Home / Terms of Use

Terms of Use

1. Legal Identity and Acceptance

These Terms of Use (“Terms”) constitute a legally binding agreement between you and “Quest Consortium Security Solution”(QCSS) , a company duly incorporated under the laws of  “England and Wales”, with registered company number 16741806 and registered office at “Marsh View Gravesend, Kent, United Kingdom” (“Company,” “we,” “us,” or “our”). By accessing, registering for, or using the Services, you confirm that you have read, understood, and agree to be bound by these Terms.

Where you enter these Terms on behalf of an organization, you stand for and warrant that you have full legal authority to bind that organization to these Terms. All references to “Customer” shall include such organization. The Company reserves the right to update these Terms from time to time, with continued use of the Services constituting acceptance of such updates.

2. Description of Services

The Company provides cybersecurity software and related services including vulnerability discovery, monitoring, analysis, reporting, and risk assessment (“Services”). The Services are intended solely for systems where the Customer has lawful authorization.

The Services do not guarantee prevention or detection of all threats and form part of a broader cybersecurity program. The Company may update Services provided functionality is not materially degraded.

3. Authorized Use and Export Compliance

The Customer shall use the Services only for lawful purposes and authorized systems. The Customer must follow all applicable laws and export regulations. The Customer is responsible for compliance in all jurisdictions where the Services are used.

The Customer shall use the Services only for lawful purposes and authorized systems. The Customer must comply with all applicable laws, regulations, and export control requirements. The Customer is responsible for ensuring compliance in all jurisdictions where the Services are used.

The Company may apply reasonable technical and administrative controls to support compliance with applicable export control and sanctions regulations. Where the Company reasonably determines that use of the Services may breach applicable laws, export controls, or sanctions requirements, the Company may restrict or suspend access to the Services.

4. Account Security and Access Controls

The Customer is responsible for maintaining the confidentiality of all credentials and ensuring that only authorized users are granted access to the Services. The Customer must implement appropriate internal controls over user access, including prompt removal of access for users who are no longer authorized.

The Company implements technical security measures to support account protection, which may include multi-factor authentication (MFA), session management controls, monitoring, and access logging.

Security responsibilities are shared between the Company and the Customer. The Customer is responsible for managing user access within their organization, while the Company is responsible for securing the platform and providing available security features.

The Customer must promptly notify the Company of any suspected or confirmed unauthorized access to the Services.

5. Fees, Billing, and Payment

Fees are defined in applicable agreements and are payable in advance unless otherwise agreed in writing. All fees are exclusive of applicable taxes, levies, or duties, which shall be the responsibility of the Customer.

The Company may suspend access to the Services in the event of overdue or non-payment, following reasonable notice where applicable.

The Customer must notify the Company in writing of any billing disputes within a reasonable time after the invoice date. The Parties shall work in good faith to resolve any disputed charges promptly. Undisputed amounts shall remain payable in accordance with the agreed payment terms.

Pricing may be revised upon renewal, subject to prior written notice to the Customer.

6. Term, Renewal, and Termination

These Terms apply for the duration of the Customer’s subscription and will automatically renew unless terminated in accordance with the applicable agreement.

Either party may terminate the agreement in accordance with the termination provisions set out in the applicable contract, including material breach or where continued provision of the Services presents a reasonable security, legal, or compliance risk.

Upon termination or expiration of the agreement, the Customer’s access to the Services shall cease. Any data handling, including retention, deletion, or return of Customer data, shall be carried out in accordance with the Company’s applicable Data Retention and Data Protection Policy.

7. Limitation of Liability

To the maximum extent permitted by applicable law, the Company’s total aggregate liability arising out of or in connection with the Services shall be limited to the total fees paid by the Customer for the Services in the twelve (12) months preceding the event giving rise to the claim.

The Company shall not be liable for any indirect, incidental, consequential, special, or punitive damages, including but not limited to loss of profits, revenue, data, or business opportunity, arising out of or in connection with the use of the Services.

Nothing in this clause shall exclude or limit liability where such exclusion or limitation is not permitted under applicable law, including applicable laws in jurisdictions where the Services are lawfully provided.

