• United States



UK Editor

DOJ: Good faith security research won’t be charged under Computer Fraud and Abuse Act

May 23, 20223 mins
HackingPenetration Testing

The U.S. Department of Justice revises its policy regarding charging violations of the CFAA. Good faith security research will no longer be charged.

The U.S. Department of Justice (DOJ) has revised its policy regarding charging violations of the Computer Fraud and Abuse Act (CFAA), stating that good faith security research does not warrant federal criminal action. Effective immediately, all federal prosecutors who wish to charge cases under CFAA are required to follow the new policy and consult with Criminal Division’s Computer Crime and Intellectual Property Section (CCIPS) before bringing any charges, the DOJ said. However, the DOJ also acknowledged that claiming to be conducting security research is not a free pass for those acting in bad faith.

Good faith research key to cybersecurity advancement

In a press release on its website, Deputy Attorney General Lisa O. Monaco said that computer security research is a key driver of improved cybersecurity. “The department has never been interested in prosecuting good faith computer security research as a crime, and today’s announcement promotes cybersecurity by providing clarity for good faith security researchers who root out vulnerabilities for the common good.”

The DOJ defined good faith security research as, “Accessing a computer solely for purposes of good faith testing, investigation, and/or correction of a security flaw or vulnerability, where such activity is carried out in a manner designed to avoid any harm to individuals or the public, and where the information derived from the activity is used primarily to promote the security or safety of the class of devices, machines, or online services to which the accessed computer belongs, or those who use such devices, machines, or online services.”

The updated policy reflects the department’s goals to promote privacy and cybersecurity by upholding the legal right of individuals, network owners, operators, and other persons to ensure the confidentiality, integrity, and availability of information stored in their information systems.

New CCFA charge limitations come into play

Along with establishing that good faith security research will not be charged under the CFAA, the DOJ outlined several other scenarios that are not themselves sufficient to warrant federal criminal charges and should also not result in punishment. These include:

  • Embellishing an online dating profile contrary to the terms of service of the dating website.
  • Creating fictional accounts on hiring, housing or rental websites.
  • Checking sports scores at work, paying bills at work, or violating an access restriction contained in a term of service.

“The policy focuses the department’s resources on cases where a defendant is either not authorized at all to access a computer or was authorized to access one part of a computer – such as one email account – and, despite knowing about that restriction, accessed a part of the computer to which his authorized access did not extend, such as other users’ emails.” However, the DOJ acknowledged the potential for abuse surrounding the new policy, adding that it is not a “free pass” for those acting in bad faith. “For example, discovering vulnerabilities in devices to extort their owners, even if claimed as “research,” is not in good faith,” it said.

UK Editor

Michael Hill is the UK editor of CSO Online. He has spent the past five-plus years covering various aspects of the cybersecurity industry, with particular interest in the ever-evolving role of the human-related elements of information security. A keen storyteller with a passion for the publishing process, he enjoys working creatively to produce media that has the biggest possible impact on the audience.

More from this author