Responsible Disclosure Program

Help Us KeepHealthcare Secure

Join our bug bounty program and help protect millions of patients' health data. We reward security researchers who responsibly disclose vulnerabilities in our systems.

Up to $25,000 Rewards
Legal Protection
Hall of Fame
Fast Response

Program Overview

Our bug bounty program is designed to identify and address security vulnerabilities in our healthcare platform through collaboration with ethical security researchers.

500+
Security Researchers
$180K+
Total Rewards Paid
250+
Vulnerabilities Fixed
4.8/5
Researcher Rating

Responsible Disclosure

We believe in working together with the security community to protect our users.

Fair Rewards

Competitive bounties based on vulnerability severity and potential impact.

Legal Protection

Safe harbor provisions protect researchers acting in good faith.

Fast Response

We acknowledge reports within 24 hours and provide regular updates.

Why Partner with RGHS Security?

We're committed to maintaining the highest security standards for healthcare data. Your contributions help protect millions of patients and healthcare providers worldwide.

Healthcare Focus
Global Impact
Expert Security Team

Scope & Rules

Clear guidelines on what's included in our bug bounty program and the rules researchers must follow when testing our systems.

In Scope

Web Applications

  • *.rghs.com and all subdomains
  • Patient portal and dashboard
  • Provider portal and EHR system
  • API endpoints and GraphQL interfaces
  • Authentication and authorization systems

Mobile Applications

  • RGHS Patient Mobile App (iOS/Android)
  • RGHS Provider Mobile App (iOS/Android)
  • Deep linking and URL schemes
  • Push notification systems
  • Offline data storage mechanisms

Infrastructure

  • Cloud infrastructure misconfigurations
  • Database security vulnerabilities
  • Network security issues
  • Container and Kubernetes security
  • CI/CD pipeline security flaws

Out of Scope

Physical security of offices or data centers
Social engineering attacks against employees
Denial of Service (DoS) attacks
Third-party integrations not owned by RGHS
Issues in legacy systems scheduled for decommission
Vulnerabilities requiring physical access to devices
Issues that require compromising other users' accounts

Program Rules

Testing Guidelines

  • Do not access, modify, or delete user data
  • Do not perform actions that could harm system availability
  • Use only test accounts you create yourself
  • Do not perform testing on production systems during peak hours
  • Limit automated testing to avoid system overload

Responsible Disclosure

  • Report vulnerabilities only to security@rghs.com
  • Allow reasonable time for remediation before disclosure
  • Do not publicly disclose vulnerabilities before approval
  • Provide detailed reproduction steps and proof of concept
  • Act in good faith and avoid privacy violations

Legal Compliance

  • Comply with all applicable laws and regulations
  • Respect user privacy and data protection laws
  • Do not violate terms of service of third-party systems
  • Report findings only through official channels
  • Maintain confidentiality of discovered vulnerabilities

Important Notice

Violation of program rules may result in immediate disqualification from the bug bounty program and potential legal action. Always follow responsible disclosure practices and respect user privacy.

Reward Structure

Our rewards are based on the severity and impact of discovered vulnerabilities, with additional bonuses for high-quality reports and exceptional findings.

Critical
$10,000 - $25,000

Vulnerabilities that could lead to complete system compromise or massive data breach

Examples:
  • Remote code execution on production servers
  • SQL injection leading to database compromise
  • Authentication bypass affecting all users
  • Direct access to sensitive patient data
High
$3,000 - $10,000

Significant security flaws that could compromise user accounts or sensitive data

Examples:
  • Privilege escalation vulnerabilities
  • Stored XSS affecting multiple users
  • Insecure direct object references to PHI
  • CSRF attacks on critical functions
Medium
$500 - $3,000

Moderate security issues that could affect individual users or system integrity

Examples:
  • Reflected XSS vulnerabilities
  • Information disclosure issues
  • Session management flaws
  • Business logic vulnerabilities
Low
$100 - $500

Minor security issues with limited impact but valuable for overall security posture

Examples:
  • Missing security headers
  • Information leakage in error messages
  • Weak password policies
  • Minor configuration issues

Bonus Multipliers

Quality of Report

Up to 2x

Detailed reproduction steps, proof of concept, and suggested fixes

First Discovery

1.5x

First person to report a specific vulnerability class

Impact Demonstration

1.3x

Clear demonstration of real-world impact and exploitation

Fix Contribution

1.2x

Providing code patches or detailed remediation guidance

Payment Timeline

  • Initial triage within 24 hours
  • Severity assessment within 5 business days
  • Reward determination within 10 business days
  • Payment processed within 30 days of resolution

Payment Methods

  • Bank transfer (preferred)
  • PayPal for international researchers
  • Cryptocurrency (Bitcoin, Ethereum)
  • Charitable donation (upon request)

Tax Considerations

  • Tax forms provided for US researchers
  • International compliance handled per country
  • Researcher responsible for tax obligations
  • Consultation available for tax questions

Total Rewards Available

$500,000

Annual budget dedicated to rewarding security researchers who help us maintain the highest security standards for healthcare data protection.

