Ten Commandments of Computer Ethics

Download Report

Transcript Ten Commandments of Computer Ethics

Port Byron Central School
Port Byron NY
Computer Ethics
Presentation
September 2003
Ten Commandments
of Computer Ethics
• Commandment: an instruction; a requirement
•Ethics: a code of conduct; how a person should live.
1.) You shall not use a computer to harm
other people.
• Intentionally interfering with other people’s
work
• Invading the privacy of individuals
2.) You shall not interfere with other people's
computer work.
• Degrading or disrupting equipment,
software, or system performance.
• Using resources to interfere with the proper
operation of any computer, or destroy data.
• Intentionally interfering with other people’s
work
• Invading the privacy of individuals
3.) You shall not snoop around in other
people's computer files.
• Using an account owned by another user, or
allowing another user to access your
account. (Any problems which arise from
the misuse of a user’s password will be that
user’s responsibility.)
• Invading the privacy of individuals
4.) You shall not use a computer to steal.
• Using resources in any manner that violates
Board policy, federal, state, or local law
including unauthorized copying or
transmission of software.
5.) You shall not use a computer to bear false
witness.
• Initiating or forwarding “chain” letters.
• Downloading, storing printing, or
distributing files or messages that are
profane, obscene, threatening, or that use
language that offends or tends to degrade
others.
• Urban Legends (e.g. kidney transplants)
• Unproven rumors (e.g. free coca cola)
6.) You shall not copy or use proprietary
software for which you have not paid.
• Using resources in any manner that violates
Board policy, federal, state, or local law
including unauthorized copying or
transmission of software.
7.) You shall not use other people's computer
resources without authorization or proper
compensation.
• Using information obtained through
network and computer resources without
giving proper credit to the source
(plagiarism).
• Posting personal communication without
the original author’s consent.
8.) You shall not appropriate other people's
intellectual output.
• Posting personal communication without
the original author’s consent.
• Using information obtained through
network and computer resources without
giving proper credit to the source
(plagiarism).
9.) You shall think about the social
consequences of the program you are writing
or the system you are designing.
• Initiating or forwarding “chain” letters.
• Downloading, storing, printing, or
distributing files or messages that are
profane, obscene, threatening, or that use
language that offends or tends to degrade
others.
10.) You shall always use a computer in ways
that show consideration and respect for your
fellow humans.
• Downloading, storing, printing, or
distributing files or messages that contain
information considered dangerous to the
public at large.
District policy states that:
• A filtering device is in place to remove
inappropriate materials.
• This filter also monitors all Internet activity, and,
network activity. Like your locker, access is a
privilege, not a right. District officials or system
administrators for any reason whatsoever may
access all computerized files.
• The district may disable a user’s account at any
time for inappropriate or irresponsible behavior.
The building administrator will determine
penalties.
FURTHERMORE…
• Student access is to take place only under direct
supervision of a responsible member of the school
district’s instructional staff.
• Use is limited to educational purposes that are
directly related to the curriculum which you are
studying.
• No software from outside sources may be loaded
or used without written permission from the
Technology Coordinator.
Photos on the Web
• Web pages may include only the first name and
the initial of the student’s last name.
• Use of individual student pictures (video or still),
including teacher’s individual web pages must
have a signed parent/guardian approval on file
with the Technology Coordinator for all students
under 18 years of age. Group pictures may be
published without approval if names are omitted.
• Personal information about employees may be
published only with their written permission.
CHAT and E-MAIL
• Student users will not be allowed to join chat
groups or discussion groups unless it is for a
specific educational purpose and written
permission from a parent/guardian and a staff
member is obtained. The staff member will
directly supervise student participation and ensure
that the student unsubscribes when the purpose for
the use is over.
• Use of free e-mail accounts (yahoo, hotmail, etc.)
is prohibited by students and staff.
PENALTIES
• Depending on the nature and severity of a
violation, a Building Administrator will take
disciplinary action.
• Parent contact is required.
• If warranted, the administrator shall refer the case
to an appropriate school, local, state, or federal
authority for disposition.
• If appropriate, access rights to technology will be
denied immediately.
• Responsibility for costs and damages may be
incurred.
References
• “Ten Commandments of Computer Ethics”.
(http://courses.cs.vt.edu/~cs3604/lib/World
Codes/10.Commandments.html) Computer
Ethics Institute, Washington DC. (7 July
2003).
• Port Byron Central School District
Technology Code of Conduct for Students.
(Adopted July 2000.)