A female ship captain confidently steers the wheel of a large ship in the middle of the ocean, holding a telescope and gazing into the horizon with determination and focus. Ominous shadows of sharks can be seen swimming beneath the calm sea.

Are Phishing Emails Illegal? The Shocking Truth Revealed

June 25, 2024

Is this practice legal?

Yes - it can be when done within the boundaries of your local laws or international laws. This fundamental question often arises when discussing simulated phishing. It’s not just about the act itself but also about how it’s perceived by the law.

Imagine this: You're at the helm of a large ship—a corporate enterprise. The sea is choppy, and lurking beneath the surface are phishing attacks, poised like sharks ready to strike. As the captain, you've judiciously delivered simulated phishing to safeguard your crew, ensuring they know how to identify and respond to these lurking dangers. But here’s a pressing question—have you crossed legal lines by deploying these 'sharks'?

As businesses increasingly turn to simulated phishing exercises to fortify their cybersecurity defenses, the legal landscape surrounding this practice becomes murkier. While the intention is noble—equipping employees to recognize and report phishing attempts—the question remains: Are these simulated phishing emails even legal? And if so, under what conditions?

Whether you’re an IT leader, a CISO, or a seasoned cybersecurity professional, you must understand the nuanced legalities of deploying phishing simulations within your organization.

In essence, by understanding the concept behind simulated phishing, businesses can make informed decisions about implementing these exercises. Let's grasp the full picture by delving into the legal considerations and compliance requirements across the world.

The Legal Landscape of Phishing

US Legal Regulations

As cybersecurity professionals, we are no strangers to the labyrinth of laws and regulations. Understanding how these laws apply specifically to simulated phishing can be crucial in avoiding unintended legal repercussions.

Computer Fraud and Abuse Act (CFAA):

The CFAA is often the first line of defense against cybercrime in the United States. However, it also sets some stringent rules that can leave professionals treading carefully. When deploying simulated phishing emails, intent matters. These exercises are designed to educate, not to deceive, making them generally CFAA compliant. Additionally, transparency with your employees can further shield you from potential legal pitfalls.

CAN-SPAM:

The CAN-SPAM Act, designed to protect individuals from unwanted emails, also comes into play. Simple measures like ensuring corporate branding and pre-notifying employees of potential training exercises can help mitigate issues.

UK Legal Regulations

Across the pond, the legal landscape changes but the risks remain similar. The Computer Misuse Act 1990 governs cyber activities ranging from hacking to the unauthorized access of systems.

Computer Misuse Act 1990:

This act is the UK's main legislation against cybercrime. Here again, the intent is a crucial determinant. As long as simulated phishing exercises are part of an authorized training protocol and employees are made aware of ongoing training, businesses generally navigate within the bounds of this act.

Canadian Legal Regulations

In Canada, the legal framework surrounding cybercrime and phishing includes several key legislations that businesses must adhere to.

Personal Information Protection and Electronic Documents Act (PIPEDA):

PIPEDA regulates how businesses handle personal information. While it primarily focuses on data protection, it also has implications for phishing simulations. Organizations must ensure that these simulations do not violate employees' privacy rights and that any personal data collected during these exercises is handled in compliance with PIPEDA.

Canada's Anti-Spam Legislation (CASL):

CASL is one of the strictest anti-spam laws globally. It requires businesses to obtain consent before sending commercial electronic messages. For simulated phishing emails, obtaining explicit consent from employees as part of their training agreement can help ensure compliance with CASL.

New Zealand Legal Regulations

New Zealand has its own set of laws designed to protect against cybercrime and ensure data privacy.

Privacy Act 2020:

The Privacy Act 2020 governs how organizations collect, use, and disclose personal information. When conducting phishing simulations, organizations must ensure that they do not infringe on employees' privacy and that any data collected is managed according to the Act’s requirements.

Crimes Act 1961:

This Act includes provisions against unauthorized access to computer systems and data. Again, being open and transparent with your employees can also help protect you from any legal issues down the line. 

Australian Legal Regulations

Australia's approach to cybersecurity and privacy is governed by several key pieces of legislation.

Privacy Act 1988:

The Privacy Act 1988 outlines how personal information should be handled by organizations. Phishing simulations must comply with the Act’s privacy principles, ensuring that employee data is protected and used appropriately.

Criminal Code Act 1995:

The Criminal Code Act includes specific provisions against cybercrime, such as unauthorized access to computer systems. Simulated phishing should not violate these provisions provided the intent is to educate.

EU Legal Regulations

The European Union has a comprehensive legal framework to address cybersecurity and data protection, primarily through the General Data Protection Regulation (GDPR).

General Data Protection Regulation (GDPR):

The GDPR is one of the most stringent data protection regulations worldwide. It imposes strict requirements on how personal data is collected, processed, and stored. For phishing simulations, organizations must ensure they have a lawful basis for processing personal data, such as consent or legitimate interest. Transparency and clear communication with employees are crucial to ensure compliance with GDPR.

By understanding and adhering to these various legal frameworks, organizations can conduct effective phishing simulations while ensuring compliance with relevant laws and protecting employees' rights.

The Case for Positive Cybersecurity Legislation

Positive cybersecurity legislation, like the EU's NIS Directive and the US' HIPAA enhances organizational resilience against cyber threats by mandating robust security practices, including cybersecurity awareness training. This proactive approach ensures a consistent high standard of cybersecurity across industries, protecting businesses and consumers from escalating threats.

Directive on Security of Network and Information Systems (NIS Directive)

The NIS Directive aims to improve cybersecurity across the EU. While it focuses on critical infrastructure, its principles can be applied to cybersecurity training, emphasizing the importance of robust security practices and employee awareness.

Health Insurance Portability and Accountability Act (HIPAA) 

HIPPA mandates safeguards for protecting sensitive patient data, requiring healthcare organizations to implement physical, network, and process security measures, including employee training.

 

Simulated phishing, when done right, offers valuable lessons in cybersecurity, turning seemingly simple bait into powerful teaching moments. Legal waters can be navigated with care, transparency, and ethical considerations. So as you chart your course, keep your crew informed and your nets clearly marked, ensuring everyone understands the role of these exercises in fortifying the ship against cyber threats. As the adage goes, smooth seas do not make skillful sailors—neither do untested employees make a cyber-secure organization.

 

Do you feel prepared to face the phishing nets that lurk in the depths of your organizational waters? Navigate wisely with LinkSec's expert tools and services to guide you safely through.

 

Ready to empower your people today?

Don't sleep on your strongest security asset.

What are you reading this for? Empower your organisation today!