Guide
Computer Misuse Act Compliance
How to comply with the Computer Misuse Act 1990 when conducting security testing, developing security tools, or running bug bounty programmes. Includes the four criminal offences, penalties up to life imprisonment for serious cases, and requirements for legitimate security research.
The Computer Misuse Act 1990 (CMA) makes it a criminal offence to access computer systems without authorisation. If you conduct penetration testing, vulnerability research, or develop security tools, you must understand the legal boundaries to avoid prosecution.
Key principle: Good intentions are not a defence. You need explicit written authorisation before testing any system you do not own.
Criminal offences and penalties
The CMA creates four main offences. The Serious Crime Act 2015 added Section 3ZA and increased penalties for serious cases.
Upcoming legal reform
In December 2025, the government committed to introducing a statutory defence for legitimate security researchers. Until this reform takes effect, you must still obtain written authorisation for all security testing.
Conduct legitimate security testing
You can conduct security testing legally if you follow proper procedures. The key requirement is written authorisation from the system owner before you begin.
If you run a penetration testing or security consultancy business
Security testing businesses face particular CMA risks because testing is your core activity. Take these additional steps:
- Professional indemnity insurance: Ensure your policy covers CMA-related claims
- CREST or equivalent certification: Demonstrates industry-standard practices and may support a legitimate purpose defence
- Scope validation process: Verify the person signing authorisation has legal authority to grant access
- Third-party system checks: Confirm whether target systems include third-party infrastructure (cloud providers, CDNs) requiring separate authorisation
- Incident escalation: Have procedures if testing reveals evidence of existing compromise or illegal activity
Consider joining the CyberUp Campaign to support ongoing legal reform efforts.
Bug bounty programmes
If you run a bug bounty programme, include clear legal terms to protect researchers:
- Explicit scope: List which domains, IP addresses, and applications are in scope
- Safe harbour commitment: Commit not to pursue legal action against researchers who follow your rules
- Response timeframes: State how quickly you will acknowledge and triage reports
- Disclosure policy: Clarify when (if ever) researchers can publicly disclose findings
- Out-of-scope activities: Explicitly prohibit social engineering, physical access, denial of service testing
Use the NCSC Vulnerability Disclosure Toolkit to create your programme terms.
If you suspect a breach of your systems
When responding to suspected intrusions:
- Preserve evidence: Do not modify or delete logs - these may be needed for prosecution
- Document your actions: Record what you discover and when, in case you need to demonstrate you acted lawfully
- Do not "hack back": Accessing the attacker's systems is itself a CMA offence, even in retaliation
- Report to authorities: Report to Report Fraud (0300 123 2040) in England, Wales, and Northern Ireland, or Police Scotland (101) in Scotland
- Consider personal data: If personal data was accessed, assess whether ICO notification is required within 72 hours
-
Get written authorisation before testing
Obtain signed authorisation specifying systems in scope, permitted methods, timeframe, and emergency contacts before any security testing
-
Verify authorisation authority
Confirm the person signing has legal authority to grant access - not just IT department approval
-
Check third-party system requirements
Identify any cloud providers, CDNs, or hosting platforms in scope and check their penetration testing policies
-
Document scope boundaries
Record what is in scope, what is excluded, and what testing methods are permitted
-
Establish responsible disclosure timelines
Agree reporting procedures and typical 90-day disclosure window aligned with NCSC guidance
-
Retain authorisation records
Keep authorisation documents for at least 3 years after testing completion
-
Review bug bounty programme terms
Ensure programmes include explicit scope, safe harbour commitment, and clear disclosure policy
-
Train security teams on CMA requirements
Ensure all staff conducting security testing understand legal boundaries and documentation requirements