A code of ethics should articulate who we are and who we strive to become, because our conduct toward clients and colleagues springs from that foundation. This is why we ground our ethics in a framework that reaches beyond technical considerations. Moreover, responsibilities such as confidentiality, privacy, security, and data stewardship are shared duties, so we address many of them in our Terms of Service instead. Finally, with technology and conditions evolving faster than rules, a strictly technical code leaves significant risks in gray areas. Our code provides principled guidance that technical rules alone cannot.
The ethical framework we chose is Chapter 4 of the Rule of St. Benedict, a moral tradition that has guided communities and informed legal traditions for over 1,500 years. Its rules, known as the "Instruments of Good Works” offers a concise blueprint for disciplined, humble, service‑oriented work. We believe these qualities align directly with the mindset required in our field, where good habits and sound ethical judgment matter as much as technical skill. The instruments are practical yet monastic, so they point beyond themselves to a higher authority. We see in this orientation the source of their effectiveness. The rule is for us a one‑way promise to choose integrity and goodwill at all times, regardless of how others behave.
Because modern managed IT work involves unique responsibilities, we supplemented the core framework with a set of technology‑specific rules. Our Values anchor who we are. Our Technology Standards clarify how we deliver. Together, they form our Guiding Principles. Our commitment to these principles is our Guild's Covenant of Stewardship, a promise we bring to life each day through a corresponding Operating Playbook (Procedures + Tools). This model ensures your digital environment is never tied to a single individual. It is safeguarded by the collective capability of a Mesh of professionals bound by a unified, uncompromising Standard of Excellence.
The Heart of Our Commitment:
At Concierge CIO Partners, our work is guided by the Instruments of Good Works from the Rule of St. Benedict. This 1,500‑year‑old tradition provides a clear and time‑tested standard for how we treat our clients and each other. We view it as a one‑way promise of conduct. We commit to honesty, patience, respect, and integrity in every interaction, regardless of circumstance. It is a simple but uncommon approach in the technology world, and it defines how we serve.
The Instruments of Good Works
- First of all, love the Lord God with your whole heart, your whole soul, and your whole strength.
- Then, love your neighbor as yourself.
- Do not murder.
- Do not commit adultery.
- Do not steal.
- Do not covet.
- Do not bear false witness.
- Honor all people.
- Do not do to another what you would not have done to yourself.
- Deny oneself in order to follow Christ.
- Chastise the body.
- Do not become attached to pleasures.
- Love fasting.
- Relieve the poor.
- Clothe the naked.
- Visit the sick.
- Bury the dead.
- Be a help in times of trouble.
- Console the sorrowing.
- Be a stranger to the world's ways.
- Prefer nothing more than the love of Christ.
- Do not give way to anger.
- Do not nurse a grudge.
- Do not entertain deceit in your heart.
- Do not give a false peace.
- Do not forsake charity.
- Do not swear, for fear of perjuring yourself.
- Utter only truth from heart and mouth.
- Do not return evil for evil.
- Do no wrong to anyone, and bear patiently wrongs done to yourself.
- Love your enemies.
- Do not curse those who curse you, but rather bless them.
- Bear persecution for justice's sake.
- Be not proud.
- Be not addicted to wine.
- Be not a great eater.
- Be not drowsy.
- Be not lazy.
- Be not a grumbler.
- Be not a detractor.
- Put your hope in God.
- Attribute to God, and not to self, whatever good you see in yourself.
- Recognize always that evil is your own doing, and to impute it to yourself.
- Fear the Day of Judgment.
- Be in dread of hell.
- Desire eternal life with all the passion of the spirit.
- Keep death daily before your eyes.
- Keep constant guard over the actions of your life.
- Know for certain that God sees you everywhere.
- When wrongful thoughts come into your heart, dash them against Christ immediately.
- Disclose wrongful thoughts to your spiritual mentor.
- Guard your tongue against evil and depraved speech.
- Do not love much talking.
- Speak no useless words or words that move to laughter.
- Do not love much or boisterous laughter.
- Listen willingly to holy reading.
- Devote yourself frequently to prayer.
- Daily in your prayers, with tears and sighs, confess your past sins to God, and amend them for the future.