This clause shall be interpreted in accordance with the Company’s global operating context, with the governing law and jurisdiction set out in the applicable agreement.

8. Force Majeure

The Company is not liable for delays caused by events beyond control, including cyberattacks and infrastructure failures.

9. Assignment

Customers cannot assign without consent. Company may assign in corporate restructuring. 

10. Governing Law and Jurisdiction

These Terms shall be governed by and construed in accordance with the laws of England and Wales.

The courts of England and Wales shall have exclusive jurisdiction to settle any dispute or claim arising out of or in connection with these Terms, including non-contractual disputes or claims”

Home / Privacy Policy

Privacy Policy

1. Controller Identity

Quest Consortium Security Solutions limited (QCSS), a company registered in the United Kingdom, acts as a Data Controller for personal data processed in connection with account registration, billing, and operation of the Services.

Where the Company processes personal data on behalf of its customers, it acts as a Data Processor in accordance with applicable contractual arrangements, including Data Processing Agreements (DPAs).

Contact for privacy matters: hq@qcwss.com

2. Categories of Data Collected

The Company collects personal data necessary to provide and improve the Services, including: 

  • Identity data (e.g., name, email)
  • Technical data (e.g., IP address, logs)
  • Transactional data (e.g., billing records)

The Company adheres to data minimization principles. Special category (sensitive) data is not intentionally collected unless required by law and subject to additional safeguards.

3. Purpose and Legal Basis

Personal data is processed for:

  • Service delivery and account management
  • Authentication and security monitoring
  • Billing and fraud prevention
  • Compliance with legal obligations

Lawful bases include contract performance, legitimate interests, legal obligations, and consent where applicable.

4. Data Subject Rights

Individuals have the right to:

  • Access, correct, or delete their data
  • Restrict or object to processing
  • Withdraw consent where applicable

Requests can be submitted to hq@qcwss.com. The Company will respond within 30 days under GDPR

5. Regulatory Authority and Complaints

Individuals may lodge complaints with a relevant supervisory authority in their jurisdiction.

For the United Kingdom, this includes the Information Commissioner’s Office (ICO). For Nigeria, this includes the Nigeria Data Protection Commission (NDPC).

Where applicable, individuals within the European Economic Area may contact their local supervisory authority under the General Data Protection Regulation (GDPR).

The Company encourages individuals to contact it first for resolution. 

6. International Data Transfers

Where personal data is transferred outside its originating jurisdiction, appropriate safeguards such as Standard Contractual Clauses (SCCs) are implemented.

Transfer Risk Assessments (TRAs) are conducted where required.

7. Data Retention

Personal data is retained only for as long as necessary for the purposes outlined and to meet legal obligations.

Retention periods are defined in the Company’s internal data retention policy. Data is securely deleted or anonymized thereafter.

8. Security Measures

The Company implements appropriate technical and organisational measures, including: 

  • Encryption in transit
  • Access controls and authentication
  • Logging and monitoring
  • Incident response processes 

n the event of a data breach affecting personal data, notifications will be handled in accordance with applicable laws and contractual obligations.

Home / Acceptable Use Policy

Acceptable Use Policy

1. Purpose and Applicability

This Acceptable Use Policy (“AUP”) forms part of and is incorporated into Quest Consortium Security Solutions (QCSS) Terms of Use and governing agreement.

This Policy applies to all Customers, users, and any individuals accessing or using the Services. The Services are intended solely for lawful cybersecurity activities.

2. Authorized and Lawful Uses

The Services may only be used on systems for which the Customer has explicit, documented authorization.

Customers are responsible for ensuring compliance with applicable laws and must maintain evidence of authorization. The Company may request validation where misuse is suspected.

3. Prohibited Activities

Prohibited actions include:

  • Unauthorized access or data exfiltration
  • Disruption of systems or networks
  • Circumvention of security controls 
  • Reverse engineering (except where legally permitted)

Violations may result in enforcement actions under the Terms of Use. 

4. Export Control and Sanctions Compliance

Customers must comply with applicable export control and sanctions laws, including UK and international regulations

The Company may implement controls to restrict access from sanctioned regions where required.

