Security and Trust
Trust is one of our core values and the bedrock of our company. It is written in the DNA of our culture, technology, and focus on customer success.
For any questions regarding the completion of cybersecurity questionnaires, compliance obligations, or other security questions, please reach out to security [at] hivesystems.com
Vulnerability Reporting Policy
At Hive Systems, we take the protection of our customers’ data very seriously.
The Hive Systems cybersecurity team acknowledges the valuable role that independent security researchers play in internet security. As a result, we encourage responsible reporting of any vulnerabilities that may be found in our site or applications. Hive Systems is committed to working with security researchers to verify and address any potential vulnerabilities that are reported to us.
Please review these terms before you test and/or report a vulnerability. Hive Systems pledges not to initiate legal action against researchers for penetrating or attempting to penetrate our systems as long as they adhere to this policy.
Testing for security vulnerabilities:
Whenever a Development or Staging account is available, please conduct all vulnerability testing against such instances. Always use test accounts when testing our online services. You may reach out to security [at] hivesystems.com for access when available.
Reporting a potential security vulnerability:
Privately share details of the suspected vulnerability with Hive Systems by sending an email to security [at] hivesystems.com
Provide full details of the suspected vulnerability so the Hive Systems cybersecurity team may validate and reproduce the issue
Hive Systems does not permit the following types of security research:
While we encourage you to discover and report to us any vulnerabilities you find in a responsible manner, the following conduct is expressly prohibited:
Performing actions that may negatively affect Hive Systems or its users (e.g. Spam, Brute Force, Denial of Service…)
Accessing, or attempting to access, data or information that does not belong to you
Destroying or corrupting, or attempting to destroy or corrupt, data or information that does not belong to you
Conducting any kind of physical or electronic attack on Hive Systems personnel, property, or infrastructure
Social engineering any Hive Systems service desk, employee or contractor
Conduct vulnerability testing using anything other than test accounts
Violating any laws or breaching any agreements in order to discover vulnerabilities
The Hive Systems cybersecurity team commitment:
We ask that you do not share or publicize an unresolved vulnerability with/to third parties. If you responsibly submit a vulnerability report, the Hive Systems cybersecurity team and associated development organizations will use reasonable efforts to:
Respond in a timely manner, acknowledging receipt of your vulnerability report
Provide an estimated time frame for addressing the vulnerability report
Notify you when the vulnerability has been fixed