Last updated 2025-10-14
This policy applies to all IT assets owned or operated by Torena (“Company”). This includes, but is not limited to, the Company’s websites, self-service platforms, API interfaces, network infrastructure, and other digital systems. This policy does not apply to customer-operated or customer-managed resources, even if they operate within the Company’s infrastructure – such as virtual servers, private network segments, or client-deployed software. It also does not apply to internal testing or audit activities.
The purpose of this policy is to promote transparent and constructive collaboration between the Company and security researchers, technical professionals, clients, or other individuals who have identified potential vulnerabilities. The policy is designed to establish a clear and secure process for submitting reports, with the goal of identifying risks early and helping prevent potential harm.
Security vulnerabilities considered relevant under this policy include conditions that may affect the security of the Company’s managed IT resources, such as self-service platforms, websites, API interfaces, or network components. Such issues may include:
This list is not exhaustive. If you are unsure whether a particular behavior or condition constitutes a security concern, the Company encourages you to contact us using the details provided in this policy.
Vulnerability reports should be submitted by email to security@torena.lt. Where possible, please include the following information:
To ensure secure communication, we recommend using the Company’s public PGP key, available on our official website or upon request.
We expect reporters to act responsibly, ethically, and proportionately, in accordance with the following principles:
The Company reserves the right to update or amend this policy at any time. Updates may be made to reflect changes in legal requirements, internal processes, or service development. The latest version of this policy is always published on the Company’s official websites.
If you act in good faith, follow the terms of this policy, and do not attempt to harm the Company, its clients, or its infrastructure, your actions will not be considered a violation or grounds for legal action. This policy should not be interpreted as permission to conduct broad security testing or intrusion attempts—any activity must remain proportionate, non-destructive, and must not compromise the integrity of data or services. The Company reserves the right to evaluate each case individually and will aim to cooperate with responsible reporters in resolving identified issues.