These Terms of Service ("Terms") govern your purchase and use of software products ("the Software") provided by BlueTeamAutomation ("we," "us," or "our"). By purchasing, downloading, installing, or using any BlueTeamAutomation product, you agree to be bound by these Terms. If you do not agree, do not use the Software.
Key principle: BlueTeamAutomation products use a perpetual license model with local deployment. Once purchased, you own the right to use the Software indefinitely. No ongoing subscription is required for core functionality.
1. License Grant
Upon purchase of a valid license, we grant you a perpetual, non-exclusive, non-transferable license to install and use the Software on hardware you own or control, subject to the tier and terms of your specific license. Your license includes:
- The right to install and operate the Software on systems you own or have authorized control over
- Access to software updates, patches, and new features released during your included update period (12 months from date of purchase for standard licenses)
- The right to use the Software for commercial, organizational, or personal purposes within the scope of these Terms
- Access to technical support during your included support period (12 months from date of purchase for standard licenses)
After the included 12-month update period ends, you retain permanent use of the last version of the Software you received. You may optionally purchase update renewals to continue receiving new versions.
2. License Tiers
BlueTeamAutomation products may be offered across multiple license tiers, each with different capabilities and pricing. The specific features, limitations, and rights associated with each tier are described on the product purchase page at the time of purchase. Common tier distinctions include:
- Lite licenses: Core functionality, single AI model support, suitable for individual practitioners and small teams.
- Pro licenses: Full feature suite, multi-model AI support, advanced integrations, and priority support.
- Enterprise licenses: Custom pricing, volume licensing, dedicated support, and terms as specified in a separate Enterprise agreement.
Regardless of tier, all licenses are perpetual. Free-tier functionality (where offered) does not require a license key but may be subject to usage limits as described in the product interface.
3. License Restrictions
You may not:
- Redistribute, resell, sublicense, rent, lease, or transfer the Software or your license key to any third party
- Reverse engineer, decompile, disassemble, or attempt to derive the source code of the Software, except to the extent expressly permitted by applicable law
- Remove, alter, or obscure any proprietary notices, labels, or branding in the Software
- Use the Software to provide a competing hosted service, managed security service, or software-as-a-service offering
- Share, publish, or distribute your license key publicly or to unauthorized users
- Use the Software in violation of any applicable law, regulation, or third-party rights
- Circumvent or attempt to circumvent any license validation, feature gating, or usage limits built into the Software
4. Acceptable Use
BlueTeamAutomation products are designed for authorized defensive security operations within environments you own or have explicit written permission to assess. Specific acceptable use guidelines include:
- Vulnerability management products (CVEasy AI, BTA Comply): Use only to analyze and remediate vulnerabilities in systems you are authorized to manage.
- Attack simulation products (BASzy AI): Use only against systems and networks where you have explicit written authorization to conduct security testing. Unauthorized use against third-party systems may violate applicable computer crime laws.
- Monitoring and detection products (BTA SIEM, BTA SOAR, SAFEty Guard AI): Use only on endpoints, networks, and systems you own or have authorized administrative access to.
- Identity and access products (BTA Identity): Use only within your organization's identity infrastructure with appropriate administrative authority.
- Code security products (BTA CodeGuard): Use only to scan codebases you own, maintain, or have been authorized to audit.
We accept no liability for unauthorized, illegal, or unethical use of our products. You are solely responsible for ensuring compliance with all applicable laws and regulations in your jurisdiction.
5. Product-Specific Terms
5.1 Vulnerability Management (CVEasy AI, BTA Comply)
These products provide vulnerability prioritization, compliance mapping, and remediation guidance based on publicly available data sources (including NVD, EPSS, CISA KEV, and MITRE frameworks). The Software does not guarantee the security of your systems and should be used as one component of a comprehensive security program. Scoring, prioritization, and AI-generated remediation guidance are provided for informational purposes and do not constitute professional security consulting.
5.2 Attack Simulation (BASzy AI)
BASzy AI is a breach and attack simulation platform. You are solely responsible for obtaining proper authorization before running any attack simulations. The Software includes offensive security testing capabilities that, if used without authorization, may violate criminal statutes. We strongly recommend maintaining written authorization records for all testing activities.
