ACT Terms of Use: Difference between revisions

From GCA ACT
Jump to navigationJump to search
 
(31 intermediate revisions by the same user not shown)
Line 1: Line 1:
__NOTOC__
__NOTOC__
Welcome to [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|Actionable Cybersecurity Tools (ACT)]], a service provided by [https://www.globalcyberalliance.org/ Global Cyber Alliance, Inc.] ("we" or "us" or "[https://www.globalcyberalliance.org/ GCA]"), a non-profit organization headquartered in New York, New York, United States, whose mission is to create and equip communities to deliver a more trustworthy Internet for all.
Welcome to [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|Actionable Cybersecurity Tools (ACT)]], a service provided by [https://www.globalcyberalliance.org/ Global Cyber Alliance, Inc.] ("we" or "us" or "[https://www.globalcyberalliance.org/ GCA]"), a non-profit organization headquartered in New York, New York, United States, [https://www.globalcyberalliance.org/our-mission/ whose mission] is to create and equip communities to deliver a more trustworthy Internet for all.
   
   
To support our vibrant community, we provide [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] which serves this mission. We strive to make and keep cybersecurity educational and informational content from [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] available on the internet free of charge, in perpetuity.
To support our vibrant community, we provide [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] which serves this mission. We strive to make and keep cybersecurity educational and informational content from [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] available on the internet free of charge, in perpetuity.
Line 15: Line 15:
# [[#2. Privacy Policy and GDPR|Privacy Policy and GDPR]]
# [[#2. Privacy Policy and GDPR|Privacy Policy and GDPR]]
# [[#3. Content We Host|Content We Host]]
# [[#3. Content We Host|Content We Host]]
# [[#4. Refraining from Certain Activities|Refraining from Certain Activities]]
# [[#4. Use of AI-Generated Content|Use of AI-Generated Content]]
# [[#5. Password Security|Password Security]]
# [[#5. Refraining from Certain Activities|Refraining from Certain Activities]]
# [[#6. Trademarks|Trademarks]]
# [[#6. Password Security|Password Security]]
# [[#7. Licensing of Content|Licensing of Content]]
# [[#7. Trademarks|Trademarks]]
# [[#8. DCMA Compliance|DCMA Compliance]]
# [[#8. Licensing of Content|Licensing of Content]]
# [[#9. Third-Party Websites and Resources|Third-Party Websites and Resources]]
# [[#9. DMCA Compliance|DMCA Compliance]]
# [[#10. Management of Websites|Management of Websites]]
# [[#10. Third-Party Websites and Resources|Third-Party Websites and Resources]]
# [[#11. Termination|Termination]]
# [[#11. Management of Websites|Management of Websites]]
# [[#12. Disputes and Jurisdiction|Disputes and Jurisdiction]]
# [[#12. Termination|Termination]]
# [[#13. Disclaimers|Disclaimers]]
# [[#13. Disputes and Jurisdiction|Disputes and Jurisdiction]]
# [[#14. Limitation on Liability|Limitation on Liability]]
# [[#14. Disclaimers|Disclaimers]]
# [[#15. Modifications to these Terms of Use|Modifications to these Terms of Use]]
# [[#15. Limitation on Liability|Limitation on Liability]]
# [[#16. Other Terms|Other Terms]]
# [[#16. Modifications to these Terms of Use|Modifications to these Terms of Use]]
# [[#17. Effective Date|Effective Date]]
# [[#17. Other Terms|Other Terms]]
# [[#18. Effective Date|Effective Date]]


=1. Our Mission=
=1. Our Mission=
Line 38: Line 39:


<ol type="a">
<ol type="a">
<li>Because [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] contains content sourced from publicly available websites, cybersecurity tool owners, [https://www.globalcyberalliance.org/ GCA] Partners, NGOs, other nonprofits, industry consortia groups, governments, generative AI tools, and various other information sources, the vast majority of the content may or may not be edited by [https://www.globalcyberalliance.org/ GCA] in any way. While we might make limited efforts to monitor for broken links, copyright issues reported by users, and consistency with our content guidelines, we do not take any responsibility for this content. Similarly, unless we have expressly stated otherwise, we do not endorse any products or opinions expressed via our services nor represent or guarantee the truthfulness, accuracy, or reliability of any content on [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]].
<li>Because [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] contains content sourced from publicly available websites, cybersecurity tool owners, [https://www.globalcyberalliance.org/ GCA] Partners, NGOs, other nonprofits, industry consortia groups, governments, [[#4. Use of AI-Generated Content|generative AI tools]], and various other information sources, the vast majority of the content may or may not be edited by [https://www.globalcyberalliance.org/ GCA] in any way. While we might make limited efforts to monitor for broken links, copyright issues reported by users, and consistency with our content guidelines, we do not take any responsibility for this content. Similarly, unless we have expressly stated otherwise, we do not endorse any products or opinions expressed via our services nor represent or guarantee the truthfulness, accuracy, or reliability of any content on [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]].


<li>You are responsible for your actions: You are legally responsible for your contributions to “Talk” or “Discussion” pages within ACT, your reuse of content from [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]], your use of any APIs enabled on [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]], and your use of our services more generally. For your protection, you should exercise caution and avoid taking any actions that may result in criminal or civil liability under applicable laws. For clarity, applicable law includes at least the laws of the United States of America and the State of New York, but may include the laws of other US States or other countries depending on the facts that may vary on a case-by-case basis. Copyright or other enforcement actions are possible including against editors, contributors, and authors non-U.S. authorities may seek to apply other country’s laws to you, including local laws where you live or where you view or edit content. We cannot offer any protection, guarantee, immunity, or indemnification against applying such laws.
<li>You are responsible for your actions: You are legally responsible for your contributions to “Talk” or “Discussion” pages within ACT, your reuse of content from [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]], your use of any APIs enabled on [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]], and your use of our services more generally. For your protection, you should exercise caution and avoid taking any actions that may result in criminal or civil liability under applicable laws. For clarity, applicable law includes at least the laws of the United States of America and the State of New York, but may include the laws of other US States or other countries depending on the facts that may vary on a case-by-case basis. Copyright or other enforcement actions are possible including against editors, contributors, and authors non-U.S. authorities may seek to apply other country’s laws to you, including local laws where you live or where you view or edit content. We cannot offer any protection, guarantee, immunity, or indemnification against applying such laws.
Line 51: Line 52:
[[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] content is for general informational purposes only: Although our website hosts much information about professional cybersecurity topics, including medical, legal, or financial issues, this content is presented for general informational purposes only. It should not be taken as professional advice. Please seek independent professional counseling from someone licensed or qualified in the applicable area instead of acting on any information, opinion, or advice contained in [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]].
[[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] content is for general informational purposes only: Although our website hosts much information about professional cybersecurity topics, including medical, legal, or financial issues, this content is presented for general informational purposes only. It should not be taken as professional advice. Please seek independent professional counseling from someone licensed or qualified in the applicable area instead of acting on any information, opinion, or advice contained in [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]].


=4. Refraining from Certain Activities=
GCA also hosts a collection of free and open-source threat intelligence tools on ACT, referred to as Threat Taming Tools ( "T3," "collection," "T3 Collection," or "T3C"). T3C is a set of free threat intelligence feeds, sources, formats, frameworks, platforms, tools, resources, research, and standards provided by the Global Cyber Alliance, Inc. ("GCA" or "the Company").
 
==3.1 T3C Version History & Attributions==
 
Version 1.0 of the T3 Collection was created on 2024-JUL-09 using traditional internet search engine results to find various types of tools and resources and existing lists of applicable tools and resources.
 
