Technology & Digital UK-wide

The Computer Misuse Act 1990 (CMA) makes it a criminal offence to access computer systems without authorisation. If you conduct penetration testing, vulnerability research, or develop security tools, you must understand the legal boundaries to avoid prosecution.

Key principle: Good intentions are not a defence. You need explicit written authorisation before testing any system you do not own.

Criminal offences and penalties

The CMA creates four main offences. The Serious Crime Act 2015 added Section 3ZA and increased penalties for serious cases.

Upcoming legal reform

In December 2025, the government committed to introducing a statutory defence for legitimate security researchers. Until this reform takes effect, you must still obtain written authorisation for all security testing.

Conduct legitimate security testing

You can conduct security testing legally if you follow proper procedures. The key requirement is written authorisation from the system owner before you begin.

TECHNOLOGY & DIGITAL Requirement

If you run a penetration testing or security consultancy business

Security testing businesses face particular CMA risks because testing is your core activity. Take these additional steps:

  • Professional indemnity insurance: Ensure your policy covers CMA-related claims
  • CREST or equivalent certification: Demonstrates industry-standard practices and may support a legitimate purpose defence
  • Scope validation process: Verify the person signing authorisation has legal authority to grant access
  • Third-party system checks: Confirm whether target systems include third-party infrastructure (cloud providers, CDNs) requiring separate authorisation
  • Incident escalation: Have procedures if testing reveals evidence of existing compromise or illegal activity

Consider joining the CyberUp Campaign to support ongoing legal reform efforts.

Bug bounty programmes

If you run a bug bounty programme, include clear legal terms to protect researchers:

  • Explicit scope: List which domains, IP addresses, and applications are in scope
  • Safe harbour commitment: Commit not to pursue legal action against researchers who follow your rules
  • Response timeframes: State how quickly you will acknowledge and triage reports
  • Disclosure policy: Clarify when (if ever) researchers can publicly disclose findings
  • Out-of-scope activities: Explicitly prohibit social engineering, physical access, denial of service testing

Use the NCSC Vulnerability Disclosure Toolkit to create your programme terms.

If you suspect a breach of your systems

When responding to suspected intrusions:

  • Preserve evidence: Do not modify or delete logs - these may be needed for prosecution
  • Document your actions: Record what you discover and when, in case you need to demonstrate you acted lawfully
  • Do not "hack back": Accessing the attacker's systems is itself a CMA offence, even in retaliation
  • Report to authorities: Report to Report Fraud (0300 123 2040) in England, Wales, and Northern Ireland, or Police Scotland (101) in Scotland
  • Consider personal data: If personal data was accessed, assess whether ICO notification is required within 72 hours
  1. Get written authorisation before testing

    Obtain signed authorisation specifying systems in scope, permitted methods, timeframe, and emergency contacts before any security testing

  2. Verify authorisation authority

    Confirm the person signing has legal authority to grant access - not just IT department approval

  3. Check third-party system requirements

    Identify any cloud providers, CDNs, or hosting platforms in scope and check their penetration testing policies

  4. Document scope boundaries

    Record what is in scope, what is excluded, and what testing methods are permitted

  5. Establish responsible disclosure timelines

    Agree reporting procedures and typical 90-day disclosure window aligned with NCSC guidance

  6. Retain authorisation records

    Keep authorisation documents for at least 3 years after testing completion

  7. Review bug bounty programme terms

    Ensure programmes include explicit scope, safe harbour commitment, and clear disclosure policy

  8. Train security teams on CMA requirements

    Ensure all staff conducting security testing understand legal boundaries and documentation requirements