HackerOne Other Services

Last Updated: June 14, 2016

If set forth on a fully executed Order Form or otherwise mutually agreed by HackerOne and Customer, the Services provided under the Customer Terms and Conditions will include the following professional services. Certain capitalized terms used in this document are defined in the General Terms and Conditions found at https://www.hackerone.com/terms/general, which are incorporated by reference. This document shall form a part of the Terms.

Report Management Services

If agreed by the parties, HackerOne will provide certain report management services to Customer. In providing the report management services, HackerOne will view Vulnerability Information and will perform a series of activities associated with the report management services, including reproducing and validating Vulnerability Information submitted by Finder, communicating to Finder, performing activities on the Customer's systems as part of reproducing and validating the Vulnerability Information. Customer consents to HackerOne's access to and use of the Vulnerability Information for the purpose of providing the report management services. HackerOne makes no representation or warranty with respect to the report management services, and agrees to provide the report management services on an as-is basis. Customer agrees that HackerOne may subcontract the rights and obligations under this paragraph to a subcontractor providing the report management services on HackerOne's behalf, provided that (i) any such contractor has agreed to confidentiality obligations at least as protective of the Vulnerability Information as HackerOne is subject to, and (ii) HackerOne will remain liable for all acts or omissions taken by any such contractor on HackerOne's behalf.

Bounty Management Services

If agreed by the parties, HackerOne will provide certain bounty management services to Customer. In providing the bounty services, HackerOne will view Vulnerability Information and award bounties on Customer's behalf, which will include deciding which Finder will be awarded a bounty and the amount of a bounty based on the Vulnerability Information. Customer consents to HackerOne's access to and use of the Vulnerability Reports for the purpose of providing the bounty services. Customer authorizes HackerOne to make decision on bounty awards at its discretion based on industry best practice. HackerOne makes no representation or warranty with respect to the bounty services, and agrees to provide the bounty services on an as-is basis.

Fees

Customer agrees to pay HackerOne the agreed upon fees for all services including the report management services and/or the bounty services as per terms on the Order Form.