Subscribe to GEN
Login to GEN
This Social Engineering Policy (the “Policy”) sets out how GEN provides social engineering security testing services to customers (“Customers”) to measure and improve cyber security posture, user awareness, and organisational resilience. This Policy is incorporated into, and forms an adjunct to, the Framework Agreement between GEN and the Customer. Capitalised terms not defined here have the meaning given in the Framework Agreement. If there is any inconsistency between this Policy and the Framework Agreement, the Framework Agreement takes precedence.
Social engineering testing is a human-led service that simulates realistic adversary behaviour to assess how people, processes, and controls respond to persuasion, pretexting, and other influence techniques. Unlike “template spam”, our agents take an adaptive approach: they observe, ask questions, pivot, and leverage information discovered during the engagement (within the agreed scope) to determine whether access to systems, services, information, or locations can be obtained.
The Service may include (without limitation):
Social engineering is inherently intrusive by design. GEN will not commence testing without explicit written authorisation. Before any engagement begins, the Customer must ensure a signed SOW and signed RoE are in place, approved by an Authorised Contact.
Each RoE must define, as a minimum:
Subject to the signed RoE, GEN agents may engage Customer personnel using realistic interaction and persuasion techniques. Agents may ask questions, request process exceptions, attempt to obtain internal information, and pivot based on responses. The objective is to assess real-world resilience and control effectiveness, not to shame individuals.
Where explicitly authorised in the RoE, GEN may use pretexting (for example as internal IT/HR, a supplier, or a contractor) to test identity verification and escalation procedures. All such activity must remain lawful, proportionate, and within the agreed scope.
Regardless of any engagement scope, the following are hard prohibitions:
Email testing may include targeted messages, reply handling, and controlled landing pages to measure user behaviour. Where credential capture is authorised, credentials must be handled in accordance with the Credential Handling section of this Policy. GEN will take reasonable steps to minimise harm (for example, avoiding payloads that could execute code).
Telephone testing is conducted by live agents. The purpose is to assess identity verification, call handling, escalation paths, and susceptibility to persuasive requests. Calls are not audio recorded as standard under this Policy; evidence is captured through contemporaneous notes and outcomes.
Where authorised in the RoE, GEN agents may attend Customer sites and attempt to bypass physical controls through social engineering and observation. This may include attempts to gain access to restricted areas (including, where explicitly authorised, comms rooms or server rooms) to demonstrate whether mission-critical systems or assets could be reached.
Physical evidence may include (subject to RoE):
GEN will not perform forced entry, will not bypass locks by destructive means, and will comply with on-site safety requirements. If challenged by security or staff, agents will comply with instructions, disengage where required, and may use an agreed verification channel to confirm authorisation.
If the engagement results in disclosure of credentials, tokens, or other secrets (whether requested or volunteered), GEN will treat these as confidential secrets. Credentials may be used only to demonstrate access consistent with the RoE and only to the minimum extent required to evidence a finding.
Social engineering engagements may involve processing of personal data (for example names, job roles, contact details, communications content, and interaction notes). Any processing of personal data is carried out in accordance with GEN’s Privacy Notice, the Framework Agreement, and applicable data protection law (including UK GDPR and the Data Protection Act 2018).
Evidence is collected on a data-minimised basis, retained only as long as necessary to deliver the report and satisfy auditability requirements, and stored securely with access controls.
GEN will report on all meaningful interactions and outcomes, whether successful or unsuccessful. Reports typically include (as appropriate):
Social engineering outcomes depend on human behaviour, timing, and environmental conditions. The Service is delivered using reasonable skill and care and on a best-efforts basis. No test can guarantee detection of all weaknesses or prevent real-world compromise. To the maximum extent permitted by law, GEN’s liability is limited as set out in the Framework Agreement.
This Policy operates in conjunction with the following GEN policies and agreements:
GEN may amend this Policy from time to time. Changes take effect prospectively from the stated effective date or, if none, from the date of posting.
This Policy is incorporated into the Framework Agreement and does not operate as a standalone agreement. If there is any inconsistency between this Policy and the Framework Agreement, the Framework Agreement takes precedence.
Questions regarding social engineering engagements, authorisation, or RoE requirements should be directed via the HelpDesk at https://support.gen.uk.