Terms of Service

 
 

This page describes the terms and conditions that govern your use of TheCyberSecurityIntellects.com.

1. GENERAL RULES AND DEFINITIONS

1.1 If you choose to use TheCyberSecurityIntellects.com (together with its version via the Tor Onion Service, the “Site”), any of the features of this Site, including but not limited to RSS, API, software and other downloads (collectively, the "Services"), you will be agreeing to abide by all of the terms and conditions of these Terms of Service between you and The Cyber Security Intellects LLC ("CSI", “us” or “we”).

1.2 We may change, add or remove portions of these Terms of Service at any time, which shall become effective immediately upon posting. It is your responsibility to review these Terms of Service prior to each use of the Site and by continuing to use this Site, you agree to any changes.

1.3 We may change, suspend or discontinue any aspect of the Services at any time, including the availability of any Services feature, database, or content. We may also impose limits on certain features and services or restrict your access to parts or all of the Services without notice or liability.

2. CONTENT ON THE SERVICES

2.1 The contents of the Services, including the Site, are intended for your personal, noncommercial use. All materials published on the Services (including, but not limited to news articles and certain photographs, images, illustrations, audio clips and video clips, also known as the "Content") are protected by copyright, and owned or controlled by The Cyber Security Intellects LLC or the party credited as the provider of the Content. You shall abide by all additional copyright notices, information, or restrictions contained in any Content accessed through the Service.

2.2 The Services and Contents are protected by copyright pursuant to U.S. and international copyright laws. You may not modify, publish, transmit, participate in the transfer or sale of, reproduce (except as provided in Section 2.3 of these Terms of Service), create new works from, distribute, perform, display, or in any way exploit, any of the Content or the Services (including software) in whole or in part.

2.3 You may download or copy the Content and other downloadable items displayed on the Services for personal use only, provided that you maintain all copyright and other notices contained therein. Copying or storing of any Content for other than personal use is expressly prohibited without prior written permission from The Cyber Security Intellects or the copyright holder identified in the copyright notice contained in the Content.

2.4 The Content of the Services is owned or licensed to CSI. Certain Content is furnished by contributors, which will not be liable for any delays, inaccuracies, errors or omissions in any such Content, or in the transmission or delivery of all or any part thereof, or for any damages arising therefrom.

3. USE OF THE SERVICES

3.1 You may not access or use, or attempt to access or use, the Services to take any action that could harm us or a third party. You may not access parts of the Services to which you are not authorized. You may not attempt to circumvent any restriction or condition imposed on your use or access, or do anything that could disable or damage the functioning or appearance of the Services, including the presentation or display of advertising. Being exposed to advertising is a condition of accessing the Services.

3.2 The Services contain links to other related internet sites, resources, and advertisers. Since we are not responsible for the availability of these outside resources, or their contents, you should direct any concerns regarding any external link to such site.

4. MISCELLANEOUS

4.1 These Terms of Service have been made in and shall be construed and enforced in accordance with California law. Any action to enforce these Terms of Service shall be brought in the federal or state courts located in Los Angeles California.

4.2 Notwithstanding any of the foregoing, nothing in these Terms of Service will serve to preempt the promises made in The Cyber Security Intellects Privacy Policy.

4.3 Correspondence should be sent to info@thecybersecurityintellects.com

4.4 If you believe that your work has been copied in a way that constitutes copyright infringement, please provide us the following information. Please be advised that to be effective, the Notice must include ALL of the following:

1. a physical or electronic signature of the person authorized to act on behalf of the owner of an exclusive copyright that is allegedly infringed;
2. a description of the copyrighted work that you claim has been infringed;
3. a description of where the material that you claim is infringing is located on the Site;
4. your address, telephone number, and email address and all other information reasonably sufficient to permit us to contact you;
5. a statement by you that you have a good faith belief that the disputed use is not authorized by the copyright owner, its agent, or the law;
6. a statement by you, made under penalty of perjury, that the above information in your Notice is accurate and that you are the copyright owner or authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.


Notices of claimed copyright infringement should be directed to:

By mail:

PO Box 7478 Upper Marlboro, MD, 20792

Attention: General Counsel
 

By email: info@thecybersecurityintellects.com