PhishFort MSP Partner & End-User Terms of Use
Terms and Conditions ("Terms")
Last Updated: 04 August 2025
1. Overview and Agreement
This Terms of Use Agreement (“Agreement”) governs the use of PhishFort’s products and services (“Services”) by both Managed Service Provider partners (“Partners”) and end customers (“Customers”). Services will be delivered directly by PhishFort (“PhishFort”, “Supplier”, “we”, “our”, or “us”). By using or accessing our Services, or by entering into any order form or agreement with PhishFort, both Partners and Customers agree to comply with the terms of this Agreement and with the Privacy Policy available at: https://phishfort.com/privacy-policy/
If you are entering into an Agreement on behalf of an entity or organization, you represent and warrant that you have the authority to bind such entity to these terms. Continued use of the Services constitutes acceptance of this Agreement. If you do not agree to the terms herein, you must not access or use the Services. So,
PLEASE READ THIS AGREEMENT CAREFULLY. BY USING THE SERVICES, YOU AGREE TO THESE TERMS. IF YOU DO NOT AGREE, DO NOT USE THE SERVICES.
This document constitutes the full agreement between PhishFort and the MSP Partner. Any prior agreements, oral or written, are superseded.
This Agreement outlines the respective roles, rights, and responsibilities of MSP Partners and Customers. MSP Partners are responsible for managing relationships with their respective end customers, providing necessary support, onboarding, and ensuring proper delivery of services. Customers are responsible for using the Services in accordance with the agreed terms, whether contracted directly with PhishFort or via an MSP Partner.
Where an MSP Agreement exists between a Customer and a Partner, it may supplement or clarify the terms of this Agreement. However, such agreements shall not impose any additional obligations on PhishFort nor restrict PhishFort’s rights as defined herein. This Agreement remains applicable to all service usage, regardless of whether access is via MSP Partner or PhishFort directly.
1.1 Access and Use of the Service
Subject to payment of applicable fees and adherence to this Agreement, PhishFort grants Customers a non-exclusive, non-transferable right to access and use the Services during the applicable subscription term for internal business purposes, in accordance with any relevant documentation or order forms.
Customers are solely responsible for the security and use of their access credentials. Any activities carried out under their account, authorized or otherwise, are their responsibility.
Users may not: (a) reverse engineer, decompile, or attempt to derive the source code of the Service; (b) modify or create derivative works of the Service; (c) sell, resell, or sublicense access; (d) remove proprietary labels or notices; (e) use the Services for the purpose of building a competing service; or (f) violate applicable laws or third-party rights when using the Services.
PhishFort’s services may operate in conjunction with third-party platforms or infrastructure providers; and the Supplier shall at all times during the term of the Agreement provide the Managed Services in accordance with standard industry practice to meet or exceed the Service Level Performance Measure for each service, as defined herein under the “Service Levels and Availability” section.
2. MSP Partner Responsibilities
2.1 End-Customer Relationship
The Partner retains full commercial and contractual responsibility with End Customers, including:
- Customer pricing and invoicing
- Payment collection and credit control
- Drafting and negotiating End Customer contracts
- Onboarding, configuration, and first-line support
PhishFort will not interact with End Customers unless explicitly agreed in writing and/or for evidence or escalations purposes..
2.2 Commitments and Acknowledgement
Partner agrees to:
- Abide by all applicable laws and this Agreement
- Clearly communicate service limitations and expectations to End Customers
- Provide first-line technical and operational support to End Customers
- Maintain secure access to PhishFort systems and report any misuse
3. Service Scope and Performance
3.1 Description of Services
PhishFort provides threat detection, takedown services, and monitoring capabilities including but not limited to:
- Website, domain, and app takedowns
- Blocklisting (e.g., Google Safe Browsing)
- Dashboard access and incident tracking
- Social media and app impersonation detection
- Legal takedowns for copyright or trademark abuse
3.2 Service Levels and Availability
Performance Monitoring
- The Supplier shall implement all measurement and monitoring tools and procedures necessary to measure, monitor, and report on the Supplier’s performance of the provision of the Managed Services against the applicable Service Levels in sufficient detail to verify compliance with the Service Levels.
- The Supplier shall notify the Customer via [PARTNER] in reasonable time if the level of performance of the Supplier or any element of the provision by it of the Managed Services during the term of the Sales Agreement is likely to or fails to meet any Service Level Performance Measure.