5. Responsibility and Internal Controls

Customers are responsible for all account activities and must implement appropriate controls, including:

  • Access management
  • Authorization procedures
  • Monitoring and oversight

Controls should align with recognised standards such as ISO 27001 or equivalent best practices.

6. Monitoring and Investigation

The Company may monitor use of the Services as necessary to ensure compliance, detect threats, and protect system integrity.

Monitoring is conducted in line with applicable data protection laws, including UK GDPR.

7. Enforcement and Remediation

The Company may take proportionate enforcement actions, including:

  • Warnings
  • Access restrictions
  • Suspension
  • Termination

Serious violations may be escalated and reported to authorities where required.

8. Reporting Violations and Cooperation

Customers must report suspected misuse or incidents promptly to hq@qcwss.com

The Customer agrees to cooperate in investigations.

10. Updates and Amendments

The Company may update this AUP to reflect legal, operational, or security changes.

Customers will be notified via email. Continued use constitutes acceptance.

Home / Complaint Handling Process

Complaint Handling Process

1. Purpose

The Company is committed to handling complaints in a fair, transparent, and timely manner. This process establishes a structured approach for receiving, assessing, investigating, and resolving complaints in a way that supports accountability, regulatory alignment, and continuous improvement. This process forms part of the Company’s governance framework and operates in alignment with the Privacy Policy, Terms of Use, Incident Response Plan, and internal risk management processes.

2. Scope

This process applies to all complaints received from customers, users, partners, or third parties relating to the Company’s Services, including but not limited to:

  • Service performance or availability
  • Billing and payments
  • Data protection or privacy concerns
  • Security-related issues
  • Customer support interactions

Complaints must relate to services or activities within the Company’s control. Matters outside this scope may be redirected appropriately.

3. Complaint Submission Process

Complaints may be submitted through the following channels: 

  • Email: hq@qcss.com
  • Website contact form
  • Official support channel

Submissions should include, where available:

  • Name and contact details of the complainant
  • Description of the complaint
  • Relevant dates and events
  • Supporting evidence (if applicable)

All complaints are treated confidentially and handled in accordance with applicable data protection laws.

4. Upon receiving a complaint, the Company will:

  • Acknowledge receipt within a defined and reasonable timeframe (typically within 2–5 business days)
  • Log and track the complaint in an internal complaint register
  • Assess the nature, severity, and impact of the complaint
  • Assign appropriate ownership for investigation
  • Take reasonable steps to investigate and resolve the issue
  • Communicate progress and outcome to the complainant where appropriate

5. Investigation and Resolution

Each complaint will be:

  • Reviewed to determine validity and scope
  • Investigated by the relevant team (e.g., Product, Engineering, GRC, or Support)
  • Assessed for risk, impact, and root cause

Resolution actions may include:

  • Corrective measures to address the issue
  • Process or control improvements
  • Communication of findings and resolution to the complainan

Resolution timelines will be proportionate to the complexity and severity of the complaint

6. Escalation

Complaints may be escalated where:

  • The issue is not resolved within expected timeframes
  • The complaint involves high-risk matters (e.g., data protection, security, legal exposure)
  • The complainant is not satisfied with the initial resolution

Escalation path:
Support → GRC → Legal/Management

Where required, complaints may be escalated to relevant regulatory authorities in accordance with applicable laws.

7. Record Keeping and Tracking

All complaints must be:

  • Logged in a central Complaint Register
  • Assigned a unique reference ID
  • Tracked from receipt through to resolution
  • Records must include:

    • Date received
    • Nature of complaint
    • Actions taken
    • Resolution outcome
    • Closure date

    Records are retained for audit, compliance, and continuous improvement purposes.

8. Limitations

This process does not apply to:

  • General enquiries (non-complaint)
  • Requests already handled through other formal processes (e.g., DSAR requests) 
  • Issues outside the Company’s operational control

Misuse of the complaint process or submission of fraudulent claims may result in rejection and further action in accordance with the Company’s Terms of Use and Acceptable Use Policy.

9. Continuous Improvement

The Company will periodically review complaints to:

  • Identify trends and recurring issues
  • Improve products, services, and processes
  • Strengthen internal controls and governance

Findings may be used to support risk management and compliance initiatives.

