Security
Security
We take security seriously. This page outlines our security practices and how to report vulnerabilities.
Our Security Practices
At Reimagined Software LLC, we implement industry-standard security measures to protect our systems and your data:
- Encryption of data in transit and at rest
- Regular security assessments and code reviews
- Secure development practices and dependency management
- Access controls and authentication mechanisms
- Continuous monitoring and incident response procedures
Vulnerability Disclosure Policy
We appreciate the work of security researchers who help us keep our products and users safe. If you discover a security vulnerability, we ask that you:
- Report the vulnerability to us privately before public disclosure
- Provide sufficient detail for us to reproduce and address the issue
- Allow reasonable time for us to investigate and fix the vulnerability
- Avoid accessing or modifying user data during your research
- Act in good faith to avoid privacy violations and service disruptions
How to Report a Vulnerability
- Security Contact
- security@reimaginedsoftware.com
When reporting a vulnerability, please include:
- Description of the vulnerability and its potential impact
- Steps to reproduce the issue
- Any proof-of-concept code or screenshots
- Your contact information for follow-up
Response Process
When we receive a vulnerability report:
- We will acknowledge receipt within 48 hours
- We will investigate and validate the reported issue
- We will work on a fix and keep you informed of progress
- We will credit researchers who report valid vulnerabilities (unless you prefer to remain anonymous)
Scope
This policy applies to all products and services operated by Reimagined Software LLC. We are primarily interested in vulnerabilities that could impact the security or privacy of our users.