Among various publicly available sources identified using internet search engines, two relevant GitHub repositories were found to contain free resources. Some information contained therein was merged into the content included in this collection. More specifically, those two repositories are nearly identical, do not reference each other, and contain references to tools and resources that can be located through internet search engines. It should be noted that those two repositories also contain references to tools and resources that either no longer exist or are no longer free; those tools and resources were excluded from this collection. Many items added to the T3 Collection from these two sources were also identified within other publicly available sources to form its current state. As such, this collection DOES NOT meet the definition of a Derivative Work per the Apache 2.0 License attached to them. The T3 Collection is separable and distinct from and only uses the main GitHub link as an interface to provide attribution to those works:
* https://github.com/hslatman/awesome-threat-intelligence/blob/main/LICENSE
* https://github.com/P3t3rp4rk3r/Threat_Intelligence?tab=readme-ov-file"
 
==3.2 T3C-Specific Terms of Use==
 
Because the T3 Collection contains content sourced from publicly available websites, cybersecurity tool owners, GCA Partners, NGOs, other nonprofits, industry consortia groups, governments, generative AI tools, and various other information sources, the vast majority of the elements referenced in the collection are not maintained by or affiliated with GCA in any way. While we might make limited efforts to monitor for broken links, copyright issues reported by users, and consistency with our content guidelines, we do not take any responsibility for this content. Similarly, unless we have expressly stated otherwise, we do not endorse any products or opinions expressed via our services nor represent or guarantee the truthfulness, accuracy, or reliability of any content in the T3 Collection.
You are responsible for your actions: You are legally responsible for your reuse of content from the T3 Collection, your use of any elements referenced within the T3 Collection, and your use of our services more generally. For your protection, you should exercise caution and avoid taking any actions that may result in criminal or civil liability under applicable laws. For clarity, applicable law includes at least the laws of the United States of America and the State of New York, but may include the laws of other US States or other countries depending on the facts that may vary on a case-by-case basis. We cannot offer any protection, guarantee, immunity, or indemnification against applying such laws.
 
Unless explicitly excluded elsewhere in these Terms of Use, all ACT Terms of Use apply to your use of the T3C Collection.
 
=4. Use of AI-Generated Content=
Some [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] content was produced in whole or in part using generative AI tools:
 
* Animal images were generated using [https://www.midjourney.com/home Midjourney] and edited using [https://www.adobe.com Adobe] tools.
* Some icon images were created using AI tools embedded in the [https://www.canva.com/ Canva] service and edited using [https://www.adobe.com Adobe] tools.
* [https://www.grammarly.com Grammarly] was used to edit much of the text content published on the site.
* Most tool and resource descriptions were generated using a Python script that calls OpenAI's [https://chat.openai.com ChatGPT] API. Some were edited by humans, and [https://www.grammarly.com Grammarly] was used to refine them further.
* Content describing protection needs and approaches on HRC pages was created using a combination of text generated through the use of OpenAI's [https://chat.openai.com ChatGPT] and Google's [https://gemini.google.com Gemini] services. This text was also significantly edited by humans and [https://www.grammarly.com Grammarly] was used to further refine it.
* Content describing T3C resources was generated using OpenAI's [https://chat.openai.com ChatGPT] and edited by humans. [https://www.grammarly.com Grammarly] was used to further refine this text.
 
=5. Refraining from Certain Activities=
The [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] Service hosted by [https://www.globalcyberalliance.org/ GCA] only exists because of the vibrant community of users like you who use and contribute to the content. We happily welcome your participation in this community. We encourage you to be civil and polite in interacting with others in the community, act in good faith, and contribute to furthering the [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] Service's mission. We ask that all users review and follow the [[ACT Universal Code of Conduct|Universal Code of Conduct ("UCoC")]], which outlines requirements for collegial, civil collaboration when using the [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] Service.
The [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] Service hosted by [https://www.globalcyberalliance.org/ GCA] only exists because of the vibrant community of users like you who use and contribute to the content. We happily welcome your participation in this community. We encourage you to be civil and polite in interacting with others in the community, act in good faith, and contribute to furthering the [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] Service's mission. We ask that all users review and follow the [[ACT Universal Code of Conduct|Universal Code of Conduct ("UCoC")]], which outlines requirements for collegial, civil collaboration when using the [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] Service.
We reserve the right to exercise our enforcement discretion concerning the provisions in section 4 of these Terms of Use.


=5. Password Security=
We reserve the right to exercise our enforcement discretion concerning the provisions in section 5 of these Terms of Use.
 
=6. Password Security=
You are responsible for safeguarding your password and other security credentials and should never disclose them to any third party.
You are responsible for safeguarding your password and other security credentials and should never disclose them to any third party.


=6. Trademarks=
=7. Trademarks=
Although you have considerable freedom to reuse the content on the [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] website, it is essential to [https://www.globalcyberalliance.org/ GCA] that we protect our trademark rights to protect our users from fraudulent impersonators. Because of this, we ask that you please respect our trademarks. All [https://www.globalcyberalliance.org/ GCA] trademarks belong to the [https://www.globalcyberalliance.org/ GCA]. Any use of our trade names, trademarks, service marks, logos, or domain names must comply with the [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] Terms of Use, the [https://www.globalcyberalliance.org/terms-of-service/ GCA Terms of Service].
Although you have considerable freedom to reuse the content on the [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] website, it is essential to [https://www.globalcyberalliance.org/ GCA] that we protect our trademark rights to protect our users from fraudulent impersonators. Because of this, we ask that you please respect our trademarks. All [https://www.globalcyberalliance.org/ GCA] trademarks belong to the [https://www.globalcyberalliance.org/ GCA]. Any use of our trade names, trademarks, service marks, logos, or domain names must comply with the [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] Terms of Use, the [https://www.globalcyberalliance.org/terms-of-service/ GCA Terms of Service].


=7. Licensing of Content=
=8. Licensing of Content=
All users contributing to the [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] website must grant broad permissions to the general public to redistribute and reuse their contributions freely, so long as that use is properly attributed and the same freedom to reuse and redistribute is granted to any derivative works. We require that, when necessary, all submitted content be licensed so that it is freely reusable by anyone.
All users contributing to the [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] website must grant broad permissions to the general public to redistribute and reuse their contributions freely, so long as that use is properly attributed and the same freedom to reuse and redistribute is granted to any derivative works. We require that, when necessary, all submitted content be licensed so that it is freely reusable by anyone.
You agree to the following licensing requirements:
You agree to the following licensing requirements:


<ol type="a">
<ol type="a">
<li>Text to which you hold the copyright: When you submit text to which you hold the copyright, you agree to license it under [https://creativecommons.org/licenses/by-sa/4.0 Creative Commons Attribution-ShareAlike 4.0 International (CC BY-SA 4.0 DEED)].
<li>Text to which you hold the copyright: When you submit text to which you hold the copyright, you agree to license it under [https://creativecommons.org/licenses/by-sa/4.0 Creative Commons Attribution-ShareAlike 4.0 International (CC BY-SA 4.0 DEED)].
<li>Reusers must comply with that license.  
<li>Re-users must comply with that license.  
<li>Re-use: Reuse of content that we host is welcome, though exceptions exist for content contributed under "fair use" or similar exemptions under applicable copyright law. Any reuse must comply with the underlying license(s). When you re-use or redistribute a text page included in [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]], you agree to attribute the authors in any of the following fashions:
<li>Re-use: Reuse of content that we host is welcome, though exceptions exist for content contributed under "fair use" or similar exemptions under applicable copyright law. Any reuse must comply with the underlying license(s). When you re-use or redistribute a text page included in [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]], you agree to attribute the authors in any of the following fashions:
<ol type="i">
<ol type="i">
<li>Through hyperlink (where possible) or URL to the page or pages you are reusing (since each page has a history page that lists all contributors, authors, and editors);
<li>through hyperlink (where possible) or URL to the page or pages you are reusing (since each page has a history page that lists all contributors, authors, and editors);
<li>Through hyperlink (where possible) or URL to an alternative, stable online copy that is freely accessible, conforms with the license, and provides credit to the authors in a manner equivalent to the credit given on the Project Website; or
<li>through hyperlink (where possible) or URL to an alternative, stable online copy that is freely accessible, conforms with the license, and provides credit to the authors in a manner equivalent to the credit given on the Project Website; or
<li>Through a list of all authors (but please note that any list of authors may be filtered to exclude minimal contributions).
<li>through a list of all authors (but please note that any list of authors may be filtered to exclude minimal contributions).
</ol>
</ol>
<li>Modifications or additions to material that you reuse: When modifying or making additions to text that you have obtained from the [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] Website, you agree to license the modified or added content under [https://creativecommons.org/licenses/by-sa/4.0 CC BY-SA 4.0 DEED] or later (or, as explained above, another license when exceptionally required by a specific [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] addition or feature). Modifying or adding to non-text media is prohibited unless you obtain written authorization from [https://www.globalcyberalliance.org/ GCA].
<li>Modifications or additions to material that you reuse: When modifying or making additions to text that you have obtained from the [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] Website, you agree to license the modified or added content under [https://creativecommons.org/licenses/by-sa/4.0 CC BY-SA 4.0 DEED] or later (or, as explained above, another license when exceptionally required by a specific [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] addition or feature). Modifying or adding to non-text media is prohibited unless you obtain written authorization from [https://www.globalcyberalliance.org/ GCA].
Line 78: Line 111:
</ol>
</ol>


