Terms and Conditions
Last Updated: October 2025
Welcome to XposedOrNot!
These terms explain how you can use our service and what we expect
from you. We've written them in plain English to make them easy to
understand. For details on how we handle your data, visit our
Transparency Report.
1. Agreement to Terms
By accessing or using XposedOrNot (including this
website, our API, mobile applications, or any related services), you
enter into a binding agreement and accept these terms in full. If
you disagree with any part of these terms, you must discontinue use
of our service immediately.
We reserve the right to modify these terms periodically to reflect
changes in our services, legal requirements, or operational
practices. When we make significant changes that materially affect
your rights or obligations, we'll post a prominent notice on the
website at least 14 days before the changes take effect. Your
continued use of our service after such changes become effective
constitutes your acceptance of the modified terms.
2. What We Provide
XposedOrNot is a comprehensive data breach
monitoring and alerting service designed to help individuals and
organizations stay informed about data security incidents. Our
service includes:
-
Email breach lookups that allow you to check if your email address
has appeared in any known data breaches in our database
-
Continuous monitoring for new breaches affecting your email
address or your organization's verified and validated domains
-
Automated alerts delivered via email when your information appears
in newly discovered or reported breaches, enabling you to take
timely protective action
-
Comprehensive breach information including affected data types,
breach dates, and security insights to help you understand the
scope and impact
-
API access for programmatic integration, allowing developers and
organizations to incorporate breach data into their own security
workflows and applications
-
Domain monitoring tools for organizations to track breach exposure
across their entire email infrastructure
We offer both free community tools accessible to everyone and
premium features with enhanced capabilities. The availability of
specific features depends on your service level, with premium
subscriptions providing additional functionality, higher rate
limits, and priority support.
3. Your Account and Responsibilities
Certain features of our service, including email alerts, domain
monitoring, and premium tools, require you to create an account.
When you register and use an account, you accept the following
responsibilities:
-
Provide accurate, current, and complete information during the
registration process, and maintain the accuracy of this
information throughout your use of the service. This includes
keeping your contact email address up to date.
-
Maintain the security and confidentiality of your account
credentials, particularly API keys if you use our API services.
Treat these credentials as sensitive and never share them publicly
or embed them in client-side code.
-
Refrain from sharing your account access with others or allowing
unauthorized use of your account. Each account is intended for use
by a single individual or organization as specified during
registration.
-
Accept full responsibility for all activities that occur under
your account, whether or not you personally authorized such
activities. You are accountable for any actions taken using your
credentials.
-
Notify us immediately at
deva[@]xposedornot.com if you suspect any
unauthorized access to your account, discover your API keys have
been exposed, or become aware of any security breach related to
your account.
4. Acceptable Use
To maintain a safe, fair, and legal service for all users, you agree
NOT to engage in the following activities:
-
Use the service for any illegal purpose, to facilitate unlawful
activities, or to cause harm to others. This includes using breach
data for harassment, extortion, or unauthorized access to
accounts.
-
Attempt to access data you're not authorized to view, including
trying to bypass access controls, authentication mechanisms, or
privacy protections.
-
Scrape, harvest, or collect breach data in bulk without explicit
written permission. Automated bulk collection violates our terms
and places undue strain on our infrastructure.
-
Intentionally overload our systems, attempt denial-of-service
attacks, or engage in any activity designed to disrupt service
availability for other users.
-
Resell, redistribute, or sublicense our breach data without
explicit written authorization. Commercial use of our data
requires a proper licensing agreement.
-
Use automated tools, scripts, or bots to abuse our free tier
services or circumvent rate limits, API restrictions, or usage
quotas.
-
Impersonate other users, organizations, or
XposedOrNot staff, or misrepresent your
affiliation with any entity.
-
Upload malware, viruses, malicious code, or any content designed
to compromise the security of our service or other users.
-
Engage in activity that violates the privacy rights of individuals
whose information appears in breach data, including using the data
for unsolicited marketing or spam.
We reserve the right to suspend or terminate accounts that violate
these rules, and we may report serious violations to law enforcement
authorities when appropriate. While our codebase is open source and
available for review, our infrastructure, data, and services remain
subject to these acceptable use restrictions.
