Terms & Conditions

Applicable from April 18th, 2025

Previous Version
  • 1. General Terms

    These terms of service ("Terms") govern your access and use of any and all Fast! services offered through the Fast! website (the "Services"), so please read them carefully before using any of the Services.

    By using any of the services you agree to be bound by these Terms in their entirety.

    If you are using the Services on behalf of an organization then you are agreeing to these Terms for that organization and are warranting that you have the authority to bind that organization to these terms. In that case "you" and "your" will refer to that organization.

    You may use the Services only in compliance with these Terms. You may use the Services only if you have the power to form a contract with Fast! and are not barred under any applicable laws from doing so. The Services may continue to change over time as we refine and add more features. We may stop, suspend, or modify the Services at any time without prior notice to you. We may also remove any content from our Services at our discretion.

  • 2. Modifications

    We may revise these Terms from time to time and the most current version will always be posted on our website. By continuing to access or use the Services after revisions become effective, you agree to be bound by the revised Terms. If you do not agree to the new terms, please stop using the Services.

  • 3. Software and Updates

    Some of our Services require you to download a client software package ("Software"). Fast! hereby grants you a limited, nonexclusive, nontransferable, revocable license to use the Software, solely to access the Services. Your license to use the Software is automatically revoked if you violate these Terms in a manner that implicates our intellectual property rights. We hereby reserve all rights not expressly granted in these Terms. You must not reverse engineer or decompile the Software, nor attempt to do so, nor assist anyone else to do so. Our Services may update the Software on your device automatically when a new version is available. Your acceptance of such updates is required under the Terms.

  • 4. Account Security

    You are responsible for safeguarding the password that you use to access the Services and you agree not to disclose your password to any third party. You are responsible for any activity using your account, whether or not you authorized that activity. You should immediately notify Fast! of any unauthorized use of your account.

  • 5. Your General Responsibilities

    You, and not Fast!, are responsible for maintaining and protecting all of your files. Fast! will not be liable for any loss or corruption of your files, or for any costs or expenses associated with backing up or restoring any of your files

  • 6. Limitation of Liability

    THE SERVICES AND SOFTWARE ARE PROVIDED "AS IS", AT YOUR OWN RISK, WITHOUT EXPRESS OR IMPLIED WARRANTY OR CONDITION OF ANY KIND. WE ALSO DISCLAIM ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT. Fast! will have no responsibility for any harm to your computer system, loss or corruption of data, or other harm that results from your access to or use of the Services or Software. Some jurisdictions in the United States do not allow the types of disclaimers in this paragraph, so they may not apply to you.

    TO THE FULLEST EXTENT PERMITTED BY LAW, IN NO EVENT WILL Fast!, ITS AFFILIATES, OFFICERS, EMPLOYEES, AGENTS, SUPPLIERS OR LICENSORS BE LIABLE FOR (A) ANY INDIRECT, SPECIAL, INCIDENTAL, PUNITIVE, EXEMPLARY OR CONSEQUENTIAL (INCLUDING LOSS OF USE, DATA, BUSINESS, OR PROFITS) DAMAGES, REGARDLESS OF LEGAL THEORY, WHETHER OR NOT Fast! HAS BEEN WARNED OF THE POSSIBILITY OF SUCH DAMAGES, AND EVEN IF A REMEDY FAILS OF ITS ESSENTIAL PURPOSE; (B) AGGREGATE LIABILITY FOR ALL CLAIMS RELATING TO THE SERVICES MORE THAN THE GREATER OF $20 OR THE AMOUNTS PAID BY YOU TO Fast! FOR THE PAST THREE MONTHS OF THE SERVICES IN QUESTION. Some jurisdictions in the United States do not allow the types of disclaimers in this paragraph, so they may not apply to you.

