Security Policy
We take the protection of our data very seriously.
Vulnerability Reporting Policy
The security team acknowledges the valuable role that independent security researchers play in internet security. As a result, we encourage responsible reporting of any vulnerabilities that may be found in our site or applications. We are committed to working with security researchers to verify and address any potential vulnerabilities that are reported to us.
Please review these terms before you test and/or report a vulnerability. We pledge not to initiate legal action against researchers for penetrating or attempting to penetrate our systems as long as they adhere to this policy.
Testing for security vulnerabilities
Whenever a Trial or Developer Edition is available, please conduct all vulnerability testing against such instances. Always use test or demo accounts when testing our online services.
Reporting a potential security vulnerability
To report security or privacy issues that affect products or web servers, please use the Contact Us page.
You can use our Product Security PGP key to encrypt sensitive information sent via e-mail. We will respond with additional emails if we need further information to investigate a security issue. Please provide full details of the suspected vulnerability so the security team may validate and reproduce the issue.
For the protection of our customers, we generally do not disclose, discuss, or confirm security issues until a full investigation is complete and any necessary patches or releases are available.
We do not permit the following types of security research
While we encourage you to discover and report to us any vulnerabilities you find in a responsible manner, the following conduct is expressly prohibited:
- Performing actions that may negatively affect us or our users (e.g. Spam, Brute Force, Denial of Serviceā¦)
- Accessing, or attempting to access, data or information that does not belong to you
- Destroying or corrupting, or attempting to destroy or corrupt, data or information that does not belong to you
- Conducting any kind of physical or electronic attack on our personnel, property or data centers
- Social engineering any service desk, employee or contractor
- Conduct vulnerability testing of participating services using anything other than test accounts (e.g. Developer, or Free Trial instances)
- Violating any laws or breaching any agreements in order to discover vulnerabilities
The security team commitment
We ask that you do not share or publicize an unresolved vulnerability with/to third parties. If you responsibly submit a vulnerability report, the security team and associated development organizations will use reasonable efforts to:
- Respond in a timely manner, acknowledging receipt of your vulnerability report
- Provide an estimated time frame for addressing the vulnerability report
- Notify you when the vulnerability has been fixed
We are happy to thank every individual researcher who submits a vulnerability report helping us improve our overall security posture.
Security