Legal Agreements
Explore the legal terms and agreements that govern the use of Actualize by Zero Sum Defense, supporting transparency and trust in our services.
ZSD Platform Authorizations Terms
Last updated: April 23, 2025
These Authorizations Terms ("Agreement") govern the access permissions and delegated authority features provided by Zero Sum Defense, Inc. ("ZSD," "we," "us," or "our") through the ZSD Platform ("Platform"). These Terms are incorporated by reference into the ZSD Services Agreement.
BY USING AUTHORIZATION FEATURES WITHIN THE ZSD PLATFORM, YOU AGREE TO BE BOUND BY THE TERMS OF THIS AGREEMENT. IF YOU DO NOT AGREE TO THESE TERMS, DO NOT USE THE AUTHORIZATION FEATURES OF THE ZSD PLATFORM.
Agreement Terms
1.1 "Authorization" means the permission granted by a User to allow access to specific features, data, or functionalities within the Platform.
1.2 "Authorizing User" means the User who grants an Authorization to another User or to an External System.
1.3 "Authorized User" means the User who receives an Authorization from an Authorizing User.
1.4 "External System" means any third-party application, service, or platform that connects with the Platform through APIs or other integration methods.
1.5 "Access Token" means a digital credential that allows an Authorized User or External System to access specific resources within the Platform.
1.6 "Permission Scope" means the specific resources, actions, or data that an Authorization allows access to.
1.7 "Platform" means the Actualize software and services provided by ZSD.
1.8 "Secure Enclave" means an isolated computing environment provided as part of the Services for secure data storage and processing. Find more information here.
2.1 User-to-User Authorizations. These allow one User to grant specific access permissions to another User within the Platform. These may include:
a. Access to view specific Secure Enclaves or data containers;
b. Permission to perform specific actions on behalf of the Authorizing User;
c. Temporary emergency access in predefined circumstances;
d. Delegation of administrative rights for team or organizational accounts.
2.2 User-to-System Authorizations. These allow a User to grant access to External Systems. These may include:
a. API access to specific resources within the Platform;
b. Integration with third-party security tools or services;
c. Automated workflows or scheduled operations;
d. Read-only analytics or monitoring capabilities.
2.3 Time-Limited Authorizations. These are temporary Authorizations that automatically expire after a specified period or trigger event.
2.4 Conditional Authorizations. These are Authorizations that require additional verification or conditions to be met before access is granted.
3.1 Authority to Grant. You may only grant Authorizations for resources that you own or have administrative control over. Organization administrators may have additional capabilities to manage Authorizations across the organization.
3.2 Permission Scopes. When granting an Authorization, you must specify the Permission Scope. The Platform will guide you through available Permission Scopes based on the context and your access level.
3.3 Duration. You may specify a duration for each Authorization, after which it will automatically expire. If no duration is specified, the Authorization will remain active until explicitly revoked.
3.4 Verification. Certain high-security Authorizations may require additional verification steps, such as multi-factor authentication or approval from multiple administrators.
3.5 Notification. When you grant an Authorization, the Platform will notify:
a. The Authorized User or system administrator of the External System;
b. Any other users who may be affected by the Authorization;
c. Relevant administrators as required by your organization's policies.
4.1 Viewing Active Authorizations. You can view all Authorizations you have granted or received through the Authorization Management section of the Platform.
4.2 Modifying Authorizations. You may modify the Permission Scope, duration, or other parameters of an Authorization at any time, provided you are the Authorizing User or have administrative rights.
4.3 Revoking Authorizations. You may revoke any Authorization you have granted at any time. Revocation takes effect immediately and cannot be undone. To reinstate access, a new Authorization must be created.
4.4 Automatic Revocation. Authorizations may be automatically revoked under certain circumstances, including:
a. Expiration of the specified duration;
b. Detection of suspicious activity or security risks;
c. Account status changes (e.g., deactivation, suspension);
d. Changes to organizational policies or access controls.
4.5 Authorization Logs. The Platform maintains detailed logs of all Authorization activities, including creation, modification, use, and revocation. These logs are available to appropriate administrators and may be used for security, audit, and compliance purposes.
5.1 Access Token Security. Access Tokens used for Authorizations are:
a. Encrypted both in transit and at rest;
b. Generated with strong cryptographic methods;
c. Automatically rotated according to security best practices;
d. Never exposed in plaintext to users or in logs.
5.2 Activity Monitoring. The Platform monitors Authorization usage for suspicious activities, including:
a. Access patterns inconsistent with normal usage;
b. Access from unusual locations or devices;
c. Excessive data retrieval or modification;
d. Attempts to access resources beyond the Permission Scope.
