Hippocratic Oath for Hackers
Overview
As a professional hacker dedicated to advancing cybersecurity and safeguarding human life, I pledge to uphold the highest ethical standards and comply with applicable laws and regulations in all my endeavors. Guided by globally recognized principles, legal frameworks, and industry best practices, I commit to protecting privacy, ensuring system security, and fostering public trust in the cybersecurity of medical devices and critical infrastructure.
​
1. Protection of Privacy and Personal Data
Commitment to Ethical Handling of Data:
-
I will safeguard privacy and personal data in accordance with legal, ethical, and societal expectations.
Compliance with Jurisdictional Privacy Laws:
-
I will adhere to laws such as the Health Insurance Portability and Accountability Act (HIPAA) in the United States, the California Consumer Privacy Act (CCPA), the General Data Protection Regulation (GDPR) in the European Union, the Personal Information Protection Law (PIPL) in China, the Privacy Act 1988 in Australia, and emerging data protection laws in the Middle East, including the UAE Federal Data Protection Law and Bahrain's Personal Data Protection Law.
Alignment with International Standards:
-
I will align with frameworks like ISO/IEC 27701 for privacy information management, ensuring robust controls for handling personal data.
​
2. Security and Resilience of Critical Systems
Ensuring Safety and Functionality:
-
I will prioritize security and resilience in healthcare and critical infrastructure systems to protect public welfare and national security.
Compliance with National Cybersecurity Laws:
-
I will adhere to the Cybersecurity Information Sharing Act (CISA) in the U.S., the Network and Information Security Directive (NIS2) in the EU, the Cybersecurity Act in Singapore, and the Cybersecurity Management Guidelines in Japan.
Global Standards Alignment:
-
I will follow ISO/IEC 27001 for information security management and ISO/IEC 80001 for medical device networks, ensuring the confidentiality, integrity, and availability of information.
​
3. Responsible Vulnerability Disclosure​​
Ethical Reporting:
-
I commit to disclosing vulnerabilities responsibly, prioritizing collaboration and public safety.
Adherence to Disclosure Protocols:
-
I will comply with coordinated vulnerability disclosure (CVD) frameworks and report issues in alignment with guidelines from authorities such as the Cybersecurity and Infrastructure Security Agency (CISA) in the U.S., the European Union Agency for Cybersecurity (ENISA), and the National Cybersecurity Authority (NCA) in Saudi Arabia.
International Cooperation:
-
I will respect the Budapest Convention on Cybercrime and collaborate with global stakeholders to combat malicious exploitation.
​​
4. Securing Medical Devices and Healthcare IT Systems
Commitment to Patient Safety:
-
I pledge to secure medical devices and IT systems by addressing vulnerabilities transparently and effectively.
Compliance with Regulatory Guidelines:
-
I will adhere to the U.S. Food and Drug Administration (FDA) cybersecurity guidelines, the Medical Device Regulation (MDR) in the EU, and relevant standards in other jurisdictions to ensure the safety and effectiveness of medical devices.
Collaboration with Key Stakeholders:
-
I will engage with entities like the Biohacking Village Device Lab, manufacturers, and regulators to mitigate risks while promoting innovation.
​​​
5. Protection of Sensitive Data
Respect for Confidentiality:
-
I will uphold the highest standards of confidentiality for sensitive data.
Adherence to Data Protection Frameworks:
-
I will follow ISO/IEC 27018 for cloud privacy and security, ensuring the confidentiality of sensitive health and genetic information.
Transparency and Accountability:
-
I will maintain transparency about data use and ensure data breaches are handled in compliance with laws such as the GDPR in the EU and the Personal Data Protection Law in Bahrain.
​
6. Advancement of Public Welfare and Global Cybersecurity
Collaboration Across Borders:
-
I commit to promoting global cybersecurity efforts to protect health and critical infrastructure.
Engagement with International Standards:
-
I will align with ISO 31000 for risk management and advocate for the adoption of comprehensive cybersecurity frameworks in regions like the Middle East, supporting initiatives such as the Dubai Cyber Security Law.
Fostering Trust:
-
Through initiatives like the Biohacking Village, I will build trust between security researchers, healthcare providers, and regulatory bodies.
