Effective Date: August 18, 2025 | Last Updated: October 30, 2025
Governing Law: State of Michigan, United States.
Company Incorporation: Hydrosimulatics, Inc., incorporated in the State of Delaware, United States
MAGNET4WATER is designed to ensure that all user workâincluding model inputs, telemetry streams, simulation outputs, and decision support artifactsâremains secure, private, and under the user's control. These protections are enforced through a multi-layered security architecture, not discretionary access or policy exceptions:
This architecture ensures that MAGNET4WATER remains a trusted environment for modeling, analysis, and decision supportâwhere users retain full ownership and control of their data.
Tiered Protections: These safeguards apply exclusively to Premium Tier accounts. Free Tier accounts include baseline protections but do not support encryption at rest, confidential computing, or customizable key management.
Note: MAGNET4WATERâs definition of end-to-end encryption aligns with emerging cloud security standards. For example, Google Cloud defines end-to-end encryption as encryption at rest, in transit, and in useâenabled by confidential computing.
By accessing, subscribing to, or using the platform, the user expressly agrees to be bound by all terms and conditions set forth herein. If the user does not agree to these terms, they must not access or use the platform.
1.1 This Agreement governs all access to and use of the MAGNET4WATER Platform, including all sub-platforms (IGW-NET, SwaNET, DataNET, StormNET, ConduitNET), services, interfaces, and associated infrastructure.
1.2 This Agreement applies to all tiers of access, including Free Tier and Premium Tier subscriptions. Tier-specific features, protections, and limitations are described in Section 2 (Definitions) and Section 6 (Privacy, Data Ownership, and Security Architecture).
1.3 Hydrosimulatics reserves the right to update, modify, or discontinue any part of the Platform at its sole discretion, provided that such changes do not retroactively alter the terms of this Agreement without notice.
1.4 Users may be subject to additional terms and conditions if accessing the Platform through an institutional deployment, enterprise license, or third-party integration. Such terms shall be deemed incorporated into this Agreement by reference.
The MAGNET4WATER software system, including all sub-platforms (IGW-NET, SwaNET, DataNET, StormNET, ConduitNET), services, interfaces, and associated infrastructure.
All files, inputs, outputs, models, configurations, telemetry, metadata, and any other content uploaded, generated, or processed by the User within the Platform. This includes personally identifiable information (PII), modeling artifacts, and simulation outputs. PDY is encrypted at all times and remains inaccessible to Hydrosimulatics under all supported configurations available to Premium Tier users.
A paid license granting time-limited access to the Platform, subject to the terms of this Agreement.
A limited-access version of the Platform provided without charge, subject to usage restrictions and feature limitations. Free Tier accounts do not include encryption at rest, confidential computing, or user-controlled encryption key management.
A security protocol in which user content is encrypted during transmission (TLS 1.3), storage (AES-256), and active processing (confidential computing). E2EE ensures that data remains unintelligible to unauthorized partiesâincluding platform operators and infrastructure providersâthroughout its lifecycle. E2EE is available exclusively to Premium Tier users.
Note: Google Cloud defines end-to-end encryption as encryption at rest, in transit, and in use. MAGNET4WATER adopts this lifecycle framing and enforces it through confidential computing and operational inaccessibility.
A security model in which data remains encrypted during active processing in memory, using secure enclave technologies (e.g., Intel SGX, AMD SEV) that prevent access by hypervisors, cloud operators, and privileged system processes. Confidential computing is available exclusively to Premium Tier users.
A mandatory access control mechanism requiring two or more forms of verification before granting access to modeling environments or encrypted content. MFA blocks unauthorized accessâeven if login credentials are compromised.
A cryptographic key used to encrypt and decrypt PDY. MAGNET4WATER supports three modes of key management for Premium Tier users:
A hardware-isolated execution environment that encrypts data in memory and prevents inspection or extraction by system-level processes.
The architectural guarantee that Hydrosimulatics personnel, infrastructure providers, and third-party services cannot access, inspect, or extract user content under any supported configuration.
A time-bound, encrypted credential used to authenticate user sessions. Session tokens auto-terminate after inactivity and are governed by MFA.
Non-content data such as timestamps, file size, and transmission logs used for performance monitoring and audit. Metadata is stored separately and cannot be used to reconstruct or interpret user work.
Platform features that allow Users to publish, share, or collaborate on modeling outputs. Dissemination is governed by user-selected visibility settings and access permissions.
A configuration of MAGNET4WATER operated under the control of an academic, governmental, or enterprise entity, with custom encryption, audit, and compliance policies.