5.3 Anomaly Detection. The Platform employs automated anomaly detection to identify potential security risks related to Authorizations. When anomalies are detected, the Platform may:
a. Temporarily suspend the Authorization;
b. Require additional verification from the Authorizing User;
c. Alert relevant administrators;
d. Apply additional security controls.
6.1 Authorizing Users. If you are an Authorizing User, you are responsible for:
a. Ensuring Authorizations are granted only to trusted Users or External Systems;
b. Configuring appropriate Permission Scopes that follow the principle of least privilege;
c. Regularly reviewing and auditing active Authorizations;
d. Promptly revoking Authorizations that are no longer needed;
e. Responding to security alerts related to your Authorizations.
6.2 Authorized Users. If you are an Authorized User, you are responsible for:
a. Using Authorizations only for their intended purpose;
b. Maintaining the security of your account to prevent unauthorized access;
c. Not attempting to access resources beyond the Permission Scope;
d. Reporting any issues or anomalies with granted Authorizations;
e. Complying with all security policies applicable to the resources you access.
6.3 External Systems. If you integrate an External System with the Platform, you are responsible for:
a. Ensuring the External System maintains appropriate security controls;
b. Promptly applying security updates to the External System;
c. Monitoring the External System for unauthorized access or unusual behavior;
d. Implementing secure storage of Access Tokens within the External System;
e. Complying with all terms of the Connected Account Agreement.
7.1 Regulatory Compliance. The Authorization features of the Platform are designed to support compliance with various regulatory frameworks, including but not limited to:
a. GDPR (General Data Protection Regulation);
b. HIPAA (Health Insurance Portability and Accountability Act);
c. SOC 2 (Service Organization Control 2);
d. PCI DSS (Payment Card Industry Data Security Standard).
7.2 Audit Trails. The Platform maintains comprehensive audit trails for all Authorization activities. These audit trails include:
a. Identity of the Authorizing User;
b. Identity of the Authorized User or External System;
c. Date and time of the Authorization grant, modification, use, or revocation;
d. The specific Permission Scope granted;
e. Any conditions or restrictions applied to the Authorization.
7.3 Compliance Reporting. Organization administrators can generate compliance reports related to Authorizations. These reports may be used for internal audits, regulatory compliance, or security assessments.
7.4 Data Access Controls. The Platform implements data access controls based on the principle of least privilege and need-to-know. Authorizations are designed to enforce these controls.
8.1 Security Limitations. While ZSD implements strong security measures for Authorization features, no security system is impenetrable. ZSD cannot guarantee that unauthorized access will never occur despite these measures.
8.2 User Responsibility. The security of Authorizations depends in part on users following security best practices and promptly reporting suspicious activities. ZSD is not responsible for security breaches resulting from user negligence or misconduct.
8.3 External Systems. ZSD has limited control over the security of External Systems that connect to the Platform. The security of such connections depends on the security measures implemented by the External System providers.
8.4 Disclaimer of Warranties. THE AUTHORIZATION FEATURES ARE PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. ZSD DISCLAIMS ALL WARRANTIES, WHETHER EXPRESS, IMPLIED, OR STATUTORY, INCLUDING WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT.
8.5 Limitation of Liability. ZSD’S LIABILITY FOR ANY CLAIMS ARISING FROM OR RELATED TO AUTHORIZATIONS SHALL BE LIMITED AS SET FORTH IN THE ZSD SERVICES AGREEMENT.
9.1 Updates. ZSD may update these Terms from time to time. We will provide notice of material changes by posting the updated Terms on our website and notifying you via email or through the Platform.
9.2 Continued Use. Your continued use of Authorization features after changes to these Terms constitutes acceptance of the updated terms.
9.3 Feature Changes. ZSD may modify, add, or remove Authorization features at any time. Such changes will be communicated through the Platform or via email.
If you have any questions or concerns about these Authorization Terms, please contact us at:
Zero Sum Defense, Inc.
Email: legal@zerosumdefense.co
Address: 7455 France Ave S, #277, Minneapolis, MN 55435
BY USING AUTHORIZATION FEATURES WITHIN THE ZSD PLATFORM, YOU ACKNOWLEDGE THAT YOU HAVE READ THIS AGREEMENT, UNDERSTAND IT, AND AGREE TO BE BOUND BY ITS TERMS AND CONDITIONS. IF YOU DO NOT AGREE TO THESE TERMS, DO NOT USE THE AUTHORIZATION FEATURES OF THE ZSD PLATFORM.
Explore Related Legal Information
By using Authorization features within the ZSD Platform, you acknowledge that you have read, understood, and agree to be bound by the terms of this Agreement.
Last updated: April 23, 2025