Security Policy

1. Introduction

Our commitment at Vector Trading is to maintain the highest standards of security for our platform, users, and partners. This policy outlines our security protocols, practices, and the steps we take to ensure the protection of our digital assets and user data.

2. Reporting a Vulnerability

We value the security community and recognize the importance of researchers in helping keep our platform secure. If you've discovered a security vulnerability in our systems, we urge you to inform us responsibly.

Disclosure Policy

  • Notify us as soon as you identify a potential vulnerability.
  • Give us reasonable time to address the vulnerability before disclosing it publicly.
  • Refrain from accessing, modifying, or deleting unauthorized data.
  • Do not exploit security vulnerabilities beyond the necessary extent of proving their existence.

3. Data Protection and Privacy

  • Encryption: We employ strong encryption algorithms to protect data in transit and at rest.
  • Data Retention: Personal data is kept only for as long as necessary and in alignment with our data retention policies.
  • Third-Party Vendors: All third-party vendors undergo rigorous security assessments before integration.

4. Application and Network Security

  • Regular Scans: Our systems undergo periodic vulnerability and penetration testing.
  • Patch Management: Updates are regularly applied to our systems to patch any known vulnerabilities.
  • Access Control: Strict access control measures are in place to ensure only authorized personnel can access our systems.

5. Incident Response

In case of a security breach, we have an established incident response protocol to handle and mitigate risks promptly. Affected users will be informed in accordance with applicable legal regulations.

6. Employee Training and Awareness

All employees undergo periodic security training to stay updated on best practices and emerging threats. They are taught the importance of maintaining the confidentiality and privacy of user data.

7. Acknowledgments

We value the work of security researchers and the community. Visit our acknowledgments page to see the list of individuals who have made significant contributions to our platform's security.

8. Review and Updates

This security policy is reviewed and updated annually or following significant changes to our systems or infrastructure.

9. Contact

For any security concerns or queries, please contact our security team at: [email protected]