10. Review and Update

This process will be reviewed periodically and updated to reflect:

  • Changes in regulatory requirements
  • Operational improvements
  • Lessons learned from complaint handling activities
Home / Vulnerability Disclosure Policy

Vulnerability Disclosure Policy

1. Purpose

The Company is committed to maintaining the security and integrity of its Services and supports the responsible disclosure of vulnerabilities identified by security researchers, customers, and members of the broader community. This Policy establishes a framework for reporting vulnerabilities in a manner that supports coordinated remediation, responsible communication, and overall risk reduction.

This Policy forms part of the Company’s broader security and governance framework and operates in alignment with the Security Addendum, Incident Response Plan, and internal risk management processes to ensure consistent handling, escalation, and remediation of reported vulnerabilities.

2. Scope of Testing

Testing activities must be limited to systems, applications, and services that are explicitly owned, operated, or authorized by the Company (“in-scope systems”). The Company will maintain and publish a defined list of in-scope assets to ensure clarity for all participants. Any systems not expressly listed are considered out of scope.

Testing must be conducted in a controlled, ethical, and non-disruptive manner.

Testing must not:

  • Disrupt, degrade, or impair service availability
  • Access, exfiltrate, or modify data belonging to other users or third parties
  • Exploit vulnerabilities beyond what is strictly necessary to demonstrate their existence
  • Conduct automated or high-volume testing that may impact system stability without prior approval

Testing is authorized only within the boundaries of this Policy. Any activities that fall outside the defined scope or may introduce risk to service availability, data integrity, or confidentiality require prior written authorization from the Company.

3. Reporting Process

Vulnerabilities should be reported to: info@qcss.com

Reports should include, where available:

  • A clear description of the vulnerability
  • Steps to reproduce the issue
  • The potential impact
  • Supporting evidence (e.g., logs, screenshots, or proof of concept)

The Company encourages responsible disclosure and requests that all information shared be handled in a confidential manner. Where appropriate, reporters are encouraged to use secure communication methods when submitting sensitive details.

Upon receipt, all vulnerability reports will be logged, tracked, and assessed in accordance with the Company’s internal vulnerability management and incident response processes. The Company will make reasonable efforts to acknowledge receipt of reports and provide updates on remediation progress where applicable.

4. Company Commitments

Upon receiving a vulnerability report, the Company will: 

  • Acknowledge receipt of the report within a defined and reasonable timeframe (typically within 2–5 business days)
  • Log and assess the reported vulnerability in accordance with internal vulnerability management procedures
  • Prioritize remediation efforts based on the severity, impact, and exploitability of the vulnerability
  • Take appropriate steps to remediate validated vulnerabilities within a timeframe proportionate to the associated risk
  • Communicate progress and resolution updates to the reporter where appropriate.

All reported vulnerabilities will be handled in alignment with the Company’s Incident Response Plan and risk management framework to ensure consistent evaluation, prioritization, and remediation.

5. Safe Harbor

The Company will not pursue civil or legal action against individuals who identify and report vulnerabilities, provided that such individuals:

  • Act in good faith and with the intent of improving the security of the Company’s systems
  • Comply fully with the terms of this Policy
  • Conduct testing only within the defined scope and authorization boundaries
  • Do not exploit vulnerabilities beyond what is necessary to demonstrate their existence
  • Do not access, modify, or exfiltrate data that does not belong to them
  • Do not engage in any activity that disrupts or degrades service availability

This Safe Harbor applies solely to activities conducted in accordance with this Policy and does not extend to actions that violate applicable laws or regulations. All protections under this section are subject to compliance with relevant legal and regulatory requirements in the applicable jurisdiction.

6. Limitations

This Policy does not authorise:

  • Social engineering attacks
  • Physical security testing
  • Denial-of-service or traffic flooding attack
  • Accessing, modifying, or exfiltrating data beyond what is strictly necessary to demonstrate a vulnerability

Activities outside these boundaries are strictly prohibited.

Any actions that violate this Policy, or applicable laws and regulations, may result in disqualification from this program and may be subject to further action in accordance with the Company’s Terms of Use, Acceptable Use Policy, and other governing agreements.

