5 ISC2 Code of Ethics

 

This chapter covers

  • The ISC2 Code of Ethics Preamble
  • ISC2 Code of Ethics Canons

As cybersecurity professionals, we regularly handle sensitive information and have privileged access to documents and powerful tools. If misused, these resources can compromise the privacy, security, and well-being of individuals and organizations.

Cybersecurity professionals often face ethical dilemmas in their work. For instance, consider a scenario where, during a cybercrime investigation, we find out that an employee—perhaps even a friend—is involved in misappropriating the company’s intellectual property. This situation presents both ethical and professional challenges. As professionals in the field, should we remain impartial, adhere to organizational policies, and follow the evidence where it leads, or should we show compassion for our colleagues?

To navigate these ethical dilemmas, cybersecurity professionals should rely on established policies and ethical frameworks to guide decision-making and ensure that their actions are both fair and legally sound.

5.1 Ethics

5.2 Professional Codes of Conduct

5.3 The ISC2 Code of Ethics

5.3.1 ISC2 Code of Ethics Preamble

5.3.2 The ISC2 Code of Ethics canons

5.3.3 Examples of application of the cannons

5.3.4 Reporting violations

5.4 Summary