
Elite Communications Inc.
Vulnerability Disclosure Policy
At Elite Communications Inc., security is a top priority. We are committed to protecting the confidentiality, integrity, and availability of our systems, services, and customer data. We value the contributions of the security research community and welcome reports of potential vulnerabilities in our products or services.
​
This policy outlines how security researchers can report vulnerabilities to us, what they can expect from us in return, and the rules of engagement to ensure a safe and responsible disclosure process.
​
Reporting a Vulnerability
​
If you believe you have discovered a security vulnerability affecting Elite Communications Inc., please report it to us by emailing:
security@elitecominc.net or submitting the form below.
​
Your report should include, if possible:
​
-
A detailed description of the vulnerability
-
Steps to reproduce the issue
-
The potential impact
-
Any relevant proof-of-concept code or screenshots
​
Rules of Engagement
​
To ensure a collaborative and safe process, we ask that you:
​
-
Do not exploit a vulnerability beyond what is necessary to demonstrate its existence.
-
Do not attempt to access, modify, or delete data that is not your own.
-
Do not disrupt services or degrade the availability of systems (e.g., via denial-of-service attacks).
-
Do not publicly disclose details of the vulnerability until we have had a reasonable opportunity to investigate and remediate it.
-
Act in good faith and comply with applicable laws at all times.
​
Our Commitment
​
When you share a vulnerability with us in accordance with this policy, Elite Communications Inc. commits to:
​
-
Acknowledgement: We will acknowledge receipt of your report within 5 business days.
-
Assessment: We will investigate the report and work to validate the issue promptly.
-
Communication: We will keep you informed of our progress, and provide updates as we work toward a fix.
-
Remediation: We will prioritize and address the issue based on its severity and potential impact.
-
Recognition: With your permission, we may publicly acknowledge your contribution on our Security Hall of Fame page.
​
Safe Harbor
​
If you act in good faith and follow this policy, Elite Communications Inc. will:
​
-
Consider your research authorized under the Computer Fraud and Abuse Act (CFAA) and similar laws.
-
Not initiate legal action against you for activities conducted under this policy.
-
Consider your findings as a valuable contribution to the security of our ecosystem.
​
Out of Scope
​
The following are outside the scope of this policy:
​
-
Physical security testing of Elite Communications Inc. facilities
-
Social engineering, phishing, or pretexting of employees or customers
-
Denial-of-service (DoS/DDoS) attacks
-
Vulnerabilities in third-party products or services not operated by Elite Communications Inc.
​
Thank You
​
We deeply appreciate the efforts of the security community in helping us keep our systems safe. Your responsible disclosure allows us to improve our security posture and better protect our customers.
