Cybersecurity.See below to access our Cybersecurity Policy.
|
We Promise You the Best.DATESET CYBERSECURITY POLICY Last Updated: January 7, 2019 For questions, concerns or issues with your profile, or to report another user or profile, please visit our Contact page. DateSet considers the security of our applications and the privacy of our users’ data extremely important. While it is impossible to predict the full range of future cyber threats against our systems, we regularly assess and work to improve our security in an effort to enhance the safety of our user community. Cybersecurity Practices. DateSet employs physical, procedural and electronic controls in connection with the protection of our systems and user data from unauthorized access. This includes regularly having our systems and applications reviewed for potential issues by our internal security team and outside security firms. Reporting Security Vulnerabilities. DateSet welcomes input from the security research community to advance the cause of improving the security of our applications and user data. To that end, we encourage security researchers to responsibly disclose any potential vulnerabilities uncovered to Security@DateSet.io. To protect our users, we also request that you please refrain from sharing information about any potential vulnerabilities with anyone outside of DateSet, until we have confirmed with you that any such vulnerability has been properly mitigated. Bug Bounty. DateSet’s bug bounty program is private and inclusion is by invite only. Researchers who follow generally accepted responsible and ethical disclosure practices and submit quality reports to our Security team will be evaluated for inclusion at our discretion. We explicitly prohibit Attack Vectoring, Backdoor, Beaconing, Browser Pivoting, Bypass, Capture, Code Execution, Collection, Compromise, Covert Communication, Credential Dumping, Data Exfiltration, Denial of Service (DoS), Discovery, DNS Poisoning, Enumeration, Exploitation, Hash Decryption, Hollowing, Injection, Key Logging, Lateral Movement, Malware, Manipulation, Man-In-The-Middle, Network Scanning, Obfuscation, Pass the Hash, Payload, Phishing, Port Scanning, Post Exploitation, Privilege Escalation, Reconnaissance, Rootkit, Service Execution, Session Passing, Site Cloning. Spear Phishing, System Profiling, User Execution, Web Drive-by, or any other type of exploitation or scanning tool against any of our applications or infrastructure. If you have any questions about this Cybersecurity Policy, please reach out to us on our Contact page. |