Terms of Service

Version 1.0, Effective Date: 11th April 2025


Terms of Service
Effective Date: April 11, 2025


These Terms of Service ("Terms") govern your use of the products, services, and software (collectively, the “Services”) provided by Gecko Security, Inc. (“Gecko Security,” “we,” “us,” or “our”), a company specializing in cybersecurity and artificial intelligence solutions. By accessing or using our Services, you agree to be bound by these Terms, along with our Privacy Policy and any additional terms referenced herein or presented to you at the time of access.


You may use Gecko Security’s Services only in accordance with these Terms, and only if you have the legal capacity and authority to enter into a binding agreement on behalf of yourself or your organization. If you are using the Services on behalf of a company, entity, or organization, you represent and warrant that you are authorized to bind that organization to these Terms.


Gecko Security’s Services may include both hosted cloud-based products and on-premises software deployments, and your rights and obligations may differ depending on the type of service and the applicable agreement. Access to the Services is provided solely for lawful and authorized purposes, and you agree not to misuse or attempt to reverse-engineer, probe, or tamper with any part of the platform or software.


We reserve the right to modify, suspend, or terminate the Services or these Terms at any time, with or without notice, provided such modifications do not materially degrade the security or functionality of the Services in a way that impacts existing customers without reasonable justification. Your continued use of the Services following any updates or modifications constitutes acceptance of the revised Terms.


All content, software, and technology provided as part of the Services are the intellectual property of Gecko Security, Inc. or our licensors. Except as expressly permitted in writing, you may not copy, modify, distribute, sell, or lease any part of our software or Services, nor may you decompile or attempt to extract the source code, unless applicable law permits such activity.


Gecko Security makes commercially reasonable efforts to maintain the availability, performance, and security of its hosted Services, including through the use of redundant infrastructure and industry-standard encryption and monitoring practices. We do not guarantee uninterrupted availability and disclaim any liability for downtime or disruptions caused by external forces beyond our control.


To the fullest extent permitted by law, our liability for any claim arising out of or relating to these Terms or the Services is limited to the amount paid by you to us for the Services during the twelve months preceding the event giving rise to the claim. Under no circumstances shall Gecko Security be liable for any indirect, incidental, special, or consequential damages, including but not limited to loss of data, revenue, or business opportunities.

These Terms shall be governed by the laws of the State of Delaware, without regard to its conflict of law principles. Any disputes arising under or related to these Terms shall be subject to the exclusive jurisdiction of the courts located in Delaware.

Contact Information

For questions about the Terms of Service or to exercise your usage rights, please contact us at:


Email: gecko@gecko.security

Mailing Address:

Gecko Security, Inc.

Suite GB12463, 4283 Express Lane

Sarasota

Florida

34249

USA


Terms of Service


Version 1.0, Effective Date: 11th April 2025


Terms of Service
Effective Date: April 11, 2025


These Terms of Service ("Terms") govern your use of the products, services, and software (collectively, the “Services”) provided by Gecko Security, Inc. (“Gecko Security,” “we,” “us,” or “our”), a company specializing in cybersecurity and artificial intelligence solutions. By accessing or using our Services, you agree to be bound by these Terms, along with our Privacy Policy and any additional terms referenced herein or presented to you at the time of access.


You may use Gecko Security’s Services only in accordance with these Terms, and only if you have the legal capacity and authority to enter into a binding agreement on behalf of yourself or your organization. If you are using the Services on behalf of a company, entity, or organization, you represent and warrant that you are authorized to bind that organization to these Terms.


Gecko Security’s Services may include both hosted cloud-based products and on-premises software deployments, and your rights and obligations may differ depending on the type of service and the applicable agreement. Access to the Services is provided solely for lawful and authorized purposes, and you agree not to misuse or attempt to reverse-engineer, probe, or tamper with any part of the platform or software.


We reserve the right to modify, suspend, or terminate the Services or these Terms at any time, with or without notice, provided such modifications do not materially degrade the security or functionality of the Services in a way that impacts existing customers without reasonable justification. Your continued use of the Services following any updates or modifications constitutes acceptance of the revised Terms.


