Terms & Conditions

Effective Date: June 14, 2025

These Terms & Conditions (“Terms”, “Conditions”) govern your access to and use of Ivy Cyber platforms, including services (“Services”) and all purchased software and hardware products (“website”, “site”, “software”, “apps”, “applications”, “hardware”, “products”) offered under the Ivy Cyber™ and PrivacySafe® brands (“we”, “us”, “our”).

1. Acceptance of Terms

By using our Services or Products, you agree to these Terms. If you do not agree, you must discontinue all use of Ivy Cyber and PrivacySafe services immediately.

2. Modifications to Terms

We reserve the right, at our discretion, to change, modify, add, or remove portions of these Terms at any time by posting updates here. You should review these Terms regularly. Notice of significant changes may also be made via social media channels:

3. Use of Services

Our Services and Products are provided for educational, informational, and lawful purposes only. Prohibited activities include:

  • Privacy violations including, but not restricted to, unauthorized data harvesting
  • Engaging in illegal activity
  • Harassment or abuse of others
  • Malware distribution

We reserve the right to refuse service or revoke access at our discretion..

COPPA Notice

Ivy Cyber does not knowingly solicit or collect personal information from minors under the age of eighteen. If you have reason to believe a minor has disclosed personal information to Ivy Cyber, please notify privacy@ivycyber.com immediately. Users under the age of 13 must NOT use the site (per US COPPA requirements).

Conduct on Learning Platforms

By enrolling in courses or participating in workshops and live events through Ivy Cyber, users agree to maintain respectful, lawful, and ethical conduct within our learning environments. These environments include all sessions held via our BigBlueButton platform (privacysafe.live) and all interactions on our Canvas platform (privacysafe.courses).

  • Engage in discussions and coursework with courtesy and professionalism.
  • Respect the privacy and intellectual property of instructors and fellow students.
  • Refrain from any form of harassment, abuse, discriminatory language, or disruptive behavior.
  • Not share access credentials or distribute course content without permission.
  • No doxxing or sharing of identity and/or personal and/or demographic information about other users without permission.

Violation of this code of conduct may result in removal from sessions, revocation of course access, ban from future participation without refund, or other punitive and/or legal action. Ivy Cyber reserves the right to take appropriate action in the interest of maintaining a safe and respectful learning environment.

By accessing our Ivy Cyber platforms, you acknowledge and accept these conditions as part of our overall Terms and Conditions.

4. Intellectual Property and FOSS

To the greatest extent feasible, content and original software made available by Ivy Cyber is licensed under
Free and Open Source Software (“FOSS”) principles. Unless otherwise noted, code is released under recognized FOSS licenses such as the GNU General Public License (GPL) or Creative Commons BY-SA. The Ivy Cyber™ name, PrivacySafe® brand, and related logos are pending or registered trademarks and may not be used without permission. Website content, unless otherwise noted, is licensed under Creative Commons BY-SA 4.0 International.

Intellectual Property Notice for Whistle Post Media

Content hosted by Whistle Post Media whistlepost.com, including comics, articles, graphics, and videos, may be published under separate licensing terms and is not necessarily licensed under FOSS or Creative Commons. While the Whistle Post website design is licensed CC BY-SA, editorial content may be proprietary or third-party licensed. If you wish to reuse or redistribute material from Whistle Post Media, you must first contact the editorial team at whistlepost@ivycyber.com to verify the applicable license and obtain permission if required.

5. Software Disclaimer and Licensing Scope

Enterprise Subscriptions and Software License Agreements

Ivy Cyber provides software “AS IS” and without warranties of any kind unless explicitly defined in a Software License Agreement (“SLA”). This includes all software distributed under the PrivacySafe® and Ivy Cyber™ brands. Customers purchasing Personal, Team, or Business tier subscriptions to the PrivacySafe Enterprise suite are subject to the licensing terms and support policies of that subscription, which are defined separately and may supersede the general terms below.

