gavel LEGAL DOCUMENTATION

Terms of Service

Governing the use of Jedra's Enterprise AI and Cybersecurity Solutions. Please review carefully to understand your rights and obligations.

calendar_month Effective Date: October 24, 2025
history Version: 2.4.1 (Enterprise)
01

Acceptance of Terms

By accessing or using the services provided by Jedra ("we," "us," or "our"), including our AI-driven cybersecurity platform, data analytics tools, and related APIs (collectively, the "Services"), you agree to be bound by these Terms of Service ("Terms"). If you do not agree to these Terms, you may not access or use the Services.

These Terms apply to all visitors, users, and others who access the Services ("Users"). Specific services may be subject to additional terms and conditions specified by us from time to time; your use of such services is subject to those additional terms and conditions, which are incorporated into these Terms by this reference.

02

Use of Services

2.1 Eligibility You represent and warrant that you are at least 18 years of age and possess the legal authority, right, and freedom to enter into these binding Terms and to form a binding agreement, for yourself or on behalf of the person or entity committed to this agreement.

2.2 License Grant Subject to your compliance with these Terms, Jedra grants you a limited, non-exclusive, non-transferable, non-sublicensable license to access and use the Services for your internal business purposes strictly in accordance with the service documentation.

2.3 Prohibited Uses You agree not to use the Services:

  • In any way that violates any applicable national, federal, state, local, or international law or regulation.
  • To exploit, harm, or attempt to exploit or harm minors in any way by exposing them to inappropriate content.
  • To transmit, or procure the sending of, any advertising or promotional material, including any "junk mail", "chain letter," "spam," or any other similar solicitation.
  • To impersonate or attempt to impersonate Jedra, a Jedra employee, another user, or any other person or entity.
03

Data Security & Sovereignty

lock Security Notice

Our infrastructure is compliant with ISO 27001, SOC 2 Type II, and FedRAMP High standards. We utilize military-grade encryption for data at rest and in transit.

3.1 Data Ownership You retain all rights, title, and interest in and to all of your data. Jedra obtains no rights in your data other than the limited rights to host, reproduce, backup, and use such data solely as necessary for us to provide the Services.

3.2 Sovereignty For clients requiring data residency, Jedra guarantees that data storage and processing will remain within the designated geographic region as specified in your Service Order.

04

Intellectual Property Rights

The Services and their original content (excluding Content provided by users), features, and functionality are and will remain the exclusive property of Jedra and its licensors. The Services are protected by copyright, trademark, and other laws of both the United States and foreign countries. Our trademarks and trade dress may not be used in connection with any product or service without the prior written consent of Jedra.

05

Limitation of Liability

Disclaimer

IN NO EVENT SHALL JEDRA, ITS DIRECTORS, EMPLOYEES, PARTNERS, AGENTS, SUPPLIERS, OR AFFILIATES, BE LIABLE FOR ANY INDIRECT, INCIDENTAL, SPECIAL, CONSEQUENTIAL OR PUNITIVE DAMAGES, INCLUDING WITHOUT LIMITATION, LOSS OF PROFITS, DATA, USE, GOODWILL, OR OTHER INTANGIBLE LOSSES, RESULTING FROM (I) YOUR ACCESS TO OR USE OF OR INABILITY TO ACCESS OR USE THE SERVICE; (II) ANY CONDUCT OR CONTENT OF ANY THIRD PARTY ON THE SERVICE; (III) ANY CONTENT OBTAINED FROM THE SERVICE; AND (IV) UNAUTHORIZED ACCESS, USE OR ALTERATION OF YOUR TRANSMISSIONS OR CONTENT, WHETHER BASED ON WARRANTY, CONTRACT, TORT (INCLUDING NEGLIGENCE) OR ANY OTHER LEGAL THEORY, WHETHER OR NOT WE HAVE BEEN INFORMED OF THE POSSIBILITY OF SUCH DAMAGE.