=8. DMCA Compliance=
=9. DMCA Compliance=
In fairness to our users and other creators and copyright holders, our policy is to respond to notices of alleged infringement that comply with the formalities of the Digital Millennium Copyright Act (DMCA). Pursuant to the DMCA, we will terminate, in appropriate circumstances, users and account holders of our system and network who are repeat infringers.
In fairness to our users and other creators and copyright holders, our policy is to respond to notices of alleged infringement that comply with the formalities of the Digital Millennium Copyright Act (DMCA). Pursuant to the DMCA, we will terminate, in appropriate circumstances, users and account holders of our system and network who are repeat infringers.
However, we also recognize that not all takedown notices are valid or in good faith. In such cases, we encourage users to file counter-notifications when they appropriately believe a DMCA takedown demand is invalid or improper. Please seek legal advice if you think someone has improperly filed a DCMA notice.
However, we also recognize that not all takedown notices are valid or in good faith. In such cases, we encourage users to file counter-notifications when they appropriately believe a DMCA takedown demand is invalid or improper. Please seek legal advice if you think someone has improperly filed a DCMA notice.
Line 87: Line 120:
: '''Designated Agent:''' GCA Chief Legal Officer
: '''Designated Agent:''' GCA Chief Legal Officer
: '''Address:''' 31 Tech Valley Drive, East Greenbush, NY 12061
: '''Address:''' 31 Tech Valley Drive, East Greenbush, NY 12061
: '''Telephone Number:''' 518-596-4183  
: '''Telephone Number:''' +1 518 596 4183
: '''E-Mail Address:''' [mailto:info@globalcyberalliance.org info@globalcyberalliance.org]
: '''E-Mail Address:''' [mailto:info@globalcyberalliance.org info@globalcyberalliance.org]


Please see [https://www.gpo.gov/fdsys/pkg/USCODE-2011-title17/pdf/USCODE-2011-title17-chap5-sec512.pdf 17 U.S.C. § 512(c)(3)] for proper notification requirements. Also, if you knowingly misrepresent that any activity or material on our Services is infringing, you may be liable to [https://www.globalcyberalliance.org/ GCA] for certain costs and damages.
Please see [https://www.gpo.gov/fdsys/pkg/USCODE-2011-title17/pdf/USCODE-2011-title17-chap5-sec512.pdf 17 U.S.C. § 512(c)(3)] for proper notification requirements. Also, if you knowingly misrepresent that any activity or material on our Services is infringing, you may be liable to [https://www.globalcyberalliance.org/ GCA] for certain costs and damages.


Instead of requesting that we remove the content, you can request editorial rights for pages containing information about specific cybersecurity tools, provided that the organization providing the corresponding tools authorizes you. Before doing so, you must [https://act.globalcyberalliance.org/index.php?title=Special:CreateAccount&returnto=Actionable+Cybersecurity+Tools+%28ACT%29+-+Cybersecurity+Protection+Made+Simple create an account with the ACT Service using your name and e-mail address]. Note that while this account creation form indicates that the name and e-mail address fields are optional, you must provide valid values for both fields during registration to be eligible for assuming editorial rights for [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] pages before you submit a page claim request.
Instead of requesting that we remove the content, you can request editorial rights for pages containing information about specific cybersecurity tools, provided that the organization providing the corresponding tools authorizes you. Before doing so, you must [https://act.globalcyberalliance.org/index.php?title=Special:CreateAccount&returnto=Actionable+Cybersecurity+Tools+%28ACT%29+-+Cybersecurity+Protection+Made+Simple create an account with the ACT Service using your name and e-mail address]. Note that while this account creation form indicates that the name and email address fields are optional, you must provide valid values for both fields during registration to be eligible for assuming editorial rights for [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] pages before you [mailto:info@globalcyberalliance.org?cc=ccd@globalcyberalliance.org&subject=ACT%20Tool%20Page%20-%20Claim%20Request&body=I%20certify%20by%20my%20affiliation%20with%20the%20organization%20providing%20the%20tool%20or%20tools%20associated%20with%20the%20Tool%20Page%20URL(s)%20listed%20below%20that%20I%20am%20authorized%20to%20assume%20editorial%20rights%20for%20the%20corresponding%20Tool%20Page(s):%0A%0A(replace%20this%20text%20with%20a%20list%20including%20the%20full%20URL%20for%20ALL%20Tool%20Pages%20for%20which%20you%20are%20claiming%20such%20rights)%0A%0ABy%20sending%20this%20request%20I%20confirm%20that%20I%20have%20completed%20the%20process%20to%20register%20for%20an%20account%20with%20the%20ACT%20Service%20using%20the%20sending%20e-mail%20address%20for%20this%20e-mail%20message.%0A%0AI%20also%20consent%20to%20receive%20e-mail%20messages%20from%20the%20Global%20Cyber%20Alliance%20about:%20the%20status%20of%20this%20request;%20links%20to%20editorial%20instructions%20and%20guidelines;%20changes%20to%20such%20instructions,%20guidelines,%20or%20rights;%20notifications%20about%20broken%20links%20and%20other%20content%20quality%20issues%20as%20and%20when%20detected;%20or%20any%20other%20topic%20deemed%20necessary%20by%20the%20Global%20Cyber%20Alliance,%20in%20an%20effort%20to%20encourage%20sustaining%20high%20content%20quality%20in%20the%20ACT%20Service.%0A%0A submit a page claim request].


=9. Third-party Websites and Resources=
=10. Third-party Websites and Resources=
You are solely responsible for your use of any third-party websites or resources. Although the [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] Website contains links to third-party websites and resources, we do not endorse them. We are not responsible or liable for their availability, accuracy, or the related content, products, or services (including, without limitation, any viruses or other disabling features), nor are we obligated to monitor such third-party content.
You are solely responsible for your use of any third-party websites or resources. Although the [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] Website contains links to third-party websites and resources, we do not endorse them. We are not responsible or liable for their availability, accuracy, or the related content, products, or services (including, without limitation, any viruses or other disabling features), nor are we obligated to monitor such third-party content.


=10. Management of Websites=
=11. Management of Websites=
It is possible to notify us of illegal content or content that violates our Terms of Use (including all policies and other documents incorporated by reference).
It is possible to [mailto:info@globalcyberalliance.org notify us of illegal content or content that violates our Terms of Use] (including all policies and other documents incorporated by reference).
 
