Ten Commandments of Computer Ethics

50 %
50 %
Information about Ten Commandments of Computer Ethics
Science-Technology

Published on September 9, 2009

Author: quench

Source: authorstream.com

Port Byron Central SchoolPort Byron NY : Port Byron Central SchoolPort Byron NY Computer Ethics Presentation September 2003 Ten Commandmentsof Computer Ethics : Ten Commandmentsof Computer Ethics Commandment: an instruction; a requirement Ethics: a code of conduct; how a person should live. 1.) You shall not use a computer to harm other people. : 1.) You shall not use a computer to harm other people. Intentionally interfering with other people’s work Invading the privacy of individuals 2.) You shall not interfere with other people's computer work. : 2.) You shall not interfere with other people's computer work. Degrading or disrupting equipment, software, or system performance. Using resources to interfere with the proper operation of any computer, or destroy data. Intentionally interfering with other people’s work Invading the privacy of individuals 3.) You shall not snoop around in other people's computer files. : 3.) You shall not snoop around in other people's computer files. Using an account owned by another user, or allowing another user to access your account. (Any problems which arise from the misuse of a user’s password will be that user’s responsibility.) Invading the privacy of individuals 4.) You shall not use a computer to steal. : 4.) You shall not use a computer to steal. Using resources in any manner that violates Board policy, federal, state, or local law including unauthorized copying or transmission of software. 5.) You shall not use a computer to bear false witness. : 5.) You shall not use a computer to bear false witness. Initiating or forwarding “chain” letters. Downloading, storing printing, or distributing files or messages that are profane, obscene, threatening, or that use language that offends or tends to degrade others. Urban Legends (e.g. kidney transplants) Unproven rumors (e.g. free coca cola) 6.) You shall not copy or use proprietary software for which you have not paid. : 6.) You shall not copy or use proprietary software for which you have not paid. Using resources in any manner that violates Board policy, federal, state, or local law including unauthorized copying or transmission of software. 7.) You shall not use other people's computer resources without authorization or proper compensation. : 7.) You shall not use other people's computer resources without authorization or proper compensation. Using information obtained through network and computer resources without giving proper credit to the source (plagiarism). Posting personal communication without the original author’s consent. 8.) You shall not appropriate other people's intellectual output. : 8.) You shall not appropriate other people's intellectual output. Posting personal communication without the original author’s consent. Using information obtained through network and computer resources without giving proper credit to the source (plagiarism). 9.) You shall think about the social consequences of the program you are writing or the system you are designing. : 9.) You shall think about the social consequences of the program you are writing or the system you are designing. Initiating or forwarding “chain” letters. Downloading, storing, printing, or distributing files or messages that are profane, obscene, threatening, or that use language that offends or tends to degrade others. 10.) You shall always use a computer in ways that show consideration and respect for your fellow humans. : 10.) You shall always use a computer in ways that show consideration and respect for your fellow humans. Downloading, storing, printing, or distributing files or messages that contain information considered dangerous to the public at large. District policy states that: : District policy states that: A filtering device is in place to remove inappropriate materials. This filter also monitors all Internet activity, and, network activity. Like your locker, access is a privilege, not a right. District officials or system administrators for any reason whatsoever may access all computerized files. The district may disable a user’s account at any time for inappropriate or irresponsible behavior. The building administrator will determine penalties. FURTHERMORE… : FURTHERMORE… Student access is to take place only under direct supervision of a responsible member of the school district’s instructional staff. Use is limited to educational purposes that are directly related to the curriculum which you are studying. No software from outside sources may be loaded or used without written permission from the Technology Coordinator. Photos on the Web : Photos on the Web Web pages may include only the first name and the initial of the student’s last name. Use of individual student pictures (video or still), including teacher’s individual web pages must have a signed parent/guardian approval on file with the Technology Coordinator for all students under 18 years of age. Group pictures may be published without approval if names are omitted. Personal information about employees may be published only with their written permission. CHAT and E-MAIL : CHAT and E-MAIL Student users will not be allowed to join chat groups or discussion groups unless it is for a specific educational purpose and written permission from a parent/guardian and a staff member is obtained. The staff member will directly supervise student participation and ensure that the student unsubscribes when the purpose for the use is over. Use of free e-mail accounts (yahoo, hotmail, etc.) is prohibited by students and staff. PENALTIES : PENALTIES Depending on the nature and severity of a violation, a Building Administrator will take disciplinary action. Parent contact is required. If warranted, the administrator shall refer the case to an appropriate school, local, state, or federal authority for disposition. If appropriate, access rights to technology will be denied immediately. Responsibility for costs and damages may be incurred. References : References “Ten Commandments of Computer Ethics”. (http://courses.cs.vt.edu/~cs3604/lib/WorldCodes/10.Commandments.html) Computer Ethics Institute, Washington DC. (7 July 2003). Port Byron Central School District Technology Code of Conduct for Students. (Adopted July 2000.)

Add a comment

Related presentations

Related pages

CPSR - The Ten Commandments of Computer Ethics

From the Computer Ethics Institute, a project of the Brookings Institution.
Read more

Computer Ethics Institute

Ten Commandments of Computer Ethics Created by the Computer Ethics Institute (Please Cite the Computer Ethics Institute if you quote us) 1. Thou Shalt Not ...
Read more

Ten Commandments of Computer Ethics - Wikipedia

The Ten Commandments of Computer Ethics were created in 1992 by the Computer Ethics Institute. The commandments were introduced in the paper "In Pursuit of ...
Read more

The Ten Commandments of Computer Ethics

The Ten Commandments of Computer Ethics 1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people's computer work.
Read more

The Ten Commandments of Computer Ethics

Commentary on the 'Ten Commandments for Computer Ethics' by N. Ben Fairweather, The Centre for Computing and Social Responsibility, United Kingdom.
Read more

Ten Commandments of Computer Ethics - Cyber Citizen

The Computer Ethics Institute offers the Ten Commandments of Computer Ethics to help reinforce acceptable online behavior. Thou shalt not use a computer to ...
Read more

Ten Commandments of Computer Ethics - YouTube

The Computer Ethics Institute defined Ten Commandments of computer ethics that the students should follow.. Did this for our project in CS101 ...
Read more

Computer Ethics - Bowling Green State University

4 BASIC NETIQUETTE cont... The Ten Commandments for Computer Ethics (Care of the Computer Ethics Institute of the Brookings Institution) 1. Thou shall not ...
Read more