5. API Usage
Our API provides programmatic access to breach data for developers
and organizations. If you use our API, you must comply with these
additional requirements:
-
Strictly adhere to the rate limits specified in our API
documentation. These limits are in place to ensure fair access and
system stability for all users
-
Do not attempt to circumvent usage restrictions, rate limits, or
access controls through technical means such as using multiple API
keys, rotating IP addresses, or any other method
-
Provide clear attribution to XposedOrNot when
displaying our breach data in your applications, websites, or
services. This helps users understand the source of the
information
-
Understand that we may modify API endpoints, adjust rate limits,
or change available features with reasonable advance notice to
maintain service quality and security
-
Be aware that certain premium API features with higher rate limits
or additional functionality may require a paid subscription
6. Intellectual Property
XposedOrNot is an open-source project, and we
actively encourage community participation and contributions.
However, certain intellectual property rights are retained:
-
Our source code is publicly available on GitHub and is licensed
under the terms specified in the repository. You are free to
review, modify, and contribute to the code in accordance with that
license.
-
The XposedOrNot name, logo, branding elements,
and visual design are our intellectual property and may not be
used without permission to create competing services or in ways
that could cause confusion about affiliation or endorsement.
-
Breach data in our database comes from various public sources and
is aggregated for the public benefit. While the underlying breach
data is not our creation, our database compilation, organization,
and presentation represent substantial effort and investment.
-
You may not claim ownership of our service, rebrand it as your
own, or create substantially similar services using our brand
identity in a manner that causes marketplace confusion.
-
As an open-source project, we welcome forks and derivative works
of our code, provided they comply with our software license and do
not misuse our trademarks or brand identity.
7. Privacy and Data
Your privacy is fundamental to our service. We believe in complete
transparency about how we handle your personal information and have
designed our systems with privacy as a core principle:
-
We collect only the minimum data absolutely necessary to provide
our service effectively. We do not collect extraneous information
or data that doesn't serve a direct purpose for the functionality
you're using.
-
We never sell your personal information to third parties, data
brokers, or advertisers. Your privacy is not for sale, and your
data will not become a revenue stream.
-
Search queries are processed in memory and are not stored in any
identifiable form that could be linked back to you. We do not
maintain logs of what email addresses you search for.
-
Email alert subscriptions require us to store your email address
so we can send you notifications. You maintain full control and
can unsubscribe at any time through the link in every alert email
or through your account settings.
-
For domain monitoring features, organizations that verify domain
ownership receive breach information for email addresses within
those domains. This is done with proper authorization and serves
the legitimate security interests of the organization.
-
Read our comprehensive
Privacy Policy and
Transparency Report
for complete details on our data collection practices, security
measures, and legal compliance.
8. Accuracy and Limitations
Important Notice: While we make every reasonable
effort to provide accurate and timely information, our service
operates within inherent limitations that all users should
understand before relying on our data.
-
We can only report on data breaches that have been publicly
disclosed or that we have received through our sources. Many
breaches remain unreported, undiscovered, or are kept confidential
under legal agreements. The absence of a result does not mean your
data has never been compromised.
-
Breach data may be incomplete, outdated, or contain inaccuracies
inherited from the original source. We aggregate data from various
sources, and we cannot guarantee the completeness or accuracy of
every data point.
-
While we verify major breaches, we do not have the resources to
independently verify every single data breach reported in our
system. We rely substantially on the security research community
and public disclosures.
-
A search result showing no breaches does not guarantee that your
information has never been compromised. It only indicates that we
have no record of breaches affecting the searched identifier in
our current database.
-
Our service is designed to be one tool in your overall security
strategy, not a complete security solution. You should employ
multiple security measures including using strong, unique
passwords for each account, enabling two-factor authentication
wherever available, and using a reputable password manager to
securely store your credentials.
