Legal & Compliance

Legal Center

All our legal documents and policies in one place. Transparency and trust are the foundation of everything we do.

Terms of Service

The agreement governing use of FindTheBreach services.

Read

Privacy Policy

How we collect, use, and protect your personal data.

Read

Cookie Policy

Our cookie practices and your consent choices.

Read

GDPR Compliance

Our commitments under the EU General Data Protection Regulation.

Read

Data Processing Agreement

Controller/processor framework for data handling.

Read

Acceptable Use Policy

Rules and restrictions for using our scanning platform.

Read

Refund & Cancellation

How to cancel your subscription and request refunds.

Read

Service Level Agreement

Uptime commitments, response times, and remedies.

Read

Responsible Disclosure

Report security vulnerabilities and earn rewards.

Read

Open Source Licenses

Acknowledgments for open-source tools integrated into our platform.

Read

HIPAA BAA

Business Associate Agreement for healthcare customers.

Read

Security FAQ

Frequently asked questions about security, legality, and compliance.

Read

Trust Center

Security architecture, compliance frameworks, and data handling practices.

View

Incident Response Plan

Our formal process for identifying, containing, and recovering from security incidents.

View

Disaster Recovery Plan

Our formal process for restoring platform operations after a disruptive incident.

View

Incident Communication Runbooks

Detailed response procedures for data breaches, unauthorized access, DDoS, credential compromise, and third-party vendor incidents.

View

System Status

Real-time service health, uptime monitoring, and system metrics.

View

Accessibility Statement

Our commitment to WCAG 2.1 AA accessibility standards and inclusive design.

View

Records of Processing (ROPA)

GDPR Article 30 structured records of all personal data processing activities.

View

Data Protection Impact Assessment

GDPR Article 35 DPIA for vulnerability scanning as a data processing activity.

View

Subprocessor List

GDPR Article 28 third-party data processor transparency list with change log.

View

API Terms of Use

Rate limits, authentication, SLAs, and usage policies for our security scanning API.

View
Security Governance

Governance & Policy Framework

Formal security policies aligned with SOC 2 CC1, ISO 27001 Annex A, and enterprise audit requirements.

Have a legal question?

If you have questions about any of our policies or need specific legal documentation, our team is here to help.

Contact Us