0% found this document useful (0 votes)
21 views2 pages

TEN-COMMANDMENTS-OF-COMPUTER-ETHICS

Uploaded by

althealugayan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views2 pages

TEN-COMMANDMENTS-OF-COMPUTER-ETHICS

Uploaded by

althealugayan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

What are Computer Ethics? 4.

Thou shalt not use a computer to steal


- is essentially a set of philosophical guidelines or moral standards that aim to - Similarly, breaking into a bank account to collect information about the account
influence behavior and prevent harm. or account holder is wrong.
- It is wrong to acquire personal information of employees from an employee
Who decided this? database or patient history from a hospital database or other such information
- Ramon C. Barquin that is meant to be confidential.
- It was designed to be a guide and standard to follow in how to use computers - With the use of technology, stealing of information is much easier.
ethically. They follow the biblical style of the Ten Commandments of behavior.
5. Thou shalt not use a computer to bear false witness
TEN COMMANDMENTS OF COMPUTER ETHICS - Spread of information has become viral today, because of the internet. This is
also means that false news or rumors can spread speedily through social
1. Thou shalt not use a computer to harm other people networking sites or emails.
- It includes harming or corrupting other users' data or files. It also states that it - Being involved in the circulation of incorrect information is unethical.
is wrong to use a computer to steal someone's personal information.
- Manipulating or destroying files of other users is ethically wrong. It is unethical 6. Thou shalt not copy or use proprietary software for which you have not paid
to write program which are executives lead to stealing, copying, or gaining (without permission)
unauthorized access to other user's data. - Like any other artistic or literary work, software is copyrighted.
- Being involved in practice like hacking, spamming, phishing or cyber bullying - A piece of code is the original work of the individual who created it. It is
does not conform to computer ethics. copyrighted in his/her name.
- Obtaining illegal copies of copyrighted software is unethical and also
2. Thou shalt not interfere with other people’s computer work encourages others to make copies illegally.
- Computer software can be used in ways that disturb other users or disrupt their
work. 7. Thou shalt not use other people’s computer resources without authorization
- Viruses, for example, are programs meant to harm useful computer programs or proper compensation
or interfere with the normal functioning of a computer. - Breaking into some other user's password, thus intruding his/her private space
- It may cause a computer to function wrongly or even stop working. is unethical.
- It is not ethical to hack passwords for gaining unauthorized access to a
3. Thou shalt not access other people’s computer files password-protected computer system.
- We know it is wrong to read someone's personal letters. - Accessing data that you are not authorized to access or gaining access to
- On the same lines, it is wrong to read someone else's email messages or files. another user's computer without her permission is not ethical.
- Obtaining data from another person's files or reading someone else's personal
breaking into someone's room. 8. Thou shalt not appropriate other people’s intellectual output
- There are exceptions to this, for example, spying is necessary and cannot be - Programs developed by a software developer are their property.
called unethical when it is done against illegitimate use of computers. - If he/she is working with an organization, they are the organization's property.
Example, - Copying them and propagating them in one's own name is unethical.
- Intelligence agencies working on cybercrime cases need to spy on the internet - This applies to any creative work, program or design. Establishing ownership
activity of suspects. on a work which is not yours is ethically wrong.
9. Thou shalt think about the social consequences of the program you are
writing or the system you are designing
- Looking at the social consequences that a program can have, describes a broader
perspective of looking at technology.
- A computer software on release, reaches millions.
- Software like video games and animations or educational software can have a
social impact on their users.
- When working on animation films or designing video games, for example, it is
the programmer's responsibility to understand his target audience/users and the
effect it may have on them.
- For example, a computer game for kids should not have content that can
influence them negatively.
- A software developer/development firm should consider the influence their
code can have on the society at large.

10. Thou shalt always use computers in ways that ensure consideration and
respect for other humans
- The communication etiquette we follow in the real world applies to
communication over computers as well.
- While communicating over the internet, one should treat others with respect.
- One should not intrude other's private space, use abusive language, make false
statements or pass irresponsible remarks about others.
- One should be courteous while communicating over the web and should respect
other's time and resources.
- Also, one should be considerate with a novice computer user.

You might also like