GSMA Coordinated Vulnerability Disclosure Program 16 July 2020
GSMA Coordinated Vulnerability Disclosure Program 16 July 2020
Copyright Notice
Copyright © 2020 GSM Association
Disclaimer
The GSM Association (“Association”) makes no representation, warranty or undertaking (express or implied) with respect to and does not accept
any responsibility for, and hereby disclaims liability for the accuracy or completeness or timeliness of the information cont ained in this document.
The information contained in this document may be subject to change without prior notice.
Antitrust Notice
The information contain herein is in full compliance with the GSM Association’s antitrust compliance policy.
V3.0 Page 1 of 32
GSM Association Non-confidential
Official Document FS.23 - GSMA Coordinated Vulnerability Disclosure Program
Table of Contents
1 Introduction 4
1.1 Overview 4
1.2 Definition of Terms 4
1.3 Abbreviations 5
1.4 References 6
2 GSMA CVD Policy 7
2.1 Scope of the GSMA CVD Programme 7
2.1.1 In Scope 7
2.1.2 Out of Scope 7
2.2 Reporting a vulnerability to the GSMA 7
2.2.1 Timings 7
2.3 Disclosure 8
2.4 Credit to Reporter 8
2.5 Research Expectations 8
3 General 9
3.1 Document scope 9
3.2 Programme Goals 9
4 The Panel of Experts 9
4.1 Make-up of the Panel of Experts 9
4.2 Joining the Panel of Experts 10
4.3 Period of appointment and removal from the Panel of Experts 11
5 CVD Submission and Consideration Process 12
5.1 Submission by Reporter 12
5.2 Validation and acknowledgement of a Submission 12
5.3 Formation of a Submission Consideration Group and consideration of a
Submission 13
5.4 Informing the Reporter of the SCG’s decision 13
5.5 Remediation, including creation of advisories and outputs 13
5.6 Ongoing communication 14
5.7 Closedown of Submission 14
5.7.1 Mobile Security Research Hall of Fame 15
5.8 Updating of Submission 15
5.9 Submission disputes 15
6 Roles and Responsibilities 16
6.1 CVD Director Responsibilities 16
6.2 GSMA CTO Responsibilities 17
6.3 Panel of Experts Member Responsibilities 17
6.4 Submission Consideration Group Responsibilities 18
7 Programme review 19
7.1 Quarterly Conference Call 19
7.2 CVD Programme Annual Review 19
8 Reporting 19
V3.0 Page 2 of 32
GSM Association Non-confidential
Official Document FS.23 - GSMA Coordinated Vulnerability Disclosure Program
V3.0 Page 3 of 32
GSM Association Non-confidential
Official Document FS.23 - GSMA Coordinated Vulnerability Disclosure Program
1 Introduction
1.1 Overview
Coordinated Vulnerability Disclosure (CVD) of security vulnerabilities is a well-established
process which allows people or groups, such as security researchers, to report details of
security vulnerabilities in products and services. The GSMA CVD programme provides a
framework that sets clear expectations for constructive engagement by all parties to
remediate or mitigate notified vulnerabilities.
The early disclosure of vulnerabilities can help to protect end users, allowing manufacturers
and providers of products and services to address security issues before public disclosures
are made.
The GSMA operates a programme for CVD (“CVD Programme”) to better protect mobile
industry systems, mobile users and the wider industry ecosystem. The GSMA’s CVD
Programme does not consider vulnerabilities affecting an individual manufacturer or
operator, but deals with security vulnerabilities that impact the mobile industry as a whole.
This means that vulnerabilities which are non-manufacturer specific can be reported,
remediation options considered and actioned.
This document, and its associated components, has been built around best practice
recommendations contained in ISO/IEC 27001:2013 [1] and ISO/IEC 29147:2018 [2]
pertaining to the handling and communication of disclosures, and The CERT® Guide to
Coordinated Vulnerability Disclosure [3][3]. Because GSMA’s CVD Programme is pan-
industry, it does not align with all aspects within these recommendations, which focus on
programmes run by individual manufacturers or providers of services.
V3.0 Page 4 of 32
GSM Association Non-confidential
Official Document FS.23 - GSMA Coordinated Vulnerability Disclosure Program
Term Description
reputation stays strong and mobile operators remain trusted partners in
the ecosystem.
