Definition of Vulnerability
Positec defines a vulnerability as a security issue in a product that can be exploited and which once exploited by an attacker, can result in a breach of the integrity, availability, or confidentiality of the product. Vulnerabilities are not the same as quality defects, quality defects are triggered without the need for an attacker to utilize them when the trigger conditions are met, while vulnerabilities must be triggered by an attacker after they have been utilized. Please do not discuss or disclose product vulnerabilities or intelligence details in any public forum or platform without permission. Positec will pursue legal liability for any such behavior.
Security First
Positec takes the security of its own products and business very seriously, and we accept outsiders to submit suspected vulnerability reports to us to help us improve the security of our business, and thus keep our users information safe.
Vulnerability Reduction and Mitigation
Although vulnerabilities are unavoidable in terms of industry consensus, we will still strive to:
  • take measures to reduce vulnerabilities in our products and services;
  • provide users with risk mitigation programs in a timely manner once vulnerabilities in our products and services are identified.
Continuous optimization
Network security is a dynamic process of continuous evolution, threats and attacks are updating, and the defense should be continuously updated. We will continue to optimize, and constantly learn from industry standards and industry best practices to improve the maturity of our vulnerability management.
lifecycle

Our smart products will be provided with support and security updates for at least 3 years from the date of manufacture.