Responsible vulnerability disclosure policy
Overview
Protecht takes security very seriously and proactively monitors and tests its network, data centre infrastructure, and application. We conduct ongoing security audits, vulnerability scans and conduct penetration tests to ensure both Protecht and our customers are secure.
We are open to engage with the security community. Our security vulnerability disclosure policy allows you to responsibly share your findings with us.
If you think you have identified a security vulnerability in one of our products, infrastructure, or service, report it to us as quickly as possible.
Our policy doesn't authorise you to conduct security testing against Protecht. If you think a security vulnerability exists, please report it to us. We can test and verify it.
What is covered in this policy
Under this policy, you must not:
- Engage in physical testing of our offices or data centres
- Disclose security vulnerability information publicly or in social media
- Leverage deceptive techniques, such as social engineering, against Protecht employees, contractors or any other party
- Execute resource exhaustion attacks, such as DOS (denial of service) or DDOS (distributed denial of service) towards Protecht or our hosting suppliers
- Use automated vulnerability assessment tools
- Introduce malicious software or similar harmful software that could impact our services, products or customers or any other party
- Engage in unlawful or unethical behaviour
- Reverse engineer Protecht products or systems
- Modify, destroy, exfiltrate, or retain data stored by Protecht
- Submit false, misleading or dangerous information to Protecht systems
- Access or attempt to access accounts or data that does not belong to you
How to report
Protecht believes in the responsible disclosure of vulnerabilities. If you believe that you have identified a vulnerability in our products, infrastructure, or service, please submit it to the email address below:
Provide as much information as possible, including:
- Where you found the vulnerability (URL etc)
- Steps to reproduce the vulnerability
- Proof-of-concept code (where applicable)
- Names of any test accounts you have created (where applicable)
- Your contact details
We may need to contact you for more information to resolve the finding. We will handle your report confidentially in line with our privacy policy.
Please don't publicly disclose details of any potential security vulnerabilities without our written consent.
Next steps
When you report a vulnerability, we will:
- Respond to you within 3 business days
- Recognise your contribution to our program, asking if you would like to be included in our hall of fame
Hall of fame
The names or aliases of people who contribute to our security vulnerability disclosure program will be published with their permission and shown below.
- Nikhil Rane
- Sakshi Patil
- Infoziant Security
- Ariel Rachamim
- Omri Inbar
- Ather Iqbal (Think Software Solutions)
- Sanjith Roshan U