Terms of Service & Privacy Policy
Table of Contents
Terms of Service
1. Agreement to Terms
By accessing the website at https://aimarketingflow.com or using any resources, tools, guides, or services provided by AIMF Security (formerly AIMF LLC) ("we," "us," or "our"), you agree to be bound by these Terms of Service ("Terms").
If you do not agree with these Terms, do not use the website or any of our resources.
Effective Date: January 18, 2026
2. Services Provided
AIMF Security provides:
2.1 Free Cybersecurity Resources
- Device security checklists (iPhone, Android, Windows, Mac)
- Open-source security tools on GitHub
- Threat detection case studies
- Security research and documentation
- Educational blog content
2.2 Consulting Services (Future)
- Cybersecurity consulting for small businesses
- Threat assessment and mitigation strategies
- Device hardening and security audits
2.3 Community Resources
- Free workshops and webinars
- Security awareness training materials
- Threat intelligence sharing
3. Free Resources & Open Source
3.1 No Cost, No Warranty
All resources, tools, and guides are provided free of charge. While we strive for accuracy and effectiveness, we provide no warranties or guarantees regarding the completeness, reliability, or suitability of any resource.
3.2 Open Source Tools
Our open-source tools are provided under their respective licenses (MIT, GPL, etc.) as specified in each repository. Use of open-source components is governed by their individual licenses.
3.3 Attribution
You may use, share, and adapt our resources with proper attribution to AIMF Security.
4. User Accounts
4.1 Registration (Future Feature)
When account features become available, you agree to:
- Provide accurate and complete information
- Maintain the security of your account credentials
- Notify us immediately of any unauthorized access
4.2 Account Security
You are responsible for all activities that occur under your account.
4.3 Account Termination
We reserve the right to suspend or terminate accounts that violate these Terms.
5. Acceptable Use Policy
You agree NOT to:
- Use our resources for illegal or malicious purposes
- Attempt to hack, disrupt, or compromise our website or services
- Redistribute our resources for commercial gain without permission
- Remove attribution or copyright notices from our materials
- Use our tools to harm others or violate their privacy
- Misrepresent our research, findings, or recommendations
6. Intellectual Property
6.1 Ownership
All content, tools, guides, case studies, and materials created by AIMF Security remain our intellectual property unless explicitly licensed under open-source terms.
6.2 Trademarks
"AIMF Security," "AI Marketing Flow," and associated logos are trademarks of AIMF LLC. Unauthorized use is prohibited.
6.3 User Contributions
If you submit feedback, suggestions, or contributions, you grant us a non-exclusive, worldwide, royalty-free license to use, modify, and incorporate them into our resources.
7. Disclaimers
7.1 Resources Provided "As Is"
THE WEBSITE, TOOLS, GUIDES, AND RESOURCES ARE PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. WE DISCLAIM ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, NON-INFRINGEMENT, OR AVAILABILITY.
7.2 No Security Guarantees
While our resources are battle-tested against real-world threats, we cannot guarantee:
- That all threats will be detected or prevented
- That our recommendations will work in all environments
- That your devices or data will remain 100% secure
- That threat actors will not find new attack vectors
7.3 Educational Purpose
Our resources are provided for educational and informational purposes. You are responsible for implementing security measures appropriate to your specific situation.
7.4 Third-Party Tools
We are not responsible for third-party tools, services, or software recommended in our guides.
7.5 Security Guides Disclaimer
Our security guides, checklists, and recommendations are based on personal experience defending against real-world threats, including 365 days of active defense against nation-state actors (Russian APT28). While these guides document technologies and techniques that assisted in our specific situation, we make the following important disclaimers:
- Every cybersecurity incident is unique: What worked in our situation may not work identically in yours. Threat actors, attack vectors, device configurations, and environmental factors vary significantly.
- No guarantee of effectiveness: We cannot guarantee that following our guides will prevent all attacks or detect all threats in your specific situation.
- Personal experience, not professional certification: Our guides are based on lived experience and self-taught expertise, not formal cybersecurity certifications or corporate security protocols.
- Technology evolves rapidly: Security vulnerabilities, attack methods, and defensive tools change constantly. Guides are current as of their publication date but may become outdated.
- Known technologies only: We document technologies and tools that we have personally tested and found effective. We cannot vouch for tools or techniques we have not used.
- Your responsibility to assess: You are responsible for evaluating whether our recommendations are appropriate for your specific threat model, technical environment, and risk tolerance.
- Consult professionals when needed: For high-risk situations, enterprise environments, or legal matters, consult certified cybersecurity professionals and legal counsel.
Use at your own risk: By following our guides, you acknowledge that you are implementing security measures based on our personal experience and that results may vary. We are not liable for any outcomes, whether positive or negative, resulting from your use of our recommendations.
8. Limitation of Liability
8.1 Maximum Liability
TO THE FULLEST EXTENT PERMITTED BY LAW, AIMF SECURITY SHALL NOT BE LIABLE FOR ANY INDIRECT, INCIDENTAL, SPECIAL, CONSEQUENTIAL, OR PUNITIVE DAMAGES ARISING FROM YOUR USE OF OUR RESOURCES.
8.2 No Consequential Damages
We are not liable for:
- Data loss or corruption
- Security breaches or attacks
- Business interruption or lost profits
- Damages resulting from reliance on our resources
8.3 Jurisdictional Limitations
Some jurisdictions do not allow limitation of liability for consequential damages, so the above limitations may not apply to you.
9. Indemnification
You agree to indemnify, defend, and hold harmless AIMF Security, its officers, directors, employees, and agents from any claims, damages, losses, liabilities, and expenses (including legal fees) arising from:
- Your use of our resources
- Your violation of these Terms
- Your violation of any third-party rights
- Your misuse of our tools or recommendations
10. Termination
10.1 By You
You may stop using our resources at any time.
10.2 By Us
We reserve the right to:
- Discontinue any resource or service at any time
- Block access to users who violate these Terms
- Modify or remove content without notice
10.3 Effect of Termination
Upon termination, you must cease all use of our resources and delete any downloaded materials.
11. Changes to Terms
11.1 Right to Modify
We reserve the right to modify these Terms at any time. Changes will be posted on this page with an updated "Last Updated" date.
11.2 Continued Use = Acceptance
Your continued use of our resources after changes constitutes acceptance of the modified Terms.
12. Governing Law
12.1 Governing Law
These Terms are governed by the laws of the State of California, United States, without regard to conflict of law principles.
12.2 Dispute Resolution
Any disputes arising from these Terms shall be resolved through binding arbitration in San Diego County, California.
12.3 Class Action Waiver
You agree to resolve disputes individually and waive any right to participate in class action lawsuits.
13. Contact Information
For questions about these Terms, contact:
AIMF Security
Email: [email protected]
Website: https://aimarketingflow.com
14. Information We Collect
14.1 Information You Provide
- Email address (for newsletter subscriptions, future account features)
- Name and contact information (for consulting inquiries)
- Feedback and survey responses
14.2 Automatically Collected Information
- IP address and browser type
- Pages visited and time spent on site
- Referring website and search terms
- Device type and operating system
14.3 Information We Do NOT Collect
- We do not collect sensitive personal information
- We do not track your activity across other websites
- We do not sell your personal information to third parties
15. How We Use Your Information
15.1 To Provide Services
- Deliver requested resources and tools
- Respond to inquiries and support requests
- Send newsletters and updates (with your consent)
15.2 To Improve Our Services
- Analyze website usage and performance
- Understand which resources are most helpful
- Identify and fix technical issues
15.3 To Communicate
- Send important updates about our services
- Notify you of security vulnerabilities or threats
- Share educational content and research findings
15.4 Legal Compliance
- Comply with legal obligations
- Protect our rights and property
- Prevent fraud or abuse
16. Data Storage & Security
16.1 Local-First Approach
Our open-source tools are designed to store data locally on your device. We do not access, collect, or store data from tools you run locally.
16.2 Website Data
Website analytics and contact information are stored securely using industry-standard practices:
- Encrypted data transmission (HTTPS)
- Secure hosting infrastructure
- Regular security audits
16.3 Data Retention
- Newsletter subscriptions: Until you unsubscribe
- Contact inquiries: 2 years
- Website analytics: 26 months (Google Analytics default)
16.4 No Cloud Storage of User Data
Unless explicitly stated, we do not use cloud storage for user-generated data. Your security tools and configurations remain on your device.
17. Third-Party Services
17.1 Analytics
We use Google Analytics to understand website usage. Google Analytics may use cookies and collect data as described in Google's Privacy Policy.
17.2 Hosting
Our website is hosted on secure servers. Hosting providers may have access to server logs but are bound by confidentiality agreements.
17.3 Email Services
Newsletter emails are sent via third-party email services (e.g., Mailchimp, ConvertKit) governed by their privacy policies.
17.4 GitHub
Our open-source tools are hosted on GitHub. Use of GitHub is governed by GitHub's Privacy Policy.
18. Your Privacy Rights
18.1 Access and Correction
You have the right to:
- Access your personal information
- Correct inaccurate information
- Request deletion of your data
18.2 Opt-Out
You may:
- Unsubscribe from newsletters at any time
- Disable cookies in your browser
- Request removal from our contact lists
18.3 California Privacy Rights (CCPA)
California residents have additional rights under the California Consumer Privacy Act:
- Right to know what personal information is collected
- Right to delete personal information
- Right to opt-out of data sales (we do not sell data)
18.4 GDPR Rights (EU Residents)
EU residents have rights under the General Data Protection Regulation:
- Right to access, rectify, and erase data
- Right to data portability
- Right to object to processing
19. Cookies & Tracking
19.1 Cookies We Use
- Essential cookies: Required for website functionality
- Analytics cookies: Google Analytics for usage statistics
- Preference cookies: Remember your settings
19.2 Cookie Control
You can control cookies through your browser settings. Disabling cookies may affect website functionality.
19.3 Do Not Track
We honor Do Not Track (DNT) browser signals where technically feasible.
20. Children's Privacy
Our services are not directed to children under 13. We do not knowingly collect personal information from children. If you believe we have collected information from a child, contact us immediately.
21. Changes to Privacy Policy
21.1 Right to Modify
We may update this Privacy Policy to reflect changes in our practices or legal requirements.
21.2 Notification
Material changes will be posted on this page with an updated "Last Updated" date. Continued use constitutes acceptance.
Acknowledgment
By accessing the website or using our resources, you confirm that you have read, understood, and agreed to these Terms of Service and Privacy Policy.