Terms of Service
Threat Intelligence Platform LLC, provides Threat Intelligence Hosted Webservice (defined below) to you subject to the following conditions. This is a legal agreement between you and Threat Intelligence Platform. In consideration of Threat Intelligence Platform allowing you to use Threat Intelligence Hosted Webservice and by accessing Threat Intelligence Hosted Webservice you agree to be bound by the terms of this agreement ("Agreement").
- Definition of Threat Intelligence Hosted Webservice
- Grant of License
- Response Time
- Response Data validity
- Warranty and Disclaimer
- Limitation of Liability
- Breach of Agreement
- Modification of Agreement
- Governing Law
- Entire Agreement
Threat Intelligence Hosted Webservice consist of all services and information made available by Threat Intelligence Platform via the Internet, including the threatintelligenceplatform.com web site, the Threat Intelligence web service, and any other properties not covered by separate agreements.
You are granted a limited, revocable, nonexclusive license to use any data, images, text, content, tools or other information (collectively referred to as the "Threat Intelligence Platform, LLC Properties") received via Threat Intelligence Hosted Webservice in accordance with the terms and conditions described herein. You agree that you will provide accurate information when signing up for a Threat Intelligence Platform account. Threat Intelligence Platform, LLC retains all rights not expressly granted by this Agreement. You may only use Threat Intelligence Hosted Webservice and the Threat Intelligence Platform Properties as follows: Human Interactive Use. You may interact with Threat Intelligence Platform Services as a human being in a non-automated fashion. Automated Use. You may write an application that interfaces automatically with Threat Intelligence Hosted Webservice provided that you obtain and use a Threat Intelligence Platform account and that you do not exceed the following usage limits without explicit, prior authorization from Threat Intelligence Platform, LLC: No more than 40 HTTP/HTTPS requests every second No more than 20 HTTP/HTTPS requests at a time (concurrent) In case that the limit is breached (either from single IP address or from multiple IPs), the user would be penalized with the 30 second ban. That ban includes IPs that were used at the time of the offence, and includes all following IPs (based on username from additional requests) used during the ban time. If you build and distribute an application that uses Threat Intelligence Hosted Webservice, the same limitations apply to the collective behavior of all installed copies of the application. No Abuse. You may not use Threat Intelligence Hosted Webservice for abusive purposes, nor may the you use Threat Intelligence Hosted Webservice from applications designed to abuse computer resources accessible through any network—local, wide-area, or internet. Threat Intelligence Platform does not collect your queries information and is not responsible for any potential abuse stemming from your client application. Abuse includes but is not limited to: unauthorized data mining, denial of service attacks, unauthorized computer system incursions, and any actions that violate applicable laws or regulations. You may not use Threat Intelligence Hosted Webservice in any manner that could damage, disable, overburden, or impair Threat Intelligence Hosted Webservice (or the network(s) connected to Threat Intelligence Hosted Webservice) or interfere with any other party's use and enjoyment of Threat Intelligence Hosted Webservice. You may not attempt to gain unauthorized access to Threat Intelligence Hosted Webservice, other accounts, computer systems or networks connected to Threat Intelligence Hosted Webservice, through hacking, password mining, or any other means. You may not obtain or attempt to obtain any materials or information through any means not intentionally made available by Threat Intelligence Platform through Threat Intelligence Hosted Webservice. You may not use information obtained through Threat Intelligence Hosted Webservice to for any usage where prohibited by applicable law. If you use data from Threat Intelligence Hosted Webservice in your own application or service, you agree not to allow your users to use the information in a manner that voilates applicable law. In any case, Threat Intelligence Platform does not collect or analyze your query, you must be responsible for complying with all regulations and laws. Display and Transfer. Threat Intelligence Hosted Webservice provide Whois data primarily for your internal use. You may display to third parties up to ten (10) fields parsed from any given Whois record. You may also display complete records that are raw and unparsed. You may also use parsed data internally in applications or services that you provide to third parties. Except in the aforementioned cases, you agree not to transfer or sell parsed Whois data to third parties. "Parsed data" refers to specific data fields separated from the original record. Examples of such fields include, but are not limited to, registrant name, postal address, postal code, country code, phone number, and email address. No Resale or Sublicensing. Except as allowed above, you may not modify, copy, distribute, transmit, display, perform, reproduce, publish, license, create derivative works from, sublicense, transfer, assign, rent, sell or otherwise convey any information, software, products or services obtained from Threat Intelligence Hosted Webservice or Threat Intelligence Platform Properties without prior written consent from Threat Intelligence Platform, LLC. You may not allow other parties to use your Threat Intelligence Platform account or login credentials.
