top of page
Collaborating at Work

Responsible Disclosure

Responsible Vulnerability Disclosure

Thank you for offering to share information regarding a security vulnerability with us. The security of our applications and the data we are responsible for protecting is important to us and we are grateful for any information you can share with us about how we can further improve it.

By submitting a vulnerability report, you are agreeing to the terms below (the “Terms of Use”), which are intended to protect

both you and us.

1.   Safe Harbour. If you submit a vulnerability report to us, using the process outlined below, in compliance with all of the terms

      in these Terms of Use, we will not pursue civil action or initialise a complaint to law enforcement against you for accessing     

      our systems without authorisation in order to identify that vulnerability.

2.   Submission Process. Please submit all vulnerability reports to us by email at the email address service@cultureshock-png.com.

      In each report submitted, include:

      a.   a description of the vulnerability;
      b.   the URL, IP address,
 port, or other information that would assist us in locating the vulnerability;
      c.   detailed and clear steps to reproduce the issue (including logs, screenshots, responses, or other evidence) or proof of

           concept code;

      d.  how you found the issue;
      e.  presumed impact;
      f.   any remediation steps you would suggest; and
      g.  your name and contact details

3.   Scope. You may not access any individual workstation, or system, network, content, application or data of any third party,

      in connection with this program. The safe harbour described above does not apply to any such system, network content,

      application or data.

4.   Methodology.You may not engage in any denial of service attack, attempts to compromise physical security or enter physical

      premises, or other destructive methodologies. As soon as you have identified the vulnerability, you must cease testing of it

      and report it as described above. The safe harbour described above does not apply to any activity that violates the terms of

      this Section.

5.   No Access to Personal Data or Misuse of Data. By participating in this program, you represent that you have not at any time

      accessed personal data of our customers or users found on our systems, and that, in the event that you inadvertently

      acquired any, you have securely deleted that data. You represent that you have not, and covenant that you will not, misuse

      any data extracted from our environment for any fraudulent, malicious, defamatory, abusive, threatening, unlawful or

      otherwise improper purpose.

6.   Intellectual Property Rights. By submitting information relating to a vulnerability, you grant us a perpetual, worldwide,

      royalty-free, fully paid-up license to use and disclose any information you submit, including any proofs of concept, patches,

      improvements, suggestions, code samples or any other information, in connection with the vulnerability to analyse,

      remediate or improve our systems and networks, incorporate it into our products or services, and to conduct further testing,

      or for any other legitimate business purpose. We do not grant you any intellectual property rights to any image, information,

      writing, invention, code or other creation in connection with these Terms of Use.

7.   Sanctions. By submitting information relating to a vulnerability, you represent that you are not subject to any export sanctions

      or other trade restrictions, whether due to being included on the sanctions list maintained by any governmental bodies in

      Papua New Guinea or the Australasia region, individually, being a member of an organisation on that list, or being a resident

      of a country that is sanctioned by countries in the South Pacific region.

8.   Independent Contractor. Nothing in connection with your submission of a vulnerability shall indicate the you are an employee

      of Culture Shock and the relationship between you and Culture Shock shall not constitute a partnership, joint venture or

      agency. You shall not have the authority to make any statement, representation or commitment on Culture Shock’s behalf.

9.   Disclaimer of Liability and Obligation. Culture Shock, it’s officers, affiliates, representatives, contractors and employees shall

      not be liable to you in connection with these Terms of Use for any direct, indirect, exemplary, incidental, special or

      consequential damages. Unless otherwise agreed by Culture Shock, any information submitted by you in connection with a

      vulnerability is provided at no charge and Culture Shock shall not owe you any fee for that submission or any services

      performed or expenses incurred.

10.  Miscellaneous. These Terms of Use are governed by the laws of the Independent State of Papua New Guinea, without regard

       to conflict of laws principles. You shall not use any logo or other trademark of Culture Shock without our explicit prior

       consent.

DISCLAIMER

Culture Shock Limited reserves the right, in its sole discretion, to modify the terms of the Responsible Disclosure Guidelines or to terminate any or all of them at any time.

 

Let’s Work Together

On behalf of ourselves and our users and customers, thank you again for helping us improve our cybersecurity.

Thanks for submitting!

CONTACT US

Email:      services@cultureshockpng.com

Address:   P.O. Box 278, Port Moresby
               National Capital District 121

               Papua New Guinea

Phone:     675-7655-2377

© 2008-2024 Cullture Shock Limited

Powered and secured by Wix

CONTACT IDAPNG

Independent Directors Association

in Papua New Guinea Incorporated

Email:      director@idapng.org

Website:   www.idapng.org

bottom of page