you are viewing a single comment's thread.

view the rest of the comments →

[–]Mnemonic[S] 2 insightful - 2 fun2 insightful - 1 fun3 insightful - 2 fun -  (3 children)

There is pen-testing and there is this though :p

It feels more like those guy worked for a "MiCrOsOfT"-service on the phone and got this job without knowing what the words meant.

[–]pointyball 3 insightful - 1 fun3 insightful - 0 fun4 insightful - 1 fun -  (2 children)

Penetration testing often involves testing physical access to network endpoints.

[–]Mnemonic[S] 3 insightful - 2 fun3 insightful - 1 fun4 insightful - 2 fun -  (1 child)

IF you have that agreed upon in contract, but rereading it, I can see a court-person "forgetting" to read the contract they signed.

[–]pointyball 2 insightful - 1 fun2 insightful - 0 fun3 insightful - 1 fun -  (0 children)

Yes, It must be explicitly agreed to in the contract by a person of sufficient authority over the intended access.