10 Commandments of Computer Ethics
Prepared by: Mr. GDC
Define
Commandment
an instruction; a requirement
Ethics
a code of conduct; how a person should live.
Why 10 Commandments
10 Commandments of Computer Ethics was developed by Computer Ethics Institute in
Massachusetts, NW, Washington DC.
The Computer Ethics Institute (CEI) is a 501(c) 3 research, education and public policy
organization focused on the interface of advances in information technologies within ethical
frameworks. Its constituency is comprised of professionals from the academic, corporate and
public policy, information technology and religious communities. In addition, its constituency is
multi-disciplined, multi-cultural, cross-generational and international.
CEI's mission is to facilitate the examination and recognition of ethics in the development and
use of computer technologies. The output of this discussion provides educational resources and
governing rules.
1.) YOU SHALL NOT USE A COMPUTER TO HARM OTHER PEOPLE.
Intentionally interfering with other peoples work
Invading the privacy of individuals
2.) YOU SHALL NOT INTERFERE WITH OTHER PEOPLE'S COMPUTER WORK.
Degrading or disrupting equipment, software, or system performance.
Using resources to interfere with the proper operation of any computer, or destroy data.
Intentionally interfering with other peoples work.
Invading the privacy of individuals.
3.) YOU SHALL NOT SNOOP AROUND IN OTHER PEOPLE'S COMPUTER FILES.
Using an account owned by another user, or allowing another user to access your account.
Any problems which arise from the misuse of a users password will be that users
responsibility.
Invading the privacy of individuals.
4.) YOU SHALL NOT USE A COMPUTER TO STEAL.
Using resources in any manner that violates School Board policy, federal, state, or local law
including unauthorized copying or transmission of software.
5.) YOU SHALL NOT USE A COMPUTER TO BEAR FALSE WITNESS.
Initiating or forwarding chain letters.
Downloading, storing printing, or distributing files or messages that are profane, obscene,
threatening, or that use language that offends or tends to degrade others.
Urban Legends (e.g. kidney transplants)
Unproven rumors (e.g. free coca cola)
Fake news
6.) YOU SHALL NOT COPY OR USE PROPRIETARY SOFTWARE FOR WHICH YOU HAVE NOT PAID.
Using resources in any manner that violates national, regional, provincial, or local law including
unauthorized copying or transmission of software.
7.) YOU SHALL NOT USE OTHER PEOPLE'S COMPUTER RESOURCES WITHOUT AUTHORIZATION
OR PROPER COMPENSATION.
Using information obtained through network and computer resources without giving proper
credit to the source (plagiarism).
Posting personal communication without the original authors consent.
8.) YOU SHALL NOT APPROPRIATE OTHER PEOPLE'S INTELLECTUAL OUTPUT.
Posting personal communication without the original authors consent.
Using information obtained through network and computer resources without giving proper
credit to the source (plagiarism).
9.) YOU SHALL THINK ABOUT THE SOCIAL CONSEQUENCES OF THE PROGRAM YOU ARE
WRITING OR THE SYSTEM YOU ARE DESIGNING.
Initiating or forwarding chain letters.
Downloading, storing, printing, or distributing files or messages that are profane, obscene,
threatening, or that use language that offends or tends to degrade others.
10.) YOU SHALL ALWAYS USE A COMPUTER IN WAYS THAT SHOW CONSIDERATION AND
RESPECT FOR YOUR FELLOW HUMANS.
Downloading, storing, printing, or distributing files or messages that contain information
considered dangerous to the public at large.