At Tempest, we take the security and privacy of our data and our users’ information seriously. We believe that no system is 100% secure and that collaboration with the security community is a key component of a robust security posture.
This policy is intended to give security researchers clear guidelines for conducting vulnerability discovery activities and to convey our preferences on how to submit discovered vulnerabilities to us.
If you make a good-faith effort to comply with this policy during your security research, we will consider your research to be authorized. We will work with you to understand and resolve the issue quickly, and Tempest will not recommend or pursue legal action related to your research.
Should legal action be initiated by a third party against you for activities conducted in accordance with this policy, we will make this authorization known.
Under this policy, “research” means activities in which you:
The following test methods are not authorized:
To report a vulnerability, please email privacy@tempestns.com.
Your report should include:
When you report a vulnerability, we commit to the following:
This document and all its attachments contain confidential, trade secrets, and proprietary information subject to Tempest Telecom Solutions confidentiality and non-disclosure agreement(s). Unauthorized use, duplication, or disclosure is strictly prohibited without written consent.