Security & Responsible Vulnerability Disclosure Policy
Table of Contents
Introduction
Becoming Alpha, Inc. (the "Company," "we," "us," or "our") is committed to maintaining the highest standards of security for our platform, services, and user data. We recognize that security vulnerabilities may exist despite our best efforts, and we value the security research community's contributions to helping us identify and fix security issues.
This Security & Responsible Vulnerability Disclosure Policy explains our security practices, how to report security vulnerabilities responsibly, and how we work with security researchers to improve our platform's security. This Policy is designed to encourage responsible security research while protecting Becoming Alpha, our users, and researchers from legal risks.
We encourage security researchers, ethical hackers, and members of the security community to report potential security vulnerabilities to us so we can address them before they are exploited by malicious actors. By reporting vulnerabilities responsibly, you help us maintain a secure platform for all users.
Technical Security Controls
Becoming Alpha employs multiple layers of technical security controls to protect our platform, services, and user data. While we do not disclose all security measures to prevent attackers from circumventing them, we implement industry-standard security practices.
Encryption
We use encryption to protect data both in transit and at rest:
- Encryption in Transit: All communications between your device and our servers are encrypted using Transport Layer Security (TLS) 1.2 or higher. This protects your data as it travels over the internet.
- Encryption at Rest: Sensitive data stored on our servers is encrypted using industry-standard encryption algorithms and key management practices. This protects your data even if our storage systems are compromised.
- Database Encryption: Databases containing sensitive user information are encrypted to prevent unauthorized access.
Access Controls
We implement strict access controls to ensure that only authorized personnel can access sensitive systems and data:
- Least Privilege: Employees and contractors are granted only the minimum access necessary to perform their job functions
- Multi-Factor Authentication (MFA): All staff with access to sensitive systems are required to use multi-factor authentication
- Role-Based Access Control: Access to systems and data is based on job roles and responsibilities
- Regular Access Reviews: We regularly review and audit access permissions to ensure they remain appropriate
Network Security
We protect our network infrastructure using multiple security layers:
- Firewalls and Intrusion Detection: Our network is protected by firewalls and intrusion detection/prevention systems that monitor for and block suspicious activity
- DDoS Protection: We use distributed denial-of-service (DDoS) protection services to mitigate attacks and ensure platform availability
- Network Segmentation: Our network is segmented to limit the impact of potential security breaches
- Regular Security Updates: We regularly update and patch our network infrastructure to address known vulnerabilities
Application Security
We implement security measures throughout our application development lifecycle:
- Secure Development Practices: Our development team follows secure coding practices and conducts security reviews during development
- Code Reviews: All code changes are reviewed by multiple developers before being deployed
- Security Testing: We conduct regular security testing, including penetration testing and vulnerability scanning
- Dependency Management: We regularly update third-party libraries and dependencies to address known security vulnerabilities
Security Audits and Assessments
We regularly assess our security posture through:
- Internal Security Audits: Our internal security team conducts regular audits of our systems and practices
- External Security Assessments: We engage third-party security firms to conduct independent security assessments and penetration tests
- Compliance Audits: We undergo regular audits to ensure compliance with applicable security standards and regulations
- Continuous Monitoring: We continuously monitor our systems for security threats and anomalies
Organizational Safeguards
In addition to technical controls, we implement organizational safeguards to protect our platform and user data.