Unsupported and Freely Distributed Software

Unless otherwise specified in an SLA, no warranty or support is provided for software under the PrivacySafe® and Ivy Cyber™ brands, with the exception of purchased and currently-active Personal, Team, or Business tier subscriptions for the PrivacySafe Enterprise Suite. Please refer to the accompanying licensing terms and support policies of those PrivacySafe Enterprise Suite purchases.

Software with no warranty or support includes, but is not limited to:

These applications are provided for promotional, informational, educational, or experimental use. No guarantees are made regarding performance, uptime, compatibility, or fitness for a particular purpose.

Terms for PrivacySafe Social

Users of PrivacySafe Social additionally agree to the Privacy Notice and Terms of Use published at https://privacysafe.social/privacy-policy.

Vendor and Partner Use

Vendors or partners integrating Ivy Cyber software into their own offerings must refer to their specific SLA or contact legal@ivycyber.com to confirm the applicable license terms.

6. Shipping, Returns, and Refunds

Returns

  • Only accepted for verified defective items within 30 days
  • Full refund if the product is discontinued before shipping
  • Customer pays return shipping
  • Setup and shipping fees are non-refundable
  • No refunds once processing or shipping begins

Shipping Inspection and Damage Claims

  • Customers must inspect shipments immediately upon delivery and document any visible damage before accepting the delivery
  • Claims for concealed damage must be submitted within 24 hours of delivery
  • Photographic documentation of all sides of the product and packaging is required
  • Original packaging must be retained for inspection
  • Failure to comply may result in denial of damage claims

Refused Shipments and Delays

  • Refusing a shipment may result in damage and delays
  • Refused shipments may incur restocking fees
  • Contact support immediately if issues are found

Non-returnable Items

  • Screen protectors, privacy filters, device cases and covers, webcam covers
  • Stickers
  • Items intended for human or animal consumption
  • Rubber feet, screws, accessories

Digital Goods

All sales of digital products, including but not limited to remote events, online classes, curriculum access, and downloadable files, are considered final upon purchase.

  • Refunds will be considered within 24 hours if content has not yet been accessed or downloaded
  • Event tickets are non-transferable
  • Missed live events are not eligible for a refund

7. Hardware Warranty and Magnuson-Moss Compliance

Our hardware warranties are provided with full transparency and in accordance with the Magnuson-Moss Warranty Act (MMWA).

Warranty Policy

  • 1-year limited manufacturer warranty on physical hardware like the PrivacySafe Launchpad Pro tablet.
  • Refurbished items: 90-day warranty
  • Accessories: 30-day warranty for defects only
  • Excludes software, cosmetic damage, misuse, and unauthorized modifications

Warranty Exclusions

  • Consumable parts (e.g., batteries) unless failure is due to defects in materials or workmanship
  • Cosmetic damage (e.g., scratches, dents, broken ports) not caused by defects
  • Damage caused by use with non-Ivy Cyber components or peripherals
  • Damage from accidents, abuse, misuse, fire, water, earthquakes, or other external causes
  • Operation outside intended environmental parameters (e.g., extreme heat, humidity, vacuum conditions)
  • Unauthorized repairs or hardware modifications
  • Normal wear and tear

Warranty Claim Denial

  • The claim is submitted outside of the warranty period
  • The customer fails to respond to support communications within 30 days
  • Required troubleshooting steps are not followed
  • Improper packaging causes damage during a return shipment
  • Damage is due to customer misuse or unauthorized modification

Warranty Claims Process and Additional Information

To initiate a warranty claim, please contact our support team at support@ivycyber.com with your proof of purchase, a detailed description of the defect, and any relevant photographs. Please note that if a warranty claim is approved, you may be responsible for return shipping costs unless otherwise required by law.

This Limited Warranty gives you specific legal rights, and you may also have additional rights that vary by state. To the extent permitted by law, all implied warranties—including implied warranties of merchantability and fitness for a particular purpose—are expressly disclaimed.

A copy of the full Limited Warranty is available upon request. Please email support@ivycyber.com to obtain a copy.

