This document discusses various codes of ethics for IT professionals and computing in general. It outlines 10 commandments for ethical computer use, as well as codes from the Association of Computing Machinery and the Association of Information Technology Professionals. The document also discusses three levels of computer ethics: pop, para, and theoretical. Overall, the document provides guidelines for ethical behavior and responsibilities of IT professionals.
This document discusses various codes of ethics for IT professionals and computing in general. It outlines 10 commandments for ethical computer use, as well as codes from the Association of Computing Machinery and the Association of Information Technology Professionals. The document also discusses three levels of computer ethics: pop, para, and theoretical. Overall, the document provides guidelines for ethical behavior and responsibilities of IT professionals.
This document discusses various codes of ethics for IT professionals and computing in general. It outlines 10 commandments for ethical computer use, as well as codes from the Association of Computing Machinery and the Association of Information Technology Professionals. The document also discusses three levels of computer ethics: pop, para, and theoretical. Overall, the document provides guidelines for ethical behavior and responsibilities of IT professionals.
COMPUTING standard through continuing profession in order to enhance the IT profession. Chapter 2: Computer Ethics Computer Ethics Professional Code of Ethics What is your own understanding of Computer Ethics? It is a set of guidelines which are designed to set What are the problems in Computer Ethics? out acceptable behaviour of member of a particular group, association or profession.
Benefits of Ethical Guidelines
1. Ethical Decision Making 2. High Standards of Practice and Ethical Behavior 3. Trust and Respect from the General Public 4. Evaluation Benchmark
Code of Ethics of the Filipino IT Professionals
Three “Levels” of Computer Ethics 1. I will promote public knowledge, understanding a. “pop” computer ethics and appreciation of I.T b. “para” computer ethics c. “theoretical” computer ethics 2. I will consider the general welfare and public welfare and public good in the performance of my Moral Responsibilities of Computer Professionals work. a) Do good or cause harm b) Enable others to do good or cause harm 3. I will advertise goods or professional services in c) Influence others to do good or cause harm a clear and truthful manner Code of Ethics of Association of Information 4. I will comply and strictly abide by the intellectual Technology Professionals (AITP) property laws, patent laws and other related laws in respect of I.T 1. I have an obligation to Management 5. I will accept the full responsibility for the work 2. That I have an obligation to my fellow undertaken and utilize my skills with competence members and professionalism. 3. That I have an obligation to society 6. I will make truthful statements on my areas of competence as well as the capabilities and 4. That I have an obligation to my College or qualities of my product and services University 7. I will not disclose or use any confidential 5. That I have an obligation to my country information obtained in course of professional duties without the consent of the parties 6. I accept these obligations concerned except when required by the laws.
8. I will strive to attain the highest quality in both
the products and services that offer.
9. I will knowingly participate in the development
of the Information Technology. Principles of the Association of Computing Machineries Principle 1: Public Principle 2: Client and Employer Principle 3: Product Principle 4: Judgment Principle 5: Management Principle 6: Profession Principle 7: Colleagues Principle 8: Self
The Ten Commandments of Computer Ethics
Defined by the Computer Ethics Institute that will
serve as a moral guideline in the use of computers.
1. THOU SHALT NOT USE A COMPUTER TO HARM
OTHER PEOPLE
2. THOU SHALT NOT INTERFERE WITH OTHER
PEOPLE'S COMPUTER WORK
3. THOU SHALT NOT SNOOP AROUND IN OTHER
PEOPLE'S COMPUTER FILES
4. THOU SHALT NOT USE A COMPUTER TO STEAL
5. THOU SHALT NOT USE A COMPUTER TO BEAR
FALSE WITNESS
6. THOU SHALT NOT COPY OR USE PROPRIETARY
SOFTWARE FOR WHICH YOU HAVE NOT PAID
7. THOU SHALT NOT USE OTHER PEOPLE'S
COMPUTER RESOURCES WITHOUT AUTHORIZATION OR PROPER COMPENSATION
8. THOU SHALT NOT APPROPRIATE OTHER
PEOPLE'S INTELLECTUAL OUTPUT
9. THOU SHALT THINK ABOUT THE SOCIAL
CONSEQUENCES OF THE PROGRAM YOU ARE WRITING OR THE SYSTEM YOU ARE DESIGNING
10. THOU SHALT ALWAYS USE A COMPUTER IN
WAYS THAT INSURE CONSIDERATION AND RESPECT FOR YOUR FELLOW HUMANS