Important Legal Notice: These Terms of Service constitute a legally binding agreement between you and Apollo Security Research Institute. By downloading, installing, accessing, or using APOLLO CyberSentinel software, you acknowledge that you have read, understood, and agree to be bound by all terms and conditions set forth herein.
1. Definitions and Interpretation
For the purposes of this Agreement, the following terms shall have the meanings set forth below:
1.1 Key Definitions
- "Software" or "APOLLO" - APOLLO CyberSentinel software application, including all updates, patches, and related components
- "Company," "we," "us," "our" - Apollo Security Research Institute and its affiliates
- "User," "you," "your" - The individual or entity using the Software
- "Beta Software" - Pre-release version of the Software provided for testing and evaluation
- "Threat Intelligence" - Data, indicators, and information about cybersecurity threats
- "APT" - Advanced Persistent Threat, sophisticated cyber attack campaigns
- "Nation-State Actors" - Cyber threat groups sponsored or directed by government entities
- "Device" - Computer, mobile device, or other electronic equipment on which the Software is installed
- "Personal Data" - Information that identifies or can be used to identify an individual
- "Documentation" - User guides, technical specifications, and other materials provided with the Software
1.2 Interpretation
- References to "including" or "includes" shall be deemed to be followed by "without limitation"
- Headings are for convenience only and do not affect interpretation
- Words in the singular include the plural and vice versa
- References to any law include all amendments, modifications, and replacements
2. Agreement to Terms and Legal Capacity
2.1 Binding Agreement
By downloading, installing, accessing, or using APOLLO CyberSentinel, you acknowledge that you have read, understood, and agree to be legally bound by these Terms of Service ("Terms" or "Agreement"). This Agreement becomes effective immediately upon your first use of the Software and remains in effect until terminated in accordance with the provisions herein.
2.2 Legal Capacity and Authority
You represent and warrant that:
- You are at least 18 years of age or the age of majority in your jurisdiction
- You have the legal capacity to enter into binding agreements
- If acting on behalf of an organization, you have the authority to bind that organization
- Your use of the Software complies with all applicable laws and regulations
- You are not located in a country subject to U.S. government embargo or designated as a "terrorist supporting" country
- You are not listed on any U.S. government list of prohibited or restricted parties
2.3 Rejection of Terms
If you do not agree to these Terms, you must:
- Immediately cease all use of the Software
- Uninstall the Software from all devices
- Delete all copies of the Software and Documentation
- Destroy any materials containing proprietary information
3. Beta Software Notice and Limitations
Critical Beta Notice: APOLLO CyberSentinel is currently in beta testing phase. This pre-release software is provided for evaluation, testing, and feedback purposes. Beta software may contain bugs, errors, security vulnerabilities, or unexpected behaviors that could result in system instability, data loss, or security compromises.
