Effective Date: November 22, 2025
These Terms of Service ("Terms") govern your use of Blackhawk Security's penetration testing services.
By engaging our services, you agree to be bound by these Terms.
1. Services Provided
Blackhawk Security provides professional penetration testing services including:
- Web application security assessments
- Network infrastructure penetration testing
- API security testing
- Security vulnerability assessments
- Detailed reporting and remediation guidance
2. Authorization and Scope
Critical Requirement
You must have explicit authorization to conduct security testing on all systems within the agreed scope.
Testing unauthorized systems is illegal and strictly prohibited.
Before testing begins, you must:
- Provide written authorization for all systems to be tested
- Define clear boundaries and excluded systems
- Specify testing windows and blackout periods
- Identify critical systems requiring special care
- Provide emergency contacts
3. Testing Methodology
Our testing approach includes:
Reconnaissance
Information gathering and attack surface mapping
Vulnerability Discovery
Automated and manual testing techniques
Exploitation
Controlled validation of discovered vulnerabilities
Reporting
Comprehensive documentation and remediation guidance
4. Client Responsibilities
As our client, you agree to:
- Provide accurate system information and documentation
- Ensure proper backups before testing begins
- Notify relevant stakeholders of testing activities
- Provide timely access to systems and personnel
- Review and approve testing scope and methodology
- Maintain confidentiality of discovered vulnerabilities
5. Limitations and Disclaimers
While we employ industry best practices and experienced professionals:
- No penetration test can guarantee discovery of all vulnerabilities
- Testing may cause temporary system disruptions despite precautions
- We are not responsible for pre-existing system issues
- Results reflect security posture at time of testing only
Important Note
Penetration testing is inherently risky. While we take all reasonable precautions,
some level of disruption may occur. Critical systems should be tested with extra care.
6. Confidentiality
Both parties agree to maintain strict confidentiality regarding:
- All discovered vulnerabilities and security issues
- Testing methodologies and techniques
- System architectures and configurations
- Business processes and sensitive data
- Report contents and recommendations
7. Payment Terms
Payment terms are as follows:
- 50% deposit required before testing begins
- Remaining balance due upon report delivery
- Payment terms: Net 30 days
- Late payments subject to 1.5% monthly interest
8. Liability
Our liability is limited to the total amount paid for services. We are not liable for:
- Indirect, incidental, or consequential damages
- Lost profits or business interruption
- Data loss (ensure proper backups)
- Third-party claims
9. Termination
Either party may terminate services with written notice. Upon termination:
- All testing activities will cease immediately
- Payment for completed work remains due
- Confidentiality obligations continue
- Partial reports may be provided for work completed
10. Governing Law
These Terms are governed by the laws of [Your Jurisdiction]. Any disputes shall be resolved through
binding arbitration or in courts of [Your Jurisdiction].