Privacy Policy
CYBER RANGE SAAS TERMS & CONDITIONS
Last updated on 23 Jan 2025
Last updated on 26 Nov 2025
Welcome to Landerx ("we" or "us"). This Privacy Policy is designed to help you understand how we collect, use, disclose, and safeguard your personal information when you use our website and related services.
1. Information We Collect
2. How We Use Your Information
3. Sharing Your Information
4. Cookies and Similar Technologies
5. Your Choices
6. Security
7. Children's Privacy
8. Changes to This Privacy Policy
9. Contact Us
SECURITY IMPOSSIBLE PTY LTD
CYBER RANGE SAAS TERMS & CONDITIONS
Version 1.0
Effective Date: [Insert Date]
These Terms & Conditions (“Terms”) govern the use of the Cyber Range SaaS platform (“Service”) provided by Security Impossible Pty Ltd, ABN [insert if desired], 45 Rockley Road, South Yarra, Melbourne VIC 3141 (“Security Impossible”, “we”, “us”, “our”) to the customer (“Client”, “you”, “your”).
By accessing or using the Service, the Client agrees to be bound by these Terms.
If there is a separate signed Cyber Range Service Agreement, that document prevails where there is any inconsistency. Otherwise, these Terms form the complete governing framework for access and use of the Service.
1. Definitions
“Service”
The hosted Cyber Range SaaS platform, virtual machines, labs, courses, modules, simulations, portals, dashboards, and associated materials provided by Security Impossible.
“Client Data”
All data, information, records, student details, or materials supplied by the Client or its Users.
“Users”
Individuals authorised by the Client to access the Service, including students, instructors, and administrators.
“Content”
All modules, labs, virtual machines, scenarios, exercises, instructional materials, and assessments created or supplied by Security Impossible.
“Professional Services”
Any custom content development, integrations, consulting, or training services provided separately.
“Cloud Provider”
Third-party providers (e.g., Microsoft Azure) hosting the platform, infrastructure, or components.
2. Grant of Licence
Security Impossible grants the Client a non-exclusive, non-transferable, time-limited licence to access and use the Service for educational, training, and instructional purposes during the Term.
The Client may:
Allow authorised Users to access the Service
Use, deliver, and review course content for educational purposes
Access reporting and management dashboards
The Client may not:
Resell, redistribute, sublicense, or commercially exploit the Service
Grant access to individuals outside the authorised User list
Use the Service to host or deliver content unrelated to the Cyber Range environment unless explicitly permitted
3. Acceptable Use
To protect the integrity of the Service and Security Impossible’s IP, the Client agrees that Users will not:
Reverse engineer the platform, labs, simulations, or content
Copy, clone, replicate, download, or export any virtual machine, scenario, image, or software
Conduct penetration testing, security scanning, automated probing, or exploit testing against the platform
Perform malicious or unauthorised cyber activities
Share login credentials or allow credential pooling
Remove, obscure, or modify branding, disclaimers, or copyright notices
Circumvent security controls, rate limits, or environment boundaries
Security Impossible may temporarily suspend access if the Client or Users cause:
Threats to system stability
Misuse or abuse
Excessive load
Security risk
Access will be restored upon resolution.
4. Availability & Performance
Security Impossible will use reasonable efforts to ensure continuous availability of the Service.
The Client acknowledges:
The Service relies on cloud providers that maintain ISO 27001 and SOC 2 certifications
There may be planned maintenance windows (announced in advance where possible)
Occasional unplanned outages may occur beyond Security Impossible’s control
No guaranteed uptime level is provided unless specified in a separate SLA
5. Support
Security Impossible provides support during:
Education-Friendly Support Hours:
8:00am – 6:00pm AEST, Monday to Friday (excluding VIC public holidays)
Support channels:
Email ticketing
Technical troubleshooting
Best-effort response times based on severity
Critical issues will be prioritised, but no legally binding response SLA is provided unless agreed separately.
6. Client Responsibilities
Client agrees to:
Maintain accurate User details
Ensure devices and networks meet technical requirements
Ensure Users behave safely and ethically in the cyber labs
Notify Security Impossible of any security concerns promptly
Not attempt to copy or replicate the Service in any form
Ensure all activities comply with applicable laws
Maintain administrative control of User provisioning and access
7. Data Protection & Privacy
7.1 Ownership
The Client retains ownership of all Client Data.
7.2 Processing
Security Impossible processes Client Data solely for:
Providing the Service
Support, troubleshooting, and performance
Usage analytics (non-PII where possible)
Security monitoring
7.3 Data Storage
Data is stored and processed within Australia, unless otherwise agreed in writing.
