Terms and Conditions
Legal agreement for platform usage and cybersecurity services
Welcome to Cytellite
By accessing or using the Cytellite Threat Intelligence Platform, you agree to be bound by these terms and conditions. Please read them carefully before using our cybersecurity services.
1. Platform Purpose
Cytellite provides actionable threat intelligence for cybersecurity professionals, offering comprehensive insights into vulnerabilities, IP addresses, domains, and threat actors. Our services are designed to enhance your organization's security posture and threat detection capabilities.
2. User Conduct & Responsibilities
- Use the platform only for lawful cybersecurity purposes
- Comply with all applicable local, national, and international laws
- Not transmit malicious code, viruses, or harmful programs
- Maintain the confidentiality of your account credentials
- Report any security vulnerabilities or suspicious activities
3. Usage Restrictions
- Scraping, parsing, or extracting data without authorization
- Using the platform for illegal or unauthorized purposes
- Disrupting or interfering with platform functionality
- Attempting to bypass security measures or access controls
- Sharing threat intelligence data with unauthorized parties
4. Limitation of Liability
Cytellite provides threat intelligence "as is" without warranties. We shall not be liable for any direct, indirect, incidental, special, or consequential damages resulting from platform usage or cybersecurity decisions based on our intelligence data.
5. Governing Law & Jurisdiction
5.1 Export Controls
Users agree not to transfer threat intelligence data to countries or entities prohibited by U.S. Export Administration regulations or applicable cybersecurity laws.
5.2 Jurisdiction
This agreement shall be governed by the laws of the United States, without regard to conflict of law principles. Any disputes shall be resolved in appropriate U.S. courts.
6. Contact Information
For questions about these terms or cybersecurity services, contact us:
Privacy Policy
Data protection and privacy practices for threat intelligence
1. Information We Collect
Account Information
Email address, name, organization details, and authentication credentials for platform access and security verification.
Usage Data
Search queries, IP addresses analyzed, threat intelligence accessed, and platform interaction patterns for service improvement and security monitoring.
Technical Data
Browser type, device information, IP addresses, and usage analytics to ensure platform security and optimize performance.
2. How We Use Your Information
- Provide and maintain threat intelligence services
- Authenticate users and secure platform access
- Analyze usage patterns to improve cybersecurity insights
- Detect and prevent security threats and unauthorized access
- Comply with legal obligations and cybersecurity regulations
- Communicate important security updates and service changes
3. Data Protection & Security
Encryption & Security
All data transmission is encrypted using industry-standard SSL/TLS protocols. We implement comprehensive security measures including firewalls, intrusion detection, and regular security audits.
Access Controls
Strict access controls limit data access to authorized personnel only. Multi-factor authentication and role-based permissions ensure data security.
4. Data Sharing & Third Parties
We do not sell, trade, or rent your personal information to third parties. Data may be shared only in these limited circumstances:
- With your explicit consent for specific purposes
- To comply with legal requirements or cybersecurity regulations
- With trusted service providers who assist in platform operations
- To protect against security threats or prevent fraud
- In connection with business transfers or acquisitions
5. Data Retention & Deletion
Retention Periods
Account data is retained while your account is active and for a reasonable period thereafter for security and compliance purposes. Usage logs are retained for up to 12 months for security analysis.
Data Deletion
You may request deletion of your personal data by contacting our support team. We will process deletion requests within 30 days, subject to legal retention requirements.
6. Your Privacy Rights
- Access and review your personal information
- Request correction of inaccurate data
- Request deletion of your personal data
- Object to processing of your data
- Request data portability in a structured format
- Withdraw consent for data processing
7. Cookies & Tracking Technologies
We use essential cookies for platform functionality and security. Optional analytics cookies help improve our services. You can manage cookie preferences through your browser settings.
8. International Data Transfers
Your data may be processed in countries other than your own. We ensure appropriate safeguards are in place for international data transfers, including standard contractual clauses and adequacy decisions where applicable.
9. Policy Updates & Contact
This privacy policy may be updated periodically. We will notify users of significant changes via email or platform notifications. For privacy-related questions or concerns:
Copyright Notice
Intellectual property rights and usage restrictions
1. Ownership
All content on the Cytellite platform (https://cti.loginsoft.com), including but not limited to text, graphics, logos, icons, images, and software, is the property of Cytellite or its content suppliers. This content is protected by international copyright laws and cybersecurity industry standards.
2. Usage Restrictions
You are granted a limited license to access and make personal use of this platform. This license does not include:
- Downloading or modifying the platform content without express written consent
- Any resale or commercial use of threat intelligence data
- Collection and use of vulnerability data for unauthorized purposes
- Any derivative use of cybersecurity intelligence or platform content
- Downloading account information for third-party benefits
- Use of automated tools, bots, or data mining without authorization
3. Copyright Complaints
Cytellite respects intellectual property rights. If you believe your work has been copied in a way that constitutes copyright infringement, please contact us:
threatintel@loginsoft.com