
Base3 Solutions Vulnerability Disclosure Policy
Base3 Solutions are committed to addressing and reporting security issues through a coordinated and constructive approach designed to provide the greatest protection for Base3 Solutions customers, partners, staff and all Internet users.
A security vulnerability is a weakness in our systems or services that may compromise their security. This policy applies to security vulnerabilities discovered anywhere by both Base3 Solutions staff and by others using Base3 Solutions services. The responsibility for this policy is with the senior management team of Base3 Solutions who will review it on an annual process. All day-to-day staff must follow this policy and will receive regular training on how to follow it.
Reporting vulnerabilities:
If you believe you have discovered a vulnerability in one of our services or have a security incident to report, please email securitybase3.co.uk.
Once we have received a vulnerability report, Base3 Solutions takes a series of steps to address the issue:
- We will provide prompt acknowledgement of receipt of your report of the vulnerability
- We request the reporter keep any communication regarding the vulnerability confidential
- We will work with you to understand and investigate the vulnerability
- We will provide a timeframe for addressing the vulnerability.
- We will notify you once the vulnerability has been resolved, to allow retesting by the reporter if needed.
- We publicly announce the vulnerability in the release notes of the update. We may also issue additional public announcements, for example via social media.
- Release notes (and blog posts when issued) will include a reference to the person/people who reported the vulnerability, unless the reporter(s) would prefer to stay anonymous.
Base3 Solutions will endeavour to keep the reporter apprised of every step in this process as it occurs.
We greatly appreciate the efforts of security researchers and discoverers who share information on security issues with us, giving us a chance to improve our services, and better protect our customers. In line with general responsible disclosure good practice, we ask that security researchers:
- Allow Base3 Solutions an opportunity to correct a vulnerability within a reasonable time period before publicly disclosing the identified issue.
- Provide sufficient detail about the vulnerability to allow us to investigate successfully including steps required to reproduce the issue
- We appreciate the use of the Common Vulnerability Scoring System when reporting a vulnerability:
- Do not modify or delete data, or take actions that would impact on Base3 Solutions customers
- Do not carry out social engineering exercises or to attempt to find weaknesses in the physical security of Base3 Solutions offices or other locations.

© The IASME Consortium Limited 2025
This document is made available under the Creative Commons BY-SA license. To view a copy of this license visit https://creativecommons.org/licenses/by-sa/4.0/
You are free to share and adapt the material for any purpose including commercial under the following terms:
- Attribution — You must give appropriate credit to The IASME Consortium Limited, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests The IASME Consortium Limited endorses you or your use (unless separately agreed with The IASME Consortium Limited)
- ShareAlike — If you remix, transform, or build upon the material, you must distribute your contributions under the same license as the original Information contained in this document is believed to be accurate at the time of publication but no liability whatsoever can be accepted by The IASME Consortium Limited arising out of any use made of this information