100% found this document useful (1 vote)
994 views3 pages

The Ten Commandments of Computer Ethics

The document outlines 10 commandments for computer ethics: 1) Do not use computers to harm others, such as by stealing data or personal information. 2) Do not interfere with others' computer work by spreading viruses or malware. 3) Do not access or snoop in others' computer files or private information without permission. 4) Do not use computers for theft, such as of sensitive data, funds, or intellectual property. 5) Do not use computers to spread false information or lies. 6) Do not use or copy proprietary software without permission or payment. 7) Do not use other people's computer resources without authorization. 8) Do not take credit for or claim ownership of others' intellectual output. 9) Consider the
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
994 views3 pages

The Ten Commandments of Computer Ethics

The document outlines 10 commandments for computer ethics: 1) Do not use computers to harm others, such as by stealing data or personal information. 2) Do not interfere with others' computer work by spreading viruses or malware. 3) Do not access or snoop in others' computer files or private information without permission. 4) Do not use computers for theft, such as of sensitive data, funds, or intellectual property. 5) Do not use computers to spread false information or lies. 6) Do not use or copy proprietary software without permission or payment. 7) Do not use other people's computer resources without authorization. 8) Do not take credit for or claim ownership of others' intellectual output. 9) Consider the
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

“The Ten Commandments of Computer Ethics”

1. Thou shalt not use a computer to harm other people.


Examples: 
 Corrupting other users’ data or files.
 Stealing someone’s personal information.
 Manipulating or destroying files of other users.
 Write programs, which on execution lead to stealing, copying or
gaining unauthorized access to other users' data.
 Hacking, spamming, phishing or cyber bullying.

2. Thou shalt not interfere with other people's computer work.


Examples: 
 Spreading viruses that are meant to harm useful computer
programs or interfere with the normal functioning of a computer.
 Using malicious software to attack a computer.

3. Thou shalt not snoop around in other people's computer files.


Examples:
 Reading someone else's email messages or files.
 Obtaining data from another person's private files.
 Snooping around in another person's files or reading someone
else's personal messages.

4. Thou shalt not use a computer to steal.


Examples:
 Stealing sensitive information or leaking confidential information.
 Acquiring personal information of employees from an employee
database or patient history from a hospital database or other such
information that is meant to be confidential.
 Breaking into a bank account to collect information about the
account or account holder.
 Illegal electronic transfer of funds.

5. Thou shalt not use a computer to bear false witness.


Examples:
 Being involved in the circulation of incorrect information.
 Mails and pop-ups are commonly used to spread the wrong
information or give false alerts with the only intent of selling
products.
 Mails from untrusted sources advertising certain products or
spreading some hard-to-believe information.
 Direct or indirect involvement in the circulation of false information.
 Giving wrong information hurting other parties or organizations that
are affected.

6. Thou shalt not copy or use proprietary software for which you have not
paid (without permission).
Examples: 
 Obtaining illegal copies of copyrighted software.
 Encouraging people to make copies of copyrighted software
illegally.

7. Thou shalt not use other people's computer resources without


authorization or proper compensation.
Examples:
 Breaking into some other user's password, thus intruding his/her
private space.
 Hacking passwords for gaining unauthorized access to a password-
protected computer system.
 Accessing data that you are not authorized to access or gaining
access to another user's computer without her permission.

8. Thou shalt not appropriate other people's intellectual output.


Examples:
 Copying and propagating programs developed by a software
developer in one's own name.
 Establishing ownership on a work which is not yours.

9. Thou shalt think about the social consequences of the program you are
writing or the system you are designing.
Examples:
 Developing a computer game for kids having content that can
influence them negatively.
 Writing malicious software.

10. Thou shalt always use a computer in ways that ensure consideration and
respect for other humans.
Example:
 Disrespecting others while communicating over the internet.
 Intruding others' private space, using abusive language, making
false statements or passing irresponsible remarks about others. 
 Being rude while communicating over the web.
 Disvaluing others' time and resources.
 Being inconsiderate with a novice computer user.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy