TERMS OF
SERVICE.
// OBJECTIVE: Define the rules of engagement. Secure partnerships are built on clear technical boundaries, mutual professional integrity, and a shared commitment to zero-trust defense.
Authorized Rules of Engagement
Our offensive tools and VAPT simulations must only be deployed against infrastructure assets you legally own or have explicit, documented authorization to audit. Unauthorized deployment results in immediate termination of service.
Liability & Operational Boundaries
While FortiCore Consulting employs surgical precision, high-fidelity security audits involve the active simulation of adversarial logic which can, in rare cases, impact system stability. We are not liable for incidental downtime occurring during authorized exploitation phases.
Intelligence Ownership & IP
All remediation protocols, custom hardening scripts, and technical reports provided during an engagement are the intellectual property of the client unit. FortiCore Consulting retains ownership of the proprietary scanning engines and offensive methodology.
Subscription & Audit Periodicity
Service engagements are categorized as either one-time audits or continuous monitoring via our SOC. Continuous surveillance requires an active telemetry uplink and a valid subscription.
// Failure to comply with operational boundaries results in
immediate suspension of technical support protocols and potential revocation of offensive tool licensing.