- Do not engage in any activity that can potentially or actually cause harm to Wingmate, our customers, or our employees.
- Do not engage in any activity that can potentially or actually stop or degrade Wingmate services or assets.
- Do not engage in any activity that violates (a) federal or state laws or regulations or (b) the laws or regulations of any country where (i) data, assets or systems reside, (ii) data traffic is routed or (iii) the researcher is conducting research activity.
- Do not store, share, compromise or destroy Wingmate or customer data. If Personally Identifiable Information (PII) is encountered, you should immediately halt your activity, purge related data from your system, and immediately contact Wingmate. This step protects any potentially vulnerable data, and you.
- Provide Wingmate reasonable time to fix any reported issue, before such information is shared with a third party or disclosed publicly.
By responsibly submitting your findings to Wingmate in accordance with these guidelines Wingmate agrees not to pursue legal action against you. Wingmate reserves all legal rights in the event of noncompliance with these guidelines.
Once a report is submitted, Wingmate commits to provide prompt acknowledgement of receipt of all reports (within two business days of submission) and will keep you reasonably informed of the status of any validated vulnerability that you report through this program.