Home
HALO Series
Overview
Blade Halo Series
Comparison Charts and Overview of HALO 3,6,10
Blade Halo Technologies
View our technologies embedded in every Blade Halo Outboard
Blade Halo Connect Phone + Watch App
Our Phone and Watch app is now available
halo outboards
HALO 3 — 1.2kw
Compact power for effortless mobility.
HALO 6— 3.0kw
Our flagship blend of power and precision.
HALO 10 — 6.0kw
Unstoppable performance for demanding waters.
Batteries and Controls
Accessories / Gear
Contact
Home
Discover the future of marine propulsion with Blade Outboards.
Halo Series Outboards
Power, efficiency, and design—perfectly balanced in every HALO outboard.
Halo Series Technology
Our HALO core delivers unmatched performance through intelligent electric drive innovation.
HALO 3
·
HALO 6
·
HALO 10
Our HALO Outboard Lineup
Batteries & Controls
Smart power systems and intuitive controls built for effortless performance.
Accessories/Gear
·
About
·
Contact Blade
Get in touch with our team for sales, support, or partnership inquiries.
No More Slow Outboards!
Legal

Cyber Security
& Vulnerability
Policy

Cyber Security and Vulnerability Disclosure Policy

Blade Marine Technologies Limited

Effective Date: March 02 2026

Updated Date: March 02 2026

1. Purpose and Governance Framework

Blade Marine Technologies Limited (“Blade”) maintains a cybersecurity and vulnerability management framework designed to support the confidentiality, integrity, and availability of its systems and services.

Blade’s cybersecurity program is informed by internationally recognized standards and best practices, including principles reflected in:

• ISO/IEC 27001 (Information Security Management Systems)

• ISO/IEC 27002 (Information Security Controls)

• ISO/IEC 29147 (Vulnerability Disclosure)

• ISO/IEC 30111 (Vulnerability Handling Processes)

This Policy outlines Blade’s approach to cybersecurity governance and responsible vulnerability disclosure across its products and digital services.

This Policy does not create contractual rights, warranties, certifications, or guarantees of security.

2. Scope

This Policy applies to Blade-controlled systems, including but not limited to:

• Websites and domains

• Cloud infrastructure and hosted platforms

• Customer portals and dashboards

• Public APIs

• Mobile, desktop, wearable, and web applications

• Embedded firmware and propulsion control systems

• Remote diagnostics and update mechanisms

• Business IT systems and operational platforms

• OEM and integration interfaces

Third-party systems not owned or controlled by Blade are outside the scope of this Policy.

3. Cybersecurity Program

Blade implements administrative, technical, and organizational safeguards appropriate to the nature of its operations. Security controls may include:

• Identity and access management controls

• Role-based authorization

• Encryption of data in transit and, where appropriate, at rest

• Network segmentation and perimeter protections

• Monitoring, logging, and anomaly detection

• Secure development lifecycle processes

• Change management and firmware control procedures

• Incident response planning

• Business continuity measures

• Use of content delivery networks (CDNs), distributed infrastructure, and redundancy mechanisms

Security controls are risk-based and evolve in response to emerging threats, regulatory developments, and operational requirements.

While Blade implements commercially reasonable safeguards consistent with industry practice, no system can be guaranteed to be secure, uninterrupted, or immune from cyber threats.

4. No Security Guarantee

Blade does not warrant or guarantee that:

• Systems will be free from vulnerabilities

• Services will be uninterrupted or error-free

• Data transmissions will be secure

• Cyberattacks, intrusions, or unauthorized access will never occur

All digital systems carry inherent cybersecurity risk. By interacting with Blade systems, users acknowledge and accept such risks to the fullest extent permitted by applicable law.

5. Data Risk Allocation

Users are responsible for maintaining independent backups and safeguards for their own systems and data.

To the maximum extent permitted by law:

• No data transmitted to, stored on, or processed by Blade systems should be considered confidential, private, or immune from risk except where expressly governed by a separate written agreement or mandatory data protection law.

• Blade shall not be liable for loss of data, corruption, unauthorized access, service interruption, ransomware events, denial-of-service incidents, or other cybersecurity-related impacts.

