{"id":1138,"date":"2022-06-23T21:08:46","date_gmt":"2022-06-24T01:08:46","guid":{"rendered":"http:\/\/localhost:10008\/?page_id=1138"},"modified":"2024-05-31T12:11:51","modified_gmt":"2024-05-31T16:11:51","slug":"code-of-ethics","status":"publish","type":"page","link":"https:\/\/knowledgeflow.org\/uk\/code-of-ethics\/","title":{"rendered":"\u041a\u043e\u0434\u0435\u043a\u0441 \u0435\u0442\u0438\u043a\u0438 | \u041f\u0440\u0438\u0445\u0438\u043b\u044c\u043d\u0456\u0441\u0442\u044c \u0434\u043e \u0435\u0442\u0438\u0447\u043d\u043e\u0457 \u0434\u043e\u0441\u043a\u043e\u043d\u0430\u043b\u043e\u0441\u0442\u0456"},"content":{"rendered":"<style>.wp-block-kadence-advancedheading.kt-adv-heading1138_0885a4-df, .wp-block-kadence-advancedheading.kt-adv-heading1138_0885a4-df[data-kb-block=\"kb-adv-heading1138_0885a4-df\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading1138_0885a4-df mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading1138_0885a4-df[data-kb-block=\"kb-adv-heading1138_0885a4-df\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading1138_0885a4-df img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading1138_0885a4-df[data-kb-block=\"kb-adv-heading1138_0885a4-df\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading1138_0885a4-df wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading1138_0885a4-df\">Code of Ethics<\/h2>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Mission<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>We strive to be the standard for cybersafety education and resources for all ages<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Canons<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Act honourably, honestly, justly, responsibly, and legally<\/li>\n\n\n\n<li>Provide diligent and competent service in all engagements<\/li>\n\n\n\n<li>Advance and protect the cybersafety education field and the Foundation<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Mandates<\/strong><\/h2>\n\n\n\n<p>The Code of Ethics of the International Information Systems Security Certification Consortium drives the mandates of every KnowledgeFlow Cybersafety Foundation to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Promote and preserve public trust and confidence in information and systems<\/li>\n\n\n\n<li>Promote the understanding and acceptance of prudent information security measures<\/li>\n\n\n\n<li>Preserve and strengthen the integrity of the public infrastructure<\/li>\n\n\n\n<li>Discourage unsafe and unethical practices<\/li>\n\n\n\n<li>Tell the truth; make all stakeholders aware of our actions on a timely basis<\/li>\n\n\n\n<li>Observe all contracts and agreements, express or implied<\/li>\n\n\n\n<li>Give prudent advice; avoid raising unnecessary alarm or giving unwarranted comfort<\/li>\n\n\n\n<li>Take care to be truthful, objective, cautious, and within our competence<\/li>\n\n\n\n<li>Provide diligent and competent service to principals<\/li>\n\n\n\n<li>Preserve the value of client systems, applications, and information<\/li>\n\n\n\n<li>Respect client trust and the privileges that they grant us<\/li>\n\n\n\n<li>Avoid conflicts of interest or the appearance thereof<\/li>\n\n\n\n<li>Advance and protect the field<\/li>\n\n\n\n<li>Take care not to injure the reputation of other professionals through malice or indifference<\/li>\n\n\n\n<li>Avoid professional association with those whose practices or reputation might diminish the profession<\/li>\n\n\n\n<li>Assist colleagues and co-workers in their professional development and support them in following the Knowledgeflow Cybersafety Foundation code of ethics.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Links<\/strong><\/h2>\n\n\n\n<p><a href=\"https:\/\/www.priv.gc.ca\/en\/privacy-topics\/privacy-laws-in-canada\/the-personal-information-protection-and-electronic-documents-act-pipeda\/\" target=\"_blank\" rel=\"noopener\">Personal Information Protection and Electronic Documents Act<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/laws-lois.justice.gc.ca\/eng\/acts\/o-5\/\" target=\"_blank\" rel=\"noopener\">Security of Information Act<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u041a\u043e\u0434\u0435\u043a\u0441 \u0435\u0442\u0438\u043a\u0438 \u041a\u0430\u043d\u043e\u043d\u0438 \u043c\u0456\u0441\u0456\u0457 \u041c\u0430\u043d\u0434\u0430\u0442\u0438 \u041a\u043e\u0434\u0435\u043a\u0441 \u0435\u0442\u0438\u043a\u0438 \u041c\u0456\u0436\u043d\u0430\u0440\u043e\u0434\u043d\u043e\u0433\u043e \u043a\u043e\u043d\u0441\u043e\u0440\u0446\u0456\u0443\u043c\u0443 \u0437 \u0441\u0435\u0440\u0442\u0438\u0444\u0456\u043a\u0430\u0446\u0456\u0457 \u0431\u0435\u0437\u043f\u0435\u043a\u0438 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u0432\u0438\u0437\u043d\u0430\u0447\u0430\u0454 \u043c\u0430\u043d\u0434\u0430\u0442\u0438 \u043a\u043e\u0436\u043d\u043e\u0457 \u0424\u0443\u043d\u0434\u0430\u0446\u0456\u0457 \u043a\u0456\u0431\u0435\u0440\u0431\u0435\u0437\u043f\u0435\u043a\u0438 KnowledgeFlow: \u041f\u043e\u0441\u0438\u043b\u0430\u043d\u043d\u044f \u041e\u0441\u043e\u0431\u0438\u0441\u0442\u0430 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u044f...<\/p>","protected":false},"author":8,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"class_list":["post-1138","page","type-page","status-publish","hentry"],"acf":[],"taxonomy_info":[],"featured_image_src_large":false,"author_info":{"display_name":"KnowledgeFlow Cybersafety Foundation","author_link":"https:\/\/knowledgeflow.org\/uk\/author\/knowledgefloweditor\/"},"comment_info":0,"_links":{"self":[{"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/pages\/1138","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/comments?post=1138"}],"version-history":[{"count":0,"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/pages\/1138\/revisions"}],"wp:attachment":[{"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/media?parent=1138"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}