Tactical RMM
Terms of Service
Last updated: 03/10/2026
1. Acceptance of Terms
These Terms of Service (“Terms”) govern access to and use of the managed hosted version of Tactical RMM (the “Service”) provided by Amidaware Inc. (“Company”, “we”, “our”, or “us”).
By creating an account, accessing, or using the Service, you agree to be bound by these Terms.
If you do not agree to these Terms, you may not access or use the Service.
Use of the self-hosted version of the software is governed separately by the source-available licenses published in the project’s repository.
2. Description of Service
The Service provides a hosted Remote Monitoring and Management (RMM) platform that enables users to:
- monitor devices and infrastructure
- execute commands and scripts remotely
- deploy or update software
- collect system telemetry and diagnostics
- manage and administer remote systems
Because the Service enables direct administrative control of systems, it must only be used by individuals or organizations authorized to manage those systems.
3. Eligibility
You may only use the Service if you:
- are legally capable of entering into a binding agreement
- have authorization to manage the devices and systems you control using the Service
- comply with all applicable laws and regulations
Unauthorized access or control of devices using the Service is strictly prohibited.
4. Accounts
To use the Service, you must create an account.
You agree to:
- provide accurate registration information
- maintain the security of your credentials
- restrict account access to authorized personnel
- notify us immediately of any unauthorized access
You are fully responsible for all activity performed using your account, including actions taken by employees, contractors, or third parties.
5. Customer Responsibilities
You are solely responsible for:
- devices and infrastructure managed through the Service
- commands, scripts, deployments, and configuration changes
- ensuring that you have permission to manage any device
- compliance with privacy, surveillance, and data protection laws
- maintaining appropriate backups of managed systems
The Company does not supervise or validate administrative actions performed through the Service.
6. Remote Administration Responsibility
The Service enables remote administration of devices, including executing scripts, deploying software, modifying system configurations, and performing administrative tasks.
These capabilities may cause system failures, outages, data loss, or security incidents if used improperly.
All administrative actions executed through the Service are performed solely at the direction of the Customer.
The Company:
- does not review or approve commands or scripts
- does not validate deployments
- does not control the systems managed by Customers
You are fully responsible for all actions performed using the Service.
The Company shall not be liable for any damage to devices, systems, networks, or data resulting from actions executed through the Service.
7. Account Security and Credential Compromise
You are responsible for maintaining the security of:
- account credentials
- authentication tokens
- API keys
- administrator access
The Company is not responsible for damages caused by unauthorized access resulting from:
- compromised credentials
- phishing attacks
- malware
- inadequate security practices
- insider misuse
- failure to implement multi-factor authentication
If your account is compromised, you remain responsible for all actions performed through the account until access is revoked or credentials are reset.
The Company shall not be liable for damages caused by malicious actions executed through compromised accounts.
8. Managed Systems Disclaimer
The Service provides tools to manage devices and infrastructure that are not owned or controlled by the Company.
The Company does not:
- maintain backups of customer systems
- guarantee compatibility with your infrastructure
- validate scripts or commands
- ensure deployments will not disrupt systems
Customers are responsible for:
- testing scripts and deployments
- maintaining backups
- verifying compatibility
- implementing safeguards before executing administrative actions
The Company shall not be liable for damage, outages, configuration errors, or data loss affecting systems managed through the Service.
9. No Security Guarantee
The Service is not a security product and does not guarantee protection against:
- malware
- ransomware
- cyberattacks
- unauthorized access
- security breaches
Customers remain solely responsible for implementing appropriate cybersecurity measures.
10. Supply Chain and Mass Deployment Risk
The Service allows Customers to deploy commands, scripts, software updates, and configuration changes across multiple managed devices simultaneously.
The Customer acknowledges that these capabilities may enable actions affecting large numbers of systems, including automated deployments across entire environments.
The Company does not control, review, approve, or validate any deployment, script, or command executed through the Service.
The Customer is solely responsible for all actions performed using the Service, including automated or bulk operations affecting multiple devices.
The Company shall not be responsible or liable for any damages, security incidents, ransomware events, malware distribution, service outages, or operational disruptions resulting from:
- deployments initiated through the Service
- scripts or automation configured by the Customer
- actions performed by authorized users
- actions performed through compromised accounts
- third-party integrations or tools connected to the Service
Customers are responsible for implementing appropriate safeguards, including testing deployments, restricting administrative access, using multi-factor authentication, and maintaining appropriate security controls.
The Company does not assume responsibility for monitoring or preventing misuse of the Service by Customers or third parties.
Use of the Service for large-scale automated administration is performed entirely at the Customer’s own risk.