Employee Security Training
All Becoming Alpha employees and contractors receive regular security training, including:
- Security Awareness Training: Regular training on security best practices, phishing awareness, and how to identify and report security threats
- Data Protection Training: Training on how to handle sensitive user data and comply with privacy and data protection requirements
- Incident Response Training: Training on how to respond to security incidents and data breaches
- Role-Specific Training: Additional security training for employees with access to sensitive systems or data
Vendor and Third-Party Risk Management
We carefully vet and monitor third-party vendors and service providers:
- Vendor Security Assessments: We assess the security practices of vendors before engaging them and regularly review their security postures
- Contractual Security Requirements: Our vendor contracts include security requirements and obligations
- Ongoing Monitoring: We monitor vendor security practices and require them to notify us of security incidents that may affect our platform or data
Incident Response Planning
We maintain comprehensive incident response procedures to quickly and effectively respond to security incidents:
- Incident Response Team: We have a dedicated incident response team trained to handle security incidents
- Incident Response Plan: We maintain detailed incident response procedures that are regularly reviewed and updated
- Communication Procedures: We have procedures for communicating security incidents to users, regulators, and other stakeholders as required by law
- Post-Incident Review: After security incidents, we conduct reviews to identify lessons learned and improve our security practices
Business Continuity and Disaster Recovery
We maintain business continuity and disaster recovery plans to ensure service availability and data recovery in the event of security incidents or other disruptions:
- Regular Backups: We maintain regular backups of critical systems and data
- Backup Testing: We regularly test our backup and recovery procedures to ensure they work effectively
- Redundancy: We use redundant systems and infrastructure to minimize the impact of failures
Responsible Vulnerability Disclosure
We encourage security researchers to report security vulnerabilities to us responsibly so we can fix them before they are exploited. Responsible disclosure helps protect our users and platform while allowing researchers to contribute to our security.
How to Report a Vulnerability
If you discover a potential security vulnerability, please report it to us immediately by emailing: security@becomingalpha.world
Please include the following information in your report:
- Description: A clear description of the vulnerability, including how it was discovered
- Impact: An assessment of the potential impact of the vulnerability
- Steps to Reproduce: Detailed steps to reproduce the vulnerability, including any proof-of-concept code or screenshots (if safe to share)
- Suggested Fix: Any suggestions for how the vulnerability might be fixed (optional, but appreciated)
- Your Contact Information: Your name and email address so we can communicate with you about the vulnerability
Our Response Process
When we receive a vulnerability report, we will:
- Acknowledge Receipt: We will acknowledge receipt of your report within 48 hours (typically within 24 hours on business days)
- Initial Assessment: We will conduct an initial assessment to verify the vulnerability and determine its severity
- Investigation: Our security team will investigate the vulnerability to understand its scope and impact
- Remediation: We will develop and implement a fix for the vulnerability
- Verification: We will verify that the fix resolves the vulnerability
- Disclosure: Once the vulnerability is fixed, we may publicly disclose it (with your permission) and credit you for the discovery
Timeline: We aim to resolve critical vulnerabilities within 30 days of report, and high-severity vulnerabilities within 90 days. However, resolution time may vary depending on the complexity of the vulnerability and our development cycle.
What to Expect
Communication: We will keep you informed of our progress in addressing the vulnerability. We may ask for additional information or clarification as needed.
Credit: With your permission, we would like to credit you publicly for discovering the vulnerability. We will not disclose your name or personal information without your consent.
Recognition: Depending on the severity and impact of the vulnerability, we may offer recognition or compensation as described in the "Recognition and Bug Bounties" section below.
Rules for Good-Faith Security Testing
We encourage responsible security research on our platform. To ensure that security testing is conducted safely and legally, please follow these rules:
Authorized Testing Scope
You may test security vulnerabilities on our publicly accessible services, including:
- Our public-facing websites and web applications
- Public APIs and endpoints
- Mobile applications available through public app stores
Test Only Your Own Accounts: You may only test vulnerabilities using accounts that you own or have explicit written permission to test. Do not access, modify, or delete data belonging to other users.
Prohibited Activities
The following activities are strictly prohibited, even for security testing purposes:
- Unauthorized Access: Do not access systems, data, or accounts that you do not own or have explicit permission to access
- Data Exfiltration: Do not download, copy, or exfiltrate data beyond what is necessary to demonstrate the vulnerability
- Disruption of Services: Do not perform denial-of-service attacks, spam attacks, or any activity that could disrupt or degrade our services
- Social Engineering: Do not attempt to social engineer our employees, contractors, or users
- Physical Security Testing: Do not attempt to test physical security measures or access our physical facilities
- Third-Party Systems: Do not test vulnerabilities in third-party systems or services, even if they are integrated with Becoming Alpha
Data Handling
If you encounter user data during security testing:
- Minimize Data Access: Only access the minimum data necessary to demonstrate the vulnerability
- Do Not Share: Do not share, sell, or otherwise disclose any user data you encounter
- Secure Storage: If you must store any data to demonstrate the vulnerability, store it securely and delete it as soon as possible
- Report Immediately: Report any unauthorized access to user data immediately
Safe Harbor for Good-Faith Researchers
If you follow the rules in this Policy and report vulnerabilities responsibly, we will:
- Work with you in good faith to understand and resolve the vulnerability
- Not pursue legal action against you for security testing conducted in accordance with this Policy
- Consider recognizing or compensating you for your contribution (see "Recognition and Bug Bounties" below)
However, this safe harbor applies only to security testing that:
- Is conducted in good faith to identify security vulnerabilities
- Complies with all rules in this Policy
- Is reported to us before being disclosed publicly or to third parties
- Does not involve accessing, modifying, or deleting data belonging to others
- Does not disrupt or degrade our services
Important: This Policy does not authorize any activities that are illegal under applicable law. You are responsible for ensuring that your security testing complies with all applicable laws and regulations.