8. FOSS Licensing of Components

Software components are governed by their respective licenses and consist mainly of Free and Open Source Software (“FOSS”). These FOSS licenses disclaim warranty and limit liability. You may inspect and modify such code under those licenses but please refer to each relevant and specific license for your applicable rights and obligations.

Base Distributions and Community Support

The freely downloadable version of PrivacySafe OS is based on the latest stable release of Debian GNU/Linux 12 “Bookworm”. This version benefits from upstream community support such as patches and security updates provided by the Debian FOSS community until June 30, 2028. For more details, see the official Debian release information at
https://www.debian.org/releases/bookworm/.

PrivacySafe OS, as pre-installed on PrivacySafe hardware products such as the Launchpad Pro tablet, is based on Ubuntu Linux 24.04 Long Term Support (LTS) “Noble Numbat”. This version benefits from upstream community support such as patches and security updates provided by the Ubuntu FOSS community until until May 31, 2029. For more information, see the Ubuntu 24.04 LTS release notes at
https://discourse.ubuntu.com/t/ubuntu-24-04-lts-noble-numbat-release-notes/39890.

Optional PrivacySafe OS LTS Support

PrivacySafe OS as preinstalled on PrivacySafe hardware products is based on Ubuntu LTS versions as stated above. While Ivy Cyber is not affiliated with Canonical Ltd., we provide our own Long Term Support (LTS) for PrivacySafe OS, including security updates and package maintenance for up to 5 years from release.

LTS Coverage is available as an optional add-on for PrivacySafe hardware products. To inquire about purchasing a support agreement, please contact our team at orders@ivycyber.com.

Alternative Operating System Installations

Customers who wish to install an alternative operating system on PrivacySafe hardware products (such as RHEL, Rocky Linux, or Microsoft Windows) must contact orders@ivycyber.com before shipment to discuss feasibility, licensing, and support expectations. Requests made after the product has shipped may not be accommodated.

Support coverage, compatibility, and available services will vary depending on the chosen operating system. Some operating systems may require additional license purchases, pre-configuration steps, or hardware validation. Contact orders@ivycyber.com to request a review of your preferred OS configuration.

9. Payments

Ivy Cyber utilizes the open source WooCommerce shopping cart, which facilitates your order payments through third-party Stripe (including Link By Stripe) and PayPal payment gateways. We go to great lengths to preserve your privacy but must process your payments through a provider, except in the case of cryptocurrency. For cryptocurrency information please see the “Cryptocurrency Payments” section below.

The Stripe and PayPal payment gateways provide a wide variety of international payment methods including credit and debit cards, ACH, Google Pay, Apple Pay, Venmo, WeChat, Cash App, and Klarna. If you ordered from Ivy Cyber in person at an event or conference, your payment was processed by Square. When making a payment, your financial information is transmitted securely using strong encryption to your chosen payment providers and banking networks which handle the payment processing.

Ivy Cyber does not directly store or process credit, debit, or bank account numbers or payment credentials. Your financial information is processed via encrypted transit to the secure payment provider gateways. By completing a transaction, you acknowledge that your information is being shared directly with the payment processor(s) and network(s) you select. These payment processor(s) and network(s) are responsible for handling any requests under GDPR and other applicable data protection regulations regarding your payment data.

By completing a transaction on our site or in person, you acknowledge that Ivy Cyber is not liable for data breaches or mishandling of personal or payment information once transmitted to these third-party processors. Any concerns or rights requests related to your financial data must be directed to the payment provider. For more information, please see:

10. Currency, Exchange Rates, and Fraud Prevention

All prices listed on our websites are shown in local currencies based on the user’s location or selected preference. We accept payment in the following currencies:

  • United States dollar: $ USD
  • Australian dollar: $ AUD
  • Canadian dollar: $ CAD
  • Euro: € EUR
  • Hong Kong dollar: $ HKD
  • Icelandic króna: kr. ISK
  • Japanese yen: ¥ JPY
  • New Zealand dollar: $ NZD
  • South African rand: R ZAR
  • United Arab Emirates dirham: د.إ AED

Prices may vary slightly due to exchange rate fluctuations and rounding policies applied by our payment providers. Ivy Cyber is not responsible for currency conversion discrepancies or bank-imposed transaction fees. All exchange rates and conversions are handled by third-party processors such as Stripe, PayPal, and Square and are subject to their terms of service.