All content, software, and technology provided as part of the Services are the intellectual property of Gecko Security, Inc. or our licensors. Except as expressly permitted in writing, you may not copy, modify, distribute, sell, or lease any part of our software or Services, nor may you decompile or attempt to extract the source code, unless applicable law permits such activity.


Gecko Security makes commercially reasonable efforts to maintain the availability, performance, and security of its hosted Services, including through the use of redundant infrastructure and industry-standard encryption and monitoring practices. We do not guarantee uninterrupted availability and disclaim any liability for downtime or disruptions caused by external forces beyond our control.


To the fullest extent permitted by law, our liability for any claim arising out of or relating to these Terms or the Services is limited to the amount paid by you to us for the Services during the twelve months preceding the event giving rise to the claim. Under no circumstances shall Gecko Security be liable for any indirect, incidental, special, or consequential damages, including but not limited to loss of data, revenue, or business opportunities.

These Terms shall be governed by the laws of the State of Delaware, without regard to its conflict of law principles. Any disputes arising under or related to these Terms shall be subject to the exclusive jurisdiction of the courts located in Delaware.

Contact Information

For questions about the Terms of Service or to exercise your usage rights, please contact us at:


Email: gecko@gecko.security

Mailing Address:

Gecko Security, Inc.

Suite GB12463, 4283 Express Lane

Sarasota

Florida

34249

USA


Terms of Service


Version 1.0, Effective Date: 11th April 2025


Terms of Service
Effective Date: April 11, 2025


These Terms of Service ("Terms") govern your use of the products, services, and software (collectively, the “Services”) provided by Gecko Security, Inc. (“Gecko Security,” “we,” “us,” or “our”), a company specializing in cybersecurity and artificial intelligence solutions. By accessing or using our Services, you agree to be bound by these Terms, along with our Privacy Policy and any additional terms referenced herein or presented to you at the time of access.


You may use Gecko Security’s Services only in accordance with these Terms, and only if you have the legal capacity and authority to enter into a binding agreement on behalf of yourself or your organization. If you are using the Services on behalf of a company, entity, or organization, you represent and warrant that you are authorized to bind that organization to these Terms.


Gecko Security’s Services may include both hosted cloud-based products and on-premises software deployments, and your rights and obligations may differ depending on the type of service and the applicable agreement. Access to the Services is provided solely for lawful and authorized purposes, and you agree not to misuse or attempt to reverse-engineer, probe, or tamper with any part of the platform or software.


We reserve the right to modify, suspend, or terminate the Services or these Terms at any time, with or without notice, provided such modifications do not materially degrade the security or functionality of the Services in a way that impacts existing customers without reasonable justification. Your continued use of the Services following any updates or modifications constitutes acceptance of the revised Terms.


All content, software, and technology provided as part of the Services are the intellectual property of Gecko Security, Inc. or our licensors. Except as expressly permitted in writing, you may not copy, modify, distribute, sell, or lease any part of our software or Services, nor may you decompile or attempt to extract the source code, unless applicable law permits such activity.


Gecko Security makes commercially reasonable efforts to maintain the availability, performance, and security of its hosted Services, including through the use of redundant infrastructure and industry-standard encryption and monitoring practices. We do not guarantee uninterrupted availability and disclaim any liability for downtime or disruptions caused by external forces beyond our control.


To the fullest extent permitted by law, our liability for any claim arising out of or relating to these Terms or the Services is limited to the amount paid by you to us for the Services during the twelve months preceding the event giving rise to the claim. Under no circumstances shall Gecko Security be liable for any indirect, incidental, special, or consequential damages, including but not limited to loss of data, revenue, or business opportunities.

These Terms shall be governed by the laws of the State of Delaware, without regard to its conflict of law principles. Any disputes arising under or related to these Terms shall be subject to the exclusive jurisdiction of the courts located in Delaware.

Contact Information

For questions about the Terms of Service or to exercise your usage rights, please contact us at:


Email: gecko@gecko.security

Mailing Address:

Gecko Security, Inc.

Suite GB12463, 4283 Express Lane

Sarasota

Florida

34249

USA