At Atria Convergence Technologies Limited (ACT), safeguarding our data and any other data entrusted to us is our topmost priority. We encourage security researchers to work with us to identify potential security vulnerabilities in our services, products and network and responsibly disclose such vulnerabilities to us to improve the same..
We request you to understand that as we take security vulnerability issues very seriously, we would appreciate proper and responsible reporting of such issues to us so that we can take requisite steps to fix the potential problems as early as possible. Hence, we strongly believe in a synergistic and coordinated approach to ensure the best possible protection of our data, products, network and services.
If you are confident that you have identified a potential security vulnerability issue, please follow ACT’s Bug Bounty Program Policy terms and conditions before submitting a report. You may also note that by submitting the report, you agree to the terms and conditions of ACT’s Bug Bounty Program.
We would not initiate any legal action or lawsuit against you if you legitimately report any security vulnerability issue or potential security vulnerability issue in compliance with the terms and conditions of this Policy.
Please note that this waiver shall not be applicable if your security research involves the networks, systems, information, applications, devices, products, or services of another entity (which is not ACT). We do not entertain and authorize security research or vulnerability testing of any other entity and consider such acts to be a violation of ACT’s Bug Bounty Program Policy. All vulnerabilities and potential security issues affecting ACT should be reported via email to the Cyber Security Incident Response Team via cybersecurity@actcorp.in
If you identify a legitimate security vulnerability, we want to hear about it right away. Your submission will be reviewed and validated by a member of ACT’s Cyber Security Incident Response Team. Providing clear and concise steps to reproduce the issue will help us to expedite the response and we will try to provide our inputs within 5 working days.
You shall not disclose any vulnerability with any 3rd Party or to any public at large including through any social network, public / media without prior written consent from ACT.
This Bug Bounty Policy shall be read along with ACT’s Vulnerability Disclosure policy and only upon you complying with our Vulnerability Disclosure Policyhttps://www.actcorp.in/legal/disclaimer , you shall be eligible under this Bug Bounty Policy.
Please, encrypt all email messages containing information related to potential security vulnerabilities. If you are having trouble encrypting your vulnerability report or have any questions about the process send an Email to (cybersecurity@actcorp.in). We will work with you to identify a method to securely transmit your vulnerability report.
The following information is a ‘must’ to be included in the report:
Proof-of-concept (POC) that details the reproduction of the potential security vulnerability. We assure you that if you provide us a detailed initial Report of your findings, we will do our best acknowledge your report and work towards fixing the identified issues at the earliest.
If you consider yourself to be eligible to participate in the Bug Bounty Program, you must fulfil the following criteria:
Report the details of such testing to ACT immediately so that there is an internal alert created and the sanctity of the investigation conducted by ACT to address the issue is maintained . It is critical to note that failure to comply with any of the above mentioned criteria would immediately disqualify you from being eligible for an award under the Bug Bounty Program.
At ACT, maintaining the security and integrity of our customer’s, employee’s or any other service related personal data is very significant. You as a Security Researcher must ensure that you respect ACT’s privacy policy and act in good faith at all times. Please note that, you must never exploit a vulnerability by attempting to access anyone else's data or personal information. Such activity is considered unauthorized and if during the testing you interact with or obtain access to such private/confidential data or personal information of others, you must:
Report the details of such testing to ACT immediately so that there is an internal alert created and the sanctity of the investigation conducted by ACT to address the issue is maintained . It is critical to note that failure to comply with any of the above mentioned criteria would immediately disqualify you from being eligible for an award under the Bug Bounty Program.
The following are general categories of vulnerabilities that are considered ineligible for a bounty award:
NOTE:
We genuinely appreciate the efforts of Security Researchers who share the requisite information on security or vulnerability issues with us and give us the support to improve our services. However, any conduct by a Security Researcher or reporter that appears to be unlawful, malicious, or of criminal in nature including but not limited to extortion would be immediately disqualified for submission from the Program under this Policy.Eligibility for any bug bounty award and award amount determinations are made at ACT’s sole discretion. The below mentioned points are general guidelines that may vary from published documentation:
Each bug bounty report is individually evaluated based on the technical details provided in the report. ACT generally follows the processes below to evaluate and determine the severity of a reported potential security vulnerability.
ACT’s bug bounty awards range from ₹5000 up to ₹25,000. We take into consideration a range of factors when determining the award amount for eligible reports. Those factors include, but are not limited to, the quality of the report, impact of the potential vulnerability, severity score, whether a POC was provided and the quality of the POC, type of vulnerability. The below table is reflecting to the potential award amounts.
Vulnerability Severity Priority ( P ) | Bounty |
---|---|
Critical (P1) | ₹25,000 |
High ( P2) | ₹15,000 |
Medium ( P3) | ₹10,000 |
Low ( P4) | ₹5,000 |
Bounty award arrangements under this program, including but not limited to the timing, bounty amount and form of payments, are at ACT’s sole discretion and will be made on a case-by-case basis.
ACT makes no representations regarding the tax consequences of the reward or payment that ACT makes under this program. Participants in this program are responsible for any tax liability associated with bounty award payments.
ACT intellectual Property
By submitting your content to ACT (your “Submission”), you agree that ACT may take all steps needed to validate, mitigate, and disclose the vulnerability, and that you grant ACT any and all rights to your Submission needed to do so.
ACT reserves the right to alter the terms and conditions of this program at its sole discretion.
At ACT maintaining the security and integrity of our network, Services and Products is a priority. We are committed to creating a safe, transparent environment to report vulnerabilities; Hence, ACT appreciates the work of security researchers in order to improve our network, Services, Products and its security.
Any security vulnerability found by you that could impact ACT or our customers, we encourage you to report this right away. Any legitimate incident reported by you shall be investigated internally and we shall fix the problem as soon as we can. In this regard, we request you to follow ACT's Vulnerability Disclosure Policy and make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service during your research.
While we encourage any submission affecting every applications, network, product and services that ACT provides including any product that ACT may provide as part of its Services, the following examples are excluded from this program: