The Ten Commandments of Computer Ethics

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

“The Ten Commandments of Computer Ethics”

1. Thou shalt not use a computer to harm other people.


Examples: 
 Corrupting other users’ data or files.
 Stealing someone’s personal information.
 Manipulating or destroying files of other users.
 Write programs, which on execution lead to stealing, copying or
gaining unauthorized access to other users' data.
 Hacking, spamming, phishing or cyber bullying.

2. Thou shalt not interfere with other people's computer work.


Examples: 
 Spreading viruses that are meant to harm useful computer
programs or interfere with the normal functioning of a computer.
 Using malicious software to attack a computer.

3. Thou shalt not snoop around in other people's computer files.


Examples:
 Reading someone else's email messages or files.
 Obtaining data from another person's private files.
 Snooping around in another person's files or reading someone
else's personal messages.

4. Thou shalt not use a computer to steal.


Examples:
 Stealing sensitive information or leaking confidential information.
 Acquiring personal information of employees from an employee
database or patient history from a hospital database or other such
information that is meant to be confidential.
 Breaking into a bank account to collect information about the
account or account holder.
 Illegal electronic transfer of funds.

5. Thou shalt not use a computer to bear false witness.


Examples:
 Being involved in the circulation of incorrect information.
 Mails and pop-ups are commonly used to spread the wrong
information or give false alerts with the only intent of selling
products.
 Mails from untrusted sources advertising certain products or
spreading some hard-to-believe information.
 Direct or indirect involvement in the circulation of false information.
 Giving wrong information hurting other parties or organizations that
are affected.

6. Thou shalt not copy or use proprietary software for which you have not
paid (without permission).
Examples: 
 Obtaining illegal copies of copyrighted software.
 Encouraging people to make copies of copyrighted software
illegally.

7. Thou shalt not use other people's computer resources without


authorization or proper compensation.
Examples:
 Breaking into some other user's password, thus intruding his/her
private space.
 Hacking passwords for gaining unauthorized access to a password-
protected computer system.
 Accessing data that you are not authorized to access or gaining
access to another user's computer without her permission.

8. Thou shalt not appropriate other people's intellectual output.


Examples:
 Copying and propagating programs developed by a software
developer in one's own name.
 Establishing ownership on a work which is not yours.

9. Thou shalt think about the social consequences of the program you are
writing or the system you are designing.
Examples:
 Developing a computer game for kids having content that can
influence them negatively.
 Writing malicious software.

10. Thou shalt always use a computer in ways that ensure consideration and
respect for other humans.
Example:
 Disrespecting others while communicating over the internet.
 Intruding others' private space, using abusive language, making
false statements or passing irresponsible remarks about others. 
 Being rude while communicating over the web.
 Disvaluing others' time and resources.
 Being inconsiderate with a novice computer user.

You might also like