RULES OF ENGAGEMENT

Rules of Engagement

How we work, what we commit to, and where we walk away. This document is referenced in every Statement of Work — read it before we sign anything together.

Version 2.1 · Last revised: May 2026
// IN PLAIN ENGLISH

NDA before scope. Written authorization before testing. Daily updates during engagements. Findings communicated as discovered, not held for the final report. Materials deleted 30 days after close. Critical issues outside agreed scope get coordinated disclosure to the affected vendor, never sold or leveraged. If any of this is incompatible with how you need to work, tell us before we sign.

// AUTHORIZATION
What we will not do without paperwork
01

NDA before any technical discussion.

No scoping call, system prompt review, architecture conversation, or sample data exchange takes place before a mutual NDA is signed. This applies to all engagement types including evaluations and pre-sales conversations.

02

Written authorization before any test.

Every system, endpoint, and asset to be tested is listed in writing in the Statement of Work. We do not test based on verbal scope. We do not extend scope mid-engagement without a written amendment.

03

Third-party authorization where required.

If your engagement involves testing systems owned by a third party (vendor APIs, hosted services, customer data), we require evidence of authorization from that party before testing begins. We will pause an engagement to obtain this if it surfaces mid-work.

04

Named test windows.

Production testing occurs only during pre-agreed windows documented in the SOW. We do not test outside these windows even if convenient or if we discover a finding that ‘just needs one more check.’

// SCOPE
What's in, what's out, and what triggers re-scoping
01

Scope is defined by inclusion, not exclusion.

The Statement of Work names every asset, endpoint, and system class included in testing. Anything not named is out of scope by default — there is no ‘we’ll assume it’s fine to test.’ Out-of-scope discoveries are reported, not exploited.

02

Engagement type determines depth.

Pre-launch audits, continuous red-team retainers, and incident response engagements have different depths of testing. Each is documented separately in the SOW with explicit techniques and intensity allowed.

03

Scope changes require written amendment.

If something we discover suggests broader testing is warranted, we stop, document the finding, and request a scope amendment. We do not act on ‘we should probably also check…’ impulses without paperwork.

04

Time-box, not scope-box.

Engagements have fixed time windows. If scope expands inside the time-box, we negotiate either an extension or a deferral — never silent overrun.

// DATA HANDLING
How client data lives, moves, and dies
01

Encryption in transit and at rest.

All engagement materials (sample data, system prompts, configurations, findings) are transmitted via encrypted channels and stored encrypted at rest on infrastructure under our direct control. No client data crosses our systems unencrypted.

02

Access on a need-to-have basis.

Engagement materials are accessible only to the named practitioners assigned to your engagement. We do not pool data across engagements. We do not use client data to improve internal tooling without explicit written consent.

03

30-day retention default.

All engagement materials are deleted 30 days after engagement close, by default. Extended retention is available on written request and documented in the SOW. Retention applies to source materials, findings drafts, and working data — final reports may be retained at the client’s direction.

04

No client data in our AI tooling.

Client data, system prompts, and engagement materials are never submitted to third-party LLM providers. Where AI tooling is used during engagements, it runs on infrastructure under our control with explicit client consent documented in the SOW. We do not train models on client data.

05

Access revocation on close.

Credentials, VPN access, system accounts, and any other access provisioned for the engagement is revoked within 4 hours of engagement close. We provide a written confirmation of revocation as part of engagement closure.

// COMMUNICATION
How often we talk, what we tell you, when we tell you
01

Daily async updates during active engagements.

Each engagement day produces a written async update by 18:00 in the client’s timezone: work performed, findings discovered, next-day plan. No silent days.

02

Findings communicated as discovered, not held.

Findings of severity HIGH or above are communicated within 24 hours of discovery, regardless of where we are in the engagement. We do not hold critical findings for the final report. For CRITICAL findings, within 4 hours.

03

Out-of-band channel for critical issues.

Every engagement designates an out-of-band communication channel (Signal, encrypted email, or equivalent) for findings that cannot wait for normal channels. This channel is verified during engagement setup, not improvised during a crisis.

04

Named primary contact, named backup.

Every engagement has a named primary client contact and a named backup. We do not route findings through general inboxes or shared aliases. Changes to contact assignment require written notice.

// DISCLOSURE
What we publish, what we don't, and when we tell vendors
01

Engagement findings stay confidential.

Findings from a paid engagement are confidential to that client and remain so indefinitely unless the client explicitly consents to publication.

02

Sanitized publication only with consent.