You understand and agree that Threat Intelligence Platform only logs basic information from your query for up to 2 weeks to ensure proper function of your usage of Threat Intelligence Hosted Webservice. Threat Intelligence Platform does not use data from user queries for any purpose other than the ones stated above.
Threat Intelligence Webservice's historic uptime has been 99.9% over the past year. It is Threat Intelligence Platform's goal to maintain an uptime of 99.9% or greater. You understand and agree that service outtage can occur due to unexpected reasons, in which case Threat Intelligence Platform will restore service in a reasonable and timely fashion. Threat Intelligence Platform is not responsible for any loss as a result of service outtage.
You understand and agree that Threat Intelligence Webservice's response time can vary depending on many factors including server load, network latency, and technical reasons. Response time can be as low as 500 ms or much longer due to specified reasons above. A "typical" average response time is about 2 to 3 seconds.
You understand and agree that Data returned by Threat Intelligence Webservice undergo a sequence of backend processes and gets parsed by our intelligent parse system which is constantly improving. Given the freeform nature of Whois Data, parsing error can occur.
You agree to defend, indemnify, and hold harmless Threat Intelligence Platform and its affiliates, and each of their officers, directors, employees, agents, representatives, information providers and licensors, from any claims, costs, losses, damages, judgments and expenses, including but not limited to reasonable attorney's fees, relating to or arising out of any breach of this Agreement or any use of Threat Intelligence Hosted Webservice by you, or by any other person using Threat Intelligence Hosted Webservice through you or using your computer.
You understand and agree that Threat Intelligence Hosted Webservice are provided on an "as is" and "as available" basis. You expressly agree that use of Threat Intelligence Hosted Webservice is at your sole risk. To the maximum extent permitted by applicable law, Threat Intelligence Platform disclaims all warranties of any kind, either express or implied, including without limitation any implied warranties of merchantability, fitness for a particular purpose, and noninfringement. Without limiting the foregoing, neither Threat Intelligence Platform, LLC nor any of its affiliates, nor any of their officers, directors, licensors, employees or representatives represent or warrant (a) that Threat Intelligence Hosted Webservice, including its content, will meet your requirements or be accurate, complete, reliable, or error free; (b) that the service will always be available or will be uninterrupted, accessible, timely, or secure; (c) that any defects will be corrected, or that the service will be free from viruses, "worms," "trojan horses" or other harmful properties; (d) the availability for sale, or the reliability or quality of any products discussed or referenced in the service; (e) any implied warranty arising from course of dealing or usage of trade; and (f) that the service is noninfringing. Threat Intelligence Platform and its affiliates hereby disclaim, and you hereby waive and release Threat Intelligence Platform, LLC and its affiliates from, any and all obligations, liabilities, rights, claims or remedies in tort arising out or in connection with this Agreement, Threat Intelligence Hosted Webservice, and Threat Intelligence Platform Properties, whether or not arising from the negligence (active, passive or imputed) of Threat Intelligence Platform, LLC or its affiliates. You acknowledge and agree that any content downloaded or otherwise obtained through Threat Intelligence Hosted Webservice is done at your own discretion and risk and that you will be solely responsible for any damage to your computer system or loss of data that results from use of Threat Intelligence Hosted Webservice. Some jurisdictions do not allow the exclusion of implied warranties, so the above exclusions may not apply to you. You may also have other legal rights, which vary from jurisdiction to jurisdiction.
In no event shall Threat Intelligence Platform, LLC, its affiliates, it suppliers, or any of their officers, directors, employees, agents, representatives, information providers, or licensors be liable for any consequential, incidental, direct, indirect, special, punitive, or other damages (including, without limitation, damages for loss of business profits, business interruption, loss of business information, or other pecuniary loss) arising out of the use or inability to use Threat Intelligence Hosted Webservice, even if Threat Intelligence Platform has been advised of the possibility of such damages. In any event, Threat Intelligence Platform's cumulative liability to any user for any and all claims relating to the use of Threat Intelligence Hosted Webservice shall not exceed the total amount paid by the user for Threat Intelligence Hosted Webservice during the preceding three month period.
You may terminate this Agreement by ceasing to use Threat Intelligence Hosted Webservice and the Threat Intelligence Platform Properties. Threat Intelligence Platform, LLC reserves the right to terminate this Agreement (and/or your account) or discontinue Threat Intelligence Hosted Webservice or any portion or feature thereof for any reason and at any time at its sole discretion. Upon any termination or notice of any discontinuance, you must immediately stop and thereafter desist from using Threat Intelligence Hosted Webservice, including the Threat Intelligence Platform Properties, and any applicable portions or features thereof, and delete all Threat Intelligence Platform Properties in your possession or control (including from your application and your servers).
