Detectify logo
Products & Solutions Resources Crowdsource Pricing
Log in Create account
Customer log in

Access Detectify tool

Crowdsource log in

Access Crowdsource platform

Products
  • Surface Monitoring
  • Application Scanning
Solutions by use case
  • Attack surface protection
  • Prevent subdomain takeover
Solutions by business size
  • Enterprise
For companies
  • What is Crowdsource?
  • Meet the community
For ethical hackers
  • Ethical hacking with us
  • How Crowdsource works
  • Leaderboards
Resource Center
  • All resources
  • Case studies
  • Webinars
  • E-books & Whitepapers
  • Events
Blogs
  • Detectify Blog
  • Detectify Labs
Trending Topics
  • Attack surface management
  • Common attack vectors
Products & Solutions Resources Crowdsource Pricing
Customer log in Crowdsource log in Create account
Products & Solutions
Products Surface Monitoring Application Scanning
Solutions by use case Attack surface protection Prevent subdomain takeover
Solutions by business size Enterprise
Crowdsource
For companies What is Crowdsource? Meet the community
For ethical hackers Ethical hacking with us How Crowdsource works Leaderboards
Resources
Resource Center All resources Case studies Webinars E-books & Whitepapers Events
Blogs Detectify Blog Detectify Labs
Trending Topics Attack surface management Common attack vectors

Acceptable Use Policy

Last updated: 16 March 2022

Scope and Purpose of this Acceptable Use Policy

This Acceptable Use Policy (“AUP”) describes prohibited use of the web services provided by Detectify. This AUP governs the use of Detectify’s Services and is incorporated by reference into the Terms of Use. This AUP applies to Detectify’s customers obtaining Services from Detectify (“User”). The purpose of this AUP is to protect Detectify, its Customers and other internet users from illegal, disruptive and other harmful activities. Detectify may modify this AUP at any time, publishing the then current version on detectify.com/acceptable-use-policy. You agree to the latest version of this AUP by using the Services.

Prohibited Use:

You may not use the Services for any illegal, harmful or infringing activity (“Prohibited Activity”), or in connection with content, products or services that are illegal, harmful, infringing or offensive (“Prohibited Content”) as further described below.

Prohibited Activity:

Prohibited Activity is considered any use of the Services for activity that is illegal, harmful or infringing. Prohibited Activities include, but are not limited to:

  • Using the Service to violate the privacy or personal data rights of other individuals.
  • Using the Service to interfere with or harm the confidentiality, integrity or availability of any Detectify system or a third party system without authorization.
  • Abusing the number of license grants of the Service, including the number of Application Scan profiles or Surface Monitoring subdomains, indicated in your subscription account or applicable Order Form.
  • Using the service to infringing the patents, copyright, trademark rights or other intellectual property right of a third party.
  • Using the Service for any other illegal activity.

Prohibited Content:

Prohibited Content is considered any use of the Services in connection with products, services, material or other content (“Content”) that is illegal, harmful, infringing, offensive or obscene. Prohibited Content includes, but is not limited to:

  • Using the Service in connection with Content that is illegal, like illegal drugs, illegal weapons, illegal gambling, human trafficking, child pornography or illegal pornography or prostitution.
  • Using the Service in connection with Content that infringes on third party rights, such as privacy or personal data protection rights or intellectual property rights.
  • Using the Service in connection with Content that in Detectify’s consideration is harmful, offensive or obscene, regardless of the jurisdiction in which You operate, such as hateful, violent, fraudulent, defamatory, discriminatory, racist or threatening Content.

Consequences of Your Prohibited Use:

Detectify disclaims any obligation to pre-approve or continuously monitor any activity or content. The mere fact that You have been granted access to Detecity’s Services does not waive Detectify’s right to claim a breach by You of this AUP. Detectify may choose to act in case it finds out and reasonably considers that Your activity or content is or may be harmful to Detectify, its customers or other internet users and causes or may cause damage. Detectify reserves the right to suspend Your access to the Service in case Your use constitutes Prohibited Activity or Prohibited Use as well as terminate the Agreement and seek compensation for damages, should such arise, in accordance with the Terms of Use.

Product
  • Surface Monitoring
  • Application Scanning
  • Integrations
  • API documentation
  • Try Detectify for free
  • Customer login
Solutions
  • Attack surface protection
  • Prevent subdomain takeover
  • Enterprise
Crowdsource
  • What is Crowdsource?
  • Meet the community
  • Hack with us
  • How it works
  • Join Crowdsource
  • Hacker login
Resource Center
  • All resources
  • Case studies
  • Webinars
  • E-books & Whitepapers
  • Videos
  • Events
Pricing
  • Pricing plans
  • Enterprise contact
Blogs & Articles
  • Detectify Blog
  • Detectify Labs
  • Knowledge Base
Trending Topics
  • Attack surface management
  • Common attack vectors
  • Log4j help
Legal
  • Terms of use
  • Privacy policy
  • Cookie Policy
  • Cookie Settings
  • Compliance & Security
  • Responsible disclosure
Company
  • About us
  • Careers - we're hiring!
  • Press & Media
Contact
  • Get in touch
  • Request demo
Twitter icon
linkedin icon
G2 Badge Leader 2022
G2 Badge Best Support 2022
G2 Badge High Performer 2022
G2 Badge Momentum Leader 2022
ISO certification badge
AWS partner logo
Detectify logo
© 2022 Detectify | Go hack yourself.