GSMA Members,
Members, Associate Members or Rapporteurs of the GSMA in accordance
Associate Members
with the articles of association and regulations governing the GSMA.
and Rapporteurs
One or multiple related and identified occurrences indicating a possible
Incident breach of information security or failure of controls that can harm an
organisation's assets or compromise its operations.
The individual or organisation that develops a product or service or is
responsible for its maintenance. This includes an individual or organisation
Manufacturer
such as a commercial business or an organisation that delivers software or
services for free.
The minimum information about a vulnerability as is required to satisfy the
Minimum viable legal or regulatory notification requirement. This is considered to be
details information required to prevent an Incident from occurring rather than
revealing information about the vulnerability.
A workaround or countermeasure that eliminates, or reduces the likelihood
Mitigation
or impact of a successful attack.
The group of experts from GSMA Members, Associate Members and
Panel of Experts Rapporteurs who consider Submissions in their area of expertise, and
review the GSMA CVD Programme.
A change made to a product or service to remove or mitigate a
Remediation
vulnerability.
1.3 Abbreviations
Term Description
CVD Coordinated Vulnerability Disclosure
V3.0 Page 5 of 32
GSM Association Non-confidential
Official Document FS.23 - GSMA Coordinated Vulnerability Disclosure Program
Term Description
FASG Fraud and Security Group
FSAG Fraud and Security Architecture Group
GPG GNU Privacy Guard
ISO International Standards Organisation
POC Proof of Concept
PoE Panel of Experts
SCG Submission Consideration Group
1.4 References
Ref Title Link
ISO/IEC 27001:2013 Information
technology — Security techniques —
[1] https://www.iso.org/standard/54534.html
Information security management
systems — Requirements
ISO/IEC 29147:2018 Information
[2] Technology – Security Techniques – https://www.iso.org/standard/72311.html
Vulnerability Disclosure
https://www.gsma.com/security/gsma-mobile-
[6] Mobile Security Research Hall of Fame
security-hall-of-fame/
https://infocentre2.gsma.com/gp/wg/FSG/CVD/P
[7] CVD on InfoCentre2
ages/Default.aspx
https://www.gsma.com/aboutus/wp-
[8] GSMA AA.16
content/uploads/2019/08/AA.16-v3.19.pdf
https://www.gsma.com/aboutus/legal/anti-trust-
[9] GSMA Antitrust Policy Statement
policy-statement
https://www.gsma.com/aboutus/workinggroups/fr
[10] Fraud and Security Group aud-security-group
V3.0 Page 6 of 32
GSM Association Non-confidential
Official Document FS.23 - GSMA Coordinated Vulnerability Disclosure Program
2.1.1 In Scope
The scope of the CVD Programme is security vulnerabilities that impact the mobile industry,
primarily open standards based technologies.
During the process, communication with the GSMA is requested to be in English, by email
and through a single main Reporter (Section 5.1 contains more information).
2.2.1 Timings
The GSMA aims to:
V3.0 Page 7 of 32
GSM Association Non-confidential
Official Document FS.23 - GSMA Coordinated Vulnerability Disclosure Program
Depending on the nature of the vulnerability the timescale for remediation will vary; the
default for the GSMA’s response is 90 days. This will be discussed with the Reporter to
manage expectations.
GSMA does not carry out remediation in networks or equipment on behalf of individual
companies, and is not empowered to make changes to standards defined by external
bodies. This remediation work will require additional time, after the steps laid out in Section
5, and will vary between companies.
2.3 Disclosure
The GSMA’s timeline for remediation and public disclosure will be determined by the
vulnerability, the route(s) to remediation, and the scale of remediating actions. The GSMA
will also consider external deadlines the Reporter has committed to such as publications or
conferences.
To assist with coordination, the GSMA requests that Reporters confirm to which other
organisations they have disclosed the vulnerability.
The GSMA will consider whether other organisations are required to carry out remediating
actions. When required, the GSMA will confirm the Reporter is happy for this discussion to
occur, and whether the Reporter wishes to be named in these communications.
