Security Policy
As part of the commitment to keeping your account and information safe and secure, If you think you've spotted a potential security issue with any of our services, we welcome your feedback. Please email us at [email protected] immediately.
Guidelines
believes that working with skilled security researchers across the globe is crucial in identifying weaknesses in any technology. If you have discovered a security vulnerability in our systems or in one of our product/services, we appreciate your help in disclosing it to us in a responsible manner.
We'll work with you to make sure that we understand the scope of the issue, and that we fully address your concerns. We consider vulnerability disclosures our highest priority and we will try to address any issue as quickly as possible.
Disclosure Policy
Exclusions
While researching, we'd like to ask you to refrain from:
- Denial of service
- Spamming
- Social engineering (including phishing) of staff or contractors, or customers
- Any physical attempts against property or data centres
- Any interaction or unauthorised access to data
- Missing best practices (we require evidence of a security vulnerability).
- Use of a known-vulnerable library (without evidence of exploitability).
Out of Scope
- Reports from automated tools or scans.
- Missing cookie flags on non-sensitive cookies.
- Reports of insecure SSL/TLS ciphers (unless you have a working proof of concept, and not just a report from a scanner).
- Exposure of non-sensitive data on mobile devices
- Missing security headers which do not lead directly to a vulnerability, including CSP
Third-party bugs
If issues reported to our program affect a third-party library, external project, or another vendor, we reserve the right to forward details of the issue to that party without further discussion with the researcher. We will do our best to coordinate and communicate with researchers through this process, and we will not share your name with third parties without your approval.
Reporting a vulnerability
We accept and discuss vulnerability reports via email at [email protected]
Please encrypt your findings using our PGP key to prevent this critical information from falling into the wrong hands.
Reports should include:
- A Description of the location and potential impact of the vulnerability.
- A detailed description of the steps required to reproduce the vulnerability. * Proof of concept (POC) scripts, screenshots, and screen captures are all helpful. Please use extreme care to properly label and protect any exploit code.
- Any technical information and related materials we would need to reproduce the issue.
- Your name/handle for recognition in our Hall of Fame (optional)
- Please keep your vulnerability reports current by sending us any new information as it becomes available.
Safe Harbor
Any activities conducted in a manner consistent with this policy will be considered authorized conduct and we will not initiate legal action against you. If legal action is initiated by a third party against you in connection with activities conducted under this policy, we will take steps to make it known that your actions were conducted in compliance with this policy.
's senior management is committed to all security aspects in the organization. They recognize the importance of identifying and protecting its information assets, avoiding the loss, disclosure, modification and unauthorized use of the information, and encourage the development, implementation, maintenance and continuous improvement of the Information Security Management System (ISMS).
The managers of are actively involved in:
- Periodically establishing the objectives for the management of Information Security, and the necessary actions to implement them.
- Performing systematics risk analysis, and assessing the impact and threats.
- Validation of actions necessary to reduce the risks identified as unacceptable, according to the criteria established by the Security Committee.
- Applying the necessary controls and their corresponding monitoring methods.
- Ensuring the compliance with the legal, regulatory, and client requirements assumed by , and contractual security obligations.
- Promoting awareness and training on information security for all personnel.
- Providing the necessary resources to ensure the continuity of the company business.
The safety objectives of are based on:
- Protection of knowledge, information and data.
- Protection of information and communication technologies.
- Protection of facilities and buildings.
- Protection of company assets.
- Protection of business continuity.
- Compliance with legal and regulatory standards.
Information Security is characterized as the preservation of:
- its availability, ensuring authorized users have access to the information and associated assets when required.
- its confidentiality, ensuring only those who are authorized can access the information.
- its integrity, ensuring that the information remains unchanged and traceable.
's management nominate the Information Security Manager as the person directly responsible for maintaining this policy for providing advice and guidance for its implementation.
This policy applies to all personnel, as well as to external collaborators and suppliers who work in conjunction with team.
Thank you for helping keep and our users safe!