IASECURITY
Home About Services Contact

Terms of Service

Rules of engagement for our cyber operations

Last updated: January 1, 2025

Welcome to the Dark Side (Legal Edition)

By engaging IASECURITY services, you're essentially hiring reformed blackhats to legally break into your systems. Think of this as your authorized penetration contract with some seriously skilled operators.

Scope of Authorized Attacks

What We're Authorized to Pwn

  • Your routers, switches, and firewalls are fair game
  • SQL injection, XSS, and zero-days welcome
  • Social engineering campaigns included
  • Lock picking and badge cloning (with permission)

Off-Limits Targets

  • We don't crash hospitals or power grids
  • We find it, document it, but don't steal it
  • No data deletion or system destruction

Your Responsibilities (Don't Snitch)

  • Tell us exactly what to hack and what not to touch
  • Warn your SOC team we're coming (optional for red team engagements)
  • Provide 24/7 contacts in case we find something critical
  • Ensure you have authority to authorize these attacks

Payment Terms (Cryptocurrency Preferred)

  • 50% deposit before we start breaking in
  • Balance due upon delivery of penetration report
  • Critical findings may incur additional charges
  • We might accidentally test your payment systems' security

Liability and Risk (You Asked for This)

You're literally paying us to attack your systems. Here's what that means:

  • Some services might crash during testing (we'll try to be gentle)
  • We might find sensitive data you didn't know was exposed
  • Your SOC might have a heart attack when they see our traffic
  • The findings report might be... enlightening

Confidentiality (Our Lips Are Sealed)

  • We've signed more NDAs than most government agencies
  • We won't tweet about pwning your network
  • All communications encrypted and ephemeral
  • All findings destroyed after agreed retention period

Termination Clause (Rage Quit)

Either party can terminate this agreement, but here's what happens:

  • We stop all attack activities within 1 hour
  • You get whatever we found up to termination point
  • Payment for completed work is non-refundable
  • We'll clean up any persistence mechanisms (probably)

Contact Our Legal Team

Questions about these terms? Need to modify the scope? Our legal team (also ex-hackers) is standing by:

legal@ia-security.io

contracts@ia-security.io

+1 (856) 252-0558

IA SECURITY, LLC
131 Continental Dr, Suite 305
Newark, DE US

IASECURITY

Offensive security specialists. We protect your infrastructure before the attackers.

Services

  • Penetration Testing
  • Vulnerability Assessment
  • Red Team Operations
  • Security Training

Company

  • About Us
  • Contact

Legal

  • Privacy Policy
  • Terms of Service
  • Cookie Policy
  • Responsible Disclosure

© 2025 IASECURITY. All rights reserved.