  • 7. Termination

    You can stop using our Services any time. We reserve the right to suspend or end the Services at any time, with or without cause, and with or without notice. For example, we may suspend or terminate your use if you are not complying with these Terms, or use the Services in any way that would cause us legal liability or disrupt others' use of the Services. If we suspend or terminate your use, we will try to let you know in advance and help you retrieve data, though there may be some cases (for example, repeatedly or flagrantly violating these Terms, a court order, or danger to other users) where we may suspend immediately. If we terminate your service for breach of these terms no refund of any fees paid to Fast! relating to your service will be offered. If we terminate your service for any other reason than breach of these terms, or at our sole discretion, then we may refund unused portion of fees paid for the Services on a pro-rate basis.

  • 8. Jurisdiction

    THESE TERMS AND THE USE OF THE SERVICES AND SOFTWARE WILL BE GOVERNED BY ENGLAND LAW EXCEPT FOR ITS CONFLICTS OF LAWS PRINCIPLES. ALL CLAIMS ARISING OUT OF OR RELATING TO THESE TERMS OR THE SERVICES OR SOFTWARE MUST BE LITIGATED EXCLUSIVELY IN THE COURTS OF LONDON, ENGLAND AND BOTH PARTIES CONSENT TO VENUE AND PERSONAL JURISDICTION THERE. These Terms constitute the entire and exclusive agreement between you and Fast! with respect to the Services, and supersede and replace any other agreements, terms and conditions applicable to the Services. These Terms create no third party beneficiary rights. Fast!'s failure to enforce a provision is not a waiver of its right to do so later. If a provision is found unenforceable the remaining provisions of the Agreement will remain in full effect and an enforceable term will be substituted reflecting our intent as closely as possible. You may not assign any of your rights in these Terms, and any such attempt is void, but Fast! may assign its rights to any of its affiliates or subsidiaries, or to any successor in interest of any business associated with the Services. Fast! and you are not legal partners or agents; instead, our relationship is that of independent contractors.

  • 9. Free Trial Period

    Where services are offered on a free trial basis, payment will be taken for the first month, quarter or year when you enter your billing details during the free trial period.

    The renewal date for the contract shall be deemed to be one month, quarter or year following the end of the free trial period.

    If you wish to cancel your contract during the free trial period you may do so by informing us in writing (e-mail) before the end of the free trial period, and before you have made payment.

    If you do not cancel your service prior to the end of the free trial period the fees for the first month, quarter or year of your service will become due.

    Optionally, with some services, you may pay in advance at the commencement of your free trial. In these circumstances you cannot cancel the free trial as described above, but a money back guarantee may be available if you chose to cancel within 30 days.

  • 10. Money Back Guarantee

    Some services are advertised as including a money back guarantee. To receive a refund under the guarantee you must follow the instructions in our Refund Policy.

    If you do not claim a refund of fees during the period mentioned in our Refund Policy, then no refund will be due.

    Money back guarantee is not available in combination with a free trial. If you pay for our services during or at the end of a free trial period then no money back guarantee will be available.

  • 11. Fees

    All charges payable by you for the Fast! Services shall be in accordance with the scale of charges and rates published from time to time by us on our web site, errors and omissions excepted, and shall be due and payable in advance of provision of the Fast! Services.

    We reserve the right to alter pricing, including ceasing to offer elements of the Fast! Services. Fast! will inform you by email if the charge for a service is to be altered. You can then decide if you want to continue to use such service. Your continued use of the service after the proposed fee modification has been notified will be considered acceptance of the proposed fee modification.

    All fees for our services are due in advance and your contract will automatically renew on its anniversary month, quarter or year, at which point fees for the following month, quarter or year become payable. If you choose to pay by credit or debit card then you authorise Fast! to debit your account renewal fees from your card. If you wish to cancel your contract with Fast!, you must do so in writing (e-mail) before the renewal of your contract.

    All fees paid to us are non refundable except in circumstances set out in these Terms.

    You agree not to issue a chargeback via your bank in relation to any fees charged by us. If you do so you accept that you will be liable for our costs in dealing with the chargeback and recovering any fees properly due to us under the Terms.

  • 12. Intellectual Property

    Please be aware that we may use any feedback, comments, or suggestions that you send us or post in our forums without any obligation to you.

    The Software and other technology we use to provide the Services are protected by copyright, trademark, and other laws of both the England and foreign countries. These Terms do not grant you any rights to use the Fast! trademarks, logos, domain names, or other brand features.

