
Callsign
External Program
Submit bugs directly to this organization
Callsign makes digital life smoother and safer by helping organizations establish and preserve digital trust so people can get on with their digital lives. We use deep learning techniques combining event, threat, and behavioral analytics with multi-factor authentication to provide risk intelligence in real-time – enabling organizations to intelligently adjust authentication journeys and catch fraudulent activity more effectively. Callsign IDA is the first true representation of identity online, built to enhance digital trust.
#Purpose
This expanded program is intended to give security researchers terms and conditions for conducting vulnerability discovery activities directed at Callsign information systems, and submitting discovered vulnerabilities to Callsign. If questions arise, please take no action until that action is discussed with The Callsign Security Team.
#Overview
Maintaining the security of our systems and networks is a high priority for Callsign. Our information technologies provide critical services to our customers, Callsign employees and contractors. Recognizing that the broader security research community regularly makes valuable contributions to the security of the Internet, Callsign believes that a close relationship with this community will also improve our security. As a result, if you have information about a vulnerability, we want to hear from you!
Please review program terms and conditions carefully before conducting any testing of Callsign networks and submitting a report. You must agree to abide by these terms and conditions. Failure to abide by the terms and conditions will result in the loss of being considered a security researcher under the program.
#Scope
Information systems, web property, or data owned, operated, or controlled by Callsign.
#How to Submit a Report
Please provide a detailed summary of the vulnerability including: type of issue; product, version, and configuration of software containing the bug; step-by-step instructions to reproduce the issue; proof-of-concept; impact of the issue; and suggested mitigation or remediation actions, as appropriate.
By clicking “Submit Report,” you are indicating that you have read, understood, and agreed to the terms and conditions of the program for the conduct of security research and disclosure of vulnerabilities or indicators of vulnerabilities related to Callsign information systems, and that you consent to having the contents of the communication and follow-up communications stored on a information system.
#Guidelines
Callsign will deal in good faith with security researchers who discover, test, and submit vulnerabilities or indicators of vulnerabilities in accordance with these terms and conditions:
#What You Can Expect From Us
We take every disclosure seriously. We will investigate every disclosure and strive to ensure that appropriate steps are taken to mitigate risk and remediate all reported vulnerabilities.
Callsign has a complex technology footprint, therefore the time to resolution can vary.
Callsign remains committed to coordinating with the security researcher transparently and promptly. This includes taking the following actions:
Please, always review and follow the "Scope" section of this program and never test systems that are explicitly out of it. This is because those systems use 3rd party providers that we do not own and/or control so, you are not going to be covered by the Terms and Conditions of our program and they can try to find and fine you.
#Legal
This policy does not grant authorization, permission, or otherwise allow express or implied access to Callsign information systems to any individual, group of individuals, consortium, partnership, or any other business or legal entity. However, if a security researcher working in accordance with the terms and conditions of this Vulnerability Disclosure Program (VDP) discloses a vulnerability, then Callsign will, in the exercise of its authorities, take the following steps to: (1) not initiate or recommend any law enforcement action or civil lawsuits related to such activities against that researcher, and (2) Inform the pertinent law enforcement agencies or civil plaintiffs that the researchers activities were, to the best of our knowledge, conducted pursuant to, and in compliance, with the terms and conditions of the program.
You must otherwise comply with all applicable country, state, and local laws in connection with your security research activities. You may not engage in any security research or vulnerability disclosure activity that is inconsistent with terms and conditions of the program or the law. If you engage in any activities that are inconsistent with the terms and conditions of the program or the law, you will not be considered a security researcher and may be subject to criminal penalties and civil liability.
Callsign may modify the terms and conditions or terminate the program at any time.