Breach Id Terms and Conditions

These terms and conditions were last revised on 11 August 2025.

Introduction

  1. The Packet Hub is a South African company with registration number 2010/139075/23 (referred to in these terms and conditions as “TPH”).
  2. "We" are TPH, and "you" are any person who accesses and uses the Service.
  3. The Service is a proactive ‘dark web’ monitoring software solution designed to detect compromised credentials for individuals and other entities to mitigate the impact of the unauthorised exploitation of stolen information and introduction of malware infections. Additionally, the Service detects information stealer malware infections. This is new technology and it is vital that you review these terms and conditions and ensure that you understand our risks and responsibilities and your risks and responsibilities.
  4. By accessing or using our Website or downloading, installing, or otherwise using our software and/or using the Online Portal, and by creating an Account, you agree to be bound by these terms and conditions. These terms and conditions incorporate the General Terms and Conditions by reference.
  5. You can access the General Terms and Conditions on our Website or by following this link.
  6. You use our Website, the Online Portal and the Services at your own risk. If you click onto a link to another website, we are not responsible for what you access.
  7. Please bear in mind that the internet is an inherently flawed system that is susceptible to hacking, and the security of this Website, Material, the Online Portal and the Services is the best we can achieve in these circumstances. All reasonable steps have accordingly been taken to safeguard all parties while utilising our Portal of Services.
  8. You can download all of these terms and conditions, or click on any of the headings below to get the full set of terms for that section or the BreachID Service.
    1. The following terms have the meanings given to them in this section unless the context indicates otherwise, and terms that are capitalised and underlined but not defined in these terms and conditions will be defined in the General Terms and Conditions

    2. Approved Use. Means the purpose for which the Breached Assets are to be used.
    3. Breach. Means an activity which is usually not lawful or not authorised, that results in Breached Assets;
    4. Breached Assets. Means up to the relevant date, any of your Data that has been exposed, detected on, or is available on the dark web, including exposure via third-party websites or to unauthorised third parties, and which has been identified by our licensed software.
    5. Credentials. Means passwords and other authentication credentials associated with your use of the internet or any website or related services or applications;
    6. Customer. Means any individual or legal entity that has been granted access to the Online Portal and is authorised to use the Services. A Customer account may be established through (i) registration by a Reseller or Distributor acting on behalf of the Customer, (ii) direct account creation by the Company, or (iii) self-registration by the Customer via the Online Portal. The Customer is responsible for all activity conducted under its account and for compliance with the applicable terms of use.
    7. Customer Credential Exposure. Means any Data relating to a third-party user, such as a customer or end user of the Customer, whose credentials (including but not limited to email addresses, usernames, or passwords) have been identified in publicly available breach records and are associated with the Customer’s domain by virtue of their relationship to a website, portal, or service operated by or on behalf of the Customer. Such exposure may occur even where the third-party user’s email address does not match the Customer’s domain, provided that the credentials are otherwise linked to the Customer’s services or systems.
    8. Data. Means, for the purposes of these terms and conditions, any information provided by you or retrieved through your use of the Service. This includes, but is not limited to, your domain, Personal Information, Credentials, Other Information, and any records or data returned by the Service in relation to monitoring, analysis, or reporting.
    9. Service. Means BreachID, being the licensed software which is a proprietary online data delivery service, including all firehoses that provide access to cloud computing platforms, application programming interfaces, software development kits, software plugins, code, libraries, protocols, formats, documentation, and other related materials (as may be updated from time to time) for detecting, collecting, and presenting Breached Assets and, in some cases, the most likely source of the Breach to you; and
    10. TPH Facilities. Means the Online Portal and any Account, TPH system or other facility relating directly to the Service and within our custody or control.
    1. You may not access the Service if you do not have an Account;
    2. In order to create your Account, in addition to the information set out in the General Terms and Conditions, we will need to verify your email address and specifically your domain before creating an Account;
    3. Subject always to these terms and conditions and to the General Terms and Conditions of our licence, we grant you a limited, non-exclusive, non-transferable, non-assignable, non-sublicensable licence to use the Service.
    4. In order to use the Service in relation to a specific domain, you must verify that you are the owner or an authorised representative of that domain.
    5. Verification is conducted by requiring you to add a designated DNS record to the domain.
    6. By successfully completing this verification step, you represent and warrant that you are the rightful owner of, or have been granted the necessary authority by the owner to act on behalf of, the domain and to access any associated Data.
    7. If you are not the direct owner, it is your responsibility to obtain all necessary rights or permissions from the domain owner. TPH shall not be held responsible or liable for any unauthorised access, misuse, misrepresentation, or impersonation resulting from false or improper claims of domain ownership or authorisation.
    8. 3.5 Some records returned by the Service for a verified domain may include Customer Credential Exposure which may be linked to third-party users whose email addresses don’t match the domain but are associated with websites, portals, or services connected to it.
    9. TPH provides this Data based solely on its connection to the verified domain as identified in breach records. TPH provides this Data solely because of its relevance or association with the verified domain, as identified through breach records.
    10. You are solely responsible for ensuring you have the necessary legal basis, internal policies, or agreements to access, use and report on such Customer Credential Exposure Data. By using the Service, you accept this condition and agree that TPH and its affiliates will not be liable for any claims, losses, or disputes arising from your use of Customer Credential Exposure Data.
    11. The Approved Use is limited to accessing the Breached Assets and Data through the Online Portal for the purpose of identifying any threat to and protecting your Personal Information or the Other Information owned or created or used by you, and enabling you where this is possible (meaning only in some cases) to act to mitigate any loss arising from or misuse of, your Personal Information or your Data.

