Don’t damage computer systems you break into (including crashing them); don’t change the information in those systems (except for altering logs to cover your tracks); and share information.
Suelette Dreyfus, Julian Assange (2012). “Underground: Tales of Hacking, Madness and Obsession on the Electronic Frontier”, p.45, Canongate Books