Keepnet Labs Logo
Menu
Keepnet Labs > blog > understanding-the-compliance-requirements-of-vishing-simulations

What is the Legality of Conducting Vishing Simulations?

Understanding the legality of vishing simulations is important for businesses aiming to enhance their security protocols. This guide provides insights into conducting voice phishing simulations within legal and ethical boundaries.

What is the Legality of Conducting Vishing Simulations?

Conducting vishing simulations is considered legal if it's carried out for security awareness training purposes and with the employees' consent. These simulations are proactive approaches to identifying and mitigating potential vulnerabilities against. By obtaining explicit permission from participants, companies can ensure that these exercises are conducted ethically and within legal boundaries. Additionally, organizations need to communicate the objectives and benefits of these simulations to their employees, ensuring transparency and fostering a culture of security awareness.

This article aims to reveal the legal landscape of vishing simulations, exploring the legal structures in place and the potential legal issues tied to running these simulations. Also, the best practice to follow is to stay on the right side of the law.

What is Vishing? Explanation of How Vishing Works?

Vishing typically begins with a caller, the attacker, who disguises their identity and contacts an unsuspecting individual. The caller often manipulates the caller ID system, making the call appear as if it's coming from a trusted source, such as a bank or a government agency. This practice, known as 'spoofing,' is one of the critical elements of a vishing attack.

The attacker then uses various social engineering techniques to convince the individual to divulge sensitive information. This information might include credit card details, social security numbers, or login credentials, which the attacker can use for malicious purposes, such as identity theft or financial fraud.

Keepnet’s 2024 Vishing Research Report revealed that 6.5% of employees give sensitive information about organizations on fake phone calls. 70% of organizations fail the vishing simulation test; however, organizations conducting regular vishing simulations reduce this risk by up to 90%.

Overview of Typical Vishing Scenarios

There are several common vishing scenarios that attackers tend to favor. These include

  • Bank Fraud: The attacker poses as a bank representative, informing the victim of suspicious activities on their account and asking for account details to 'resolve' the issue.
  • Technical Support Scam: The visher claims to be from a reputable technology company, saying there's a problem with the victim's computer or software that requires immediate attention. The victim is then asked to provide their login details or install remote-access software.
  • Government Agency Impersonation: The attacker pretends to be from a government agency, such as the IRS in the US, telling the victim they owe unpaid taxes and must provide payment details immediately to avoid legal consequences.

https://keepnetlabs.com/vishing-as-a-service

example-of-voice-phishing-test-scenario.png
Picture 1: An example of a voice phishing test scenario

Purpose of Vishing Simulations

Vishing simulations are a proactive measure in cybersecurity designed to prepare individuals and organizations for real-life vishing attempts. They simulate vishing scenarios in a controlled and safe environment, where participants can learn to identify and respond to such threats effectively.

The primary objectives of vishing simulations are to:

  • Raise awareness about the tactics used in vishing attacks
  • Teach individuals how to respond appropriately when faced with a potential vishing attempt
  • Test the effectiveness of an organization's existing security awareness training
  • Highlight areas where further training might be needed.

These phone simulations provide invaluable hands-on experience and play a important role in reinforcing cybersecurity education by simulating the pressures and confusion that often accompany actual vishing attempts.

Vishing Simulation in Security Awareness Training

Vishing simulations have become integral to cybersecurity training because they enhance awareness and hone the skills necessary to fend off real-life vishing attacks. They offer hands-on experience in recognizing and responding to such threats, enabling individuals to understand the nature of these attacks beyond theoretical learning.

Importance of Vishing Simulations in Training and Human Risk Management

Voice phishing simulations allow organizations to identify vulnerabilities within their workforce and systems. By monitoring how participants respond to vishing attempts during a simulation, organizations can gain insights into their staff's preparedness, helping them refine their security training programs accordingly.

Typical Processes and Tools Used in Vishing Simulations

Vishing simulations typically follow a structured process, which includes planning, execution, and debriefing.

  • Planning: The simulation's scope and objectives are determined during this stage. This might involve defining the type of attack to be simulated, the number of participants, and the desired learning outcomes.
  • Execution: The simulation uses software tools and human interaction. The tools can replicate the call-spoofing techniques used in actual vishing attacks and provide a platform for interaction between the 'attacker' and the participant.
  • Debriefing: Participants are given feedback on their performance after the simulation. This might involve discussing what happened during the simulation, pointing out areas where the participant responded well, and identifying areas for improvement.

