SlideShare a Scribd company logo
1 of 12
Computer Ethics

  Code of Ethics
Computer Ethics
• deals with how computing professionals
  should make decisions regarding professional
  and social conduct.
Ten Commandments of Computer
              Ethics
• Commandment - an instruction; a
  requirement

• Ethics – a code of conduct on how a person
  should live
1. You shall not use a computer to harm other
   people
  – Intentionally interfering with other people’s work
  – Invading the privacy of individuals
2. You shall not interfere with other people's
computer work
  – Degrading or disrupting equipment, software, or
    system performance.
  – Using resources to interfere with the proper
    operation of any computer, or destroy data.
  – Intentionally interfering with other people’s work
  – Invading the privacy of individuals
3. You shall not snoop around in other people's
computer files.
  – Using an account owned by another user, or
    allowing another user to access your account.
  – Invading the privacy of individuals
4. You shall not use a computer to steal.
  – Using resources in any manner that breaks the law
    or violates company policy. This can include the
    unauthorised copying or transmission of software
5. You shall not use a computer to bear false
witness.
  – You should not be responsible for creating or
    forwarding “chain” letters.
  – You should not download, store, print, or
    distributing files or messages that are profane,
    obscene, threatening, or that use language that
    offends or is aimed at degrading others.
6. You shall not copy or use proprietary software
for which you have not paid.
  – You should not use resources in any manner that
    violates company policy or breaks the law,
    including the Copyright, Designs and Patents Act.
    This means that you should not be copying or
    transmitting software for which you do not have a
    licence
7. You shall not use other people's computer
resources without authorisation or proper
compensation.
  – You should not try to pass off information
    obtained via the Internet or as part of your
    working life as your own. You should always give
    proper credit to the source.
  – You should not post personal communication
    without the original author’s consent.
8. You shall not appropriate other people's
intellectual output.
  – Posting personal communication without the
    original author’s consent.
  – Using information obtained through network and
    computer resources without giving proper credit
    to the source (plagiarism).
9. You shall think about the social consequences
of the program you are writing or the system
you are designing.
  – Downloading, storing, printing, or distributing files
    or messages that are profane, obscene,
    threatening, or that use language that offends or
    tends to degrade others.
10. You shall always use a computer in ways that
show consideration and respect for your fellow
humans.
  – Downloading, storing, printing, or distributing files
    or messages that contain information considered
    dangerous to the public at large.

More Related Content

What's hot

Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
guest65a1c4
 
Ten commandments
Ten commandmentsTen commandments
Ten commandments
lsanford84
 
Presentation1.Ppt Email And Internet
Presentation1.Ppt Email And InternetPresentation1.Ppt Email And Internet
Presentation1.Ppt Email And Internet
aggregate
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
lorensr12
 

What's hot (20)

Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Ten commandments
Ten commandmentsTen commandments
Ten commandments
 
Presentation1.Ppt Email And Internet
Presentation1.Ppt Email And InternetPresentation1.Ppt Email And Internet
Presentation1.Ppt Email And Internet
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
computer ethics
computer ethicscomputer ethics
computer ethics
 
Internet Ethics
Internet EthicsInternet Ethics
Internet Ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
 
Advantages of disadvantages of using the computer
Advantages of disadvantages of using the computerAdvantages of disadvantages of using the computer
Advantages of disadvantages of using the computer
 
Computer, E-mail and Internet Usage Policy and Procedure
Computer, E-mail and Internet Usage Policy and ProcedureComputer, E-mail and Internet Usage Policy and Procedure
Computer, E-mail and Internet Usage Policy and Procedure
 
The ten commandments of computer ethics
The ten commandments of computer ethicsThe ten commandments of computer ethics
The ten commandments of computer ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
ethical legal issues
ethical legal issuesethical legal issues
ethical legal issues
 
Cyber forensics ppt
Cyber forensics pptCyber forensics ppt
Cyber forensics ppt
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Super computer ppt
Super computer pptSuper computer ppt
Super computer ppt
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 2 - The Sys...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 2 - The Sys...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 2 - The Sys...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 2 - The Sys...
 