Fraud detection and payment verification are conducted by these providers. Ivy Cyber does not directly store or process financial data, and we rely on these third-party processors for secure and compliant transaction handling.

11. Cryptocurrency Payments

Ivy Cyber is pleased to offer cryptocurrency as an alternative payment method, supporting a variety of tokens. Before initiating any payment, please review the guidance at https://ivycyber.com/crypto or contact us at orders@ivycyber.com to receive confirmation and specific instructions.

For secure communication, our PGP key is: 2A31 B66D 9359 5A36 423C 7120 376C 7159 AF52 635C

To honor the decentralized ethos of cryptocurrency and protect the privacy of our customers, we do not automatically forward payment or customer information to exchanges or third-party processors. All cryptocurrency transactions are handled manually to ensure accuracy and confidentiality. We recommend and prioritize Monero (XMR) transactions whenever possible. We also support Bitcoin over the Lightning Network and Tari (XTM) by request.

Customers are solely responsible for ensuring that cryptocurrency payments are sent to the correct wallet address using the appropriate blockchain network. Sending funds to the wrong address or using an unsupported token or network may result in the permanent loss of funds, which cannot be recovered. Ivy Cyber is not liable for any losses incurred due to customer error, including but not limited to:

  • Sending unsupported tokens

  • Using an incorrect or outdated address

  • Transacting on the wrong blockchain or layer

  • Failing to follow instructions provided by Ivy Cyber

12. Privacy Policy

For details about how we collect, store, and protect your data, please refer to our comprehensive Privacy Policy located at https://ivycyber.com/privacy.

13. Disclaimer of Warranty

THERE IS NO WARRANTY UNLESS AGREED TO IN WRITING BY ALL RELEVANT PARTIES IN APPLICABLE CIRCUMSTANCES, OR UNLESS A WARRANTY IS DETERMINED TO APPLY UNDER SUCH CIRCUMSTANCES AS DESCRIBED ABOVE, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE SOFTWARE OR HARDWARE “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE SOFTWARE OR HARDWARE IS WITH YOU. SHOULD THE SOFTWARE OR HARDWARE PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.

14. Limitation of Liability

IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY PARTY BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE SOFTWARE OR HARDWARE (INCLUDING BUT NOT LIMITED TO PERSONAL INJURY OR PROFESSIONAL INJURY OR FINANCIAL LOSS OR LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE SOFTWARE OR HARDWARE TO OPERATE WITH ANY OTHER SITE OR SOFTWARE OR HARDWARE), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

15. Governing Law and Dispute Resolution

These Terms are governed by the laws of the State of Connecticut, United States, without regard to its conflict of laws principles. If a dispute arises between you and Ivy Cyber relating to these Terms, the use of our Services or Products, or any related issue, we aim to resolve it fairly and efficiently. Most concerns can be resolved informally by contacting our team at legal@ivycyber.com.

If informal resolution is not possible, you may choose to resolve the dispute through final and binding arbitration or by pursuing a claim in a court of competent jurisdiction located in New Haven County, Connecticut. Arbitration, if selected, will be conducted by a mutually agreed provider using procedures designed to minimize cost and complexity.

Nothing in this section prevents either party from seeking injunctive or equitable relief in court when appropriate, especially in matters involving intellectual property or misuse of services. We do not require users to waive their rights to participate in a class action or collective proceeding. However, we ask that individual disputes be attempted in good faith before collective legal action is considered.

Contact Information

Ivy Cyber Education LLC
1204 Main St Num 1197
Branford, CT 06405-3787
+1 (929) 748-7233
privacy@ivycyber.com