Vulnerability Disclosure Policy

Vulnerability Disclosure Policy

R3-IoT Ltd. is committed to addressing and reporting security issues through a coordinated and constructive approach designed to provide the greatest protection for R3-IoT Ltd. customers, partners, staff, and all Internet users.

A security vulnerability is a weakness in our systems or services that may compromise their security. This policy applies to security vulnerabilities discovered anywhere by both R3-IoT Ltd. staff and by others using R3-IoT Ltd. services. The responsibility for this policy is with the senior management team of R3-IoT Ltd. who will review it on an annual process. All day-to-day staff must follow this policy and will receive regular training on how to follow it.

Reporting vulnerabilities:

If you believe you have discovered a vulnerability in one of our services or have a security incident to report, please email security@r3-iot.com.

Once we have received a vulnerability report, R3-IoT Ltd. takes a series of steps to address the issue:

  1. We provide prompt acknowledgement of receipt of your report of the vulnerability.
  2. We request the reporter keep any communication regarding the vulnerability confidential.
  3. We will work with you to understand and investigate the vulnerability.
  4. We will provide a timeframe for addressing the vulnerability.
  5. We will notify you once the vulnerability has been resolved, to allow retesting by the reporter if needed.
  6. We publicly announce the vulnerability in the release notes of the update. We may also issue additional public announcements, for example via social media.
  7. Release notes (and blog posts when issued) will include a reference to the person(s) who reported the vulnerability unless said person(s) prefer to stay anonymous.

R3-IoT Ltd. will endeavour to keep the reporter apprised of every step in this process as it occurs.

We greatly appreciate the efforts of security researchers and discoverers who share information on security issues with us, giving us a chance to improve our services, and better protect our customers. In line with general responsible disclosure good practice, we ask that security researchers:

  • Provide R3-IoT Ltd. with an opportunity to correct a vulnerability within a reasonable period before publicly disclosing the issue identified.
  • Provide sufficient detail about the vulnerability to allow us to investigate successfully including steps required to reproduce the issue.
  • We appreciate the use of the Common Vulnerability Scoring System when reporting a vulnerability.
  • Do not modify or delete data nor take actions that would impact R3-IoT Ltd. customers.
  • Do not carry out social engineering exercises or to attempt to find weaknesses in the physical security of R3-IoT Ltd. offices or other locations.

This document was last updated 11 April 2022

Proud to be supported by