You must NOT:
❋ Break any applicable law or regulations.
❋ Access unnecessary, excessive or significant amounts of data or modify data in our systems or services.
❋ Disrupt our services or systems, use high-intensity invasive or destructive scanning tools to find vulnerabilities or attempt any form of denial of service.
❋ Submit reports detailing non-exploitable vulnerabilities, or reports indicating that the services do not fully align with “best practice”, for example missing security headers.
❋ Submit reports detailing TLS configuration weaknesses, for example “weak” cipher suite support or the presence of TLS1.0 support.
❋ Social engineer, ‘phish’ or physically attack our staff or infrastructure.
❋ Demand financial compensation in order to disclose any vulnerabilities.
You must:
❋ Always comply with data protection rules and must not violate the privacy of our users, staff, contractors, services or systems. You must not, for example, share, redistribute or fail to properly secure data retrieved from the systems or services.
❋ Securely delete all data retrieved during your research as soon as it is no longer required or within 1 month of the vulnerability being resolved, whichever occurs first (or as otherwise required by data protection law).