Unified Legal Suite
This single document bundles: (A) Privacy + Cookie + Security + Blockchain Governance (“Mega‑Policy”), (B) Terms of Use, and (C) Warranty & Liability. It applies to realist8pro.com, invictuspro.pro, landlord-crm.com, maint-mgr.com and any present or future domains, subdomains, products, or services powered by the Invictus NGIN Core.
Table of Contents (click to expand/collapse)
- A. Mega‑Policy: Privacy • Cookies • Security • Blockchain
- Scope & Layered Architecture
- Core Privacy Principles
- What We Collect
- How We Use Data
- No Sale of Personal Information
- Data Isolation & Multi‑Tenant Security
- Security, Encryption & Key Management
- Cookies & Similar Technologies
- Operational Telemetry & Platform Analytics
- Your Privacy Rights
- Blockchain Governance
- Retention & Deletion
- Vendors & Sub‑Processors
- International Data Transfers
- Children’s Data
- Changes to this Policy
- Contact
- Legal Notices (Warranty, IP & Liability)
- B. Terms of Use
- C. Warranty & Limitation of Liability
A) Mega‑Policy: Privacy • Cookies • Security • Blockchain
This integrated policy covers our public marketing sites and our enterprise SaaS platform.
1) Scope & Layered Architecture (Marketing Sites vs. Enterprise SaaS)
Public Marketing Sites: Our websites are rendered using secure AI‑assisted static rendering for informational and lead‑capture purposes. They operate independently from the enterprise SaaS network and collect only limited data through voluntary forms and essential analytics cookies.
Enterprise SaaS Platform: The Realist8Pro service runs in isolated, containerized, multi‑tenant environments (e.g., Kubernetes). Each customer’s data is logically isolated to a unique database schema/instance, with per‑tenant encryption and strict role‑based access controls (RBAC). Data flows only to entities you authorize (your customers, clients, tenants, vendors, and employees).
2) Core Privacy Principles
- Privacy by Design & Default
- Data Ownership (you own your SaaS tenant content)
- No Data Selling
- Least Privilege access controls
- Transparency via logs, audit trails, admin dashboards
3) What We Collect
A. Marketing Sites — contact details you submit; device/usage information via cookies (see Cookies).
B. Enterprise SaaS — account/user profiles; role/permission settings; operational data you create (e.g., work orders, communications, uploads); system logs and security events.
Important: Sensitive company content remains within your tenant’s database/storage. We do not mine customer content for advertising and we do not sell it.
4) How We Use Data
- Operate the platform and fulfill our contract
- Secure, monitor, and improve reliability
- Provide support and resolve incidents
- Comply with law and enforce terms
Demonstrations, Marketing & Trade Shows. From time to time, Invictus may create or present product demonstrations, marketing materials, or trade show exhibits using anonymized, synthetic, or simulated data. We do not disclose or use any identifiable customer information for these purposes without explicit written consent. Where client case studies are referenced, they are either publicly available or published only with permission. Any analytics, usage metrics, or aggregated insights shared externally are de-identified and cannot be traced to individual users, companies, or tenant accounts.
5) No Sale of Personal Information
We do not sell personal information. If practices change, we will provide clear notice and legally required choices first.
6) Data Isolation & Multi‑Tenant Security
- Per‑Tenant Databases with containerized runtime separation
- Network Segmentation and least‑privilege ingress/egress
- Zero‑Trust service identities and mutual TLS where applicable
- Access Control: SSO/JWT, RBAC, MFA (where enabled)
7) Security, Encryption & Key Management
- In Transit: TLS 1.2+; mTLS intra‑cluster where used
- At Rest: AES‑256 class encryption for databases, object storage, and backups
- Keys & Secrets: secured in KMS/vault with rotation and auditing
- Backups & DR: encrypted backups; periodic DR testing
8) Cookies & Similar Technologies
We use cookies and similar technologies on the marketing sites for essentials, preferences, performance/analytics, and limited marketing attribution. The Enterprise SaaS primarily uses essential cookies (session/auth) and necessary local storage.
