Ethics, International Humanitarian Law, and Human Rights

,

Purpose, Scope, and Institutional Positioning

At SEIUM, we don’t just teach engineering—we build it alongside industry partners and regulators, in accredited laboratories and using real-world standards. Working here means

Ensure that all academic, research, and external engagement activities comply with international humanitarian law, human rights, applicable laws, and internal policies; minimize the risk of misuse; and protect individuals, groups, and the public interest.

Students, faculty, technical staff, administrative staff, adjuncts, fellows, guests, contractors, and partners (companies, institutions, and government agencies). Applies to content, data, software, equipment, research, publications, and technology transfer.

We do not teach or develop tactics, doctrine, or operational TTPs (tactics, techniques, and procedures); instead, we focus on engineering, security, certification, ethics, and validation.

We exclude the design, optimization, or training related to offensive capabilities, lethality, weapon guidance, the exploitation of vulnerabilities outside legal frameworks, or the deliberate circumvention of regulatory safeguards.

The principles of distinction, proportionality, and precaution under international humanitarian law; the UN Guiding Principles on Business and Human Rights; the OECD Due Diligence Guidelines; and applicable national and international regulations.

Training in offensive capabilities, lethality, weapon guidance, the exploitation of vulnerabilities outside legal frameworks, or the deliberate circumvention of regulatory safeguards.

Guiding Principles

First, do no harm:

Preventive assessment of human, social, and environmental risks.

Legality and Legitimacy

compliance with regulations + explicit ethical justification (“not everything that is legal is legitimate”).

Human-in-the-loop

Meaningful human oversight in autonomous and decision-making systems.

Transparency and traceability

Documented decisions; audits conducted by internal committees and, where appropriate, external committees.

Privacy and dignity

data minimization, privacy by design, protection of vulnerable groups.

Equity and Non-Discrimination

Control of biases, applicability, and reasonable access to recourse rights.

Proportionality and data minimization

the minimum necessary for the legitimate academic/scientific purpose.

Accountability

clear responsibilities, whistleblowing channels, and corrective measures.

Classification of activities

Ethical Review Process (Life Cycle)

Design/optimization of lethal effects or weapon guidance.

Exploitation of vulnerabilities (cyber/OT) outside of legally authorized programs and without proper coordination.

Exploitation of vulnerabilities (cyber/OT) outside of legally authorized programs and without proper coordination.

Exploitation of vulnerabilities (cyber/OT) outside of legally authorized programs and without proper coordination.

Exploitation of vulnerabilities (cyber/OT) outside of legally authorized programs and without proper coordination.

Red lines (non-negotiable)

Dual-use management and autonomy

  • Limiting capabilities: Publish principles and aggregate results, not critical parameters that could enable malicious use.
  • Data is synthetic/anonymized by default; if real-world data is used, it must undergo a DPIA/HRIA, data minimization, and data contracts.
  • Responsible autonomy: human-in-the-loop/on-the-loop, operational limits, fail-safe mechanisms, safety cases, and assurance cases.
  • Defensive cybersecurity: a focus on hardening, detection, response, and resilience; not offensive development.

Relationships with partners (contracts and MoUs)

Mandatory training

Principles, borderline cases, warning signs, red flags.

DPIA, anonymization, biases, explainability, ARCO/DSAR rights.

Classification, counterparty screening, licenses, cash flows.

Safety procedures, substances/equipment, incident response.

Best practices, secure-by-design, incident response.

All staff and students participating in sensitive projects must keep their training up to date; failure to do so will result in the suspension of access to resources and repositories.

Publication, communication, and open science

Preference for transparency when it does not jeopardize people, security, or compliance.

summary data, aggregated results, omission of critical parameters.

Purpose, limitations, intended use, out-of-scope, residual risks.

Avoid overpromising; put risks and safeguards into context.

SEIUM

We believe that technical excellence without accountability is not true excellence. For this reason, all teaching and research is subject to a robust framework of ethics, international humanitarian law (IHL), and human rights, featuring clear red lines, independent committees, auditable processes, and a “stop the line” culture. Our commitment is to educate and develop safe, legitimate, and socially beneficial engineering—from the road to orbit—without crossing the boundaries that protect life, dignity, and the rule of law.

Incidents, complaints, and penalties

Metrics and Transparency

Case Studies (Practical Guide)

Operational appendices (available on the internal portal)