​​​
7. Timely and Responsible Reporting
Commitment to Prompt Action:
-
I will act swiftly and responsibly in addressing cybersecurity issues.
Adherence to Reporting Requirements:
-
I will report vulnerabilities in line with timelines specified by authorities such as the FDA in the U.S., the Cyber Security Agency (CSA) in Singapore, and the National Cybersecurity Authority (NCA) in Saudi Arabia.
Regulatory and Manufacturer Collaboration:
-
I will collaborate with manufacturers under coordinated disclosure policies and engage with regulators when required.​
​
Pledge of Accountability​
By taking this oath, I affirm my unwavering commitment to ethical hacking, compliance with legal frameworks, and the protection of human life. My work will prioritize privacy, security, and the public good, ensuring patient safety and resilience in critical systems.
References
1. Health Insurance Portability and Accountability Act (HIPAA):
U.S. Department of Health and Human Services. HIPAA Privacy and Security Rules. 1996.
2. California Consumer Privacy Act (CCPA):
California State Legislature. California Consumer Privacy Act of 2018.
https://oag.ca.gov/privacy/ccpa
3. General Data Protection Regulation (GDPR):
European Union. Regulation (EU) 2016/679 - General Data Protection Regulation (GDPR). 2016. https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32016R0679
4. Personal Information Protection Law (PIPL):
National People's Congress of China. Personal Information Protection Law (PIPL). 2021.
5. Privacy Act 1988 (Australia):
Australian Government. Privacy Act 1988.
https://www.oaic.gov.au/privacy/the-privacy-act/
6. UAE Federal Data Protection Law:
United Arab Emirates Government. Federal Decree-Law No. 45 of 2021 on the Protection of Personal Data.
7. Bahrain Personal Data Protection Law:
Kingdom of Bahrain. Personal Data Protection Law (Law No. 30 of 2018).
https://www.legalaffairs.gov.bh
8. Cybersecurity Information Sharing Act (CISA):
U.S. Congress. Cybersecurity Information Sharing Act of 2015.
https://www.congress.gov/bill/114th-congress/senate-bill/754
9. Network and Information Security Directive (NIS2):
European Union. Directive (EU) 2022/2555 - NIS2 Directive.
https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32022L2555
​
10. Singapore Cybersecurity Act:
Cyber Security Agency of Singapore. Cybersecurity Act 2018.
https://sso.agc.gov.sg/Act/CSA2018
11. Japan Cybersecurity Management Guidelines:
Ministry of Economy, Trade and Industry (METI), Japan. Cybersecurity Management Guidelines.
https://www.meti.go.jp/policy/netsecurity/
12. Budapest Convention on Cybercrime:
Council of Europe. Convention on Cybercrime (Budapest Convention). 2001.
https://www.coe.int/en/web/conventions/full-list/-/conventions/treaty/185
13. ISO/IEC 27001 - Information Security Management:
International Organization for Standardization. ISO/IEC 27001:2013 - Information Security Management.
https://www.iso.org/standard/54534.html
14. ISO/IEC 27701 - Privacy Information Management:
International Organization for Standardization. ISO/IEC 27701:2019 - Privacy Information Management.
https://www.iso.org/standard/71670.html
15. ISO/IEC 80001 - Risk Management for Medical IT Networks:
International Organization for Standardization. ISO/IEC 80001-1:2010 - Application of Risk Management for IT Networks Incorporating Medical Devices.
https://www.iso.org/standard/44863.html
16. Dubai Cyber Security Law:
Dubai Electronic Security Center. Dubai Cyber Security Strategy.
17. FDA Cybersecurity Guidelines:
U.S. Food and Drug Administration. Cybersecurity for Networked Medical Devices Containing Off-the-Shelf (OTS) Software Guidance.
18. Biohacking Village Device Lab:
Biohacking Village. Promoting collaboration between security researchers and the healthcare industry.
https://biohackvillage.com/device-lab
19. National Cybersecurity Authority (NCA) - Saudi Arabia:
Kingdom of Saudi Arabia. National Cybersecurity Authority Guidelines.