• Blade disclaims responsibility for indirect, consequential, incidental, punitive, or special damages arising from cybersecurity incidents.

Nothing in this section limits non-waivable statutory rights where applicable.

6. Responsible Vulnerability Disclosure

Blade supports coordinated vulnerability disclosure consistent with ISO/IEC 29147 principles.

Security researchers acting in good faith may report potential vulnerabilities to:

Legal at bladeoutboards.com

Reports should include:

• A detailed description of the issue

• Affected system or component

• Reproduction steps (if applicable)

• Supporting evidence

• Contact information

Blade may acknowledge receipt, assess severity, and determine appropriate remediation steps consistent with risk-based prioritization.

7. Good Faith Research Conditions

Security testing must:

• Be conducted in good faith

• Avoid service disruption

• Avoid safety-critical propulsion interference

• Avoid data access beyond what is strictly necessary

• Avoid data exfiltration, destruction, or alteration

• Avoid export control or sanctions violations

• Avoid extortion, coercion, or ransom demands

• Avoid public disclosure prior to coordinated remediation

Testing must never interfere with vessel propulsion systems or maritime safety.

8. Safe Harbor

Blade will not pursue legal action against researchers who:

• Act in good faith

• Comply with this Policy

• Do not exploit vulnerabilities for personal gain

• Do not violate applicable law

Safe harbor does not extend to:

• Unauthorized firmware modification

• Circumvention of technical protection measures

• Data theft or disclosure

• Service disruption

• Intellectual property extraction

• Safety system manipulation

9. Cybersecurity Indemnification

To the maximum extent permitted by law, users agree to defend, indemnify, and hold harmless Blade Marine Technologies Limited and its directors, officers, employees, affiliates, and licensors from and against any third-party claims, damages, losses, liabilities, fines, penalties, and reasonable legal costs arising out of or relating to:

• Unauthorized security testing

• Attempted intrusion or system interference

• Exploitation of vulnerabilities

• Violation of cybersecurity laws or export controls

• Malware introduction or denial-of-service activity

• Integration of Blade systems into insecure environments

• Failure to maintain appropriate independent safeguards

This indemnification applies in addition to any indemnification obligations contained in other governing agreements.

10. Incident Response and Remediation

Blade maintains internal procedures to:

• Detect and assess cybersecurity incidents

• Contain and mitigate threats

• Restore operational integrity

• Deploy patches or firmware updates

• Notify affected parties where required by law

Remediation timelines depend on severity, safety considerations, regulatory requirements, and operational impact.

Blade reserves the right to suspend or restrict access to systems to preserve safety and security.

11. Limitation of Liability

To the fullest extent permitted by law:

Blade shall not be liable for:

• Data loss

• Loss of profits

• Business interruption

• System downtime

• Loss of use

• Reputational harm

• Indirect or consequential damages

Total aggregate liability relating to cybersecurity matters shall be limited as provided in the applicable governing agreement, including the End User License Agreement where applicable.

Under no circumstances shall Blade’s cybersecurity-related liability exceed the limitations set forth in the applicable governing agreement.

12. Policy Modifications

Blade may update this Policy at any time. The current version will be published on official Blade platforms.

Continued use of Blade systems constitutes acknowledgment of any updated version.

13. Force Majeure

Blade shall not be liable for any delay, disruption, vulnerability, security incident response delay, or failure to perform obligations under this Policy resulting from events beyond its reasonable control, including but not limited to:

• Acts of God or natural disasters

• War, terrorism, civil unrest, or sanctions

• Governmental actions or regulatory restrictions

• Cyberattacks, distributed denial-of-service attacks, or widespread internet infrastructure failures

• Telecommunications outages

• Cloud provider or CDN disruptions

• Supply chain interruptions

• Power grid failures

Performance obligations shall be suspended for the duration of the force majeure event and for a commercially reasonable period thereafter necessary to restore affected systems and operations.

14. Assignment

Blade may assign or transfer this Policy, in whole or in part, in connection with a merger, acquisition, corporate restructuring, asset sale, or similar transaction.

No user or third party may assign or transfer any rights or obligations under this Policy without prior written consent from Blade.