Various tools are available for vishing simulations, including call-spoofing software and interactive voice response systems. Some comprehensive cybersecurity training platforms also offer built-in vishing simulation capabilities.

Ethical Considerations in Vishing Simulations

While vishing simulations can provide valuable learning experiences, they must be carried out ethically to respect participants' rights and maintain trust.

  • Informed Consent: Participants should know they may be part of a vishing simulation. While they do not need to know when it will occur (to preserve the element of surprise), they should understand the possibility of being involved in such a scenario.
  • Respect Boundaries: The simulation should not push participants to the point of distress or discomfort. It's important to balance creating a realistic scenario and maintaining a safe and respectful environment.
  • Data Handling: Any personal data obtained during the simulation must be handled carefully. Data should only be used for the simulation's intended purpose and appropriately discarded afterward to maintain privacy and confidentiality.
  • Debriefing and Support: Participants should receive feedback after the voice phishing simulation. This is to provide feedback and support them emotionally, as some might find the experience stressful.

By following these ethical considerations, organizations can ensure that vishing simulations are a positive and beneficial component of their cybersecurity training programs.

Legal Status of Vishing Simulations

Why does Keepnet prioritize full compliance with the law?

Keepnet strongly emphasizes adhering to legal requirements to ensure all its operations are conducted lawfully and responsibly. There are several key reasons behind Keepnet Labs's commitment to legal compliance.

  • Keepnet follows each country's calling and texting guidelines to ensure compliance. By doing so, Keepnet ensures that all calls and SMS messages using its phone numbers comply with each jurisdiction's requirements.
  • Privacy and confidentiality are paramount to Keepnet. Keepnet does not record voice conversations through its platform to protect user privacy. All calls are strictly one-way, with only the user's voice transmitted and the recipient's voice remaining confidential. Enforcing this policy, Keepnet ensures that sensitive conversations are secure and follow legal regulations.
  • Besides voice recordings, Keepnet takes extra precautions concerning the storage of personal information. Specifically, keypresses made on the phone are never stored or recorded within Keepnet's systems. Even if sensitive data, such as a social security ID, were to be entered during a call, Keepnet Labs's systems do not retain any trace of such information. This meticulous approach to data security and privacy safeguards against potential legal concerns and protects users' sensitive information.

It is important to note that alternative methods, such as relying solely on penetration testing experts or individual capabilities rather than utilizing a tool like Keepnet, can introduce various legal risks.

These risks may include violations of privacy laws, breaches of data protection regulations, and other legal obligations associated with handling sensitive information. Therefore, when choosing security testing methods, it is significant to consider the legal implications and potential consequences to mitigate any risks effectively.

General Legal Standing of Vishing Simulations

Vishing simulations are generally perceived as a critical and beneficial element of cybersecurity training programs, providing individuals with the necessary awareness and competencies to combat vishing attacks. These simulations mimic real-life scenarios where cybercriminals exploit human vulnerabilities to obtain sensitive information. The ultimate goal is not to deceive but to educate and prepare individuals for the real threats they might encounter today.

But, despite their inherently educational intent, vishing simulations often fall within a legal grey area. This is primarily due to their style, which closely mirrors activities typically regarded as fraudulent or deceptive. For example, in a vishing simulation, the 'attacker' might adopt a false identity or use spoofing techniques to make their call appear as if it's originating from a trusted source - activities that, outside of a controlled simulation, could be considered unlawful.

This legal ambiguity mainly stems from the delicate balance that needs to be struck between the interests of various stakeholders. On the one hand, the organization needs to ensure the security of its data and systems. On the other hand, there's the individual's right to privacy, protection from deception, and, sometimes, their very job.

One possible solution to this legal dilemma is obtaining written consent from employees. But, the timing and nature of this consent require careful consideration. While it is significant for organizations to secure acceptance from employees to conduct vishing simulations, providing detailed information about when and how these simulations will take place can significantly diminish their effectiveness. Therefore, a more general consent form stating that employees agree to participate in cybersecurity simulations without specifying the exact timing and nature of these exercises might be the most practical approach.

This form could stipulate that employees understand the need for these simulations, recognizing that they protect the company and employees from potential cybersecurity threats. This agreement can also acknowledge the likely deceptive tactics used during these simulations and the company's commitment to using any information obtained to improve cybersecurity awareness and preparedness.

Jurisdiction-Specific Laws Impacting Vishing Simulations

Jurisdiction-specific laws can significantly impact how vishing simulations are conducted. These laws vary considerably from region to region, presenting unique legal considerations for organizations based on geographical location.

For instance, in the United States, the Federal Communications Commission (FCC) governs the rules around "caller ID spoofing," a common tactic used in vishing attacks and, consequently, in their simulations. Under the Truth in Caller ID Act, transmitting misleading or inaccurate caller ID information is illegal to defraud, cause harm, or wrongfully obtain anything of value. But exceptions to these regulations exist, especially when the spoofing is done with no harmful intent, as in the case of simulated vishing tests for educational purposes.

On the other hand, in Europe, the General Data Protection Regulation (GDPR) plays a significant role. GDPR, designed to protect individuals' data, imposes strict guidelines for data handling and processing. Consequently, it could affect how vishing simulations are run, particularly concerning any data collected during the simulation and obtaining participant consent.

Employees represent one of an organization's most significant security vulnerabilities, and simulations like vishing can significantly enhance their awareness and defensive capabilities against such threats.

Still, a careful balance must be struck. The organization's right to protect its assets must be weighed against employees' privacy rights. This is where obtaining written consent can be significant. Consent forms can include clauses stating that the employee understands and accepts the potential for such simulations, acknowledging that the primary aim is securing the company and its employees. This consent can ensure that employees understand the purpose of the simulations, alleviating potential legal and ethical concerns.

Legal Limitations and Boundaries for Conducting Vishing Simulations

When conducting vishing simulations, organizations must take into account a few key legal boundaries.

  • Informed Consent: In many jurisdictions, laws require that individuals give informed consent before their data can be processed. This would likely apply to vishing simulations, where participants might be asked to provide sensitive information.
  • Privacy: Privacy laws may limit the type of information that can be gathered during a vishing simulation. Participants' private data should be handled carefully and in compliance with local and international privacy laws.
  • Non-Deceptive Practices: Though vishing simulations involve a degree of deception, they mustn't cross into fraudulent territory. For example, impersonating a real person or organization could be considered identity theft or fraud.

Organizations must ensure they operate within these legal boundaries to maintain the integrity of their cybersecurity training programs and to avoid potential legal complications.

Case Studies

Instances Where Voice Phishing Simulations Were Legally Challenged

Vishing simulations involve tactics that mimic fraudulent activities, potentially leading to legal challenges. While there have not been many publicized legal disputes specifically concerning vishing simulations, there have been legal confrontations around other forms of cybersecurity simulations that share similar characteristics.

One notable instance is the case of the Coalfire penetration testers in Iowa, USA. In this incident, two cybersecurity professionals were arrested during a physical penetration testing exercise. Despite being contracted by the state court administration to perform this security audit, the testers found themselves in legal hot water when accused of breaking a courthouse.

Even though this case didn't involve a vishing simulation, it underscores the complex legal situations that can arise during cybersecurity simulations. It's a poignant reminder of the potential for misunderstanding and legal complications, even when the intention is to improve an organization's security.

As vishing simulations are intended to be part of training and awareness programs, they should not incite legal issues if all involved parties understand the process. An important part of this understanding is the acceptance by employees that their actions can inadvertently jeopardize the company. Companies must ensure they obtain written consent from employees acknowledging that they are aware of and agree to the possibility of participating in such simulations.

This agreement can serve as a preventive measure against potential legal disputes, and it also helps reassure employees that these simulations are beneficial for their benefit. This agreement must respect the employees' rights and comply with jurisdiction-specific laws, and consulting with legal professionals is highly advised.

Impact and Outcomes of These Legal Cases

The legal case involving the Coalfire penetration testers in Iowa significantly impacted the cybersecurity industry. It raised profound questions about cybersecurity simulations' legality and ethical parameters and triggered widespread discussions within the industry and legal circles.

The charges against the penetration testers were eventually dropped, demonstrating that their actions, although resulting in an unexpected legal skirmish, were ultimately recognized as part of a legitimate security exercise. Nevertheless, the incident served as a stark reminder of the potential legal consequences that can arise even when the intent is to improve cybersecurity.

This case has served as a cautionary tale, reinforcing the importance of clear communication, comprehensive contracts, and a deep understanding of the legal and ethical boundaries when conducting cybersecurity simulations. The need for a clear and mutually agreed upon scope of work, especially in activities involving potential legal grey areas such as penetration testing or vishing simulations, was underscored.

