Terms of Use

Terms of Use

Terms and Conditions of Use

Pushtolearn Terms and Conditions of Use

Security

Report Security Vulnerability

PushtoLearn is committed to resolving any issues that may compromise the security of our products and services as quickly as possible. We take security vulnerabilities very seriously and protecting client data is one of our top priorities.

If you have discovered a security vulnerability, we would appreciate if you could keep your findings strictly confidential and disclose the relevant information to us in a responsible manner, as described below.

How to report a security vulnerability?
If you think you’ve found a security vulnerability in PushtoLearn products, services or online platforms, please contact us immediately via email below:
Email contact: info@pushtolearn.com

What to include in the report?
Please provide as much detail as possible. In particular, we would appreciate the following:
- An explanation of the security vulnerability
- A list of the products and services that may be affected (versions where applicable)
- Steps to reproduce the vulnerability
- Proof-of-Concept code or software
- Test accounts you have created
- URLs, IP addresses or infrastructure associated with the vulnerability (if relevant)
- Your contact information, such as your organisation and contact name for ongoing communication

Please do not:
- Take advantage of a security vulnerability
- Access, delete or modify PushtoLearn or client data
- Publicly disclose a vulnerability until it has been resolved
- Download more data than necessary to demonstrate a vulnerability
- Attempt to break into client accounts
- Ask for compensation for your report
- Use Social Engineering, Denial of Service or Phishing attacks

Next Steps

Please maintain confidentiality and do not make your research public until we have completed our investigation and implemented patches or other mitigations.

PushtoLearn security team will endeavour to contact you within 72 hours of you reporting the security vulnerability and keep you informed on our progress towards resolving the vulnerability. We will notify you when the security vulnerability has been patched or mitigated, and add your name to our acknowledgments page if your vulnerability is valid.