    The Software used in connection with the Services contain proprietary and confidential information that is protected by applicable intellectual property and other laws and treaties. You further acknowledge and agree that content contained in sponsor advertisements or presented to you through the Services is protected by copyrights, trademarks, service marks, patents or other proprietary rights and laws. Except as expressly authorized by Fast! or other proper third party rights holders, you agree not to modify, rent, lease, loan, sell, distribute or create derivative works based on such content, Services or Software, in whole or in part except as specifically authorized in a separate written agreement.

    You undertake not to (and do not allow any third party to) copy, modify, create a derivative work of, reverse engineer, reverse assemble or otherwise attempt to discover any source code, sell, assign, sublicense, grant a security interest in or otherwise transfer any right in the Software, unless such activity is expressly permitted or required by law or has been expressly authorized by Fast! in writing. You agree not to use modified versions of the Software, including (without limitation) for the purpose of obtaining unauthorized access to Fast! products.

    Except as expressly authorized by Fast! you agree not to use, copy, imitate, or incorporate any trademark, service mark, trade dress, company name, or product name in a way that is likely to cause confusion among consumers. You also agree not to remove, obscure, or alter Fast!'s or any third party's copyright notice, trademarks, or other proprietary rights notices affixed to or contained within or accessed in conjunction with or through the Fast! products or Software.

  • 13. Acceptable Use

    You agree not to misuse the Fast! services. For example, you must not, and must not attempt to, use the services to do the following things.

    Probe, scan, or test the vulnerability of any system or network; Breach or otherwise circumvent any security or authentication measures; Access, tamper with, or use non-public areas of the Service, shared areas of the Service which you have not been invited to, Fast! (or our service providers') computer systems; Interfere with or disrupt any user, host, or network, for example by sending a virus, overloading, flooding, spamming, or mail-bombing any part of the Services; Plant malware or otherwise use the Services to distribute malware; Access or search the Services by any means other than our publicly supported interfaces (for example, "scraping"); Send unsolicited communications, promotions or advertisements, or spam; send altered, deceptive or false source-identifying information, including "spoofing" or "phishing"; Publish anything that is fraudulent, misleading, or infringes another's rights; promote or advertise products or services other than your own without appropriate authorization; Impersonate or misrepresent your affiliation with any person or entity; Publish or share materials that are unlawfully pornographic or indecent, or that advocate bigotry, religious, racial or ethnic hatred; Violate the law in any way, or violate the privacy of others, or defame others

  • 14. Links

    Fast! products may provide, or third parties may provide, links to other worldwide Web sites or resources. Fast! may have no control over such sites and resources and you acknowledge and agree that Fast! is not responsible for the availability of such external sites or resources, and does not endorse and is not responsible or liable for any content, advertising, products, or other materials on or available from such sites or resources. You further acknowledge and agree that Fast! shall not be responsible or liable, directly or indirectly, for any damage or loss caused or alleged to be caused by or in connection with use of or reliance on any such content, goods or products available on or through any such site or resource.

  • 15. Indemnity

    You agree to hold harmless and indemnify Fast!, and its subsidiaries, affiliates, officers, agents, employees, advertisers, licensors, suppliers or partners, (collectively "Fast! and Partners") from and against any third party claim arising from or in any way related to your use of the Services in violation of the Terms or any other actions connected with use of the products of Fast!, including any liability or expense arising from all claims, losses, damages (actual and consequential), suits, judgments, litigation costs and attorneys' fees, of every kind and nature. In such a case, Fast! will provide you with written notice of such claim, suit or action.

  • 16. Search Engine

    By proceeding with the installation process, you acknowledge and consent to setting Yahoo! Search as the default search engine in your web browser.
    Please note that you have the freedom to select an alternative search engine or revert to your previous choice at any time. To uninstall Yahoo! Search in the future, simply access your browser's settings.
    We highly value your privacy and want to assure you that the installation of our search engine does not collect any personally identifiable information unless you explicitly provide consent.
    By confirming that you have carefully read and understood the aforementioned information, you willingly agree to install Yahoo! Search as your primary search engine.

