As part of our commitment to data protection and security, Beamer has put in place a Bug Bounty Program to ensure any security concern is reported and security researchers are rewarded for their findings. If you are a security researcher, please find below our Bug Bounty Program guidelines.

You can learn more about Beamer’s policies and commitment with security here:

Program Guidelines.

  1. You must use your own Beamer account when researching bugs. Using third-party accounts without consent is strictly prohibited.
  2. Automated tests are not allowed
  3. Bugs and security concerns should be addressed to bugbounty@getbeamer.com
  4. Each bug will be treated separately even if reported with other bugs
  5. You should be the first person to report the bug to be entitled for a reward. Duplicate reports will not have compensation rights, unless additional information is provided.
  6. Compensation will be based on the severity of the bug finding.
  7. Bug Bounty rewards will be paid by PayPal in U.S. dollars after the bug is fixed.
  8. Security research should be conducted following industry standards and no legal actions should be initiated against security researchers, as long as they comply with this policy and guidelines.

Bounty Process

  1. A new bug is reported through bugbounty@getbeamer.com
    • The report should be detailed enough to be able to recreate the issue.
    • Screenshots, videos or GIFs should also included as proof of the issue.
    • Make sure bugs are not related to cached data and perform several tests with the same result before reporting it.
  2. Once the report is received we will check if the bug has already been reported or if it is already being fixed. If not, we will determine the severity of the bug based on the guidelines below, communicate the reward and keep you posted on the resolution.
  3. Once the bug is fixed, we will reward the reporter through PayPal.

Your Data Security and Privacy is our Priority.

At Beamer, we care about our customers’ data and this is how we protect it.

icons

Data Ownership

Your account and data belongs to you and will not be sold in any case. We can delete your account and data upon your request. Learn more

icons

Encryption

Beamer data is encrypted in transit (advanced TLS protocols and 2,048-bit keys or better) and at rest (using AES 256 encryption with integrity).

icons

Access

Customer data is always backed up and uptime is over 99.9%.

icons

GDPR

Beamer is GDPR Compliant and has the Data Processing Agreements in place. Learn more

icons

Penetration testing

Third party network, application and physical security tests are conducted regularly. Learn more