Data leak, vulnerability, or abuse of our computer systems? Please report it
The Tax Authorities strive to ensure the highest possible level of security. We apply the highest level of security to safeguard the information entrusted to us, so that everyone's privacy is and remains guaranteed. However, unsafe situations may still occur despite all our best efforts and due diligence.
The following subjects are discussed below:
- Report misuse of our network
- Report other security threats
- Stop using Windows XP
- Responsible Disclosure
(Rules relating to reporting vulnerabilities in our computer programs)
Reporting malicious and phishing e-mailsave you received a suspect or malicious e-mail (phishing e-mail)?
Go to: Reporting malicious and phishing e-mails.
Report misuse of our network
Have you noticed that our software systems (Tax Authority, Excise or Customs) are being misused, for example, because you have received suspect e-mail or messages? Report this to us on:
firstname.lastname@example.org (use this e-mail address for this type of report only).
Would you like to submit a report securely? Then use our PGP-key.
( KeyID: 69F44C51, Fingerprint: 0A2A BC7B 3762 A31D D441 8F3F 9AB9 08E4 69F4 4C51 )
Reporting other security threats
Would you like to report other urgent security threats, which must be reported immediately in the general interests of, for example, the Tax Authorities, Customs, the Netherlands and/or the European Union? Then please contact the Security Operations Centre (SOC) of the Tax Authorities as quickly as possible. The SOC is available 7 days a week and 24 hours a day via:
email@example.com (use this e-mail address for this type of report only).
Would you like to submit your report securely? Then use our PGP-key.
( KeyID: 1D525151, Fingerprint: ADCE A7E3 22B0 2B8A 8C35 24C1 FF0D 4B03 1D52 5151 )
For less urgent security threats, please contact the Tax Information Line.
Stop using Windows XP
Are you using Windows XP? On 8 April 2014, Microsoft stopped providing updates for Windows XP. This means computers running Windows XP are now vulnerable to viruses and other security threats. So continued use of Windows XP on your computer is not recommended: please upgrade to a later operating system.
More information on using the internet safely
For more information on using the internet safely, please go to:
- For citizens and SMEs: www.veiliginternetten.nl (only available in Dutch)
- For professionals: www.ncsc.nl/english
National Cyber Security Centre (NCSC) of the Ministry of Justice and Security.
For all e-mail addresses on this page: only use them for this type of report
The e-mail addresses on this page are only intended to inform us of what you noted and know about the issue indicated for that e-mail address. Are you reporting something else to one of the e-mail addresses on this page? Then your e-mail will not be processed. The message in your e-mail will not be recorded in our records.
Finding a weak spot in one of our systems is not inconceivable. Have you found a weak spot? Then you can report it according to the following arrangements. You may hold the Tax Authorities to this policy within the scope of Responsible Disclosure.
Vulnerabilities in the Tax Authorities' ICT systems
Please inform us immediately of any vulnerability you may find in the Tax Authorities' ICT systems, so that we can take the necessary measures as soon as possible. Your cooperation in improving the security of our ICT systems is always greatly appreciated.
We ask you:
- to inform us of the vulnerability immediately after discovering it.
- to send us your findings by e-mail:
firstname.lastname@example.org (use for this type of report only).
If possible, encrypt your findings with our PGP-key ( KeyID: B26FD013, Fingerprint: FA12 7499 E956 4F62 9176 4439 59D4 AF50 B26F D013 ) to prevent information from falling into the wrong hands.
- provide sufficient information to be able to reproduce the problem, so that we can rectify this as quickly as possible.
In most cases, the IP address or the URL of the system affected and a description of the vulnerability are sufficient, but more information may be required for more complex vulnerabilities.
- leave your contact details so that our Security Operations Centre can contact you in order to jointly find a safe solution.
Leave at least an e-mail address or telephone number.
- do not share the information regarding the security problem with other people until we have solved it.
- handle the information regarding the security problem responsibly by not performing any actions that go further than necessary to demonstrate the security problem.
- realize that any information in the systems of the Tax Authorities falls under the (fiscal) duty of confidentiality and that further dissemination of the said information is a punishable offence.
In all events, avoid the following:
- copying, changing or deleting information or configurations of a system (or alternatively making a directory listing or a screenshot)
- using so-called 'brute force' to gain access to systems
- using denial-of-service attacks or social engineering
You can expect the following from us:
- If your report satisfies the aforementioned conditions, we will not attach any legal consequences to this report. We will deal with your report strictly confidentially and will not share any of your personal details with third parties without first obtaining your permission, unless this is mandatory by virtue of the law or a court decision
- We will send you a confirmation of receipt within 1 working day
- We will respond to your report with our opinion and an expected solution date within 5 working days
- We will keep you informed about the progress made. We will rectify the security problem you detected in our system within a reasonable period of time. In mutual consultation, we will determine when and in what way this will be published
- If you desire, we can name you as the discoverer of the reported vulnerability
- And as thanks for your help, we offer a playful reward for each report of a serious security problem of which we are unaware. However, this reward will never be a cash reward.
This text was compiled as a supplement to the guideline of the National Cyber Security Centrum.
This work is licensed under a CreativeCommonsAttribution-ShareAlike 3.0 UnportedLicense.