Acceptable Use Policy
Last updated: March 17, 2026
Authorized use only. You may use Quantum Network Monitor only for systems and targets that you own or are explicitly authorized in writing to test.
1. What This Policy Covers
This policy applies to all use of Quantum Network Monitor services, including monitoring, agent execution,
diagnostics, vulnerability scanning workflows, and any exploit-style or module-based testing features.
2. Required Authorization and Scope
- You must obtain and keep written authorization before active testing.
- You must define scope (target, methods, and time window) before running tests.
- You must remain within approved scope and applicable law at all times.
3. Prohibited Activity
You may not use the service to:
- Scan, test, exploit, or monitor systems without authorization.
- Attempt unauthorized access, persistence, credential theft, privilege escalation, or stealth evasion.
- Use payloads intended to gain or maintain unauthorized control.
- Intercept communications unlawfully or collect credentials/data unlawfully.
- Distribute malware, conduct spam/fraud, or execute denial-of-service activity.
- Bypass or attempt to bypass security, rate limits, or account controls.
4. Sanctions and Export Compliance
You may not use the service where prohibited by sanctions, export controls, embargoes, or local law.
We may restrict access by country, customer, organization, or account risk profile.
5. Enforcement
- We log and review activity for abuse prevention, audit, and legal compliance.
- All LLM interactions in the service (prompts and responses) are logged for security monitoring and misuse investigation.
- We may block actions, rate-limit accounts, suspend features, or terminate service for violations.
- We may cooperate with lawful requests from regulators and law enforcement.
6. Reporting Abuse
Report suspected abuse to [email protected].
7. Related Documents
This policy forms part of our Terms of Service.
See also our Security & Compliance and Privacy Policy.