Privacy Policy

CYBER RANGE SAAS TERMS & CONDITIONS

Last updated on 23 Jan 2025

Last updated on 26 Nov 2025

Welcome to Landerx ("we" or "us"). This Privacy Policy is designed to help you understand how we collect, use, disclose, and safeguard your personal information when you use our website and related services.


1. Information We Collect

2. How We Use Your Information

3. Sharing Your Information

4. Cookies and Similar Technologies

5. Your Choices

6. Security

7. Children's Privacy

8. Changes to This Privacy Policy

9. Contact Us


SECURITY IMPOSSIBLE PTY LTD

 

CYBER RANGE SAAS TERMS & CONDITIONS

 

Version 1.0

 

Effective Date: [Insert Date]

 

These Terms & Conditions (“Terms”) govern the use of the Cyber Range SaaS platform (“Service”) provided by Security Impossible Pty Ltd, ABN [insert if desired], 45 Rockley Road, South Yarra, Melbourne VIC 3141 (“Security Impossible”, “we”, “us”, “our”) to the customer (“Client”, “you”, “your”).

 

By accessing or using the Service, the Client agrees to be bound by these Terms.

 

If there is a separate signed Cyber Range Service Agreement, that document prevails where there is any inconsistency. Otherwise, these Terms form the complete governing framework for access and use of the Service.


1. Definitions

 

“Service”

The hosted Cyber Range SaaS platform, virtual machines, labs, courses, modules, simulations, portals, dashboards, and associated materials provided by Security Impossible.

 

“Client Data”

All data, information, records, student details, or materials supplied by the Client or its Users.

 

“Users”

Individuals authorised by the Client to access the Service, including students, instructors, and administrators.

 

“Content”

All modules, labs, virtual machines, scenarios, exercises, instructional materials, and assessments created or supplied by Security Impossible.

 

“Professional Services”

Any custom content development, integrations, consulting, or training services provided separately.

 

“Cloud Provider”

Third-party providers (e.g., Microsoft Azure) hosting the platform, infrastructure, or components.


2. Grant of Licence

 

Security Impossible grants the Client a non-exclusive, non-transferable, time-limited licence to access and use the Service for educational, training, and instructional purposes during the Term.

 

The Client may:

  • Allow authorised Users to access the Service

  • Use, deliver, and review course content for educational purposes

  • Access reporting and management dashboards

 

The Client may not:

  • Resell, redistribute, sublicense, or commercially exploit the Service

  • Grant access to individuals outside the authorised User list

  • Use the Service to host or deliver content unrelated to the Cyber Range environment unless explicitly permitted


3. Acceptable Use

 

To protect the integrity of the Service and Security Impossible’s IP, the Client agrees that Users will not:

  1. Reverse engineer the platform, labs, simulations, or content

  2. Copy, clone, replicate, download, or export any virtual machine, scenario, image, or software

  3. Conduct penetration testing, security scanning, automated probing, or exploit testing against the platform

  4. Perform malicious or unauthorised cyber activities

  5. Share login credentials or allow credential pooling

  6. Remove, obscure, or modify branding, disclaimers, or copyright notices

  7. Circumvent security controls, rate limits, or environment boundaries

 

Security Impossible may temporarily suspend access if the Client or Users cause:

  • Threats to system stability

  • Misuse or abuse

  • Excessive load

  • Security risk

 

Access will be restored upon resolution.


4. Availability & Performance

 

Security Impossible will use reasonable efforts to ensure continuous availability of the Service.

 

The Client acknowledges:

  • The Service relies on cloud providers that maintain ISO 27001 and SOC 2 certifications

  • There may be planned maintenance windows (announced in advance where possible)

  • Occasional unplanned outages may occur beyond Security Impossible’s control

  • No guaranteed uptime level is provided unless specified in a separate SLA


5. Support

 

Security Impossible provides support during:

 

Education-Friendly Support Hours:

8:00am – 6:00pm AEST, Monday to Friday (excluding VIC public holidays)

 

Support channels:

  • Email ticketing

  • Technical troubleshooting

  • Best-effort response times based on severity

 

Critical issues will be prioritised, but no legally binding response SLA is provided unless agreed separately.


6. Client Responsibilities

 

Client agrees to:

  • Maintain accurate User details

  • Ensure devices and networks meet technical requirements

  • Ensure Users behave safely and ethically in the cyber labs

  • Notify Security Impossible of any security concerns promptly

  • Not attempt to copy or replicate the Service in any form

  • Ensure all activities comply with applicable laws

  • Maintain administrative control of User provisioning and access


7. Data Protection & Privacy

 

7.1 Ownership

 

The Client retains ownership of all Client Data.

 

7.2 Processing

 

Security Impossible processes Client Data solely for:

  • Providing the Service

  • Support, troubleshooting, and performance

  • Usage analytics (non-PII where possible)

  • Security monitoring

 

7.3 Data Storage

 

Data is stored and processed within Australia, unless otherwise agreed in writing.

