TraceFoundry Academy

Terms of Use

Last updated: 2026-03-12

1. Intellectual property and permitted use

TraceFoundry Academy maintains copyrights, trademarks, and other rights in its course materials, lab designs, and website content. You receive a limited, non-transferable license to use materials solely for internal learning within the organization that purchased access. You may not resell, publicly repost, or redistribute workbooks, recordings, or lab virtual machines without written permission. Where open-source components appear in labs, separate licenses govern those components and you must follow them. If you believe content infringes your rights, contact us with specific URLs, ownership evidence, and preferred resolution. We review good-faith notices promptly and may remove or replace materials when appropriate.

2. Feedback and derivative works

Suggestions you provide may be incorporated into future curriculum updates. Unless we sign a separate agreement, feedback is voluntary and does not create compensation obligations. You retain rights to your own internal runbooks and notes that do not copy our expressive content verbatim. When in doubt, treat summaries as your original wording.

3. Account access and suspension

We may suspend access for conduct that disrupts classes, jeopardizes lab safety, or violates acceptable use rules communicated at registration. Where feasible, we provide a short cure period for unintentional issues. You may stop using services at any time. Some programs involve prepaid seats; cancellation refunds follow the Refund Policy rather than this section.

4. Effect of termination

Upon suspension or completion, download rights for temporary materials expire unless expressly stated otherwise. Longer-term licenses, such as private workshop recordings, are described in your order details. Provisions that reasonably should survive—such as liability limits, intellectual property, and governing law—remain in effect.

5. What the service includes

We deliver digital forensics education, workshops, and related enablement for internal IT and security teams. Delivery formats include live online sessions, hybrid cohorts, and in-person labs when contracted. Unless explicitly purchased, we do not provide retained incident response services, on-call coverage, or expert testimony. We also do not guarantee outcomes of your internal investigations.

6. Scheduling, substitutions, and changes

Instructors may change because of availability; we ensure substitutes meet published competency profiles. Minor agenda adjustments to reflect tooling updates are normal and do not constitute breach. If a public cohort lacks minimum enrollment, we may merge sections or offer a new date. If neither works for you, refund options appear in the Refund Policy.

7. Acceptance and eligibility

By registering, you confirm that you are authorized to bind your organization or, for individual seats, that you meet prerequisite skill statements on the program page. You agree to follow classroom rules, including respectful behavior toward staff and other participants, and to use lab environments only for educational purposes.

8. Prerequisites and good-faith participation

Some modules assume familiarity with operating system administration or cloud consoles. If you are unsure, contact us before purchase so we can recommend a better starting point. Disruptive conduct, attempts to attack lab infrastructure beyond exercise scope, or sharing credentials may result in immediate removal without refund except where law requires otherwise.

9. Liability and disclaimers

Training is informational. We are not responsible for decisions your team makes during live incidents, vendor selections, or tooling configurations you apply afterward. To the fullest extent permitted under Republic of Korea law, our aggregate liability arising from these terms is limited to the fees you paid for the specific program giving rise to the claim during the twelve months before the event.

10. Indirect losses

We are not liable for lost profits, reputational harm, or consequential damages except where statute prohibits such exclusions. Some jurisdictions do not allow certain limitations; in those cases, limits apply only to the maximum permitted. You remain responsible for complying with workplace policies, privacy obligations, and quality standards that apply to your organization.

11. Governing law and disputes

These terms are governed by the laws of the Republic of Korea without regard to conflict-of-law rules. Courts in Seoul have exclusive jurisdiction, subject to mandatory consumer protections that may apply to individuals purchasing in a personal capacity. Before filing a claim, you agree to contact us with a concise description and desired outcome. Many issues resolve quickly with a short call or email thread.

12. User obligations and cooperation

You will provide accurate registration details, keep login credentials confidential, and notify us if credentials may have been exposed. You will not attempt to probe our production website beyond normal browsing, scrape attendee lists, or harvest personal data shared in class for unrelated marketing. You confirm that exports or examples you bring to coaching sessions are properly authorized for discussion and stripped of sensitive identifiers where possible.

Questions: welcome@join-netcore.one. Related policies are linked from the footer Compliance column.

TraceFoundry Academy

Scenario labs for enterprise IT teams who need calmer investigations, clearer documentation, and stronger cross-team rehearsals.

Serving IT operations leads and security analysts. Based in Seoul.

Explore
Compliance

12 Teheran-ro 14-gil, Gangnam-gu
Seoul 06292
+82 2 3456 7821

Photos: StockSnap, AlLes, duglong, phamtu1509, AlexanderStein, Orchids love rainwater.

© 2026 TraceFoundry Academy. Training services described on this site are informational only.