BBL SYSTEMS AND SOLUTIONS is providing this service to help ensure a safe and secure environment for all users. 

If external parties find any sensitive information, potential vulnerabilities, or weaknesses, please help by responsibly disclosing it to [email protected]. 

This policy applies to BBL SYSTEMS AND SOLUTIONS hosted applications and to any other subdomains or services associated with products. BBL SYSTEMS AND SOLUTIONS does not accept reports for vulnerabilities which solely affect marketing websites containing no sensitive data. 

Security researchers must not: 

  • engage in physical testing of facilities or resources, 
  • engage in social engineering, 
  • send unsolicited electronic mail to BBL SYSTEMS AND SOLUTIONS users, including “phishing” messages, 
  • execute or attempt to execute “Denial of Service” or “Resource Exhaustion” attacks, 
  • introduce malicious software, 
  • execute automated scans or tools that could disrupt services, such as password guessing attacks, or be perceived as an attack by intrusion detection/prevention systems, 
  • test in a manner which could degrade the operation of BBL SYSTEMS AND SOLUTIONS systems; or intentionally impair, disrupt, or disable BBL SYSTEMS AND SOLUTIONS systems, 
  • test third-party applications, websites, or services that integrate with or link to or from BBL SYSTEMS AND SOLUTIONS systems, 
  • delete, alter, share, retain, or destroy BBL SYSTEMS AND SOLUTIONS data, or render BBL SYSTEMS AND SOLUTIONS data inaccessible, or, 
  • use an exploit to exfiltrate data, establish command line access, establish a persistent presence on BBL SYSTEMS AND SOLUTIONS systems, or “pivot” to other BBL SYSTEMS AND SOLUTIONS systems. 

Security researchers may: 

  • View or store BBL SYSTEMS AND SOLUTIONS nonpublic data only to the extent necessary to document the presence of a potential vulnerability. 

Security researchers must: 

  • cease testing and notify us immediately upon discovery of a vulnerability, 
  • cease testing and notify us immediately upon discovery of an exposure of nonpublic data, and, 
  • purge any stored BBL SYSTEMS AND SOLUTIONS nonpublic data upon reporting a vulnerability. 

Thank you for helping to keep BBL SYSTEMS AND SOLUTIONS and our users safe!