As part of the consideration and remediation of a vulnerability, the GSMA may create
advisories and outputs for the benefit of the mobile industry, such as a briefing papers and
statements relating to the vulnerability. These will be shared with the GSMA Members,
Associate Members and Rapporteurs under a confidentiality notice.
Entry to the Mobile Security Research Hall of Fame is determined by the GSMA on a case-
by-case basis. The eligibility criteria for the Mobile Security Research Hall of Fame are found
in Section 5.7.1.
However, participation in the CVD Programme requires that Reporters do not engage in
activities that violate any local legislation or regulations and third party rights.
1. Not abuse the reported vulnerability. For example, downloading more data than is
necessary to demonstrate the vulnerability, or changing/deleting live systems,
settings or data.
V3.0 Page 8 of 32
GSM Association Non-confidential
Official Document FS.23 - GSMA Coordinated Vulnerability Disclosure Program
2. Exercise caution and restraint with regard to personal data and not intentionally
engaging in attacks against third parties, social engineering, denial-of-service attacks,
spamming or otherwise causing a nuisance to other users.
3 General
2. Protect the confidentiality and integrity of the process, and submitted research, in
order to retain the confidence of the GSMA CVD Programme.
3. Protect all parties in the process from actual or perceived conflicts of interest.
To achieve these goals the GSMA rely on a specialist group, who use their knowledge to
assess a Submission and consider options for remediation; the Panel of Experts (PoE)
(Section 4).
PoE members commit to work for the benefit of the industry as a whole, rather than to
enable competitive advantage.
V3.0 Page 9 of 32
GSM Association Non-confidential
Official Document FS.23 - GSMA Coordinated Vulnerability Disclosure Program
Transport/transmission security
Radio access network (RAN) security
Signalling protocol security
Core network technology security
Device security
UICC/eUICC security
Cryptography
Internet of Things (IoT) security
Roaming and interworking security
Cloud and virtualisation security
Billing and financial system security
Protocol analysis/security
It is desirable that each area should be represented by at least two individuals on the PoE.
A maximum of two PoE members working for the same organisation, unless
additional members are covering areas of expertise that would otherwise not be
sufficiently represented.
Representation from a range of geographic regions.
The GSMA FASG Chair is a member of the PoE for the duration of their chairmanship by
virtue of holding the position.
To apply, applicants should complete the application form found at [4] and send it to
[email protected]. GPG encryption is encouraged but not required, the public key can be
found at [4].
Biannually the GSMA will consider all complete applications submitted by the required
deadline to the nominated email. The GSMA will assess individuals’ applications based on
the requirements in this section and Sections 6.3 and 6.4 of this document.
V3.0 Page 10 of 32
GSM Association Non-confidential
Official Document FS.23 - GSMA Coordinated Vulnerability Disclosure Program
To allow outgoing members of the PoE to attend the CVD Annual Review meeting in April,
the application process will begin after this date by announcement to the FASG.
The decision to appoint an individual to the PoE sits with the GSMA. The route of appeal
against the decision not to accept an applicant to the POE is via the GSMA CTO
([email protected]). The appeal must be entered within 5 working days of the
applicant being notified of the GSMA’s decision.
Figure 1 summarises the application process, along with anticipated timelines for the
application process.
The GSMA will remind PoE members that their term is due to expire, with sufficient time for
the PoE member to reapply.
If a PoE member stops working for one of the GSMA Members, Associate Members and
Rapporteurs, their appointment to the PoE will lapse, unless they are able to demonstrate
that they will begin to work for another of the GSMA Members, Associate Members and
Rapporteurs within three months.
PoE members may resign at any time by writing to the CVD Director. This will not alter the
application process timeline (see 4.2).
If a PoE member does not meet the responsibilities listed under Sections 4.2, 6.3 and 6.4 of
this document their appointment to the PoE will be reviewed by GSMA which may result in
the member being removed from the PoE.
V3.0 Page 11 of 32
GSM Association Non-confidential
Official Document FS.23 - GSMA Coordinated Vulnerability Disclosure Program
The route of appeal against the removal from the PoE is via the GSMA CTO
([email protected]). The appeal must be entered within 5 working days of the
applicant being notified of removal.