Control: Manage non‑essential cookies via our banner (where provided) or your browser. Disabling essential cookies may affect functionality.
Categories:
- Strictly Necessary (security, session, load balancing)
- Preferences (language, UI)
- Analytics (aggregated usage metrics; IPs truncated/pseudonymized where supported)
- Marketing (limited attribution on marketing sites only)
9) Operational Telemetry & Platform Analytics
We collect pseudonymized metrics/logs (e.g., response times, error rates, container health, DB latency, queue depth, feature flags) and minimal event metadata (route names, anonymized IDs, timestamps). Content is not used for ads and not sold. Aggregation and de‑identification are applied where feasible; tenant audit trails are available upon request.
10) Your Privacy Rights (GDPR/CCPA/CPRA et al.)
- Access, correction, deletion, portability (subject to authentication)
- Objection/restriction where applicable
- Controller vs. Processor: for SaaS tenant data, you are typically the Controller; we act as Processor under a DPA
11) Blockchain Governance
- Purpose: tamper‑evident proofs of events (e.g., milestones, document hash attestations) without publishing content
- Hashing Logic: event digests (e.g., SHA‑256/512); no raw PII or proprietary content written on‑chain
- Validator Anonymity: validators run behind hardened infrastructure; logs retain technical IDs, not personal data
- On‑Chain Minimization: only necessary cryptographic proofs are anchored; all content remains off‑chain
- Retention: on‑chain proofs are durable; off‑chain records follow tenant retention. Deletions remove off‑chain data and disassociate linkages; hashes alone cannot reconstruct content
12) Retention & Deletion
We retain data only as long as needed for the stated purposes, to comply with obligations, or as required by contract. Upon termination or request, we delete or return data per the DPA and securely purge backups following their rotation window.
13) Vendors & Sub‑Processors
We use vetted infrastructure and services (hosting, storage, email/SMS, monitoring). Each is bound by data protection obligations appropriate to their role. A current list is available upon request.
14) International Data Transfers
Where cross‑border transfers occur, we implement appropriate safeguards (e.g., DPAs with SCCs). We have not appointed an EU/UK representative at this time; inquiries should be directed to the Contact section.
15) Children’s Data
Our services are business‑focused and not directed to children. We do not knowingly collect personal information from children under 16.
16) Changes to this Policy
We may update this policy to reflect operational, legal, or regulatory changes. Material changes will be announced via the sites or in‑product notices.
17) Contact
Invictus / Realist8Pro
5021 Verdugo Way, STE 105-126, Camarillo CA 93012
Email: privacy@realist8pro.com (example) | Phone: (805) 200‑5304
Operational Headquarters: Global operations based at the above address.
EU/UK Representative: Not appointed at this time.
State of Incorporation / EIN: Reserved—details on file and available upon request where legally required.
18) Legal Notices (Warranty, IP & Liability)
Warranty Disclaimer. THE SERVICES ARE PROVIDED “AS IS” AND “AS AVAILABLE.” TO THE MAXIMUM EXTENT PERMITTED BY LAW, WE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE, AND NON‑INFRINGEMENT.
Limitation of Liability. TO THE MAXIMUM EXTENT PERMITTED BY LAW, OUR TOTAL LIABILITY FOR ALL CLAIMS ARISING OUT OF OR RELATED TO THE SERVICES SHALL NOT EXCEED THE FEES PAID BY YOU FOR THE SERVICES DURING THE NUMBER OF DAYS THE ISSUE PERSISTED, PRO‑RATED FROM YOUR THEN‑CURRENT SUBSCRIPTION (ILLUSTRATIVE CAP: FEES PAID IN THE 30 DAYS PRECEDING THE EVENT). IN NO EVENT SHALL WE BE LIABLE FOR INDIRECT, INCIDENTAL, SPECIAL, CONSEQUENTIAL, COVER, PUNITIVE, OR EXEMPLARY DAMAGES, OR FOR LOST PROFITS, REVENUE, DATA, OR GOODWILL, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
User Responsibility. YOU ARE RESPONSIBLE FOR YOUR CONTENT, DATA, COMMUNICATIONS, AND COMPLIANCE WITH LAWS. WE ARE NOT RESPONSIBLE FOR HOW YOU CONFIGURE ROLES, PERMISSIONS, OR INTEGRATIONS, NOR FOR CONTENT SUPPLIED BY YOU OR YOUR AUTHORIZED USERS (CUSTOMERS, CLIENTS, TENANTS, VENDORS, EMPLOYEES).
