Terms of Service
Last updated: April 14, 2026
By accessing CyberSecurityOS ("the Service"), operated by Transaction Science, Inc., you agree to these terms.
1. Service Description
CyberSecurityOS provides security operations infrastructure: log ingestion, anomaly detection, threat intelligence, SOAR playbooks, case management, and DFIR primitives. The platform is a detection and response substrate, not a replacement for a customer's security team.
2. Customer Responsibilities
The customer is responsible for defining its threat model, enabling appropriate detections, reviewing alerts, and acting on escalations. CyberSecurityOS produces measurements and playbook actions; final authority for response decisions remains with the customer.
3. Data Handling
Security telemetry is sensitive. All data is encrypted at rest (AES-GCM) and in transit (TLS 1.3). Tamper-evident storage uses BLAKE3 hashing and append-only logs. Retention defaults to 400 days; customer-configurable up to 7 years.
4. Incident Response Obligations
Transaction Science does not make binding containment decisions on behalf of customers unless explicitly configured to do so via a pre-approved playbook. Automated containment is opt-in per playbook per environment.
5. Limitation of Liability
CyberSecurityOS is provided "as is." Transaction Science, Inc. does not guarantee detection of any specific attack or threat actor. Aggregate liability is limited to fees paid in the preceding 12 months.
6. Contact
Questions about these terms: [email protected]