Viewers also liked

Computer Ethics in Digital Resources
Computer Ethics in Digital ResourcesComputer Ethics in Digital Resources
Computer Ethics in Digital Resources
b5thom
 
The ethics of software engineering
The ethics of software engineeringThe ethics of software engineering
The ethics of software engineering
jndatirwa
 
Computers and the workplace
Computers and the workplaceComputers and the workplace
Computers and the workplace
kmodasia
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
katespeach
 
Professional Code of Ethics in Software Engineering
Professional Code of Ethics in Software EngineeringProfessional Code of Ethics in Software Engineering
Professional Code of Ethics in Software Engineering
Lemi Orhan Ergin
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
Kak Yong
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
Jagan Nath
 
06 professional ethics & code of ethics
06 professional ethics & code of ethics06 professional ethics & code of ethics
06 professional ethics & code of ethics
Nimantha Perera
 

Viewers also liked (19)

Autonomous robots report
Autonomous robots reportAutonomous robots report
Autonomous robots report
 
Computer Ethics in Digital Resources
Computer Ethics in Digital ResourcesComputer Ethics in Digital Resources
Computer Ethics in Digital Resources
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
7 laptop repair
7 laptop repair7 laptop repair
7 laptop repair
 
Software Engineering Ethics
Software Engineering EthicsSoftware Engineering Ethics
Software Engineering Ethics
 
The ethics of software engineering
The ethics of software engineeringThe ethics of software engineering
The ethics of software engineering
 
Computers and the workplace
Computers and the workplaceComputers and the workplace
Computers and the workplace
 
Computer ethics in the workplace (industry)
Computer ethics in the workplace (industry)Computer ethics in the workplace (industry)
Computer ethics in the workplace (industry)
 
Software Engineering code of ethics and professional practice of IEEE
Software Engineering code of ethics and professional practice of IEEESoftware Engineering code of ethics and professional practice of IEEE
Software Engineering code of ethics and professional practice of IEEE
 
SE_Lec 10_ Software Code of Ethics
SE_Lec 10_ Software Code of EthicsSE_Lec 10_ Software Code of Ethics
SE_Lec 10_ Software Code of Ethics
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Professional Code of Ethics in Software Engineering
Professional Code of Ethics in Software EngineeringProfessional Code of Ethics in Software Engineering
Professional Code of Ethics in Software Engineering
 
Code of Ethics
Code of EthicsCode of Ethics
Code of Ethics
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Code of ethics
Code of ethicsCode of ethics
Code of ethics
 
06 professional ethics & code of ethics
06 professional ethics & code of ethics06 professional ethics & code of ethics
06 professional ethics & code of ethics
 
Professional ethics presentation
Professional ethics presentationProfessional ethics presentation
Professional ethics presentation
 
Code of ethics ppt
Code of ethics pptCode of ethics ppt
Code of ethics ppt
 

Similar to 7 computer ethics

the lesson about the information and communication to technology
the lesson about the information and communication to technologythe lesson about the information and communication to technology
the lesson about the information and communication to technology
lcnemedez
 
Computer Ethics By Anas Habib
Computer Ethics By Anas HabibComputer Ethics By Anas Habib
Computer Ethics By Anas Habib
AnasHabib23
 
Issues with computers
Issues with computersIssues with computers
Issues with computers
ayerssaa
 

Similar to 7 computer ethics (20)

the lesson about the information and communication to technology
the lesson about the information and communication to technologythe lesson about the information and communication to technology
the lesson about the information and communication to technology
 
why ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptxwhy ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptx
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
TEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptxTEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptx
 
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in Computing
 
COMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptxCOMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptx
 
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
Computer Ethics By Anas Habib
Computer Ethics By Anas HabibComputer Ethics By Anas Habib
Computer Ethics By Anas Habib
 
Issues with computers
Issues with computersIssues with computers
Issues with computers
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
erasmusgroup2-160126193027 (4).pdf
erasmusgroup2-160126193027 (4).pdferasmusgroup2-160126193027 (4).pdf
erasmusgroup2-160126193027 (4).pdf
 
Erasmus+ group 2
Erasmus+ group 2Erasmus+ group 2
Erasmus+ group 2
 
Draft Computer Acceptable Use Policy
Draft Computer Acceptable Use PolicyDraft Computer Acceptable Use Policy
Draft Computer Acceptable Use Policy
 
Chapter 8.legal. opportunities
Chapter 8.legal. opportunitiesChapter 8.legal. opportunities
Chapter 8.legal. opportunities
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Computer Lab Management and Ethics in Using Computer
Computer Lab Management and Ethics in Using ComputerComputer Lab Management and Ethics in Using Computer
Computer Lab Management and Ethics in Using Computer
 

More from Rheigh Henley Calderon

8 problem solving with the case logic structure
8 problem solving with the case logic structure8 problem solving with the case logic structure
8 problem solving with the case logic structure
Rheigh Henley Calderon
 
5 problem solving with the sequential logic structure
5 problem solving with the sequential logic structure5 problem solving with the sequential logic structure
5 problem solving with the sequential logic structure
Rheigh Henley Calderon
 
4 introduction to programming structure
4 introduction to programming structure4 introduction to programming structure
4 introduction to programming structure
Rheigh Henley Calderon
 
