TERMS OF
SERVICE
Last Updated: March 2026
1. Ethical Engagement
By engaging ISP Security for penetration testing or offensive operations, you confirm that you have the full legal authority to grant permission for technical probing of the target infrastructure. Any unauthorized use of our services for malicious purposes will result in immediate termination of the contract and notification of legal authorities.
2. Rules of Engagement (ROE)
All technical assessments are performed under a strictly defined ROE document signed by both parties. This document specifies:
- Assigned Scope: Explicitly defined IP addresses, domains, and application interfaces.
- Exclusion List: Critical infrastructure or third-party assets that must not be probed.
- Assessment Timeframe: Specific window for technical operations to avoid peak business hours.
3. Liability and Disruption
While our methodology is designed to minimize system impact, cybersecurity testing carries inherent risks of system instability. ISP Security is not liable for data loss or service downtime resulting from technical probing, provided our consultants adhered to the agreed-upon ROE.
4. Deliverables and IP
Finalized security reports, vulnerability logs, and remediation guides are the intellectual property of the Client upon full payment of services. The underlying proprietary testing methodologies and tools remain the intellectual property of ISP Security.
5. Governing Law
These terms are governed by the laws of Tech City, Underworld Jurisdiction. Any disputes arising from security engagements will be settled through arbitration under international cybersecurity law standards.