Terms of Service & End User License Agreement
By creating an account or using Slater Security, you agree to these Terms of Service and End User License Agreement ("Terms"). Please read them carefully.
1. What Slater Security Does
Slater Security is a consumer cybersecurity platform that protects your home network, financial accounts, identity, and communications. We offer five services ("pillars"):
- Home Network Defense — Hardware appliance, cloud firewall, and device monitoring
- Fraud Watch — Real-time bank transaction anomaly detection
- Identity Shield — Social media impersonation detection and dark web monitoring
- Email Security — Phishing detection for Gmail and Outlook
- Phishing Inspector — On-demand message and URL analysis via SMS and email forwarding
Our platform correlates threat signals across these pillars to detect coordinated attacks (for example: a dark web breach plus a phishing SMS plus an unusual bank transaction within a short window).
2. Your Acceptance
By clicking "I Accept" or by using any Slater Security service, you confirm that you are at least 18 years old, have the authority to agree, have read and understood these Terms, and consent to the collection, use, and disclosure of your information as described here and in our Privacy Policy. You must accept these Terms before connecting any service.
3. Data We Collect and How We Use It
3.1 Data by Service
Home Network Defense — We collect device identifiers, connection patterns, traffic metadata, and threat indicators. We do not record full internet content.
Fraud Watch — Via Plaid, we receive account balances, transaction amounts, merchant names, dates. Plaid's terms apply to their handling of your data.
Identity Shield — We receive profile information, identifiers, and breach/monitoring data from our providers.
Email Security — Read-only inbox access. We scan headers, body, links for phishing. We do not sell your email content.
Phishing Inspector — Full content of forwarded SMS/email. We analyze for phishing and may correlate with other signals.
3.2 Threat Correlation
Our engine links signals across your connected services. Opting out of a service may reduce correlation effectiveness.
3.3 Third-Party Processors
We use Plaid, Google, Microsoft, Twilio, and cloud providers. They process your data under their own terms.
4. Consent for Each Service
Each pillar requires separate consent. Your connection constitutes consent. You may revoke and disconnect any service at any time.
5. Retention and Storage
We retain data as necessary for services and legal obligations. Some data may be retained longer for security purposes.
6. Security
We use encryption and access controls. No system is completely secure; you use our services at your own risk.
7. Your Rights
You have the right to access, correct, delete, export your data, and opt out. Contact privacy@slatersecurity.com.
8. Account Termination
You may close your account at any time. We may suspend or terminate for violation of these Terms.
9. Disclaimer of Warranties
Services are provided "as is." We do not warrant uninterrupted or error-free operation.
10. Limitation of Liability
To the maximum extent permitted by law, our liability shall not exceed the amount you paid in the twelve months preceding the claim.
11. Changes
We may update these Terms. Material changes will be communicated. Continued use constitutes acceptance.
12. Contact
Email: legal@slatersecurity.com · Address: [Slater Security, LLC — ADDRESS]
13. Governing Law
These Terms are governed by the laws of [STATE/COUNTRY].