Last Reviewed: 14th April 2025
Next Review Due: 14th April 2026
Status: RELIANOID is committed to maintaining high standards of cyber resilience, transparency, and proactive incident management.
(Public Summary)
At RELIANOID, we take the security and continuity of our services seriously. This Incident Response & Reporting Policy outlines how we detect, respond to, and communicate about security incidents that may affect our systems, customers, or partners. Our goal is to minimize disruption, protect data, and ensure regulatory compliance.
A security incident is any event that may:
RELIANOID follows a structured 5-phase incident response process:
Phase | Actions |
1. Detection | Monitor logs, alerts, and reports for unusual or unauthorized activity |
2. Containment | Isolate affected systems or services to limit impact |
3. Eradication | Identify and remove the root cause (e.g., malware, misconfigurations) |
4. Recovery | Restore systems, validate integrity, and resume normal operations |
5. Lessons Learned | Conduct a post-incident review, document findings, and improve controls |
If a confirmed incident impacts customer data or service, RELIANOID will:
We welcome responsible disclosure of potential vulnerabilities or incidents.
If you suspect a security issue affecting RELIANOID please contact us. Include details like logs, IP addresses, and timestamps when available.
We aim to acknowledge all reports within 24 hours and resolve valid issues promptly.