Ethics, International Humanitarian Law, and Human Rights

engineer-check-and-control-automation-robot-arms-machine-in-intelligent-factory-industrial-.jpg

SEIUM

At SEIUM, technology is never neutral: it is designed, tested, and transferred within an explicit ethical, legal, and human rights framework. This policy establishes what we do, how we do it, and what we do not do when working in sensitive areas—including academic defense, civil security, autonomy, and dual-use—to ensure that teaching and research are non-operational, socially responsible, and in compliance with International Humanitarian Law (IHL) and international human rights standards.

,

Purpose, Scope, and Institutional Positioning

At SEIUM, we don’t just teach engineering—we build it alongside industry partners and regulators, in accredited laboratories and using real-world standards. Working here means

Ensure that all academic, research, and external engagement activities comply with international humanitarian law, human rights, applicable laws, and internal policies; minimize the risk of misuse; and protect individuals, groups, and the public interest.

Students, faculty, technical staff, administrative staff, adjuncts, fellows, guests, contractors, and partners (companies, institutions, and government agencies). Applies to content, data, software, equipment, research, publications, and technology transfer.

We do not teach or develop tactics, doctrine, or operational TTPs (tactics, techniques, and procedures); instead, we focus on engineering, security, certification, ethics, and validation.

We exclude the design, optimization, or training related to offensive capabilities, lethality, weapon guidance, the exploitation of vulnerabilities outside legal frameworks, or the deliberate circumvention of regulatory safeguards.

The principles of distinction, proportionality, and precaution under international humanitarian law; the UN Guiding Principles on Business and Human Rights; the OECD Due Diligence Guidelines; and applicable national and international regulations.

Training in offensive capabilities, lethality, weapon guidance, the exploitation of vulnerabilities outside legal frameworks, or the deliberate circumvention of regulatory safeguards.

Guiding Principles

Ética

First, do no harm:

Preventive assessment of human, social, and environmental risks.

Ética

Legality and Legitimacy

compliance with regulations + explicit ethical justification (“not everything that is legal is legitimate”).

Ética

Human-in-the-loop

Meaningful human oversight in autonomous and decision-making systems.

Ética

Transparency and traceability

Documented decisions; audits conducted by internal committees and, where appropriate, external committees.

Ética

Privacy and dignity

data minimization, privacy by design, protection of vulnerable groups.

Ética

Equity and Non-Discrimination

Control of biases, applicability, and reasonable access to recourse rights.

Ética

Proportionality and data minimization

the minimum necessary for the legitimate academic/scientific purpose.

Ética

Accountability

clear responsibilities, whistleblowing channels, and corrective measures.

Classification of activities

Ethical Review Process (Life Cycle)

Ética

Design/optimization of lethal effects or weapon guidance.

Ética

Exploitation of vulnerabilities (cyber/OT) outside of legally authorized programs and without proper coordination.

Ética

Exploitation of vulnerabilities (cyber/OT) outside of legally authorized programs and without proper coordination.

Ética

Exploitation of vulnerabilities (cyber/OT) outside of legally authorized programs and without proper coordination.

Ética

Exploitation of vulnerabilities (cyber/OT) outside of legally authorized programs and without proper coordination.

Red lines (non-negotiable)

Ética

Dual-use management and autonomy

  • Limiting capabilities: Publish principles and aggregate results, not critical parameters that could enable malicious use.
  • Data is synthetic/anonymized by default; if real-world data is used, it must undergo a DPIA/HRIA, data minimization, and data contracts.
  • Responsible autonomy: human-in-the-loop/on-the-loop, operational limits, fail-safe mechanisms, safety cases, and assurance cases.
  • Defensive cybersecurity: a focus on hardening, detection, response, and resilience; not offensive development.

Relationships with partners (contracts and MoUs)

Mandatory training

Principles, borderline cases, warning signs, red flags.

DPIA, anonymization, biases, explainability, ARCO/DSAR rights.

Classification, counterparty screening, licenses, cash flows.

Safety procedures, substances/equipment, incident response.

Best practices, secure-by-design, incident response.

All staff and students participating in sensitive projects must keep their training up to date; failure to do so will result in the suspension of access to resources and repositories.

Ética

Publication, communication, and open science

Preference for transparency when it does not jeopardize people, security, or compliance.

summary data, aggregated results, omission of critical parameters.

Purpose, limitations, intended use, out-of-scope, residual risks.

Avoid overpromising; put risks and safeguards into context.

SEIUM

We believe that technical excellence without accountability is not true excellence. For this reason, all teaching and research is subject to a robust framework of ethics, international humanitarian law (IHL), and human rights, featuring clear red lines, independent committees, auditable processes, and a “stop the line” culture. Our commitment is to educate and develop safe, legitimate, and socially beneficial engineering—from the road to orbit—without crossing the boundaries that protect life, dignity, and the rule of law.

Incidents, complaints, and penalties

Metrics and Transparency

Case Studies (Practical Guide)

Operational appendices (available on the internal portal)