ResMed Information Security

Mission: ResMed, a world leader in medical software and connected health solutions, seeks to protect the security of information of our customers and their patients, our commercial partners, and our global team.

ResMed Vulnerability Disclosure

If you notice an issue with, or potential cybersecurity threat to, a ResMed-operated digital platform, please report it to us.

Reporting Procedures

  1. Send an encrypted email, using the ResMed PGP Key, to Security Reports
  2. Provide as much information as possible, including steps to reproduce the issue and any logs or scripts used (e.g. text, screenshots)
  3. If you would like follow up, please use a valid email address

Report Review

  • ResMed will contact you with an incident number, and may request additional information
  • ResMed will verify the vulnerability, and will coordinate internally to plan for remediation, if verified
  • ResMed will coordinate a disclosure timeline with you
  • ResMed will notify you when the issue has been resolved
  • ResMed will make an effort to respond to status inquiries within 10 business days

Prohibited Actions

  • Social engineering and phishing
  • Physical attacks against ResMed-owned systems or sites
  • Actions that may disrupt service (e.g. denial of service, brute force)
  • Sending identifiable customer, patient, employee or user data
  • Premature public disclosure of a cybersecurity vulnerability
  • Testing of non-ResMed systems, such as 3rd-party suppliers

ResMed Information Security

Security Bulletin

For further information regarding any of the topics below, please contact ResMed Web Security

ResMed Product Security

ResMed strives to protect information in accordance with all applicable laws and regulations. In order to achieve a suitable level of cybersecurity, ResMed focuses on the following activities where appropriate:

  • Security by Design
  • Secure Systems Development
  • System Risk Assessment
  • Vulnerability Management
  • Incident Response 

ResMed Disabling TLS 1.0


On May 31st, 2019, ResMed plans to disable the use of TLS 1.0 across websites and services. This change will ensure we maintain secure communications with our partners, customers, and patients, and keeps us aligned with best practices in a changing cybersecurity landscape. ResMed will focus on supporting TLS 1.1 and 1.2.

Why upgrade?

TLS 1.0 is an older protocol and has weaknesses in its security which hackers have developed attacks against. Some attacks take advantage of outdated cryptography practices, while others utilize the more powerful computers today to break old cryptographic protocols that worked well against slower computers. Due to these reasons, ResMed will stop supporting TLS 1.0 as a protocol.

How does this affect me?

For the most part, this change will not affect you. Most modern internet browsers already use TLS 1.2, the current standard.

How can I check my browser?

You can use one of the following website tools:

Option 1

If the website shows your browser is “Bad,” then you will need to upgrade to a newer browser version. If you see “Probably Okay” or “Improvable” then you will still be able to access ResMed websites and services.


Option 2

Under the Protocol Features section, if TLS 1.1 or 1.2 has a ‘Yes’ for supported then you will be able to connect successfully. It is not a problem if your browser also supports TLS 1.0.


Web Browsers

This section shows which browsers support more modern versions of TLS. While some older browsers will still work after TLS 1.0 is deprecated by ResMed, the most up-to-date version of a browser should be used to avoid other security vulnerabilities.

Web Browser Versions

The following list is a compiled from various resources. Not all ResMed sites support the browsers below, but we list them to be complete.

Name Platform Minimum Version Recommended
Microsoft Internet Explorer Desktop/Laptop IE 8 (with Windows 7+) 11
Microsoft Edge Desktop/Laptop None 18
Mozilla Firefox Desktop/Laptop 27 65
Google Chrome Desktop/Laptop, mobile 30 72
Apple Safari Desktop/Laptop 7 12
Opera Desktop/Laptop, mobile 17 58
Samsung Internet Mobile 4 9
Safari for iOS Mobile 5 12
Microsoft Edge Mobile 1 1

What if I am not using a web browser to connect to ResMed?

If you connect to ResMed services through other technologies than a web browser, you will need to ensure that TLS 1.1 or TLS 1.2 are supported, which may require updating the environment your system is running in. We cannot provide an exhaustive list of options for these other technologies and programs, but you can test your system against ResMed websites and services today as TLS 1.1 and TLS 1.2 are supported already by our systems. If you do not check connectivity prior to the date mentioned above, your programs may not be able to connect to ResMed services.

API Access

Current APIs support TLS 1.1 and 1.2 if you need to test whether your system will function correctly after May 31st. If you have issues connecting to ResMed websites and services contact and the team can route you to the appropriate ResMed resource. Below are versions of common tools that support TLS 1.1 and 1.2.

Java JDK

Version TLS 1.1 TLS 1.2 Notes
6 Disabled No 1.1 available with update 111
7 Disabled Disabled  
8 Yes Yes Current version


Version TLS 1.1 TLS 1.2 Notes
3.5 and older No No  
4.0 No No Upgrade to 4.5
4.5-4.5.2 Disabled Disabled Can enable by default in registry or in code
4.6+ Yes Yes  


Version TLS 1.1 TLS 1.2 Notes
1.0.0 and older No No  
1.0.1+ Yes Yes  


Python compatibility varies depending on OS support for Python, documentation for this can be found on the official python site. Python 3.6 and 2.7.9 are compatible with TLS 1.2.

Thanks…What is TLS?

Computers use TLS (Transport Layer Security) to check each other’s identity and ensure they can talk privately. The technology allows you to communicate with ResMed while both protecting the communicated data and verifying the other side is trusted. The support for TLS, in various forms, has been added to many browsers and systems without intruding on a normal user’s experience. These security measures mean that passwords or credit card numbers can be sent over the internet without fear of someone else obtaining that information “in transit.”

In more detail, TLS checks certificates as a form of digital identification. Every TLS-enabled server would have a corresponding certificate that is automatically exchanged and verified during initial connection. A trusted party digitally “signs” the certificate verifying the system. Most operating systems and web browsers have a preconfigured list of trusted parties to compare. After checking the certificate, your web browser and the server will automatically decide how to protect the data using encryption.

For further information or any questions regarding TLS 1.0 deprecation, please contact ResMed Web Security