The Reporter is requested to describe the vulnerability on the Submission form, including:
This is usually sufficient information to enable the GSMA to consider the vulnerability and will
allow for verification and identification of possible remediations. A Proof-of-Concept (POC) or
more detailed description may be requested in the case of complex vulnerabilities.
The GSMA may ask a Reporter for more information throughout the consideration process.
Where key information is not included on the Submission form, to ask for the missing
information to be added and resubmitted
Where the Submission form is complete, inform the Reporter of the consideration
process and that it has been sent to the Submission Consideration Group (SCG)
In the case that a Reporter names specific GSMA Members, Associate Members and
Rapporteurs being actively exploited using the vulnerability then the CVD process will define
this as an Incident. In addition to the CVD process the CVD Director will contact the named
V3.0 Page 12 of 32
GSM Association Non-confidential
Official Document FS.23 - GSMA Coordinated Vulnerability Disclosure Program
party to provide information about the incident, and if feasible may attempt to identify other
(not already named) parties that may also be impacted.
The SCG will decide if a reported vulnerability is admissible to the GSMA’s CVD Programme
based on the scope in Section 2.1 of this document.
They may ask for further information from the Reporter to help their consideration.
If it is deemed unsuitable for GSMA CVD, the GSMA will discuss with the Reporter the
SCG’s reasoning and provide this.
GSMA aims for this to take place within 10 working days from the GSMA’s confirmation that
the Submission form is complete and has been shared with the SCG. Regardless of
acceptance, the GSMA will assign the Submission a CVD number (CVD-YEAR-nnnn) and
provide it to the Reporter.
During the consideration of a Submission a member of the SCG may become aware of an
Incident which a law, regulation or contract requires them to report. Under these
circumstances the SCG member agrees to limit the information shared to Minimum viable
details of the incident.
The GSMA will consider whether other organisations are required to carry out remediating
actions. When required the GSMA will confirm the Reporter is happy for this discussion to
occur, and whether the Reporter wishes to be named in these communications.
As part of the consideration and remediation of a vulnerability, the GSMA may create
advisories and outputs for the benefit of the mobile industry; such as a briefing paper or
statement relating to the vulnerability. These will be shared with GSMA Members, Associate
Members and Rapporteurs under a confidentiality notice.
The Reporter and SCG will contribute to drafting these documents. Interim publication of
advisories, briefings or other disseminations to GSMA Members, Associate Members and
Rapporteurs will be considered on a Submission-by-Submission basis.
V3.0 Page 13 of 32
GSM Association Non-confidential
Official Document FS.23 - GSMA Coordinated Vulnerability Disclosure Program
There will be ongoing communication between the GSMA and the Reporter, allowing the
SCG to request further information or provide feedback to the Reporter. In turn, the Reporter
may update the GSMA on any developments.
Where the publication date has not been confirmed, this should be determined during these
communications.
Remediation of the residual threat from the vulnerability to the industry should be considered
where practically possible.
The closedown template (Annex B.3) will be completed and made available for GSMA
Members, Associate Members and Rapporteurs on the InfoCentre2 CVD group [7], along
with any GSMA outputs, the Submission and the Submission form.
Final decisions regarding inclusion in the Mobile Security Research Hall of Fame [6] should
be made at this point and the Reporter informed of the decision.
V3.0 Page 14 of 32
GSM Association Non-confidential
Official Document FS.23 - GSMA Coordinated Vulnerability Disclosure Program
1. Meeting the scope for the CVD Programme (Section 2.15.3 of this document)
2. Impact of the vulnerability
3. Reporter’s engagement with the process
The GSMA reserves the right to remove Reporters from the Mobile Security Research Hall
of Fame if they no longer meet these criteria or subvert the mobile industry’s security efforts.
The GSMA monitors the internet for updates to the underlying research, as deemed
appropriate by the PoE. Reporters and GSMA Members, Associate Members and
Rapporteurs are also encouraged to provide GSMA with such updates.
If the issues cannot be resolved, the discussion should be closed down in a manner that
provides options to resume communications should the Reporter desire this at a later stage.