3.1 Beta Software Characteristics
Beta software may exhibit the following characteristics:
- Instability - Software may crash, freeze, or behave unpredictably
- Incomplete features - Some functionality may be partially implemented or non-functional
- Security vulnerabilities - Beta software may contain undiscovered security flaws
- Data compatibility issues - Configuration and data formats may change between versions
- Performance issues - Resource usage and response times may be suboptimal
- Documentation gaps - Documentation may be incomplete or outdated
- Limited support - Technical support may be limited during beta period
3.2 Beta User Responsibilities
As a beta user, you acknowledge and agree to:
- Assume all risks associated with using pre-release software
- Maintain backups of all important data before and during beta testing
- Use in non-production environments where possible
- Provide feedback regarding bugs, issues, and usability concerns
- Maintain confidentiality of proprietary features and information
- Not distribute beta software to third parties
- Understand that beta access may be revoked at any time
3.3 Beta Transition to Commercial
Upon transition from beta to commercial release:
- Beta software licenses will automatically terminate
- Users must agree to new commercial terms to continue use
- Data migration tools may be provided but are not guaranteed
- Beta users may receive preferential pricing or early access benefits
- Configuration and customizations may need to be reconfigured
4. Software License Grant and Scope
4.1 Commercial Proprietary License
APOLLO CyberSentinel is proprietary commercial software protected by copyright, patent, trade secret, and other intellectual property laws. Subject to your compliance with these Terms, we grant you a limited, non-exclusive, non-transferable, revocable license to:
4.1.1 Permitted Uses
- Install and Use - Install and use the Software on devices you own or control
- Personal/Commercial Protection - Use the Software to protect against cybersecurity threats
- Receive Updates - Download and install software updates, patches, and security fixes
- Access Support - Receive technical support services during the beta period
- Create Backups - Make reasonable backup copies for archival purposes
- Access Documentation - Use provided documentation for legitimate purposes
4.1.2 Device and User Limitations
- Personal Use - Install on devices you personally own or control
- Organization Use - Install on organization-owned devices if you have authority
- Reasonable Number - Install on a reasonable number of devices for your needs
- Single User Instance - Each installation should be used by one primary user
- Geographic Restrictions - Use only in jurisdictions where legally permitted
4.2 License Restrictions and Prohibitions
You expressly agree that you will NOT, and will not permit others to:
4.2.1 Reverse Engineering and Modification
- Reverse engineer - Attempt to derive source code, algorithms, or trade secrets
- Decompile or disassemble - Convert executable code back to human-readable form
- Modify or alter - Change, adapt, or create derivative works of the Software
- Remove protections - Circumvent or disable security, licensing, or copy protection
- Extract components - Separate or extract individual components for independent use
4.2.2 Distribution and Commercial Exploitation
- Distribute or redistribute - Share, upload, or make available to third parties
- Sell, lease, or license - Commercialize or monetize the Software
- Sublicense - Grant rights to third parties to use the Software
- Create competing products - Use Software insights to develop competitive solutions
- Benchmark without permission - Conduct performance comparisons for commercial purposes
4.2.3 Misuse and Malicious Activities
- Illegal activities - Use for any unlawful purpose or in violation of applicable laws
- Malicious purposes - Use to harm, attack, or compromise other systems
- Circumvent security - Disable or interfere with security features
- Extract threat data - Harvest or reuse threat intelligence for other purposes
- Interfere with operations - Disrupt our services or infrastructure
5. Acceptable Use Policy
5.1 Intended and Approved Uses
APOLLO CyberSentinel is designed and licensed exclusively for legitimate cybersecurity purposes:
5.1.1 Defensive Cybersecurity
- Endpoint protection - Protecting computers, mobile devices, and IoT devices
- Network security - Monitoring and protecting network communications
- Data protection - Safeguarding sensitive information and intellectual property
- System integrity - Maintaining the security and stability of computer systems
- Incident response - Detecting, analyzing, and responding to security incidents
5.1.2 Advanced Threat Detection
- Nation-state threats - Detecting government-sponsored cyber campaigns
- APT identification - Identifying advanced persistent threat activities
