top of page

Responsible Vulnerability Disclosure Policy

​

Last Updated: February 17, 2026

​

Introduction


We take the security and privacy of our systems, customers, and partners seriously. 
Despite our best efforts to secure our systems, vulnerabilities may still exist. 
We welcome responsible security researchers and members of the public to report 
potential vulnerabilities so we can address them promptly.

​

This Responsible Vulnerability Disclosure Policy outlines how to report vulnerabilities 
and how we will respond.

​

Scope


This policy applies to any publicly accessible systems, services, or websites owned, 
operated, or maintained by our organization, including but not limited to:


• Company websites and domains
• Web applications and online services
• Customer portals and e-commerce platforms
• Public APIs and digital services

​

Systems not owned or controlled by our organization are not covered by this policy.

​

How to Report a Vulnerability


If you discover a potential security vulnerability, please report it by email to:


support@deetservices.com

​

Please include the following information:


• Description of the vulnerability
• Steps to reproduce the issue
• Affected URL, system, or service
• Proof of concept, screenshots, or technical details if available
• Your contact information (optional)

​

We request that reports be made in good faith and include sufficient detail 
to allow us to reproduce and resolve the issue.

​

Our Commitment


When you submit a vulnerability report, we will:


• Acknowledge receipt of your report within a reasonable timeframe
• Investigate the report promptly
• Take appropriate steps to remediate confirmed vulnerabilities
• Maintain communication with you regarding the status, when appropriate
• Not pursue legal action against researchers who follow this policy and act in good faith

Guidelines for Responsible Disclosure


We ask that you:


• Act in good faith and avoid violating privacy, destroying data, or disrupting services
• Do not exploit vulnerabilities beyond what is necessary to demonstrate the issue
• Do not access, modify, or delete data that does not belong to you
• Do not conduct testing that may degrade or disrupt services
• Do not publicly disclose the vulnerability until we have had reasonable time to investigate and resolve it

​

Safe Harbor


We will not pursue legal action against security researchers who:
• Follow this policy
• Act in good faith
• Do not intentionally harm our systems, data, or users

​

This safe harbor applies only to activities conducted in accordance with this policy.

 

Exclusions


The following activities are not permitted:


• Social engineering attacks (phishing, impersonation, etc.)
• Physical attacks against facilities or infrastructure
• Denial-of-service attacks or traffic flooding
• Automated scanning that significantly impacts system performance
• Accessing or attempting to access other users’ data

​

Recognition


We appreciate the efforts of security researchers who help improve our security. 
With your permission, we may acknowledge your contribution.

​

Policy Updates


We may update this policy from time to time. 
The latest version will always be available on our website.

​

Contact


For vulnerability reports or security concerns:


Email: support@deetservices.com

©2026 by Deetservices.com.

bottom of page