Vulnerability Disclosure Policy

1. INTRODUCTION
At TRYITTECH LLP, we recognize the vital role of security researchers and ethical hackers in helping us maintain strong information security, data protection, and platform reliability.
This policy outlines the process for identifying, reporting, and responsibly disclosing security vulnerabilities related to TRYITTECH LLP’s digital platforms, systems, applications, and services.
2. SCOPE
This policy applies to all security research conducted on TRYITTECH LLP websites, digital workforce platforms, internal applications, and cloud-based services.
Participation in vulnerability discovery implies agreement with the terms of this policy.
4. GUIDELINES FOR REPORTING
Reports should include: Clear description of the vulnerability, expected secure behavior, affected system/URL, step-by-step reproduction instructions, and supporting evidence (screenshots/logs).
Reports should be based on manual research (not automated bulk scans) and must include valid contact information.
6. UNAUTHORIZED ACTIVITIES
Strictly prohibited: Modifying/deleting data, disrupting services, accessing private user/client data, conducting DoS/DDoS attacks, and unauthorized sharing of discovered information.
9. SAFE HARBOUR
If researchers follow this policy, act in good faith, and avoid harm or data misuse, TRYITTECH LLP will not pursue legal action related to the vulnerability discovery.
11. TRYITTECH LLP COMMITMENT
We make reasonable efforts to acknowledge reports promptly, investigate issues, communicate progress, and resolve vulnerabilities based on severity and risk.
User Compliance
- I confirm that I have read and understood the Vulnerability Disclosure Policy.
- I will act in good faith and follow responsible disclosure practices.
- I will not exploit vulnerabilities beyond a proof of concept.
- I understand that unauthorized activities may lead to legal consequences.