Adams Digital Security Policy

Last updated: April 27, 2024

Welcome to the Adams Digital Security Policy. As a leading hosting company, we prioritize the security of our networks, systems, and data, as well as the trust of our customers. We are committed to providing secure and reliable services and this policy outlines the measures we have put in place to protect our stakeholders.

Our Commitment

At Adams Digital, we strive to:

  • Protect customer data with the highest standards of security.
  • Uphold transparency in our security practices.
  • Continuously improve our security measures in response to evolving threats.
  • Comply with industry standards and regulatory requirements.

Data Protection

We utilize a range of technologies and practices to ensure the security of data on our platforms:

  • Encryption: Data is encrypted both in transit and at rest using strong encryption protocols.
  • Access Control: Strict access controls are enforced to ensure that only authorized personnel have access to sensitive information.
  • Regular Audits: Our systems are audited regularly for security vulnerabilities and compliance with our security policies.

Incident Response

Adams Digital has a dedicated incident response team that is ready to act in case of a security breach. Our response procedure includes:

  • Immediate Response: Quick action to contain and mitigate any damage caused by a security breach.
  • Investigation: Comprehensive investigation to understand the cause and scope of the breach.
  • Notification: Affected parties are promptly notified in accordance with legal and regulatory requirements.
  • Review and Remediation: Post-incident review of our practices and systems, implementing improvements to prevent future occurrences.

Vulnerability Reporting

We deeply appreciate any effort to discover and coordinate the disclosure of security vulnerabilities. Adams Digital does not currently operate a public bug bounty program or offer monetary rewards for vulnerability reports, but individuals may be acknowledged in security bulletins as appropriate.

If you would like to report a vulnerability in one of our products or services, or have security concerns regarding Adams Digital hosting services or systems, please email

To support a timely and effective response to your report, please include any of the following:

  • Steps to reproduce or proof-of-concept

  • Any relevant tools, including versions used

  • Tool output

Adams Digital takes all vulnerability reports very seriously and aims to quickly respond and verify the vulnerability before taking the necessary steps to address it. After an initial reply to your disclosure, which should be directly after receiving it, we may update you periodically with our response and remediation status.

Secure Reporting

We encourage responsible disclosure of any potential security vulnerabilities. For secure communication, we recommend using PGP encryption when sending sensitive information related to security vulnerabilities. Compatible email clients can automatically retrieve our public PGP key via the Web Key Directory (WKD) protocol, ensuring secure and confidential communication.

Here’s how you can use PGP encryption:

  1. Ensure your email client supports automatic key retrieval via WKD, or configure your PGP tool to use WKD.
  2. Compose your message and use your PGP tool to encrypt and sign it for
  3. Send the encrypted message to us at

For clients that do not support WKD, you may manually retrieve our public PGP key from:

After downloading the key, you can encrypt and sign your message using a command like:

gpg --encrypt --sign --armor -r yourmessage.txt

Please report suspected vulnerabilities to us at We appreciate your help in keeping our services secure for everyone.

Updates to Our Security Policy

This security policy may be updated periodically to reflect new regulatory requirements, changes in industry standards, or improvements to our security practices. We encourage you to review this policy regularly.

Contact Us

For more information about our security practices, or if you have any questions, please contact us at: Email:

We are dedicated to maintaining the highest standard of security at Adams Digital and appreciate your partnership in helping us achieve this goal.