Terms of Service
Welcome to Enforster AI. These Terms of Service (βTermsβ) govern your use of our AI-powered security platform and services.π Effective Date
Auguest 15, 2025π― Agreement to Terms
By accessing or using Enforster AI services, you agree to be bound by these Terms. If you disagree with any part of these terms, you may not access our services.π Service Description
What We Provide
Enforster AI offers an AI-powered static application security testing (SAST) platform that helps developers and organizations identify and fix security vulnerabilities in their code.Core Services
- AI-Powered Security Scanning: Automated vulnerability detection using artificial intelligence
- Code Analysis: Static analysis of source code for security issues
- Vulnerability Management: Comprehensive vulnerability tracking and remediation
- Security Reporting: Detailed security reports and compliance documentation
- Integration Services: API access and third-party tool integration
π€ Account Registration
Eligibility
- Age Requirement: You must be at least 18 years old
- Legal Capacity: You must have the legal capacity to enter into agreements
- Authorized Use: You must be authorized to use the service on behalf of your organization
Account Creation
- Accurate Information: Provide accurate, current, and complete information
- Account Security: Maintain the security of your account credentials
- Account Responsibility: You are responsible for all activities under your account
- Account Transfer: Accounts are non-transferable
Account Termination
- Voluntary Termination: You may close your account at any time
- Involuntary Termination: We may terminate accounts for Terms violations
- Data Retention: Data retention policies apply after account closure
π Acceptable Use
Permitted Uses
- Security Testing: Legitimate security testing of your own code
- Compliance: Meeting regulatory and compliance requirements
- Development: Integrating security into your development workflow
- Research: Security research and educational purposes
Prohibited Uses
- Unauthorized Access: Attempting to access othersβ accounts or systems
- Malicious Activity: Using the service for harmful or illegal purposes
- Service Abuse: Excessive use that impacts service performance
- Reverse Engineering: Attempting to reverse engineer our platform
- Data Mining: Unauthorized data extraction or mining
Security Requirements
- Secure Practices: Follow security best practices
- Vulnerability Reporting: Report security issues responsibly
- Compliance: Comply with applicable laws and regulations
- Third-Party Code: Ensure you have rights to scan third-party code
π° Pricing and Payment
Subscription Plans
- Free Tier: Limited features for evaluation and small projects
- Professional Plan: Advanced features for development teams
- Enterprise Plan: Full-featured solution for large organizations
- Custom Plans: Tailored solutions for specific requirements
Payment Terms
- Billing Cycle: Monthly or annual billing as selected
- Payment Method: Credit card, bank transfer, or invoice payment
- Late Payment: Late fees may apply for overdue payments
- Price Changes: 30-day notice for price changes
Refunds and Cancellations
- Free Trial: Full refund during trial period
- Subscription Cancellation: No refund are offer duing Service Cancellation
- Service Issues: Refunds for significant service disruptions
- Refund Processing: No refund are offer duing Service Cancellation
π Data and Privacy
Data Ownership
- Your Data: You retain ownership of your code and data
- Our Data: We own platform data, analytics, and aggregated information
- Usage Rights: We may use anonymized data for service improvement related to cookies only
- Data Portability: Export your data at any time
Data Protection
- Security Measures: Industry-standard security and encryption
- Access Controls: Limited access to authorized personnel
- Data Retention: Data retention according to our Privacy Policy
- Data Deletion: Complete data deletion upon request
Privacy Compliance
- Privacy Policy: Governed by our separate Privacy Policy
- GDPR Compliance: European data protection compliance
- CCPA Compliance: California privacy compliance
- International Standards: Compliance with applicable privacy laws
π‘οΈ Security and Compliance
Security Standards
- Regular Audits: Third-party security assessments
- Vulnerability Management: Prompt security patch deployment
Compliance Features
- Audit Trails: Comprehensive activity logging
Security Responsibilities
- Platform Security: We maintain platform security
- User Security: You maintain your account and data security
- Incident Response: Coordinated response to security incidents
- Security Updates: Regular security updates and patches
Service Availability
Service Level Agreement
- Uptime Commitment: 99.9% uptime guarantee
- Maintenance Windows: Scheduled maintenance with advance notice
- Performance Standards: Response time and throughput commitments
- Service Credits: Credits for SLA violations
Maintenance and Updates
- Regular Updates: Continuous platform improvements
- Scheduled Maintenance: Planned maintenance with minimal disruption
- Emergency Maintenance: Emergency maintenance when necessary
- Update Notifications: Advance notice of significant changes
Service Limitations
- Feature Availability: Features may vary by plan
- Geographic Restrictions: Service availability by region
- Third-Party Dependencies: Reliance on third-party services
- Force Majeure: Events beyond our reasonable control
π API and Integration
API Access
- API Keys: Secure API access with authentication
- Rate Limits: Reasonable rate limiting to prevent abuse
- API Documentation: Comprehensive API documentation
- SDK Support: Software development kits for integration
Third-Party Integrations
