Legal
Terms of Service
The terms and conditions that govern your use of the Cesium platform and services.
Effective date: February 1, 2026 · Last updated: February 1, 2026
1. Acceptance of Terms
By accessing and using the CesiumCyber website and services (“Services”), you accept and agree to be bound by these Terms of Service (“Terms”). If you do not agree to these Terms, please do not use our Services.
We reserve the right to modify these Terms at any time. Changes will be posted on this page with an updated effective date. Your continued use of the Services after changes are posted constitutes acceptance of the modified Terms.
2. Description of Services
CesiumCyber provides cybersecurity services and tools, including:
- Threat intelligence analysis and scanning tools
- Password strength testing and breach checking
- Email security analysis (SPF, DKIM, DMARC)
- HTTP security header scanning
- Compliance readiness assessments
- Email header analysis for phishing detection
- AI-powered security assistant
- Professional security consulting and advisory services
- Penetration testing and vulnerability assessments
- Managed security services
We reserve the right to modify, suspend, or discontinue any aspect of our Services at any time without prior notice.
3. User Obligations
3.1 Acceptable Use
You agree to use our Services only for lawful purposes and in accordance with these Terms. You agree not to:
- Use the Services for any illegal or unauthorized purpose
- Attempt to gain unauthorized access to systems or networks
- Use the Services to transmit malware, viruses, or harmful code
- Interfere with or disrupt the Services or servers
- Scrape, crawl, or mine data from the platform
- Infringe on intellectual property rights of others
- Impersonate any person or entity
- Use security tools to attack or probe systems you do not own or have authorization to test
3.2 Account Security
If you create an account, you are responsible for maintaining the confidentiality of your credentials and for all activity under your account. Notify us immediately of any unauthorized use.
3.3 Accurate Information
You agree to provide accurate, current, and complete information and to update it as necessary.
4. Intellectual Property
4.1 Our Content
All content on our website—including text, graphics, logos, icons, images, and software—is the property of CesiumCyber or its licensors and is protected by copyright, trademark, and other intellectual property laws.
4.2 Limited License
We grant you a limited, non-exclusive, non-transferable, revocable license to access and use our Services for personal or internal business purposes. This license does not include the right to:
- Modify, copy, distribute, or create derivative works
- Reverse engineer or decompile any software
- Remove copyright or proprietary notices
- Transfer or sublicense your rights
4.3 User Content
You retain ownership of content you submit. By submitting content, you grant us a worldwide, non-exclusive, royalty-free license to use, reproduce, and process such content solely for providing our Services.
5. Privacy & Data Protection
Your use of our Services is also governed by our Privacy Policy, which is incorporated into these Terms by reference. Please review our Privacy Policy to understand how we collect, use, and protect your data.
6. Third-Party Services
Our Services may integrate with or link to third-party services, including but not limited to VirusTotal, xAI, and various security analysis providers. We are not responsible for the content, accuracy, or practices of these third-party services. Your use of them is subject to their respective terms and policies.
7. Disclaimers & Limitations
7.1 No Warranty
The Services are provided “as is” and “as available” without warranties of any kind, either express or implied, including but not limited to implied warranties of merchantability, fitness for a particular purpose, and non-infringement.
7.2 No Guarantee of Security
While we strive to provide accurate security analysis and recommendations, we do not guarantee that our Services will detect all threats or vulnerabilities. Cybersecurity is an evolving field and no solution provides 100% protection. Our tools and analyses are informational and should not be your sole source of security assurance.
7.3 Limitation of Liability
To the maximum extent permitted by law, CesiumCyber shall not be liable for any indirect, incidental, special, consequential, or punitive damages, or any loss of profits, revenues, data, use, goodwill, or other intangible losses resulting from your use of or inability to use the Services.
Our total liability shall not exceed the amount paid by you in the twelve (12) months preceding the claim, or one hundred dollars ($100), whichever is greater.
8. Indemnification
You agree to indemnify, defend, and hold harmless CesiumCyber, its officers, directors, employees, agents, and affiliates from any claims, liabilities, damages, losses, and expenses (including reasonable attorneys' fees) arising from your use of the Services, violation of these Terms, or violation of any third-party rights.
9. Professional Services
9.1 Consulting Engagements
Professional consulting services are subject to separate written agreements specifying scope, deliverables, timeline, and pricing. These Terms apply unless explicitly superseded by a written agreement.
9.2 Penetration Testing
Penetration testing services require prior written authorization and a defined scope. Unauthorized testing of systems or networks is strictly prohibited and may be illegal.
10. Confidentiality
We understand that you may share sensitive information during the course of our Services. We agree to maintain the confidentiality of such information and use it only for providing our Services, except as required by law or with your consent.
11. Termination
We reserve the right to terminate or suspend your access at any time, with or without cause or notice, including for violation of these Terms. Upon termination, your right to use the Services will immediately cease.
Provisions that by their nature should survive termination shall survive, including ownership, warranty disclaimers, indemnification, and limitations of liability.
12. Dispute Resolution
12.1 Governing Law
These Terms are governed by the laws of the State of Maryland, without regard to conflict of law provisions.
12.2 Arbitration
Any dispute arising from these Terms or the Services shall be resolved through binding arbitration in accordance with the rules of the American Arbitration Association, conducted in the State of Maryland.
12.3 Class Action Waiver
You agree that dispute resolution proceedings will be conducted only on an individual basis and not in a class, consolidated, or representative action.
13. General Provisions
13.1 Entire Agreement
These Terms, together with our Privacy Policy and any separate written agreements, constitute the entire agreement between you and CesiumCyber regarding the Services.
13.2 Severability
If any provision is found unenforceable or invalid, it shall be limited to the minimum extent necessary. The remaining provisions remain in full force and effect.
13.3 Waiver
Our failure to enforce any right or provision shall not constitute a waiver of that right or provision.
13.4 Assignment
You may not assign or transfer these Terms without our prior written consent. We may assign these Terms without restriction.
14. Contact Us
For questions about these Terms of Service:
Legal inquiries
legal@cesiumcyber.com
General inquiries
information@cesiumcyber.com
Entity
Cesium Cybersecurity and Solutions, LLC
See also: Privacy Policy
Back to top ↑By using our Services, you acknowledge that you have read, understood, and agree to be bound by these Terms of Service.