V3.0 Page 15 of 32
GSM Association Non-confidential
Official Document FS.23 - GSMA Coordinated Vulnerability Disclosure Program
V3.0 Page 16 of 32
GSM Association Non-confidential
Official Document FS.23 - GSMA Coordinated Vulnerability Disclosure Program
Role Responsibilities
Act as liaison to any GSMA staff function
that needs to be involved in the
Programme
Approach any Submission Specific Experts
to join a SCG
Organise all meetings of the PoE and
SCGs
Administer the PoE application process
including deciding on new members to
appoint to the PoE
Remove a PoE member who has not
followed the responsibilities listed under
Sections 4.2, 6.3 and 6.4 of this document
Administer the quarterly PoE conference
calls and the CVD Programme Annual
Review
Carry out all reporting as listed in Section 8
of this document
V3.0 Page 17 of 32
GSM Association Non-confidential
Official Document FS.23 - GSMA Coordinated Vulnerability Disclosure Program
Role Responsibilities
Work for the benefit of the industry as a
whole rather than to enable competitive
advantage
Attend the GSMA’s required training
webinar when they are appointed, before
taking part in Submission reviews
Be actively involved in regular meetings
and contribute to work
Uphold the highest standards of ethics and
integrity through their conduct both within
and outside of the CVD process
Provide expertise on vulnerability
disclosure management to support the
GSMA’s CVD Programme
Take part in the quarterly PoE conference
calls and attend the Annual Review
meeting, where organisational travel policy
permits
V3.0 Page 18 of 32
GSM Association Non-confidential
Official Document FS.23 - GSMA Coordinated Vulnerability Disclosure Program
Role Responsibilities
relation to any disclosures required by law,
regulation or contract
Not make contact with a Reporter directly
during consideration of a Submission,
unless authorised by the GSMA CVD
Director
7 Programme review
Submissions including number received and time taken to consider each Submission
Feedback from Reporters and other parties
Expertise gaps within the PoE for next application round consideration
Suggestions for changes to the Programme
8 Reporting
The GSMA will report on the progress of individual Submissions and to understand the
effectiveness of the Programme as a whole. GSMA groups may request ad hoc reports
about the Programme.
V3.0 Page 19 of 32
GSM Association Non-confidential
Official Document FS.23 - GSMA Coordinated Vulnerability Disclosure Program
1. Number of Submissions:
a) received that month
b) deemed unsuitable for GSMA CVD that month
c) currently under consideration
d) closed that month (excluding deemed unsuitable for GSMA CVD)
2. The status of Submissions under consideration
3. Any Submissions which have not met the agreed timings for acknowledgement or
initial assessment that month
The CVD Director may report other information or trends that they deem useful for the PoE,
GSMA staff or others.
This information is shared with these groups on a need-to know basis and subject to the
following confidentiality restrictions:
The recipient of the information agrees to adhere to Article 18.2 of the GSMA Articles
of Association (AA.16) [8].
Individuals acting as Submission Specific Experts who are not from GSMA Members,
Associate Members and Rapporteurs will sign and adhere to a personal NDA
(available at Annexe Annex C).
The GSMA will not communicate details of the vulnerability outside of the SCG or GSMA
Members, Associate Members and Rapporteurs without the agreement of the Reporter.
V3.0 Page 20 of 32
GSM Association Non-confidential
Official Document FS.23 - GSMA Coordinated Vulnerability Disclosure Program
For several years the GSMA supported security researchers to disclose vulnerability details
in a responsible manner on an informal basis, allowing remediation to take place prior to
public disclosure. Based on the success of this informal service the GSMA developed a
formal CVD process to manage industry impacting security issues.
In 2017, the GSMA’s Fraud and Security Group (FASG) [10] defined and supported the
creation of this unique industry focused programme. The service invites security researchers
who have discovered vulnerabilities or weaknesses in mobile systems to disclose details to
GSMA. In turn allowing GSMA member organisations, who are manufacturers and providers
of products and services, to address the identified security issues before public disclosures
enable exploitation.
The GSMA is able to convene industry subject matter experts to assess the research, often
highly technical in nature, and offer remediating advice for short, medium and long term
fixes, where appropriate. The GSMA is then able to share details of these fixes with the
entire membership; with the intention to prevent exploitation.
