ThreatBook Terms of Service & End User License Agreement (EULA)

Last Updated: August 14, 2025

Effective Date: May 10, 2023

Welcome, and thank you ("End User") for your interest in ThreatBook ("we," or "us") and our products and services. These Terms of Service and End User License Agreement ("Agreement") is a legally binding contract between you and ThreatBook governing your use of our software, subscriptions, APIs, documentation, and associated services (collectively, the "Products").

If you are entering into this Agreement on behalf of a company, organization, or government agency, you represent and warrant that you have the authority to bind that entity.

 

1. Definitions

1.1 "Affiliate" means any entity that directly or indirectly controls, is controlled by, or is under common control with the subject entity. "Control," for purposes of this definition, means direct or indirect ownership or control of more than 50% of the voting interests of the subject entity.

1.2 "End User" means, as the context requires, in addition to the entity agreeing to this Agreement, any End User Affiliate that uses or accesses any Product hereunder on behalf of End User.

1.3 "End User Data" means data that may be accessed or collected by Products during the relationship governed by this Agreement, in the form of logs, session data, telemetry, user data, usage data, threat intelligence data, threat detection information, copies of potentially malicious files detected by the Product, system stability data, user experience data, user interface data, and network traffic metadata. End User Data may include confidential data and personal data, such as source and destination IP addresses, active directory information, file applications, URLs, file names, and file content.

1.4 "Hardware" means the hardware set forth in the Order which is provided by ThreatBook, distributor or reseller.

1.5 "IP" means any physical or virtual device, such as, a computer, server, laptop, desktop computer, mobile, cellular container or virtual machine image, inside an End User’s network which has a unique internal internet protocol address that generates traffic.

1.6 "Product(s)" means the ThreatBook security product(s) set forth in the Order that consist of Software, Subscriptions, and/or other services.

1.7 "Order" means any purchase order or other ordering document accepted by you, distributor or reseller that specifies Trial Product(s) or Product(s) to be provided to End User.

1.8 "Software" means the executable code version of ThreatBook’s software products set forth in the Order and any updates thereto furnished by ThreatBook, distributor or reseller.

1.9 "Subscriptions" means subscription-based threat intelligence service provided by ThreatBook to End User for a fixed or recurring period, subject to subscription fees for each such period as set forth in the Order.

1.10 "Trial Products" means the Products that ThreatBook or its authorized representative makes available to End User for evaluation purposes.

 

2. Scope of Agreement

This Agreement governs all usage of ThreatBook Products, whether acquired via authorized resellers, distributors, or through evaluation trials. Terms for specific Products or services may be defined in addenda or referenced Orders.

 

3. Account Registration & Access

  • You may be required to create an account to access certain services.
  • You are responsible for securing your login credentials and ensuring proper use of the Services by authorized users only.

 

4. License Grant & Use Rights

4.1 Software License

ThreatBook grants a non-exclusive, non-transferable license to use the Software for internal business purposes under the terms of your subscription or order.

4.2 Subscription Access

You are granted a non-exclusive right to access our subscription-based threat intelligence services for the duration specified in your Order.

4.3 Trial Products

Trial access is permitted for evaluation only, for a period of 30 days unless otherwise agreed. Functionality may be limited and usage must cease after the trial unless converted to a paid subscription.

4.4 Use Restrictions

You may not:

  • Reverse engineer, decompile, or tamper with our Products
  • Sell, sublicense, or resell without authorization
  • Benchmark or publicly disclose performance data
  • Attempt to bypass license limits or tamper with usage metering mechanisms

4.5 End User Data

You retain ownership of all End User Data. You grant ThreatBook a limited license to use this data for service delivery, improvement, and legal compliance.

4.6 Feedback

We may use any suggestions, enhancement requests, or feedback you provide without restriction.

 

5. Data Protection & Security

ThreatBook collects, processes, and stores data as part of service delivery. We:

  • Act as a data processor when handling personal data on your behalf
  • Implement technical and organizational measures to secure personal data
  • Comply with applicable privacy and data protection laws including GDPR, PDPA, and others
  • Provide options for regional data residency (Singapore, KSA, UAE, China)

Full details on data practices can be found in our Privacy Policy.

 

6. Intellectual Property

All intellectual property rights in ThreatBook Products remain the sole property of ThreatBook. This includes software, subscriptions, documentation, user interfaces, algorithms, and threat intelligence data.

 

7. Fees & Payment

Paid subscriptions are billed in advance per the Order. All fees are non-refundable unless required by law. Non-payment may result in service suspension or termination.

 

8. Term & Termination

This Agreement remains in effect until expiration or termination of all Orders. Either party may terminate for material breach not cured within 30 days. Upon termination, all licenses and access rights cease.

 

9. Disclaimers

ThreatBook provides its services "as is." We do not guarantee complete prevention of cyber threats or uninterrupted availability. We disclaim all implied warranties to the extent allowed by law.

 

10. Limitation of Liability

ThreatBook’s aggregate liability shall not exceed the amount paid by you in the 12 months preceding the claim. We are not liable for indirect or consequential damages.

 

11. Export Control & Sanctions Compliance

You may not use our services if you are subject to embargoes, sanctions, or are on any government denied-party list.

 

12. Governing Law & Jurisdiction

This Agreement is governed by the laws of Singapore. Disputes shall be resolved via arbitration in Singapore under SIAC rules.

 

13. Miscellaneous

  • No rights may be transferred without prior written consent.
  • If any term is found unenforceable, remaining terms remain in effect.
  • This Agreement supersedes all prior agreements relating to the subject matter.

 

14. Contact Information

Legal Questions: legal@threatbook.io

Abuse Reports: abuse@threatbook.io

 

For further details, refer to our: