"if their penetration testing is successful, they may get access to our data "
That is probably the key question. It is important that boundaries are set. They may get access to data (that is what they are trying to do) but that does not mean they need to access it. Typically pen testing should stop at that stage and they should never need to do anything which actually amounts to processing as defined in s1.
It is enough for them to tell you "We tested vulnerability xyz and found that we were able to exploit it to obtain access to ...". If the boundary is set their no need for a DP clause as such.
On the other hand, as to security I doubt whether you would want to commission anyone who was not fully ISO certified for this task, and that certification would likely be enough to satisfy any P7 issues anyway.
Liability clause is a risk issue for you to determine. I doubt whether you would find anyone offering better. After all if your systems are so bad that simply trying to access them triggers auto-destruct that is hardly their fault is it? Make sure your backups are all fully implemeted up to date and working before you let them loose ...
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving messages please send to the list owner
[log in to unmask]
Full help Desk - please email [log in to unmask] describing your needs
To receive these emails in HTML format send the command:
SET data-protection HTML to [log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|