{"id":68,"date":"2025-12-02T05:33:25","date_gmt":"2025-12-02T05:33:25","guid":{"rendered":"https:\/\/themepixels.net\/demo-site\/pixel-cyber-security\/term-condition\/"},"modified":"2025-12-02T05:45:14","modified_gmt":"2025-12-02T05:45:14","slug":"term-condition","status":"publish","type":"page","link":"https:\/\/themepixels.net\/demo-site\/pixel-cyber-security\/term-condition\/","title":{"rendered":"Term Condition"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"68\" class=\"elementor elementor-68\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6f28ec5c e-flex e-con-boxed e-con e-parent\" data-id=\"6f28ec5c\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-579c2a46 e-flex e-con-boxed e-con e-child\" data-id=\"579c2a46\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f30b986 elementor-widget elementor-widget-page-title\" data-id=\"f30b986\" data-element_type=\"widget\" data-settings=\"{&quot;align&quot;:&quot;center&quot;}\" data-widget_type=\"page-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\n\t\t<div class=\"hfe-page-title hfe-page-title-wrapper elementor-widget-heading\">\n\n\t\t\t\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\n\t\t\t\t\t\t\t\t\n\t\t\t\tTerm Condition  \n\t\t\t<\/h2 > \n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5b597b9d wpe-cyber-aboutp-breadcrum elementor-widget elementor-widget-shortcode\" data-id=\"5b597b9d\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t\t<!-- Flexy Breadcrumb -->\r\n\t\t\t<div class=\"fbc fbc-page\">\r\n\r\n\t\t\t\t<!-- Breadcrumb wrapper -->\r\n\t\t\t\t<div class=\"fbc-wrap\">\r\n\r\n\t\t\t\t\t<!-- Ordered list-->\r\n\t\t\t\t\t<ol class=\"fbc-items\" itemscope itemtype=\"https:\/\/schema.org\/BreadcrumbList\">\r\n\t\t\t\t\t\t            <li itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\">\r\n                <span itemprop=\"name\">\r\n                    <!-- Home Link -->\r\n                    <a itemprop=\"item\" href=\"https:\/\/themepixels.net\/demo-site\/pixel-cyber-security\">\r\n                    \r\n                                                    <i class=\"fa fa-home\" aria-hidden=\"true\"><\/i>Home                    <\/a>\r\n                <\/span>\r\n                <meta itemprop=\"position\" content=\"1\" \/><!-- Meta Position-->\r\n             <\/li><li><span class=\"fbc-separator\">\/<\/span><\/li><li class=\"active\" itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\"><span itemprop=\"name\" title=\"Term Condition\">Term Condition<\/span><meta itemprop=\"position\" content=\"2\" \/><\/li>\t\t\t\t\t<\/ol>\r\n\t\t\t\t\t<div class=\"clearfix\"><\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2ee48dff wpe-cyber-404-page e-flex e-con-boxed e-con e-parent\" data-id=\"2ee48dff\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-32dd12e e-flex e-con-boxed e-con e-child\" data-id=\"32dd12e\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-251bf138 elementor-widget elementor-widget-text-editor\" data-id=\"251bf138\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1 data-start=\"207\" data-end=\"235\"><strong data-start=\"209\" data-end=\"235\">I. Acceptance of Terms<\/strong><\/h1><p data-start=\"237\" data-end=\"796\">Thank you for using <strong data-start=\"257\" data-end=\"302\">Cyber Security \u2013 Ethical Hacking Platform<\/strong>.<br data-start=\"303\" data-end=\"306\" \/>These Terms of Service (the \u201cTerms\u201d) are intended to make you aware of your legal rights and responsibilities with respect to the access and use of the <strong data-start=\"458\" data-end=\"500\">Cyber Security Ethical Hacking website<\/strong> (the \u201cSite\u201d) and any related mobile or software applications (the \u201cCyber Security Platform\u201d) including, but not limited to, delivery of cybersecurity-related information, tools, training modules, or resources via the website, whether existing now or in the future (collectively, the \u201cServices\u201d).