- Zero-day protection - Detecting previously unknown attack methods
- Cryptocurrency protection - Safeguarding digital assets and transactions
- Privacy protection - Defending against surveillance and spyware
5.1.3 Personal and Organizational Security
- Individual protection - Safeguarding personal devices and data
- Family security - Protecting household members and shared resources
- Small business protection - Securing small and medium enterprise environments
- Remote work security - Protecting distributed and mobile workers
- Educational use - Cybersecurity research and education in academic settings
5.2 Prohibited Uses and Activities
You expressly agree NOT to use the Software for any of the following purposes:
5.2.1 Offensive Cyber Operations
- Attacking systems - Penetrating, compromising, or gaining unauthorized access
- Developing malware - Creating, testing, or distributing malicious software
- Cyber espionage - Conducting surveillance or intelligence gathering against others
- Denial of service - Disrupting or overloading network services or resources
- Data theft - Stealing, copying, or exfiltrating data without authorization
5.2.2 Illegal and Unethical Activities
- Criminal activities - Any use in furtherance of criminal conduct
- Evading law enforcement - Obstructing justice or hiding criminal activity
- Violating privacy rights - Illegally accessing or monitoring personal information
- Stalking or harassment - Using technology to intimidate or harm others
- Financial fraud - Facilitating theft, money laundering, or financial crimes
5.2.3 Intellectual Property Violations
- Copyright infringement - Facilitating unauthorized copying or distribution
- Trade secret theft - Stealing proprietary information or business secrets
- Patent violations - Using protected technologies without permission
- Trademark abuse - Misusing brand names or protected marks
5.2.4 Regulatory and Compliance Violations
- Export control violations - Transferring technology to restricted countries or entities
- Sanctions evasion - Circumventing international sanctions or embargoes
- Privacy law violations - Violating GDPR, CCPA, or other privacy regulations
- Industry regulations - Violating sector-specific regulatory requirements
6. Subscription, Payment, and Commercial Terms
6.1 Beta Access Terms
During the current beta testing period:
6.1.1 Free Beta Access
- No cost - Beta access is provided free of charge
- No payment required - No credit card or payment information required
- No billing - No charges will be incurred during beta period
- Limited duration - Beta access may be terminated at any time
- No service level guarantees - No uptime or performance commitments
6.1.2 Beta Program Limitations
- Experimental features - Some functionality may be incomplete or unstable
- Service interruptions - Updates and maintenance may cause downtime
- Data loss risks - Beta software may not preserve all user data
- Limited support - Technical support may be restricted or delayed
- Feature changes - Features may be modified or removed without notice
6.2 Future Commercial Terms
Upon transition to commercial availability:
6.2.1 Subscription Model
- Subscription pricing - Commercial use will require paid subscription
- Multiple tiers - Different feature sets and pricing levels may be offered
- Annual/monthly options - Various billing cycles may be available
- Enterprise licensing - Volume discounts for organizational use
- Academic pricing - Special rates for educational institutions
6.2.2 Beta User Benefits
- Preferential pricing - Discounted rates for beta participants
- Early access - Priority access to new features and updates
- Grandfather pricing - Locked-in rates for initial subscription period
- Migration assistance - Support for transitioning from beta to commercial
- Extended trial - Additional time to evaluate commercial features
6.2.3 Payment and Billing Terms
- Advance payment - Subscriptions billed in advance
- Automatic renewal - Subscriptions renew automatically unless cancelled
- Payment methods - Credit cards, bank transfers, and other approved methods
- Currency - Pricing in USD with local currency options where available
- Tax responsibility - Users responsible for applicable taxes
6.2.4 Refund and Cancellation Policy
- Cancellation rights - Cancel subscription at any time
- Refund eligibility - Prorated refunds for certain circumstances
- Service continuation - Access continues through paid period after cancellation
- Data retention - Configuration data retained for reasonable period after cancellation
- Dispute resolution - Process for handling billing disputes
7. Privacy, Data Protection, and Security
7.1 Zero Telemetry Architecture
APOLLO CyberSentinel is built with privacy by design principles:
7.1.1 No Personal Data Collection
- Zero telemetry - No usage analytics, metrics, or behavioral tracking
