Information Security

Security Overview

To learn more about our security program at Padmura and find security compliance artifacts, please reference our Security Status Page below:

Reporting Security Issues

If you believe you have discovered a vulnerability in a Padmura product or have a security incident to report, contact us at When researching a potential vulnerability in a Padmura product, please adhere to and remain cognizant of the following rules of the road:

  • Do not exploit any Padmura product beyond what is necessary to provide Padmura with the steps to replicate the potential vulnerability. Practically, this means not compromising accounts, downloading data, or causing a denial of service or destructive outcomes.
  • We consider the following potential vulnerabilities out of scope and ask that you refrain from reporting or conducting activities aimed at social engineering, clickjacking, incomplete or non-implementation of protocols or configurations that you may consider industry standard (e.g., TLS enforcement, CSP/SPF/DMARC/DKIM), and Padmura Javascript code or integrations on a third party’s systems (research into such potential vulnerabilities should be governed by that third party’s responsible disclosure program).

Once we have received a vulnerability report, Padmura takes a series of steps to address the issue:

  • Padmura requests the reporter keep any communication regarding the vulnerability confidential.
  • Padmura investigates and verifies the vulnerability using the reporter’s detailed instructions to replicate.
  • Padmura addresses the vulnerability, which may include patching the requisite software or system or using compensating controls to mitigate any harm.
  • Padmura will endeavor to keep the reporter apprised of the outcome of their report and, at that time, shall provide consent to the reporter’s publication of the vulnerability.

We greatly appreciate the efforts of security researchers and discoverers who share information on security issues with us, giving us a chance to improve our products and services and better protect our customers. Thank you for working with us through the above process.

To exercise these rights, reach out to us. Identity verification may be requested to process your application.

When you use our Site, Service, Service Providers, place an order, or contact us, you are acknowledging that you have read, understand, and agree to be bound by all of our Policies referenced and/or published on this site, collectively referred to as TOU, which includes our Legal Notice Disclaimer, Privacy Policy, Content Policy, Information & Security Policy, GDPR Statement, California Prop 65 Notice, Accessibility Statement, Bot & Crawler Access Terms of Use Policy, Advertising & Analytics Policy, Product Reviews Policy, Mobile Terms of Service, Shipping Policy, Return Policy, Cookie Policy, Data Collection opt-out, DMCA Compliance Statement, and Terms of Use Policy. Any disagreements must be settled with binding arbitration.