Hackers' Pub Code of Conduct

Our Commitment

Our Values

Hackers' Pub is dedicated to providing an equal platform for all software engineers and technology enthusiasts. We believe in:

  • Open exchange of technology and knowledge
  • Equal voice for all participants
  • Community enrichment through diverse perspectives
  • Learning and growth through constructive dialogue

Creating an Inclusive Space

Technology communities have historically been exclusive domains. This has limited opportunities for diverse talents and perspectives to contribute to technological advancement. At Hackers' Pub:

  • We ensure equal participation regardless of gender, sexual orientation, gender identity, age, race, ethnicity, nationality, disability, health condition, social status, education level, region, or religion.
  • We actively welcome and empower participants from historically marginalized groups in technology.
  • We maintain a safe environment where people of all backgrounds can share their views comfortably.

Standing Against Structural Discrimination

We acknowledge that real-world inequalities manifest in online spaces. Therefore:

  • We recognize and actively oppose all forms of systemic discrimination including sexism, racism, and ableism.
  • We reject the false neutrality of “treating everyone the same” that ignores existing structural inequalities.
  • We implement proactive inclusion policies for marginalized groups as essential steps toward genuine equality.
  • We distinguish between discriminatory speech and speech that confronts discrimination.
  • We maintain that structural discrimination is never justified and must be actively challenged.

Scope and Application

This Code applies to:

  • All website features and functions
  • All forms of interaction including posts, comments, and direct messages
  • ActivityPub federation activities
  • All Hackers' Pub affiliated events, both online and offline

Violations may result in restricted access or permanent suspension, with zero tolerance for intentional discrimination and hate speech.

Community Guidelines

Building a Welcoming Community

Creating a genuinely inclusive environment is fundamental to our mission. We:

  • Embrace communication in all languages
  • Support cross-language dialogue through translation tools
  • Welcome newcomers with respect and patience
  • Provide constructive responses to questions at all levels
  • Value diverse perspectives and experiences

Maintaining a Safe Environment

To ensure everyone's safety and comfort, we prohibit:

  • Threatening or hostile behavior
  • Sexual harassment in any form
  • Derogatory or demeaning language
  • Unauthorized sharing of private information
  • Stalking or persistent unwanted contact

Combating Discrimination and Hate Speech

The following are explicitly prohibited as discriminatory language or hate speech:

Gender, Sexual Orientation, and Gender Identity:

  • Sexist statements about technical abilities
  • Homophobic or transphobic remarks
  • Denial of gender identity

Race, Ethnicity, and Nationality:

  • Racial or ethnic slurs
  • Xenophobic generalizations
  • Hostile statements about immigrants or refugees

Disability and Health:

  • Ableist language
  • Using health conditions as insults
  • Discriminatory assumptions about capabilities

Social Status and Education:

  • Classist remarks
  • Academic background discrimination
  • Gatekeeping based on credentials

Evaluation criteria for discriminatory content:

  1. Does it undermine human dignity?
  2. Does it reinforce historical discrimination?
  3. Does it deny someone's identity?
  4. Does it defend systemic inequality?

Impact takes precedence over intent in evaluating violations.

Against Technical Elitism

We reject elitism in all forms:

  • No technology shaming
  • No skill level discrimination
  • No condescension toward learners
  • No conflating technical choices with personal worth
  • No platform or language prejudice
  • No dismissal of questions as “too basic”

Content Standards

Content Guidelines

To maintain the quality of our community:

  • Write clearly and purposefully
  • Include references for technical information
  • Properly attribute quoted material
  • Provide appropriate licensing information for code
  • Credit original authors and translators for translations

Prohibited Content

The following content is strictly prohibited:

Illegal Material:

  • Copyright violations
  • Malicious code or hacking tools
  • Illegal goods or services
  • Privacy law violations

Harmful Content:

  • Promotion of violence or self-harm
  • Discriminatory content
  • Explicit sexual content
  • Deliberately deceptive material

Spam:

  • Duplicate posts
  • Irrelevant promotional content
  • Content flooding
  • Bot-generated posts

Promotional Content Policy

Commercial content is regulated as follows:

Permitted:

  • Open source project announcements
  • Tech event announcements
  • Technical blog and portfolio sharing
  • Job postings

Prohibited:

  • Unsolicited commercial advertising
  • Direct marketing of paid services
  • Multi-level marketing schemes
  • Cryptocurrency investment solicitation

Enforcement Protocol

Response to violations:

Minor Infractions:

  • First instance: Warning and correction request
  • Second instance: Content removal
  • Third instance: Posting privileges suspension

Serious Infractions:

  • Immediate content removal
  • Account suspension
  • Potential legal action

Enforcement considerations:

  • Intent
  • Pattern of behavior
  • Impact severity
  • Response to correction

Disputes will be resolved through transparent procedures, with community input when appropriate.

