logo

Enhance your cytellite experience! Please sign in to get the most out of cytellite.

Terms and Conditions

Legal agreement for platform usage and cybersecurity services

Welcome to Cytellite

By accessing or using the Cytellite Threat Intelligence Platform, you agree to be bound by these terms and conditions. Please read them carefully before using our cybersecurity services.

1. Platform Purpose

Cytellite provides actionable threat intelligence for cybersecurity professionals, offering comprehensive insights into vulnerabilities, IP addresses, domains, and threat actors. Our services are designed to enhance your organization's security posture and threat detection capabilities.

2. User Conduct & Responsibilities

  • Use the platform only for lawful cybersecurity purposes
  • Comply with all applicable local, national, and international laws
  • Not transmit malicious code, viruses, or harmful programs
  • Maintain the confidentiality of your account credentials
  • Report any security vulnerabilities or suspicious activities

3. Usage Restrictions

  • Scraping, parsing, or extracting data without authorization
  • Using the platform for illegal or unauthorized purposes
  • Disrupting or interfering with platform functionality
  • Attempting to bypass security measures or access controls
  • Sharing threat intelligence data with unauthorized parties

4. Limitation of Liability

Cytellite provides threat intelligence "as is" without warranties. We shall not be liable for any direct, indirect, incidental, special, or consequential damages resulting from platform usage or cybersecurity decisions based on our intelligence data.

5. Governing Law & Jurisdiction

5.1 Export Controls

Users agree not to transfer threat intelligence data to countries or entities prohibited by U.S. Export Administration regulations or applicable cybersecurity laws.

5.2 Jurisdiction

This agreement shall be governed by the laws of the United States, without regard to conflict of law principles. Any disputes shall be resolved in appropriate U.S. courts.

6. Contact Information

For questions about these terms or cybersecurity services, contact us:

Privacy Policy

Data protection and privacy practices for threat intelligence

1. Information We Collect

Account Information

Email address, name, organization details, and authentication credentials for platform access and security verification.

Usage Data

Search queries, IP addresses analyzed, threat intelligence accessed, and platform interaction patterns for service improvement and security monitoring.

Technical Data

Browser type, device information, IP addresses, and usage analytics to ensure platform security and optimize performance.

2. How We Use Your Information

  • Provide and maintain threat intelligence services
  • Authenticate users and secure platform access
  • Analyze usage patterns to improve cybersecurity insights
  • Detect and prevent security threats and unauthorized access
  • Comply with legal obligations and cybersecurity regulations
  • Communicate important security updates and service changes

3. Data Protection & Security

Encryption & Security

All data transmission is encrypted using industry-standard SSL/TLS protocols. We implement comprehensive security measures including firewalls, intrusion detection, and regular security audits.

Access Controls

Strict access controls limit data access to authorized personnel only. Multi-factor authentication and role-based permissions ensure data security.

4. Data Sharing & Third Parties

We do not sell, trade, or rent your personal information to third parties. Data may be shared only in these limited circumstances:

  • With your explicit consent for specific purposes
  • To comply with legal requirements or cybersecurity regulations
  • With trusted service providers who assist in platform operations
  • To protect against security threats or prevent fraud
  • In connection with business transfers or acquisitions

5. Data Retention & Deletion

Retention Periods

Account data is retained while your account is active and for a reasonable period thereafter for security and compliance purposes. Usage logs are retained for up to 12 months for security analysis.

Data Deletion

You may request deletion of your personal data by contacting our support team. We will process deletion requests within 30 days, subject to legal retention requirements.

6. Your Privacy Rights

  • Access and review your personal information
  • Request correction of inaccurate data
  • Request deletion of your personal data
  • Object to processing of your data
  • Request data portability in a structured format
  • Withdraw consent for data processing

7. Cookies & Tracking Technologies

We use essential cookies for platform functionality and security. Optional analytics cookies help improve our services. You can manage cookie preferences through your browser settings.

Essential cookies for authentication and security
Analytics cookies for service improvement

8. International Data Transfers

Your data may be processed in countries other than your own. We ensure appropriate safeguards are in place for international data transfers, including standard contractual clauses and adequacy decisions where applicable.

9. Policy Updates & Contact

This privacy policy may be updated periodically. We will notify users of significant changes via email or platform notifications. For privacy-related questions or concerns: