Version: 0.11, 18/05/2026
Woodward Associates aim to be a best-in-class provider of high-quality health software solutions, delivering excellence across the customer experience whilst continuously improving our development processes. Ensuring the security and integrity of our products and customer information is central to achieving this ambition.
This Vulnerability Management Policy outlines our approach to addressing security vulnerabilities. We recommend you read this policy in full before reporting a vulnerability and ensure you act in compliance with it.
In addition, Woodward Associates actively monitors the National Vulnerability Database (NVD) to identify and address potential flaws - https://nvd.nist.gov/
Please note, that we do not offer monetary rewards for vulnerability disclosures, however we value those who take the time and effort to report security vulnerabilities responsibly.
If you believe you have identified a security vulnerability, please report it via one of the following:
Security email: security@woodwardassoc.co.uk
Support email: support@woodwardassoc.co.uk
Support desk phone: +44 (0)1753 928131
Upon receipt of a security vulnerability, we will carry out an initial assessment of the report.
This assessment starts with us logging the report and assigning it a unique identification number that will be used throughout the entire process.
We then classify the vulnerability based on the severity of the identified vulnerability, and where necessary contacting those that made the report for additional information until we can reproduce the issue.
The Common Vulnerability Scoring System (CVSS v4.0 - https://www.first.org/cvss/) is used to classify reproduced vulnerabilities based on their severity as below:
We will respond to the initial report based upon the perceived severity as detailed in the table above. We will include the initial assessment and severity classification as part of the acknowledgement.
All affected users and relevant technical partners will be informed within 5 working days of a vulnerability being confirmed.
Within 2 working weeks of initial confirmation, we will schedule appropriate remediation based upon the impact and severity of the vulnerability, as well as the ease or complexity of the exploit required to produce it.
The actual resolution of the vulnerability may vary depending on the nature and severity of the issue.
Affected users and partners will receive regular progress updates detailing the development and implementation of solutions. These updates will be made at key points within the process; when the remediation is identified, when it is scheduled for development, when development is underway, in testing, and finally released.
As part of the implementation of a vulnerability remediation, we will provide full documentation to all our affected users and partners.
We will then notify those who raised the vulnerability that it has been resolved and how it has been remediated.
In addition, we may request the permission of those who raised the vulnerability to publish their relevant investigations and materials.
You MUST NOT:
You MUST:
This policy is intended to be compatible with common vulnerability disclosure good practice. It does not give you permission to act in any manner that is inconsistent with the law, or which might cause the Organisation or partner organisations to be in breach of any legal obligations.