Intellectual Property. The Invictus / Realist8Pro software, design, and underlying architecture constitute proprietary intellectual property. Nothing in this Policy grants any license or ownership right beyond the limited use rights granted under your subscription agreement. Reverse engineering, copying, scraping, or creating derivative works of the platform, schemas, or visual design is strictly prohibited.
Anti‑Scraping Enforcement. Unauthorized attempts to capture, replicate, or reverse engineer any aspect of the system—including via bots, scripts, automated tools, browser extensions, AI models, or screenshots—constitute a breach of the Terms of Use and may result in immediate termination and legal action. Forfeiture & Liquidated Damages apply as described in Section 8A of the Terms of Use.
B) Terms of Use
These Terms apply to realist8pro.com, invictuspro.pro, landlord-crm.com, maint-mgr.com and any current or future Invictus NGIN Core sites.
1. Acceptance
By accessing or using the websites or services (“Services”), you agree to these Terms. If you use the Enterprise SaaS, your Master Subscription Agreement (MSA) and Data Processing Addendum (DPA) govern in case of conflict.
2. Accounts & Roles
You are responsible for safeguarding credentials and configuring roles/permissions for your users (customers, clients, tenants, vendors, employees).
3. Permitted Use
Use the Services in compliance with law, refrain from security testing without authorization, and avoid infringing or harmful content.
4. Ownership
You own your input data and content. Invictus owns the Services, software, and brand assets.
5. Privacy
Our integrated Mega‑Policy describes how we handle information. We do not sell personal information.
Demonstrations & Marketing Data. You acknowledge that Invictus may present demonstrations or marketing showcases using anonymized or synthetic data. Invictus will never disclose identifiable client data for promotional purposes without prior written authorization.
6. Availability
We strive for high availability but do not guarantee uninterrupted service. Maintenance windows and emergencies may occur.
7. Intellectual Property & Restrictions (No Reverse Engineering)
All software, source code, algorithms, designs, user interfaces, workflows, databases, and documentation made available through the Invictus / Realist8Pro platforms are and shall remain the exclusive property of Invictus Management Holdings Corp (“Invictus”). You are granted a limited, non-exclusive, non-transferable, revocable right to access and use the Services for your internal business operations in accordance with these Terms.
You may not, and shall not permit any third party to, directly or indirectly: (a) copy, reproduce, modify, adapt, translate, or create derivative works from the Services or any component thereof; (b) reverse engineer, decompile, disassemble, or otherwise attempt to derive or discover the source code, underlying ideas, algorithms, file formats, or non-public APIs of the Services; (c) use the Services to develop a competing product or service; (d) remove, alter, or obscure any proprietary notices or branding contained in the Services; or (e) resell, sublicense, rent, lease, or otherwise make the Services available to any third party except as expressly authorized in writing by Invictus.
All rights not expressly granted are reserved. Any unauthorized use constitutes a material breach and may result in termination of access, injunctive relief, and pursuit of all remedies available under law.
8. Anti‑Scraping, Copying, and Circumvention
You agree that you will not, and will not enable or permit any third party to:
- use automated systems, bots, scripts, browser extensions, AI models, or any other code to capture, copy, screenshot, or scrape any portion of the Services, code, or user interface;
- access or attempt to access source code, server logic, or data structures by any means other than through authorized user interfaces or documented APIs;
- circumvent, disable, or interfere with any security, encryption, or access control technology used by the Services; or
- reproduce or publicly display the Services, code, or interface for any purpose other than legitimate use of the platform under your subscription.
Any violation of this Section constitutes immediate cause for account termination and may subject the violator to civil and criminal penalties under applicable law, including the Computer Fraud and Abuse Act (18 U.S.C. § 1030) and the Digital Millennium Copyright Act (17 U.S.C. § 1201).
