10 Commandments of Computer Ethics

By: Jared Schumacher

#1- Thou shalt not use a computer to harm other people.

You shouldn't use a computer to bring harm to another person, for example, exposing someones social security number to the internet.

#2- Thou shalt not interfere with other people's computer work.

If someone is working on something, you have no right to do anything with, or to that persons work.

#3- Thou shalt not snoop around in other people's computer files.

If you were to gain access to an account, of file that wasn't yours, you should not go looking through that persons files.

#4- Thou shalt not use a computer to steal.

It is against the law to steal anything, that means it is also illegal to use a computer to take something that isn't yours.

#5- Thou shalt not use a computer to bear false witness.

You should not use a computer to make false evidence against another person, especially in a court situation.

#6- Thou shalt not copy or use proprietary software for which you have not paid.

Stealing software is no different than stealing an iPad. If you want the item, pay for it.

#7- Thou shalt not use other people's computer resources without authorization or proper compensation.

You should not use someone else's equipment, to make a personal gain. For example, if you use all of somebody's printer ink, buy them a new cartridge, or just ask to use the printer before you print your things.

#8- Thou shalt not appropriate other people's intellectual output.

If you copy someone else's work, code, program, ect... you are committing internet piracy.

#9- Thou shalt think about the social consequences of the program you are writing or the system you are designing.

You should keep in mind that you are putting your product out on the internet and that not everybody will use your product for what you intended it to be used for.

#10- Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans.

You should take into consideration that most things you do on the internet will have an effect on somebody else. For example, if you leak credit card information, the victims will have to get new cards.