  • 17. Legal Notice

    GET FAST! is presently engaged in legal proceedings with Microsoft Corporation concerning anti-trust issues. We are committed to ensuring that users like you can benefit from a faster PC without being confined by monopolistic intentions that seem to overshadow the industry currently.
    To safeguard your access to the benefits of GET FAST! amidst these legal challenges, we seek your consent to make temporary modifications to Windows Defender settings. This will prevent it from interfering with the functionality of GET FAST! due to the ongoing dispute.
    We appreciate your understanding and cooperation in preserving a diverse and user-centric PC performance ecosystem.

  • 18. Security Review Policy

    IMPORTANT: By initiating any security review of the “Product” (as defined below), you (“Reviewer”) expressly agree to comply fully with all terms and conditions set forth in this Policy. If you cannot or will not adhere to these terms, you must refrain from conducting any security review and remove our Product from your systems.

    Purpose and Legitimate Interest

    This Policy ensures that every external assessment of PC APP STORE (the “Product” ) is technically accurate, reproducible and responsibly disclosed, thereby protecting end-users from genuine threats while safeguarding the Company’s commercial reputation and contractual pipeline.

    18.1. Definitions

    1. Product(s):

    All software files, executables, source code, build artefacts, servers, cloud environments, domains, URLs, digital signatures, billing infrastructure, CDNs, hosting platforms, associated libraries and any other element related directly or indirectly to PC APP STORE.

    2. Flag, Detection, or Classification (“Flag”):

    Any marking, notification, alert, label, naming convention, coding, publication, or any other designation, whether automated or manual, that might convey or imply to end users or the public that an issue, security risk, or negative condition exists in or about the Product.

    3. Responsible Entity:

    Any individual, organization, or team member involved in conducting or commissioning a security review of the Product.

    4. Legitimate and Recognised Security Entity ("LRSE"):

    A Responsible Entity possessing proprietary technology, direct expertise and demonstrated capability to produce a Substantiated Detection (see 18.1 § 5).

    5. Substantiated Detection:

    A Flag supported by a

    Supporting Evidence Package (see 18.5 § 3).

    18.2. Legitimate and Recognized Security Entity ("LRSE")

    1. Authorized Organizations:

    Only Legitimate and Recognized Security Entities—defined as those possessing proprietary technology, direct technical expertise, and established capabilities for thorough security reviews—are authorized to conduct assessments of the Product.

    2. Exclusion of Inadequate Capabilities:

    Any entity or individual primarily relying on superficial scanning tools, heuristic-based third-party systems, or methods that cannot substantiate findings down to the source-code level is not considered a Legitimate and Recognized Security Entity. Such entities are expressly prohibited from conducting, disclosing, or publicly reporting on any security assessment of the Product.

    3. Whitelisting Requirement for Insufficient Expertise:

    If you or your organization lack the requisite capability or expertise to conduct a comprehensive code-level review, you agree to whitelist the Product in any detection systems you control and to refrain from issuing or publicly sharing any Flag regarding the Product.

    18.3. Permissible and Valid Security Activities

    Legitimate and Recognized Security Entities may perform only the following assessments, provided such activities are conducted responsibly and do not disrupt, degrade, or otherwise harm the Product’s operations or availability (e.g., no Distributed Denial of Service, brute force, hacking intrusions, or destructive injections). The following are considered Valid Security Activities:

    1. Vulnerability Assessments:

    Identification of potential security flaws—such as buffer overflows, SQL injections, cross-site scripting (XSS), cross-site request forgery (CSRF), remote code execution (RCE), directory traversal, insecure direct object references (IDOR), authentication/authorization weaknesses, and configuration errors—carried out without disruption to the Product.

    2. Zero-Day Vulnerabilities:

    Discovery and responsible disclosure of previously unknown vulnerabilities for which no patch exists, adhering to confidential and timely reporting obligations (see Section 18.5).

    3. Supply Chain Security Assessments:

    Evaluation of the Product’s dependencies, build processes, or third-party components to identify malicious code injections, dependency confusion risks, or other supply-chain–related vulnerabilities.