The GSMA membership is also in a unique position to influence the industry standardisation
process, allowing vulnerabilities to be designed out at the earliest phase of network design.
The benefit of such a Programme for the GSMA membership is the convening of industry
experts to collectively address and prevent attacks capable of exploiting disclosed
vulnerabilities. The benefit for the security researchers’ is that they receive a constructive
and structured engagement with the industry and can contribute to enhancing the security of
mobile services.
V3.0 Page 21 of 32
GSM Association Non-confidential
Official Document FS.23 - GSMA Coordinated Vulnerability Disclosure Program
Title of vulnerability
Description of vulnerability
Product or service name
Date vulnerability found
Is the vulnerability still live? (Yes/No)
Do you believe the vulnerability is currently being exploited? (Yes/No)
Probability of reproduction of vulnerability (Always / Often / Rarely)
Possible threat caused by the vulnerability
Can you provide PoC Code, Screenshots or other useful information?
Do you intend to let us review the vulnerability before going public? (Yes/No)
To what other organisation(s) has the vulnerability been disclosed?
V3.0 Page 22 of 32
GSM Association Non-confidential
Official Document FS.23 - GSMA Coordinated Vulnerability Disclosure Program
Description of Vulnerability
V3.0 Page 23 of 32
GSM Association Non-confidential
Official Document FS.23 - GSMA Coordinated Vulnerability Disclosure Program
Reporter
Organisation
V3.0 Page 24 of 32
GSM Association Non-confidential
Official Document FS.23 - GSMA Coordinated Vulnerability Disclosure Program
Applicant Details
Name:
Company:
(As listed on your
GSMA IC2 account)
Work email:
Telephone:
I am a member of the GSMA Fraud and Security Group (FASG): No ☐ Yes ☐
Geographical North America ☐
areas of company
activity: Latin/South/Central America ☐
(Tick all that Middle East & North Africa ☐
apply)
Sub-Saharan Africa ☐
Europe ☐
Russia/Central Asia ☐
Greater China ☐
India and South Asia ☐
East and South-East Asia ☐
Oceania ☐
Applicant Experience
V3.0 Page 25 of 32
GSM Association Non-confidential
Official Document FS.23 - GSMA Coordinated Vulnerability Disclosure Program
Please outline any evidence of relevant experience within the areas above and with the wider
mobile industry/academia (e.g. standards, research, publications, and memberships of other
committees/industry bodies):
I have previously been a member of the GSMA CVD Panel of Experts No ☐ Yes ☐
(formerly Governance Team)?
Please provide Referee One Name:
referees who can
Email:
be contacted by
GSMA to support Referee Two Name:
the application
(optional but Email:
recommended):
Applicant Consent
I have read FS.23 and agree to be bound by the terms and conditions of No ☐ Yes ☐
the document set out therein:
I have received written approval by my employer to act as a member of No ☐ Yes ☐
the Panel of Experts:
Applicant Name:
Signed:
Date:
V3.0 Page 26 of 32
GSM Association Non-confidential
Official Document FS.23 - GSMA Coordinated Vulnerability Disclosure Program
the GSM Association with an office at 2nd Floor, The Walbrook Building, 25 Walbrook, London EC4N 8AF, England
and ____________________________________whose registered office is located at:
_________________________(the “Confidant”) (each individually a “Party” and collectively the “Parties”)
WHEREAS the Parties wish to protect the confidential nature of information disclosed under this
Agreement.
1. DEFINITIONS
1.1 “Affiliates” means any subsidiary or holding company of an entity, any subsidiary of any of its holding
companies and any partnership, company or undertaking (whether incorporated or unincorporated) in which
an entity has the majority of the voting rights or economic interest.
1.2 “Business Purpose” means [INSERT PURPOSE FOR WHICH THE CONFIDENTIAL INFORMATION IS BEING
EXCHANGED].
1.3 “Confidential Information” means all information of the GSMA Group, the Confidant or a third party,
including without limitation, information relating to the research, development, business plans, marketing,
operations, finances, personal data of any such entity, which is disclosed by one Party directly or indirectly to
the other Party hereunder in connection with the Business Purpose, whether in writing (physically or
electronically), visually or orally and which is designated as proprietary or confidential or which, under the
circumstances, should reasonably be considered confidential.