Service Levels and Availability
| Service | Service Description | Key Performance Indicator | Service Level Performance Measure | Unmet Service Level Indicator |
| Website blocklisting | Blocklisting** identified malicious and/or phishing websites into Google Safe Browsing | Once the takedown is initiated, the infringing site is reported to all global blocklist partners. | Monthly median insertion time = 24 hours. | Minimum of ten websites blocklisted in a month period |
| Takedown*** of domains, apps, social media accounts, and copyright and/or trademark infringements | Malicious and/or phishing websites and/or Apps are taken down | Sites taken down remain down for less than 2 consecutive weeks | Takedown process commenced within 12 hours of identification/reporting | Sites taken down remain down for less than 2 consecutive weeks |
| Dashboard availability and maintenance | Dashboard for reporting and tracking takedowns | 24/7365 days p/a | At least 99.9% availability in a month | |
| Takedown communication | For a submitted takedown incident, correspondence with the reporter of the incident via in-portal communication or, if selected by the reporter, via email regarding the status of the incident. | The report will be updated on every action taken as new developments are received regarding the incident. Updates will be posted on our platform. | Communication threshold was met 99% of the time | Communication is late or missing on more than 1% of required intervals. |
*Note: The Supplier undertakes to action a takedown as soon as possible within 12 hours of identification and/or reporting. Upon our last audit, the Supplier’s median takedown time for phishing cases with enough evidence is 6 hours. Given the number of third parties involved in the takedown process that are outside the Supplier’s control, the Supplier cannot make guarantees about either the effectiveness or the period of time that the takedown process will take.
**Google Safebrowsing powers most of the major browsers in the world, including Safari, Chrome, Edge, and Firefox. PhishFort is a trusted vendor of Safebrowsing which means we have direct access to the service. Getting a website blocklisted in Safebrowsing protects the overwhelming majority of internet users within minutes once accepted by the Google team. The takedown process happens in parallel to this process, ensuring that the site goes down for good. Given the nature of the jurisdictions and third parties involved with this process, we don’t and cannot make realistic guarantees around the timeline of the takedown, but instead endeavor to get a site unreachable by most of the internet within 4 hours.
PhishFort endeavors to meet these performance targets but cannot guarantee specific outcomes or timeframes.
Services rely on platforms and providers outside PhishFort’s control. We are not liable for delays or failures caused by domain registrars, hosting providers, app stores, or social media platforms.
4. Service Credits
If PhishFort fails to meet a specific Service Level for two consecutive months in a 12-month rolling period, service credits may be issued as follows:
- Dashboard availability below 99% – 1% credit on monthly takedown fees
- Availability below 95% – 5% credit
- Missed communication threshold – same percentages as above
Service credits are the sole remedy for missed SLAs.
5. Details of Managed Services
This section shall be read with the Contract Details and shall only be applicable to the select Services set out therein as agreed with the Customer.
- Website and Domain Services:
- Website and Domain Name Monitoring:
- The Supplier will conduct algorithmic scanning across internet resources and assess whether each Incident scanned poses a threat to the Customers brand. This assessment is conducted using a combination of machine learning based algorithms and manual intervention by a PhishFort analyst. This process occurs entirely on Computer Systems operated by the Supplier. Some examples of the data sources that are scanned include but are not limited to:
- Newly registered domains from popular Top Level Domains;
- Newly issued SSL certificates;
- Search engine data; and
- Threat intelligence feeds.
- Every Incident collected by the scanning is reviewed by the Supplier’s proprietary software, an analyst, or both by the software and an analyst. The incident is classified into one of three categories:
- Monitor: Incidents in monitor state are deemed to have the potential to become malicious at some point in the future, but do not appear to be malicious currently. Incidents that are classified into a Monitor state are regularly reassessed by automated systems and when a significant change is deemed to have occurred in the domain or website, the Incident is reassessed by an analyst and/or an automated algorithm.
- Safe: An Incident may be deemed to pose little or no harm to the Customer, in which case the incident is marked as “Safe” and no further action is conducted on this incident by the Supplier.
- Malicious: An Incident is considered malicious when it poses a credible threat to the Customer’s brand, business, or customers. An incident marked as malicious is generally blacklisted and a takedown procedure may be initiated according to an internal set of guidelines which take into account a number of factors including the nature of the Incident, the jurisdiction of the registrar of the domain, and the hosting provider of the website.
