Terms of Use

SyscodeFlow Security Testing Services

Last Updated: January 15, 2025 — These terms reflect our current policies and service offerings

Acceptance and Agreement

By accessing SyscodeFlow services through syscode-flow.com or engaging with our security testing offerings, you acknowledge that you have read, understood, and agree to be bound by these Terms of Use. These terms create a legally binding agreement between you and SyscodeFlow regarding your use of our cybersecurity services.

Service Acknowledgment

Our security testing and vulnerability assessment services require explicit agreement to these terms before any testing begins. If you disagree with any portion of these terms, you should discontinue use of our services immediately.

Service Description and Scope

SyscodeFlow provides professional security testing and vulnerability assessment services to organizations seeking to improve their cybersecurity posture. Our services include penetration testing, security audits, and vulnerability assessments conducted by certified professionals.

Testing Limitations

All security testing is performed within agreed-upon parameters and timeframes. Testing scope must be clearly defined and authorized in writing before any assessment begins. We do not test systems without proper authorization or outside agreed boundaries.

Testing activities are strictly limited to authorized systems and networks as specified in your service agreement.

Service Availability

While we strive to maintain consistent service availability, security testing schedules may be adjusted based on technical requirements, client needs, or unforeseen circumstances. We will communicate any scheduling changes promptly.

User Responsibilities and Obligations

Clients engaging our services have specific responsibilities that must be fulfilled for successful security assessments. These obligations protect both parties and ensure effective testing outcomes.

  • Provide accurate information about systems to be tested
  • Obtain necessary internal approvals before testing begins
  • Designate appropriate contacts for testing coordination
  • Maintain confidentiality of testing methods and results
  • Implement recommended security improvements appropriately
  • Notify relevant stakeholders about planned testing activities

Authorization Requirements

You must have proper legal authority to authorize security testing on all systems included in the assessment scope. This includes owned systems, leased infrastructure, and any third-party services where testing is planned.

Confidentiality and Data Protection

Security testing involves access to sensitive information about your systems and potential vulnerabilities. We maintain strict confidentiality standards and implement appropriate data protection measures throughout our engagement.

Information Handling

All client information, including system details, vulnerabilities discovered, and testing results, is treated as confidential and protected according to industry standards. We do not share client information with unauthorized parties.

Testing data and results are securely stored and access is limited to authorized personnel directly involved in your assessment.

Data Retention

Client data and testing results are retained for a reasonable period to support ongoing security improvements and potential follow-up assessments. Specific retention periods are outlined in individual service agreements.

Limitations of Liability

Security testing involves inherent risks, and while we take precautions to minimize potential impacts, some limitations on liability are necessary for practical service delivery.

Testing Impacts

Although we use careful testing methodologies, security assessments may occasionally cause temporary system disruptions or performance impacts. We work to minimize such effects, but cannot guarantee zero impact during testing.

Service Limitations

Our assessments provide security insights based on testing conducted at specific points in time. Security landscapes change constantly, and our findings represent conditions during the assessment period rather than ongoing security guarantees.

Intellectual Property and Reporting

Testing methodologies, tools, and general security knowledge remain SyscodeFlow intellectual property, while specific findings and recommendations related to your systems are provided for your use in improving security posture.

Report Usage

Security assessment reports are prepared specifically for the client organization and should not be shared with unauthorized parties without written consent. Reports may reference general security principles that remain our intellectual property.

Service Modifications and Updates

We periodically update our service offerings and terms to reflect evolving security needs and industry standards. Significant changes will be communicated to active clients with reasonable advance notice.

Effective Date of Changes

Updated terms become effective on the date specified in the revision notice. Continued use of our services after effective dates constitutes acceptance of updated terms.

Questions About These Terms

If you have questions about these Terms of Use or need clarification about our services, please contact us directly.

Email: info@syscode-flow.com

Phone: +886 75535207

Address: 325, Taiwan, Taoyuan City, Longtan District, Bainian Rd, No. 11