Security

IBA Music takes the security of its systems and the data entrusted to it seriously. This page describes the high-level security measures we use and how to report a suspected vulnerability.

Our security practices

Transport security

All traffic between users and IBA Music services is encrypted with TLS 1.2 or higher using modern cipher suites. Plaintext HTTP requests are redirected to HTTPS. HTTP Strict Transport Security (HSTS) is applied to the legal subdomain and our primary production hosts.

Authentication

Data at rest

Infrastructure

Privacy by design

We keep the minimum data necessary to run the Service. We do not use third-party analytics or advertising trackers on any IBA Music product. See our Privacy Policy for the full description.

Reporting a vulnerability

If you believe you have found a security vulnerability in any IBA Music product or web property, please email us before disclosing it publicly:

privacy@ibamusic.com (Subject line: "Security — {brief description}")

Include, to the extent you can:

We commit to:

Scope

In scope for responsible disclosure:

Out of scope:

Public credit

With your permission, we maintain an acknowledgements list for researchers who have reported valid vulnerabilities and helped us improve. We do not currently operate a paid bug bounty program.

Questions

Email privacy@ibamusic.com. Thank you for helping keep IBA Music's musicians and data safe.