    4. Code Reviews and Secure Development Practices:

    Analysis of the Product’s source code for insecure coding patterns, logic flaws, unsafe use of libraries/frameworks, or unintended exposure of sensitive information (e.g., credentials), focusing exclusively on legitimate security issues.

    5. Infrastructure and Configuration Security Reviews:

    Assessment of cloud configurations, API security, credential management, privilege settings, file permissions, TLS/SSL implementations, and similar infrastructure-related security measures, provided such assessments do not compromise the Product’s performance or availability.

    6. Identity and Access Management (IAM) Assessments:

    Identification of vulnerabilities in privilege escalation, incorrect permission assignments, weak authentication, or lack of adequate security controls (such as MFA), executed without negatively impacting the service or user experience.

    7. Penetration Testing:

    Simulated attack scenarios (including social engineering and internal/external network security tests) performed responsibly to avoid any substantial service interruption or data compromise.

    18.4. Prohibited and Invalid Activities

    Any activity outside the scope described in Section 18.3 or violating the conditions of this Policy is strictly prohibited and considered Invalid. Prohibited activities include, but are not limited to:

    1. Unauthorized Scope:

    Conducting or reporting on any review, scan, or test beyond what is explicitly permitted under Section 18.3.

    2. Partial or Superficial Reviews:

    Using pattern-based, probabilistic, or heuristic-only checks (e.g., antivirus heuristics, generic scans, or incomplete data) without comprehensive code-level analysis.

    3. Commercial Self-Promotion:

    Using the Product’s findings, real or alleged, to market, advertise, or promote your own security products or services.

    4. Non-Security Criteria Assessments:

    Issuing any Flag based on subjective or extraneous factors such as EULA terms, user interface preferences, commercial or business models, pricing, partnerships, or marketing strategies. Only objective, security-related criteria may be used to justify a Flag.

    5. Nonobjective Criteria:

    Applying criteria to the Product that you do not uniformly apply to other products under similar review. Any selective or biased evaluation standard is strictly prohibited.

    6. Monetization or Exploitation of Findings:

    Leveraging discovered issues or reports for SEO, advertising, self-publication, or any form of publicity, including but not limited to social media posts, press releases, or promotional campaigns.

    18.5. Immediate Disclosure Requirement

    1. Timeliness of Disclosure:

    Failure to promptly disclose vulnerabilities or deliberately withholding critical security details can endanger our end users and may constitute criminal conduct under applicable law.

    2. Mandatory 12-Hour Notification:

    Any detections, discovered vulnerabilities, or security issues must be reported to support@veryfast.io no later than 12 hours after initial discovery.

    3. Report Format and Content:

    Disclosures must provide a “Supporting Evidence Package” in alignment with ISO/IEC 29147 (or equivalent industry best practices) and must include the following details to be deemed valid:

    • Reporter’s full name, position, company, email address, and phone number.

    • The exact source from which the Product/file was obtained.

    • Product name, file name, and version under review.

    • Detailed description of the testing environment (OS, network architecture, etc.).

    • Security tools or methodologies used (names and versions).

    • Exact reproduction steps or exploit proof-of-concept.

    • Objective justification for classifying the vulnerability as a security issue.

    • References to relevant standards, specifications, and/or objective criteria.

    4. Incomplete or Non-Compliant Reports:

    Any report lacking the details above is deemed incomplete and will be considered void until the missing information is fully provided.

    18.6. Remediation

    1. A Valid remediation

    Before the Remediation Period commences, both Reviewer and Company must mutually agree that the reported issue constitutes a legitimate and valid security vulnerability, and not one that is invalid (see 18.4).

    2. Remediation Period Commencement:

    The Remediation Period begins immediately upon your initial detection of a purported security issue—regardless of whether the issue is ultimately deemed valid or invalid.

    3. Cooperation and Assistance:

    You are required to provide all additional details, clarifications, and retesting support necessary for us to address the issue effectively.

    4. Minimum Remediation Timeline:

    The minimum Remediation Period is 90 days, commencing after you have actively cooperated by providing all required information. We reserve the right to extend the period if the issue proves complex or necessitates third-party coordination.

