Home About Me Contact Support BLive To Me! Monthly Specials
 
  IT Code of Ethics

This document is based on the current Version (1.0) of the SANS (SysAdmin, Audit, Network, Security) Institute's IT Code of Ethics dated 24 April 2004, available on the SANS website for comparison.  The original text of the SANS document has been modified only slightly to reflect my status as an independent consultant rather than being an employee of a company.  I have also included an additional commitment to never knowingly condone or support software piracy, which is not explicitly mentioned in the original SANS document.


I will strive to know myself and be honest about my capability.
  ß I will strive for technical excellence in the IT profession by maintaining and enhancing my own knowledge and skills. I acknowledge that there are many free resources available on the Internet and affordable books and that the lack of a corporate training budget is not an excuse nor does it limit my ability to stay current in IT. [Duke IS & IT Services has invested in a self-study technical training program through Thompson NETgLearning to prepare for future certification exams]
  ß When possible I will demonstrate my performance capability with my skills via projects, leadership, and/or accredited educational programs and will encourage others to do so as well.
  ß I will not hesitate to seek assistance or guidance when faced with a task beyond my abilities or experience. I will embrace other professionals' advice and learn from their experiences and mistakes. I will treat this as an opportunity to learn new techniques and approaches. When the situation arises that my assistance is called upon, I will respond willingly to share my knowledge with others.
  ß I will strive to convey any knowledge (specialist or otherwise) that I have gained to others so everyone gains the benefit of each other's knowledge.
  ß I will teach the willing and empower others with Industry Best Practices (IBP). I will offer my knowledge to show others how to become security professionals in their own right. I will strive to be perceived as and be an honest and trustworthy consultant.
  ß I will not advance private interests at the expense of end users, colleagues, or my clients.
  ß I will not abuse my power. I will use my technical knowledge, user rights, and permissions only to fulfill my responsibilities to my clients.
  ß I will avoid and be alert to any circumstances or actions that might lead to conflicts of interest or the perception of conflicts of interest. If such circumstance occurs, I will notify my clients or business partners.
  ß I will not steal property, time or resources.
  ß I will reject bribery or kickbacks and will report such illegal activity.
  ß I will report on the illegal activities of myself and others without respect to the punishments involved. I will not tolerate those who lie, steal, or cheat as a means of success in IT.

  ß I will not condone, nor will I knowingly support, the use of pirated software by my clients. I will strive to convince my clients of their legal obligation to comply with licensing agreements for all operating systems and applications that are in use within their organization. The financial expense of software license compliance is not a justification for using pirated software: I will assist my clients to identify and obtain open source alternatives for operating systems and application software so that they may comply with software licensing requirements. [This commitment was not a part of the original SANS Code of Ethics, but reflects my core belief that one should not seek to gain at the expense of another person or company, and that there must always be a fair exchange of value in all business transactions.]

I will conduct my business in a manner that assures the IT profession is considered one of integrity and professionalism.
  ß I will not injure others, their property, reputation, or employment by false or malicious action.
  ß I will not use availability and access to information for personal gains through corporate espionage.
  ß I distinguish between advocacy and engineering. I will not present analysis and opinion as fact.
  ß I will adhere to Industry Best Practices (IBP) for system design, rollout, hardening and testing.
  ß I am obligated to report all system vulnerabilities that might result in significant damage.
  ß I respect intellectual property and will be careful to give credit for other's work. I will never steal or misuse copyrighted, patented material, trade secrets or any other intangible asset.
  ß I will accurately document my setup procedures and any modifications I have done to equipment. This will ensure that others will be informed of procedures and changes I've made.

I respect privacy and confidentiality.
  ß I respect the privacy of my clients’ information. I will not peruse or examine their information including data, files, records, or network traffic except as defined by the appointed roles, the organization's acceptable use policy, as approved by Human Resources, and without the permission of the end user.
  ß I will obtain permission before probing systems on a network for vulnerabilities.
  ß I respect the right to confidentiality with my clients, users, and their employers except as dictated by applicable law. I respect human dignity.
  ß I treasure and will defend equality, justice and respect for others.
  ß I will not participate in any form of discrimination, whether due to race, color, national origin, ancestry, sex, sexual orientation, gender/sexual identity or expression, marital status, creed, religion, age, disability, veteran's status, or political ideology.


This ethics policy was last updated on July 7th 2005.

 
 
  Copyright 2005 Duke InfoSecurity & InfoTechnology Services. All rights reserved
PRIVACY POLICY                    Terms of Services & Legal Notices