Derive Security and Trust

Trust is the bedrock of our company. It is written in the DNA of our culture, technology, and focus on customer success. 

For any questions regarding the completion of cybersecurity questionnaires, compliance obligations, or other security questions, please reach out to security [at] deriverisk.com

Vulnerability Reporting Policy

At Derive, we take the protection of our customers’ data very seriously.

The Derive cybersecurity team acknowledges the valuable role that independent security researchers play in internet security. As a result, we encourage responsible reporting of any vulnerabilities that may be found in our site or applications. Derive is committed to working with security researchers to verify and address any potential vulnerabilities that are reported to us.

Please review these terms before you test and/or report a vulnerability. Derive pledges not to initiate legal action against researchers for penetrating or attempting to penetrate our systems as long as they adhere to this policy.

Testing for security vulnerabilities:

Whenever a Development or Staging account is available, please conduct all vulnerability testing against such instances. Always use test accounts when testing our online services. You may reach out to security [at] deriverisk.com for access when available.

Reporting a potential security vulnerability:

  • Privately share details of the suspected vulnerability with Derive by sending an email to security [at] deriverisk.com

  • Provide full details of the suspected vulnerability so the Derive cybersecurity team may validate and reproduce the issue

Derive does not permit the following types of security research:

While we encourage you to discover and report to us any vulnerabilities you find in a responsible manner, the following conduct is expressly prohibited:

  • Performing actions that may negatively affect Derive or its users (e.g. Spam, Brute Force, Denial of Service…)

  • Accessing, or attempting to access, data or information that does not belong to you

  • Destroying or corrupting, or attempting to destroy or corrupt, data or information that does not belong to you

  • Conducting any kind of physical or electronic attack on Derive personnel, property, or infrastructure

  • Social engineering any Derive service desk, employee or contractor

  • Conduct vulnerability testing using anything other than test accounts

  • Violating any laws or breaching any agreements in order to discover vulnerabilities

The Derive cybersecurity team commitment:

We ask that you do not share or publicize an unresolved vulnerability with/to third parties. If you responsibly submit a vulnerability report, the Derive cybersecurity team and associated development organizations will use reasonable efforts to:

  • Respond in a timely manner, acknowledging receipt of your vulnerability report

  • Provide an estimated time frame for addressing the vulnerability report

  • Notify you when the vulnerability has been fixed