- Incidents that are moved into a Monitor or Malicious state are presented through the Supplier’s dashboard, available at the Suppliers website. The Customer can log into the dashboard and view the data that the Supplier has collected pertaining to the Customer.
- Given the volume of data processed by the Supplier and the open nature of the internet, it is not possible to identify every Incident against a customer. The Supplier endeavors to make the detection process as accurate and exhaustive as possible, but it is not possible to discover and identify every malicious Incident targeting the Customer.
- The Supplier will conduct algorithmic scanning across internet resources and assess whether each Incident scanned poses a threat to the Customers brand. This assessment is conducted using a combination of machine learning based algorithms and manual intervention by a PhishFort analyst. This process occurs entirely on Computer Systems operated by the Supplier. Some examples of the data sources that are scanned include but are not limited to:
- Website and Domain Name Monitoring:
- Website and Domain Blocklisting and Takedown
- Where the Supplier confirms an Incident is malicious and identifies phishing activities pursuant to the Services described under section 4 above, and has identified the Phisher to an extent that makes the following possible, the Supplier shall perform the following steps pursuant to blacklisting the Confirmed Incident within 48 hours following detection by the Supplier:
- Submit the Incident into blacklists owned by the Supplier which are made publicly available on the Supplier’s source code repository;
- Report the Incident to third party blacklists including those maintained by Google, Microsoft and Symantec;
- Report the Incident to the provider hosting the Incident, such as the domain registrar and hosting provider for websites, the relevant app store for apps, and social media platform for social media incidents. The responsiveness of the provider will differ on a case by case basis.
- Where the Supplier confirms an Incident is malicious and identifies phishing activities pursuant to the Services described under section 4 above, and has identified the Phisher to an extent that makes the following possible, the Supplier shall perform the following steps pursuant to blacklisting the Confirmed Incident within 48 hours following detection by the Supplier:
Given the number of third parties involved in the process that are outside the Suppliers control, the Supplier cannot make guarantees about either the period of time that it will take or the likelihood of success.
- In cases in which the Supplier cannot for whatever reason blacklist a website, the Supplier may proceed to initiate a website takedown. This involves contacting the hosting provider of the website and notifying them that they are hosting a phishing website and requesting that they take it down. The hosting provider is legally obliged to remove content involved in illegal activity, but the responsiveness of the hosting provider differs on a case by case basis. Given the number of third parties involved in this process that are outside the Suppliers control, the Supplier cannot make guarantees about either the effectiveness or the period of time that this will take.
- The Supplier will endeavor to blacklist the identified malicious and/or phishing websites into Google Safe Browsing within the shortest time frame possible. The Supplier commits to ensuring that over the course of a month, the median time to insert a website into the Google Safe Browsing service will be 24 hours. In order for this condition to be triggered, there should be a minimum of ten websites that were blacklisted by the Supplier over the period of a month. In the event that at least ten websites were blacklisted over the period of a month and the median time to blacklist the websites is over 24 hours, the Supplier’s fee for the month will be halved. For example, if the fees owed to the Supplier for the service were $10 per month and the Supplier failed to meet a 24 hour median blacklist time, and there were at least 10 websites blacklisted by the Supplier over the course of the month, the fees owed to the Supplier for the month would be $5.
- App Store Services
- App Store Monitoring:
- The Supplier will periodically search the Google Play Store and Apple App Store in order to identify apps that may exist on the store and which impersonate the Customer’s brand with the intent of harvesting customers private keys or credentials;
- Unofficial third party Android or iOS App Store Websites not maintained by Google or Apple are within the scope of the App Store Screening process; and
- App store Takedown
- Mobile applications which are discovered on a store to be impersonating the Customer and which demonstrably intend to harvest user credentials, private keys, or attempt to sufficiently imitate the brand of the Customer will be reported to the respective store.
- The Google Play Store, Apple iOS store, and third party app stores are not managed or controlled by the Supplier and as such, the Supplier cannot make guarantees about either the effectiveness or the period of time that the takedown process will take.
- Given the number of third parties involved in this process that are outside the Suppliers control, the Supplier cannot make guarantees about either the effectiveness of the takedown procedure or the period of time that this will take.
