Last updated: 15 April 2026
Databreachtimes.com takes the security of its users, sources, and contributors seriously. This Security Policy explains how to report security vulnerabilities and how we handle security-related issues affecting our website and infrastructure.
Reporting a Security Issue
If you discover a security vulnerability, misconfiguration, or potential data exposure related to the databreachtimes.com website, server, or services, please report it responsibly.
Security contact:
security@databreachtimes.com
When reporting an issue, please include:
- A clear description of the vulnerability
- Steps to reproduce the issue, if applicable
- Any relevant screenshots or technical details
We kindly request that you do not publicly disclose the issue before giving us a reasonable opportunity to investigate and resolve it.
Scope
This security policy applies to:
- databreachtimes.com website
- Associated servers and hosting infrastructure
- WordPress core, themes, and plugins
- Public-facing features, including contact forms
This policy does not apply to third-party websites or services that may be linked from our site.
Data Protection and Encryption
- All data transmitted to and from databreachtimes.com is protected using HTTPS/TLS encryption.
- Personal data submitted through the contact form is encrypted in transit.
- Contact form submissions are not stored permanently on the server.
- Access to server logs and administrative systems is restricted to authorized personnel only.
Responsible Disclosure
We support responsible disclosure of security vulnerabilities. We ask security researchers to:
- Avoid exploiting vulnerabilities beyond what is necessary to confirm their existence
- Avoid accessing, modifying, or deleting user data
- Avoid performing denial-of-service (DoS) attacks
We will not pursue legal action against individuals who report vulnerabilities in good faith and in accordance with this policy.
Response Timeline
- We aim to acknowledge valid security reports within 72 hours
- Issues are assessed and prioritized based on severity
- Critical vulnerabilities are addressed with the highest priority
Policy Updates
This Security Policy may be updated from time to time. The most current version will always be available on this page.
Acknowledgements
With the reporter’s permission, we may acknowledge responsible security disclosures publicly.