<\/p><p data-start=\"798\" data-end=\"1039\">These Terms are effective for all existing and future Cyber Security Platform users, including but not limited to individuals or organizations accessing cybersecurity learning content, tools, vulnerability labs, or ethical hacking resources.<\/p><p data-start=\"1041\" data-end=\"1438\">Please read these Terms carefully. By accessing or using the <strong data-start=\"1102\" data-end=\"1145\">Cyber Security Ethical Hacking Platform<\/strong>, you are agreeing to these Terms and entering into a legally binding contract with <strong data-start=\"1229\" data-end=\"1247\">Cyber Security<\/strong> (formerly Cyber Security Private Limited and Cyber Security Media Private Limited) and\/or its affiliates. You may not use the Services if you do not accept or cannot be bound by the Terms.<\/p><p data-start=\"1440\" data-end=\"1620\">Your use of the Cyber Security Platform is at your own risk, including risks associated with exposure to cybersecurity testing content that may be sensitive or technical in nature.<\/p><p data-start=\"1622\" data-end=\"1650\">You can accept the Terms by:<\/p><ul data-start=\"1651\" data-end=\"1939\"><li data-start=\"1651\" data-end=\"1777\"><p data-start=\"1653\" data-end=\"1777\">Clicking to accept or agree to the Terms where such option is presented in the user interface for any specific Service; or<\/p><\/li><li data-start=\"1778\" data-end=\"1939\"><p data-start=\"1780\" data-end=\"1939\">Actually using the Services. In this case, you agree that Cyber Security will treat your use of the Services as acceptance of the Terms from that point onward.<\/p><\/li><\/ul><hr data-start=\"1941\" data-end=\"1944\" \/><h1 data-start=\"1946\" data-end=\"1967\"><strong data-start=\"1948\" data-end=\"1967\">II. Definitions<\/strong><\/h1><h3 data-start=\"1969\" data-end=\"1992\"><strong data-start=\"1973\" data-end=\"1992\">Customer \/ User<\/strong><\/h3><p data-start=\"1993\" data-end=\"2317\">\u201cCustomer,\u201d \u201cYou,\u201d or \u201cYour\u201d refers to you as a user of the Services. A user is someone who accesses or uses the Services for the purpose of learning, practicing, testing, sharing, displaying, hosting, publishing, or uploading cybersecurity-related information, including persons jointly participating in using the Services.<\/p><h3 data-start=\"2319\" data-end=\"2334\"><strong data-start=\"2323\" data-end=\"2334\">Content<\/strong><\/h3><p data-start=\"2335\" data-end=\"2539\">\u201cContent\u201d includes (but is not limited to) cybersecurity tutorials, code snippets, vulnerability reports, images, videos, write-ups, lab results, messages, chat communication, and all other forms of data.<\/p><p data-start=\"2541\" data-end=\"2782\">\u201cYour Content\u201d or \u201cUser Content\u201d means content that you upload, share, or transmit through the Services, such as posts, comments, reviews, code samples, vulnerability write-ups, profile information, or any material displayed in your account.<\/p><p data-start=\"2784\" data-end=\"3146\">\u201cCyber Security Content\u201d means content created and provided by Cyber Security in connection with the Services, including but not limited to:<br data-start=\"2924\" data-end=\"2927\" \/>visual interfaces, interactive tools, vulnerability labs, cybersecurity training modules, graphics, design, software, reports, analytics, and all other platform components excluding Your Content and Third-Party Content.<\/p><p data-start=\"3148\" data-end=\"3326\">\u201cThird-Party Content\u201d means content originating from sources other than Cyber Security or its users, such as external cybersecurity vendors, training partners, or tool providers.<\/p><h3 data-start=\"3328\" data-end=\"3363\"><strong data-start=\"3332\" data-end=\"3363\">Labs \/ Training Environment<\/strong><\/h3><p data-start=\"3364\" data-end=\"3578\">\u201cLabs\u201d or \u201cTraining Environments\u201d refer to virtual cybersecurity environments, ethical hacking practice platforms, or sandboxed systems available on the Cyber Security Platform for educational and testing purposes.