Picus Security’s Emerging Threat Simulator Terms

These terms are being accepted by “You” ​which means the individual (including the third person in case you accept this agreement on behalf of that person), company, Affiliates, or other legal entity that has registered to use the Service  (the "Customer") in connection with the Picus Security’s Emerging Threat Simulator (“Service”) performed by Picus Security.

By accepting the Terms, Customer agrees to the following:

1.    Picus Security will conduct the simulation using any approaches, instruments, or methods it deems suitable and at its complete discretion.
2.    The Customer confirms that it has the legal rights or authority to allow the simulator to be performed on their computer systems or networks to subject the designated computer systems or networks to the security assessment. If the Customer is not the owner, it guarantees it has secured permission from the rightful owner.
3.    The simulator is designed to avoid causing harm to the Customer's systems. However, the Customer acknowledges full responsibility for safeguarding and backing up any data involved in the assessment and waives any claims against Picus Security for potential data loss, stoppage of other work or impairment of other assets, incorrect results, delays, or other consequences resulting from the assessment.
4.    Picus Security shall not be held liable if the simulator fails to detect certain security vulnerabilities or configuration flaws in the systems tested. The service, its software components, its reports, and all other deliverables are provided “as is,” and Picus Security makes no warranty or guarantee of merchantability, fitness for a particular purpose, title, quality, accuracy, and non-infringement of third-party rights, and as to its use or performance and does not warrant or guarantee that the operation of the software will be fail-safe, uninterrupted or free from errors or defects or that the software will protect against all possible threats or identify all possible cyber attacks a security device may or may not protect against.

5. Picus has the right to publish the results of the Test and any activities performed in connection therewith and/or to make use of such results and findings at its sole discretion.

6. Results may differ for the same security control technology in different environments. Picus Security cannot be held responsible if the Service fails to discover certain security or configuration shortcomings on the target control systems and shall not become subject to any claim and request (including but not limited to compensation, damage, loss, or reimbursement).

7. The Service and all related intellectual property rights are the exclusive property of Picus Security or its licensors. Picus Security authorizes Customer with a non-exclusive, personal, non-transferable, revocable, and limited license usage right to access and use the service solely for Customer’s use.

8. Customer agree not to decompile, disassemble, modify, sell, copy, or reverse-engineer the Picus Security owned software, platforms, modules, agents, and source code developed to run or enable the Service. In the same way, Customer agree not to decompile, disassemble, modify, sell, copy, or reverse-engineer the third-party software or source code that may be used to enable the Service.

9. Customer are not entitled to use the intellectual properties of Picus Security, including but not limited to logos, names, trademarks, affiliates, etc., without prior written consent.