
Drafting Bug Bounty (Ethical Hacking) Agreements
Where does the Lawyer come in?
The relationship between a corporate like Safaricom and an individual bug bounty hunter (ethical hacker) is a contract interpartes and is partially regulated under the Law of Contract Act. It is also governed by the Data Protection Act and the Computer misuse and Cybercrimes Act. Counsel comes in to regulate the conduct of the parties in the details of the relationships which are not currently fully anticipated by the law. Here are the core clauses to include in your Ethical Hacking (Bug Bounty Hunting) Agreements.
1. Vendor Liability
The Corporate (eg. Safaricom) as a data controller remains liable for the protection of customer data. In the event of unlawful breach of Data Protection rights, then the corporate will be held liable for the acts of the Bug Bounty Hunter.
2. Personal Liability for the Ethical Hacker
Negligence and Criminal offences committed by the hacker will be borne by the hacker. Much as the corporate is liable to the customer for data breaches, the hacker will be held personally liable for negligence and criminal acts arising out of the Computer Misuse Cybercrimes Act and the Data Protection Act. For example, unauthorized disclosure of customer data will attract penalties and jail terms for the individual hacker.
3. Non-Disclosure Agreement (NDA) clauses
The terms of the Standard Nondisclosure Agreement will apply. The Bug Bounty Hunter must place himself under the confidentiality terms under which the corporate has an obligation to comply with. Safety and privacy of data is crucial in this Agreement and stiff penalties must be imposed for unlawful disclosure of customer data. This in the understanding that the customer, in the event of such disclosure will seek remedies from the corporate, and the corporate must in turn be indemnified by the Bounty Hunter.
4. Clause against Offensive Use
Private ethical hacking programs for corporates allow the corporate to have control over who engages their systems through a vetting exercise. Once the hacker (s) has been identified, the terms of participation in the bug bounty program must include a clause for non-offensive use. This protects the information discovered by the bug bounty hunter in the system or software against misuse, for example; selling it to competitors who are likely to exploit the information for their own interest.
5. Undertaking to Uphold Ethical standards
The underlying concept in Bug Bounty programs is that the hackers/participants are ethical hackers and that they will uphold the best practice of ethical hacking and to fully comply with the law and contract.
6. Duty to keep their discoveries Confidential
Inviting hackers to check your system for bugs is a risk in itself since they will have in their possession valuable information which can be exploited. Fortune 500 companies in particular are noticing an increase in attacks on the applications they've tried to protect with bug bounties. The Bug Bounty Agreement must have a clause requiring hackers to keep their discoveries confidential.
7. Duty to seek Authorization before accessing the system
An ethical hacker must seek authorization from the organization that owns the system. Hackers should obtain complete approval before performing any security assessment on the system or network. What sets ethical hackers from black hat hackers is the authority to access a corporate’s systems, which otherwise amounts to unlawful access under the Computer Misuse and Cybercrimes Act.
8. Duty to Report all Findings
The Agreement should ensure that the ethical hacker has an obligation to report any security breaches and vulnerabilities found in the system or network. Fines for non-disclosure may also be set.
9. Duty to Erase Traces
The ethical hacker should be under a duty to erase all traces of the hack after checking the system for any vulnerability. This prevents malicious hackers from entering the system through the identified loopholes through poorly protected findings held by the ethical hacker. Once the report has been shared with the corporate, traces of it should be erased.
There you have it, ladies and gentlemen!
-
The Fin-Tech Take Over
What exactly is Fin-Tech? Banks have gone head to head, outdoing each other with innovation. It s... -
What In The World Is ChatGPT?
(And why should you care?) Of course you have interacted with bots before. For example, when ... -
Tech Lingo For Lawyers
You know how someone throws in some Tech word in a conversation and in that one short moment you dec... -
The Subtle Balance And Trade-Offs In Cyber Security (Part 2)
Last week we looked at the cyber trade-offs that businesses have to make as they enter online market... -
The Subtle Balance And Trade-Offs In Cyber Security (Part 1)
Tradeoffs. That sounds familiar, but you can’t quite place it. Never mind, I’ll dive right into it. ... -
How To Craft A Winning Innovation Strategy
Where do we start? Yes, of course we have to start somewhere. Lawyers may lead the pack in more a... -
How Far Can Lawyers Go In Adopting Legal Tech?
The legal profession has historically been considered a conservative field and as a result, lawyers ... -
Data Controller Vs. Data Processor
The Data Protection Act requires that all Data Controllers and Processors be registered. The Act ... -
Ethical Hacking (Bug Bounty Hunting): What Does It Mean?
New word alert: Bug Bounty Hunting = Ethical Hacking. Last week, I was invited to a Tech Conferen... -
Internet Privacy: A Lawyer’s Guide To Online Privacy (Part 2)
1. Avoid torrent or piracy web sites He...he…yes. There is something called ET (Entertainment... -
Internet Privacy: A Lawyer’s Guide To Online Privacy (Part 1)
Did you know that most Internet Service Providers (ISPs) are tracking, storing and mining your onlin...