Security Policies Coordinated Disclosure Of Security Vulnerabilities (GitHub)
OpenLegalLibrary
This document outlines a company's policy for the coordinated disclosure of security vulnerabilities. It encourages security researchers to report any discovered bugs through a structured process, offering a bug bounty program with monetary rewards for their efforts. It also references a legal safe harbor policy for researchers.
Privacy Policy (Denmark) by Seedsummit
OpenLegalLibrary
This document outlines a company's policy on personal data protection, detailing how it collects, uses, and discloses personal data in compliance with the EU General Data Protection Regulation (GDPR). It establishes basic principles for data processing, informs about data registration duties, sets storage periods, and defines rules for using data processors and handling data breaches.
Data Protection Policy - Free Template for your Businesses
OpenLegalLibrary
This Data Protection Policy outlines how a company collects, processes, stores, and manages personal data responsibly. It ensures compliance with various global data protection laws, including GDPR, CCPA, PDPA, and the Privacy Act. The policy establishes responsibilities for employees, contractors, third parties, and a designated Data Protection Officer.
Security Response by Basecamp
OpenLegalLibrary
This document outlines the process for reporting security vulnerabilities and account attacks related to the company's products. It provides instructions for customers experiencing an attack and for security researchers discovering flaws, directing them to a bug bounty program. The policy also details how the company tracks, investigates, and discloses resolved security issues.
Security Index by Basecamp
OpenLegalLibrary
This document provides an overview of a company's robust security measures designed to protect customer data. It covers practices such as data encryption, redundancy, physical security of servers, and continuous monitoring. The aim is to assure customers of the company's commitment to data safety and incident response protocols.
Content Removal Policies Github Private Information Removal Policy (GitHub)
GitLaw Import Account
This document outlines GitHub's policy and process for removing private, high-risk information, such as exposed access credentials or sensitive personal data, from its repositories. It details what qualifies as "private information" and guides users on how to submit a removal request, including the necessary information and the steps GitHub will take. The policy also clarifies what types of content are not covered by this specific removal process.
Security Policies Coordinated Disclosure Of Security Vulnerabilities (GitHub)
This document outlines the GitHub Security Incident Response Team (SIRT), detailing its mission, contact information, and the services it provides. It explains how GitHub SIRT handles security incidents, including triage, coordination, and resolution, for its platform and users. The document also covers proactive security activities and how to report vulnerabilities or contact support.
Security Index by Basecamp
GitLaw Import Account
This document provides an overview of a company's robust security measures designed to protect customer data. It covers practices such as data encryption, redundancy, physical security of servers, and continuous monitoring. The aim is to assure customers of the company's commitment to data safety and incident response protocols.
Security Response by Basecamp
GitLaw Import Account
This document outlines the process for reporting security vulnerabilities and account attacks related to the company's products. It provides instructions for customers experiencing an attack and for security researchers discovering flaws, directing them to a bug bounty program. The policy also details how the company tracks, investigates, and discloses resolved security issues.