2 beginning problem solving concepts for the computer
2 beginning problem solving concepts for the computer2 beginning problem solving concepts for the computer
2 beginning problem solving concepts for the computer
Rheigh Henley Calderon
 
1 introduction to problem solving and programming
1 introduction to problem solving and programming1 introduction to problem solving and programming
1 introduction to problem solving and programming
Rheigh Henley Calderon
 

More from Rheigh Henley Calderon (20)

10 data structures
10 data structures10 data structures
10 data structures
 
9 processing arrays
9 processing arrays9 processing arrays
9 processing arrays
 
8 problem solving with the case logic structure
8 problem solving with the case logic structure8 problem solving with the case logic structure
8 problem solving with the case logic structure
 
7 problem solving with loops
7 problem solving with loops7 problem solving with loops
7 problem solving with loops
 
6 problem solving with decisions
6 problem solving with decisions6 problem solving with decisions
6 problem solving with decisions
 
5 problem solving with the sequential logic structure
5 problem solving with the sequential logic structure5 problem solving with the sequential logic structure
5 problem solving with the sequential logic structure
 
4 introduction to programming structure
4 introduction to programming structure4 introduction to programming structure
4 introduction to programming structure
 
3 programming concepts
3 programming concepts3 programming concepts
3 programming concepts
 
2 beginning problem solving concepts for the computer
2 beginning problem solving concepts for the computer2 beginning problem solving concepts for the computer
2 beginning problem solving concepts for the computer
 
1 introduction to problem solving and programming
1 introduction to problem solving and programming1 introduction to problem solving and programming
1 introduction to problem solving and programming
 
9 technical support
9 technical support9 technical support
9 technical support
 
8 customer service
8 customer service8 customer service
8 customer service
 
6 laptop basics
6 laptop basics6 laptop basics
6 laptop basics
 
5 pc maintenance
5 pc maintenance5 pc maintenance
5 pc maintenance
 
4 pc repair
4 pc repair4 pc repair
4 pc repair
 
3 pc upgrade
3 pc upgrade3 pc upgrade
3 pc upgrade
 
2 pc assembly
2 pc assembly2 pc assembly
2 pc assembly
 
1 hardware fundamentals
1 hardware fundamentals1 hardware fundamentals
1 hardware fundamentals
 
8 cyber crimes
8 cyber crimes8 cyber crimes
8 cyber crimes
 
6 professional ethics
6 professional ethics6 professional ethics
6 professional ethics
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

7 computer ethics

  • 1. Computer Ethics Code of Ethics
  • 2. Computer Ethics • deals with how computing professionals should make decisions regarding professional and social conduct.
  • 3. Ten Commandments of Computer Ethics • Commandment - an instruction; a requirement • Ethics – a code of conduct on how a person should live
  • 4. 1. You shall not use a computer to harm other people – Intentionally interfering with other people’s work – Invading the privacy of individuals
  • 5. 2. You shall not interfere with other people's computer work – Degrading or disrupting equipment, software, or system performance. – Using resources to interfere with the proper operation of any computer, or destroy data. – Intentionally interfering with other people’s work – Invading the privacy of individuals
  • 6. 3. You shall not snoop around in other people's computer files. – Using an account owned by another user, or allowing another user to access your account. – Invading the privacy of individuals 4. You shall not use a computer to steal. – Using resources in any manner that breaks the law or violates company policy. This can include the unauthorised copying or transmission of software
  • 7. 5. You shall not use a computer to bear false witness. – You should not be responsible for creating or forwarding “chain” letters. – You should not download, store, print, or distributing files or messages that are profane, obscene, threatening, or that use language that offends or is aimed at degrading others.
  • 8. 6. You shall not copy or use proprietary software for which you have not paid. – You should not use resources in any manner that violates company policy or breaks the law, including the Copyright, Designs and Patents Act. This means that you should not be copying or transmitting software for which you do not have a licence
  • 9. 7. You shall not use other people's computer resources without authorisation or proper compensation. – You should not try to pass off information obtained via the Internet or as part of your working life as your own. You should always give proper credit to the source. – You should not post personal communication without the original author’s consent.
  • 10. 8. You shall not appropriate other people's intellectual output. – Posting personal communication without the original author’s consent. – Using information obtained through network and computer resources without giving proper credit to the source (plagiarism).
  • 11. 9. You shall think about the social consequences of the program you are writing or the system you are designing. – Downloading, storing, printing, or distributing files or messages that are profane, obscene, threatening, or that use language that offends or tends to degrade others.
  • 12. 10. You shall always use a computer in ways that show consideration and respect for your fellow humans. – Downloading, storing, printing, or distributing files or messages that contain information considered dangerous to the public at large.