1.4 “Disclosing Party” a Party to this Agreement that directly or indirectly discloses or makes available its
Confidential Information to the other Party.
1.5 “GSMA Group” means the GSMA, its Affiliates and GSMA Members together with the directors,
employees and agents of each of those.
1.6 “GSMA Members” means the full, associate and other members of the GSM Association.
V3.0 Page 27 of 32
GSM Association Non-confidential
Official Document FS.23 - GSMA Coordinated Vulnerability Disclosure Program
1.7 “Receiving Party” means a Party to this Agreement which directly or indirectly receives or obtains the
other Party’s Confidential Information.
All Confidential Information is, and shall remain, the property of the Disclosing Party. Nothing herein
shall be construed as granting any rights by licence or otherwise in the Confidential Information except as
expressly provided herein. Other than as expressly provided herein, no licence is granted (whether implicitly, by
estoppel or otherwise) under any patents, copyrights, trademarks, database rights, semiconductor topography
rights, registered or unregistered designs, utility models or other intellectual property rights relating to the
Confidential Information.
3. OBLIGATIONS OF CONFIDENTIALITY
3.1 The Receiving Party may use the Confidential Information received hereunder solely for the Business
Purpose.
3.2 For a period of three (3) years from the receipt of Confidential Information hereunder, the Receiving
Party shall use the same degree of care and means that it uses to protect its own Confidential Information of a
similar nature, but in any event not less than reasonable care and means, to prevent the unauthorized use or
disclosure to third parties of such Confidential Information.
3.3 The Receiving Party shall disclose the Confidential Information only to its officers, employees,
consultants, Affiliates, or contractors with a “need to know” for the Business Purpose and who have entered
into confidentiality agreements sufficient to prohibit further unauthorized use or disclosure of the Confidential
Information. The Receiving Party may not alter, decompile, disassemble, reverse engineer, or otherwise modify
any Confidential Information received hereunder other than in furtherance of the Business Purpose and the
mingling of the Confidential Information with information of the Receiving Party shall not affect the confidential
nature or ownership of the same as stated hereunder.
3.4 This Agreement shall impose no obligation of confidentiality upon the Receiving Party with respect to
any portion of Confidential Information received hereunder, which: (a) is already known in the public domain
prior to this Agreement or becomes publicly known through no fault of the Receiving Party; (b) is or becomes
known to the Receiving Party from a third party source other than the Disclosing Party without duties of
confidentiality attached and without breach of any agreement between the Disclosing Party and such third
party; (c) is furnished to another by the Disclosing Party without restriction on disclosure; or (d) was
independently developed by the Receiving Party without the benefit of the Confidential Information.
3.5 Nothing in this Agreement shall prevent a Receiving Party from disclosing Confidential Information to
the extent it is legally compelled to do so by any governmental investigative or judicial agency pursuant to
proceedings over which such agency has jurisdiction; provided, however, that prior to any such disclosure, the
Receiving Party shall: (a) assert the confidential nature of the Confidential Information to the agency; (b)
immediately notify the Disclosing Party in writing of the agency’s order or request to disclose; and (c) provide all
reasonable cooperation to the Disclosing Party in protecting against any such disclosure and/or obtaining a
protective order narrowing the scope of the compelled disclosure and protecting its confidentiality.
V3.0 Page 28 of 32
GSM Association Non-confidential
Official Document FS.23 - GSMA Coordinated Vulnerability Disclosure Program
3.6 Each Party agrees that this Agreement applies equally to all Confidential Information concerning the
Business Purpose shared by the Disclosing Party or any Affiliate of the Disclosing Party to the Receiving Party
prior to the Effective Date.
4. EXCLUSIVE ACTIVITY
Nothing in this Agreement shall prevent a Party from pursuing similar discussions with third parties
provided that there is no breach of the obligations of this Agreement. The obligations of confidentiality under
this Agreement shall not be construed to limit a Party’s right to develop independently or acquire products or
services without use of the other Party’s Confidential Information.
5.1 The term of this Agreement is for a period of one (1) year from the Effective Date unless otherwise
terminated.
5.2 Either Party may terminate this Agreement for any reason prior to the period stated in clause 5.1 upon
thirty (30) days’ written notice to the other Party.
