Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
code_of_conduct [2020/08/11 22:25] – old revision restored (2020/08/08 16:44) 127.0.0.1code_of_conduct [2022/05/08 11:42] (current) – external edit 127.0.0.1
Line 1: Line 1:
 ====== Code of Conduct ====== ====== Code of Conduct ======
 +
 +-- **[[:code_of_conduct_de|in German/auf Deutsch]]** --
  
 We, the organizers and participants of CryptoParties, pledge our dedication to making our events open and welcoming to everyone who shares our [[:guiding_principles|guiding principles]]: Being excellent to each other, and doing things. We, the organizers and participants of CryptoParties, pledge our dedication to making our events open and welcoming to everyone who shares our [[:guiding_principles|guiding principles]]: Being excellent to each other, and doing things.
Line 144: Line 146:
 ==== Other People's Keyboards Are Lava ==== ==== Other People's Keyboards Are Lava ====
  
-Don't touch anyone's keyboard, but your own. While it would be ok after asking for and gaining permission from a "don't violate people's private space" point of view, it still is bad from a didactic point of view. Even when there are weird problems with a computer, take your time to dictate and explain even complicated procedures and commands. The student will learn more, and if consequent problems arise from these actions maybe even weeks after the CryptoParty, the person who owns the computer might remember what was done, and what might be a source of a problem.+Don't touch anyone's keyboard, but your own. While it would be ok after asking for and gaining permission from a "don't violate people's private space" point of view, it still is bad from a didactic point of view. Even when there are weird problems with a computer, take your time to dictate and explain even complicated procedures and commands. The student will learn more, and if afterwards problems arise from these actions maybe even weeks after the CryptoParty, the person who owns the computer might remember what was done, and what might be a source of a problem.
  
 ===== Resolving Conflict ===== ===== Resolving Conflict =====
Line 194: Line 196:
 ===== References / Further Reading ===== ===== References / Further Reading =====
  
-This code of conduct is one of many. Two very common ones that were partially used for this one are the [[http://berlincodeofconduct.org/|Berlin Code of Conduct]] and the [[https://geekfeminism.org/about/code-of-conduct/|Geek Feminism Code of Conduct]]. Another code of conduct in writing that was partly inspired by this code of conduct and could in return inspire it is the [[https://pad.riseup.net/p/Mqyo7Pisx5I6|xHain Code of Conduct]] which itself was inspired by [[http://www.sistersuncut.org/saferspaces/|the Sisters Uncut Code of Conduct]].+This code of conduct is one of many. Two very common ones that were partially used for this one are the [[http://berlincodeofconduct.org/|Berlin Code of Conduct]] and the [[https://geekfeminism.org/about/code-of-conduct/|Geek Feminism Code of Conduct]]. Another code of conduct in writing that was partly inspired by this code of conduct and could in return inspire it is the [[https://pad.riseup.net/p/Mqyo7Pisx5I6|xHain Code of Conduct]] which itself was inspired by [[http://www.sistersuncut.org/saferspaces/|the Sisters Uncut Code of Conduct]]. The processes suggested for resolving conflict are heavily inspired by Generation Five's [[http://www.generationfive.org/wp-content/uploads/2013/07/G5_Toward_Transformative_Justice-Document.pdf|Towards Transformative Justice]].