If you contact [https://www.globalcyberalliance.org/ GCA] with a problem, we will typically explore whether and how existing community-led mechanisms can investigate and, where appropriate, resolve it.
If you contact [https://www.globalcyberalliance.org/ GCA] with a problem, we will typically explore whether and how existing community-led mechanisms can investigate and, where appropriate, resolve it.
In an unusual case, the need may arise, or the community may ask us to address an especially problematic user or inappropriate content because of significant  disturbance of [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] or dangerous behavior. In such cases, we reserve the right, at our sole discretion (or where legally compelled), to:
In an unusual case, the need may arise, or the community may ask us to address an especially problematic user or inappropriate content because of significant  disturbance of [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] or dangerous behavior. In such cases, we reserve the right, at our sole discretion (or where legally compelled), to:
Investigate your use of [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] or our services (a) to determine whether a violation of these Terms of Use or other applicable law or policy has occurred, or (b) to comply with any applicable law, legal process, or an appropriate governmental request;
 
Detect, prevent, or otherwise address fraud, false or unverifiable information, security, or technical issues or respond to user support requests;
* investigate your use of [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] or our services (a) to determine whether a violation of these Terms of Use or other applicable law or policy has occurred, or (b) to comply with any applicable law, legal process, or an appropriate governmental request;
Refuse, revert, disable, or restrict access to contributions of any user who violates these Terms of Use;
* detect, prevent, or otherwise address fraud, false or unverifiable information, security, or technical issues or respond to user support requests;
Ban a user from editing or contributing or block a user's account or access for actions violating these Terms of Use, including repeat posting of unlawful material under applicable law in line with human rights principles;
* refuse, revert, disable, or restrict access to contributions of any user who violates these Terms of Use;
Take legal action against users who violate these Terms of Use (including reports to law enforcement authorities); and
* ban a user from editing or contributing or block a user's account or access for actions violating these Terms of Use, including repeat posting of unlawful material under applicable law in line with human rights principles;
Manage otherwise the [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] websites in a manner designed to facilitate their proper functioning and protect the rights, property, and safety of ourselves and our users, licensors, partners, and the public.
* take legal action against users who violate these Terms of Use (including reports to law enforcement authorities); and
The moderation activities listed above may be informed or performed by software (such as traffic flood ("Denial of Service") protection). In those cases, human review usually is available upon request.
* manage otherwise the [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] websites in a manner designed to facilitate their proper functioning and protect the rights, property, and safety of ourselves and our users, licensors, partners, and the public.
 
The moderation activities listed above may be informed or performed by software (such as traffic flood ("Denial of Service") protection). In those cases, human review usually is available [mailto:info@globalcyberalliance.org upon request].
 
In the interests of our users and ACT, in the extreme circumstance that any individual has had their account or access blocked under this section, they are prohibited from creating or using another account on or seeking access to [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] unless we provide explicit permission. [https://www.globalcyberalliance.org/ GCA] will not ban a user from editing, contributing, or blocking a user's account or access solely because of good faith criticism that does not result in actions otherwise violating these Terms of Use or related policies.
In the interests of our users and ACT, in the extreme circumstance that any individual has had their account or access blocked under this section, they are prohibited from creating or using another account on or seeking access to [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] unless we provide explicit permission. [https://www.globalcyberalliance.org/ GCA] will not ban a user from editing, contributing, or blocking a user's account or access solely because of good faith criticism that does not result in actions otherwise violating these Terms of Use or related policies.
The [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] community and its members may also take action when so allowed by applicable policies applicable to a specific [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] addition or feature, including but not limited to warning, investigating, blocking, or banning users who violate those policies. You agree to comply with the final decisions of dispute resolution bodies established by the community for the specific [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] additions or features; these decisions may include sanctions as set out by applicable policies.
The [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] community and its members may also take action when so allowed by applicable policies applicable to a specific [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] addition or feature, including but not limited to warning, investigating, blocking, or banning users who violate those policies. You agree to comply with the final decisions of dispute resolution bodies established by the community for the specific [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] additions or features; these decisions may include sanctions as set out by applicable policies.
The blocking of an account or access or the banning of a user under this provision shall be in accordance with Section 13 of these Terms of Use.
The blocking of an account or access or the banning of a user under this provision shall be in accordance with Section 13 of these Terms of Use.
If you believe we have not satisfactorily acted on a problematic content report or have been subjected to a [https://www.globalcyberalliance.org/ GCA] moderation action that you wish to challenge, you can submit a request for consideration.
We reserve the right to suspend (temporarily or permanently) our handling of reports or other correspondence from users or third parties, whether about allegedly illegal or otherwise problematic content or conduct or requesting consideration against moderation actions, if such correspondence was made in bad faith, repetitive, unfounded, or abusive. In appropriate circumstances, your email address may even be blocked on our email system(s), and you will then need to contact us using our postal address (below) if you wish to further correspond with us during that block. This block is likely temporary for less severe cases (e.g., up to three polite emails about one or more meritless complaints). More frequent or abusive communications are more likely to lead to permanent measures.
Designated Agent: GCA Chief Legal and Administrative Officer
Address: 31 Tech Valley Drive, East Greenbush, NY 12061
Telephone Number: 646-677-5535
E-Mail Address:    DesignatedAgent@Globalcyberalliance.org


=11. Termination=
If you believe we have not satisfactorily acted on a problematic content report or have been subjected to a [https://www.globalcyberalliance.org/ GCA] moderation action that you wish to challenge, you can submit a [mailto:info@globalcyberalliance.org request for consideration].
Though we hope you will stay and continue to contribute to ACT, you can stop using our services at any time. In particular (hopefully unlikely) circumstances, it may be necessary for either ourselves or the [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] community or its members (as described in Section 10) to terminate part or all of our services, terminate these Terms of Use, block your account or access, or ban you as a user. Ifyour account or access is blocked or otherwise terminated, your public contributions and a record of your activities on or in relation to the [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] (including any correspondence you have sent us) will be unaffected (subject to applicable policies). You may still access our public pages for the sole purpose of reading publicly available content on [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]]. In such circumstances, however, you may be unable to access your account or settings. Regardless of any other provision in these Terms of Use, we reserve the right to suspend or end the services at any time, with or without cause, and with or without notice. Even after your use and participation are banned, blocked, or otherwise suspended, these Terms of Use will remain in effect concerning relevant provisions, including Sections 1, 3, 4, 6, 7, and 9-16.
 
We reserve the right to suspend (temporarily or permanently) our handling of reports or other correspondence from users or third parties, whether about allegedly illegal or otherwise problematic content or conduct or requesting consideration against moderation actions if such correspondence was made in bad faith, repetitive, unfounded, or abusive. In appropriate circumstances, your email address may even be blocked on our email system(s), and you will then need to contact us using our postal address (below) if you wish to further correspond with us during that block. This block is likely temporary for less severe cases (e.g., up to three polite emails about one or more meritless complaints). More frequent or abusive communications are more likely to lead to permanent measures.
 
: '''Designated Agent:''' GCA Chief Legal and Administrative Officer
: '''Address:''' 31 Tech Valley Drive, East Greenbush, NY 12061
: '''Telephone Number:''' +1 646 677 5535
: '''E-Mail Address:''' [mailto:DesignatedAgent@Globalcyberalliance.org DesignatedAgent@Globalcyberalliance.org]
 
=12. Termination=
Though we hope you will stay and continue to contribute to ACT, you can stop using our services at any time. In particular (hopefully unlikely) circumstances, it may be necessary for either ourselves or the [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] community or its members (as described in Section 10) to terminate part or all of our services, terminate these Terms of Use, block your account or access, or ban you as a user. If your account or access is blocked or otherwise terminated, your public contributions and a record of your activities on or in relation to the [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] (including any correspondence you have sent us) will be unaffected (subject to applicable policies). You may still access our public pages for the sole purpose of reading publicly available content on [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]]. In such circumstances, however, you may be unable to access your account or settings. Regardless of any other provision in these Terms of Use, we reserve the right to suspend or end the services at any time, with or without cause, and with or without notice. Even after your use and participation are banned, blocked, or otherwise suspended, these Terms of Use will remain in effect concerning relevant provisions, including Sections 1, 3-5, 7, 8, and 10-17.
 
