Systems in Scope
Solely the web applications within the authenticated area processing customer data (i.e. the products like email, calendar or file storage, including the authentication systems) are currently within scope of the bug bounty program.
All other systems are out of scope. Of course, we still accept vulnerability reports for those systems, but we do not reward the reports.
If you have found a vulnerability on a system but you are not sure whether it belongs to the above-mentioned systems in scope, you can send us an email to the address listed below with the fully qualified domain name of the system. We will reply to you shortly.