- Local processing - All analysis occurs on your device, not our servers
- No personal data transmission - Personal information never leaves your device
- Anonymous threat queries - External queries use only anonymized indicators
- End-to-end encryption - All necessary communications are encrypted
7.1.2 Data Minimization
- Minimal data processing - Only security-relevant data is analyzed
- Cryptographic hashes - Files identified by mathematical fingerprints, not content
- Local storage only - User data stored exclusively on user devices
- Automatic deletion - Temporary data automatically purged
- User control - Users can delete all local data at any time
7.2 Threat Intelligence Processing
The Software may process the following data types for cybersecurity purposes:
7.2.1 Security-Relevant Data
- File hashes - SHA-256 cryptographic fingerprints for threat identification
- Network indicators - IP addresses and domain names of suspicious entities
- Process information - Running application names and digital signatures
- System configuration - Security-relevant OS settings and patch levels
- Threat patterns - Behavioral indicators of malicious activity
7.2.2 External Intelligence Queries
- VirusTotal - File hash reputation checking (no file contents shared)
- Shodan - Network infrastructure threat intelligence
- AlienVault OTX - Community-driven threat indicators
- Government sources - Official cybersecurity advisories and indicators
- Academic research - Peer-reviewed cybersecurity intelligence
7.3 Data Protection Compliance
Our data practices comply with applicable privacy laws:
7.3.1 Regulatory Compliance
- GDPR compliance - European Union General Data Protection Regulation
- CCPA compliance - California Consumer Privacy Act requirements
- PIPEDA compliance - Canadian Personal Information Protection Act
- Industry standards - ISO 27001, SOC 2, and other security frameworks
7.3.2 User Rights
- Access rights - Review any personal data we may hold
- Correction rights - Correct inaccurate information
- Deletion rights - Request deletion of personal data
- Portability rights - Export data in machine-readable format
- Objection rights - Object to certain types of processing
8. Disclaimers, Warranties, and Limitations
8.1 Software Warranty Disclaimers
AS IS WARRANTY DISCLAIMER: The Software is provided "AS IS" and "AS AVAILABLE" without warranties of any kind, either express or implied. While APOLLO CyberSentinel provides advanced protection capabilities, no security software can guarantee 100% protection against all threats, including zero-day exploits, novel attack methods, or sophisticated nation-state campaigns.
8.1.1 Express Warranty Disclaimers
To the maximum extent permitted by applicable law, we expressly disclaim all warranties, including but not limited to:
- Merchantability - No warranty that Software is suitable for commercial use
- Fitness for particular purpose - No guarantee Software meets specific requirements
- Non-infringement - No warranty regarding intellectual property rights
- Accuracy - No guarantee of error-free operation or perfect threat detection
- Reliability - No warranty of uninterrupted or error-free operation
- Security - No guarantee of complete protection against all threats
- Compatibility - No warranty of compatibility with all systems or software
8.1.2 Performance and Security Limitations
- Evolving threats - New attack methods may not be immediately detected
- Zero-day vulnerabilities - Unknown exploits cannot be prevented until discovered
- False positives/negatives - Some legitimate activity may be flagged or threats missed
- System limitations - Performance dependent on hardware and network conditions
- Update dependencies - Protection effectiveness requires regular updates
8.2 Limitation of Liability
To the maximum extent permitted by applicable law:
8.2.1 Damages Exclusion
IN NO EVENT SHALL WE BE LIABLE FOR:
- Cyber attack damages - Any damages resulting from successful cyber attacks
- Data loss or corruption - Loss or damage to files, databases, or other data
- System damage - Hardware damage, software corruption, or system instability
- Business interruption - Lost profits, revenue, or business opportunities
- Consequential damages - Indirect, incidental, or consequential losses
- Punitive damages - Exemplary or punitive damage awards
- Third-party claims - Claims by other parties related to Software use
8.2.2 Liability Cap
- Maximum liability - Our total liability limited to amount paid for Software
- Beta software - For beta software, liability limited to $100 USD
- Cumulative cap - All claims aggregated for purposes of liability limit
- Time limitation - Claims must be brought within one year of incident
8.2.3 User Responsibilities
- Backup obligations - Users responsible for maintaining data backups
- Security practices - Users must follow basic cybersecurity hygiene
- Update compliance - Users should install security updates promptly
