diff --git a/README.md b/README.md
index 131ce8484..ffb2e908d 100644
--- a/README.md
+++ b/README.md
@@ -115,11 +115,11 @@ Setup your local development environment for [AEM as a Cloud Service SDK](https:
### Security Vulnerabilities
-The aem-project-archetype is not a product, such as if we update the archetype to address security vulnerabilities it will automatically propagate to all the projects created using it. The archetype is rather a template customers use to start a project from, essentially copy & pasting code and running some post-processing scripts.
+The aem-project-archetype is not considered part of the core AEM product, in that if Adobe updates the archetype to address security vulnerabilities it will not automatically propagate to all the projects created using it. The archetype is rather a template you can use to start a project, essentially copying ans pasting code and running some post-processing scripts.
-Users of the archetype are responsible to update the build-time dependencies of their so created projects themself to address any security vulnerabilities, including any maven dependencies, maven plugin dependencies and npm package dependencies. Furthermore and in particular for maven dependencies it is important to understand that they usually describe the minimal API version the code supports at runtime. The dependency versions effectively used at runtime may be newer and not vulnerable. Please always verify any reported vulnerable (transitive) dependencies against the list of bundles deployed at runtime in AEM as a Cloud Services or the currently used Service Pack on AMS or on-prem.
+Users of the archetype are responsible for updating the build-time dependencies of their projects created with the archetype to address any security vulnerabilities, including any maven dependencies, maven plugin dependencies, and npm package dependencies. Furthermore (and in particular for maven dependencies) it is important to understand that they usually describe the minimal API version the code supports at runtime. The dependency versions effectively used at runtime may be newer and not vulnerable. Please always verify any reported vulnerable (transitive) dependencies against the list of bundles deployed at runtime in AEM as a Cloud Services or the currently used Service Pack on AMS or on-prem.
-Please continue to report security vulnerabilities to us. However, we use some 3rd party dependencies, which we only have partial control over. For those it is important to report the vulnerabilities directly to the owner or to the contributors of these dependencies. We will update the archetype once the transitive dependencies have been updated, but that may take a considerable amount of time.
+Please continue to report security vulnerabilities to Adobe. But please understand that Adobe uses some third-party dependencies, which it only has partial control over. For such dependencies it is important to report the vulnerabilities directly to the owner or to the contributors of these dependencies. Adobe will update the archetype once the transitive dependencies have been updated, but that may take more time.
In order to update update transitive dependencies, please exclude the vulnerable transitive dependency and declare a more recent version within the project. For example:
@@ -140,4 +140,4 @@ In order to update update transitive dependencies, please exclude the vulnerable
commons-io
2.7
-```
\ No newline at end of file
+```