Notably, the incident also brought attention to the value of employee awareness and training in cybersecurity. Companies, recognizing that their employees could inadvertently expose them to risks, were motivated to proactively seek methods to improve their staff's understanding of cybersecurity threats, including vishing.

In light of these legal cases, many companies have sought to strengthen their approach to such simulations, not just from a cybersecurity standpoint but also from a legal perspective. Companies increasingly ensure they obtain clear, written acceptance from employees about the potential for simulations and their purpose - to safeguard the company and its employees from potential cyber threats.

While these legal cases initially introduced elements of uncertainty and risk into cybersecurity simulations, their ultimate impact has been to refine and enhance the process and legal safeguards around such simulations.

Lessons Learned and Potential Implications for Future Vishing Simulations

The legal cases involving cybersecurity simulations have provided invaluable lessons for the future, particularly for organizations that engage in vishing simulations as part of their cybersecurity training programs.

  • Adherence to Legal and Ethical Boundaries: The cases have underscored the important need to operate within the confines of the law and adhere to ethical standards during such simulations. This applies to the organizations running the simulations and the individuals who act as the 'attackers'. Every step of a vishing simulation, from planning to execution, must be conducted with a clear understanding of these boundaries.
  • Clear Contracts and Agreements: The importance of comprehensive contracts has been highlighted. Organizations should ensure a legally sound agreement with employees participating in these simulations. These contracts should clearly state the purpose of the simulations, the methods used, and the extent of personal information that may be involved. It's also important to state that these simulations are intended for training purposes and not for any malicious intent.
  • Open Communication: A critical takeaway from these cases is the importance of open, ongoing communication. All parties involved must understand what the simulation entails, and there should be a clear line of communication for any questions, concerns, or clarifications. This could apply regular updates, briefings, and debriefings, allowing participants to understand their role and the simulations' purpose fully.
  • Employee Consent: One significant lesson learned is the importance of obtaining employee consent. To alleviate potential legal issues, companies must secure a written acceptance from employees, agreeing to participate in such cybersecurity simulations. The consent form should communicate that the potential for simulations results from the need to protect the company and its employees from potential threats.

Taken together, these lessons learned have significant implications for future vishing simulations. They emphasize the need for careful planning, open communication, adherence to legal and ethical guidelines, and respectful handling of employee rights. By taking these lessons on board, organizations can ensure their vishing simulations are practical training tools and legally sound operations.

The Role of Legislation in Shaping Vishing Simulation Practices

Current Legal Trends and Their Impact on Vishing Simulations

Today, legal systems worldwide are progressively accepting the unique challenges posed by cyber threats and the measures needed to counteract them. This shifting legal landscape directly affects cybersecurity practices, including vishing simulations.

A notable trend is the growing legal recognition of the importance and necessity of effective cybersecurity measures, including simulations like vishing. Several jurisdictions have begun acknowledging the grey area these simulations inhabit, given their nature of mimicking fraudulent activities for educational purposes. Accordingly, specific laws and regulations have been adapted or clarified to accommodate such cybersecurity practices, provided they are carried out with the intent of education and security enhancement and not for any malicious purpose.

The US, for instance, allows for certain exceptions in rules around caller ID spoofing, which is commonly employed in vishing attacks and simulations. As long as there is no intent to defraud, cause harm, or wrongfully obtain anything of value, these activities can be legally carried out, offering protection for organizations conducting vishing simulations as part of their cybersecurity training programs.

Simultaneously, there is a rising global awareness and concern about data privacy, leading to strict laws and regulations in this area. The European Union's General Data Protection Regulation (GDPR) is a prime example. These privacy-centric laws have profound implications for how vishing simulations are conducted, particularly concerning handling personal data and acquiring participant consent.

Under GDPR, for example, organizations must maintain transparency about collecting, processing, and storing personal data. This could impact the realism and effectiveness of vishing simulations, as they often involve elements of surprise and deception. Organizations must comply with these regulations to avoid hefty fines and potential reputational damage.

The current legal trends underscore the critical need for organizations to stay abreast of evolving cybersecurity laws and regulations. They must understand the potential legal implications and adapt their vishing simulation practices accordingly to maintain legality and ethicality while ensuring practical cybersecurity training.

