Terms of Use
Web Application Firewall Scanning Service Agreement
This Terms of Use Agreement (“Agreement”) is a legally binding contract between you (the “Customer”) and [WAF Scan] (“Company”, “we”, “us”, or “our”). By accessing, using, or purchasing our WAF scanning services, you agree to be bound by these terms.
1. Service Description
1.1 WAF Scanning Services
Company provides Web Application Firewall (WAF) security scanning and assessment services (the “Service”) designed to:
- Analyze WAF configurations and rule effectiveness
- Identify potential security vulnerabilities in WAF implementations
- Provide recommendations for optimizing WAF security posture
- Generate reports on WAF performance and security gaps
- Offer guidance on improving WAF rule management
1.2 Service Scope
The Service involves passive scanning techniques that collect and analyze publicly available information about your web applications and WAF configurations. No intrusive or penetration testing is performed as part of our standard service offering.
2. Customer Responsibilities and Authorization
2.1 Ownership and Authorization
Customer represents and warrants that they:
- Own or have explicit written authorization to scan all target systems, domains, and applications
- Have obtained all necessary permissions from system owners, hosting providers, and relevant stakeholders
- Will provide accurate contact information and target system details
- Possess legal authority to enter into this Agreement
2.2 Compliance Obligations
Customer agrees to:
- Use the Service only for legitimate security assessment purposes
- Comply with all applicable laws and regulations
- Implement security recommendations within reasonable timeframes
- Not use the Service to scan systems without proper authorization
- Immediately notify Company of any unauthorized access or security incidents
3. Service Limitations and Disclaimers
3.1 Service Availability
- Service availability is subject to scheduled maintenance windows
- Company will make commercially reasonable efforts to maintain service uptime
- Service may be temporarily unavailable due to technical issues, maintenance, or circumstances beyond our control
3.2 Scanning Limitations
- Scans are limited to publicly accessible information and configurations
- Results are point-in-time assessments and may not reflect real-time security status
- Company does not guarantee detection of all vulnerabilities or security issues
- Service frequency and depth may be subject to plan limitations
3.3 No Security Guarantees
Customer acknowledges that:
- Scanning results are advisory recommendations, not guarantees of security
- Use of the Service does not ensure complete protection against security threats
- Security assessment is only current as of the scan date
- Additional security measures beyond WAF optimization may be necessary
4. Data Collection, Handling, and Privacy
4.1 Information Collected
Company collects and processes:
- Customer account information (contact details, billing information)
- Target system specifications and domain information
- Publicly available information gathered during passive scans
- Service usage analytics and performance metrics
- Customer feedback and support communications
4.2 Public Data Disclaimer
Customer acknowledges that our scanning process collects only publicly available information. While this data may be accessible to others through public sources, our compiled reports, analysis, and recommendations remain confidential to the Customer.
4.3 Data Protection
- Customer information is protected according to industry security standards
- Scan results and reports are confidential and not shared with third parties
- We do not sell, rent, or distribute customer data or scan results
- Data retention periods are specified in our Privacy Policy
4.4 Data Retention
- Customer account data is retained for the duration of the service relationship
- Scan results and reports are retained according to the customer’s subscription plan
- Upon termination, customers have 90 days to request data export before deletion
5. Account Management
5.1 Account Security
Customer is responsible for:
- Maintaining confidentiality of login credentials
- Monitoring account access and usage
- Immediately reporting suspected unauthorized access
- All activities conducted through their account
5.2 Account Termination
Company may suspend or terminate accounts for:
- Violation of these Terms of Use
- Suspected fraudulent or illegal activity
- Non-payment of fees
- Misuse of the Service or Company’s intellectual property
6. Payment Terms and Billing
6.1 Subscription Fees
- Fees are based on the selected service plan and scanning scope
- Payment is required in advance of service delivery
- All fees are non-refundable unless otherwise specified
- Additional charges may apply for usage exceeding plan limitations
6.2 Payment Processing
- Accepted payment methods are specified during account setup
- Automatic billing renewal unless cancelled with 30 days notice
- Late payments may incur interest charges of 1% per month
- Service suspension may occur for accounts over 60 days past due
7. Acceptable Use Policy
7.1 Permitted Uses
The Service may only be used for:
- Legitimate security assessment and improvement
- WAF optimization and rule enhancement
- Internal security compliance and reporting
- Educational and research purposes with proper authorization
7.2 Prohibited Activities
Customer shall not:
- Scan systems without proper authorization
- Use the Service for malicious or illegal purposes
- Attempt to reverse engineer or circumvent service protections
- Share access credentials with unauthorized parties
- Violate any applicable laws or regulations
- Interfere with service operations or other customers
8. Intellectual Property Rights
8.1 Service Ownership
All rights, title, and interest in the Service, including software, methodologies, and proprietary analysis techniques, remain with Company and its licensors.
8.2 Report Ownership
While scan reports are provided to Customer, the underlying scanning methodologies, analysis frameworks, and proprietary processes remain Company’s intellectual property.
8.3 Customer Feedback
Customer feedback and suggestions may be used by Company to improve services without compensation or attribution requirements.
9. Limitation of Liability
9.1 Disclaimer of Warranties
THE SERVICE IS PROVIDED “AS IS” WITHOUT WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT.
9.2 Liability Limitations
Company’s total liability for any claims arising from this Agreement shall not exceed the fees paid by Customer in the 12 months preceding the claim. Company shall not be liable for indirect, consequential, incidental, or punitive damages.
10. Term and Termination
10.1 Agreement Term
This Agreement remains in effect for the subscription period specified in your service plan, with automatic renewal unless cancelled.
10.2 Termination Rights
Either party may terminate with 30 days written notice. Company may terminate immediately for material breach or non-payment.
10.3 Post-Termination
Upon termination, Customer access to the Service ceases immediately. Data export requests must be made within 90 days of termination.
11. General Provisions
11.1 Governing Law
This Agreement is governed by [UK] law, and disputes shall be resolved in [UK] courts.
11.2 Modifications
Company may update these terms with 30 days notice to customers. Continued use constitutes acceptance of revised terms.
11.3 Contact Information
Questions regarding this Agreement should be directed to:
- Email: [TOU@wafscan.com]
- Address: [Piccadilly Circus London UK]
11.4 Severability
If any provision is deemed unenforceable, the remainder of this Agreement remains in full effect.
Last Updated: [Aug 10 2025]