Disclosure Policy
SUBMIT A REPORTIsobar Public Sector believes that everybody should be safe and secure on the internet. Isobar Public Sector is committed to maintaining the security of our assets, systems, and customers’ information. If any potential vulnerabilities are identified in any product, system, or asset belonging to Isobar Public Sector, we encourage security researchers to contact us as soon as possible. If you believe you have identified a potential security vulnerability, please submit it in accordance with our Responsible Disclosure Program.
Thank you in advance for your submission. Isobar Public Sector does not operate a public bug bounty program and will not provide a reward or compensation in exchange for reporting potential issues.
Responsible disclosure program guidelines
Researchers shall ensure that when in the process of disclosing potential vulnerabilities they:- Do not engage in any activity that can cause potential or actual harm to Isobar Public Sector, Isobar Public Sector customers, or Isobar Public Sector employees.
- Do not engage in any activity that can potentially or actually degrade Isobar Public Sector services or assets or cause them to stop entirely.
- Do not engage in any activity that violates (a) applicable laws or regulations or (b) the laws or regulations of any country where (i) data, assets or systems reside, (ii) data traffic is routed or (iii) the researcher is conducting research activity
- Do not engage in any activity that puts Isobar Public Sector in violation of any (a) applicable laws or regulations or (b) the laws or regulations of any country where (i) data, assets or systems reside, (ii) data traffic is routed or (iii) the researcher is conducting research activity.
- Do not store, share, compromise or destroy Isobar Public Sector or any customer data. If any Personal Information is identified, you should immediately stop the activity, remove related data from your system, and immediately contact Isobar Public Sector. This is important for protecting any potentially vulnerable data, and you.
- Do not initiate a fraudulent financial transaction.
- Do not disclose any reported issues to third parties, or publish such reported issues publicly
Submission format
When reporting a potential vulnerability, please include a detailed summary of the vulnerability. This shall include the following:- The target
- The steps
- The tools
- The artifacts
- You may include screen captures to illustrate detail.
Out of scope vulnerabilities
Certain vulnerabilities are considered out of scope for our Responsible Disclosure Program. Out-of-scope vulnerabilities include, but are not limited to:- Physical testing of premises
- Social engineering. For example, attempts to steal cookies, fake login pages to collect credentials
- Phishing
- Denial of service attacks
- Resource Exhaustion Attacks