CYBER ETHICS General Commandments Ten Commandments of Computer
CYBER ETHICS (General Commandments)
Ten Commandments of Computer Ethics • Commandment: an instruction; a requirement • Ethics: a code of conduct; how a person should live.
1. ) You shall not use a computer to harm other people. • Intentionally interfering with other people’s work • Invading the privacy of individuals
2. ) You shall not interfere with other people's computer work. • Degrading or disrupting equipment, software, or system performance. • Using resources to interfere with the properation of any computer, or destroy data. • Intentionally interfering with other people’s work. • Invading the privacy of individuals.
3. ) You shall not snoop around in other people's computer files. • Using an account owned by another user, or allowing another user to access your account. • Any problems which arise from the misuse of a user’s password will be that user’s responsibility. • Invading the privacy of individuals.
4. ) You shall not use a computer to steal. • Using resources in any manner that violates School Board policy, federal, state, or local law including unauthorized copying or transmission of software.
5. ) You shall not use a computer to bear false witness. • Initiating or forwarding “chain” letters. • Downloading, storing printing, or distributing files or messages that are profane, obscene, threatening, or that use language that offends or tends to degrade others. • Urban Legends (e. g. kidney transplants) • Unproven rumors (e. g. free coca cola)
6. ) You shall not copy or use proprietary software for which you have not paid. • Using resources in any manner that violates School Board policy, federal, state, or local law including unauthorized copying or transmission of software.
7. ) You shall not use other people's computer resources without authorization or proper compensation. • Using information obtained through network and computer resources without giving proper credit to the source (plagiarism). • Posting personal communication without the original author’s consent.
8. ) You shall not appropriate other people's intellectual output. • Posting personal communication without the original author’s consent. • Using information obtained through network and computer resources without giving proper credit to the source (plagiarism).
9. ) You shall think about the social consequences of the program you are writing or the system you are designing. • Initiating or forwarding “chain” letters. • Downloading, storing, printing, or distributing files or messages that are profane, obscene, threatening, or that use language that offends or tends to degrade others.
10. ) You shall always use a computer in ways that show consideration and respect for your fellow humans. • Downloading, storing, printing, or distributing files or messages that contain information considered dangerous to the public at large.
POLICIES (For School) • A filtering device is in place to remove inappropriate materials. • This filter also monitors all Internet activity, and, network activity. • Like your locker, access is a privilege, not a right. • District officials or system administrators for any reason whatsoever may access all computerized files. • The district may disable a user’s account at any time for inappropriate or irresponsible behavior. • The building administrator will determine penalties.
FURTHERMORE… • Student access is to take place only under direct supervision of a responsible member of the school district’s instructional staff. • Use is limited to educational purposes that are directly related to the curriculum which you are studying. • No software from outside sources may be loaded or used without written permission from the Technology Coordinator.
PENALTIES (For School) • Depending on the nature and severity of a violation, a Building Administrator will take disciplinary action. • Parent contact is required. • If warranted, the administrator shall refer the case to an appropriate school, local, state, or federal authority for disposition. • If appropriate, access rights to technology will be denied immediately. • Responsibility for costs and damages may be incurred.
References • “Ten Commandments of Computer Ethics”. courses. cs. vt. edu/ ~cs 3604/lib/World. Codes/10. Commandments. html Computer Ethics Institute, Washington DC. (7 July 2003).
- Slides: 16