Security and Trust

Trust is one of our core values and the bedrock of our company. It is written in the DNA of our culture, technology, and focus on customer success. 

For any questions regarding the completion of cybersecurity questionnaires, compliance obligations, or other security questions, please reach out to security [at] hivesystems.com

Vulnerability Reporting Policy

At Hive Systems, we take the protection of our customers’ data very seriously.

The Hive Systems cybersecurity team acknowledges the valuable role that independent security researchers play in internet security. As a result, we encourage responsible reporting of any vulnerabilities that may be found in our site or applications. Hive Systems is committed to working with security researchers to verify and address any potential vulnerabilities that are reported to us.

Please review these terms before you test and/or report a vulnerability. Hive Systems pledges not to initiate legal action against researchers for penetrating or attempting to penetrate our systems as long as they adhere to this policy.

Testing for security vulnerabilities:

Whenever a Development or Staging account is available, please conduct all vulnerability testing against such instances. Always use test accounts when testing our online services. You may reach out to security [at] hivesystems.com for access when available.

Reporting a potential security vulnerability:

  • Privately share details of the suspected vulnerability with Hive Systems by sending an email to security [at] hivesystems.com

  • Provide full details of the suspected vulnerability so the Hive Systems cybersecurity team may validate and reproduce the issue

Hive Systems does not permit the following types of security research:

While we encourage you to discover and report to us any vulnerabilities you find in a responsible manner, the following conduct is expressly prohibited:

  • Performing actions that may negatively affect Hive Systems or its users (e.g. Spam, Brute Force, Denial of Service…)

  • Accessing, or attempting to access, data or information that does not belong to you

  • Destroying or corrupting, or attempting to destroy or corrupt, data or information that does not belong to you

  • Conducting any kind of physical or electronic attack on Hive Systems personnel, property, or infrastructure

  • Social engineering any Hive Systems service desk, employee or contractor

  • Conduct vulnerability testing using anything other than test accounts

  • Violating any laws or breaching any agreements in order to discover vulnerabilities

The Hive Systems cybersecurity team commitment:

We ask that you do not share or publicize an unresolved vulnerability with/to third parties. If you responsibly submit a vulnerability report, the Hive Systems cybersecurity team and associated development organizations will use reasonable efforts to:

  • Respond in a timely manner, acknowledging receipt of your vulnerability report

  • Provide an estimated time frame for addressing the vulnerability report

  • Notify you when the vulnerability has been fixed