Introduction

The security of our systems and the privacy of the individuals whose data we protect is fundamental to everything we do. If you believe you have discovered a security vulnerability in any SafePorter or DataProtected system, we encourage you to report it to us responsibly.

This policy describes how to submit vulnerability reports, what we ask of you, and what you can expect from us.

Scope

This policy applies to vulnerabilities in the following systems and services operated by SafePorter LLC:

This policy does not apply to third-parnot owned or operated by SafePorter, even if they integrate with or link to our systems.

How to report a vulnerability

Please send vulnerability reports to security@safeportersecure.com. If you need to transmit sensitive technical details, request our PGP public key and we will provide it.

When reporting, please include as much of the following as possible:

What we ask of you

What you can expect from us

Safe harbor

SafePorter considers security research conducted in accordance with this policy to be authorized conduct. We will not initiate legal action against researchers who comply with this policy. If legal action is initiated by a third party against a researcher for activities conducted in accordance with this policy, we will make reasonable efforts to make it known that the researcher's actions were authorized.

Out of scope

The following are generally considered out of scope unless they can be demonstrated to have meaningful security impact:

Recognition

We appreciate the work of security researchers who help us keep our systems safe. With your permission, we will acknowledge your contribution. SafePorter does not currently operate a paid bug bounty program.

Changes to this policy

We may update this policy from time to time. The current version will always be available at this URL.

Report a vulnerability

security@safeportersecure.com