Efficlose

Vulnerability Disclosure Policy

Efficlose Vulnerability Disclosure Policy. Learn how to responsibly report security vulnerabilities to us.

Last Updated: December 21, 2025

Introduction

Efficlose strives to help our partners and customers minimize the risk associated with security vulnerabilities in our products. We are committed to maintaining industry best practices in security and vulnerability handling and aim to provide customers with timely information, guidance, and mitigation options to address vulnerabilities.

Handling Vulnerability Reports

We value the insight of industry partners and security researchers, and appreciate all contributions to our security initiatives. Our goal is to ensure remedies and/or mitigating strategies are available at the time of disclosure of Efficlose-specific vulnerabilities, and to work with third-party vendors when remediation requires their collaboration.

If you believe you have discovered a vulnerability, privacy issue, exposed data, or other security issues in any of our assets, we want to hear from you. This policy outlines steps for reporting vulnerabilities to us, what we expect, and what you can expect from us.

As per this policy, all information disclosed about new vulnerabilities is considered confidential and shall only be shared between Efficlose and the reporting party if the information is not already public knowledge until a remedy is available and disclosure activities are coordinated.

Systems in Scope

This policy applies to any assets owned, operated, or maintained by Efficlose, including:

  • The Efficlose website and web applications
  • Efficlose mobile applications
  • Efficlose APIs and backend services
  • Any other digital assets under the efficlose.com domain

Out of Scope

The following are considered out of scope for this policy:

  • Assets or other equipment not owned by Efficlose
  • Third-party services integrated with Efficlose (these should be reported to the respective vendor)
  • Social engineering attacks against Efficlose employees or contractors
  • Physical security vulnerabilities
  • Denial of Service (DoS) attacks

Vulnerabilities discovered or suspected in out-of-scope systems should be reported to the appropriate vendor or applicable authority.

Our Commitments

When working with us according to this policy, you can expect us to:

  • Respond promptly: We will acknowledge your report within 3 business days and work with you to understand and validate your report.
  • Keep you informed: We will strive to keep you informed about the progress of a vulnerability as it is processed.
  • Remediate promptly: We will work to remediate discovered vulnerabilities promptly, within our operational constraints.
  • Provide Safe Harbor: We extend Safe Harbor protection for your vulnerability research related to this policy.
  • Credit researchers: With your permission, we will acknowledge your contribution in our security advisories.

Our Expectations

In participating in our vulnerability disclosure program in good faith, we ask that you:

  • Follow the rules: Play by the rules, including following this policy and other relevant agreements. If there is any inconsistency between this policy and any other applicable terms, the terms of this policy will prevail.
  • Report promptly: Report any vulnerability you've discovered promptly.
  • Respect privacy: Avoid violating the privacy of others, disrupting our systems, destroying data, and/or harming user experience.
  • Use official channels: Use only the Official Channels to discuss vulnerability information with us.
  • Allow reasonable time: Provide us a reasonable amount of time (minimum 90 days from the initial report) to resolve the issue before you disclose it publicly.
  • Stay in scope: Perform testing only on in-scope systems and respect systems and activities that are out-of-scope.
  • Limit data access: If a vulnerability provides unintended access to data, limit the amount of data you access to the minimum required for effectively demonstrating a Proof of Concept. Also, cease testing and submit a report immediately if you encounter any user data during testing, such as Personally Identifiable Information (PII), Personal Healthcare Information (PHI), credit card data, or proprietary information.
  • Use test accounts: You should only interact with test accounts you own or with explicit permission from the account holder.
  • Maintain confidentiality: Do not disclose vulnerability details until Efficlose confirms the fix.
  • Do not store data: Do not store any data discovered during the testing process.
  • No extortion: Do not engage in extortion.

Official Channels

Please report security issues via [email protected], providing all relevant information. The more details you provide, the faster we can triage and address the issue.

When submitting a report, please include:

  • Description of the vulnerability
  • Steps to reproduce the issue
  • Potential impact of the vulnerability
  • Any proof-of-concept code or screenshots
  • Your contact information for follow-up questions

Safe Harbor

When conducting vulnerability research under this policy, we consider this research to be:

  • Authorized regarding anti-hacking laws: We will not initiate or support legal action against you for accidental, good-faith violations of this policy.
  • Authorized regarding anti-circumvention laws: We will not bring a claim against you for circumvention of technology controls.
  • Exempt from Terms of Service restrictions: We waive restrictions in our Terms of Service (TOS) and/or Acceptable Usage Policy (AUP) that would interfere with conducting security research on a limited basis.
  • Lawful and in good faith: Your research is considered lawful, helpful to the overall security of the Internet, and conducted in good faith.

You are expected to comply with all applicable laws in your research, testing, and reporting. If a third party initiates legal action against you and you have complied with this policy, we will take steps to make it known that your actions were conducted in compliance with this policy.

If you have concerns or are uncertain whether your security research is consistent with this policy at any time, please submit a report to [email protected].

Note that the Safe Harbor applies only to legal claims under the control of Efficlose and that the policy does not bind independent third parties.

Response Timeline

We aim to follow these response timelines:

ActionTimeline
Initial acknowledgmentWithin 3 business days
Triage and initial assessmentWithin 7 business days
Status updateEvery 14 days during investigation
Resolution targetWithin 90 days for most vulnerabilities

Recognition

We believe in recognizing the valuable contributions of security researchers. With your permission, we will:

  • Acknowledge you in our security advisories
  • Include you in our Security Researcher Hall of Fame (if applicable)
  • Provide a letter of appreciation upon request

Changes to This Policy

We may revise this policy from time to time. The most current version of the policy will govern our handling of vulnerability reports and will always be available at /vulnerability-disclosure.

Contact Us

If you have any questions about this Vulnerability Disclosure Policy, please contact us at:


We appreciate your help in keeping Efficlose and our users safe.