Prohibited Activities
The following activities are strictly prohibited and may result in legal action:
- Unauthorized Exploitation: Exploiting vulnerabilities to gain unauthorized access to systems, data, or accounts
- Data Exfiltration: Downloading, copying, or stealing user data, proprietary information, or any other confidential information
- Service Disruption: Launching denial-of-service attacks, spam attacks, or any activity that disrupts or degrades our services
- Malicious Code: Introducing malware, viruses, or other malicious code into our systems
- Privacy Violations: Accessing, viewing, or disclosing personal information of other users without authorization
- Extortion: Demanding payment or other benefits in exchange for not disclosing vulnerabilities or in exchange for fixing them
- Public Disclosure Before Fix: Publicly disclosing vulnerabilities before we have had a reasonable opportunity to fix them (typically 90 days from report)
Anyone who engages in these prohibited activities may face:
- Immediate ban from our platform
- Legal action, including criminal prosecution
- Reporting to law enforcement authorities
- Civil liability for damages
We take security seriously and will vigorously pursue legal action against anyone who violates our security or attempts to harm our platform, users, or business.
Recognition and Bug Bounties
We value the contributions of security researchers who help us improve our platform's security. While we may not always offer monetary rewards, we recognize and appreciate responsible security research.
Recognition
With your permission, we will:
- Public Credit: Credit you publicly (e.g., on our website, in security advisories) for discovering and reporting the vulnerability
- Hall of Fame: Include you in our security researchers hall of fame (if we maintain one)
- Thank You: Provide a formal thank you and acknowledgment of your contribution
Bug Bounties
We may offer monetary rewards (bug bounties) for particularly significant vulnerabilities. Bug bounties are awarded at our discretion based on:
- Severity: The severity and potential impact of the vulnerability
- Quality of Report: The quality and clarity of your vulnerability report
- Responsible Disclosure: Whether you followed responsible disclosure practices
Current Status: As of the date of this Policy, we do not have a formal bug bounty program. However, we may offer discretionary rewards for significant vulnerabilities. We are evaluating whether to establish a formal bug bounty program in the future.
If we establish a formal bug bounty program, we will update this Policy and publish program guidelines, reward tiers, and eligibility criteria.
No Guarantee of Reward
Please note that:
- We do not guarantee monetary rewards for vulnerability reports
- Rewards (if any) are awarded at our sole discretion
- We are not obligated to offer rewards for any vulnerability, regardless of severity
- Rewards may vary based on the vulnerability and other factors
We encourage security research regardless of whether rewards are available, as helping improve platform security benefits all users.
Contact Information
To report security vulnerabilities or for questions about this Security & Responsible Vulnerability Disclosure Policy:
Company: Becoming Alpha, Inc. (a Delaware corporation)
Address: 8000 Avalon Boulevard, Suite 100, Alpharetta, GA 30009, USA
Security Email: security@becomingalpha.world
General Support: support@becomingalpha.world
PGP Key: We recommend encrypting sensitive vulnerability reports using PGP. If you need our PGP public key, please contact us at the security email above.
For general security questions or concerns, please contact us using the information above. For urgent security matters that require immediate attention, please mark your email as "URGENT" in the subject line.
For more contact options and additional ways to reach us, please visit our Contact page.