Schedule software introduction

Use the form on the right side to schedule trial introduction with our team ➡️

Shoreline Wind offers a suite of market-leading products that use intelligent data integration and simulation software to optimise and execute wind farm logistics, installation and field services strategies.

 

GAIN ACTIONABLE, DATA-BASED INSIGHTS

Break free from the limitations of customized ERP and maximize production capability and revenue with accurate and realistic full lifecycle modelling.

 

INCREASE PRODUCTION AND AVAILABILITY

Vastly reduce manual input and costly human error by leveraging the power of automation to generate work orders, assign personnel and manage resources.

 

CONNECT PEOPLE AND DATA ACROSS PROJECTS

Achieve safer and more responsive operations and increase cross-collaboration among teams by connecting people and data across projects and lifecycle phases.

 

QUICKLY IDENTIFY AND RESOLVE BOTTLENECKS

Save up to 10% OPEX by optimizing scheduling, replanning, dispatching and deployment with real-time complex field service scenario visualizations.

Login

Responsible disclosure policy

At Shoreline, we consider the security of our systems a top priority. But no matter how much effort we put into system security, there can still be vulnerabilities present. Security is core to our values, and we value the input of hackers acting in good faith to help us maintain a high standard for security and privacy for our users. This includes encouraging responsible vulnerability research and disclosure. This policy sets out our definition of ‘good faith’ in the context of finding and reporting vulnerabilities, as well as what you can expect from us in return.

Expectations

When working with us according to this policy, you can expect us to:

  • Extend Safe Harbor for your vulnerability research that is related to this policy.
  • Work with you to understand and validate your report, including timely initial response to the submission.
  • Work to remediate discovered vulnerabilities in a timely manner.
  • Recognise your contribution to improving our security if you are the first to report a unique vulnerability, with your report triggering a code or configuration change.

Scope

Any service on our domains app.shoreline.no, and mpa.shoreline.no, but not services that are hosted by third parties. Examples of 3rd party services may include but are not limited to, Azure, Amazon AWS, and Google Analytics. If you have any questions about scope, please contact us at disclosure@shoreline.no.

When reporting vulnerabilities, please consider (1) attack scenario/exploitability, and (2) security impact of the bug.

Rewards

We do not offer money or swag as rewards at this point in time.

Disclosure Policy

How to contact us

Our official communication channel is via email to disclosure@shoreline.no.

Ground Rules

To encourage vulnerability research and to avoid any confusion between legitimate research and malicious attack, we ask that you attempt, in good faith, to:

  • Play by the rules. This includes following this policy any other relevant agreements.
  • Report any vulnerability you’ve discovered promptly.
  • Avoid violating the privacy of others, disrupting our systems, destroying data, and/or harming the user experience.
  • Use only the official channels to discuss vulnerability information with us.
  • Do not reveal the problem to others until it has been resolved.
  • Do not use attacks on physical security, social engineering, distributed denial of service, spam, or applications of third parties.
  • Handle the confidentiality of details of any discovered vulnerabilities according to our Disclosure Policy.
  • Perform testing only on in-scope systems, and respect systems and activities that are out-of-scope.
  • Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service.
  • If a vulnerability provides unintended access to data; limit the amount of data you access to the minimum required for effectively demonstrating a Proof of Concept; cease testing and submit a report immediately if you encounter any user data during testing, such as Personally Identifiable Information (PII), Personal Healthcare Information (PHI), credit card data, or proprietary information.
  • Only interact with test accounts you own or with explicit permission from the account holder.
  • Not engage in extortion.

Safe Harbour

When conducting vulnerability research according to this policy, we consider this research to be authorised, lawful, helpful to the overall security of the Internet and conducted in good faith.

You are expected, as always, to comply with all applicable laws. If legal action is initiated by a third party against you and you have complied with this policy, we will take steps to make it known that your actions were conducted in compliance with this policy.

If at any time you have concerns or are uncertain whether your security research is consistent with this policy, please submit a report through one of our official channels before going any further.

What we promise

  • We will respond to your report within 3 business days with our evaluation of the report and an expected resolution date.
  • If you have followed the instructions above, we will not take any legal action against you in regard to the report.
  • We will handle your report with strict confidentiality, and not pass on your personal details to third parties without your permission.
  • We will keep you informed of the progress towards resolving the problem.
  • In the public information concerning the problem reported, we will give your name as the discoverer of the problem (unless you desire otherwise).

Subscribe to our eNewsletter

Gain an insider’s view of cross-sector specific news, issues and policies impacting wind renewables and receive timely updates about the latest industry events and activities.

Wind industry memberships with