Effective Date: 13 Feb 2025
1. Introduction
Dot Effect is committed to maintaining the security of our systems and protecting the privacy and data of our users. This document outlines our security practices and provides guidance on how security researchers, users, and the public can report security vulnerabilities responsibly.
2. Reporting Security Vulnerabilities
If you discover a security vulnerability or security-related issue on Dot Effect, we encourage responsible disclosure. Please follow the steps below to report security issues:
- Email: Send a detailed report to [[email protected]].
- PGP Key: If encryption is required, please use our public PGP key (available at [Insert PGP Key URL]).
- Bug Bounty: At this time, we do not have a formal bug bounty program, but we recognize and appreciate responsible security research efforts.
Report Details
When submitting a security report, please include:
- A clear description of the issue and potential impact.
- Steps to reproduce the vulnerability.
- Any relevant logs, screenshots, or proof-of-concept code.
- Your contact details for follow-up questions.
We aim to acknowledge all security reports within 72 hours and provide updates on remediation progress.
3. Responsible Disclosure Policy
We appreciate responsible security researchers who act in good faith and follow these guidelines:
- Do not exploit vulnerabilities beyond necessary testing.
- Do not publicly disclose vulnerabilities before we have had reasonable time to address them.
- Do not engage in data theft, system disruption, or privacy violations.
- Do not conduct security tests that violate any applicable laws.
4. Security Practices
We implement industry best practices to ensure the security of DotEffect.net, including but not limited to:
- Data Protection: Encryption in transit (TLS 1.2+/SSL) and at rest.
- Access Control: Role-based access controls (RBAC) and multi-factor authentication (MFA) for critical systems.
- Security Monitoring: Continuous monitoring of system logs and anomaly detection.
- Regular Security Updates: Prompt application of security patches and software updates.
- DDoS Protection: Mitigation strategies to prevent denial-of-service attacks.
5. Third-Party Dependencies
We rely on third-party services and software components. Security issues found in these dependencies should be reported directly to the respective vendors. However, if the issue impacts Dot Effect, please notify us as well.
6. Legal Safe Harbor
We will not take legal action against security researchers who follow this policy and act in good faith. However, activities that violate laws or cause harm to our systems, users, or data may be subject to legal consequences.
7. Contact Information
- Security Team Email: [email protected]
- Website: https://www.doteffect.net
- PGP Key: [Insert PGP Key URL]
- Preferred Languages: English
8. Updates & Changes
We may update this security policy from time to time. The latest version will always be available at https://www.doteffect.net/security.txt.
By following this policy, security researchers help us maintain a secure platform for our users. We appreciate your efforts in keeping Dot Effect safe and secure.