Skip to main content

Terms of Service

Last updated: April 14, 2026

By accessing CyberSecurityOS ("the Service"), operated by Transaction Science, Inc., you agree to these terms.

1. Service Description

CyberSecurityOS provides security operations infrastructure: log ingestion, anomaly detection, threat intelligence, SOAR playbooks, case management, and DFIR primitives. The platform is a detection and response substrate, not a replacement for a customer's security team.

2. Customer Responsibilities

The customer is responsible for defining its threat model, enabling appropriate detections, reviewing alerts, and acting on escalations. CyberSecurityOS produces measurements and playbook actions; final authority for response decisions remains with the customer.

3. Data Handling

Security telemetry is sensitive. All data is encrypted at rest (AES-GCM) and in transit (TLS 1.3). Tamper-evident storage uses BLAKE3 hashing and append-only logs. Retention defaults to 400 days; customer-configurable up to 7 years.

4. Incident Response Obligations

Transaction Science does not make binding containment decisions on behalf of customers unless explicitly configured to do so via a pre-approved playbook. Automated containment is opt-in per playbook per environment.

5. Limitation of Liability

CyberSecurityOS is provided "as is." Transaction Science, Inc. does not guarantee detection of any specific attack or threat actor. Aggregate liability is limited to fees paid in the preceding 12 months.

6. Contact

Questions about these terms: [email protected]