Legal
Terms and Services
These terms summarize acceptable platform usage, responsibilities, and service boundaries for Aegis users. Review with your legal team before production rollout.
Account and Access
Users are responsible for safeguarding account credentials and maintaining authorized access controls.
- Do not share privileged accounts without explicit policy approval.
- Use strong authentication factors where supported.
- Report suspected account compromise immediately.
Acceptable Use
The service must not be used for unlawful access, harmful automation, or misuse of protected data.
- No abuse of APIs, platform controls, or security features.
- No attempts to bypass configured permissions.
- No unauthorized credential scraping or exfiltration.
Service Availability
We continuously improve platform reliability, but uptime and feature delivery may vary by environment or plan.
Data Ownership and Key Responsibility
Aegis is designed so users control master key material for vault decryption. Platform services process encrypted payloads and policy metadata but are not intended to recover plaintext credential contents without user-controlled key context.
- Protect and recover your master key according to your internal security policy.
- Do not rely on platform operators to retrieve lost plaintext vault data.
- Configure recovery controls and backup procedures before production rollout.
Updates and Changes
Terms may be revised to reflect product, legal, or security updates. Material changes are communicated through product channels.