tablets

TEN COMMANDMENTS OF COMPUTER ETHICS


1. THOU SHALT NOT USE A COMPUTER TO HARM OTHER PEOPLE.

2. THOU SHALT NOT INTERFERE WITH OTHER PEOPLE'S COMPUTER WORK.

3. THOU SHALT NOT SNOOP AROUND IN OTHER PEOPLE'S COMPUTER FILES.

4. THOU SHALT NOT USE A COMPUTER TO STEAL.

5. THOU SHALT NOT USE A COMPUTER TO BEAR FALSE WITNESS.

6. THOU SHALT NOT COPY OR USE PROPRIETARY SOFTWARE FOR WHICH YOU HAVE NOT PAID.

7. THOU SHALT NOT USE OTHER PEOPLE'S COMPUTER RESOURCES WITHOUT AUTHORIZATION OR PROPER COMPENSATION.

8. THOU SHALT NOT APPROPRIATE OTHER PEOPLE'S INTELLECTUAL OUTPUT.

9. THOU SHALT THINK ABOUT THE SOCIAL CONSEQUENCES OF THE PROGRAM YOU ARE WRITING OR THE SYSTEM YOU ARE DESIGNING.

10. THOU SHALT ALWAYS USE A COMPUTER IN WAYS THAT INSURE CONSIDERATION AND RESPECT FOR YOUR FELLOW HUMANS.


COMPUTER ETHICS INSTITUTE
11 Dupont Circle, NW Suite 900
Washington, DC 20036
Tel. (202) 939-3707
Fax (202) 797-7806

The Institute gives full permission to copy and use these commandments, with the request that the source be acknowledged.


Commentary on the 'Ten Commandments for Computer Ethics' by N. Ben Fairweather, The Centre for Computing and Social Responsibility, United Kingdom.


Last updated 99/02/10
J.A.N. Lee, Virginia Tech.
World Map
Return to the World Codes Index Page