=13. Disputes and Jurisdiction=
We hope that no serious disagreements arise involving your use of [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]]. In case of a dispute, we encourage you to seek resolution through the dispute resolution procedures or mechanisms provided by [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] and [https://www.globalcyberalliance.org/ GCA]. If you desire to file a legal claim against us, you agree to file and resolve it exclusively in a state or federal court in New York, New York. You also agree that the laws of the State of New York and, to the extent applicable, the laws of the United States of America will govern these Terms of Use, as well as any legal claim that might arise between you and us (without reference to conflict of laws principles). You agree to submit to the personal jurisdiction of and agree that the venue is proper in the courts located in New York, in any legal action or proceeding relating to us or these Terms of Use.


=12. Disputes and Jurisdiction=
We hope that no serious disagreements arise involving your use of [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]]. In case of a dispute, we encourage you to seek resolution through the dispute resolution procedures or mechanisms provided by [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] and [https://www.globalcyberalliance.org/ GCA]. If you desire to file a legal claim against us, you agree to file and resolve it exclusively in a state or federal court in New York, New York. You also agree that the laws of the State of New York and, to the extent applicable, the laws of the United States of America will govern these Terms of Use, as well as any legal claim that might arise between you and us (without reference to conflict of laws principles). You agree to submit to the personal jurisdiction of and agree that the venue is proper in the courts located in New York, New York, in any legal action or proceeding relating to us or these Terms of Use.
To ensure that disputes are dealt with soon after they arise, you agree that regardless of any statute or law to the contrary, any claim or cause of action you might have arising out of or related to the use of our services or these Terms of Use must be filed within the applicable statute of limitations or, if earlier, one (1) year after the pertinent facts underlying such claim or cause of action could have been discovered with reasonable diligence (or be forever barred).
To ensure that disputes are dealt with soon after they arise, you agree that regardless of any statute or law to the contrary, any claim or cause of action you might have arising out of or related to the use of our services or these Terms of Use must be filed within the applicable statute of limitations or, if earlier, one (1) year after the pertinent facts underlying such claim or cause of action could have been discovered with reasonable diligence (or be forever barred).


=13. Disclaimers=
=14. Disclaimers=
At [https://www.globalcyberalliance.org/ GCA] and, more specifically, via [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]], we do our best to provide educational and informational cybersecurity content to a vast audience. Still, using our services is at your sole risk. [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] was created as a free service and for the benefit and guidance of all using the material provided, with the hope of serving in part to protect us.  We provide these services on an "as is" and "as available" basis, and we expressly disclaim all express or implied warranties of all kinds, including but not limited to the implied warranties of merchantability, fitness for a particular purpose, and non-infringement. We make no warranty that our services will meet your requirements, be safe, secure, uninterrupted, timely, accurate, or error-free, or that your information will be secure.
At [https://www.globalcyberalliance.org/ GCA] and, more specifically, via [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]], we do our best to provide educational and informational cybersecurity content to a vast audience. Still, using our services is at your sole risk. [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] was created as a free service and for the benefit and guidance of all using the material provided, with the hope of serving in part to protect us.  We provide these services on an "as is" and "as available" basis, and we expressly disclaim all express or implied warranties of all kinds, including but not limited to the implied warranties of merchantability, fitness for a particular purpose, and non-infringement. We make no warranty that our services will meet your requirements, be safe, secure, uninterrupted, timely, accurate, or error-free, or that your information will be secure.
We are not responsible for the content, data, or actions of third parties, and you release us, our directors, officers, employees, and agents from any claims and damages, known and unknown, arising out of or in any way connected with any claim you have against any such third parties. No advice or information, whether oral or written, obtained by you from us or through or from our services creates any warranty not expressly stated in these Terms of Use.
We are not responsible for the content, data, or actions of third parties, and you release us, our directors, officers, employees, and agents from any claims and damages, known and unknown, arising out of or in any way connected with any claim you have against any such third parties. No advice or information, whether oral or written, obtained by you from us or through or from our services creates any warranty not expressly stated in these Terms of Use.
Any material downloaded or otherwise obtained through your use of our services is done at your discretion and risk, and you will be solely responsible for any damage to your computer system or loss of data that results from the download of any such material. You agree that we have no responsibility or liability for the deletion of, or the failure to store or to transmit, any content or communication maintained by the service. We retain the right to create limits on use and storage at our sole discretion at any time, with or without notice.
Any material downloaded or otherwise obtained through your use of our services is done at your discretion and risk, and you will be solely responsible for any damage to your computer system or loss of data that results from the download of any such material. You agree that we have no responsibility or liability for the deletion of, or the failure to store or to transmit, any content or communication maintained by the service. We retain the right to create limits on use and storage at our sole discretion at any time, with or without notice.
Some states or jurisdictions do not allow the types of disclaimers in this section, so they may not apply to you either in part or in full, depending on the law.
Some states or jurisdictions do not allow the types of disclaimers in this section, so they may not apply to you either in part or in full, depending on the law.


=14. Limitation on Liability=
=15. Limitation on Liability=
Highlighted for emphasis
GCA will not be liable to you or to any other party for any direct, indirect, incidental, special, consequential, or exemplary damages, including but not limited to damages for loss of profits, goodwill, use, data, or other intangible losses, regardless of whether we were advised of the possibility of such damage. Our liability shall not exceed one thousand U.S. dollars (USD 1000.00) in aggregate.
GCA will not be liable to you or to any other party for any direct, indirect, incidental, special, consequential, or exemplary damages, including but not limited to damages for loss of profits, goodwill, use, data, or other intangible losses, regardless of whether we were advised of the possibility of such damage. Our liability shall not exceed one thousand U.S. dollars (USD 1000.00) in aggregate.  


=15. Modifications to these Terms of Use=
=16. Modifications to these Terms of Use=
Because modifying these Terms of Use may be necessary occasionally, we will provide notice of such modifications via the [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] website. However, please periodically review the most up-to-date version of these Terms of Use. Your continued use of our services after the new Terms of Use are updated. For the protection of [https://www.globalcyberalliance.org/ GCA] and other users like yourself, you cannot use our services if you disagree with our Terms of Use.
Because modifying these Terms of Use may be necessary occasionally, we will provide notice of such modifications via the [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] website. However, please periodically review the most up-to-date version of these Terms of Use. Your continued use of our services after the new Terms of Use are updated. For the protection of [https://www.globalcyberalliance.org/ GCA] and other users like yourself, you cannot use our services if you disagree with our Terms of Use.


