Professional Documents
Culture Documents
MONTHLY NEWS
INFORMATION AND
PRIVACY
The Internet is a veritable smorgasbord of
personal information. If you need someone's
phone number, you look it up. If you need to
learn more about a company, you visit the
website. If you want to find an old friend,
you use social networking. The sheer amount
of personal information make it easy to
breach the boundary between using the
Internet for learning and information and
using the Internet to invade another's
COMPUTER CRIME privacy. You can protect yourself by being
vague about yourself online and ensuring
The availability of information that can be your identity is ambiguous and nonspecific.
accessed with a computer paired with a lax
attitude toward security means credit card
numbers and identities are constantly at risk.
Entering your credit card on a seemingly
innocuous website may seem like an everyday
activity, but that site could be a clever scam
designed to fraud you out of your hard-earned
money. While the amount and extent of
computer crime is frightening, it's a reality and
therefore it's necessary for consumers to protect
themselves by purchasing from trusted retailers
or using third-party payment services to protect
their money.
Computers have completely altered the way Certain items of media, such as public
humans interact with each other. With the domain books, movies and music, are
invention of electronic mail, online messaging available for all to enjoy and even download.
and social networking sites, face-to-face Items of media which are copyrighted are not
conversation seems to be a dying art. Because in the public domain and downloading and
the communication landscape has changed over distributing them is illegal. Unfortunately,
time, so have the challenges and ethics that online piracy is widespread and notoriously
accompany proper communication, such as difficult to prosecute, so it often goes without
discussing certain issues via email, exchanging consequence. The same could be said for
personal information without the proper plagiarism, which is made easier to do and
security and forming relationships online. harder to track with the number of resources
online.
NOVEMBER 2017 | VOL.1
CODE OF ETHICS
The code of computer ethics, also called the Ten
Commandments, instructs users to not harass
other users, use computers to spy or use
computers to gain access to private information.
The ethics prevent the taking of intellectual
information without compensation and prevent
users from using computing resources without
compensation or authorization. The ethics also
mandate the use of machines in a manner
considerate and respectful of others. Examples
of computer ethics include not using a computer
to steal or to harm others, especially by
avoiding the spread of computer viruses and
shunning plagiarism of computer software.
Computer ethics also involve avoiding
unauthorized access to computer systems and
preserving the confidentiality and privacy of
data in computers.
WHY DO WE NEED A CODE OF
ETHICS?
A code of ethics is necessary because it allows
THE TEN COMMANDMENTS: individuals to know what is expected of them as
acceptable behaviour. It provides guidelines on
making decisions that are in line with the goals of
1. Thou shalt not use a computer to harm
the organization. Regardless of the size of
other people.
business, a code of ethics is a necessary tool for any
2. Thou shalt not interfere with other
business looking to succeed. The values and morals
peoples computer work.
incorporated into a code of ethics should be well
3. Thou shalt not snoop around in other
thought out to ensure that the desired results are
peoples computer files.
achieved. A successful code of ethics will translate
4. Thou shalt not use a computer to steal
into a positive reputation for the organization,
5. Thou shalt not use a computer to bear
which increases business for a company. A code of
false witness.
ethics improves the business's reputation, and it
6. Thou shalt not copy or use proprietary
holds the employees and management accountable.
software for which you have not paid
It is important to provide employees a guideline of
(without permission).
what the company considers right and wrong.
7. Thou shalt not use other peoples
Without a code of ethics, there can be
computer resources without
misunderstandings as to what is acceptable. If
authorization or proper compensation.
there are no standards in place, it can be very
8. Thou shalt not appropriate other peoples
difficult to hold employees responsible for
intellectual output.
behaviour that negatively impacts business. Every
9. Thou shalt think about the social
employee's decision can impact the business either
consequences of the program you are
positively or negatively. By implementing a code
writing or the system you are designing.
of ethics that reflects a company's views, many of
10. Thou shalt always use a computer in
the decisions that are made by employees will
ways that ensure consideration and
positively affect the business.
respect for your fellow humans.
NOVEMBER 2017 | VOL.1
REFERENCES
https://www.techopedia.com/definition/5499/computer-ethics
http://courses.cs.vt.edu/professionalism/WorldCodes/10.Commandments.html
http://www.encyclopedia.com/history/biographies/panama-history-biographies/computer-ethics
https://sites.google.com/site/computerethics96/main-points/examples-of-computer-ethics
https://www.buzzle.com/articles/importance-of-computer-ethics.html
https://computerethics101.weebly.com/types-of-computer-ethics.html