Epson Vulnerability Disclosure Procedure


1. Purpose

Seiko Epson Corporation and its sales companies (“we”, “our”, or “us”) will collect and disclose product Vulnerability information to ensure the security of our products and services (“Products”) and to protect our customers from cyber threat. When Vulnerabilities are discovered, Epson New Zealand works diligently to resolve them. It ensures that our customers have a consistent, unambiguous resource to help them understand how Epson New Zealand responds to events of this nature.

This Vulnerability Disclosure procedure provides guidelines on how to submit discovered Vulnerabilities and how we will improve the security of our products and services.


2. In scope Vulnerability information

Our team is willing to be informed about demonstrated Vulnerabilities and is committed to protecting our customers and employees. We encourage our customers to read and comply with this policy before reporting Vulnerabilities.

Vulnerability(ies) for the purposes of this policy is defined as an attack against a product that can adversely affect its confidentiality, integrity and availability.


3. How to report Vulnerabilities

Individuals and organisations experiencing a product security issue are strongly encouraged to make a report via the webform link below.

You can report a Vulnerability using the Report a Vulnerability form and must include the following information

  1. Vulnerability type (e.g. software, firmware, Wi-Fi, etc)
  2. Product name and model in which the Vulnerability was discovered
  3. Product serial number
  4. Possible threats cause by Vulnerabilities
  5. Procedure for reproducing the Vulnerability

The web form is intended for Vulnerability reporting only. Any business, technical or sales inquiries are not accepted. For other technical support information on our products or services, please visit our Epson New Zealand Support webpage.


4. The process after Vulnerability report

4.1 Acknowledgement of receipt

The customer submitting the report will receive an acknowledgement of receipt from us within five working days when the report was lodged.

4.2 Identification of Vulnerabilities

The received Vulnerabilities are checked by our technical team and the results are provided back to the reporter. In some case, we may decide that the Vulnerability is “not covered by the Vulnerability response” For example;

  1. Known Vulnerabilities.
  2. Product support is no longer available.

4.3 Addressing Vulnerabilities

If we determine that the product is vulnerable, we will provide the reporter with a solution that addresses the Vulnerability or provide a workaround. Please note that when we provide the solution, we may ask the reporter to confirm the Vulnerability has been properly addressed.

4.4 Vulnerability disclosure

If it is deemed necessary to inform customers other than the reporter, we will update our security notifications page as soon as the information can be disclosed, so that customers can implemented appropriate measures.

In addition, if the reporting party makes the disclosure, the reporting party may be requested to coordinate with Epson on the disclosure notice (e.g. not including information that may give the attacker an advantage) and the disclosure schedule.


5. About rewards

We DO NOT offer any compensation for reporting Vulnerabilities. We sincerely appreciate those who take the time and effort to report Vulnerabilities in accordance with this document. Please acknowledge that there is no expectation of payment or compensation and that any future right to claim related to the submitted report is waived.


6. Prohibitions against the reporter

Regarding the disclosure of Vulnerabilities, the reporting party must not disclose Vulnerability related information to third parties without a valid reason. However, if you need to disclosure Vulnerability-related information for legitimate reasons, please consult us in advance.


When Vulnerabilities are discovered and verified, please DO NOT do the following in order to verify Vulnerabilities

  1. Violate applicable laws and regulations
  2. Access unnecessary, excessive or voluminous data
  3. Alter data on our systems or services
  4. Use high-intensity invasive or destructive scanning tools to discover Vulnerabilities
  5. Attempt or reporting any form of denial of service, such as overwhelming our services with high volume of request
  6. Interfere with our services or systems