Ginnie Mae will operate in good faith with researchers who discover, test, and submit vulnerabilities or indicators of vulnerabilities in accordance with these guidelines.
1.1.3.1 Under this policy, "research" means activities in which you:
1) Your activities are limited exclusively to –
a. Testing to detect a vulnerability or identify an indicator related to a vulnerability; or
b. Sharing with, or receiving from, Ginnie Mae information about a vulnerability or an indicator related to a vulnerability.
2) Notify the agency as soon as possible after you discover a real or potential security issue.
3) Make every effort to avoid privacy violations, degradation of user experience, disruption to production systems, and destruction or manipulation of data.
4) You do no harm and do not exploit any vulnerability beyond the minimal amount of testing required to prove that a vulnerability exists or to identify an indicator related to a vulnerability.
5) You avoid intentionally accessing the content of any communications, data, or information transiting or stored on Ginnie Mae information system(s) – except to the extent that the information is directly related to a vulnerability and the access is necessary to prove that the vulnerability exists.
6) You do not exfiltrate any data under any circumstances.
7) You do not intentionally compromise the privacy or safety of Ginnie Mae personnel (e.g., contractors or affiliates), or any third parties.
8) You do not intentionally compromise the intellectual property or other commercial or financial interests of any Ginnie Mae personnel or entities, or any third parties.
9) You do not publicly disclose any details of the vulnerability, indicator of vulnerability, or the content of information rendered available by a vulnerability, except upon receiving explicit written authorization from Ginnie Mae.
10) You do not conduct denial of service testing.
11) You do not conduct any form (electronic, manual, automated, etc.) of testing that would impact system operability, stability, and performance.
12) You do not conduct social engineering, including spear phishing, of Ginnie Mae personnel or contractors.
13) You do not submit a high-volume of low-quality reports
14) Only use exploits to the extent necessary to confirm a vulnerability's presence. Do not use an exploit to compromise or exfiltrate data, establish command line access and/or persistence, or use the exploit to "pivot" to other systems.
15) Provide the agency a reasonable amount of time to resolve the issue before you disclose it publicly.
16) Once you have established that a vulnerability exists or encounter any sensitive data (including personally identifiable information, financial information, or proprietary information or trade secrets of any party), you must stop your test, notify the agency immediately, and not disclose this data to anyone else.
17) If at any point you are uncertain whether to continue testing, contact ginniemaevdp@hud.gov.