Submission Process

Follow our streamlined process to report vulnerabilities and receive rewards. We've designed this process to be efficient and transparent for all researchers.

1

Discovery & Testing

Identify potential vulnerabilities following our scope and rules

  • Review in-scope systems and applications
  • Perform testing within established guidelines
  • Document findings with screenshots/evidence
  • Verify vulnerability impact and reproducibility
2

Report Submission

Submit detailed vulnerability report through our secure portal

  • Use our submission form with all required fields
  • Include detailed reproduction steps
  • Provide proof of concept where applicable
  • Classify severity based on our guidelines
3

Initial Triage

Our security team reviews and acknowledges your submission

  • Acknowledgment within 24 hours
  • Initial assessment of severity and scope
  • Request for additional information if needed
  • Assignment to appropriate security engineer
4

Validation & Assessment

Detailed analysis and validation of the reported vulnerability

  • Reproduction of the vulnerability by our team
  • Impact assessment and risk analysis
  • Severity classification and reward determination
  • Development of remediation plan
5

Resolution & Reward

Vulnerability fix implementation and reward processing

  • Security patch development and testing
  • Deployment to production systems
  • Final reward calculation including bonuses
  • Payment processing and Hall of Fame addition

Secure Email

Secure
security@rghs.com

Primary contact for vulnerability reports

PGP Encrypted

Secure
PGP Key: 4096-bit RSA

For highly sensitive vulnerability reports

Emergency Hotline

+1-800-RGHS-SEC

For critical vulnerabilities requiring immediate attention

By submitting a report, you agree to our bug bounty program terms and responsible disclosure policy.

Security Hall of Fame

Recognizing the outstanding security researchers who have contributed to making RGHS safer for millions of healthcare users worldwide.

1
Alex Chen

Alex Chen

@alexsec

United States
Vulnerabilities Found23
Total Rewards$45,200
SpecialtyWeb Application Security
Elite Researcher
2
Sarah Martinez

Sarah Martinez

@sarahfinds

Spain
Vulnerabilities Found18
Total Rewards$38,500
SpecialtyMobile App Security
Mobile Expert
3
David Kumar

David Kumar

@dkumar_sec

India
Vulnerabilities Found15
Total Rewards$32,800
SpecialtyAPI Security
API Specialist
Emma Thompson

Emma Thompson

@emma_hacks

United Kingdom
Vulnerabilities Found12
Total Rewards$28,400
SpecialtyInfrastructure Security
Infrastructure Pro
Michael Zhang

Michael Zhang

@mzhang_bug

Canada
Vulnerabilities Found11
Total Rewards$25,600
SpecialtyAuthentication Systems
Auth Expert
Lisa Anderson

Lisa Anderson

@lisa_secure

Australia
Vulnerabilities Found9
Total Rewards$22,100
SpecialtyDatabase Security
Database Guardian

Recent Achievements

First Critical Find

$25,000

Discovered the first critical vulnerability in our new patient portal

By Alex ChenMarch 2024

Mobile Security Champion

$18,500

Found 5 high-severity vulnerabilities in our mobile applications

By Sarah MartinezFebruary 2024

API Security Master

$15,200

Comprehensive API security assessment with detailed remediation guide

By David KumarJanuary 2024

Researcher Badges

Elite Researcher

1 awarded

Mobile Expert

1 awarded

API Specialist

1 awarded

Infrastructure Pro

1 awarded

Auth Expert

1 awarded

Database Guardian

1 awarded

Quality Reporter

12 awarded

Fast Responder

8 awarded

Join Our Security Community

Become part of an elite group of security researchers helping protect healthcare data. Your contributions make a real difference in patient safety and data security.

500+
Active Researchers
$500K+
Rewards Distributed
99.9%
Vulnerability Fix Rate