Potential Future Legal Developments

Looking ahead, it is likely that the legal landscape governing vishing simulations will become more defined. As these simulations become more prevalent and cyber threats evolve, legislation must catch up, providing more explicit guidelines and regulations.

We might see more explicit laws around the conduct of vishing simulations, potentially covering aspects like participant consent, data handling, and permissible deception boundaries.

Role of Legislators, Regulators, and Industry Leaders in This Area

Legislators, regulators, and industry leaders significantly shape the future of vishing simulation practices.

Legislators will need to define the legal parameters of these simulations, balancing the need for practical cybersecurity training with the protection of individual rights and privacy. Regulators will then be tasked with enforcing these laws and providing organizational guidelines.

Industry leaders also have a critical role, as they can drive the adoption of best practices and ethical guidelines in vishing simulations. They can help ensure that vishing simulations are carried out responsibly and effectively through industry standards and self-regulation, providing valuable cybersecurity training while respecting legal and ethical boundaries.

Key Takeaways from the FCC's Latest Actions: Strengthening Security Awareness

The Federal Communications Commission (FCC) has recently made a big move to stop fake voices in unwanted calls, showing how important it is to learn about and stay safe from these scams.

Keepnet’s AI-powered vishing simulator could be considered legal under the FCC's TCPA regulations if it operates within a controlled environment, targeting only employees who have consented to such testing as part of their organization's security awareness training. The simulator's use for educational purposes, rather than unsolicited or fraudulent communication, aligns with lawful activities.

Compliance with consent requirements and transparency about the nature of the calls are key factors distinguishing it from illegal robocalls as defined by the FCC.

Here’s what they’ve done and why it matters for all of us:

AI Voices in Calls

  • The FCC says that using artificial intelligence to make fake voices in calls is now illegal. This is big news because it means there's serious action being taken against the kind of scams that trick people by sounding like someone they trust.

Fighting Back Against Scams

Here are some highlights from what the FCC is doing:

  • Calls with AI-generated voices are considered "artificial" and are not allowed.
  • This new rule helps state lawyers (Attorneys General) nationwide to go after the bad guys making these scam calls.
  • The FCC is using the Telephone Consumer Protection Act, a major law, to fight against junk calls and now includes AI voice calls in their scope.

Why This Matters for Security Awareness Training

  • Awareness Training for Voice Phishing: As scams get more sophisticated, it’s more important than ever to know what to watch out for. This FCC action shows just how advanced scams are getting.
  • Voice Phishing Practice: Simulated voice phishing tests that practice spotting and dealing with vishing (voice phishing) are important. They prepare us for the kinds of tricky calls the FCC targets.
  • Legal Support: Knowing that big organizations like the FCC are fighting these scams gives legal backing to the importance of security training.

Conclusion

Recap of the Legal Status of Vishing Simulations

Despite their rising prevalence in cybersecurity training, Vishing simulations exist in a legal grey area. But, most jurisdictions allow such simulations if conducted ethically, with clear educational intent, and without crossing into fraudulent territory.

The Balance Between Cybersecurity Training and Legal Compliance

The delicate equilibrium between efficient cybersecurity training and strict legal compliance represents a critical challenge for modern organizations. This balance is particularly pertinent in vishing simulations, which necessitate mimicking potentially deceptive activities for educational purposes.

Vishing simulations serve as a potent tool for cybersecurity training, providing individuals and organizations with a hands-on approach to understanding and thwarting real-world vishing attacks. They expose participants to cybercriminals' tactics, techniques, and procedures, enhancing their skills and vigilance. This experiential learning can significantly improve an organization's resilience to actual vishing attacks.

But, the nature of these simulations - replicating fraudulent activities - brings a host of legal considerations that must be meticulously observed. These encompass informed consent, privacy rights, telecommunications laws, and ethical concerns surrounding deceptive practices.

An integral part of addressing these considerations is acquiring written consent from employees participating in the vishing simulations. Permission should be informed and explicit, communicating the simulations' purpose and potential recovery implications. The consent should establish that the simulations are a necessary measure the organization takes to minimize security risks and serve the company's and its employees' collective interests.

To preserve the effectiveness of the simulation, this written consent should ideally not specify the exact timing of the simulation. Providing prior knowledge of a simulation could diminish its impact and reduce the educational value derived from the element of surprise typically associated with real-world vishing attacks.

