Introduction
At Ezitxt, we provide our clients with secure, high volume, enterprise messaging solutions. We value security and recognise the importance of ensuring the integrity and confidentiality of global communications.
Ezitxt welcomes feedback from security researchers and the general public to help improve the security of our digital assets. If you believe you have discovered a security vulnerability (see definition below), a privacy issue, or exposed data in any of our assets, we want to hear from you. This document outlines the rules relating to Ezitxt’s Vulnerability Disclosure Programme, including steps for reporting vulnerabilities to us, what we expect, and what you can expect from us.
Definition of a Vulnerability
Ezitxt considers a security vulnerability to be a genuine weakness in one of our products or our infrastructure that could allow an attacker to impact the confidentiality, integrity, or availability of our data, product or infrastructure.
Systems in Scope
Ezitxt’s Vulnerability Disclosure Programme applies to any digital assets owned, operated, or maintained by Ezitxt.
Out of Scope
Vulnerabilities discovered or suspected in out-of-scope systems should be reported to the appropriate third party, vendor or applicable authority.
Our Commitments
When working with us in accordance with the rules of our Vulnerability Disclosure Programme, you can expect us to:
Our Expectations
In participating in our vulnerability disclosure programme, we expect you to operate in good faith at all times and ask that you:
Official Channels
Please report security issues via support@ezitxt.com, providing all relevant information. The more details you provide, the easier it will be for us to triage and fix the issue. It is important to use this official channel as it is secured through the use of appropriate encryption.
At the minimum, please include the following information in your report:
Safe Harbour
If you act in good faith and follow the rules of Ezitxt’s Vulnerability Disclosure Programme when conducting vulnerability research, we will:
You are expected, as always, to comply with all applicable laws. If at any time you have concerns or are uncertain whether your security research is consistent with our security vulnerability programme, please contact us through our official channel before going any further.
Note that the Safe Harbour applies only to legal claims under the control of Ezitxt, and does not bind third parties.
Need more information?
Please contact us through our official channel (support@ezitxt.com) if you need more information or have any questions. If you’re concerned about email security you can send a PGP encrypted message to our team.
Acknowledgements
Ezitxt appreciates the professionalism and support of all the security researchers who have helped us.
Below are the researchers who agreed to be publicly acknowledged for their effort.
Name & Profile