Introduction
BetterUp is committed to ensuring the security of our systems. We hope to partner with the security community and we recognize that the work the community does is important in continuing to ensure safety and security of our users. If you believe you have discovered a suspected vulnerability, privacy concern, exposed data, or other security issues in any of our assets, we want to hear from you.
Scope
This policy applies to any digital assets owned by BetterUp.
Assets or other equipment not owned by parties participating in this policy are out of scope for vulnerability reporting. Vulnerabilities discovered or suspected in out-of-scope systems should be reported to the appropriate vendor or applicable authority.
- In the interest of the safety of our users, staff, the Internet at large and you as a security researcher, the following test types are excluded from scope:
- Physical testing such as office access (e.g. open doors, tailgating)
- Social engineering (e.g. phishing, vishing)
- UI and UX bugs and spelling mistakes
- Network level Denial of Service (DoS/DDoS) vulnerabilities or other tests that impair access to or damage an asset
Additionally, please do not send us:
- Personally identifiable information (PII)
- Credit card holder data
Safe Harbor
When conducting vulnerability research according to this policy, we consider research conducted under this policy to be:
- Permitted–in that BetterUp will not initiate or support legal action against researchers as long as they adhere to this policy.
Researchers are expected, as always, to comply with all applicable laws. If legal action is initiated by a third party against a researcher and the researcher has made a good faith effort to comply with this policy,
BetterUp will take steps to make it known that researchers’ actions were conducted in compliance with this policy. At any time, if a researcher has concerns or is uncertain whether security research is consistent with this policy, please submit a report to security@betterup.co before going any further.
Note that the Safe Harbor applies only to legal claims under the control of BetterUp, and does not bind independent third parties.
Our Commitments
- When working with us, according to this policy, security researchers can expect us to:
- Respond to reports promptly, and work directly with researchers to understand and validate reports;
- Strive to keep researchers informed about the progress of a vulnerability as it is processed;
- Work to remediate discovered vulnerabilities in a timely manner, within BetterUp’s operational constraints; and
- Extend Safe Harbor for vulnerability research that conforms to this policy.
Our Expectations
In participating in BetterUp’s vulnerability disclosure program in good faith, we ask that you:
- Play by the rules, including following this policy and any other relevant agreements. If there is any inconsistency between this policy and any other applicable terms, the terms of this policy will prevail;
- Report any vulnerability you’ve discovered promptly;
- Avoid violating the privacy of others, disrupting our systems, destroying or manipulating data, and/or harming or degrading user experience;
- Use only the security@betterup.co email address to discuss vulnerability information with us;
- Provide us a reasonable amount of time (according to a mutually-agreed-upon timeline) to resolve the issue before you disclose it publicly;
- Perform testing only on in-scope systems, and respect systems and activities which are out-of-scope;
- Do not use an exploit to compromise or exfiltrate data, establish persistent command line access, or use the exploit to pivot to other systems.
- If a vulnerability provides unintended access to data:
- Limit the amount of data you access to the minimum required for effectively demonstrating a Proof of Concept; and
- Cease testing and submit a report immediately if you encounter any user data during testing, such as Personally Identifiable Information (PII), credit card data, or proprietary information;
- Only interact with test accounts you own or with explicit permission from the account holder; and
- Do not engage in extortion.
How to Submit a Vulnerability
To submit a vulnerability report to BetterUp’s Security Team, please send an email to security@betterup.co. The more details you provide, the easier it will be for us to triage and fix the issue.