11. Acceptable Use
You may not use the Service to:
- access devices without authorization
- deploy malware or malicious software
- conduct illegal surveillance
- violate privacy laws
- disrupt networks or systems
- conduct illegal activity
Violation of this section may result in immediate suspension or termination of your account.
12. Fees and Payment
By subscribing to a paid plan, you agree to:
- pay all applicable fees
- provide valid billing information
- allow recurring charges where applicable
The Service is billed based on the number of managed endpoints associated with your account.
Charges are determined according to the applicable endpoint tier corresponding to the highest number of endpoints registered or managed through the Service at any point during the billing period.
The Company may automatically adjust the applicable billing tier if the number of managed endpoints associated with your account exceeds the limits of your current tier during a billing period, and the corresponding charges for that tier will apply.
Except where required by applicable law, all payments are final and the Company does not provide refunds or credits for any reason, including but not limited to:
- partial subscription periods
- unused services
- account cancellation
- service suspension or termination
- changes in endpoint count during a billing period
- plan changes or downgrades
You remain responsible for all charges incurred prior to cancellation of your account.
Failure to pay applicable fees may result in suspension or termination of your access to the Service.
13. Service Availability
We strive to provide reliable service but do not guarantee uninterrupted availability.
Service interruptions may occur due to:
- maintenance
- infrastructure failures
- software issues
- third-party service disruptions
- events beyond our control
The Service is provided on an “as available” basis.
14. Data
You retain ownership of your data.
You grant the Company a limited license to store and process data solely to operate and provide the Service.
15. Log Retention and Audit Records
The Service may generate operational logs, audit records, or activity history related to system usage.
The Company does not guarantee that logs or audit records will be retained indefinitely.
Logs may be deleted, rotated, or removed as part of normal system operation, maintenance, storage limitations, or security practices.
Customers are responsible for exporting, archiving, or retaining any logs required for their own compliance, auditing, or operational purposes.
The Company shall not be liable for damages, investigations, compliance failures, or legal claims arising from the absence, deletion, or unavailability of logs or historical records.
16. Intellectual Property
The Service and its underlying technology remain the property of Amidaware Inc..
These Terms grant you only a limited, non-exclusive, non-transferable license to access the hosted Service.
Use of the self-hosted software is governed separately by the source-available licenses published in the project repository.
17. Disclaimer of Warranties
The Service is provided on an “as is” and “as available” basis.
To the maximum extent permitted by law, the Company disclaims all warranties including merchantability, fitness for a particular purpose, reliability, accuracy, non-infringement, and uninterrupted availability.
Use of the Service is entirely at your own risk.
18. Limitation of Liability
To the maximum extent permitted by law, Amidaware Inc. and its affiliates shall not be liable for any damages arising from the use of the Service including but not limited to:
- system failures
- data loss
- service interruptions
- misconfiguration
- software deployment errors
- unauthorized access
- security incidents
This includes direct, indirect, incidental, consequential, special, and punitive damages including loss of profits, business interruption, or loss of data.
You acknowledge that the Service provides remote administrative control of systems, which inherently carries risk.
You assume full responsibility for all actions performed using the Service.
To the fullest extent permitted by law, the Company’s total liability shall not exceed the amount paid by you for the Service during the preceding twelve months.
19. Indemnification
You agree to indemnify, defend, and hold harmless the Company and its employees, affiliates, and partners from any claims, damages, losses, or expenses arising from:
- your use of the Service
- actions performed through your account
- devices or systems you manage
- violations of these Terms
- violations of applicable laws
20. Suspension and Termination
We may suspend or terminate your account if:
- you violate these Terms
- payment obligations are not met
- your use poses security or operational risks
- required by law
You may terminate your account at any time.
21. Modifications to the Service
We may modify, suspend, or discontinue the Service at any time without liability.
22. Changes to These Terms
We may update these Terms from time to time.
Continued use of the Service after updates constitutes acceptance of the revised Terms.
23. Arbitration and Class Action Waiver
Any dispute, claim, or controversy arising out of or relating to these Terms or the use of the Service shall be resolved through binding arbitration rather than in court, except where prohibited by law.
You agree that any dispute will be resolved on an individual basis and not as part of any class action, consolidated action, or representative proceeding.
You waive the right to participate in any class action lawsuit or class-wide arbitration against the Company.
Arbitration shall be conducted in accordance with the rules of the American Arbitration Association.
The arbitration shall take place in the State of California.
The arbitrator shall have exclusive authority to resolve any dispute relating to the interpretation, applicability, or enforceability of this arbitration agreement.
24. Governing Law
These Terms shall be governed by and interpreted in accordance with the laws of the State of Delaware, United States, without regard to conflict of law principles.