We solve tech problems.
No monthly retainers.

Security Policy

If you believe you found a security issue in systems operated by IT Help San Diego Inc., please report it responsibly.

Contact

If you need a different secure reporting channel, request one in your initial email.

What To Include

Please include enough detail for reliable triage:

Scope

This policy applies to internet-facing assets owned and operated by IT Help San Diego Inc. for it-help.tech.

If you report an issue in third-party infrastructure, include evidence showing how it directly affects our operated assets.

If your assessment is part of a formally authorized program (government, regulatory, or contracted), include the authorization reference so we can route it correctly.

Authorized Security Testing

IT Help San Diego participates in recurring external security assessments, including CISA Cyber Hygiene scanning and other explicitly authorized testing engagements.

Activities that may otherwise be out of scope are permitted when authorization exists in writing (for example: program agreement, statement of work, or rules of engagement).

Authorized testing may include:

For authorized engagements, follow the signed rules of engagement and designated escalation channels.

Authorized Assessment Intake

For government, regulatory, or contracted testing, include:

Safe Harbor

If you act in good faith and follow this policy, we will treat your research as authorized for coordinated vulnerability disclosure and will not pursue legal action for your report.

This policy does not limit or override permissions granted under separate written government, regulatory, or contractual testing agreements.

Good-faith testing means:

Out Of Scope

The following are generally out of scope unless there is demonstrable business impact:

Response Targets

Public Disclosure

Please do not publicly disclose vulnerabilities until remediation is complete or a coordinated timeline is agreed upon in writing.

Bug Bounty

IT Help San Diego Inc. does not currently operate a paid bug bounty program.

Acknowledgments

We appreciate responsible reports that improve security outcomes. Public credit can be coordinated after remediation, based on reporter preference and operational constraints.

security.txt

Machine-readable reporting details are published at:

Last updated: February 14, 2026.