Where we wish to publish anonymized case studies from real engagements, we strip all client identifiers, modify non-essential technical details, and obtain written client approval before publication. No finding is published without explicit consent.

03

Third-party vulnerabilities trigger coordinated disclosure.

If during an engagement we discover a vulnerability in a third-party product (vendor, library, framework) that affects more than just our client, we initiate coordinated disclosure with that vendor — never sold, never leveraged, never weaponized. Default window is 120 days. See /legal for the full disclosure policy.

04

We do not sell or leverage findings.

Findings discovered on paid engagements are not used as leverage in business development, marketing collateral, or sales conversations with other prospects. They do not appear in pitch decks. They are not ‘aged out’ into reusable content.

// CONFLICTS OF INTEREST
Where we won't accept the work
01

Active competitor conflicts.

We do not run concurrent engagements for direct competitors in the same product category. If we are engaged with one party, we will not accept an engagement from their direct competitor for the duration of the engagement plus 90 days.

02

Vendor conflicts.

If we have any financial relationship with a vendor whose product is in scope for an engagement, we disclose it in writing before the SOW is signed. Material conflicts (equity, paid advisorship) disqualify us from testing that vendor.

03

Personal conflicts.

Investigators with personal relationships to client staff (family, current or former romantic partners, close personal friends) recuse from those engagements. Recusal does not affect the firm’s ability to take the engagement with different staff.

04

Ongoing disclosure.

Conflicts that surface mid-engagement are disclosed in writing within 24 hours of becoming known. The client decides whether the engagement continues.

// WALK-AWAYS
When we will end an engagement
// SCOPE CREEP BEYOND AMENDMENT

If a client repeatedly requests informal expansions to scope and refuses to formalize them in writing, we end the engagement at the next natural break. Pre-billed work is delivered; future phases are not booked.

// AUTHORIZATION GAP

If we discover that authorization for any in-scope asset is unclear, incomplete, or contested, we pause testing immediately and require written resolution before resuming. Unresolved after 5 business days, we terminate.

// LEGAL EXPOSURE

If continuing the engagement would expose us to legal liability beyond what’s documented in the SOW (regulatory issues surfacing mid-work, third-party rights uncovered, etc.), we pause and require resolution. Material unresolved exposure terminates the engagement.

// HARM TO THIRD PARTIES

If our work, even within authorized scope, would cause material harm to identifiable third parties (customers, downstream users, uninvolved vendors), we stop and renegotiate or terminate. Adversarial testing is not a license for collateral damage.

// COERCION OR MISUSE

If we are asked to use engagement work for purposes outside defensive security — leverage, sales intelligence, harm to competitors, surveillance — we refuse and end the relationship.

// NDA OR ETHICS VIOLATION BY CLIENT

If the client breaches the engagement NDA or violates the ethical commitments we’ve agreed to, we terminate immediately and may seek legal remedy.

// OPERATING COMMITMENTS
Specific numbers we stand behind
// INBOUND REPLY

< 24 hours

// NDA TURNAROUND

< 48 hours from request

// SOW DRAFT

< 5 business days after NDA

// ENGAGEMENT MINIMUM

2 weeks

// DAILY UPDATE BY

18:00 client timezone

// CRITICAL FINDING SLA

< 4 hours notification

// HIGH FINDING SLA

< 24 hours notification

// FINAL REPORT

< 5 business days after closure

// CREDENTIAL REVOCATION

< 4 hours after close

// MATERIAL RETENTION

30 days default

// AMENDMENT TURNAROUND

< 2 business days

// PRACTITIONERS PER ENGAGEMENT

2 minimum

These commitments apply to standard engagements. Incident response and retainer engagements have amended timelines documented in their respective SOWs.

// APPLICABILITY

This document is referenced in every Statement of Work and governs the conduct of every engagement. Where this document conflicts with a signed Statement of Work, the SOW takes precedence — these are defaults, the SOW is the contract. For broader engagement legal terms, see /legal. For data-handling practices that apply beyond engagements, see /privacy.

Engagement Terms →Privacy Policy →Disclosure Policy →
// CHANGE LOG

We track substantive changes to this document below. Minor edits are not logged.

MAY 12 2026Walk-Aways · Added ‘Harm to Third Parties’ condition after first engagement triggered it.
MAR 02 2026Data Handling · Added explicit prohibition on third-party LLM submission of client data.
JAN 08 2026Initial publication.
Questions about these rules before engaging? legal@logicleak.io
REQUEST AN AUDIT →