10 Commandments of Computer Ethics
You shall not use other people’s computer resources without authorization or proper compensation.
You Shall Not Use A Computer To Harm Other People
You shall not use a computer to steal.
- Stealing sensitive information or breaking into bank accounts is nothing less than robbery
- Using resources in any manner that breaks the law or violates company policy. This can include the unauthorized copying or transmission of software.
- Intentionally interfering or corrupting other peoples work/files
- Invading the privacy of other people
- Stealing someone’s personal information by means of a computer
- Cybercrimes
- You should not try to pass off information obtained via the internet as your own.
- You should always give proper credit to the source.
- You should not post personal communication without the original author’s consent.
- Not ethical to hack passwords for gaining unauthorized access
Website Evaluation Assignment
You shall not interfere with other people’s computer work.
You shall not use a computer to bear false witness.
You shall not appropriate other people’s intellectual output
Computer ethics relates to the ethical values that should guide computer users and professionals in their conduct.
Ten Commandments of Computer Ethics creates “a set of standards to guide and instruct people in the ethical use of computers.”
- Posting personal communication without the original authors consent.
- Using information obtained through network and computer resources without giving proper credit to the source (plagiarism).
- You shall not interfere with other people’s computer work.
- Viruses are small programs built with intent to harm or disrupt computer programs
- Overload the computer memory by an excessive use of computer resources
- Degrading or disrupting equipment, software, or system performance
- Using resources to interfere with the proper operation of any computer or destroy data
- Intentionally interfering with other peoples work
- Computers are the easiest source to spread information to the masses
- Deliberately giving false information—lying
- Being involved in the circulation of incorrect information is unethical
- You should not download, store, print, or distribute files or messages that are profane, obscene, threatening or that use language that offends or is aimed at degrading others
You shall not copy or use proprietary software for which you have not paid.
You shall not snoop around in other people’s computer files
You shall think about the social consequences of the program you are writing or the system you are designing.
- Invading the privacy of individuals
- Wrong to read another person’s email or obtain another person’s private files—similar to breaking into someone’s room
- Using an account owned by another user or allowing another user to access your account.
- You shall think about the social consequences of the program you are writing or the system you are designing.
- Must realize the prospective use of the software
- Viruses, child content etc
- Software is subject to copyrights.
- The outcome of a programmer’s intellect and it is important to respect talent and give due regard to his/her rights
- You should not use resources in any manner that violates company policy or breaks the law, including the Copyright Designs and Patents Act.
- You should not be copying or transmitting software for which you do not have a license.
You shall always use a computer in ways that show consideration and respect for your fellow humans.
- Downloading, storing, printing, or distributing files or messages that contain information considered dangerous to the public at large.
- While interacting through a computer, a person needs to be nice to the ones he/she interacts with