Information Security

Introduction

At EasyDay, we prioritize the security of our products and services, ensuring the protection of our customers and their data. We value the contributions of security researchers and operate a Responsible Disclosure Policy to facilitate the reporting of potential vulnerabilities.

Responsible Disclosure Policy

We encourage security researchers to responsibly disclose any identified vulnerabilities in our systems. If you believe you’ve discovered a potential security issue, please report it to us promptly.

How to Report a Suspected Security Vulnerability

To report a potential vulnerability, please contact our security team at support@easyday.com. Provide a detailed description of the suspected issue, including steps to reproduce it, if possible.

Guidelines for Reporting

  • Confidentiality:Do not publicly disclose the vulnerability until we have had an opportunity to address it.
  • Non-Destructive Testing:Avoid actions that could harm our systems or compromise data integrity.
  • Legal Compliance:Ensure that your actions comply with applicable laws and regulations.

Our Commitment

Upon receiving a vulnerability report, we will:

  • Acknowledge Receipt:Confirm that we have received your report.
  • Investigate Promptly:Assess the reported issue to determine its validity and impact.
  • Provide Updates:Inform you of our findings and any remediation plans.
  • Credit Acknowledgment:With your consent, recognize your contribution once the issue is resolved.

Prohibited Activities

To protect our customers and maintain system integrity, the following activities are strictly prohibited:

  • Data Exfiltration:Accessing, copying or transferring customer data without authorization.
  • Service Disruption:Engaging in actions that could degrade or interrupt our services.
  • Unauthorized Access:Attempting to gain access to accounts or systems without permission.

Security Measures

We employ a range of security measures to protect our systems and customer data, including:

  • Encryption:Utilizing industry-standard encryption protocols to protect data in transit and at rest.
  • Access Controls:Implementing strict access controls to ensure only authorized people can access sensitive information.
  • Regular Audits:Conducting periodic security assessments and audits to identify and address potential vulnerabilities.

Contact Us

For any security-related inquiries or to report a vulnerability, please contact our security team at support@easyday.com

 

×
Your Cart
Cart is empty.
Fill your cart with amazing items
Shop Now
£0.00
Shipping & taxes may be re-calculated at checkout
£0.00
Keep Shopping