    You may not

    1. rent, lease, lend, sell or sublicense the Breached Assets, or otherwise
    2. provide access to the Breached Assets; or
    3. provide use of the Service on a rental or managed services basis, to any third party.
    1. If you become aware of unauthorised use of your Account or the Breached Assets, you must notify us in writing immediately.
    2. We may become aware of information relevant to a Breached Asset and may make such information available to you directly, whether through alerts, presentation in the Online Portal, reports, or other means. In cases where a Breached Asset consists of a domain name used in combination with a password and other login credentials, we will display only the first three characters of the password for verification purposes, together with a first and last name, except in cases of Customer Credential Exposure, where no password information will be returned under any circumstances.
    3. The Service provides tools to track breach records and add internal notes for reference purposes only. These features are not intended for the storage or sharing of confidential or sensitive information. If you choose to enter any confidential or sensitive Data when using these features, you do so at your own risk and accept full responsibility for any consequences resulting from such use.
    1. We may provide you with certain service levels depending on the type of access you require to the Services.
      1. If you experience any issues with your access to and use of Service you must contact us on support@tph.io or telephone on 0115930601
      2. We do not relay any information we obtain through the Service to any third party unless we are specifically directed to do so in terms of a legal obligation.
      3. We are not responsible to nor do we report any Breach resulting in a Breached Asset or source of any Breach to the police or law enforcement authorities.
      4. We may be able to provide you with the date and time of a Breach and a level of confidence in relation to the identity of the source of the Breach, if this has been confirmed. This is however not guaranteed as part of the services rendered.
      5. We may not be able to establish the source of any Breach and there should be no expectation that this forms part of the Service.
      6. These terms and conditions incorporate the General Terms and Conditions by reference.
    1. Your use of the Service, Online Portal and payment mechanism is at your sole risk. These are provided to you “as is” and TPH makes no representations or warranties concerning any of them.
    2. TPH shall not be liable to you or any end user for any indirect or consequential loss of any kind at all and whether or not it was foreseeable.
    3. TPH is not liable for the way in which you choose to use the Breached Assets nor can we ensure that the Breached Assets will not be used by anyone after they are disclosed to you pursuant to your use of the Service.
    4. We may not be able to establish the source of any Breach and there should be no expectation that this forms part of the Service.
    5. These terms and conditions incorporate the General Terms and Conditions by reference.