These are the Terms and Conditions governing the use of this Service and the agreement that operates between You and the Software Secured. These Terms and Conditions set out the rights and obligations of all users regarding the use of the Service.
The Software Secured Portal leverages the following sub-processors (external/third-party services that process data) to support the services provided by the Portal. The purpose of each sub-processor along with its location and relevant security/privacy documentation can be found below.
Software Secured is committed to ensuring the security of the public by protecting their information and is a strong supporter of responsible vulnerability disclosure. This policy is intended to give security researchers clear guidelines for conducting vulnerability discovery activities and to convey our preferences in how to submit discovered vulnerabilities to us. This policy describes what systems and types of research are covered under this policy, how to send us vulnerability reports, and how long we ask security researchers to wait before publicly disclosing vulnerabilities.
This Policy outlines the practices and procedures Software Secured follows to ensure any products or services delivered to our customers adhere to this philosophy. The policy comprises secure engineering activities including but not limited to Threat Modelling, Static Analysis, Dynamic Analysis, and Penetration Testing.