CreativeGround Cybersec
Transparency & Trust
We operate with clear, verifiable practices around testing, reporting, encryption, and handling. This page explains what we collect, who can read it, how we route disclosures, and how we’re accountable to both clients and contractors.
- • We prove realistic risk, not chase scan volume.
- • Black-box testing mirrors real-world scenarios.
- • We represent clients and protect contractors.
- • We ensure legal scope, approvals, and safe delivery.
- • We minimise personal data and log access.
- • We publish methods and accept scrutiny.
Evidence handling (whistleblowing & testing)
- • Whistleblower evidence is readable by CreativeGround only, not by contractors.
- • We decrypt in a segregated ‘evidence desk’ environment with access logging and four-eyes approvals for exports.
- • We redact before sharing with companies or authorities—unless the reporter explicitly consents to share raw artifacts, or law requires it.
- • All movement of evidence is recorded with timestamps, hashes, and approvers.
Encryption & keys
Submissions in the urgent modal are encrypted client-side. Evidence is encrypted to CreativeGround (so we can triage) and to the reporter (so they keep control).
Not configured
Use of contractors & our responsibility
We focus on consulting and outsource pentesting to trusted partners under strict scopes. We ensure legality, approvals, and reporting are correct—and we take responsibility both ways: to protect contractors from unsafe asks, and to protect clients from unvetted activity.
- • Scopes, timelines, and points of contact are documented and signed.
- • High-risk tests require explicit written approvals and change controls.
- • Delivery uses safe-handling: PoCs delivered with two-key transfer (client + contractor) so we can stage and verify without broad exposure.
- • If reverse engineering or malware analysis is needed, we engage specialist partners under our controls.
Disclosure & mediation
For urgent risks to others’ data or safety, we can notify the relevant organisation or authority with anonymised details to protect the reporter. With consent, we can share redacted technical evidence.
We are not a law firm. When appropriate, we coordinate with your counsel to meet legal obligations and timelines.
Retention & deletion
- • Whistleblower metadata (routing info) retained for the minimum time needed to mediate.
- • Encrypted evidence retained only while the case is active or where law/contract requires.
- • On closure, we schedule deletion or return per agreement; logs and hash manifests are kept for audit where allowed.
Transparency summary
We publish periodic summaries with counts and timelines. Personal data is not included.
Next step
Verify our key & see the policy
Compare the fingerprint above, then read how we handle intake, evidence, redaction, and disclosure timelines.