5.3 Detection and Response (BTA SIEM, BTA SOAR, SAFEty Guard AI)
These products collect, correlate, and analyze security events from your local environment. All data processing occurs on your hardware. Detection rules, correlation logic, and automated response actions are provided as a starting point and should be validated and customized for your environment. False positives and false negatives are inherent in all detection systems.
5.4 Supply Chain and Intelligence (BTA CodeGuard, BTA ThreatFeed)
These products analyze software composition and aggregate threat intelligence data. BTA ThreatFeed may connect to publicly available threat intelligence sources as configured by you. BTA CodeGuard performs static analysis on local codebases. Neither product transmits your proprietary code or findings to external parties.
5.5 Identity and Consumer Products (BTA Identity, Roost)
BTA Identity integrates with your organization's identity infrastructure. Roost is a consumer-oriented home security product. Both operate under the same local-first principles. Product-specific documentation governs platform-specific requirements and integrations.
6. Bundle Terms
BlueTeamAutomation may offer product bundles combining multiple products at a discounted price. Bundle licenses are governed by the following additional terms:
- Bundle licenses are treated as a single purchase. The 12-month update and support period applies uniformly to all products in the bundle from the purchase date.
- Individual products within a bundle may not be separated, resold, or transferred individually.
- Bundle pricing is available only at the time of initial purchase. Adding products to an existing bundle after purchase is subject to then-current pricing.
- If a product within a bundle is discontinued, you retain perpetual use of the last released version.
7. Updates and Support
All standard licenses include 12 months of software updates and technical support from the date of purchase. During this period, you will receive:
- All software updates, patches, and new feature releases for your licensed products
- Security updates and critical bug fixes
- Email-based technical support with a target response time of 2 business days
- Access to documentation and knowledge base resources
After the 12-month period, you may optionally purchase an update renewal to continue receiving new versions and support. Without a renewal, you retain full use of the last version received during your active update period. Critical security patches for severe vulnerabilities may be made available at our discretion to all licensed users, regardless of update status.
Enterprise licenses may include extended support terms, dedicated support channels, and custom SLAs as specified in the Enterprise agreement.
8. Intellectual Property
The Software, including all code, documentation, design, trademarks, logos, and associated intellectual property, is and remains the exclusive property of BlueTeamAutomation. Your license grants you the right to use the Software; it does not transfer ownership of any intellectual property.
- All AI models, scoring algorithms, detection rules, and correlation logic included in the Software are proprietary.
- Reports, remediation guides, and other outputs generated by the Software using your data belong to you.
- Custom configurations, rules, and templates you create within the Software belong to you.
- Feedback, suggestions, or feature requests you provide to us may be used to improve the Software without obligation or compensation.
9. Privacy and Data Handling
Your use of our website is governed by our Privacy Policy. With respect to the Software itself:
- All BlueTeamAutomation products operate locally on your hardware. We do not collect, store, access, or process any data from the Software.
- We have no visibility into your vulnerability data, scan results, security events, compliance status, or any other operational data processed by the Software.
- License validation is performed locally using your license key. No usage data is transmitted during validation.
10. Disclaimer of Warranties
THE SOFTWARE IS PROVIDED "AS IS" AND "AS AVAILABLE" WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE, AND NON-INFRINGEMENT. WE DO NOT WARRANT THAT THE SOFTWARE WILL BE UNINTERRUPTED, ERROR-FREE, SECURE, OR THAT DEFECTS WILL BE CORRECTED.
Security software, by its nature, cannot guarantee complete protection against all threats. BlueTeamAutomation products are tools that augment your security operations. They do not replace professional judgment, comprehensive security programs, or qualified security personnel. You acknowledge that:
- AI-generated content (remediation guidance, risk scores, compliance mappings) is advisory in nature and should be reviewed by qualified personnel before implementation.
- Vulnerability scoring and prioritization are based on publicly available data that may be incomplete, delayed, or inaccurate.
- Attack simulation results reflect the state of your environment at the time of testing and do not constitute a guarantee of security.
- Detection and response capabilities are subject to the limitations of the underlying detection logic, your configuration, and the visibility afforded by your deployment.
