Module 1: professional ethics I. Principles of professional ethics


Thou shalt not interfere with other people's computer work



Download 3.36 Mb.
View original pdf
Page22/48
Date13.09.2023
Size3.36 Mb.
#62048
1   ...   18   19   20   21   22   23   24   25   ...   48
CpELaws Midterm
2. Thou shalt not interfere with other people's computer work.
Computer networks grant people access to the other people’s computers. Unscrupulous individuals not only look at what is stored in their neighbour’s computers they also alter them, whether in minute or unnoticeable ways or in ways those are really destructive. Any form of alteration of someone else’s computer work is considered unethical practice.
3. Thou shalt not snoop around in other people's files.
Computer users sometimes surf even private domains just to satisfy their curiosity. Even though you just browse without copying or altering, the facts, those files are private and should not be read without the owner’s permission.
4. Thou shalt not use a computer to steal.
There area number of movies depicting crimes perpetrated through computer technology—crimes such as counterfeiting signatures, debugging programs, and breaking codes and passwords in order to penetrate computer systems. The computer has the capacity to facilitate theft and robbery especially in banks. However, the technology used does not change the fact that the act is one of theft and robbery, and therefore illegal.
5. Thou shalt not use a computer to bear false witness.
Computers and their applications can be utilized by certain people to facilitate the commission of fraud (deception/fake) and to circulate false information—both unethical actions.
6. Thou shalt not copy or use propriety software for which you have not paid.
This pertains to piracy of software and other programs. The proliferation of pirated software has severely affected the sale of licensed programs. In Asia, and in the Philippines, trading of pirated software and CDs abound. If you support piracy, you also support theft and infringement of intellectual property rights.
7. Thou shalt not use other people's computer resources without authorization or proper
compensation.
Highly resourceful (and unscrupulous) computer users can penetrate websites and debug programs, and thus assume other people’s computer IDs and resources. This practice violates the norm of honesty and integrity.

Download 3.36 Mb.

Share with your friends:
1   ...   18   19   20   21   22   23   24   25   ...   48




The database is protected by copyright ©ininet.org 2024
send message

    Main page