Definitions
“We”, “us” and “our” refer to the authors and publishers of this site and its content. “You” and “your” refer to any individual or organisation that accesses, reads, or otherwise makes use of these assessments.
Sources and independence
These assessments are drawn from a variety of public and proprietary sources. Nothing in these assessments constitutes an endorsement of any external views, opinions, organisations, or any of the sources referenced or cited herein.
No warranty
These assessments are provided “as is” and without any warranty of any kind, whether express or implied, including but not limited to any implied warranty of accuracy, completeness, fitness for a particular purpose, or non-infringement.
Your own inferences
Any conclusions, inferences, or decisions that you draw or make on the basis of these assessments are entirely your own. We accept no responsibility for how you interpret or apply this content.
Limitation of liability
To the fullest extent permitted by applicable law, we disclaim any and all liability, whether direct, indirect, consequential, or otherwise, arising from or in connection with your access to, receipt of, or reliance upon these assessments.
Independent assessment required
These assessments do not constitute professional, legal, or operational advice. You should always conduct your own independent assessment, taking into account your specific operational and technology context, risk appetite, and applicable threat and vulnerability profile.
By continuing to use this site you acknowledge that you have read and understood this disclaimer.