
Vulnerability Disclosure Program
Protecting the security of our data, systems and services is important to us. However, even with safeguards in place, vulnerabilities can still happen.
That’s why we value the vital role security researchers play in helping us identify and reduce cybersecurity risks.
Help us keep our data and systems safe
If you’ve found a potential security issue that could affect the confidentiality, integrity or availability of our information, systems, or services (which you’re authorised to access or use), please submit a report to our security team.
Please note that this program relates only to the information, systems and services of AA Insurance and doesn’t include any of our partner products or teams.
We also have more information available on how to confirm if you've received scam communications. Please note that reports of potential scam shouldn’t be made through this program.
How to make a report
If you’ve discovered a potential vulnerability, please contact our cyber security team at vulnerability@aainsurance.co.nz.
To help us understand and address the issue, please include as much detail as possible in your report. We recommend including the following:
A brief description of the vulnerability
The affected system, service or information, including relevant URLs
Your name and contact details (you can stay anonymous or use a pseudonym if you prefer)
The date, time, and time zone when the vulnerability was identified
The IP address used at the time
Clear steps to help us reproduce the vulnerability
If you'd like to encrypt your email, you can download our PGP key.
To protect the privacy and security of our customers, we treat all reports of vulnerabilities as confidential. By submitting a report to us, you agree to refrain from publicly disclosing, discussing, or confirming the details of any suspected security issues until we’ve had the opportunity to address them and confirmed this to you in writing.
What happens next
Once you’ve sent us your report, you’ll get an automated confirmation from us to confirm we’ve received your email.
Our team will carefully review the information you’ve provided. We may get back in touch to request more information to support our investigation, or to provide you with updates. We might also invite you to re-test the vulnerability you’ve identified once we’ve addressed it.
In some cases, we may also use elements of your report in our engagements with our regulatory and government bodies.
We appreciate the valuable contributions of researchers who help us protect our customers by identifying and reporting potential security issues. However, we don’t provide compensation for any reports that are made under this program.
Your privacy
When submitting a report to us, you may be providing us with personal information. By submitting a report to us, you agree to us collecting and using your personal information in accordance with our Privacy Policy.
What isn’t allowed
While we welcome research to help us protect our security, the following are not acceptable or condoned under this program:
Gaining access or trying to gain access to accounts or information without proper authorisation
Accessing any information, systems or service you’re not ordinarily authorised to access
Modifying, deleting or destroying information without permission
Sending or trying to send unsanctioned or non-permitted emails or messages
Engaging in social engineering, including phishing, against our employees, contractors, customers, or any associated parties
Publishing, sending, loading, or sharing malware that could harm our systems, products, or customers
Exfiltrating, disclosing, or using any proprietary or classified information (including customer data) without authorisation
Clickjacking or other methods of bypassing security
Using automated vulnerability assessment tools
Physical attacks on our property
Exploiting weak or insecure SSL ciphers or certificates
Performing or attempting Denial of Service (DoS) attacks
Testing vulnerabilities in any applications or websites controlled by our suppliers and distribution network or that are otherwise not controlled by us
Engaging in any activity that seeks unauthorised access to our systems or software in violation of the law
We reserve the right to act against individuals engaged in any of the above activities.