FortiChain prioritizes user privacy and data security. The following policies outline our commitments and practices:
All vulnerability submissions, communications, and transactions are protected by end-to-end encryption.
Utilize cryptographic techniques to verify data authenticity without revealing sensitive details.
Only essential information is collected to facilitate secure registration, reporting, and verification.
Collected data is strictly used for system operations, bounty management, and enhancing platform security.
All vulnerability reports and associated data are recorded on-chain, ensuring a tamper-proof audit trail.
Data is stored for the period necessary to fulfill legal and operational requirements, with options for secure deletion upon user request where applicable.
Access to sensitive data is strictly controlled through role-based permissions, ensuring that only authorized parties can view or modify information.
Researchers can choose to submit reports anonymously, protecting their identity while maintaining accountability through pseudonymous reputation systems.
Optional enhanced security for users to safeguard account access.
Periodic security audits and penetration tests are conducted to identify and remediate potential vulnerabilities.
FortiChain adheres to relevant data protection regulations and cybersecurity standards to ensure robust protection of user information.