This policy applies to the following systems:
1. All domains owned by EchoStar and any brands or subsidiaries, including but not limited to the following:
- EchoStar.com
- Hughes.com
- HughesNet.com
- Dish.com
- DishAnywhere.com
- Sling.com
- Boostmobile.com
- OnTechSmartServices.com
- GenMobile.com
2. All hardware products and associated software engineered, developed, and manufactured by EchoStar, any brand, or any subsidiary company.
3. All applications published on Google Play or Apple App Store associated with EchoStar, any EchoStar brand, or any EchoStar subsidiary.
4. Any associated infrastructure vulnerabilities.
5. Other vulnerabilities in any other EchoStar-owned asset with demonstrated impact.
Any services not expressly listed above, such as any connected services, are excluded from scope and are not authorized for testing. Additionally, vulnerabilities found in non-EchoStar systems from our vendors fall outside of this policy's scope and should be reported directly to the vendor according to their disclosure policy (if any).
If you aren't sure whether a system or endpoint is in scope or not, contact us at echostar-vdp-pro@submit.bugcrowd.com before starting your research.
The following test types are NOT authorized and are NOT in scope:
- Network denial of service (DoS or DDoS) tests.
- Physical testing (e.g. office access, open doors, tailgating), social engineering (e.g. phishing, vishing), spam, or any other non-technical vulnerability testing.
- Self XSS (user defined payload).
- Uploading malware
If you encounter any of the below on our systems while testing within the scope of this policy, stop your test and notify us immediately:
- Personally Identifiable Information
- Customer Proprietary Network Information
- Financial Information (e.g. Credit Card or Bank Account Numbers)
- Proprietary Information or Trade Secrets of Companies (of any party)