<\/p><hr data-start=\"3580\" data-end=\"3583\" \/><h1 data-start=\"3585\" data-end=\"3627\"><strong data-start=\"3587\" data-end=\"3627\">III. Eligibility to Use the Services<\/strong><\/h1><p data-start=\"3629\" data-end=\"3831\">By using the Services, you represent and warrant that you are at least <strong data-start=\"3700\" data-end=\"3730\">eighteen (18) years of age<\/strong> and fully competent to understand, agree, and comply with these Terms and obligations stated herein.<\/p><h3 data-start=\"3833\" data-end=\"3861\"><strong data-start=\"3837\" data-end=\"3861\">Compliance with Laws<\/strong><\/h3><p data-start=\"3862\" data-end=\"4139\">You agree to comply with all applicable cybersecurity, data protection, and digital use laws in your country.<br data-start=\"3971\" data-end=\"3974\" \/>You agree to use the Services <strong data-start=\"4004\" data-end=\"4057\">only for ethical, legal, and educational purposes<\/strong>, and in a manner that does not violate the rights or security of any third party.<\/p><p data-start=\"4141\" data-end=\"4284\">Unauthorized hacking, attempts to access systems without permission, or using platform knowledge for illegal activities is strictly prohibited.<\/p><hr data-start=\"4286\" data-end=\"4289\" \/><h1 data-start=\"4291\" data-end=\"4321\"><strong data-start=\"4293\" data-end=\"4321\">IV. Changes to the Terms<\/strong><\/h1><p data-start=\"4323\" data-end=\"4639\">Cyber Security may modify, amend, update, or change these Terms at its sole discretion.<br data-start=\"4410\" data-end=\"4413\" \/>You are responsible for reviewing the Terms periodically to ensure continued compliance.<br data-start=\"4501\" data-end=\"4504\" \/>Your continued use of the Cyber Security Platform after such changes will be considered as <strong data-start=\"4595\" data-end=\"4617\">express acceptance<\/strong> of the updated Terms.<\/p><hr data-start=\"4641\" data-end=\"4644\" \/><h1 data-start=\"4646\" data-end=\"4679\"><strong data-start=\"4648\" data-end=\"4679\">V. Translation of the Terms<\/strong><\/h1><p data-start=\"4681\" data-end=\"4839\">Cyber Security may provide translations of the English version of the Terms into other languages. These translations are provided only for your convenience.<\/p><p data-start=\"4841\" data-end=\"4963\">In case of any inconsistencies between the English version and a translated version, the <strong data-start=\"4930\" data-end=\"4962\">English version will prevail<\/strong>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Term Condition I. Acceptance of Terms Thank you for using Cyber Security \u2013 Ethical Hacking Platform.These Terms of Service (the \u201cTerms\u201d) are intended to make you aware of your legal rights and responsibilities with respect to the access and use of the Cyber Security Ethical Hacking website (the \u201cSite\u201d) and any related mobile or software [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-68","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/themepixels.net\/demo-site\/pixel-cyber-security\/wp-json\/wp\/v2\/pages\/68","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/themepixels.net\/demo-site\/pixel-cyber-security\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/themepixels.net\/demo-site\/pixel-cyber-security\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/themepixels.net\/demo-site\/pixel-cyber-security\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/themepixels.net\/demo-site\/pixel-cyber-security\/wp-json\/wp\/v2\/comments?post=68"}],"version-history":[{"count":3,"href":"https:\/\/themepixels.net\/demo-site\/pixel-cyber-security\/wp-json\/wp\/v2\/pages\/68\/revisions"}],"predecessor-version":[{"id":168,"href":"https:\/\/themepixels.net\/demo-site\/pixel-cyber-security\/wp-json\/wp\/v2\/pages\/68\/revisions\/168"}],"wp:attachment":[{"href":"https:\/\/themepixels.net\/demo-site\/pixel-cyber-security\/wp-json\/wp\/v2\/media?parent=68"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}