← Back to home

Terms of Service & End User License Agreement

By creating an account or using Slater Security, you agree to these Terms of Service and End User License Agreement ("Terms"). Please read them carefully.

1. What Slater Security Does

Slater Security is a consumer cybersecurity platform that protects your home network, financial accounts, identity, and communications. We offer five services ("pillars"):

Our platform correlates threat signals across these pillars to detect coordinated attacks (for example: a dark web breach plus a phishing SMS plus an unusual bank transaction within a short window).

2. Your Acceptance

By clicking "I Accept" or by using any Slater Security service, you confirm that you are at least 18 years old, have the authority to agree, have read and understood these Terms, and consent to the collection, use, and disclosure of your information as described here and in our Privacy Policy. You must accept these Terms before connecting any service.

3. Data We Collect and How We Use It

3.1 Data by Service

Home Network Defense — We collect device identifiers, connection patterns, traffic metadata, and threat indicators. We do not record full internet content.

Fraud Watch — Via Plaid, we receive account balances, transaction amounts, merchant names, dates. Plaid's terms apply to their handling of your data.

Identity Shield — We receive profile information, identifiers, and breach/monitoring data from our providers.

Email Security — Read-only inbox access. We scan headers, body, links for phishing. We do not sell your email content.

Phishing Inspector — Full content of forwarded SMS/email. We analyze for phishing and may correlate with other signals.

3.2 Threat Correlation

Our engine links signals across your connected services. Opting out of a service may reduce correlation effectiveness.

3.3 Third-Party Processors

We use Plaid, Google, Microsoft, Twilio, and cloud providers. They process your data under their own terms.

4. Consent for Each Service

Each pillar requires separate consent. Your connection constitutes consent. You may revoke and disconnect any service at any time.

5. Retention and Storage

We retain data as necessary for services and legal obligations. Some data may be retained longer for security purposes.

6. Security

We use encryption and access controls. No system is completely secure; you use our services at your own risk.

7. Your Rights

You have the right to access, correct, delete, export your data, and opt out. Contact privacy@slatersecurity.com.

8. Account Termination

You may close your account at any time. We may suspend or terminate for violation of these Terms.

9. Disclaimer of Warranties

Services are provided "as is." We do not warrant uninterrupted or error-free operation.

10. Limitation of Liability

To the maximum extent permitted by law, our liability shall not exceed the amount you paid in the twelve months preceding the claim.

11. Changes

We may update these Terms. Material changes will be communicated. Continued use constitutes acceptance.

12. Contact

Email: legal@slatersecurity.com · Address: [Slater Security, LLC — ADDRESS]

13. Governing Law

These Terms are governed by the laws of [STATE/COUNTRY].