Invictus reserves the right to disable or delete any account engaged in such activity and to pursue all legal and equitable remedies, including injunctive relief and recovery of damages, costs, and attorneys’ fees.
8A. Forfeiture of Funds & Liquidated Damages
Any user, organization, or agent found—through automated detection, system telemetry, or manual investigation—to have engaged in, assisted, or attempted any prohibited activity described in the “Intellectual Property & Restrictions” or “Anti‑Scraping, Copying, and Circumvention” sections shall immediately forfeit all rights to refunds, credits, or offsets for fees previously paid. Such amounts shall be deemed partial compensation for investigative and remediation costs.
In addition, such conduct shall constitute a material breach entitling Invictus Management Holdings Corp (“Invictus”) to seek liquidated damages in an amount no less than ten (10) times the subscription value of the current annual term or USD $100,000 — whichever is greater — representing a good‑faith pre‑estimate of harm resulting from loss of trade‑secret protection, data contamination, and reputational injury.
The parties agree that this sum is reasonable in light of the anticipated difficulty of proving actual damages and is not a penalty. Nothing herein limits Invictus’s right to recover additional actual damages or injunctive relief. All claims shall be brought exclusively in the courts of competent jurisdiction located in Ventura County, California, USA.
9. Warranty & Liability
The Services are provided “as is.” Our liability is limited as described in the Mega‑Policy. We are not responsible for your configurations or content.
10. Termination
We may suspend/terminate for breach or risk. Upon termination, we will handle your data per the DPA/MSA.
11. Governing Law
California law and U.S. federal law govern, without regard to conflict of laws. Venue: Ventura County, California, unless otherwise agreed.
12. Contact
Invictus / Realist8Pro, 5021 Verdugo Way, STE 105-126, Camarillo CA 93012
C) Warranty Disclaimer & Limitation of Liability
Warranty Disclaimer
THE SERVICES ARE PROVIDED “AS IS” AND “AS AVAILABLE,” WITH NO WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE, OR NON‑INFRINGEMENT.
Limitation of Liability
TO THE MAXIMUM EXTENT PERMITTED BY LAW, OUR TOTAL LIABILITY FOR ALL CLAIMS ARISING OUT OF OR RELATED TO THE SERVICES SHALL NOT EXCEED THE FEES PAID BY YOU FOR THE SERVICES DURING THE NUMBER OF DAYS THE ISSUE PERSISTED, PRO‑RATED FROM YOUR THEN‑CURRENT SUBSCRIPTION (ILLUSTRATIVE CAP: FEES PAID IN THE 30 DAYS PRECEDING THE EVENT). IN NO EVENT SHALL WE BE LIABLE FOR INDIRECT, INCIDENTAL, SPECIAL, CONSEQUENTIAL, COVER, PUNITIVE, OR EXEMPLARY DAMAGES, OR FOR LOST PROFITS, REVENUE, DATA, OR GOODWILL, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
User Responsibility
YOU ARE RESPONSIBLE FOR YOUR CONTENT, DATA, AND COMPLIANCE. WE ARE NOT LIABLE FOR: (A) CONFIGURATION OF ROLES, PERMISSIONS, OR INTEGRATIONS; (B) CONTENT YOU OR YOUR USERS PROVIDE; OR (C) MISUSE OF THE SERVICES. SEE ALSO THE “INTELLECTUAL PROPERTY & RESTRICTIONS” AND “ANTI‑SCRAPING” SECTIONS IN THE TERMS OF USE.
Non‑Excludable Rights
Nothing limits liability that cannot be limited under applicable law.
© 2025 Invictus / Realist8Pro • Applies to realist8pro.com, invictuspro.pro, landlord-crm.com, maint-mgr.com and any present or future domains or subdomains powered by the Invictus NGIN Core. In case of conflict, your MSA/DPA controls.
This policy governs all Invictus-NGIN powered systems, platforms, and SaaS derivatives, including but not limited to Realist8Pro, InvictusPro, Landlord-CRM, and Maint-Mgr.