Privacy

Privacy Protection

To protect everyone's privacy, the following rules must be observed:

  • Do not disclose other users' real names, affiliations, email addresses, or other private information without consent
  • Do not share others' social media accounts or contact details without consent
  • Do not reveal information that could identify specific individuals, even through inference
  • Do not re-share previously public information if the person concerned wishes it to remain private

Guidelines for sharing images and code:

  • Ensure no private information is exposed when sharing code or logs
  • Always obscure private details in screenshots
  • Obtain consent from participants when sharing group or event photos

Guidelines regarding corporate information:

  • Do not disclose internal company or organizational information without authorization
  • Avoid identifying specific organizations when discussing employment or resignation
  • Do not share information covered by NDAs (non-disclosure agreements)

Identity Protection and Anonymity

Basic principles:

  • Users have the right to remain anonymous
  • Attempts to reveal or guess other users' real identities are prohibited
  • No discrimination or disadvantage based on anonymity is allowed

Handling voluntarily disclosed information:

  • Information users publish in their profiles can be freely referenced within the platform
  • Misuse of published information in other contexts is prohibited
  • Sharing published information outside the platform is prohibited
  • Using published information for spam or unwanted contact is prohibited
  • Previously public information cannot be referenced or shared if the user later deletes it

Protection of real-name users:

  • Using a real name is the user's choice and doesn't imply consent to share other private details
  • Other private information of real-name users receives the same protection
  • Real-name activity does not diminish the user's right to privacy protection

Exceptional situations:

  • Information may be provided to relevant authorities in cases of legal disputes or criminal activity
  • Actions violating others' rights may be subject to accountability
  • Commercial promotions or advertisements must be identifiable to actual responsible parties

Enforcement Measures

  • First violation: Warning and content removal
  • Repeated violations: Account restrictions
  • Malicious violations: Permanent restrictions and possible legal action

Please promptly report any privacy breaches to administrators. Reports will be thoroughly reviewed and immediate action taken when necessary.

Enforcement and Reporting

Reporting Process

Our platform provides comprehensive violation reporting:

  • Every post includes a report function
  • Reports must include specific violations
  • Reporter confidentiality is guaranteed
  • False reports may face disciplinary action

Federation considerations:

  • Content from federated instances is subject to reporting
  • Reports are shared with origin instances
  • Local standards apply regardless of origin

Investigation and Action

Administrative process:

  • All reports undergo thorough review
  • Context and severity are carefully evaluated
  • Additional evidence may be requested
  • Reporters receive outcome notifications

Potential consequences:

  • Content removal
  • Official warnings
  • Temporary suspension
  • Permanent account termination
  • Instance defederation
  • Legal referral

Right to Appeal

Appeal process:

  • Appeals must cite specific grounds
  • Supporting evidence is required
  • One appeal per enforcement action
  • Thorough review of all appeals

Commitment to Transparency

  • Regular publication of anonymized enforcement data
  • Public announcement of policy changes
  • Documentation of instance-level actions
  • Consistent application of guidelines

Protecting Affected Users

  • Strict confidentiality for all parties
  • Zero tolerance for retaliation
  • Immediate protective measures when needed
  • Support resources available

Evolving Our Code of Conduct

Improvement Process

This Code of Conduct evolves with our community:

Implementation Process

Changes follow this procedure:

  • Community discussion period
  • Administrative review
  • Public feedback for significant changes
  • Formal implementation and announcement

Evaluation Criteria

Proposals are assessed for:

  • Alignment with community values
  • Universal fairness
  • Practical enforceability
  • Policy consistency
  • Protection of vulnerable groups

Change Documentation

  • All changes tracked in GitHub repository
  • Documentation includes:
    • Implementation date
    • Modification summary
    • Rationale
    • Discussion references
  • Version history maintained

Acknowledged Limitations

This Code of Conduct is a living document:

  • Cannot address every situation
  • Subject to interpretation
  • Requires ongoing evolution
  • Spirit over letter

We acknowledge these limitations and commit to continuous improvement through community collaboration.