top of page
Greywell Logo White background_edited.jpg

// DOCUMENT: TERMS OF SERVICE & ACCEPTABLE USE

// STATUS: ACTIVE

// JURISDICTION: ENGLAND & WALES

1.0 // PROTOCOL OVERVIEW

These Terms of Service ("Terms") govern your access to and use of the Greywell Cyber domain and architecture. By accessing this environment, you acknowledge that you have read, understood and agree to be bound by these protocols.

If you do not agree to these terms, terminate the connection immediately.

2.0 // INTELLECTUAL PROPERTY (ASSET PROTECTION)

All architecture, code, text, graphics, and "Greywell Cyber" branding identifiers contained within this domain are the exclusive intellectual property of Greywell Cyber Ltd.

[>] LICENSE: You are granted a limited, revocable, non-exclusive license to view this data for personal or internal business evaluation.

[>] RESTRICTION: You may not reverse-engineer, mirror, scrape, or commercially exploit any component of this digital environment without explicit written authorisation (Root Access).

3.0 // LIMITATION OF LIABILITY

While we maintain high-availability standards, this site is provided on an "as-is" basis.  To the maximum extent permitted by law, Greywell Cyber accepts no liability for:

[>] Data packet loss or corruption during transmission.

[>] System downtime due to maintenance or third-party infrastructure failure.

[>] Any indirect or consequential loss arising from the use of free tools or information provided on this domain.

[>] EXCEPTION: Nothing in these Terms excludes liability for death or personal injury caused by our negligence, or for fraud.

4.0 // SERVICE ENGAGEMENTS

This document governs the use of our public digital interface only. All professional consultancy services (Penetration Testing, Audits, CISO Services) are governed by a separate Master Services Agreement (MSA) or Statement of Work (SoW), which will be issued prior to the commencement of any tactical operations.

5.0 // USER CONDUCT & INTEGRITY

Any attempt to probe, scan, or compromise this infrastructure is a violation of the Computer Misuse Act 1990 and international cyber statutes.  We maintain a zero-tolerance policy regarding hostile reconnaissance.

We employ aggressive forensic countermeasures.  Any hostile act will trigger an immediate investigation intended to pierce anonymity layers and identify the natural person behind the attack.  We will proactively cooperate with international authorities to ensure legal consequences are enforced in your country of residence. 

Do not test our capabilities.

6.0 // GOVERNING LAW & JURISDICTION

These Terms shall be governed by and construed in accordance with the laws of England and Wales.

[>] DISPUTE RESOLUTION: Any dispute arising under these Terms shall be subject to the exclusive jurisdiction of the courts of England and Wales.

[>] INTERNATIONAL USERS: If you are accessing this architecture from outside the United Kingdom, you are responsible for compliance with local laws. Nothing in these Terms limits your rights under mandatory local consumer protection laws that cannot be waived by contract.

7.0 // CORPORATE TRANSPARENCY

In compliance with the Companies (Trading Disclosures) Regulations 2008:

  • ENTITY: Greywell Cyber Ltd

  • REGISTERED OFFICE: Upton Grey, Basingstoke

  • COMPANY NUMBER: 16835578

  • VAT NUMBER: PENDING

  • CONTACT: security@greywellcyber.com

bottom of page