Memorial Sloan Kettering Cancer Center’s Vulnerability Disclosure Requirements
Vulnerability Disclosure Philosophy
Memorial Sloan Kettering Cancer Center (MSK) believes effective disclosure of security vulnerabilities requires mutual trust, respect, transparency, and common good between MSK and Security Researchers. Together, our vigilant expertise promotes the continued security and privacy of MSK customers, products, and services.
MSK accepts vulnerability reports from all sources. MSK defines a security vulnerability as an unintended weakness, or exposure that could be used to compromise the integrity, availability or confidentiality of our data, products, and services.
Scope
These requirements apply to any digital assets owned, operated, or maintained by MSK, including public-facing websites
Our Commitment to You
- Trust. We maintain trust and confidentiality in our professional exchanges with you.
- Respect. We treat all individuals who report vulnerabilities with respect and recognize your contribution to keeping our data and systems safe and secure.
- Transparency. We will work with you to validate and remediate reported vulnerabilities, consistent with our commitment to security and privacy.
- Common Good. We investigate and remediate issues to protect the safety and security of those potentially affected by a reported vulnerability.
What We Ask of You
- Trust. We request that you communicate about potential vulnerabilities in a responsible manner, providing sufficient time and information for our team to validate and address potential issues.
- Respect. We expect you to make every effort to avoid privacy violations, degradation of user experience, disruption to production systems, and destruction of data during security testing.
- Transparency. We request that you provide the technical details and background necessary for our team to identify and validate reported issues, using the form below.
- Common Good. We request that you act for the common good, protecting user privacy and security by refraining from publicly disclosing unverified vulnerabilities until our team has had time to validate and address reported issues.
- Human Capacity. We request that you refrain from leveraging any automated tools that may lead to the degradation of site performance and/or otherwise harm any assets in scope, including but not limited to automated vulnerability scanners, database or directory mappers, or distributed-computing enhanced web request tools.
Vulnerability Reporting
Please share the details of any suspected vulnerabilities across any asset owned, controlled, or operated by MSK (or that would reasonably impact the security of MSK and our users) to the following email address: [email protected].
The MSK Information Security team will acknowledge receipt of each vulnerability reported, conduct a thorough investigation, and then take appropriate action for resolution.