Security Bulletins
(including the latest on Log4j)
Security Policy Statement
We value patient safety and we strive to provide products that are safe and effective for our patients to use in the management of their diabetes. Because cybersecurity risks are increasing, they are an increasingly important part of our focus on safety and privacy. Dexcom assesses these risks and is committed to take appropriate action to address vulnerabilities when they arise.
In order to ensure the integrity and availability of our products and systems, Dexcom takes measures intended to limit access and use of our products to only authorized users and applications.
Product and Information Security
We are committed to conducting ongoing reviews to minimize security risk and vulnerabilities. Ongoing activities include:
Dexcom is committed to continuously improve the security, including cybersecurity, of our products and has implemented processes and programs intended to design security in the development of our products. We continue to monitor and enhance security as appropriate throughout the product lifecycle.
Dexcom understands the importance of protecting patient and partner data and has implemented security practices into the development and ongoing operations of our data services that are intended to deliver security, performance, and usability.
DEXCOM’S COORDINATED VULNERABILITY DISCLOSURE PROGRAM
We recognize the valuable contributions from the security research community. To appropriately partner with the research community, we have created a Coordinated Vulnerability Disclosure Program which we hope promotes collaboration with those that are intending to work with Dexcom in good faith.
Making a Submission:
If you have a concern or have identified a potential vulnerability in one of our products, we ask that you to submit this information using the form below. Please use English for your submission (if possible).
What to Include:
Please fill in all of the required fields below, and be sure to include:
Dexcom’s Expectations of Researchers:
We ask that security researchers who test and submit vulnerabilities do so in accordance with the following guidelines:
What You Can Expect From Dexcom:
We will take the following steps:
If the vulnerability is confirmed, Dexcom will evaluate the potential impact, and identify and take appropriate action, which may include:
Terms Applicable to Dexcom’s Coordinated Vulnerability Disclosure Program:
By submitting information, you agree that (a) your submission will be governed by Dexcom’s Privacy Statement and Terms of Use; (b) the information you submit will be considered as non-proprietary and non-confidential information, which Dexcom is allowed to use in any manner, in whole or in part, without any restriction; (c) your participation in Dexcom’s Coordinated Vulnerability Disclosure Program does not create any rights for you and/or any obligation for Dexcom; and (d) any aspect of this process may be changed by Dexcom, in its sole discretion and without notice.