At Line-Bell Corporation, we take the security of our systems, assets, products, and platforms with the utmost seriousness. We value the contributions of the security community in helping us protect our users. Disclosing security vulnerabilities and issues is a critical step in maintaining the security and privacy of those who rely on our services. If you believe you have discovered a vulnerability in a Line-Bell Corporation public-facing system, asset, product, or platform, please report the vulnerability to us through one of the communication methods outlined below.
How to Report a Security Vulnerability?
If you believe you have identified a security vulnerability in one of our public-facing systems, assets, products, or platforms, please submit your findings to Line-Bell Corporation through our Vulnerability Disclosure Program (VDP). Include the following details with your report:
A description of the system, asset, product, or platform potentially impacted by the vulnerability.
The potential impact of the vulnerability and how it was discovered.
A detailed, step-by-step description, in English if possible, of how to reproduce the vulnerability (POC scripts, screenshots, and compressed screen captures are all helpful).
Your contact information.
All submissions must be sent via email to the designated address provided above.
If valid, Line-Bell Corporation will confirm receipt of your report in a timely manner.
Is There a Reward?
At this time, we do not offer financial compensation for discoveries or bug bounties.
Can Line-Bell Corporation Employees Participate?
This vulnerability disclosure process is intended for use by non-Line-Bell Corporation employees and contractors. Employees and contractors should report any vulnerabilities they discover through their Business Area Information Security Officer.
Working with Us
We request that all researchers and reporters:
Use the communication channels identified here to report vulnerability information to us.
Comply with all applicable U.S. and non-U.S. federal, state, and local laws and regulations when conducting their research activities.
Halt all activity and notify Line-Bell Corporation immediately if personal information or data is encountered.
Do not exfiltrate, store, share, destroy, or otherwise compromise any Line-Bell Corporation, customer, or third-party data under any circumstances.
Avoid performing any actions that could potentially degrade or disrupt our systems, assets, products, or platforms (e.g., DoS/DDoS testing).
Limit testing to the minimal amount necessary to confirm the existence of a vulnerability or issue.
Refrain from using any findings reported or validated through this process to enumerate or exploit Line-Bell Corporation, other companies, or individuals.
Disengage from any activities that could potentially harm Line-Bell Corporation employees, customers, or any third parties.
Keep any discovered vulnerabilities confidential between yourself and Line-Bell Corporation until we have had at least 120 days to verify and resolve the issue. Line-Bell Corporation may extend this period, at its sole discretion, based on the complexity and scope of the issue.
If you follow these guidelines, Line-Bell Corporation will not pursue legal action against you related to your research.
If you have any concerns or are unsure whether your security research aligns with this policy, please contact Line-Bell Corporation VDP before proceeding further.
Expectations
When working with us according to this policy, you can expect Line-Bell Corporation to:
Acknowledge your report promptly.
Collaborate with you to understand and validate your report.
Address your findings appropriately within Line-Bell Corporation.
Work with you, as necessary, to address broader cybersecurity threats based on your findings.
Maintain an open dialogue to discuss the issues you report.
Safe Harbor
Line-Bell Corporation considers security research and vulnerability disclosure activities conducted in line with this policy to be "authorized" conduct under the Computer Fraud and Abuse Act and other applicable computer use laws. To encourage responsible disclosure under this policy, Line-Bell Corporation will not pursue civil or criminal action or report to law enforcement for accidental or good faith violations of this policy. However, Line-Bell Corporation reserves the right to determine whether a violation of this policy was accidental or in good faith.
You are expected to comply with all applicable U.S. and international laws. If your research involves information, applications, products, or services of a third party, Line-Bell Corporation cannot bind that third party, and they may pursue legal action or notify law enforcement. Line-Bell Corporation does not authorize research on behalf of other entities and cannot indemnify or protect you from third-party actions based on your activities.
Line-Bell Corporation will review your report and determine if your findings are valid and not previously reported. Public disclosure of any identified or potential vulnerability details without express written consent will be considered noncompliant with our submission guidelines and will not be protected by our Safe Harbor policies.
Privacy
Any personal data submitted as part of a vulnerability report will be handled in accordance with our [Privacy Policy](link). We will use this information solely for the purpose of addressing the reported vulnerability and will not share it with third parties without your consent, except as required by law.
Secure Communication
To communicate with us securely, please use PGP encryption as necessary. Our PGP fingerprint to verify our messages is:
[fingerprint]