spacer
spacer spacer
spacer spacer spacer spacer spacer spacer spacer
spacer
spacer spacer
spacer
spacer
  spacer Privacy Report  
spacer
spacer
  spacer Web App Scan  
spacer
 
Free Privacy Report
Information Privacy is the number one security concern for companies on the Internet.

Enterprises are escalating their efforts to ensure that confidential information is transmitted and stored according to established guidelines and that users are made aware of their privacy policies.

Additionally, web applications are potentially vulnerable to a range of attacks from hackers, allowing user data to be stolen, users to be tricked into revealing confidential information and users sessions to be hijacked (for a free scan of your website for web application vulnerabilities, click here).

NT OBJECTives is offering a free privacy report to help you understand how your web application is handling private and confidential data.

This Report includes
  • Web Beacon Discovery
  • P3P Header Usage
  • Detection of Broken Policy Links
  • Report of User Data Collection Links
  • External Link Tracing
  • Complete Application Threat Model illustrating all significant web application elements (forms, cookies, logins, etc.)
No assessments are performed during this scan and no vulnerability information is recorded. This is report collects and categorizes publicly available information into an easily understandable format for evaluation.

NT OBJECTives, Inc. is offering a free privacy report of your web application with its industry-leading NTOSpider Web Application Vulnerability Assessment Tool.

Please fill out the following form, approve the terms and conditions and you will be contacted by NTO to commence your scan. The scan will be delivered in an encrypted, compressed file.
 
First Name
Last Name.
Company Name
Telephone
(Business not Cell)
E-Mail
(Business not personal)
Website URL
Authentication
(if applicable)
User:
Pass:
I have read and approve of the terms and conditions
 
Scanning websites without permission is against the law.
  1. NTO will E-Mail you at the address provided. The domain for this address needs to be owned by the same company as the website to be scanned. No personal E-Mail accounts please.
  2. NTO will call you at the number provided to confirm your identity and to schedule the scan. NTOSpider will trigger intrusion detection systems; the IDS administrator will need to be informed before the scan can commence.
Terms
  1. I am in the employ of the owner of the web application (the "Customer") listed above and have the authority to order the scanning of this web application. I uderstand that requesting a scan of a website not owned by my company wouldbe a violation of federal law.
  2. I understand that NTOSpider makes up to 64 concurrent server reuests and that the server hosting the application is capable of handling this additional load.
  3. NTOSpider will scan up to 1,000 links of the website listed above and send me a vulnerability report (the "Deliverables").
  4. I understand that the results of the report created by NTOSpider are my property and will be held as confidential by NTO . NTOSPider and all intellectual property of NTO remain the sole property of NTO.
  5. This offer is made free of charge and does not create any obligation by NTO to me or my employer of by me or my employer to NTO.
  6. Limitation of Liability
    1. Each party acknowledges the full extent of its own liability, arising from: (a) death or personal injury resulting from its negligent acts or omissions; or (b) breach of any applicable license grant. Additionally, the nonexcludable statutory rights of consumers (for example, under laws providing for strict product liability) are not affected.
    2. Except for breach of any applicable license grant and to the extent not prohibited by applicable law:
      1. each party's maximum aggregate liability to the other for claims relating to this Agreement, whether for breach or in tort, including negligence, is limited to U.S. $2,000,000; and
      2. NEITHER PARTY WILL BE LIABLE FOR ANY INDIRECT, PUNITIVE, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH OR ARISING OUT OF THIS AGREEMENT (INCLUDING LOSS OF BUSINESS, REVENUE, PROFITS, USE, DATA, ELECTRONICALLY TRANSMITTED ORDERS, OR OTHER ECONOMIC ADVANTAGE), HOWEVER THEY ARISE, WHETHER FOR BREACH OR IN TORT, INCLUDING NEGLIGENCE, EVEN IF THAT PARTY HAS BEEN PREVIOUSLY ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    3. Liability for damages will be limited and excluded, even if any exclusive remedy provided for in this Agreement fails of its essential purpose.
    4. Some jurisdictions do not allow the exclusion or limitation of incidental or consequential damages, so the above limitation or exclusion may not apply to Customer.
    5. Customer acknowledges that despite the efforts of NTO to make its Products as benign as possible, given the near infinite possible configurations and architectures present on the Internet, scans could hypothetically cause damage to customer infrastructure (including but not limited to networks, applications and databases). Possible damages include, but are not limited to, disruption of service, corruption of databases, and general system downtime. If Custoemr does not have adequate safeguards in place, these scenarios could cause material damages to customer's business. Customer agrees that the limitation of liability detailed in 6 (b) shall cover any potential damages described in this paragraph.
  7. Deliverables. NTO shall own all Intellectual Property Rights in the Deliverables. Rights not expressly granted under this Agreement are reserved to NTO.
    1. License scope. NTO grants to Customer a non-exclusive and non-transferable license to use Deliverables for its internal use only. This License does not allow for use of the Deliverables by the Customer to generate revenue through the delivery of security services or security technology of any kind.


 
spacer

HOME SOFTWARE SERVICES FREEWARE SOLUTIONS COMPANY NEWS CONTACT US
Copyright © NT OBJECTives, Inc. All Rights Reserved.
gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.