9. No Warranties
Our service is provided on an "as is" and "as available" basis
without warranties of any kind, whether express or implied,
including but not limited to warranties of merchantability, fitness
for a particular purpose, or non-infringement. Specifically, we do
not guarantee:
-
That the service will be available at all times, be uninterrupted,
or operate without errors. Maintenance, technical issues, or
circumstances beyond our control may cause temporary disruptions.
-
That all data breaches affecting your information will be
detected, reported, or included in our database. Our coverage
depends on public disclosure and source availability.
-
That the information provided is 100% accurate, complete, current,
or free from errors. Data quality depends on our sources and the
inherent challenges of breach data aggregation.
-
That using our service will prevent future security incidents,
identity theft, or unauthorized access to your accounts. Our
service is informational and does not provide active protection.
While we strive to provide a reliable and useful service, technology
has inherent limitations and unexpected issues can occur despite our
best efforts.
10. Limitation of Liability
To the maximum extent permitted by applicable law, our liability is
limited as follows:
-
We are not liable for any indirect, incidental, consequential,
special, or punitive damages arising from your use of the service,
including but not limited to loss of profits, data, business
opportunities, or reputation.
-
We are not responsible for damages resulting from service outages,
interruptions, data inaccuracies, incomplete breach coverage, or
unauthorized access to accounts that results from your failure to
maintain security.
-
We are not liable for actions you take or fail to take based on
information obtained through our service. You are solely
responsible for how you respond to breach notifications and
security information.
-
These limitations apply regardless of the legal theory on which
your claim is based, whether contract, tort, negligence, strict
liability, or otherwise.
These limitations do not affect any mandatory consumer rights you
may have under applicable law that cannot be contractually waived or
limited. Some jurisdictions do not allow certain liability
exclusions, so some of these limitations may not apply to you.
11. Premium Services and Payments
We offer premium features and subscriptions that provide enhanced
functionality, higher rate limits, and additional tools. The
following terms apply to all paid services:
-
All pricing information is displayed transparently before
purchase, including any applicable taxes or fees. You will always
know the exact cost before completing a transaction.
-
Subscriptions automatically renew at the end of each billing
period (monthly, annually, etc.) using your payment method on
file, unless you cancel before the renewal date.
-
You may cancel your subscription at any time through your account
settings. Cancellation takes effect at the end of the current
billing period, and you will retain access to premium features
until that time.
-
Refund requests are evaluated on a case-by-case basis. While we
aim to be fair and reasonable, refunds are not guaranteed and
depend on factors such as usage and the reason for the request.
-
We reserve the right to modify pricing for our services. Existing
subscribers will receive at least 30 days advance notice before
any price changes take effect, and you may cancel before the new
pricing applies.
-
Failed or declined payments may result in immediate suspension of
premium features. You will be notified of payment issues and given
an opportunity to update your payment information.
12. Service Availability
While we strive to maintain reliable and consistent service
availability, there are important limitations to understand:
-
We may perform scheduled or emergency maintenance that temporarily
affects service availability. Where possible, we will provide
advance notice of planned maintenance windows.
-
We are not responsible for service downtime, degraded performance,
or interruptions caused by factors beyond our reasonable control,
including but not limited to internet outages, cloud provider
issues, DDoS attacks, or force majeure events.
-
You can monitor current service status and view historical uptime
data on our
Status Page, which provides real-time information about system health and
ongoing incidents.
-
We reserve the right to temporarily suspend service to specific
users who violate these terms, exhibit abusive usage patterns, or
pose a security risk to our infrastructure or other users.
-
While we work to maintain high availability, we do not guarantee
any specific uptime percentage or service level agreement (SLA)
for free tier users. Premium subscribers may have specific SLA
terms outlined in their subscription agreement.
13. Termination
You have the right to stop using our service at any time, for any
reason, without penalty:
-
You may close your account permanently through your account
settings. Account closure deletes your profile information, though
anonymized usage data may be retained for statistical purposes.
-
You can unsubscribe from email alerts at any time using the
unsubscribe link included in every alert email, or by adjusting
your preferences in your account settings.
We also reserve certain rights regarding service termination and
account management:
-
We may suspend or terminate accounts that violate these terms,
engage in abusive behavior, or pose a security risk to our service
or other users. Where possible, we will provide notice and an
opportunity to remedy the violation.
