Skip to main content

Responsible disclosure

At Securitas, we consider the security of our systems a top priority. But no matter how much effort we put into system security, there can still be vulnerabilities present. If you discover a vulnerability, we would like to know about it so we can take steps to address it as quickly as possible. We ask you to help us better protect our systems.

Please do the following

  • Report your findings through our webform below.
  • Please do not take advantage of the vulnerability or problem you have discovered, for example by downloading more data than necessary to demonstrate the vulnerability or deleting or modifying other people's data;
  • Do not reveal the problem to others until it has been resolved;
  • Do not publicly disclose any vulnerability before 30 days after we confirm to you the vulnerability has been resolved by us and we have provided our written consent of publication.
  • Do not include any sensitive data in the public disclosure of the vulnerability;
  • Do not use attacks on physical security, social engineering, distributed denial of service, spam or applications of third parties;
  • Do not use automated scanners which can cause performance issues on our servers; and
  • Do provide sufficient information to reproduce the problem, so we will be able to resolve it as quickly as possible.

What we will do

  • We will make our best effort to respond to your report within 5 business days with our initial evaluation of the report;
  • If you have followed the instructions above, we will not take any legal action against you in regard to the report;
  • We will handle your report with confidentiality, and not pass on your personal details to third parties without your permission;
  • We will try to keep you informed of the progress towards resolving the problem;
  • In the public information concerning the problem reported, we will give your name as the discoverer of the problem (unless you desire otherwise); and
  • As a token of our gratitude for your assistance, we offer a reward for every report of an important security problem that was not yet known to us. The amount of the reward will be determined by us, based on the severity of the leak and the quality of the report. Any rewards will be conditional on accepting our Responsible Disclosure Terms.

Legal

  • By submitting a report to us, you acknowledge that you have read and agreed to these terms. You also warrant and represent to Securitas that you are the sole creator of the submission and you hereby grant Securitas the permission to use, reproduce, copy, modify and otherwise dispose of your submission in a manner as Securitas sees fit.
  • You understand that we will process your personal information that you submit with your report in order for us to contact you and communicate throughout the vulnerability resolution process.
  • You acknowledge and agree that you shall not use your relationship with Securitas or the Securitas Group for any marketing or financing purposes or as reference in any personal or professional presentation, documentation or other material, or in any way utilize any trade name, business name, logotype or trade mark of Securitas or the Securitas Group without our explicit written consent.

Submit your report

Use this form to submit your responsible report to us. Please note that some of the fields are required.

Confirm your e-mail address (Required)

INSTRUCTIONS: Please visit the CVSS - Common Vulnerability Scoring System Version 3.1 Calculator website first.org/cvss/calculator/3.1 and fill in the information in the Base Score section. Enter the Base Score value and the Vector string value in the fields here below.

UPLOADING FILES: Maximum file size: 3 MG. Allowed file formats: jpg, png, pdf, xlsx.

Accept terms and conditions (Required)
An error has occurred while getting captcha image

Questions can be sent to responsible.disclosure@securitas.com.

Sorry, www.securitas.com does not support Internet Explorer. To enjoy our website, try using a newer browser like Chrome, Safari, Firefox, or Edge.