Terms of Use
Last updated: August 14, 2025
Important: Authorization Required
You must have proper authorization to scan any domain or IP address. By using this service, you confirm that you have the legal right to scan the target systems.
1. Acceptance of Terms
By accessing and using the Checkmark as a Service scanning platform ("Service"), you accept and agree to be bound by the terms and provision of this agreement.
2. Authorization and Responsibility
Your Responsibilities:
- Authorization Required: You must own, control, or have explicit written permission to scan any domain or IP address
- Legal Compliance: You are responsible for ensuring your use complies with all applicable local, state, and federal laws
- Professional Use: This service is intended for legitimate security assessment and business purposes only
- No Malicious Activity: You may not use this service for unauthorized access attempts or malicious purposes
What We Don't Do:
- We do not attempt to bypass authentication or access controls
- We do not exploit vulnerabilities or attempt unauthorized access
- We do not access private or restricted systems
- All scans are performed against publicly accessible services only
3. Service Description
Our service performs external security assessments including:
- DNS record analysis and DNSSEC validation
- Email authentication (SPF, DKIM, DMARC) verification
- Open port detection via network scanning
- SSL certificate and web security header analysis
- Public website content and privacy policy detection
- Domain registration information analysis
4. Limitations and Disclaimers
Service Limitations:
- Point-in-Time Assessment: Results represent conditions at the time of scanning only
- Not Comprehensive: This is not a complete security audit or penetration test
- No Guarantee: A clean scan does not guarantee system security
- False Positives/Negatives: Results may contain inaccuracies
Disclaimers:
- No Professional Advice: Results are informational only, not professional security advice
- No Warranty: Service provided "as is" without warranties of any kind
- Third-Party Tools: We use various scanning tools and are not responsible for their accuracy
5. Hold Harmless and Indemnification
You agree to hold harmless and indemnify Checkmark as a Service, its operators, and affiliates from any:
- Legal claims arising from your unauthorized scanning activities
- Damages or losses resulting from your use of scan results
- Violations of laws or third-party rights in connection with your use
- Claims that you lacked proper authorization to scan target systems
6. Data and Privacy
- Data Collection: We collect scan results, domain names, and basic usage data
- Retention: Free scan data is automatically purged regularly
- No Sharing: We do not sell or share your scanning data
- Security: Data is stored securely and accessed only for service provision
7. Acceptable Use
Permitted Uses:
- Security assessment of systems you own or control
- Authorized security testing within professional MSP relationships
- Educational and research purposes with proper authorization
- Compliance verification for legitimate business purposes
Prohibited Uses:
- Scanning systems without proper authorization
- Using results for malicious purposes or to harm others
- Circumventing or attempting to defeat service limitations
- Violating any applicable laws or regulations
8. Service Availability
- Service provided on a "best effort" basis
- No guarantee of continuous availability
- May be suspended or terminated at any time
- Rate limiting and usage restrictions may apply
9. Limitation of Liability
TO THE MAXIMUM EXTENT PERMITTED BY LAW:
- Our liability is limited to the amount paid for services (if any)
- We are not liable for indirect, consequential, or punitive damages
- You assume full responsibility for your use of scan results
- Some jurisdictions do not allow liability limitations, so these may not apply to you
10. Termination
- You may stop using the service at any time
- We may terminate access for violations of these terms
- Termination does not affect previously incurred obligations
11. Changes to Terms
- Terms may be updated periodically
- Continued use constitutes acceptance of changes
- Material changes will be prominently posted
12. Contact Information
For questions about these terms or to report unauthorized scanning:
Email: [email protected]
Response Time: Within 48 hours
For Urgent Issues: Include "URGENT" in subject line
Final Reminder: Authorization Is Required
By clicking "I agree" and using this service, you confirm that you have proper authorization to scan the target domain or IP address. Unauthorized scanning may violate computer crime laws in your jurisdiction. When in doubt, don't scan.