=16. Other Terms=
=17. Other Terms=
These Terms of Use do not create an employment, agency, partnership, joint control, or joint venture relationship between you and us, [https://www.globalcyberalliance.org/ GCA]. For European Economic Area law, United Kingdom law, or other laws that involve a similar concept, you are not acting "under the authority of" [https://www.globalcyberalliance.org/ GCA] when you use the services. If you have not signed a separate agreement with us, these Terms of Use are the entire agreement between you and us. If there is any conflict between these Terms of Use and a signed written agreement between you and us, the signed agreement will control.
These Terms of Use do not create an employment, agency, partnership, joint control, or joint venture relationship between you and us, [https://www.globalcyberalliance.org/ GCA]. For European Economic Area law, United Kingdom law, or other laws that involve a similar concept, you are not acting "under the authority of" [https://www.globalcyberalliance.org/ GCA] when you use the services. If you have not signed a separate agreement with us, these Terms of Use are the entire agreement between you and us. If there is any conflict between these Terms of Use and a signed written agreement between you and us, the signed agreement will control.
You agree that we may provide you with notices, including changes to the Terms of Use, by email, regular mail, or postings on the [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] Website.
You agree that we may provide you with notices, including changes to the Terms of Use, by email, regular mail, or postings on the [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] Website.
If, in any circumstance, we do not apply or enforce any provision of these Terms of Use, it is not a waiver of that provision.
If, in any circumstance, we do not apply or enforce any provision of these Terms of Use, it is not a waiver of that provision.
You understand that; unless otherwise agreed to in writing by us, you have no expectation of compensation for any activity, contribution, or idea you provide to us, the community, or the [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] Website.
You understand that; unless otherwise agreed to in writing by us, you have no expectation of compensation for any activity, contribution, or idea you provide to us, the community, or the [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] Website.
Notwithstanding any provision to the contrary in these Terms of Use, we (GCA) and you agree not to modify the applicable terms and requirements of any free license employed on the [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] Website when these Terms of Use authorize such free license.
Notwithstanding any provision to the contrary in these Terms of Use, we (GCA) and you agree not to modify the applicable terms and requirements of any free license employed on the [[Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection|ACT]] Website when these Terms of Use authorize such free license.
These Terms of Use were written in English (U.S.). While we hope that translations of these Terms of Use are accurate, in case of any differences in meaning between the original English version and a translation, the original English version takes precedence.
These Terms of Use were written in English (U.S.). While we hope that translations of these Terms of Use are accurate, in case of any differences in meaning between the original English version and a translation, the original English version takes precedence.
Suppose any provision or part of a provision of these Terms of Use is found unlawful, void, or unenforceable. In that case, that provision or portion of the provision is deemed severable from these Terms of Use and will be enforced to the maximum extent permissible. All other provisions of these Terms of Use will remain in full force and effect.
Suppose any provision or part of a provision of these Terms of Use is found unlawful, void, or unenforceable. In that case, that provision or portion of the provision is deemed severable from these Terms of Use and will be enforced to the maximum extent permissible. All other provisions of these Terms of Use will remain in full force and effect.


=17. Effective Date=
=18. Effective Date=
These Terms of Use went into effect on September 26, 2023.
These Terms of Use went into effect on July 9, 2024.
Please note that in the event of any differences in meaning or interpretation between the original English version of this content and a translation, the original English version takes precedence.
Please note that in the event of any differences in meaning or interpretation between the original English version of this content and a translation, the original English version takes precedence.

Latest revision as of 06:26, 9 July 2024

Welcome to Actionable Cybersecurity Tools (ACT), a service provided by Global Cyber Alliance, Inc. ("we" or "us" or "GCA"), a non-profit organization headquartered in New York, New York, United States, whose mission is to create and equip communities to deliver a more trustworthy Internet for all.

To support our vibrant community, we provide ACT which serves this mission. We strive to make and keep cybersecurity educational and informational content from ACT available on the internet free of charge, in perpetuity.

We welcome you ("you" or the "user") as a reader or contributor to ACT, and we encourage you to join the ACT community. Before you participate, however, we ask that you please read and agree to the following Terms of Use ("Terms of Use").

Overview

These Terms of Use tell you about GCA’s ACT Service, our relationship with you as a user, and the rights and responsibilities guiding us. We contribute, host, and monitor an incredible quantity of cybersecurity educational and informational content. We may also delete content when it conflicts with these Terms of Use, for legal compliance, or when faced with urgent threats of serious harm.

Please be aware that you are legally responsible for all of your contributions, edits, and reuse of ACT content under the laws of the United States of America and other applicable laws (which may include laws where you or the subject of your contributions are located).

  1. Our Mission
  2. Privacy Policy and GDPR
  3. Content We Host
  4. Use of AI-Generated Content
  5. Refraining from Certain Activities
  6. Password Security
  7. Trademarks
  8. Licensing of Content
  9. DMCA Compliance
  10. Third-Party Websites and Resources
  11. Management of Websites
  12. Termination
  13. Disputes and Jurisdiction
  14. Disclaimers
  15. Limitation on Liability
  16. Modifications to these Terms of Use
  17. Other Terms
  18. Effective Date

1. Our Mission

The GCA is an international nonprofit focused on delivering a secure, trustworthy Internet that enables social and economic progress for all. GCA builds communities to deploy tools, services, and programs that provide cybersecurity at global scale.

As used throughout the rest of the Terms of Use described here, our services consist of the ACT website and project (“ACT” or “website” or “Project”), the technological infrastructure that we maintain, and any technical spaces that we host for the maintenance and improvement of ACT.

Because of our unique role, there are a few of things you should be aware of when considering our relationship with you, ACT, and other users:

  1. Because ACT contains content sourced from publicly available websites, cybersecurity tool owners, GCA Partners, NGOs, other nonprofits, industry consortia groups, governments, generative AI tools, and various other information sources, the vast majority of the content may or may not be edited by GCA in any way. While we might make limited efforts to monitor for broken links, copyright issues reported by users, and consistency with our content guidelines, we do not take any responsibility for this content. Similarly, unless we have expressly stated otherwise, we do not endorse any products or opinions expressed via our services nor represent or guarantee the truthfulness, accuracy, or reliability of any content on ACT.
  2. You are responsible for your actions: You are legally responsible for your contributions to “Talk” or “Discussion” pages within ACT, your reuse of content from ACT, your use of any APIs enabled on ACT, and your use of our services more generally. For your protection, you should exercise caution and avoid taking any actions that may result in criminal or civil liability under applicable laws. For clarity, applicable law includes at least the laws of the United States of America and the State of New York, but may include the laws of other US States or other countries depending on the facts that may vary on a case-by-case basis. Copyright or other enforcement actions are possible including against editors, contributors, and authors non-U.S. authorities may seek to apply other country’s laws to you, including local laws where you live or where you view or edit content. We cannot offer any protection, guarantee, immunity, or indemnification against applying such laws.

2. Privacy Policy and GDPR

Please review our Privacy Policy's terms so that you know how we collect and use your information. https://www.globalcyberalliance.org/privacy-policy/

3. Content We Host

You may find some material objectionable or inaccurate: Because we host a wide array of content that is produced or gathered from sources as cited above, you may encounter material that you find offensive, erroneous, misleading, mislabeled, or otherwise objectionable.

ACT content is for general informational purposes only: Although our website hosts much information about professional cybersecurity topics, including medical, legal, or financial issues, this content is presented for general informational purposes only. It should not be taken as professional advice. Please seek independent professional counseling from someone licensed or qualified in the applicable area instead of acting on any information, opinion, or advice contained in ACT.

GCA also hosts a collection of free and open-source threat intelligence tools on ACT, referred to as Threat Taming Tools ( "T3," "collection," "T3 Collection," or "T3C"). T3C is a set of free threat intelligence feeds, sources, formats, frameworks, platforms, tools, resources, research, and standards provided by the Global Cyber Alliance, Inc. ("GCA" or "the Company").

3.1 T3C Version History & Attributions

Version 1.0 of the T3 Collection was created on 2024-JUL-09 using traditional internet search engine results to find various types of tools and resources and existing lists of applicable tools and resources.

