Privacy Policy

FortiChain prioritizes user privacy and data security. The following policies outline our commitments and practices:

  1. Data Protection and Privacy Principles

    End-to-End Encryption

    All vulnerability submissions, communications, and transactions are protected by end-to-end encryption.

    Zero-Knowledge Proofs

    Utilize cryptographic techniques to verify data authenticity without revealing sensitive details.

  2. Data Collection and Usage

    Minimal Data Collection

    Only essential information is collected to facilitate secure registration, reporting, and verification.

    Purpose-Driven Usage

    Collected data is strictly used for system operations, bounty management, and enhancing platform security.

  3. Data Storage and Retention

    Immutable Records

    All vulnerability reports and associated data are recorded on-chain, ensuring a tamper-proof audit trail.

    Retention Policy

    Data is stored for the period necessary to fulfill legal and operational requirements, with options for secure deletion upon user request where applicable.

  4. Data Access and Control

    Role-Based Permissions

    Access to sensitive data is strictly controlled through role-based permissions, ensuring that only authorized parties can view or modify information.

    User Anonymity Options

    Researchers can choose to submit reports anonymously, protecting their identity while maintaining accountability through pseudonymous reputation systems.

  5. Security Measures and Compliance

    Two-Factor Authentication (2FA)

    Optional enhanced security for users to safeguard account access.

    Regular Audits

    Periodic security audits and penetration tests are conducted to identify and remediate potential vulnerabilities.

    Compliance

    FortiChain adheres to relevant data protection regulations and cybersecurity standards to ensure robust protection of user information.