Legal

Responsible Disclosure Property

This document explains how Dumpster Rental Systems encourages the responsible reporting of security vulnerabilities and outlines how such reports are reviewed and handled.

Last Updated

October 14, 2024

ERS/DRS is providing this service to help ensure a safe and secure environment for all users. If external parties find any sensitive information, potential vulnerabilities, or weaknesses, please help by responsibly disclosing it to [email protected]. This policy applies to ERS/DRS hosted applications and to any other subdomains or services associated with products. ERS/DRS does not accept reports for vulnerabilities which solely affect marketing websites https://www.eventrentalsystems.com/ and https://dumpsterrentalsystems.com containing no sensitive data.

Security researchers must not:
  • engage in physical testing of facilities or resources,
  • engage in social engineering,
  • send unsolicited electronic mail to ERS/DRS users, including “phishing” messages,
  • execute or attempt to execute “Denial of Service” or “Resource Exhaustion” attacks,
  • introduce malicious software,
  • execute automated scans or tools that could disrupt services, such as password guessing
    attacks, or be perceived as an attack by intrusion detection/prevention systems,
  • test in a manner which could degrade the operation of ERS/DRS systems; or
    intentionally impair, disrupt, or disable ERS/DRS systems,
  • test third-party applications, websites, or services that integrate with or link to or from
    ERS/DRS systems,
  • delete, alter, share, retain, or destroy ERS/DRS data, or render ERS/DRS data
    inaccessible, or,
  • use an exploit to exfiltrate data, establish command line access, establish a persistent
    presence on ERS/DRS systems, or “pivot” to other ERS/DRS systems.
Security researchers may:
  • View or store ERS/DRS nonpublic data only to the extent necessary to document the
    presence of a potential vulnerability.
Security researchers must:
  • cease testing and notify us immediately upon discovery of a vulnerability,
  • cease testing and notify us immediately upon discovery of an exposure of nonpublic
    data, and,
  • purge any stored ERS/DRS nonpublic data upon reporting a vulnerability.

Thank you for helping to keep ERS/DRS and our users safe!

Scroll to Top