Among various publicly available sources identified using internet search engines, two relevant GitHub repositories were found to contain free resources. Some information contained therein was merged into the content included in this collection. More specifically, those two repositories are nearly identical, do not reference each other, and contain references to tools and resources that can be located through internet search engines. It should be noted that those two repositories also contain references to tools and resources that either no longer exist or are no longer free; those tools and resources were excluded from this collection. Many items added to the T3 Collection from these two sources were also identified within other publicly available sources to form its current state. As such, this collection DOES NOT meet the definition of a Derivative Work per the Apache 2.0 License attached to them. The T3 Collection is separable and distinct from and only uses the main GitHub link as an interface to provide attribution to those works:

3.2 T3C-Specific Terms of Use

Because the T3 Collection contains content sourced from publicly available websites, cybersecurity tool owners, GCA Partners, NGOs, other nonprofits, industry consortia groups, governments, generative AI tools, and various other information sources, the vast majority of the elements referenced in the collection are not maintained by or affiliated with GCA in any way. While we might make limited efforts to monitor for broken links, copyright issues reported by users, and consistency with our content guidelines, we do not take any responsibility for this content. Similarly, unless we have expressly stated otherwise, we do not endorse any products or opinions expressed via our services nor represent or guarantee the truthfulness, accuracy, or reliability of any content in the T3 Collection.

You are responsible for your actions: You are legally responsible for your reuse of content from the T3 Collection, your use of any elements referenced within the T3 Collection, and your use of our services more generally. For your protection, you should exercise caution and avoid taking any actions that may result in criminal or civil liability under applicable laws. For clarity, applicable law includes at least the laws of the United States of America and the State of New York, but may include the laws of other US States or other countries depending on the facts that may vary on a case-by-case basis. We cannot offer any protection, guarantee, immunity, or indemnification against applying such laws.

Unless explicitly excluded elsewhere in these Terms of Use, all ACT Terms of Use apply to your use of the T3C Collection.

4. Use of AI-Generated Content

Some ACT content was produced in whole or in part using generative AI tools:

  • Animal images were generated using Midjourney and edited using Adobe tools.
  • Some icon images were created using AI tools embedded in the Canva service and edited using Adobe tools.
  • Grammarly was used to edit much of the text content published on the site.
  • Most tool and resource descriptions were generated using a Python script that calls OpenAI's ChatGPT API. Some were edited by humans, and Grammarly was used to refine them further.
  • Content describing protection needs and approaches on HRC pages was created using a combination of text generated through the use of OpenAI's ChatGPT and Google's Gemini services. This text was also significantly edited by humans and Grammarly was used to further refine it.
  • Content describing T3C resources was generated using OpenAI's ChatGPT and edited by humans. Grammarly was used to further refine this text.

5. Refraining from Certain Activities

The ACT Service hosted by GCA only exists because of the vibrant community of users like you who use and contribute to the content. We happily welcome your participation in this community. We encourage you to be civil and polite in interacting with others in the community, act in good faith, and contribute to furthering the ACT Service's mission. We ask that all users review and follow the Universal Code of Conduct ("UCoC"), which outlines requirements for collegial, civil collaboration when using the ACT Service.

We reserve the right to exercise our enforcement discretion concerning the provisions in section 5 of these Terms of Use.

6. Password Security

You are responsible for safeguarding your password and other security credentials and should never disclose them to any third party.

7. Trademarks

Although you have considerable freedom to reuse the content on the ACT website, it is essential to GCA that we protect our trademark rights to protect our users from fraudulent impersonators. Because of this, we ask that you please respect our trademarks. All GCA trademarks belong to the GCA. Any use of our trade names, trademarks, service marks, logos, or domain names must comply with the ACT Terms of Use, the GCA Terms of Service.

8. Licensing of Content

All users contributing to the ACT website must grant broad permissions to the general public to redistribute and reuse their contributions freely, so long as that use is properly attributed and the same freedom to reuse and redistribute is granted to any derivative works. We require that, when necessary, all submitted content be licensed so that it is freely reusable by anyone.

You agree to the following licensing requirements:

  1. Text to which you hold the copyright: When you submit text to which you hold the copyright, you agree to license it under Creative Commons Attribution-ShareAlike 4.0 International (CC BY-SA 4.0 DEED).
  2. Re-users must comply with that license.
  3. Re-use: Reuse of content that we host is welcome, though exceptions exist for content contributed under "fair use" or similar exemptions under applicable copyright law. Any reuse must comply with the underlying license(s). When you re-use or redistribute a text page included in ACT, you agree to attribute the authors in any of the following fashions:
    1. through hyperlink (where possible) or URL to the page or pages you are reusing (since each page has a history page that lists all contributors, authors, and editors);
    2. through hyperlink (where possible) or URL to an alternative, stable online copy that is freely accessible, conforms with the license, and provides credit to the authors in a manner equivalent to the credit given on the Project Website; or
    3. through a list of all authors (but please note that any list of authors may be filtered to exclude minimal contributions).
  4. Modifications or additions to material that you reuse: When modifying or making additions to text that you have obtained from the ACT Website, you agree to license the modified or added content under CC BY-SA 4.0 DEED or later (or, as explained above, another license when exceptionally required by a specific ACT addition or feature). Modifying or adding to non-text media is prohibited unless you obtain written authorization from GCA.
  5. With both text content and non-text media, you agree to indicate that the original work has been modified. If you are reusing text content in a wiki, it is sufficient to show in the page history that you changed the imported text. For each copy or modified version you distribute, you agree to include a licensing notice stating which license the work is released under, along with either a hyperlink or URL to the text of the license or a copy of the license itself.

9. DMCA Compliance

In fairness to our users and other creators and copyright holders, our policy is to respond to notices of alleged infringement that comply with the formalities of the Digital Millennium Copyright Act (DMCA). Pursuant to the DMCA, we will terminate, in appropriate circumstances, users and account holders of our system and network who are repeat infringers. However, we also recognize that not all takedown notices are valid or in good faith. In such cases, we encourage users to file counter-notifications when they appropriately believe a DMCA takedown demand is invalid or improper. Please seek legal advice if you think someone has improperly filed a DCMA notice.

If you are the owner of the content being improperly used in ACT without your permission, you may request that the content be removed by filing a notice under the DMCA. To make such a request, please contact us as follows:

Designated Agent: GCA Chief Legal Officer
Address: 31 Tech Valley Drive, East Greenbush, NY 12061
Telephone Number: +1 518 596 4183
E-Mail Address: info@globalcyberalliance.org

Please see 17 U.S.C. § 512(c)(3) for proper notification requirements. Also, if you knowingly misrepresent that any activity or material on our Services is infringing, you may be liable to GCA for certain costs and damages.

Instead of requesting that we remove the content, you can request editorial rights for pages containing information about specific cybersecurity tools, provided that the organization providing the corresponding tools authorizes you. Before doing so, you must create an account with the ACT Service using your name and e-mail address. Note that while this account creation form indicates that the name and email address fields are optional, you must provide valid values for both fields during registration to be eligible for assuming editorial rights for ACT pages before you submit a page claim request.

10. Third-party Websites and Resources

You are solely responsible for your use of any third-party websites or resources. Although the ACT Website contains links to third-party websites and resources, we do not endorse them. We are not responsible or liable for their availability, accuracy, or the related content, products, or services (including, without limitation, any viruses or other disabling features), nor are we obligated to monitor such third-party content.

11. Management of Websites

It is possible to notify us of illegal content or content that violates our Terms of Use (including all policies and other documents incorporated by reference).

If you contact GCA with a problem, we will typically explore whether and how existing community-led mechanisms can investigate and, where appropriate, resolve it.

In an unusual case, the need may arise, or the community may ask us to address an especially problematic user or inappropriate content because of significant disturbance of ACT or dangerous behavior. In such cases, we reserve the right, at our sole discretion (or where legally compelled), to:

  • investigate your use of ACT or our services (a) to determine whether a violation of these Terms of Use or other applicable law or policy has occurred, or (b) to comply with any applicable law, legal process, or an appropriate governmental request;
  • detect, prevent, or otherwise address fraud, false or unverifiable information, security, or technical issues or respond to user support requests;
  • refuse, revert, disable, or restrict access to contributions of any user who violates these Terms of Use;
  • ban a user from editing or contributing or block a user's account or access for actions violating these Terms of Use, including repeat posting of unlawful material under applicable law in line with human rights principles;
  • take legal action against users who violate these Terms of Use (including reports to law enforcement authorities); and
  • manage otherwise the ACT websites in a manner designed to facilitate their proper functioning and protect the rights, property, and safety of ourselves and our users, licensors, partners, and the public.

