Cryptera Device Security Terms and Conditions

Effective Date: April 2026

Welcome to Cryptera (“Company,” “we,” “us,” or “our”). By accessing or using our website, services, or cryptographic backend, you agree to comply with and be bound by the following Terms and Conditions (“Terms”). If you do not agree with these Terms, please do not use our Website or services.

1. Acceptance of Terms

By using our services, you acknowledge and accept these Terms, along with any applicable agreements, policies, and laws. Cryptera reserves the right to modify these Terms at any time, with updates published on our Website. Continued use of our services after modifications constitutes your acceptance of the updated Terms.

2. Use of the Website and Services

Our services, including cryptographic solutions, device security, and API access, are provided for business and professional use. You agree not to:

  • Use our services for unauthorized, illegal, or malicious activities.

  • Copy, distribute, or alter proprietary content without written permission.

  • Attempt unauthorized access to Cryptera’s API, backend systems, or infrastructure.

  • Post or transmit harmful, abusive, or misleading content that violates ethical or legal guidelines.

Violation of these Terms may result in suspension or termination of access to Cryptera’s services.

3. User Accounts and Security

Certain services, such as API access, backend cryptographic operations, and our webstore, require account registration. You are responsible for maintaining the confidentiality of your login credentials.

  • If you suspect unauthorized access, you must notify us immediately.

  • We are not liable for losses due to compromised accounts caused by user negligence.

  • API users are responsible for all actions performed using their API credentials.

  • Any misuse or unauthorized cryptographic operations will result in immediate suspension of API access.

For Enterprise customers, additional security measures and dedicated support are provided under our Enterprise Support SLA.

4. Cryptographic Operations and Data Handling

Users utilizing Cryptera’s cryptographic services retain ownership of any keys or encrypted data generated. However, Cryptera maintains operational logs for security auditing, compliance, and fraud prevention.

By using our cryptographic services, you acknowledge that:

  • Cryptera does not store or retain unencrypted private keys.

  • Data passing through our cryptographic systems is subject to strict access control and security measures.

  • We may monitor cryptographic operations to detect unauthorized use or compliance violations.

For Enterprise customers, additional logging, auditing, and reporting are available under our Enterprise Support SLA.

5. Service Levels, Trial, Development, and Production Services

Cryptera provides services across different environments, including Trial Services, Development Services, and Production Services. The applicable service levels, guarantees, and limitations depend on the specific service purchased or used.

5.1 Trial Services

Cryptera may, at its sole discretion, provide access to trial or evaluation services (“Trial Services”) for a limited period.

  • Trial Services are provided free of charge unless otherwise agreed.

  • They are intended solely for evaluation and testing purposes.

  • Trial Services are provided “as is” and “as available”, without warranties, service levels, or guarantees of any kind.

  • Cryptera may suspend or terminate Trial Services at any time without notice.

5.2 Development Services

Cryptera offers Development Services as a paid service intended to support integration, testing, and pre-production activities.

By using Development Services, you acknowledge and agree that:

a) Scope of Use

  • Development Services are provided strictly for non-production use, including development, testing, and system integration.

  • Permitted use includes:

    • Code signing operations

    • Device certificate provisioning and management

    • Cryptographic key generation and handling

    • API integration via REST and PKCS#11

    • Access to audit logs and signing records

b) Service Characteristics

  • Development Services may include:

    • Code signing and certificate operations without predefined usage limits

    • Generation and management of multiple cryptographic keys

    • Use of a software-based HSM (Soft HSM)

    • Multi-user access and approval workflows

    • Logging and audit trails of cryptographic activity

c) Critical Limitations

  • Development Services are not intended, designed, or approved for production use.

  • Cryptographic keys generated or used in Development Services:

    • Are not backed up

    • May not be recoverable

    • Are not stored in certified or production-grade HSM infrastructure

    • Cryptera does not guarantee durability, persistence, or integrity of keys or data in Development Services.

d) Service Levels and Availability

  • Development Services are provided without formal SLA commitments unless explicitly agreed in writing.

  • Availability, performance, and capacity may be limited or variable.

e) Operational Flexibility

  • Cryptera may, at any time:

    • Modify, limit, or suspend Development Services

    • Delete or reset keys, data, or configurations

  • Technical limitations, rate limits, or capacity constraints may apply.

f) Customer Responsibility

  • You are solely responsible for ensuring that:

    • No Development keys, certificates, or signed artifacts are used in production

    • All production systems use appropriate Production Services and infrastructure

g) Fair Use

Development Services are provided to support typical development, testing, and integration workflows. While certain capabilities may be described as “unlimited” or without predefined limits, such usage is subject to fair and reasonable use.