This Agreement will terminate automatically if you fail to comply with the terms of this Agreement. Upon termination of this Agreement, all rights and licenses granted in the Agreement shall immediately terminate. You will immediately delete any Threat Intelligence Platform Properties or other Threat Intelligence Platform proprietary information in your possession or control.
Threat Intelligence Platform, LLC may modify any of the terms and conditions contained in this Agreement, at any time and at its sole discretion, by posting a change notice or a new Agreement on the Threat Intelligence Platform web site. If any modification is unacceptable to you, your only recourse is to terminate this Agreement. Your continued use of Threat Intelligence Hosted Webservice or the Threat Intelligence Platform Properties following Threat Intelligence Platform's posting of a change notice or new Agreement on the web site will constitute binding acceptance of the change. Threat Intelligence Platform may modify any of the terms and conditions contained in this Agreement, at any time and at its sole discretion, by posting a change notice or a new Agreement on the Threat Intelligence Platform web site. If any modification is unacceptable to you, your only recourse is to terminate this Agreement. Your continued use of Threat Intelligence Hosted Webservice or the Threat Intelligence Platform Properties following Threat Intelligence Platform's posting of a change notice or new Agreement on the web site will constitute binding acceptance of the change.
This Agreement shall be governed by the laws of the State of California, U.S.A. Exclusive jurisdiction over disputes arising under this Agreement or regarding use of Threat Intelligence Platform Services will be in the state and federal courts of and sitting in Collin County, Texas, U.S.A. If any provision of this Agreement is held invalid, the remainder of this Agreement will continue in full force and effect. In any litigation involving this Agreement or the use of Threat Intelligence Hosted Webservice, the prevailing party will be entitled to recover reasonable attorneys' fees.
This Agreement constitutes the entire agreement between you and Threat Intelligence Platform, LLC regarding Threat Intelligence Hosted Webservice and supersedes any and all prior or contemporaneous representation, understanding, agreement or communication between you and Threat Intelligence Platform, LLC regarding Threat Intelligence Platform Services. Except as provided by Section 9, this Agreement may not be amended, varied or supplemented except by a writing executed by both you and Threat Intelligence Platform that specifically references this Agreement and the provision(s) to be amended, varied or supplemented, and, without limitation of the foregoing, no provision of this Agreement shall be varied, contradicted or explained by any oral agreement, course of dealing or performance, or any other matter not set forth in a writing executed as provided above in this sentence.
What information do we collect?
We collect information from you when you register on our site or place an order. When ordering or registering on our site, as appropriate, you may be asked to enter your: name or e-mail address. You may, however, visit our site anonymously.
What do we use your information for?
Any of the information we collect from you may be used in one of the following ways: To process transactions Your information, whether public or private, will not be sold, exchanged, transferred, or given to any other company for any reason whatsoever, without your consent, other than for the express purpose of delivering the purchased product or service requested.
How do we protect your information?
We implement a variety of security measures to maintain the safety of your personal information when you place an order or enter, submit, or access your personal information. We offer the use of a secure server. All supplied sensitive/credit information is transmitted via Secure Socket Layer (SSL) technology and then encrypted into our Payment gateway providers database only to be accessible by those authorized with special access rights to such systems, and are required to keep the information confidential. After a transaction, your private information (credit cards, social security numbers, financials, etc.) will not be stored on our servers.
Do we disclose any information to outside parties?
We do not sell, trade, or otherwise transfer to outside parties your personally identifiable information. This does not include trusted third parties who assist us in operating our website, conducting our business, or servicing you, so long as those parties agree to keep this information confidential. We may also release your information when we believe release is appropriate to comply with the law, enforce our site policies, or protect ours or others rights, property, or safety. However, non-personally identifiable visitor information may be provided to other parties for marketing, advertising, or other uses.
Childrens Online Privacy Protection Act Compliance
We are in compliance with the requirements of COPPA (Childrens Online Privacy Protection Act), we do not collect any information from anyone under 13 years of age. Our website, products and services are all directed to people who are at least 13 years old or older.
California Online Privacy Protection Act Compliance
Because we value your privacy we have taken the necessary precautions to be in compliance with the California Online Privacy Protection Act. We therefore will not distribute your personal information to outside parties without your consent. As part of the California Online Privacy Protection Act, all users of our site may make any changes to their information at anytime by logging into their account and going to the 'My Account' page.