthorized system access
- Legal or regulatory compliance requirements
- Termination of underlying service agreements
8. Multiple Account Policies
- Organizations may maintain separate accounts for different divisions
- Each account must have designated security administrators
- Cross-account data sharing requires explicit authorization
- Consolidated reporting available for enterprise arrangements
- Account merging available subject to security validation
Service Availability and Limitations
9. Service Uptime and Maintenance
- Security monitoring systems maintained with 99.5% uptime target
- Scheduled maintenance windows communicated 48 hours in advance
- Emergency maintenance may occur with minimal notice for security reasons
- Backup systems and redundancy measures for critical security functions
- Service restoration prioritized based on security risk assessment
- Alternative communication channels available during system maintenance
10. Feature Availability
- Core cybersecurity services available during standard business hours
- Emergency security response available 24/7 for critical incidents
- Advanced features may require additional licensing or agreements
- Beta features provided without warranties or support guarantees
- Service capabilities may vary based on client infrastructure
- New security technologies integrated based on threat landscape evolution
11. Geographic Restrictions
- Primary service delivery within European Union jurisdiction
- International services subject to export control regulations
- Data residency requirements respected based on client location
- Remote security services available subject to connectivity requirements
- On-site services within Cyprus and selected European locations
- Compliance with local cybersecurity and data protection laws
12. Service Modifications and Updates
We reserve the right to:
- Update security methodologies based on emerging threats
- Modify service offerings to reflect industry best practices
- Enhance security tools and monitoring capabilities
- Adjust service terms to comply with regulatory changes
- Discontinue services with appropriate notice and migration assistance
- Implement additional security measures as deemed necessary
Intellectual Property Rights
13. Content Ownership
- DefendTech retains ownership of proprietary security methodologies
- Clients retain ownership of their data and business information
- Security reports and assessments remain confidential to client organizations
- Generic threat intelligence may be shared anonymously for community benefit
- Custom security configurations developed collaboratively are jointly owned
- Open source tools maintain their respective licensing terms
14. User-Generated Content Rights
- Clients grant limited license to analyze provided data for security purposes
- Security logs and telemetry data used solely for threat detection
- Case studies require explicit consent before publication
- Anonymized security metrics may be used for service improvement
- Client feedback incorporated into service development with permission
- Testimonials and references used only with written authorization
15. License Grants
We grant you limited, non-exclusive licenses to:
- Use provided security tools within your organization
- Implement recommended security configurations
- Access monitoring dashboards and reporting systems
- Utilize educational materials for internal training
- Share security findings within your organization
- Deploy security controls according to implementation guides
16. Copyright and Trademark Notices
- DefendTech and associated logos are protected trademarks
- Security framework documentation protected by copyright
- Third-party security tools maintain their respective intellectual property rights
- Proper attribution required for referenced security standards
- Fair use principles apply to educational and research purposes
- Commercial use of proprietary materials requires licensing agreement