Back to Home
Legal Document Version 1.0

Terms of Engagement

Last Updated: March 7, 2026

These Terms of Engagement ("Terms") govern the security testing services provided by Researcherlian Security Research ("Researcherlian," "we," "us," or "our") to you ("Client," "your"). By engaging our services, you agree to be bound by these Terms.

⚠️ IMPORTANT: Please read these Terms carefully before submitting any system for testing. These Terms constitute a legally binding agreement between you and Researcherlian.

1. Scope of Services

1.1 Authorized Testing

Researcherlian agrees to perform security assessment services as mutually agreed upon in the Statement of Work (SOW) or testing request form. The scope includes:

  • Web application security testing
  • API security analysis
  • Mobile application assessment
  • Vulnerability identification and verification
  • Detailed reporting with remediation guidance

1.2 Out of Scope

The following activities are explicitly excluded unless otherwise agreed in writing:

  • Denial of Service (DoS) attacks
  • Social engineering or phishing attempts
  • Physical security assessments
  • Testing of third-party systems without explicit authorization
  • Exploitation that could cause data loss or service disruption

2. Client Responsibilities

2.1 Ownership Verification

Client represents and warrants that they own or have explicit written authorization to test all systems, applications, and data provided for assessment. Client agrees to provide proof of ownership upon request, which may include:

  • Domain email verification
  • DNS TXT record confirmation
  • Meta tag verification on website
  • Legal documentation of ownership

2.2 Notification

Client shall notify all relevant stakeholders, including IT staff, developers, and third-party service providers, of the scheduled security testing to prevent unnecessary alerts or incident response activations.

2.3 Access and Credentials

If testing requires authenticated access, Client shall provide necessary credentials and ensure they have the appropriate permission levels for comprehensive testing.

3. Testing Methodology

3.1 Approach

Researcherlian employs industry-standard testing methodologies including:

  • OWASP Testing Guide
  • PTES (Penetration Testing Execution Standard)
  • NIST SP 800-115
  • Custom research techniques

3.2 Tools and Techniques

Testing may involve both automated and manual techniques, including:

  • Automated vulnerability scanning
  • Manual penetration testing
  • Code review (if source code provided)
  • Traffic interception and analysis
🛡️ ETHICAL BOUNDARIES: Researcherlian operates strictly within ethical hacking guidelines. We do not exfiltrate data, cause service disruptions, or exploit vulnerabilities beyond what is necessary for verification.

4. Deliverables

4.1 Security Assessment Report

Upon completion, Researcherlian will provide a comprehensive report including:

  • Executive summary for management
  • Technical findings with proof of concept
  • Risk ratings (Critical, High, Medium, Low)
  • Step-by-step remediation guidance
  • Retesting recommendations

4.2 Timeline

Initial reports will be delivered within 5-10 business days after testing completion, depending on scope complexity. Urgent critical findings may be communicated immediately.

5. Confidentiality

5.1 Non-Disclosure

Researcherlian agrees to maintain strict confidentiality regarding all Client information, including:

  • System architecture and code
  • Identified vulnerabilities
  • Business logic and proprietary information
  • Employee and customer data

5.2 Data Handling

All Client data will be:

  • Stored on encrypted systems
  • Accessible only to authorized researchers
  • Deleted within 30 days after project completion unless otherwise agreed
  • Never shared with third parties without explicit consent

6. Limitations of Liability

6.1 No Guarantee

While Researcherlian exercises reasonable care and skill, security assessments cannot guarantee the discovery of all vulnerabilities. No testing methodology can provide 100% assurance of security.

6.2 Liability Cap

To the maximum extent permitted by law, Researcherlian's total liability shall not exceed the fees paid for the specific engagement giving rise to the claim.

6.3 Service Interruption

Researcherlian is not liable for any service interruptions, data loss, or business interruption resulting from security testing, provided such testing was conducted within the agreed scope and with reasonable care.

7. Intellectual Property

7.1 Client IP

All Client intellectual property, including tested systems, code, and data, remains the sole property of the Client.

7.2 Researcher IP

Researcherlian retains ownership of testing methodologies, tools, and generic findings not specific to Client systems. The final report is licensed for Client's internal use.

8. Payment Terms

8.1 Fees

Testing fees are as agreed in the SOW or testing request confirmation. Unless otherwise specified:

  • 50% deposit required before testing commences
  • 50% due upon report delivery
  • Invoices payable within 15 days

8.2 Cancellation

Cancellations received less than 48 hours before scheduled testing may incur a 25% cancellation fee.

9. Termination

9.1 By Client

Client may terminate the engagement at any time with written notice. Fees for work completed up to termination date will be due.

9.2 By Researcherlian

Researcherlian may terminate with immediate notice if Client violates these Terms, including unauthorized testing scope expansion or failure to provide required access.

10. Governing Law

These Terms shall be governed by and construed in accordance with the laws of Nigeria, without regard to its conflict of laws provisions. Any disputes shall be resolved through binding arbitration in Katsina, Nigeria.

Contact Information

For questions about these Terms of Engagement, please contact:

  • researcherlian@gmail.com
  • +234 702 624 2926
  • Katsina, Nigeria

© 2026 Researcherlian Security Research · All rights reserved