Interprovincial Overleg (IPO) and BIJ12 consider the security of our ICT systems to be important. Despite our commitment to security, it is possible that vulnerabilities may exist. If you have discovered a weakness in one of our systems, we would like to hear about it, so we can take action as soon as possible.
How can I report a vulnerability in an ICT system of IPO or BIJ12?
You can report a vulnerability in an ICT system of IPO or BIJ12 by sending an email to: security@bij12.nlDeze link opent in een nieuw tabblad. You can find the public PGP key hereDeze link opent in een nieuw tabblad.
IPO and BIJ12 strongly urge reporters to first report any discovered ICT vulnerability to IPO and BIJ12. After investigation, IPO and BIJ12 will take the necessary measures. Following the report, IPO and BIJ12 will decide whether the reported vulnerability will be made public.
What should you consider when engaging in Coordinated Vulnerability Disclosure?
When formulating a report about a vulnerability in an ICT system of IPO or BIJ12, consider the following:
- Provide enough information for the provincial organization to reproduce the problem. This usually includes the IP address or URL of the affected ICT system and a description of the vulnerability. For more complex vulnerabilities, additional information may be necessary.
- Leave contact details (email address and/or phone number) so IPO and BIJ12 can reach out to you.
- Report as soon as possible after discovering the vulnerability.
- Do not share information about the ICT vulnerability with others until it has been resolved.
- Handle the knowledge of the disclosed vulnerability responsibly. Do not perform actions beyond what is necessary to demonstrate the vulnerability.
- If you meet these conditions with your report, IPO and BIJ12 will not attach any legal consequences to the report.
- If it turns out that you have violated the above conditions, IPO and BIJ12 may still decide to take legal action against you.
Do not exploit a vulnerability in an ICT system.
If an ICT vulnerability is discovered, do not exploit it, for example, by:
- Installing malware;
- Copying, altering, or deleting data in an ICT system;
- Making changes to the relevant ICT system;
- Gaining repeated access to the ICT system or sharing access with others;
- Using brute force to gain access to systems;
- Informing others about the ICT vulnerability;
- Utilizing denial-of-service attacks or social engineering.
What will IPO and BIJ12 do with your report?
If you submit a report about a vulnerability in an ICT system via the designated ticket system, IPO and BIJ12 will handle it as follows:
- You will receive an acknowledgment from IPO and BIJ12 within 2 business days;
- You will receive a response to your report within 5 business days. This response will include an assessment of the report and an expected date for a resolution;
- You will be kept informed about the progress of resolving the issue;
- IPO and BIJ12 will address the security issue as quickly as possible, no later than 90 days. They will work with you to determine whether and how the reported issue will be communicated. Communication will occur only after the issue has been resolved;
- IPO and BIJ12 may, if you so wish, mention your name as the discoverer of the reported vulnerability;
- IPO and BIJ12 will treat your report confidentially and will not share personal data with third parties without your consent, unless legally obligated or required by a court order.
Discovered a vulnerability in an ICT system outside of IPO and BIJ12?
If you discover a vulnerability in an ICT system that is not under the responsibility of IPO and BIJ12, please contact the relevant organization first.
If the organization does not respond satisfactorily, you can inform the Dutch National Cyber Security Centre (NCSC)Deze link opent in een nieuw tabblad. They will take on the role of intermediary.