Security Research Procedure

Georgia Tech Cyber Security realizes that sometimes researchers need to do some things that fall outside of the technical rules in our policies – especially when researching hacking and hackers, etc.

Because of this, we have created a Security Research Procedure that allows Cyber Security researchers to conduct their research without violating the law, violating Institute policy, or introducing reputational risk.

It’s published here:¬† – so please read the procedure and familiarize yourself with it.