- Fulfill not the desires of the flesh; hate your own will.
- Obey in all things the commands of those whom God has placed in authority over you even though they (which God forbid) should act otherwise, mindful of the Lord's precept, "Do what they say, but not what they do."
- Do not wish to be called holy before one is holy; but first to be holy, that you may be truly so called.
- Fulfill God's commandments daily in your deeds.
- Love chastity.
- Hate no one.
- Be not jealous, nor harbor envy.
- Do not love quarreling.
- Shun arrogance.
- Respect your seniors.
- Love your juniors.
- Pray for your enemies in the love of Christ.
- Make peace with your adversary before the sun sets.
- Never despair of God's mercy.
The Concierge CIO Partners Technology Standards
While the timeless principles above form our ethical core, the modern context of managed IT services demands supplementary rules to address technology-specific responsibilities.
Pillar I: Fiduciary Stewardship
Focus: Aligning technical decisions with the client’s financial and strategic health.
- Business Outcomes First: Prioritize client business goals in every technical recommendation.
- Capital Stewardship: Manage every client’s technology budget as if it were your own capital.
- True Neutrality: Remain vendor neutral. Disclose all conflicts of interest or incentives before advising.
- Predictable Economics: Provide clear pricing and invoices with no surprise fees; obtain explicit approval for scope changes.
- Institutional Autonomy: Protect clients from vendor lock in and regulatory capture through open, portable systems.
- Ownership by Design: Build infrastructure the client owns and that remains functional after the engagement ends.
Pillar II: Architectural Integrity
Focus: Building systems that are simple, sovereign, and secure.
- Elegant Simplicity: Favor simple solutions that reduce risk and cost over complex, "shiny" alternatives.
- Standard Platforms: Use standard, well supported platforms unless the client’s unique needs require an exception.
- Reversibility: Prefer reversible changes when uncertainty is high; be willing to reverse course when facts change.
- Responsible Innovation: Use AI and automation transparently; ensure outputs are explainable and do not leak client data.
- Sustainable Tech: Minimize environmental impact by decommissioning "zombie" servers and optimizing resource use.
Pillar III: Operational Rigor
Focus: Protecting the environment through disciplined, repeatable actions.
1. Management Sovereignty and Supply Chain Defense
- Isolated Management Stacks: Manage and monitor through self hosted or single tenant servers to prevent multi tenant "master key" compromises.
- Supply Chain Firebreaks: Isolate client management tools (RMM, Documentation) to prevent lateral "monoculture" ransomware attacks.
- Third Party Oversight: Perform risk checks on critical suppliers; never allow unattended vendor access to client systems.
2. Identity and Access Control
- Zero Trust Defaults: Default to least privilege and require MFA wherever feasible.
- Identity Verification: Verify identity before sharing information; never use client credentials for convenience.
- Offboarding: Remove access immediately when roles change or engagements end.
3. System Hardening and Maintenance
- Hardened Baselines: Use secure defaults and harden all systems before go live.
- Active Lifecycle: Patch systems promptly with documented change control; keep documentation current as a living record.
- Environment Segregation: Strictly separate production, staging, and testing environments.
4. Data Protection and Recovery
- Resilient Recovery: Backup data regularly to multiple secure locations and conduct monthly restore drills.
- Encryption Standards: Encrypt sensitive data in transit and at rest using modern protocols.
- Business Continuity: Maintain and regularly test disaster recovery plans.
Pillar IV: Professional Ethics
Focus: Communication, honesty, and collective intelligence.
- Radical Candor: Provide honest advice in plain language about risks, costs, and trade offs.
- Absolute Confidentiality: Maintain the privacy of client information and comply with all data retention laws.
- Open Book Mindset: Maintain transparency with clients and fellow Guild partners.
- Collective Intelligence: Draw on shared Guild knowledge; none of us is as smart as all of us.
- Intellectual Humility: Practice humility about what you do not know; seek and offer honest technical reviews.
- Proactive Escalation: Set realistic targets, report performance honestly, and escalate early when impact could grow.
- Duty to Report: Report suspected unethical behavior or security incidents immediately; never resent good faith reporters.