Vulnerability Reporting Policy
At Straton plc. trust is our #1 value and we take the protection of our customers’ data very seriously.
The Straton plc. security team acknowledges the valuable role that independent security researchers play in Internet security. As a result, we encourage responsible reporting of any vulnerabilities that may be found in our site or applications. Straton plc. is committed to working with security researchers to verify and address any potential vulnerabilities that are reported to us.
Please review these terms before you test and/or report a vulnerability. Straton plc. pledges not to initiate legal action against researchers for penetrating or attempting to penetrate our systems as long as they adhere to this policy.
TESTING FOR SECURITY VULNERABILITIES
Whenever a Trial or Beta Edition is available, please conduct all vulnerability testing against such instances. Always use test or demo accounts when testing our online services.
REPORTING A POTENTIAL SECURITY VULNERABILITY
Straton plc. is committed to providing a secure network to its customers. While we employ secure product development practices in our engineering process, we recognize that not all vulnerabilities may be avoided. We are committed to providing a quick response for potential vulnerabilities.
- Privately share details of the suspected vulnerability with Straton plc. by sending an email to firstname.lastname@example.org
- Provide full details of the suspected vulnerability so the Straton plc. security team may validate and reproduce the issue.
STRATON PLC. DOES NOT PERMIT THE FOLLOWING TYPES OF SECURITY RESEARCH:
While we encourage you to discover and report to us any vulnerabilities you find in a responsible manner, the following conduct is expressly prohibited:
- Performing actions that may negatively affect Straton plc. or its users (e.g. Spam, Brute Force, Denial of Service…).
- Accessing, or attempting to access, data or information that does not belong to you.
- Destroying or corrupting, or attempting to destroy or corrupt, data or information that does not belong to you.
- Conducting any kind of physical or electronic attack on Straton plc. personnel, property or data centers.
- Social engineering any Straton plc. service desk, employee or contractor.
- Conduct vulnerability testing of participating services using anything other than test accounts (e.g. Beta or Trial Edition instances).
- Violating any laws or breaching any agreements in order to discover vulnerabilities.
THE STRATON PLC. SECURITY TEAM COMMITMENT:
We ask that you do not share or publicize an unresolved vulnerability with/to third parties. If you responsibly submit a vulnerability report, the Straton plc. security team and associated development organizations will use reasonable efforts to:
- Respond in a timely manner, acknowledging receipt of your vulnerability report.
- Provide an estimated time frame for addressing the vulnerability report.
- Notify you when the vulnerability has been fixed.
We are happy to thank every individual researcher who submits a vulnerability report helping us improve our overall security posture at Straton plc.