11. Limitation of Liability
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, BLUETEAMAUTOMATION SHALL NOT BE LIABLE FOR ANY INDIRECT, INCIDENTAL, SPECIAL, CONSEQUENTIAL, OR PUNITIVE DAMAGES, INCLUDING BUT NOT LIMITED TO LOSS OF PROFITS, LOSS OF DATA, LOSS OF GOODWILL, BUSINESS INTERRUPTION, SECURITY BREACH DAMAGES, OR COST OF PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES, ARISING OUT OF OR IN CONNECTION WITH YOUR USE OF OR INABILITY TO USE THE SOFTWARE, EVEN IF WE HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
OUR TOTAL AGGREGATE LIABILITY FOR ALL CLAIMS ARISING UNDER OR IN CONNECTION WITH THESE TERMS SHALL NOT EXCEED THE TOTAL AMOUNT PAID BY YOU FOR THE SOFTWARE IN THE TWELVE (12) MONTHS IMMEDIATELY PRECEDING THE EVENT GIVING RISE TO THE CLAIM.
Some jurisdictions do not allow the exclusion or limitation of certain warranties or liability. In such jurisdictions, our liability shall be limited to the greatest extent permitted by applicable law.
12. Indemnification
You agree to indemnify, defend, and hold harmless BlueTeamAutomation, its officers, directors, employees, and agents from and against any claims, damages, losses, liabilities, costs, and expenses (including reasonable attorneys' fees) arising from:
- Your use of the Software in violation of these Terms
- Your use of the Software against systems without proper authorization
- Your violation of any applicable law, regulation, or third-party rights
- Any data breach or security incident resulting from your misconfiguration or misuse of the Software
13. Termination
These Terms remain in effect for as long as you use the Software. We may terminate your license if:
- You materially breach these Terms and fail to cure the breach within 30 days of written notice
- You use the Software for unauthorized, illegal, or unethical purposes
- You attempt to circumvent license validation or feature restrictions
- You redistribute or sublicense the Software without authorization
Upon termination, you must cease all use of the Software and destroy all copies in your possession. Termination does not entitle you to a refund. The following sections survive termination: Intellectual Property, Disclaimer of Warranties, Limitation of Liability, Indemnification, and Governing Law.
14. Refund Policy
We offer a 14-day refund period from the date of purchase. If you are not satisfied with the Software for any reason, contact us within 14 days for a full refund. After 14 days, all sales are final. Refund requests should be sent to hello@blueteamautomation.com with your order number.
15. Export Compliance
The Software may be subject to United States export control laws and regulations. You agree to comply with all applicable export and re-export restrictions and not to transfer the Software to any prohibited country, entity, or individual as specified by the U.S. Department of Commerce, U.S. Department of Treasury, or any other U.S. government authority.
16. Governing Law and Dispute Resolution
These Terms are governed by and construed in accordance with the laws of the State of Illinois, United States, without regard to its conflict of law provisions. Any dispute arising under or in connection with these Terms shall be subject to the exclusive jurisdiction of the state and federal courts located in Cook County, Illinois.
Before initiating formal legal proceedings, you agree to attempt to resolve any dispute informally by contacting us at hello@blueteamautomation.com. We will attempt to resolve the dispute within 60 days. If informal resolution fails, either party may pursue formal legal remedies.
17. Severability
If any provision of these Terms is held to be invalid, illegal, or unenforceable by a court of competent jurisdiction, the remaining provisions shall remain in full force and effect. The invalid provision shall be modified to the minimum extent necessary to make it valid and enforceable while preserving its original intent.
18. Entire Agreement
These Terms, together with our Privacy Policy and any applicable Enterprise agreement, constitute the entire agreement between you and BlueTeamAutomation regarding the use of the Software. These Terms supersede all prior or contemporaneous communications, proposals, and representations with respect to the Software. No modification of these Terms shall be effective unless made in writing and signed by both parties, except that we may update these Terms as described in Section 19.
19. Changes to These Terms
We may update these Terms from time to time to reflect changes in our products, business practices, or legal requirements. When we make material changes, we will update the "Effective date" at the top of this page and notify active customers by email at least 30 days before the changes take effect. Your continued use of the Software after the updated Terms become effective constitutes your acceptance of the changes. If you do not agree with updated Terms, you may continue using the version of the Software you have under the prior Terms, but you will not be eligible for new updates until you accept the current Terms.
20. Contact
Questions about these Terms? Contact us at:
- Email: hello@blueteamautomation.com
- Subject line: Terms of Service Inquiry