 

7.4 Protection

 

Security Impossible implements:

  • Secure hosting

  • Encryption at rest and in transit (where supported by the cloud provider)

  • Access controls

  • Audit logging

  • Regular patching and updates

 

7.5 No External Sharing

 

Security Impossible does not share Client Data with third parties except:

  • Cloud infrastructure providers

  • Contracted support vendors (under confidentiality obligations)

  • Where required by law


8. Intellectual Property

 

All IP rights in:

  • The Cyber Range platform

  • Labs, modules, scenarios

  • Virtual machines, images, and configurations

  • Documentation, guides, and assessments

  • Software, code, and systems

remain exclusively owned by Security Impossible.

 

Client obtains only a limited licence to access and use them during the Term.

 

8.1 Custom Content

 

Where Security Impossible creates custom labs or content for the Client:

  • Security Impossible retains ownership unless an SOW explicitly transfers IP

  • Client receives a licence to use the custom content for the duration of its subscription


9. Professional Services

 

Any request for:

  • Custom lab development

  • Additional scenarios

  • Integration work

  • Advanced workshops

  • Extended onboarding or training

 

will be quoted separately and governed by a Statement of Work (SOW).


10. Fees & Payment

  • Fees are as stated in the executed Service Agreement

  • Payment is due within the specified payment period

  • Failure to pay may result in suspension after notice

  • No refunds are provided for early termination

  • Taxes, GST, or levies are the responsibility of the Client


11. Suspension

 

Security Impossible may suspend access (with notice where possible) for:

  • Non-payment

  • Security threats

  • Misuse or violation of these Terms

  • Platform integrity risks

  • Maintenance or updates

 

Access will be restored once the issue is resolved.


12. Term & Termination

 

12.1 Term

 

As defined in the Service Agreement.

 

12.2 Termination for Breach

 

Either party may terminate if the other fails to remedy a material breach within 30 days of written notice.

 

12.3 Termination for Non-Payment

 

Security Impossible may suspend or terminate access after 7 days’ notice.

 

12.4 Post-Termination

 

Upon termination:

  • Access ends

  • Data may be exported upon request (within 30 days)

  • Fees remain payable


13. Liability & Disclaimers

 

13.1 Liability Cap

 

To the maximum extent permitted by law, Security Impossible’s total liability is limited to the total fees paid by the Client in the preceding 12 months.

 

13.2 Exclusions

 

Security Impossible is not liable for:

  • Indirect, incidental, special, or consequential losses

  • Loss of use, data, revenue, or academic outcomes

  • Actions or misuse by Users

  • Cloud provider outages or failures

  • Internet disruptions outside Security Impossible’s control

  • Unauthorised access resulting from Client negligence

 

13.3 No Warranties

 

The Service is provided on an “as-is” and “as-available” basis.

No warranties, express or implied (including merchantability or fitness for purpose), are provided.


14. Governing Law

 

These Terms are governed by the laws of Victoria, Australia, and subject to the exclusive jurisdiction of its courts.


15. Entire Agreement

 

These Terms, together with the Cyber Range Service Agreement and any SOWs, constitute the entire agreement between the Parties.


16. Amendments

 

Security Impossible may update these Terms from time to time.

Material changes will be communicated to the Client.


17. Contact

 

Security Impossible Pty Ltd

45 Rockley Road, South Yarra, Melbourne VIC 3141

Email: contact@securityimpossible.com

Website: https://securityimpossible.com

 

1. Information We Collect

  • 1.1 Personal Information

    We may collect personal information, such as your name, email address, and other contact details when you voluntarily provide it to us, such as when you register for an account, subscribe to newsletters, or contact us through the website.

  • 1.2 Usage Information

    We may collect information about your use of the website, including your IP address, browser type, device information, and pages visited. This information helps us analyze trends, administer the site, and improve user experience.

2. How We Use Your Information

We use the collected information for various purposes, including:

  • Providing and maintaining the website

  • Communicating with you about your account and our services

  • Sending newsletters, promotional materials, and other information you request

  • Analyzing website usage and improving our services

3. Sharing Your Information

We do not sell, trade, or otherwise transfer your personal information to third parties without your consent, except as described in this Privacy Policy. We may share information with trusted third-party service providers who assist us in operating our website or conducting our business.

4. Cookies and Similar Technologies

We use cookies and similar technologies to enhance your experience on our website. You can control cookies through your browser settings, but disabling them may affect your ability to use certain features of the site.

5. Your Choices

You can manage your communication preferences by unsubscribing from newsletters or adjusting your account settings. You may also contact us to update or delete your personal information.

6. Security

We take reasonable measures to protect the security of your personal information. However, no method of transmission over the internet or electronic storage is completely secure. Therefore, we cannot guarantee absolute security.

7. Children's Privacy

Our website is not directed to individuals under the age of 18. If you become aware that a child has provided us with personal information, please contact us, and we will take steps to remove such information.

8. Changes to This Privacy Policy

We may update this Privacy Policy periodically. We will notify you of any changes by posting the new Privacy Policy on this page. Your continued use of the website after such modifications will constitute your acknowledgment of the modified Privacy Policy.

9. Contact Us

If you have any questions about this Privacy Policy, please contact us at landerx@email.com

© 2025 — Copyright

© 2025 — Copyright

© 2025 — Copyright