All violations will be reviewed and handled in line with the Company’s internal incident response and escalation procedures to ensure appropriate investigation, risk assessment, and resolution.

7. Coordinated Disclosure

The Company supports coordinated vulnerability disclosure and aims to resolve reported vulnerabilities in a timely manner.

Reporters are requested to allow the Company a reasonable period to investigate and remediate reported vulnerabilities before any public disclosure. The Company generally targets a remediation timeline of up to 90 days from the date of acknowledgment, depending on the severity and complexity of the issue.

In cases where a vulnerability presents a high or critical risk, the Company will make reasonable efforts to expedite remediation.

The Company will work in good faith with reporters to agree on an appropriate timeline for public disclosure where necessary. Public disclosure of vulnerabilities without prior coordination with the Company may be considered a violation of this Policy

Home / Data Processing Agreement

Data Processing Agreement

1. Roles and Scope

This Data Processing Agreement (“DPA”) forms part of and is incorporated into the governing agreement (including Terms of Service) between Quest Consortium Security Solutions (QCSS) (“Processor”) and the Customer (“Controller”).

The Controller determines the purposes and means of processing Personal Data. The Processor processes Personal Data solely on behalf of the Controller and only for the purpose of providing the Services, in accordance with this DPA, the governing agreement, and applicable data protection laws, including the UK GDPR

2. Nature and Purpose of Processing

The Processor processes Personal Data solely for the purpose of delivering cybersecurity services as defined in the governing agreement and product documentation.

Processing activities may include collection, storage, analysis, transmission, and deletion of Personal Data required to operate the Services. The Processor shall not process Personal Data for its own independent purposes.

3. Categories of Data and Data Subjects

The Personal Data processed may include:

  • Basic identifiers (e.g., name, email address)
  • Technical data (e.g., IP addresses, logs, device identifiers)
  • Account and authentication data

Data Subjects may include:

  • Customer employees
  • Authorized users

Special category (sensitive) data is not intentionally processed unless explicitly agreed and subject to additional safeguards.

The Controller is responsible for determining the data submitted into the Services.

4. Processing Instructions

The Processor processes Personal Data only in accordance with documented instructions from the Controller, including use of the Services as defined in the governing agreement.

If the Processor believes an instruction violates applicable law, it shall inform the Controller without undue delay.

5. Confidentiality

The Processor ensures that personnel authorised to process Personal Data are subject to confidentiality obligations and access data only where necessary.

The Processor maintains internal controls including training and access management to enforce confidentiality.

6. Security Measures

The Processor implements appropriate technical and organisational measures, including:

  • Encryption in transit (TLS/HTTPS)
  • Access controls and authentication mechanisms
  • Logging and monitoring
  • Risk-based security management practices 
  • Security measures are documented in the Security Addendum and reviewed periodically.

7. Personal Data Breach Notification

The Processor shall notify the Controller without undue delay and, where feasible, within 72 hours after becoming aware of a Personal Data breach affecting Customer data.

Notification shall include:

  • Nature of the breach
  • Likely consequences
  • Measures taken or proposed

8. Subprocessors

The Processor may engage subprocessors to support service delivery.

The Processor ensures subprocessors are bound by equivalent data protection obligations and subject to due diligence and risk assessment.

The Controller will be notified of new subprocessors where required.

9. Data Subject Requests

The Processor shall notify the Controller of any Data Subject requests and shall not respond directly unless instructed.

The Processor shall provide reasonable assistance to the Controller in fulfilling such requests

10. Data Retention and Deletion

Personal Data is retained only as long as necessary and in accordance with applicable law and internal policies.

Upon termination, data will be deleted or anonymised within defined timelines, including handling of backups.

11. International Transfers

Where Personal Data is transferred internationally, the Processor implements appropriate safeguards such as Standard Contractual Clauses (SCCs) or equivalent mechanisms in line with UK GDPR

Transfer risk assessments are conducted where required.

12. Liability

Liability under this DPA is subject to the limitations and exclusions defined in the governing agreement.

Last updated date: 8 May 2026

Still Have Questions?

Can't find the answer you're looking for?
Talk to our team, we'll guide you based on your environment.

No setup. No agents. Results in minutes.