7.4 Protection
Security Impossible implements:
Secure hosting
Encryption at rest and in transit (where supported by the cloud provider)
Access controls
Audit logging
Regular patching and updates
7.5 No External Sharing
Security Impossible does not share Client Data with third parties except:
Cloud infrastructure providers
Contracted support vendors (under confidentiality obligations)
Where required by law
8. Intellectual Property
All IP rights in:
The Cyber Range platform
Labs, modules, scenarios
Virtual machines, images, and configurations
Documentation, guides, and assessments
Software, code, and systems
remain exclusively owned by Security Impossible.
Client obtains only a limited licence to access and use them during the Term.
8.1 Custom Content
Where Security Impossible creates custom labs or content for the Client:
Security Impossible retains ownership unless an SOW explicitly transfers IP
Client receives a licence to use the custom content for the duration of its subscription
9. Professional Services
Any request for:
Custom lab development
Additional scenarios
Integration work
Advanced workshops
Extended onboarding or training
will be quoted separately and governed by a Statement of Work (SOW).
10. Fees & Payment
Fees are as stated in the executed Service Agreement
Payment is due within the specified payment period
Failure to pay may result in suspension after notice
No refunds are provided for early termination
Taxes, GST, or levies are the responsibility of the Client
11. Suspension
Security Impossible may suspend access (with notice where possible) for:
Non-payment
Security threats
Misuse or violation of these Terms
Platform integrity risks
Maintenance or updates
Access will be restored once the issue is resolved.
12. Term & Termination
12.1 Term
As defined in the Service Agreement.
12.2 Termination for Breach
Either party may terminate if the other fails to remedy a material breach within 30 days of written notice.
12.3 Termination for Non-Payment
Security Impossible may suspend or terminate access after 7 days’ notice.
12.4 Post-Termination
Upon termination:
Access ends
Data may be exported upon request (within 30 days)
Fees remain payable
13. Liability & Disclaimers
13.1 Liability Cap
To the maximum extent permitted by law, Security Impossible’s total liability is limited to the total fees paid by the Client in the preceding 12 months.
13.2 Exclusions
Security Impossible is not liable for:
Indirect, incidental, special, or consequential losses
Loss of use, data, revenue, or academic outcomes
Actions or misuse by Users
Cloud provider outages or failures
Internet disruptions outside Security Impossible’s control
Unauthorised access resulting from Client negligence
13.3 No Warranties
The Service is provided on an “as-is” and “as-available” basis.
No warranties, express or implied (including merchantability or fitness for purpose), are provided.
14. Governing Law
These Terms are governed by the laws of Victoria, Australia, and subject to the exclusive jurisdiction of its courts.
15. Entire Agreement
These Terms, together with the Cyber Range Service Agreement and any SOWs, constitute the entire agreement between the Parties.
16. Amendments
Security Impossible may update these Terms from time to time.
Material changes will be communicated to the Client.
17. Contact
Security Impossible Pty Ltd
45 Rockley Road, South Yarra, Melbourne VIC 3141
Email: contact@securityimpossible.com
Website: https://securityimpossible.com
1. Information We Collect
1.1 Personal Information
We may collect personal information, such as your name, email address, and other contact details when you voluntarily provide it to us, such as when you register for an account, subscribe to newsletters, or contact us through the website.1.2 Usage Information
We may collect information about your use of the website, including your IP address, browser type, device information, and pages visited. This information helps us analyze trends, administer the site, and improve user experience.
2. How We Use Your Information
We use the collected information for various purposes, including:
Providing and maintaining the website
Communicating with you about your account and our services
Sending newsletters, promotional materials, and other information you request
Analyzing website usage and improving our services
3. Sharing Your Information
We do not sell, trade, or otherwise transfer your personal information to third parties without your consent, except as described in this Privacy Policy. We may share information with trusted third-party service providers who assist us in operating our website or conducting our business.
4. Cookies and Similar Technologies
We use cookies and similar technologies to enhance your experience on our website. You can control cookies through your browser settings, but disabling them may affect your ability to use certain features of the site.
5. Your Choices
You can manage your communication preferences by unsubscribing from newsletters or adjusting your account settings. You may also contact us to update or delete your personal information.
6. Security
We take reasonable measures to protect the security of your personal information. However, no method of transmission over the internet or electronic storage is completely secure. Therefore, we cannot guarantee absolute security.
7. Children's Privacy
Our website is not directed to individuals under the age of 18. If you become aware that a child has provided us with personal information, please contact us, and we will take steps to remove such information.
8. Changes to This Privacy Policy
We may update this Privacy Policy periodically. We will notify you of any changes by posting the new Privacy Policy on this page. Your continued use of the website after such modifications will constitute your acknowledgment of the modified Privacy Policy.
9. Contact Us
If you have any questions about this Privacy Policy, please contact us at landerx@email.com
