Service selection
Polygraph examinations and monitoring solutions are different services. An enquiry about one does not automatically create access to the other.
These terms apply when you enquire about, purchase, or use any service offered by Investigators Africa.
Sending an enquiry does not automatically create a service agreement. Requests are reviewed before any service proceeds.
Polygraph examinations and monitoring solutions are different services. An enquiry about one does not automatically create access to the other.
Every request is reviewed for scope, suitability, legal basis, and operational risk before any engagement is accepted.
Submitting a request does not guarantee consultation, scheduling, subscription approval, or an ongoing service relationship.
Polygraph requests are assessed independently. Scheduling, preparation, and case acceptance depend on suitability, available capacity, and any legal or practical limitations relevant to the matter.
Results and consultation feedback remain limited to the scope of the engagement and should not be treated as legal advice or outcome guarantees.
Monitoring is considered only for devices you own or are explicitly authorized to manage. Installation must be visible and used with appropriate notice or consent where applicable.
Requests involving covert interception, unauthorized surveillance, hidden listening, or access to third-party devices, accounts, or communications are not accepted.
Pricing shown on the site is informational and may be clarified during the enquiry process. Payment terms, where applicable, are communicated before a service proceeds.
You are responsible for providing accurate information, selecting the correct service, and ensuring that any monitoring request is lawful and properly authorized.
Any enquiry may be declined where the request appears unlawful, unclear, misleading, outside scope, or inconsistent with the service boundaries described on this site.
Where a monitoring solution is purchased, you remain solely responsible for how that solution is used after delivery, activation, or onboarding. We do not accept responsibility for misuse, unlawful deployment, unauthorized monitoring activity, or consequences arising from use outside the approved and lawful scope described on this site.
This limitation does not permit unlawful use. Monitoring must still remain limited to devices you own or are explicitly authorized to manage, with visible installation and appropriate notice or consent where applicable.