Last updated: 2025-11-24
No bug bounty at this time; coordinated disclosure only.
Purpose & Scope
Flight Crew View (FCV) is a crew-facing mobile app, built by a pilot for crews, that helps pilots and flight attendants view schedules, layover information, messages, and more. FCV is a product of Flight Crew Apps, LLC.
We take the security and privacy of our users seriously and welcome responsible disclosure of vulnerabilities. This Vulnerability Disclosure Policy (VDP) explains how to report security issues to us, what is in scope, how we will handle your report, and the protections we offer to good-faith security researchers.
This policy covers security vulnerabilities in Flight Crew View’s applications and services as defined in the
in-scope section below. It does not cover airline-owned systems, portals, or networks.
We are continuously maturing our security and privacy controls but do not claim any formal compliance
certifications (such as SOC 2 or ISO 27001) at this time.
Authorization
If you make a good faith effort to comply with this policy and limit your testing to activities within its scope, we will consider your security research to be authorized. We will work with you to understand and resolve the issue quickly, and Flight Crew Apps, LLC will not initiate or recommend legal action against you for this research.
To the extent permitted by applicable law, we will not pursue civil or criminal action under anti-hacking laws (such as the Computer Fraud and Abuse Act or similar state laws) for good-faith, policy-compliant security testing.
If legal action is initiated by a third party against you for activities that were conducted in accordance with this policy, and we have sufficient information to validate that, we will make our authorization of your research known to that third party.
Guidelines
Under this policy, “research” means security testing activities in which you:
• Notify us as soon as possible after you discover a real or potential security issue.
• Make every effort to avoid privacy violations, degradation of user experience, disruption to production systems, and destruction or manipulation of data.
• Only use exploits to the extent necessary to confirm a vulnerability’s presence. Do not use an exploit to compromise or exfiltrate data, establish persistent access, or pivot to other systems.
• Provide us a reasonable amount of time to resolve the issue before you disclose it publicly.
• Do not submit a high volume of low-quality reports (for example, automated scanner output without clear security impact or triage).
• Once you’ve established that a vulnerability exists, or encounter any sensitive data (including personally identifiable information, financial information, or proprietary information or trade secrets of any party), stop your test, notify us immediately, and do not copy, store, or disclose this data to anyone else.
In-Scope & Out-of-Scope
This policy applies to the following systems and services:
Authentication
Schedule sources
Hosting & security
Backups & retention
Out-of-Scope Items
The following are out of scope and must not be targeted:
Rules of Engagement
These rules define the boundaries for permitted testing. Our authorization and safe harbor commitments apply only to testing that follows these rules and the scope defined in this policy.
To help us protect crew privacy and service availability, please follow these rules when testing:
How to Report a Vulnerability
Please send vulnerability reports to:
When reporting, please include where possible:
General support issues should go to support@flightcrewview.com, but security-specific reports should go directly to the security address above.
Note: No bug bounty is offered at this time; this is a coordinated disclosure program focused on protecting crews and improving security.
Response Targets (SLAs)
We will make a good-faith effort to meet the following targets for in-scope reports:
Remediation Targets
These timelines are goals, not guarantees. Actual timelines may vary depending on complexity, required coordination, and potential user impact. If we expect delays, we will keep you informed.
Credit & Acknowledgments
We appreciate responsible security research. For valid, non-trivial vulnerabilities reported in accordance with this policy,
we can offer optional public acknowledgment (for example, on a “Security Acknowledgments” page), if you wish.
You may choose to be credited under your name or handle, or to remain anonymous. There is no bug bounty and
no monetary reward associated with this program at this time.
Privacy & Data Handling for Reports
We treat vulnerability reports and associated data as confidential security information.
For general information about how we process personal data, please see our Privacy Policy:
https://flightcrewview.com/privacy/.
Versioning & Changes
This policy may be updated from time to time to expand scope, refine rules of engagement, or adjust timelines. When we make changes, we will update the “Last updated” date at the top of this page and may provide a brief summary of key changes.
The current version of this policy is always available at:
https://flightcrewview.com/security.