You agree not to use Development Services in a manner that:

  • Exceeds normal development or testing usage patterns, including production-like or high-volume operational workloads

  • Places excessive or disproportionate load on Cryptera Device Security’s infrastructure, including through automated or high-frequency API calls, signing operations, or certificate issuance

  • Attempts to circumvent technical limitations, rate limits, or system controls

  • Is intended to benchmark, stress test, or otherwise evaluate the performance or limits of the services without prior written approval

Cryptera Device Security reserves the right, at its sole discretion, to:

  • Monitor usage patterns to ensure compliance with this section

  • Apply rate limiting, throttling, or other technical controls

  • Suspend, restrict, or modify access to Development Services where usage is deemed excessive or inconsistent with intended use

  • Require transition to Production Services or a separate commercial agreement where usage reflects production-scale activity

Where reasonably practicable, Cryptera Device Security will make efforts to notify you prior to taking action under this section.

5.3 Production Services and SLA Commitments

Production use of Cryptera services requires a paid subscription under applicable service plans and is governed by defined Service Level Agreements (“SLA”).

Standard SLA (Basic & Professional Packages)

Includes:

  • Defined uptime targets

  • Support response times

  • General support availability

  • Service credit eligibility (subject to SLA terms)

Enterprise Support SLA (Enterprise Customers)

Includes:

  • Priority support and enhanced response times

  • Higher uptime guarantees

  • Dedicated account management

  • Proactive monitoring and advanced reporting

  • Custom SLA terms where agreed

Full details of SLA commitments are provided in the applicable SLA documentation or agreement.

5.4 Applicability and Precedence

  • Trial Services and Development Services are excluded from Production SLA commitments, unless explicitly agreed otherwise in writing.

  • SLA commitments apply only to Production Services under active paid subscriptions.

  • In the event of any conflict between these Terms and a separately executed SLA agreement, the SLA shall prevail for the covered Production Services.

6. Intellectual Property

All intellectual property, including but not limited to:

  • Software, cryptographic APIs, backend security solutions, documentation, and trademarks,

  • Website content, text, images, and source code,

are owned by Cryptera or its licensors and protected by Danish and international copyright, trademark, and intellectual property laws. Unauthorized use or reproduction is strictly prohibited.

7. Subscription Services and Payments

Cryptera offers subscription-based security solutions, including:

  • Cryptographic API access,

  • Code signing services,

  • Device certificate management.

By subscribing, you agree to:

  • Pay all applicable fees as outlined in the subscription and payment policies outlined in these Terms and Conditions.

  • Cryptera reserves the right to adjust pricing and subscription plans, with prior notice.

  • Failure to make timely payments may result in service suspension or termination.

  • Refunds are subject to the terms outlined in the Standard SLA or Enterprise Support SLA, depending on your package.

8. Data Privacy and Security

Cryptera is committed to protecting your privacy. Our Privacy Policy details how we collect, store, and process data.

Key commitments include:

  • Adhering to strict security controls for customer data.

  • Logging and monitoring cryptographic transactions for auditing and fraud prevention.

  • Ensuring that all customer-owned cryptographic keys remain under customer control.

For Enterprise customers, additional security measures, dedicated logging, and auditing are included in the Enterprise Support SLA.

9. Warranty Disclaimers and Liability

Cryptera strives to provide high-availability, enterprise-grade security solutions, with guaranteed uptime as outlined in our SLA agreements.

However, our services are provided "as is", and we do not guarantee:

  • 100% uninterrupted availability due to factors beyond our control (e.g., force majeure, third-party failures).

  • The absolute invulnerability of cryptographic operations.

To the fullest extent permitted by law, Cryptera shall not be liable for:

  • Direct or indirect damages resulting from service use or interruptions.

  • Loss of encrypted data due to customer misconfiguration or improper key handling.

For service credit eligibility, users must follow the claim process as outlined in our SLA agreements.

Development Services (as described in Section 5.2) are provided without production safeguards, and Cryptera shall have no liability for any loss of data, keys, or cryptographic material arising from their use.

10. Governing Law and Dispute Resolution

These Terms are governed by and construed in accordance with the laws of Denmark. Any disputes shall be resolved exclusively in the courts of Denmark, unless otherwise agreed upon in writing.

11. Contact Information

For any inquiries regarding these Terms, please contact us at: info@cryptera-device-security.com

By using Cryptera’s Website, API services, or subscribing to our security solutions, you confirm that you have read, understood, and agreed to these Terms and Conditions.