- Incident reporting - Users should report security incidents promptly
- Mitigation efforts - Users must take reasonable steps to minimize damages
9. Software Updates, Modifications, and Support
9.1 Software Updates and Patches
We may provide various types of software updates:
9.1.1 Security Updates
- Critical patches - Emergency fixes for serious security vulnerabilities
- Threat signatures - Updated detection patterns for new threats
- Intelligence feeds - Real-time threat indicator updates
- Vulnerability fixes - Patches for discovered software vulnerabilities
- Performance improvements - Optimizations for better security effectiveness
9.1.2 Feature Updates
- New capabilities - Additional security features and functionality
- User interface improvements - Enhanced usability and user experience
- Integration enhancements - Better compatibility with other security tools
- API extensions - New programming interfaces for advanced users
- Platform support - Support for new operating systems and hardware
9.1.3 Update Delivery and Installation
- Automatic updates - Critical security updates installed automatically
- User-controlled updates - Feature updates require user approval
- Update notifications - Users notified of available updates
- Rollback capability - Ability to revert problematic updates when possible
- Staged deployment - Updates may be rolled out gradually
9.2 Terms of Service Modifications
We may update these Terms to reflect changes in law, business practices, or software functionality:
9.2.1 Notification Methods
- Website posting - Updated Terms posted on our website
- Email notification - Direct email to registered users
- In-app notifications - Notices displayed within the Software
- Documentation updates - Changes reflected in user documentation
9.2.2 Change Implementation
- Material changes - 30 days advance notice for significant modifications
- Legal compliance - Immediate effect for legally required changes
- Security updates - Immediate effect for security-related modifications
- User acceptance - Continued use constitutes acceptance of changes
- Objection rights - Users may terminate agreement if they object to changes
9.3 Technical Support Services
9.3.1 Beta Support Limitations
- Best effort support - Support provided on best-effort basis during beta
- Limited availability - Support hours and response times not guaranteed
- Community forums - User community may provide peer support
- Documentation - Self-service resources and guides provided
- Bug reporting - Users encouraged to report issues and provide feedback
9.3.2 Commercial Support (Future)
- Tiered support - Different support levels based on subscription tier
- Response time commitments - Guaranteed response times for paid subscribers
- Multiple channels - Email, chat, phone, and portal support options
- Technical expertise - Access to specialized cybersecurity professionals
- Priority handling - Expedited support for critical issues
10. Termination and Post-Termination Effects
10.1 User-Initiated Termination
You may terminate this Agreement at any time by:
10.1.1 Termination Actions
- Uninstalling software - Remove Software from all devices
- Discontinuing use - Cease all use of Software and services
- Deleting copies - Destroy all copies of Software and Documentation
- Data deletion - Remove all Software-generated data and configurations
- Account closure - Request closure of any associated accounts
10.1.2 Termination Confirmation
- Termination notice - Written notice of termination may be required
- Data export - Export any desired data before termination
- License cessation - All license rights terminate immediately
- Ongoing obligations - Certain obligations survive termination
10.2 Company-Initiated Termination
We may terminate or suspend your access for various reasons:
10.2.1 Cause-Based Termination
- Terms violation - Breach of any provision of this Agreement
- Illegal use - Use of Software for unlawful purposes
- Harmful activities - Use that harms our systems or other users
- Misrepresentation - Providing false information during registration or use
- Security risks - Activities that pose security risks to our infrastructure
10.2.2 No-Cause Termination
- Beta program end - Termination of beta testing program
- Business reasons - Strategic business decisions
- Technical limitations - Infrastructure or capacity constraints
- Legal requirements - Compliance with laws or regulations
- Service discontinuation - End of life for Software or services
10.3 Post-Termination Effects
10.3.1 Immediate Effects
- License termination - All rights to use Software cease immediately
- Access suspension - Access to services and updates terminated
- Support cessation - Technical support no longer available
- Data retention - Local data may be retained by user but unsupported
10.3.2 Surviving Provisions
The following provisions survive termination of this Agreement:
