diff --git a/state/wwwpublic/.well-known/security-disclosure-policy-erda.dk.txt b/state/wwwpublic/.well-known/security-disclosure-policy-erda.dk.txt
index a81594949..cb2334d13 100644
--- a/state/wwwpublic/.well-known/security-disclosure-policy-erda.dk.txt
+++ b/state/wwwpublic/.well-known/security-disclosure-policy-erda.dk.txt
@@ -7,6 +7,10 @@ security monitoring as well as the national DK-Cert monitoring. So we
do NOT have a bug/vulnerability reward program. Yet, we are of course
grateful for any bug or security reports, which might improve our
services or prevent abuse.
+If you report such a bug/vulnerability of significance, we will make
+sure to accredit your contribution in our corresponding release notes.
+We develop the underlying platform as Free and Open Source Software,
+so such mentions will be available for everyone online to see.
Like e.g. Google we do NOT consider the presence of version
information a security vulnerability in itself. Flaws affecting only
diff --git a/state/wwwpublic/.well-known/security-disclosure-policy-migrid.org.txt b/state/wwwpublic/.well-known/security-disclosure-policy-migrid.org.txt
index 8f1f23617..33b0c3529 100644
--- a/state/wwwpublic/.well-known/security-disclosure-policy-migrid.org.txt
+++ b/state/wwwpublic/.well-known/security-disclosure-policy-migrid.org.txt
@@ -7,6 +7,10 @@ security monitoring as well as the national DK-Cert monitoring. So we
do NOT have a bug/vulnerability reward program. Yet, we are of course
grateful for any bug or security reports, which might improve our
services or prevent abuse.
+If you report such a bug/vulnerability of significance, we will make
+sure to accredit your contribution in our corresponding release notes.
+We develop the underlying platform as Free and Open Source Software,
+so such mentions will be available for everyone online to see.
Like e.g. Google we do NOT consider the presence of version
information a security vulnerability in itself. Flaws affecting only
diff --git a/state/wwwpublic/.well-known/security-disclosure-policy-sif.erda.dk.txt b/state/wwwpublic/.well-known/security-disclosure-policy-sif.erda.dk.txt
index 97f8193b7..d79f17c84 100644
--- a/state/wwwpublic/.well-known/security-disclosure-policy-sif.erda.dk.txt
+++ b/state/wwwpublic/.well-known/security-disclosure-policy-sif.erda.dk.txt
@@ -7,6 +7,10 @@ security monitoring as well as the national DK-Cert monitoring. So we
do NOT have a bug/vulnerability reward program. Yet, we are of course
grateful for any bug or security reports, which might improve our
services or prevent abuse.
+If you report such a bug/vulnerability of significance, we will make
+sure to accredit your contribution in our corresponding release notes.
+We develop the underlying platform as Free and Open Source Software,
+so such mentions will be available for everyone online to see.
Like e.g. Google we do NOT consider the presence of version
information a security vulnerability in itself. Flaws affecting only
diff --git a/state/wwwpublic/terms-storage.deic.dk.html b/state/wwwpublic/terms-storage.deic.dk.html
index 6d680118b..4eadb1c57 100644
--- a/state/wwwpublic/terms-storage.deic.dk.html
+++ b/state/wwwpublic/terms-storage.deic.dk.html
@@ -75,7 +75,7 @@
- Electronic Research Data Archive
+ DeiC Storage
@@ -293,7 +293,7 @@
@@ -145,7 +145,7 @@
@@ -217,7 +217,7 @@
@@ -265,7 +265,7 @@
Can I use a YubiKey security device for stronger and safer authentication? - UCPH generally recommends securing your logins with MFA and offer + It generally recommends securing your logins with MFA and offer employees e.g. the small keyring-format hardware security keys from Yubico for the purpose. You might want to have a word with your local leader about perhaps getting one if you haven't done so already. It can be used for various - common UCPH services and we offer basic support for it on DeiC Storage - and SIF, too. For now you can use it along with the + common IT services and we offer basic support for it on DeiC Storage + and DeiC Sensitive Storage, too. For now you can use it along with the Yubico Authenticator app to actually get a 3-factor authentication. Namely, your usual user credentials, your physical YubiKey and the @@ -331,15 +331,17 @@
- Vidste du at du kan prøvekøre DeiC Storages nye moderniserede - brugergrænseflade? - Du kan nemt skifte mellem den traditionelle - og den nye - brugergrænseflade ved at skifte User Interface fra V2 til V3 eller - omvendt på din Settings. + Bekymrer du dig om sikkerheden på din konto hos DeiC Storage? DeiC Storage tilbyder valgfri + 2FA på alle tjenester. Dette reducerer risikoen for misbrug af kontoen betragteligt. + Selv i tilfælde, hvor nogen har opsnappet dit kodeord. Grundet generelle sikkerhedsovervejelser, + og nylig øgning af phishing-angreb, så anbefaler vi at slå 2FA til. Det sker ved at følge + en kort guide til + opsætning af 2-faktor godkendelse.