Security Notice
Vulnerability Reporting
How to report a vulnerability
We invite security researchers, industry organizations, customers and vendors to collaborate with us and report security vulnerabilities related to BEATS SHOP products and services.
Email for reporting vulnerabilities
If you encounter or discover any security issues with BEATS SHOP products and services, please report them to us by sending an email to [email address removed].
Reporting Email
Email: info@beatsshop.it
Note
Email subject: Name of vulnerability (for example, Vulnerability XXX in Product XXX)
The body of the email can follow the format below or you can choose the necessary information to send.
- Name of the reporter (individual or organization) and contact information
- Vulnerability description (vulnerability type and associated threat)
- Affected products and their versions
- Technical details of potential vulnerabilities, proof of exploits and proof of concept (POC)
- Suggestions to improve and resolve the security issue
- Possible Vulnerability Disclosure Plan
Responding to vulnerabilities
BEATS SHOP places great importance on vulnerability management in its products and services, supports responsible disclosure and management of vulnerabilities, and respects the research work of every security researcher. We will assign dedicated staff to follow up, analyze, and manage each reported security issue to ensure a timely resolution and response. We will send an email with initial feedback within five business days. We will continue to monitor the situation and provide updates on the vulnerability resolution status until the fix is complete.
- Note: Actual vulnerability response time may vary depending on risk level and complexity.
Vulnerability Management
- Vulnerability Identification: We take the initiative to monitor and receive reported potential vulnerabilities and security issues and stay in touch with the reporters.
- Vulnerability Check: We check whether potential vulnerabilities and security issues impact the security of our products, assess the risks, and inform users about remediation times and vulnerability levels.
- Vulnerability Remediation: We develop plans to mitigate risks and remediate vulnerabilities, verify remediation results, and provide product update or patch packages.
- Vulnerability Disclosure: We disclose vulnerability information when workarounds and patches are available (or when new releases are released).
- Issue Improvement: Once the vulnerability is disclosed, we will monitor the effectiveness of the remedy, gather customer feedback and suggestions, and update the patch/package as needed. BEATS SHOP will also continue to improve product development and vulnerability management processes.
Throughout the vulnerability management process, we will strictly control the scope of vulnerability information and limit disclosure to only those personnel involved in fixing the vulnerability. We also require the vulnerability reporter to commit to keeping the vulnerability information confidential until a full resolution is provided to users.
We will take reasonable and necessary measures to protect the vulnerability data we obtain in accordance with applicable law. BEATS SHOP will not share or voluntarily disclose the aforementioned data to other parties unless expressly requested by the affected customer or if required by law.