5.3 Either Party may terminate this Agreement immediately upon written notice to the other in the event
of any breach by that other Party of this Agreement.
5.4 Upon the written request of either Party or upon the expiration or termination of this Agreement for
any reason the Receiving Party will promptly return all copies of the Disclosing Party’s Confidential Information
in its possession, power, custody or control, or in respect of Confidential Information held electronically
permanently erase to the extent technically feasible (without incurring excessive expense).
5.5 Notwithstanding anything else contained herein, each Party may retain a copy of the other Party’s
Confidential Information to the extent required for legal or regulatory purposes. Any Confidential Information
that is retained under this clause or which has not been returned, destroyed or permanently erased under clause
5.4 shall remain subject to the other provisions of this Agreement.
5.6 Clauses 1, 2, 3, 4, 5.4, 5.5, 6 and 7 shall survive the expiration or termination of this Agreement.
6. NO WARRANTY; DISCLAIMER
7. GENERAL
V3.0 Page 29 of 32
GSM Association Non-confidential
Official Document FS.23 - GSMA Coordinated Vulnerability Disclosure Program
7.1 Equitable Remedies. The Parties agree that there is no adequate remedy in damages for any breach of
the obligations of confidence hereunder and upon any such breach or any threat thereof by the Receiving Party,
the Disclosing Party shall be entitled to seek appropriate equitable relief, including injunctive relief in addition
to whatever other remedies it might be entitled, including, but not limited to, damages.
7.2 Severability. If any term, provision, covenant or condition of this Agreement is held invalid or
unenforceable for any reason, the Parties agree that such invalidity shall not affect the validity of the remaining
provisions of this Agreement and further agree to substitute for such invalid or unenforceable provision a valid
and enforceable provision of similar intent and economic effect.
7.3 Publicity. Neither Party, without the other Party’s prior written approval, shall make any public
announcement or any disclosure as to the existence of or matters set forth in this Agreement.
7.4 Assignment. Neither Party may assign its rights or obligations under this Agreement.
7.5 Waiver. The failure of a Party at any time to require performance by the other Party of any provision
hereof shall not affect in any way the full right to require such performance at any time thereafter. Nor shall the
waiver by a Party of a breach of any provision hereof be taken or held to be a waiver of the provision itself.
7.6 Headings. The headings in this Agreement are provided for convenience only and do not affect its
meaning.
7.7 Relationship of the Parties. Nothing in this Agreement will be construed as creating an employer-
employee or agency relationship, a partnership or a joint venture between the Parties.
7.9 Facsimiles; Email. The Parties agree to treat documents sent via telephonic facsimile or email as original
documents, provided that either Party may require the other to provide a manually executed or authenticated
original or duplicate of any document so sent within a reasonable period of time, and if such original or duplicate
is not provided within that time, then to treat the document as not having been received initially until the
manually executed or authenticated original or duplicate is delivered.
7.10 Entire Agreement; Modification. This Agreement is the complete, final and exclusive statement of the
terms of the agreement between the Parties and supersedes any and all other prior and contemporaneous
negotiations and agreements, whether oral or written, between them relating to the subject matter hereof. This
Agreement may not be varied, modified, altered, or amended except in writing signed by the Parties.
7.11 Counterparts. This Agreement may be executed in two (2) or more counterparts, each of which shall
be deemed an original, but all of which together shall constitute one and the same instrument.
V3.0 Page 30 of 32
GSM Association Non-confidential
Official Document FS.23 - GSMA Coordinated Vulnerability Disclosure Program
IN WITNESS WHEREOF the Parties have caused this Agreement to be executed by their duly authorized
representatives on the date(s) shown below.
______________________________ ____________________________
Signature Signature
______________________________ ____________________________
Printed Printed
______________________________ ____________________________
Title Title
______________________________ ____________________________
Date Date
V3.0 Page 31 of 32
GSM Association Non-confidential
Official Document FS.23 - GSMA Coordinated Vulnerability Disclosure Program
It is our intention to provide a quality product for your use. If you find any errors or omissions,
please contact us with your comments. You may notify us at [email protected]
V3.0 Page 32 of 32