Responsible Disclosure Policy

At Halcom, trust is our #1 value, and we take protecting our customers’ data very seriously.

The Halcom security team acknowledges the valuable role that independent security researchers play in internet security. As a result, we encourage responsible reporting of any vulnerabilities found in our site or applications. Halcom is committed to working with security researchers to verify and address any potential vulnerabilities reported to us.

Please review these terms before you test and/or report a vulnerability. Halcom pledges not to initiate legal action against researchers for penetrating or attempting to penetrate our systems as long as they adhere to this policy.

Who can disclose vulnerability?

  • users of Halcom services,
  • security researchers and pen testers,
  • the general public.

To whom does this policy not apply?

  • Halcom’s employees,
  • Halcom’s external partners (e.g. vendors).

What to disclose?

Discovered security vulnerabilities/weaknesses in Halcom’s products, services, webpages, or systems, such as:

  • authentication bypass or privilege escalation,
  • remote code execution,
  • obtaining sensitive user information.

What is not relevant for us?

The following security vulnerabilities are not interesting to us and are not eligible for bounty:

  • denial of service,
  • spamming,
  • any other service not directly hosted or controlled by Halcom.

What activities are prohibited?

While we encourage you to discover and report to us any vulnerabilities you find responsibly, the following conduct is expressly prohibited:

  • performing actions that may negatively affect Halcom or its users (e.g., Spam, Brute Force, Denial of Service…),
  • accessing, or attempting to access, data or information that does not belong to you,
  • destroying or corrupting, or attempting to destroy or corrupt, data or information that does not belong to you,
  • conducting any physical or electronic attack on Halcom personnel, property, or data centers
  • Social engineering any Halcom service desk, employee, or contractor,
  • conducting vulnerability testing of participating services using anything other than test accounts (e.g., Developer or Trial Edition instances),
  • violating any laws or breaching any agreements to discover vulnerabilities.

In case we detect any of the activities listed above, none of the provisions stipulated by the policy do not apply. This includes our pledge not to initiate legal actions against researchers.

Reporting a potential security vulnerability

Send an email to us at ciso@halcom.com. We prefer that you use proper encryption and protection of the information you send. Be sure to include the following information:

  • Privately share details of the researcher/you and of suspected vulnerability with Halcom.
  • Provide full details of the suspected vulnerability so the Halcom security team may validate and reproduce the issue
    • code which reproduces the issue,
    • detailed description and potential impact of vulnerability,
    • the steps to reproduce the vulnerability,
    • any relevant logs, screenshots,
    • name,
  • how to deliver (secure delivery of the documents).

The report can be submitted anonymously. But in this case, the researcher is not entitled to the financial reward. Financial rewards are only granted to identified researchers.

Reward eligibility

The researcher that acts within the framework of this policy is eligible to receive a monetary award (bounty).

The criteria to reward the security researcher:

  1. previously unknown security vulnerability,
  2. prevented damage to Halcom,
  3. sufficient severity,
  4. prompt reporting,
  5. vulnerability not publicly disclosed,
  6. no defrauded Halcom users or Halcom itself in the process of discovery,
  7. exploits used to the extent necessary to confirm a vulnerability’s presence:
    • no privacy violations,
    • no degradation of user experience,
    • no disruption to production systems,
    • no destruction or manipulation of data,
  8. not a Halcom employee or vendor.

Financial award (bug bounty)

All bounty amounts will be determined at the discretion of Halcom. Halcom team which will evaluate each report for severity, impact, and quality.

Rewards amounts vary depending upon the severity of the vulnerability reported. There could be submissions that we determine have an acceptable level of risk such that we do not make changes.

Halcom team retains the right to determine if the bug submitted to the Bug Bounty Program is eligible. All determinations regarding the amount of a bounty made by the Halcom team are final.

Payment

The award is paid on bank account. Crypto payment is not possible.

Public recognition

We are happy to thank every individual researcher who submits a vulnerability report, helping us improve our overall security posture at Halcom.

If the researcher agrees, Halcom publishes the researcher’s name on the Halcom’s website.

Halcom’s commitments

We ask that you do not share or publicize an unresolved vulnerability with/to third parties. If you responsibly submit a vulnerability report, the Halcom security team and associated development organizations will use reasonable efforts to:

  • Respond in a timely manner, acknowledging receipt of your vulnerability report
  • Provide an estimated time frame for addressing the vulnerability report
  • Notify you when the vulnerability has been fixed.