0% found this document useful (0 votes)
76 views1 page

Terms and Conditions - Apple Security Research

The document outlines the terms and conditions for Apple's Security Research program. It states that researchers must not disrupt Apple services or access accounts without permission. Researchers are responsible for following all applicable laws and are solely responsible for paying applicable taxes. The terms provide an exception for actions performed during good-faith security research that are reported to Apple and done through the Apple Security Bounty program.

Uploaded by

deluxepower
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
76 views1 page

Terms and Conditions - Apple Security Research

The document outlines the terms and conditions for Apple's Security Research program. It states that researchers must not disrupt Apple services or access accounts without permission. Researchers are responsible for following all applicable laws and are solely responsible for paying applicable taxes. The terms provide an exception for actions performed during good-faith security research that are reported to Apple and done through the Apple Security Bounty program.

Uploaded by

deluxepower
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

18/02/2024, 01:44 Terms and Conditions - Apple Security Research

Overview Blog Bounty Research Device Submit a Report

Terms and Conditions


1. You must not disrupt, compromise, or otherwise damage data or property owned by other parties. This includes attacking
any devices or accounts other than your own (or those for which you have explicit, written permission from their owners),
and using phishing or social engineering techniques.
2. You must not disrupt Apple services.
3. Immediately both stop your research and notify Apple using the reporting process before any of the following occur:

• You access any accounts or data other than your own (or those for which you have explicit, written permission from
their owners).
• You disrupt any Apple service.
• You access systems related to Apple Pay. Apple Pay is not in scope of the Apple Security Bounty program.
• You access a non-customer-facing Apple system. Examples of customer-facing Apple systems include iCloud,
Apple ID, Managed Apple ID, the App Store, Apple Music, Apple News+, Apple TV+, Apple Arcade, Apple Maps,
iMessage, FaceTime, IDs, and APNs.
4. You must comply with all applicable laws, including local laws of the country or region in which you reside or in which you
download or use Apple software or services.
5. Apple Security Bounty payments are granted solely at the exclusive discretion of Apple.
6. Apple Security Bounty payments may not be issued to you if you are (a) in any U.S. embargoed countries or (b) on the U.S.
Treasury Department’s list of Specially Designated Nationals or the U.S. Department of Commerce Denied Person’s List or
Entity List or any other restricted party lists.
7. You are responsible for the payment of all applicable taxes.
8. A participant in the Apple Security Bounty program (“ASB Participant”) will not be deemed to be in breach of applicable
Apple license provisions which provide that a user of Apple software may not copy, decompile, reverse engineer,
disassemble, attempt to derive the source code of, decrypt, modify, or create derivative works of such Apple software, for
in scope actions performed by that ASB Participant where all of the following are met:
• The actions were performed during good-faith security research, which was — or was intended to be — responsibly
reported to Apple;
• The actions were performed strictly during participation in the Apple Security Bounty program; and
• Neither the actions nor the ASB Participants have otherwise violated these policies such as violating legal
requirements 1, 2, and 3, above.

Apple Security Research Apple Security Bounty Terms and Conditions

Copyright © 2023 Apple Inc. All rights reserved. Support Apple Platform Security Privacy Policy Legal Copyright © 2023 Apple Inc. All rights reserved.

https://security.apple.com/terms-and-conditions/ 1/1

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy