Audora Security and Trust
Trust is the bedrock of our company. It is written in the DNA of our culture, technology, and focus on customer success.
For any questions regarding the completion of cybersecurity questionnaires, compliance obligations, or other security questions, please reach out to security [at] goaudora.com
Vulnerability Reporting Policy
At Audora, we take the protection of our customers’ data very seriously.
The Audora cybersecurity team acknowledges the valuable role that independent security researchers play in internet security. As a result, we encourage responsible reporting of any vulnerabilities that may be found in our site or applications. Audora is committed to working with security researchers to verify and address any potential vulnerabilities that are reported to us.
Please review these terms before you test and/or report a vulnerability. Audora pledges not to initiate legal action against researchers for penetrating or attempting to penetrate our systems as long as they adhere to this policy.
Testing for security vulnerabilities:
Whenever a Development or Staging account is available, please conduct all vulnerability testing against such instances. Always use test accounts when testing our online services. You may reach out to security [at] goaudora.com for access when available.
Reporting a potential security vulnerability:
Privately share details of the suspected vulnerability with Audora by sending an email to security [at] goaudora.com
Provide full details of the suspected vulnerability so the Audora cybersecurity team may validate and reproduce the issue
Audora does not permit the following types of security research:
While we encourage you to discover and report to us any vulnerabilities you find in a responsible manner, the following conduct is expressly prohibited:
Performing actions that may negatively affect Audora or its users (e.g. Spam, Brute Force, Denial of Service…)
Accessing, or attempting to access, data or information that does not belong to you
Destroying or corrupting, or attempting to destroy or corrupt, data or information that does not belong to you
Conducting any kind of physical or electronic attack on Audora personnel, property, or infrastructure
Social engineering any Audora service desk, employee or contractor
Conduct vulnerability testing using anything other than test accounts
Violating any laws or breaching any agreements in order to discover vulnerabilities
The Audora cybersecurity team commitment:
We ask that you do not share or publicize an unresolved vulnerability with/to third parties. If you responsibly submit a vulnerability report, the Audora cybersecurity team and associated development organizations will use reasonable efforts to:
Respond in a timely manner, acknowledging receipt of your vulnerability report
Provide an estimated time frame for addressing the vulnerability report
Notify you when the vulnerability has been fixed