Last Updated: October 24, 2024
True Assess provides specialized consulting and security audit services to enterprise clients. By accessing our platform or engaging our services, you agree to be bound by these Terms.
Our "Vulnerability Audit" constitutes a simulated adversarial attack on your hiring platform. By engaging us, you explicitly authorize these specific testing activities ("Authorized Penetration Testing") against assets you own or have written permission to test. You verify that you have the legal authority to consent to these activities.
You agree not to:
True Assess retains all rights, title, and interest in our proprietary testing engines, forensic algorithms, and "Tradecraft Indicators." You retain all rights to your confidential candidate data. Reports generated for you are licensed for your internal business use only.
Our services are provided "as is." While we employ state-of-the-art adversarial methodologies, security is a moving target. We generally do not guarantee that our audits will detect every possible vulnerability or that your systems are immune to all forms of academic dishonesty or cyber exploitation.
To the maximum extent permitted by law, True Assess shall not be liable for any indirect, incidental, special, consequential, or punitive damages, or any loss of profits or revenues, whether incurred directly or indirectly, resulting from your use of our services.
These Terms are governed by the laws of the State of Delaware, without regard to its conflict of laws principles. Any disputes shall be resolved in the federal or state courts located in Delaware.