Terms and Conditions

Red Sword Security Private Limited / Red Sword Strix Terms of Service

Effective Date: 15 May, 2026

Company: Red Sword Security Private Limited

Registered Location: Hamirpur, Himachal Pradesh, India

Contact Email: contact@redswordsecurity.com

Product: Red Sword Strix

1. Acceptance of Terms

These Terms and Conditions ("Terms") govern access to and use of Red Sword Strix and related services provided by Red Sword Security Private Limited.

By accessing or using Red Sword Strix, you agree to these Terms. If you are using the service on behalf of an organization, you represent that you are authorized to bind that organization.

If you do not agree to these Terms, you must not access or use Red Sword Strix.

2. Definitions

Company / We / Us
Red Sword Security Private Limited.
Product / Platform
Red Sword Strix.
Customer / You
The organization or individual using the service.
User
Any person authorized by the customer to access the service.
Customer Data
Data submitted, uploaded, processed, or generated through the customer's use of the service.
Security Data
Alerts, logs, telemetry, incident data, rule IDs, device metadata, and related cybersecurity information processed through Red Sword Strix.

3. Service Description

Red Sword Strix is a cybersecurity intelligence platform that may provide:

  • Alert ingestion
  • Duplicate alert grouping
  • Noise reduction
  • Risk scoring
  • Incident timelines
  • AI-assisted explanations
  • Reports
  • Dashboards
  • Integrations with customer security tools

Red Sword Strix is intended to assist security teams. It is not a substitute for professional cybersecurity judgment, incident response, legal compliance, or risk management.

4. Account Registration

Customers and users must provide accurate information during registration.

You are responsible for:

  • Maintaining confidentiality of login credentials
  • Managing user access
  • Revoking access when users leave
  • Ensuring authorized use only
  • Promptly notifying us of suspected unauthorized access

5. Acceptable Use

You may use Red Sword Strix only for lawful, defensive, authorized cybersecurity purposes.

You must not:

  • Use the service for illegal hacking, malware deployment, credential theft, surveillance, or unauthorized access
  • Upload malicious code except in authorized testing environments expressly approved by Red Sword Security Private Limited
  • Attempt to disrupt, reverse engineer, overload, bypass, or exploit the platform
  • Use the platform to violate privacy, employment, surveillance, or data protection laws
  • Submit data you are not authorized to process
  • Share access credentials
  • Interfere with other customers or platform infrastructure
  • Use the platform for offensive cyber operations without explicit written authorization

6. Customer Responsibilities

The customer is responsible for:

  • Obtaining necessary permissions before monitoring endpoints or systems
  • Ensuring employees/users are informed as required by law or policy
  • Configuring agents, SIEM integrations, and API keys correctly
  • Reviewing alerts before taking action
  • Validating recommendations before executing response actions
  • Complying with applicable obligations under the DPDP Act, IT Act, SPDI Rules, CERT-In Directions, employment law, privacy law, and contractual obligations
  • Maintaining internal incident response procedures

7. AI and Automated Recommendations

Red Sword Strix may provide AI-assisted explanations, summaries, or recommended actions.

Such outputs are advisory and may be incomplete or inaccurate.

Customers must independently verify AI-generated outputs before taking security, disciplinary, legal, operational, or business action.

Red Sword Security Private Limited is not responsible for decisions taken solely based on AI-generated output without appropriate human review.

8. Security Actions and Automation

Where the platform supports automated actions such as alert suppression, ticket creation, device isolation, notification routing, or recommended remediation:

  • Customers must configure such actions carefully
  • Customers are responsible for reviewing automation rules
  • Red Sword Security Private Limited is not liable for customer misconfiguration or unauthorized automation
  • High-impact actions should require human approval unless otherwise agreed

9. Fees and Payment

Paid services are billed according to the applicable order form, subscription plan, invoice, or written agreement.

Unless otherwise stated, fees are non-refundable, taxes are additional, late payment may result in suspension, plan limits may apply, and free trials may be modified or terminated at any time.