- App Store Monitoring:
- Social Media Services
- Social Media Monitoring
- The Supplier will conduct algorithmic and manually conducted scanning across several social media platforms in order to identify cybersecurity threats to the Customers brand. This assessment is conducted using a combination of machine learning based algorithms and manual intervention by a PhishFort analyst. This process occurs entirely on Computer Systems operated by the Supplier. Some examples of the data sources that are scanned include but are not limited to:
- Facebook;
- Twitter;
- LinkedIn; and
- YouTube
- The Supplier seeks to identify social media accounts that aim to cause damage to the Customer by looking to commit fraud against the Customer’s user base. In this case, fraud means:
- Phishing; and
- Taking actions to steal money, usernames and passwords, personal information, and/or information which should otherwise be kept private and confidential by the user.
- Given the independent nature of the platforms listed in the paragraph above, the Supplier cannot make any guarantees around the reliability of the detection of fraud, takedown efficacy and/or the continued monitoring of these platforms. For example, changes to a platform that could impact the Suppliers ability to provide the service include but are not limited to changes to the platform’s Terms of Use, changes to programmatic access to the platform through Application Programming Interfaces, or changes made to the search algorithm on the platform. These and other such changes may impact the Suppliers ability to monitor these platforms.
- Account impersonation involves a third party creating an account on a social media platform that impersonates the Customer or a Customer’s representative. When the Supplier discovers a case of account impersonation, the Supplier will attempt to initiate a takedown according to the procedure below.
- The Supplier will conduct algorithmic and manually conducted scanning across several social media platforms in order to identify cybersecurity threats to the Customers brand. This assessment is conducted using a combination of machine learning based algorithms and manual intervention by a PhishFort analyst. This process occurs entirely on Computer Systems operated by the Supplier. Some examples of the data sources that are scanned include but are not limited to:
- Social Media Monitoring
- Social Media Takedown
- Social media takedown involves reporting a malicious account or user generated content to the platform that it was posted on. This process involves following the abuse report procedure outlined independently by each platform respectfully. In general, this involves providing evidence of the malicious activity conducted by the account or proof that the account has impersonated the identity of the Customer.
- Each platform has internal processes for handling abuse reports on their platform and acts in accordance with these. The Supplier will report malicious incidents discovered to the respective platform in line with their abuse reporting process. The amount of time taken for the respective platform to review and action these incidents varies and because this is beyond the control of the Supplier, the Supplier cannot make any guarantees around the timing of this process.
- In some cases, the social media platform may choose to reject the abuse report and decide not to take action on limiting the infringing account or content. In this case, the Supplier will contest this decision if possible. If the Supplier is unable to contest the social media platform’s decision, the Supplier may resubmit the abuse report.
- If the social media platform decides not to take action against the infringing account or content in question and the Supplier has attempted to contest or resubmit the abuse report, the infringing account or content in question may be deemed a Failed Takedown. In this case, the Supplier cannot take further action against the infringing account or content and has no influence over the internal processes conducted by the relevant social media platform. The Supplier is not responsible for any harm or damage caused to the Customer in these cases and the Customer understands that the content or account will remain active in these cases.
- Legal Takedowns
- In the course of providing the monitoring services detailed above, the Supplier may detect domains and/or websites and/or social media accounts which are infringing on the Customer’s trademark and/or copyright rights.
- The Supplier will act on behalf of the Customer and follow the relevant legislated processes for contacting and notifying the owner of the infringing site and/or the applicable host provider. The responsiveness of the host provider, infringer, and any other relevant third party differs on a case by case basis. Given the number of third parties involved in this process that are outside the Suppliers control, the Supplier cannot make guarantees about either the effectiveness or the period of time that it will take to have an incident finalized.
- The Supplier commits to addressing incidents of trademark and/or copyright infringement within 24 hours of becoming aware of any incidents.
6. Confidentiality
Both parties agree to treat all non-public information as confidential and not disclose it to third parties unless required by law. Confidentiality further details described in the Service Agreement.
7. Term and Termination
This Agreement remains in effect as long as the Partner uses PhishFort’s Services or until terminated by either party in accordance with the Service Agreement termination terms signed by the parties.
8. Compliance with Laws
Partner is responsible for ensuring that use of the Services complies with all applicable laws, including privacy, data protection, and intellectual property laws.
9. Modifications
We may update this Agreement with 90 days’ notice. Continued use of the Services after such notice constitutes acceptance of the revised terms.
10. Governing Law and Dispute Resolution
This Agreement is governed by the laws of the country described in the Service Agreement signed. Any disputes shall be resolved through arbitration, unless injunctive relief is required. The dispute procedure is also described in the Service Agreement executed by the parties.