The moderation activities listed above may be informed or performed by software (such as traffic flood ("Denial of Service") protection). In those cases, human review usually is available upon request.

In the interests of our users and ACT, in the extreme circumstance that any individual has had their account or access blocked under this section, they are prohibited from creating or using another account on or seeking access to ACT unless we provide explicit permission. GCA will not ban a user from editing, contributing, or blocking a user's account or access solely because of good faith criticism that does not result in actions otherwise violating these Terms of Use or related policies.

The ACT community and its members may also take action when so allowed by applicable policies applicable to a specific ACT addition or feature, including but not limited to warning, investigating, blocking, or banning users who violate those policies. You agree to comply with the final decisions of dispute resolution bodies established by the community for the specific ACT additions or features; these decisions may include sanctions as set out by applicable policies.

The blocking of an account or access or the banning of a user under this provision shall be in accordance with Section 13 of these Terms of Use.

If you believe we have not satisfactorily acted on a problematic content report or have been subjected to a GCA moderation action that you wish to challenge, you can submit a request for consideration.

We reserve the right to suspend (temporarily or permanently) our handling of reports or other correspondence from users or third parties, whether about allegedly illegal or otherwise problematic content or conduct or requesting consideration against moderation actions if such correspondence was made in bad faith, repetitive, unfounded, or abusive. In appropriate circumstances, your email address may even be blocked on our email system(s), and you will then need to contact us using our postal address (below) if you wish to further correspond with us during that block. This block is likely temporary for less severe cases (e.g., up to three polite emails about one or more meritless complaints). More frequent or abusive communications are more likely to lead to permanent measures.

Designated Agent: GCA Chief Legal and Administrative Officer
Address: 31 Tech Valley Drive, East Greenbush, NY 12061
Telephone Number: +1 646 677 5535
E-Mail Address: DesignatedAgent@Globalcyberalliance.org

12. Termination

Though we hope you will stay and continue to contribute to ACT, you can stop using our services at any time. In particular (hopefully unlikely) circumstances, it may be necessary for either ourselves or the ACT community or its members (as described in Section 10) to terminate part or all of our services, terminate these Terms of Use, block your account or access, or ban you as a user. If your account or access is blocked or otherwise terminated, your public contributions and a record of your activities on or in relation to the ACT (including any correspondence you have sent us) will be unaffected (subject to applicable policies). You may still access our public pages for the sole purpose of reading publicly available content on ACT. In such circumstances, however, you may be unable to access your account or settings. Regardless of any other provision in these Terms of Use, we reserve the right to suspend or end the services at any time, with or without cause, and with or without notice. Even after your use and participation are banned, blocked, or otherwise suspended, these Terms of Use will remain in effect concerning relevant provisions, including Sections 1, 3-5, 7, 8, and 10-17.

13. Disputes and Jurisdiction

We hope that no serious disagreements arise involving your use of ACT. In case of a dispute, we encourage you to seek resolution through the dispute resolution procedures or mechanisms provided by ACT and GCA. If you desire to file a legal claim against us, you agree to file and resolve it exclusively in a state or federal court in New York, New York. You also agree that the laws of the State of New York and, to the extent applicable, the laws of the United States of America will govern these Terms of Use, as well as any legal claim that might arise between you and us (without reference to conflict of laws principles). You agree to submit to the personal jurisdiction of and agree that the venue is proper in the courts located in New York, in any legal action or proceeding relating to us or these Terms of Use.

To ensure that disputes are dealt with soon after they arise, you agree that regardless of any statute or law to the contrary, any claim or cause of action you might have arising out of or related to the use of our services or these Terms of Use must be filed within the applicable statute of limitations or, if earlier, one (1) year after the pertinent facts underlying such claim or cause of action could have been discovered with reasonable diligence (or be forever barred).

14. Disclaimers

At GCA and, more specifically, via ACT, we do our best to provide educational and informational cybersecurity content to a vast audience. Still, using our services is at your sole risk. ACT was created as a free service and for the benefit and guidance of all using the material provided, with the hope of serving in part to protect us. We provide these services on an "as is" and "as available" basis, and we expressly disclaim all express or implied warranties of all kinds, including but not limited to the implied warranties of merchantability, fitness for a particular purpose, and non-infringement. We make no warranty that our services will meet your requirements, be safe, secure, uninterrupted, timely, accurate, or error-free, or that your information will be secure.

We are not responsible for the content, data, or actions of third parties, and you release us, our directors, officers, employees, and agents from any claims and damages, known and unknown, arising out of or in any way connected with any claim you have against any such third parties. No advice or information, whether oral or written, obtained by you from us or through or from our services creates any warranty not expressly stated in these Terms of Use.

Any material downloaded or otherwise obtained through your use of our services is done at your discretion and risk, and you will be solely responsible for any damage to your computer system or loss of data that results from the download of any such material. You agree that we have no responsibility or liability for the deletion of, or the failure to store or to transmit, any content or communication maintained by the service. We retain the right to create limits on use and storage at our sole discretion at any time, with or without notice.

Some states or jurisdictions do not allow the types of disclaimers in this section, so they may not apply to you either in part or in full, depending on the law.

15. Limitation on Liability

GCA will not be liable to you or to any other party for any direct, indirect, incidental, special, consequential, or exemplary damages, including but not limited to damages for loss of profits, goodwill, use, data, or other intangible losses, regardless of whether we were advised of the possibility of such damage. Our liability shall not exceed one thousand U.S. dollars (USD 1000.00) in aggregate.

16. Modifications to these Terms of Use

Because modifying these Terms of Use may be necessary occasionally, we will provide notice of such modifications via the ACT website. However, please periodically review the most up-to-date version of these Terms of Use. Your continued use of our services after the new Terms of Use are updated. For the protection of GCA and other users like yourself, you cannot use our services if you disagree with our Terms of Use.

17. Other Terms

These Terms of Use do not create an employment, agency, partnership, joint control, or joint venture relationship between you and us, GCA. For European Economic Area law, United Kingdom law, or other laws that involve a similar concept, you are not acting "under the authority of" GCA when you use the services. If you have not signed a separate agreement with us, these Terms of Use are the entire agreement between you and us. If there is any conflict between these Terms of Use and a signed written agreement between you and us, the signed agreement will control.

You agree that we may provide you with notices, including changes to the Terms of Use, by email, regular mail, or postings on the ACT Website.

If, in any circumstance, we do not apply or enforce any provision of these Terms of Use, it is not a waiver of that provision. You understand that; unless otherwise agreed to in writing by us, you have no expectation of compensation for any activity, contribution, or idea you provide to us, the community, or the ACT Website.

Notwithstanding any provision to the contrary in these Terms of Use, we (GCA) and you agree not to modify the applicable terms and requirements of any free license employed on the ACT Website when these Terms of Use authorize such free license.

These Terms of Use were written in English (U.S.). While we hope that translations of these Terms of Use are accurate, in case of any differences in meaning between the original English version and a translation, the original English version takes precedence. Suppose any provision or part of a provision of these Terms of Use is found unlawful, void, or unenforceable. In that case, that provision or portion of the provision is deemed severable from these Terms of Use and will be enforced to the maximum extent permissible. All other provisions of these Terms of Use will remain in full force and effect.

18. Effective Date

These Terms of Use went into effect on July 9, 2024. Please note that in the event of any differences in meaning or interpretation between the original English version of this content and a translation, the original English version takes precedence.