<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0" xml:base="https://www.hackerone.com/">
  <channel>
    <title>Lithuania</title>
    <link>https://www.hackerone.com/</link>
    <description/>
    <language>en</language>
    
    <item>
  <title>Cyber ​​Security Law of the Republic of Lithuania No. XII-1428 Law amending Articles 1, 2, 6, 8, 9, 13, the title of Chapter V, the appendix and supplementing the Law with Article 17 and Chapter VI</title>
  <link>https://www.hackerone.com/node/2368</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">Cyber ​​Security Law of the Republic of Lithuania No. XII-1428 Law amending Articles 1, 2, 6, 8, 9, 13, the title of Chapter V, the appendix and supplementing the Law with Article 17 and Chapter VI</span>
<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Mon, 07/29/2024 - 15:45
</span>

  
    Jurisdiction
              Lithuania
          

  
    Region
              Europe
          

  
    Requirement
              Required
          

  
    Organization
              Ministry of National Defense
          

  
    Provision
              Article 8 (Adding Article 17) 
          

  
    Applies to
              Reporters of Vulnerabilities
          

  
    Date
              June 2021
          

  
    Description
              Provides a definition for what constitutes the legitimate disclosure of a vulnerability by a private person; it also determines the following restrictions:&nbsp;1. The operation, functionality, services and data availability or integrity of the communication and information system may not be disrupted or altered.&nbsp;2. When a vulnerability is identified, the search activity is terminated.&nbsp;3. Within 24 hours of the start of the search activity, information on search results must be submitted to the NCSC under the Ministry of National Defence or CSE.&nbsp;4. It is not unnecessarily sought to validate, monitor, record, intercept, acquire, store, disclose, copy, modify, corrupt, delete, destroy data managed by a cybersecurity entity.&nbsp;5. No attempts are made to guess passwords. Passwords obtained illegally are not used and employees of the CSE or other persons who have the right to use non-public information relevant to the search for loopholes are not exploited or manipulated in order to obtain the information.&nbsp;6. Information about the detected vulnerability is shared only with the NCSC under the Ministry of National Defence or CSE and made public according to the amendment.&nbsp;
          

            <a href="https://e-seimas.lrs.lt/portal/legalAct/lt/TAD/24366500d28511eb9787d6479a2b2829?jfwid=ty1n1j81t">https://e-seimas.lrs.lt/portal/legalAct/lt/TAD/24366500d28511eb9787d6479a2b2829…</a>
      ]]></description>
  <pubDate>Mon, 29 Jul 2024 20:45:03 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">2368 at https://www.hackerone.com</guid>
    </item>

  </channel>
</rss>
