Terms of Service & Acceptable Use Policy
Last updated: March 17, 2026
Authorized use only. You may use this service only on systems, domains, IP addresses, applications, and networks that you own or are explicitly authorized in writing to test.
These Terms govern your use of Quantum Network Monitor, including website and service availability monitoring,
security diagnostics, vulnerability scanning workflows, agent-based execution, scheduled jobs, and related APIs.
1. Eligibility and Account Responsibility
- You must provide accurate account and billing information.
- You are responsible for all activity under your account, API keys, and authorized agents.
- You must secure credentials, rotate keys as needed, and report unauthorized use promptly.
2. Authorization Requirement and Scope Control
- Before initiating active security testing (for example: vulnerability scans, recon, exploit-style checks, or module execution), you must confirm and maintain written authorization for each target.
- You must maintain test scope records that include target identifiers, approved methods, and date/time window.
- You must keep your testing strictly within approved scope and applicable law.
- On request, you must provide proof of authorization for high-risk activity.
3. Acceptable Use (Binding Prohibitions)
You must not use the service to do any of the following:
- Scan, exploit, or monitor third-party assets without explicit written authorization.
- Attempt unauthorized access, persistence, stealth, credential theft, privilege escalation, or lateral movement.
- Deploy or execute payloads intended to gain or maintain unauthorized control.
- Intercept communications unlawfully, scrape credentials, or misuse collected data.
- Use the service for malware delivery, spam, fraud, harassment, denial-of-service activity, or any unlawful act.
- Use the service in violation of sanctions, export controls, embargoes, or trade restrictions.
4. Feature Risk Tiers and Service Controls
- Low-risk availability monitoring and active security testing are treated as separate capability tiers.
- Higher-risk security features may be off by default, role-restricted, rate-limited, and/or approval-gated.
- We may block selected module classes, payload types, targets, or workflows based on security and abuse risk.
- We may enforce target restrictions by account, geography, plan, or trust level.
5. Logging, Auditability, and Abuse Handling
- We log user identity, agent identity, target, time, command category, and related telemetry for security, audit, compliance, and abuse prevention.
- All LLM interactions in the service (including prompts, tool requests, and model responses) are logged for security monitoring, abuse detection, and incident investigation.
- We may investigate suspected misuse and cooperate with lawful requests from regulators and law enforcement.
- We may suspend, rate-limit, restrict, or terminate access immediately where abuse, legal risk, or policy violations are suspected.
- Abuse reports and takedown notices can be sent to [email protected].
6. Sanctions, Export Controls, and Geographic Availability
- You represent that you are not a blocked or sanctioned person and are not using the service from restricted jurisdictions where access is prohibited.
- Service access may be unavailable in some countries or regions for legal or compliance reasons.
- We may screen accounts, organizations, and transactions for sanctions/export compliance and may refuse or terminate access where required.
7. Data and Privacy
Our collection and processing of personal data are described in the Privacy Policy and
Cookie Policy.
8. Service Changes and Availability
We may update, suspend, or discontinue features, plans, and integrations at any time, including security controls,
risk gating, and supported workflows.
9. Disclaimers
The service is provided "as is" and "as available" to the fullest extent permitted by law. You are solely responsible
for legal compliance and for all testing activities initiated through your account.
10. Limitation of Liability
To the maximum extent allowed by law, Quantum Network Monitor is not liable for indirect, incidental, special,
consequential, or punitive damages, or loss of data, business, or profits resulting from use of the service.
11. Termination
You may stop using the service at any time. We may suspend or terminate access for Terms violations, abuse risk,
sanctions/export concerns, non-payment, or legal requirements.
12. Changes to These Terms
We may update these Terms from time to time. Material updates will be reflected by changing the "Last updated" date.
Continued use after updates means acceptance of the revised Terms.
13. Contact
Questions about these Terms: [email protected]
This document provides service terms and policy expectations and does not constitute legal advice.