check out The Cave podcast
we know you will like it :)
AWFixer Legal
Community
AWFixer Legal
AWFixer Legal
  • Preamble
  • Who are we?
  • License
  • Compliance Framework Notices
  • Mission
  • The Pay to Play Model
  • austins personal services
    • The deleteme Service
  • Public Platform and Community Notices
    • Discord Notices
  • Legal Notices
    • Privacy
      • English - Simplified Language
    • Terms
      • English - Simplified Language
    • Targeted Marketing Policy
    • User and Usage Tracking
    • Data Retention
    • End User License Agreement
    • Your Ownership Rights
  • Advertising Policy
  • Security
    • Public Disclosure
  • Governance
    • Overview
    • Board of Directors
    • Management
    • Community Influence
  • Subprocessors
    • Nerds Run LLC
    • Google LLC
    • Functional Software
    • Fly.io
    • Digital Ocean
    • Ghost Foundation
    • Github Inc
    • Gitlab Inc
    • Discord Inc
  • Internet Presence
    • Domains
Powered by GitBook
LogoLogo

AWFixer Industries

  • AWFixer Industries
  • AWFixer Tech
  • AWFixer Development
  • AWFixer OS
  • AWFixer Foundation

Smoney Talk

  • Patreon
  • Buy Me a Coffee
  • Ko-Fi
  • GitHub Sponsors

Our Products

  • Dislang
  • AWFixerOS

© 2025 AWFixer Industries, austin and contributers

On this page
  • Our Public Disclosure Policy at AWI
  • What happens when we are breached?
  • What next?
  • Is there anything else?
  • and finally?
Export as PDF
  1. Security

Public Disclosure

what happens when we mess up?

PreviousAdvertising PolicyNextOverview

Last updated 9 days ago

Our Public Disclosure Policy at AWI

has as much to do with our peace of mind as it has to do with yours. We would not be able to sleep at night if we knew that we had lost your PII and had not taken the time to warn you.

What happens when we are breached?

the first thing that you will see is we will take the comprimised system(s) offline, which you will be able to see and keep up on

What next?

We will then takie an extremely close look at all of our systems, not just the ones that we know were breached, so that we can uncover any retained access before it is used again.

Is there anything else?

We yes, depending on what happened and just how bad it is determined to be, we will make a posting on our public and any changes we make to mitigate the attack and help prevent future ones will be posted on the

and finally?

we will write up a very detailed blog post about the incident and post it on the

here
news site
changelog
blog
Page cover image