15. Survival

The following provisions shall survive termination, suspension, or cessation of use of Blade systems:

• No Security Guarantee

• Data Risk Allocation

• Cybersecurity Indemnification

• Limitation of Liability

• Force Majeure

• Governing Law and Dispute Resolution

• Any provision which by its nature is intended to survive

16. Severability

If any provision of this Policy is determined to be invalid, unlawful, or unenforceable under applicable law, the remaining provisions shall remain in full force and effect.

The invalid provision shall be interpreted or modified to the minimum extent necessary to make it enforceable while preserving its intended purpose.

17. Governing Law and Dispute Resolution

This Policy shall be governed by and construed in accordance with the laws of Hong Kong, without regard to conflict of law principles.

To the fullest extent permitted by applicable law, any dispute, claim, or controversy arising out of or relating to this Policy or cybersecurity matters shall be resolved exclusively by confidential and binding arbitration seated in Hong Kong.

The arbitration shall:

• Be conducted in English

• Be administered by a recognized arbitration institution in Hong Kong

• Be final and binding on the parties

Arbitration shall not be conducted within the United States or under the jurisdiction of any U.S. court.

To the maximum extent permitted by law:

• Class actions, collective proceedings, and representative claims are waived.

• Claims must be brought in an individual capacity only.

Nothing in this section limits non-waivable statutory rights or mandatory dispute resolution mechanisms that cannot legally be excluded.

18. Security Incident Notification and Response (SLA Framework)

18.1 Definition of Security Incident

For purposes of this Policy, a “Security Incident” means a confirmed unauthorized access to, acquisition of, or material compromise of Blade-controlled systems that results in:

• Unauthorized access to personal data where Blade is legally responsible for notification;

• Material corruption or destruction of customer data; or

• Material disruption of core hosted services caused by malicious cyber activity.

Attempted attacks, automated scanning, background internet noise, or events that do not result in confirmed compromise do not constitute a Security Incident under this Section.

18.2 Acknowledgment of Reported Incidents

Upon receipt of a credible report of a potential Security Incident:

• Blade will acknowledge receipt within five (5) business days.

• Blade will initiate internal assessment procedures consistent with its incident response framework.

18.3 Customer Notification Timeline

Where Blade determines that a confirmed Security Incident has occurred and notification is legally required:

• Blade will provide initial notice to affected customers without undue delay and, where applicable law requires, within seventy-two (72) hours of confirmed determination.

• If full details are not yet available, Blade may provide supplemental updates as investigation progresses.

Notification timelines begin upon reasonable confirmation of a Security Incident, not upon first detection of anomalous activity.

18.4 Content of Notification

Where required, notification may include:

• A description of the nature of the Security Incident

• The categories of data affected (if known)

• The likely consequences

• Measures taken or proposed to address the incident

• Recommended mitigation steps for affected parties

Blade may limit technical detail where disclosure would compromise security or ongoing investigations.

18.5 Incident Containment and Remediation

Blade will use commercially reasonable efforts to:

• Contain and mitigate the Security Incident

• Preserve evidence where appropriate

• Restore system integrity

• Implement corrective measures designed to reduce the likelihood of recurrence

Remediation timelines depend on severity, operational complexity, third-party dependencies, and safety considerations.

18.6 Law Enforcement and Regulatory Delay

Notification may be delayed where:

• Law enforcement determines that notification would impede an investigation;

• Regulatory guidance permits delayed disclosure; or

• Immediate notification would materially increase cybersecurity risk.

18.7 Exclusions

Blade shall not be responsible for notification obligations arising from:

• Customer-side security failures

• Insecure integrations or OEM environments

• Third-party platforms not controlled by Blade

• User credential compromise not caused by Blade systems

• Force majeure cyber events impacting global infrastructure

18.8 Limitation of Liability

Nothing in this Section creates:

• A guarantee of incident prevention

• A representation of absolute security

• Expanded liability beyond the limitations set forth in applicable governing agreements

All cybersecurity liability remains subject to the limitation of liability provisions contained in the applicable End User License Agreement or governing contract.

‍

Book a call
Calm structure for fresh ideas and first impressions.
Full Name
Phone
Email
Preferred time
Optional note
We’ll confirm your time via email within 24 hours. Calls are free and non-binding.
Book now
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.