- Supported Platforms: GitHub, GitLab, CI/CD tools
- Integration Limits: Reasonable use of integration features
- Third-Party Terms: Compliance with third-party terms
- Integration Support: Technical support for integrations
API Usage
- Acceptable Use: Legitimate integration and automation
- Rate Compliance: Respect rate limits and fair use policies
- Error Handling: Implement proper error handling
- Monitoring: Monitor API usage and performance
π« Prohibited Activities
Security Violations
- Unauthorized Access: Attempting unauthorized system access
- Service Attacks: DDoS attacks or service disruption
- Vulnerability Exploitation: Exploiting platform vulnerabilities
- Data Breaches: Unauthorized data access or disclosure
Legal Violations
- Illegal Activities: Using the service for illegal purposes
- Copyright Infringement: Violating intellectual property rights
- Regulatory Violations: Violating applicable laws or regulations
- Fraud: Deceptive or fraudulent activities
Service Abuse
- Excessive Usage: Unreasonable service consumption
- Spam: Unsolicited communications or content
- Harassment: Harassing or abusive behavior
- Impersonation: Impersonating others or organizations
π Intellectual Property
Our Intellectual Property
- Platform Technology: Proprietary platform and algorithms
- AI Models: Machine learning models and training data
- User Interface: Platform design and user experience
- Brand Assets: Trademarks, logos, and brand elements
Your Intellectual Property
- Your Code: Source code and intellectual property
- Your Data: Business data and proprietary information
- Customizations: Custom configurations and integrations
- Feedback: Suggestions and feedback you provide
License Terms
- Service License: Limited license to use our services
- API License: License to use our APIs and SDKs
- Feedback License: License to use your feedback
- Reservation of Rights: All rights not expressly granted are reserved
βοΈ Legal and Compliance
Governing Law
- Primary Jurisdiction: California, United States
- Dispute Resolution: Arbitration for dispute resolution
- Class Action Waiver: Waiver of class action lawsuits
- Severability: Invalid provisions do not affect the entire agreement
Regulatory Compliance
- Export Controls: Compliance with export control laws
- Sanctions: Compliance with economic sanctions
- Data Protection: Compliance with data protection laws
- Industry Standards: Compliance with industry standards
Legal Requirements
- Subpoenas: Compliance with legal requests
- Government Requests: Cooperation with government authorities
- Regulatory Investigations: Cooperation with regulatory bodies
- Legal Defense: Legal defense of our rights and interests
π¨ Limitation of Liability
Liability Limits
- Maximum Liability: Limited to amounts paid for services
- Excluded Damages: No liability for indirect or consequential damages
- Time Limitations: Claims must be filed within specified timeframes
- Force Majeure: No liability for events beyond our control
Disclaimers
- Service Availability: Services provided βas isβ and βas availableβ
- No Warranties: No warranties beyond those expressly stated
- Third-Party Services: No liability for third-party services
- Security: No guarantee of absolute security
Indemnification
- Your Indemnification: You indemnify us for your violations
- Our Indemnification: We indemnify you for our violations
- Defense Costs: Coverage of reasonable defense costs
- Settlement Authority: Authority to settle claims
π Changes to Terms
Modification Process
- Advance Notice: 30-day notice for significant changes
- Notification Methods: Email, platform notice, or website update
- Acceptance: Continued use constitutes acceptance of changes
- Rejection: Right to reject changes by discontinuing use
Change Categories
- Minor Changes: Administrative or technical changes
- Feature Changes: New features or service modifications
- Policy Changes: Privacy, security, or compliance changes
- Legal Changes: Changes required by law or regulation
Customer Rights
- Review Period: Time to review and understand changes
- Acceptance Options: Accept changes or discontinue service
- Data Export: Export data before discontinuing service
- Refund Rights: Refunds for significant adverse changes
π Contact and Support
Customer Support
- Support Channels: Email support
- Response Times: Standard response time commitments
- Escalation Process: Escalation for complex issues
- Documentation: Comprehensive help and documentation
Legal Contact
- Legal Department: legal@enforster.ai
- Compliance: compliance@enforster.ai
Dispute Resolution
- Direct Resolution: Attempt to resolve disputes directly
- Mediation: Mediation for unresolved disputes
- Arbitration: Binding arbitration for legal disputes
- Small Claims: Small claims court for small disputes
π Miscellaneous
Entire Agreement
- Complete Terms: These terms constitute the entire agreement
- Previous Agreements: Supersedes all previous agreements
- Oral Modifications: No oral modifications are effective
- Written Modifications: Modifications must be in writing
Severability
- Invalid Provisions: Invalid provisions do not affect the agreement
- Reformation: Courts may reform invalid provisions
- Enforceability: Remaining provisions remain enforceable
- Legal Effect: Agreement remains legally binding
Assignment
- Your Assignment: You may not assign your rights
- Our Assignment: We may assign our rights
- Successors: Terms bind successors and assigns
- Change of Control: Terms survive change of control
These Terms of Service are designed to provide clear guidance for using Enforster AI services. We encourage you to review them carefully and contact us with any questions. For questions about these Terms of Service, please contact us at legal@enforster.ai