-
We reserve the right to discontinue the service entirely, in whole
or in part, with reasonable advance notice to give users time to
export their data or make alternative arrangements.
14. Third-Party Services
Our service may contain links to, integrate with, or reference
third-party websites, services, or resources. Your interactions with
these third parties are governed by separate terms:
-
We are not responsible for the content, accuracy, availability,
privacy practices, or policies of third-party services. We do not
endorse or make any representations about third-party services
merely by linking to them.
-
Third-party services operate under their own independent terms of
service and privacy policies. You should review these documents
before using any third-party service.
-
Any data you share with third-party services is governed by their
privacy policies, not ours. We cannot control how third parties
handle your information.
-
You use third-party services at your own risk. We are not liable
for any damage or loss caused by your interactions with
third-party services accessed through or in connection with our
platform.
-
If you choose to integrate our service with third-party
applications or tools, you are responsible for ensuring such
integrations comply with both our terms and the third party's
terms.
15. Community Contributions
As an open-source project, we actively welcome and encourage
community contributions. If you choose to contribute to
XposedOrNot, the following terms apply:
-
You retain ownership and copyright of your original contributions.
We do not claim ownership of code, documentation, or other
materials you submit.
-
By contributing, you grant XposedOrNot and its
users a perpetual, worldwide, non-exclusive, royalty-free license
to use, modify, distribute, and incorporate your contribution into
the project under the project's open-source license.
-
You represent that you have the legal right to grant this license
and that your contribution does not infringe on the intellectual
property rights of others or violate any applicable laws.
-
Contributors should follow our contribution guidelines available
on GitHub, including code style conventions, documentation
requirements, and the pull request process.
-
We reserve the right to accept or reject contributions at our
discretion based on factors including code quality, alignment with
project goals, security considerations, and maintenance burden.
-
Contributors may be publicly credited for their work in release
notes, documentation, or project acknowledgments, though such
attribution is not guaranteed for all contributions.
16. Dispute Resolution
We believe most disputes can be resolved through open communication.
If you have concerns about our service, we encourage the following
process:
-
Contact us first at
deva[@]xposedornot.com
with a clear description of your issue. We respond to good-faith
inquiries and complaints promptly.
-
We will work with you in good faith to understand your concerns
and reach a fair resolution. Our goal is to address issues
constructively rather than through adversarial processes.
-
Most problems can be resolved through friendly, professional
communication. We value our community and want to maintain
positive relationships with our users.
-
If we cannot resolve a dispute through direct communication, you
may have legal recourse depending on your jurisdiction. These
terms do not waive any rights you have under applicable consumer
protection laws.
17. General Terms
The following general provisions govern these terms and your use of
the service:
-
Severability: If any provision of these terms is
found to be unenforceable or invalid by a court of competent
jurisdiction, that provision will be modified to the minimum
extent necessary to make it enforceable, or if modification is not
possible, it will be severed. The remaining provisions will
continue in full force and effect.
-
No Partnership: These terms do not create any
partnership, joint venture, employment, or agency relationship
between you and XposedOrNot. You have no
authority to bind us or make commitments on our behalf.
-
Assignment: We may assign or transfer these terms
and our rights and obligations to another entity in connection
with a merger, acquisition, corporate reorganization, or sale of
assets. You may not assign these terms without our prior written
consent.
-
Waiver: Our failure to enforce any provision of
these terms does not constitute a waiver of that provision or our
right to enforce it in the future. Waivers must be in writing to
be effective.
-
Entire Agreement: These terms, along with our
Privacy Policy and any other referenced policies, constitute the
entire agreement between you and
XposedOrNot regarding the service and supersede
all prior agreements or understandings.
-
Headings: Section headings are provided for
convenience only and do not affect the interpretation or meaning
of these terms.
18. Contact Us
Questions about these terms? Reach out to us through any of the
following channels:
Thank you for using XposedOrNot!
We're committed to helping you stay informed about data breaches
and protecting your online security. By working together as a
community, we can make the internet a safer place.