- Intellectual property - All IP ownership and protection provisions
- Disclaimer and limitations - Warranty disclaimers and liability limitations
- Governing law - Legal jurisdiction and applicable law provisions
- Dispute resolution - Arbitration and litigation procedures
- Confidentiality - Protection of proprietary information
11. Intellectual Property Rights and Protection
11.1 Software Ownership and Rights
APOLLO CyberSentinel and all related intellectual property are exclusively owned by us:
11.1.1 Proprietary Assets
- Source code and algorithms - All software code, logic, and algorithmic implementations
- Threat detection signatures - Proprietary patterns and indicators for threat identification
- User interfaces and designs - All visual designs, layouts, and user experience elements
- Documentation and materials - User guides, technical specifications, and training materials
- Databases and datasets - Threat intelligence databases and analytical datasets
- Artificial intelligence models - Machine learning models and AI training data
- Cryptographic implementations - Security protocols and encryption implementations
11.1.2 Third-Party Components
- Open source licenses - Compliance with applicable open source license terms
- Commercial libraries - Licensed third-party components and libraries
- Government data - Publicly available threat intelligence incorporated under license
- Academic research - Peer-reviewed research incorporated with permission
11.2 Patent and Trademark Protection
11.2.1 Patent Rights
- Filed patents - Software may be protected by issued and pending patents
- Patent applications - Additional patent applications may be filed
- International protection - Patent protection sought in multiple jurisdictions
- Defensive patents - Patents used to protect against litigation
- Patent licensing - Patents may be licensed to compatible products
11.2.2 Trademark Rights
- APOLLO CyberSentinel - Registered trademark for cybersecurity software
- Company marks - All company names and logos are protected trademarks
- Service marks - Marks identifying our services and offerings
- Domain names - Associated internet domain names and URLs
- Brand protection - Active enforcement against trademark infringement
11.3 User-Generated Content and Feedback
11.3.1 User Content Rights
- User retention - Users retain ownership of their original content
- Limited license to us - Users grant us license to use feedback for improvement
- Anonymization rights - We may anonymize and aggregate user data
- No compensation - No payment for user feedback or suggestions
11.3.2 Feedback and Suggestions
- Voluntary submission - All feedback is provided voluntarily
- Improvement license - Feedback may be used to improve Software
- No confidentiality - Feedback not treated as confidential unless explicitly agreed
- Incorporation rights - We may incorporate suggestions into future versions
12. Governing Law, Jurisdiction, and Dispute Resolution
12.1 Applicable Law
These Terms are governed by and construed in accordance with:
12.1.1 Primary Jurisdiction
- Governing law - Laws of the jurisdiction where our company is incorporated
- Federal law - Applicable federal laws and regulations
- International treaties - Relevant international agreements and conventions
- Conflict of laws - Without regard to conflict of law principles
12.1.2 Regulatory Compliance
- Export controls - U.S. Export Administration Regulations (EAR)
- Privacy laws - GDPR, CCPA, and other applicable privacy regulations
- Cybersecurity laws - Relevant cybersecurity and data protection statutes
- Industry regulations - Sector-specific regulatory requirements
12.2 Dispute Resolution Procedures
12.2.1 Informal Resolution
Before initiating formal proceedings, parties agree to attempt informal resolution:
- Direct negotiation - Good faith discussions to resolve disputes
- 30-day period - Minimum 30 days for informal resolution attempts
- Written notice - Formal notice of dispute required
- Senior management - Escalation to appropriate decision-makers
12.2.2 Binding Arbitration
If informal resolution fails, disputes shall be resolved through binding arbitration:
- Arbitration organization - American Arbitration Association (AAA) or equivalent
- Rules - Commercial Arbitration Rules or expedited procedures
- Single arbitrator - One arbitrator with relevant expertise
- Location - Arbitration conducted in our primary business location
- Language - Proceedings conducted in English
- Confidentiality - Arbitration proceedings kept confidential
- Final and binding - Arbitration decisions are final and binding
12.2.3 Exceptions to Arbitration
The following matters may be brought in court:
- Intellectual property - Patent, trademark, copyright, or trade secret disputes
- Injunctive relief - Requests for immediate court intervention
- Small claims - Disputes within small claims court jurisdiction