10. Alpha, Beta, Trial, and Demo Access

Alpha, beta, trial, demo, or proof-of-concept access is provided "as is" and "as available."

Such access may:

  • Contain bugs
  • Have limited support
  • Be modified or withdrawn
  • Use demo or simulated data
  • Not include SLA commitments
  • Be subject to additional limits

11. Intellectual Property

Red Sword Security Private Limited retains all rights in:

  • Red Sword Strix
  • Software
  • Source code
  • UI/UX
  • Models
  • Scoring logic
  • Documentation
  • Branding
  • Product designs
  • Report templates
  • Proprietary workflows

Customers retain ownership of their Customer Data. No rights are transferred except the limited right to use the service according to these Terms.

12. Customer Data License

Customer grants Red Sword Security Private Limited a limited license to process Customer Data only to:

  • Provide the service
  • Maintain and secure the platform
  • Generate dashboards and reports
  • Provide support
  • Improve reliability and performance
  • Comply with law
  • Perform agreed integrations

We may use anonymized or aggregated data for analytics, benchmarking, product improvement, and security research, provided it does not identify the customer or individuals.

13. Confidentiality

Both parties agree to protect confidential information using reasonable care.

Confidential information includes:

  • Security alerts
  • Vulnerability data
  • Threat intelligence
  • Customer systems information
  • API keys
  • Business plans
  • Pricing
  • Technical documentation
  • Non-public product information

Confidentiality obligations survive termination.

14. Data Protection

The parties will comply with applicable data protection laws, including applicable provisions of the DPDP Act, IT Act, SPDI Rules, CERT-In Directions, and relevant rules or directions.

Where required, the parties may enter into a separate Data Processing Agreement.

15. Disclaimers

Red Sword Strix is provided on an "as is" and "as available" basis unless otherwise agreed.

We do not guarantee that:

  • All threats will be detected
  • All false positives will be removed
  • All attacks will be prevented
  • AI outputs will always be correct
  • Integrations will always function without third-party issues
  • The service will be uninterrupted or error-free
  • Reports will satisfy every legal, regulatory, or audit requirement

16. Limitation of Liability

To the maximum extent permitted by law, Red Sword Security Private Limited will not be liable for:

  • Indirect, incidental, special, consequential, or punitive damages
  • Loss of profits
  • Loss of business
  • Loss of data
  • Security incidents caused by customer systems
  • Customer misconfiguration
  • Third-party service failures
  • Decisions taken without human review

Total liability will not exceed the fees paid by the customer to Red Sword Security Private Limited in the 3 months preceding the claim, unless otherwise required by law or agreed in writing.

17. Indemnity

Customer agrees to indemnify Red Sword Security Private Limited against claims arising from:

  • Unauthorized use of the service
  • Illegal monitoring or processing
  • Customer data submitted without lawful authority
  • Violation of these Terms
  • Customer misconfiguration
  • Customer's violation of law or third-party rights

18. Suspension and Termination

We may suspend or terminate access if:

  • Fees are unpaid
  • Terms are violated
  • Use creates security risk
  • Illegal activity is suspected
  • Required by law or government authority
  • Customer infrastructure threatens platform stability

Upon termination, access may be disabled and data may be deleted according to retention policies and legal requirements.

19. Data Retention After Termination

Unless otherwise agreed in writing or required by law, customer data may be retained for up to 180 days after termination for backup, audit, legal, security, or operational purposes.

After the retention period, data may be deleted or anonymized according to internal processes.

20. Governing Law and Jurisdiction

These Terms are governed by the laws of India.

Subject to applicable law, courts located in Hamirpur, Himachal Pradesh, India shall have jurisdiction unless otherwise agreed in writing.

21. Contact

For legal, support, privacy, or grievance-related queries:

Red Sword Security Private Limited

Hamirpur, Himachal Pradesh, India

Email: contact@redswordsecurity.com