Artificial intelligence tools embedded within the Platform to assist Users with modeling, data interpretation, and navigation. AI modules operate within encrypted containers and do not retain or transmit user content beyond the scope of the session.
A paid subscription tier that includes the full security architecture: end-to-end encryption (in transit, at rest, and in memory), confidential computing, multi-factor authentication (MFA), and user-controlled encryption key management. Only Premium Tier accounts benefit from these protections.
3.1 Subject to the terms of this Agreement, Hydrosimulatics grants the User a non-exclusive, non-transferable, revocable license to access and use the Platform during the Subscription term or Free Tier period.
3.2 The license granted herein is limited to the Userâs internal research, modeling, and educational use. Commercial use, redistribution, or sublicensing is prohibited unless expressly authorized in writing by Hydrosimulatics.
3.3 The license does not grant any rights to inspect, reverse-engineer, or extract the Platformâs source code, algorithms, or internal architecture.
3.4 The license does not include access to encrypted user content by Hydrosimulatics. All Protected Data of the User (PDY) remains inaccessible to Hydrosimulatics under all supported configurations available to Premium Tier users.
4.2 Free Tier users shall not attempt to simulate or replicate Premium Tier protections, including encryption at rest, confidential computing, or key management features.
4.3 Hydrosimulatics reserves the right to suspend or terminate access for violations of these restrictions, without refund or liability.
5.1 Subscription fees for Premium Tier access shall be paid in accordance with the pricing schedule published by Hydrosimulatics or agreed upon in writing.
5.2 All fees are non-refundable except as required by law or explicitly stated in this Agreement.
5.3 Hydrosimulatics may modify pricing or billing terms with thirty (30) daysâ notice. Continued use of the Platform after such notice constitutes acceptance of the new terms.
5.4 Failure to pay applicable fees may result in suspension or termination of access to Premium Tier features, including encryption, confidential computing, and key management.
MAGNET4WATER is built on the principle that user workâincluding hydrosimulatics models, telemetry inputs, and simulation outputsâmust remain secure, private, and under the user's control. This section outlines the layered security architecture that protects user content across every stage of the data lifecycle: transmission, storage, computation, access, and sharing.
Hydrosimulatics does not rely on discretionary access policies or trust-based permissions. Instead, it enforces security through cryptographic design, confidential computing, and operational isolationâensuring that even platform operators cannot access user content under any supported configuration.
Unless otherwise stated, the protections described in this section apply exclusively to Premium Tier accounts. Free Tier accounts are subject to baseline protections and do not include encryption at rest, confidential computing, or customizable key management.
These protections are enforced by architectureânot by policy exceptions or administrative discretion.
End-to-end encryption is available exclusively to Premium Tier users.
All sensitive operationsâincluding model calibration, telemetry parsing, and simulation executionâoccur within hardware-isolated environments. These secure enclaves prevent access by hypervisors, infrastructure providers, cloud operators, and privileged system processes.
Runtime data remains encrypted and inaccessible to all service layers under any operational scenario. Confidential computing is available exclusively to Premium Tier users.
MFA is enforced across all tiers, but only Premium Tier users benefit from MFA-protected access to encrypted content.
Free Tier accounts do not support encryption key customization or isolation.
User content cannot be viewed, modified, or extracted under any supported configuration. Infrastructure providers cannot inspect or access data within secure enclaves or encrypted containers. Encrypted content remains unintelligible and unrecoverable without the corresponding key.
No backdoor access exists. All access is governed by cryptographic enforcement and explicit user consent. These protections are available exclusively to Premium Tier accounts.
For Premium Tier users, encrypted data remains inaccessible even during breach scenarios. Free Tier users may be subject to different containment boundaries.
Encrypted container protections apply exclusively to Premium Tier users.
Governance is overseen by Hydrosimulaticsâ Data Stewardship Board.
These protections apply exclusively to Premium Tier accounts. Free Tier users are subject to baseline protections but do not benefit from encrypted storage, confidential computing, or key customization.
7.1 This Agreement shall remain in effect until terminated by either party.
7.2 The User may terminate this Agreement at any time by ceasing use of the Platform and, if applicable, requesting deletion of their account and associated Protected Data.
7.3 Hydrosimulatics may terminate this Agreement or suspend access to the Platform immediately, without prior notice, if:
7.4 Upon termination:
10.1 This Agreement shall be governed by and construed in accordance with the laws of the State of Michigan, without regard to its conflict of law principles.
10.2 Any disputes arising under or in connection with this Agreement shall be resolved exclusively in the state or federal courts located in Michigan, and the parties consent to personal jurisdiction therein.
10.3 The United Nations Convention on Contracts for the International Sale of Goods shall not apply to this Agreement.