Security & Compliance
Last updated: March 17, 2026
Quantum Network Monitor applies layered controls designed to reduce misuse risk while supporting legitimate monitoring and authorized security testing.
1. Use Controls
- Authorized-use attestations before higher-risk actions.
- Separation of lower-risk monitoring from higher-risk active testing.
- Role, plan, and workflow restrictions for advanced functions.
2. Technical Safeguards
- Target/scope capture for active testing workflows.
- Rate limiting and feature gating on sensitive operations.
- Selective blocking of unsafe module/payload classes.
- Account, agent, and action-level telemetry for investigation and response.
3. Audit and Abuse Response
- Action logging for security operations and policy enforcement.
- All LLM interactions (prompts and responses) are logged for security monitoring, abuse detection, and incident response.
- Abuse review workflows and rapid suspension capability.
- Legal and regulatory cooperation where required.
4. Data Protection
- Processing controls for account data, monitoring targets, logs, and telemetry.
- Retention and access practices aligned with security and legal requirements.
- Data-subject request handling via support channel.
5. Sanctions and Export Controls
- Restricted-jurisdiction and restricted-party checks may apply.
- Service may be unavailable in countries/regions where use is prohibited.
6. Customer Responsibilities
- Maintain written authorization for active testing.
- Define and enforce approved testing scope internally.
- Protect account credentials and agent environments.
7. Contact
Security and compliance questions: [email protected]
Related documents: Terms of Service, Acceptable Use Policy,
Privacy Policy, and Cookie Policy.