Disclaimer
Verpleegkundige zit naast een kind dat met een oorspiegel in de oren van een pop kijkt
Laatste informatie over het coronavirus

Coordinated Vulnerability Disclosure (English)

At Rijnstate we work hard to maintain and improve the security of our (medical) devices, systems and services. No matter how much effort we put into system security, there might be vulnerabilities. If you discover a vulnerability you can report it safely via our Coordinated Vulnerability Disclosure, so Rijnstate can take safety measurements.

Reporting a vulnerability

If you find a vulnerability, we would like to hear about it so that we can take appropriate measures as quickly as possible. Rijnstate is keen to cooperate with you to protect our clients and systems better.

We monitor our network/systems continuously ourselves. Our Coordinated Vulnerability Disclosure policy is not an invitation to disrupt our netwerk/ systems.

If you comply with our Coordinated Vulnerability Disclosure policy we have no reason to take legal action against you regarding the reported vulnerability. We ask you to:

  • Send your findings to Z-CERT by sending an email to cvd@z-cert.nl encrypted with our PGP-key. Z-CERT is an organization who handles all cyber security issues on behalf of Rijnstate. Z-CERT will work with you and Rijnstate to make sure that your report is handled with care.
  • Provide adequate information to allow Z-CERT to reproduce the vulnerability which helps to resolve the problem as quickly as possible. An IP address or URL of the affected system with a description of the vulnerability will usually be sufficient, although more information might be necessary for more complex vulnerabilities.
  • Do not exploit vulnerabilities, e.g. by downloading more data than is needed to demonstrate the vulnerability, looking into third-party data, deleting or modifying data.
  • If you suspect to have access to medical data we ask you to let us verify this.
  • Do not share information on vulnerabilities until they have been resolved and erase any data obtained through vulnerabilities as soon as possible;
  • Do not attack physical security, use social engineering, distributed denial of service, spam, brute force attacks or third-party applications.

How we will handle your report:

  • Rijnstate and Z-CERT will treat your report confidentially and will not share your personal data unless required by law;
  • Z-CERT will send you an acknowledgement of receipt and will respond to your report with an evaluation and an expected resolution date within 5 working days;
  • Rijnstate and Z-CERT will keep you informed of the progress in resolving the problem;
  • In communication about the reported problem we will mention your name as the discoverer of the problem (unless you desire otherwise).  
  • Rijnstate provides a reward by way of thanks. Depending on the severity of the vulnerability and the quality of the report, the reward can vary.

We strive to resolve any vulnerability as soon as possible. Once the problem has been resolved we will decide in consultation whether and how details will be published.

Not all vulnerabilities can be reported to Rijnstate. We follow Z-CERT guidelines in this. For more information, please consult the Z-CERT website (under ‘Out of scope.’)

With thanks to Floor Terra for his sample text in Dutch on http://responsibledisclosure.nl/.

Sluiten

Welke informatie wilt u downloaden?

De pagina die u nu bekijkt, is automatisch aangevinkt om te downloaden. Ziet u hieronder nog meer pagina’s staan? Dan kunt u zelf aanvinken welke pagina’s u wilt toevoegen.

De huidige pagina

Lettergrootte PDF
Deel PDF via: