The following is the Code 2018 Draft 2 version.
If you wish to contribute to this section: Reply to this post with your suggested re-wording and a justification for your proposed changes.
2.8 Access computing and communication resources only when authorized to do so.
This principle derives from Principle 1.2 - "Avoid harm to others." No one should access or use another's computer system, software, or data without permission. One should have appropriate approval before using system resources, unless there is an overriding concern for the public good. To support this clause, a computing professional should take appropriate action to secure resources against unauthorized use. Individuals and organizations have the right to restrict access to their systems and data so long as the restrictions are consistent with other principles in the Code (such as Principle 1.4).