• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Compliance, Network Security, News

DOJ Officially Revises Policy, Will Not Charge Ethical Hackers

The Department of Justice will charge “good faith” security researchers that come forward with their research and don't extort organizations.

May 20, 2022 Zachary Comeau Leave a Comment

Department of Justice Ethical Hackers
stock.adobe.com/Pamela Au

The U.S. Department of Justice has officially revised its policy regarding ethical hackers, directing U.S. attorneys to not charge “good faith” security researchers who are accessing systems for testing and investigation purposes that ultimately result in a notice to the network owner of the vulnerability.

The Department of Justice’s (DOJ) new policy immediately replaces a policy issued in 2014, and directs the department’s attorneys to not charge ethical hackers, legitimate cybersecurity researchers and penetration testers—which the DOJ calls “good faith” security researchers—who come forward with the results of their work.

Per the DOJ’s announcement of the policy change, the government should decline to prosecute if there is evidence that the defendant intended good-faith security research, which is defined as “accessing a computer solely for purposes of good-faith testing, investigation, and/or correction of a security flaw or vulnerability, where such activity is carried out in a manner designed to avoid any harm to individuals or the public, and where the information derived from the activity is used primarily to promote the security or safety of the class of devices, machines, or online services to which the accessed computer belongs, or those who use such devices, machines, or online services.”

However, the DOJ’s new policy also defines what is not considered ethical hacking or good-faith security research, such as discovering vulnerabilities to extort the owners of the devices, machines or services. Some ransomware groups hide behind that self-imposed label, but are ultimately still extorting organizations for a ransom payment.

“For example, discovering vulnerabilities in devices in order to extort their owners, even if claimed as “research,” is not in good faith,” the DOJ says.

In addition, the DOJ will also consider the sensitivity of the systems and information accessed and the national security concerns associated with the activity, among other factors, when considering whether to bring charges against an ethical hacker.

In a statement, Deputy Attorney General Lisa Monaco calls computer security research a “key driver” of an improved cybersecurity landscape.

“The department has never been interested in prosecuting good-faith computer security research as a crime, and today’s announcement promotes cybersecurity by providing clarity for good-faith security researchers who root out vulnerabilities for the common good,” Monaco says.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Cybersecurity, Department of Justice, Ethical Hacking

Related Content:

  • Cloud, SASE, Aryaka How the Cloud is Redefining Media Production and…
  • Singlewire Software mass notification interview Singlewire Software on Mass Notification Solutions
  • URI catchbox 1 Catchbox Plus: The Mic Solution That Finally Gave…
  • Engaging virtual meeting with diverse participants discussing creative ideas in a bright office space during daylight hours Diversified Survey: Workplace AV Tech is Falling Short,…

Free downloadable guide you may like:

  • Download TechDecisions' Blueprint Series report on Security Awareness now!Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

    Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared to defend against them in this report from TechDecisions' Blueprint Series.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.