{"version":"1.0","provider_name":"Managed Cybersecurity Services Cape Town | 24\/7 SOC | SHEL infosec","provider_url":"https:\/\/shelinfosec.com","author_name":"CISO","author_url":"https:\/\/shelinfosec.com\/index.php\/author\/ciso\/","title":"Terms of Service | Managed Cybersecurity Services Cape Town | 24\/7 SOC | SHEL infosec","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"YdAcjjf93l\"><a href=\"https:\/\/shelinfosec.com\/index.php\/terms-of-service\/\">Terms of Service<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/shelinfosec.com\/index.php\/terms-of-service\/embed\/#?secret=YdAcjjf93l\" width=\"600\" height=\"338\" title=\"&#8220;Terms of Service&#8221; &#8212; Managed Cybersecurity Services Cape Town | 24\/7 SOC | SHEL infosec\" data-secret=\"YdAcjjf93l\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/shelinfosec.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"TERMS OF SERVICE Introduction Welcome to shelinfosec.com. These Terms of Service (\u201cTerms\u201d) govern your access to and use of our website, products, and services, including SILENT EDGE, our advanced cybersecurity solution (the \u201cService\u201d). By using our services, you agree to comply with these Terms. If you do not agree, please refrain from using our services. [&hellip;]"}