FranConnect Vulnerability Disclosure Policy

Last Updated on September 18, 2020

Revision Dated Jan 06, 2020 V1.0

FranConnect, LLC (FranConnect) places a high priority on maintaining the security, privacy and integrity of our products. We are committed in creating a safe, transparent environment in which to report vulnerabilities.

Guidelines for responsible disclosure:

  • Share the security issue with us before making it public to peers, on message boards, mailing lists, and other forums.
  • Allow us reasonable time to respond to the issue before disclosing it publicly. FranConnect’s TAT for closure is 20 business days.
  • Provide full details of the security issue and be open to describing how you found it so we may work on the source/root cause or reproduce the conditions.

Do not engage in security research that involves:

  • Potential or actual denial of service of FranConnect applications and systems.
  • Use of an exploit to view data without authorization, or corruption of data.
  • Requests for direct compensation for the reporting of security issues either to FranConnect or through any external marketplace for vulnerabilities, whether black-market or otherwise.

Reporting security vulnerabilities:

If you have found a security vulnerability or have a security incident to report that could impact FranConnect or our users, we encourage you to report this right away via e-mail to security@franconnect.com. FranConnect will investigate all legitimate reports and fix the problem as soon as possible. Please be sure to include an e-mail address where we can reach you, in case we need more information.

Once we have received a vulnerability e-mail, FranConnect takes a series of steps to address the issue:

  1. FranConnect requests the reporter keep any communication regarding the vulnerability confidential.
  2. FranConnect investigates and verifies the vulnerability.
  3. FranConnect addresses the vulnerability and releases an update or patch to the software. If for some reason this cannot be done quickly or at all, FranConnect will provide information on recommended mitigations.
  4. FranConnect publicly announces the vulnerability in the release notes of the update. FranConnect may also issue additional public announcements, for example via social media, our blog, and media.
  5. Release notes (and blog posts when issued) include a reference to the person/people who reported the vulnerability, unless the reporter(s) would prefer to stay anonymous.
  6. FranConnect will endeavor to keep the reporter apprised of every step in this process as it occurs.
  7. We greatly appreciate the efforts of security researchers and discoverers who share information on security issues with us, giving us a chance to improve our products and services, and better protect our customers. Thank you for working with us through the above process.

Note: FranConnect website and services are not intended for, or designed to attract, individuals under the age of 18. Due to the Children’s Online Privacy Protection Act (COPPA), we cannot accept submissions from children under the age of 13.