Striking the right balance between practical cybersecurity training through vishing simulations and strict legal compliance can be complex. Nonetheless, it is significant to ensure these simulations strengthen cybersecurity defenses without infringing upon legal and ethical standards. By considering the rights of the participants, obtaining appropriate consent, and adhering to the legal obligations of their respective jurisdictions, organizations can build vishing simulation programs that are both effective and compliant.

Why Keepnet's Vishing Simulations Don't Raise Legal Red Flags

Keepnet's approach to vishing simulations is designed carefully to minimize potential legal issues. Here's why:

  • Caller ID: Keepnet does not engage in caller ID spoofing. Spoofing, or pretending to call from a different number or imitating a known brand, is a common tactic in actual vishing attacks. But, this practice can potentially breach telecommunications regulations in many jurisdictions. To avoid this, Keepnet uses legally registered numbers that belong to them, thereby ensuring transparency and legal compliance in all their vishing simulations.
  • Call Recording: Another element that sets Keepnet's vishing simulations apart is their strict policy regarding call recording. The practice of recording voice calls, particularly without the consent of the parties involved, can be a contentious legal issue. Depending on the jurisdiction, it may infringe on privacy rights and breach various data protection regulations. However, Keepnet ensures that it does not record any voices during the phone conversation throughout the simulation, preserving the participants' privacy and aligning with legal requirements.
  • Keypad Entries: Keepnet's vishing simulations also respect participants' privacy and data security by not recording any numbers input during the phone call. This policy not only safeguards sensitive information that might be entered but also aids in maintaining compliance with data protection laws.

As for whether companies can initiate calls to their employees' numbers, the answer largely depends on the consent obtained from the employees. If, upon employment, the employees have signed a consent form that includes a clause allowing such calls, then yes, companies are within their rights to initiate these calls.

However, if such consent has yet to be obtained, companies should get explicit written permission before initiating calls to personal numbers as part of the vishing simulation program. This consent should be informed, meaning employees should understand the purpose and potential implications of these simulations.

Keepnet's approach to vishing simulations adheres to legal standards, respecting privacy and telecommunications regulations. Companies looking to adopt such simulations should consider these elements and pay due diligence to obtain the necessary consent from employees, thus ensuring a legal and practical cybersecurity training process.

SHARE ON

twitter
twitter
twitter

Schedule your 30-minute demo now

You'll learn how to:
tickAutomate behaviour-based security awareness training for employees to identify and report threats: phishing, vishing, smishing, quishing, MFA phishing, callback phishing!
tickAutomate phishing analysis by 187x and remove threats from inboxes 48x faster.
tickUse our AI-driven human-centric platform with Autopilot and Self-driving features to efficiently manage human cyber risks.

Frequently Asked Questions

What's the legal status of running vishing simulations?

arrow down

Conducting vishing simulations is legal under specific conditions. It's all about intent and consent. If the simulation aims to enhance security awareness and employees consent, then yes, it's on the right side of the law. Organizations must also be transparent about the purpose and nature of these simulations.

Can you explain how vishing scams trick people?

arrow down

Vishing works by tricksters pretending to be trustworthy entities, like your bank or a government agency, to get your info over the phone. They often "spoof" caller IDs to appear legit, leading to theft or fraud. Understanding vishing is key to protecting yourself from becoming a victim.

What types of vishing attacks should I watch out for?

arrow down

There are a few scenarios to be cautious of:

Knowing these can help you spot and avoid vishing attempts.

  • Bank fraud calls: Where someone claims there's an issue with your account.
  • Fake tech support: Tricksters pretend there's something wrong with your computer.
  • Government impersonation: Scammers demand payments for supposed debts or taxes.

How do vishing simulations benefit organizational security training?

arrow down

Vishing simulations are significant because they provide hands-on experience in recognizing and responding to voice phishing attempts. They're designed to test and improve the effectiveness of current security awareness among employees, highlighting the need for further education in certain areas.

What ethical guidelines should companies follow for vishing simulations?

arrow down

When running vishing simulations, respect and consent are significant. Participants should know they might be part of a simulation, though not necessarily when it will happen, to maintain the element of surprise. Additionally, any personal information gathered during the exercise must be handled with care, ensuring privacy and confidentiality are maintained.

iso 27017 certificate
iso 27018 certificate
iso 27001 certificate
ukas 20382 certificate
Cylon certificate
Crown certificate
Gartner certificate
Tech Nation certificate