Search Results for: bug bounty

Draft Bug Bounty policy for UIDAI

Naavi.org had suggested a model Bug Bounty Policy for Private Sector Companies as part of its Cyber Law Compliance Center (CLCC) Activity. Copy of this policy is available through the menu link CLCC. This was drawn in March 2016 specifically … Continue reading

Posted in Cyber Law | Leave a comment

UIDAI should introduce a Bug Bounty Program forthwith.. if it is serious of security

“Security is going to be a  Concern” for Aadhar says  Mr Nandan Nilekani, the architect of the system. Though it has always been a concern for most of the Information Security observers, it is good that now persons close to … Continue reading

Posted in Cyber Law | Leave a comment

Bug Bounty hunter trips..and lands himself in jail

A small mistake by a “Bug Bounty” hunter who had perhaps no intention of committing a crime has landed him in a serious problem with the law enforcement in USA. Mr Meetkumar Hiteshbhai Desai, obviously of Indian origin from a … Continue reading

Posted in Cyber Law | Leave a comment

Bug Bounty Policy as part of Corporate Governance Responsibilities

Software is a unique industry where from Operating Systems to applications, programs are released for public use, without any real commitment from the software developers as to whether the program is free from vulnerabilities. In fact, vulnerabilities give raise to … Continue reading

Posted in Cyber Law | 3 Comments

A Bug in a Mobile Wallet and 5 techies end in Jail.. Where was the Bug Bounty Program?

The recently reported fraud in Kolkata where five engineering students were arrested for a Bank Wallet fraud involving Rs 8.6 crores is an incident to ponder. (See the report in TOI here). According to the report, the persons arrested were … Continue reading

Posted in Cyber Law | 1 Comment

Bug Bounty Program from Government is required

It was heartening to note that during the recent Cyber Security Summit in Delhi (Ground Zero), Mr Rajnath Singh, the Home Minister, stressed the need for “Cyber Security” for the success of the other Government initiatives such as the Digital … Continue reading

Posted in Cyber Law | 1 Comment