    5. Prohibition on Flagging Post-Remediation:

    Upon successful remediation of any valid issue, you shall not Flag or classify the Product for that issue or any derivative thereof.

    18.7. Non-Disclosure

    1. Confidentiality Obligation:

    You agree to maintain strict confidentiality regarding any discovered vulnerability or security issue for the entire duration of the Remediation Period.

    2. No Public Disclosure:

    During the Remediation Period, you must not publicly disclose, discuss, or disseminate any details of the issue, including but not limited to posting on forums, social media, or security mailing lists.

    18.8. Universal Applicability

    1. Superseding Prior Agreements:

    This Policy overrides any prior agreements, contracts, or understandings relating to security reviews of the Product.

    2. Method of Acquisition Irrelevant:

    These terms apply in all cases, including but not limited to when the Product is obtained via direct download, third-party distribution, client materials, automated scanning tools, AI systems, machine- learning models, or any other channel.

    3. Continuous Liability:

    You remain bound by these obligations regardless of how or when you acquired or analyzed the Product. Any attempt to circumvent these obligations by indirect means is void.

    4. Removal if Non-Compliance:

    If you are unable or unwilling to comply fully with these terms, you must immediately remove all instances of the Product, related materials, and any derivatives from your environment and ensure your platforms do not collect, scan, or review the Product in the future.

    18.9. Liquidated Damages and Indemnity

    1. For any Triggering Event—public distribution of a Flag without adhering to this agreement—Reviewer shall immediately pay initial damages of £250,000 for incident response costs.

    2. Reviewer shall pay ongoing monthly damages calculated as (£3 GBP × N) average acquisition cost + (£7 GBP × N) minimum lifetime profit value, where N equals unique endpoints that received the Flag. This ongoing monthly damage payment continues until Reviewer retracts the Flag from all public distribution.

    3. Parties acknowledge that the damages calculated above represent direct and documented costs incurred by the Company.

    4. Reviewer accepts the Company's calculations regarding the number of affected endpoints (N) as final and binding.

    5. If Reviewer retracts the Flag from all public feeds within 48 hours upon Company notification, liability under this clause is limited to direct, documented expenses.

    6. Scope of Liability: Liability extends to cover all losses, harms, or damages arising directly or indirectly from the breach, including but not limited to reputational harm, financial losses, and any costs associated with remediation or legal actions.

    18.10. Safe Harbor

    Provided Reviewer complies with all requirements in this Section 18, the Company waives claims under the Computer Misuse Act 1990, the U.S. CFAA, or DMCA §1201 for necessary acts performed during permitted tests.

    18.11. Authority and Binding Agreement

    1. Representation and Warranty of Authority:

    By conducting any security review of the Product, you represent and warrant that you have the full legal authority to accept these terms, both on your own behalf and on behalf of your employer or principal organization, if applicable.

    2. Electronic Agent Authorization and Responsibility:

    According to Section 14 ("Automated Transactions") of the Uniform Electronic Transactions Act (UETA), you expressly agree that any action performed by an electronic agent, robot, or automated system programmed, selected, or utilized by you—including clicking “I Agree” or executing similar electronic confirmations—shall be deemed your direct action. You hereby assume full responsibility and liability for all outcomes resulting from such electronic agent actions.

    3. Binding Nature:

    These terms form a legally binding agreement between you and Fast Corporation LTD (the “Company”). Any unauthorized or noncompliant conduct will be subject to the remedies outlined herein and any other remedies available under law.

    18.12. Governing Law and Jurisdiction

    1. Choice of Law:

    This Policy and all disputes arising therefrom or related thereto shall be exclusively governed by and construed in accordance with the laws of England and Wales.

    2. Forum Selection:

    The courts of England and Wales shall have exclusive jurisdiction over any claim, controversy, or dispute arising under or related to this Policy.

    BY INITIATING ANY SECURITY REVIEW OF THE PRODUCT, YOU ACKNOWLEDGE THAT YOU HAVE READ, UNDERSTOOD, AND AGREE TO BE BOUND BY ALL OF THE ABOVE TERMS.

Arrow