- Regulatory matters - Issues requiring regulatory agency involvement
12.3 Class Action Waiver
TO THE MAXIMUM EXTENT PERMITTED BY LAW:
- Individual disputes only - All disputes must be brought individually
- No class actions - No participation in class action lawsuits
- No representative actions - No representative or collective proceedings
- No consolidation - Individual arbitrations cannot be consolidated
- Severability - If class action waiver unenforceable, arbitration clause remains
13. Export Controls and International Compliance
13.1 Export Control Compliance
The Software may be subject to export control laws and regulations:
13.1.1 U.S. Export Controls
- EAR classification - Subject to U.S. Export Administration Regulations
- ECCN classification - Export Control Classification Number assigned
- Restricted countries - Prohibited export to embargoed countries
- Denied persons - No export to sanctioned individuals or entities
- End-user verification - Compliance with end-user requirements
13.1.2 International Regulations
- Wassenaar Arrangement - Dual-use technology export controls
- EU export controls - European Union export control regulations
- National regulations - Local export control requirements
- Re-export restrictions - Limitations on further distribution
13.2 User Compliance Obligations
Users are responsible for compliance with applicable export and import regulations:
13.2.1 User Representations
- Location verification - User not located in restricted jurisdiction
- Identity confirmation - User not on denied persons lists
- End-use compliance - Software used only for authorized purposes
- Re-export prohibition - No unauthorized re-export or transfer
13.2.2 Compliance Monitoring
- Ongoing verification - Continued compliance required throughout use
- Change notification - Must notify us of material changes in status
- Audit cooperation - Cooperation with export control audits if required
- Violation reporting - Report any suspected violations immediately
14. Miscellaneous Provisions
14.1 Entire Agreement and Modifications
- Complete agreement - These Terms constitute the complete agreement
- Supersedes prior agreements - Replaces all previous oral and written agreements
- Amendment procedures - Modifications must be in writing and signed
- Integration clause - No external agreements or understandings
14.2 Severability and Waiver
- Severability - Invalid provisions do not affect remaining terms
- Reformation - Courts may modify provisions to make them enforceable
- No waiver - Failure to enforce provisions does not constitute waiver
- Continuing effect - Rights and obligations continue despite partial invalidity
14.3 Assignment and Transfer
- User restrictions - Users may not assign rights without written consent
- Company rights - We may assign Agreement in connection with business transfers
- Successor obligations - Assignees bound by all Agreement terms
- Notice requirements - Notification of assignment when legally required
14.4 Force Majeure
- Excused performance - Performance excused for events beyond reasonable control
- Covered events - Natural disasters, war, terrorism, government actions
- Mitigation efforts - Parties must make reasonable efforts to minimize impact
- Notice requirements - Prompt notice of force majeure events
Contact Information and Legal Notices
Legal Counsel: [email protected]
Contract Administration: [email protected]
Compliance Officer: [email protected]
Privacy Officer: [email protected]
Security Issues: [email protected]
General Contact: [email protected]
Technical Support: [email protected]
Business Development: [email protected]
Intellectual Property: [email protected]
Legal Binding Notice: By using APOLLO CyberSentinel software, you acknowledge that you have read, understood, and agree to be legally bound by all provisions of this Terms of Service agreement. This agreement is governed by applicable law and any disputes shall be resolved according to the dispute resolution procedures outlined herein.
Regulatory and Compliance Information
Export Control Classification: Subject to U.S. Export Administration Regulations (EAR)
Privacy Compliance: GDPR, CCPA, PIPEDA, and other applicable privacy laws
Security Standards: ISO 27001, SOC 2 Type II, and industry best practices
Industry Classification: Cybersecurity software and threat intelligence services
Business Registration: Apollo Security Research Institute (registration details available upon request)
Terms of Service Version: 3.0 (Comprehensive Legal Framework)
Last Updated: September 22, 2025
Effective Date: September 22, 2025
Previous Version: 2.0 (Available upon request for comparison)
Next Scheduled Review: September 22, 2026
Emergency Amendment Authority: Reserved for critical security or legal requirements
Translation Availability: English is the authoritative version; translations available for reference only