You are on page 1of 16

\

Unit 1: Industry in the Profession

Lesson Objectives:
At the end of the unit, the students should be able to:

 Identified computing hardware, software development and IT Services


industries.
 Explained the different jobs, functions, professions and careers in the field.
 Applied code of ethics for ICT professionals.

INTRODUCTION
The computer hardware, software and IT Services industry is a key example of knowledge production, as the
value of what a software company produces is almost entirely in the knowledge embodied in tis products and
services. It is a fast growing industry producing high value services for its customers. Although it is dominated
by firms based in major industrialized countries of the world, it continues to offer great prospects for economic
growth and industrial development within developing economies. Indeed, the software industry has become a
leading source of employment creation and economic growth in the world (Schware, 1995). In this lesson you
will learn about the scope and economics of these dynamic industries.

LESSON 1: HARDWARE, SOFTWARE AND IT SERVICES INDUSTRIES

LEARNING CONTENT
Is there a difference between the computer industry and the information technology industry?

Computer Industry encompasses those companies that


manufacture computers and components. It is also used more
broadly to include software publishers and peripheral device
manufacturers. (Ex. Apple, Dell, Hewllet-Packard, IBM and
Intel).
An even broader term. Information technology industry(or IT
industry), is used to refer to the companies that develop,
produce, sell, or support computers, software publishers,
communications service companies such as HP Enterprise
Services.

Is every company that uses computers part of the IT industry?


A bank uses computers to track money into and out of accounts, but it is classified as part of the banking industry.
Such business make use of information technology, but thy are definitely not part of the computer industry and
are not considered part of the IT Industry either.

1
Unit 1: Industry in the Profession

What kinds of companies are included in the IT Industry?

1. Equipment Manufacturers- design and manufacturer computer


hardware and communications products, such as personal
computers, mainframes, mice, monitors, storage devices, routers,
scanners, and printers. Examples of these companies include
Computer manufacturer. (IBM, Dell, Lenovo, and Hewlett-
Packard). Network hardware companies such as Cisco and its
subsidiary Linksys, are also examples of equipment
manufacturers.

2. Chipmakers- design and manufacturer computer chips and


circuit boards, including microprocessors, RAM, system boards,
sound cards, and graphics cards. Intel, Texas instruments, AMD,
and Taiwan Semiconductor are examples of chipmakers.

3. Software Publishers create computer software including


applications, operating systems, and programming languages.
Examples of software companies include Microsoft, Adobe
Systems Oracle Corporation, Electronic Arts, and Computer
Associates(CA).\

4. IT Service Companies- provide computer related services,


including business consulting, web site design, web hosting,
internet connections, computer equipment repair network
security and product support. Classic examples of service
companies include AOL, Google, and the computer consulting
giant Accenture.

2
Unit 1: Industry in the Profession

5. Computer Retailers- include companies that sell computer


products through retail stores, direct sales representatives, mail
order catalogs, and web sites. Well known computer reseller
include CompUSA which operates retail stores, and mail-order
retailers PC Connection and CDW.

What about dot.coms


The 1990s spawned a group of internet- based companies that came to be called dot.com moniker came from
the companies, domain names, which inevitably ended with .com,
many of the companies even incorporated .com into their –official
company names.
Amazon.com was one of the first internet based companies.
Unless a dot.com sells computers, peripherals, or software online, it is probably not considered part of the
computer industry; but experts disagree on whether dot.com rightfully belong to the IT industry.

What is the significance of Silicon Valley?


The area of California called Silicon Valley stretches south and the east from San Francisco Golden Gate Bridge
was the birthplace of integrated circuits, microprocessors, and personal computers.
Today well-known companies, such as Cisco Systems, Sun Microsystems, Google, Apple, Symantec, AMD,
Oracle, and HP, all have headquarters in our near California’s silicon valley. Although Silicon Valley has a
reputation as the home of the IT industry, many top IT players are located elsewhere.

What are outsourcing and offshoring?


Outsourcing – is defined as the use of components or labor from outside suppliers.
Offshoring- another technique used by companies to help keep product prices competitive. It is defined as
relocating business processes, such as development and production, to lower-cost locations in other countries.
Computer manufacturer Dell Inc. maintains a team of offshore technicians to staff customer call centers. It is
common now to dial technical support and be connected to a technician on the other side of the world.
Where can I find information about the IT Industry?
Print:

 PC World
 Macworld
 Wired
 CPU
 Mac/Life
 Smart Computing
On the Web:

3
Unit 1: Industry in the Profession
 PC Magazine
 CNET News
 InformationWeek
 InfoWorld
 Wired
 ZDNet

The IT industry has been described as the most dynamic, most prosperous, most economically beneficial
industry the world has ever known. IT industry has unquestionably fueled the economies of many countries.
Worldwide, consumers spend more than $1 trillion on information technology each year.

What about the U.S. IT Industry?


In U.S. the IT Industry has had its ups and downs. IBM stock, once a staple of retirement portfolios, was all but
abandoned during a dot-com bubble that began in the late 1990s.
The high rate of dot.com business failures during 2001 and 2002 was a tough jolt of reality for many
stockholders. It affected a wide swath of the economy.
Nonetheless, strength in worldwide markets for IT equipment and services continued to buoy up the industry,
and teach stocks eventually re-emerged as attractive investment.

What does the future hold for the IT Industry?


Population growth and business globalization are two important factors that have contributed to past investments
in information technology. Keeping track of the information relating to all people certainly seems impossible
without the use of computers. Obtaining competitive tools can be a requirement for success, so information
technology would appear to have many potential customers in the expanding global business market.
Product Life Cycles
Two factors drive the development of new computer hardware products:
Marketing and Technology
Hardware manufacturers introduce new products are designed to attract customers and generate sales. New
hardware products can also generate sales and add-ons and accessories.
Example: WIFI Technology stimulated development of WIFI hubs and cards, enabled notebook computers,
internet access points in coffee shops and airports.

What are the stages in the life cycle of a typical hardware product?

 Product development
- Create product specifications and prototypes
 Product announcement
- Publicize information about new product features, advantages and projected price.

4
Unit 1: Industry in the Profession
 Introduction
- “Roll out” the product at a trade show or press conference, formalize the product list price.
 Maintenance
- Adjust manufacturing capacity to meet product demand.
 Retirement
- Discontinue manufacturing product and eventually discontinue product support.

How does the hardware life cycle affect me as a consumer?

LESSON 2: IT PROFESSIONS AND CAREER


LEARNING CONTENT
What kinds of jobs are available to computer professionals?

 System analyst
 Computer programmer
 Security specialist
 Database administrator
 Network specialist/administrator
 Computer Operator
 Technical Support Specialist Website Designer

System Analyst
Definition: Systems analysis is the process by which an individual (s) studies a system such that an information
system can be analyzed, modeled, and a logical alternative can be chosen
Role: A systems analyst is a person who uses analysis and design techniques to solve business problems using
information technology
Advantages: Enabling comprehension of complicated structures. Allowing for better management of any
business changes. Aligning the organization with its environment and strategic priorities.

Computer Programmer
Definition: Computer programmers write, modify, and test code and scripts that allow computer software and
applications to function properly. They turn the designs created by software developers and engineers into
instructions that a computer can follow.
Role: Programmers write code for computer programs and mobile applications. They also are involved in
maintaining, debugging and troubleshooting systems and software to ensure that everything is running smoothly.
Advantages:
*Creativity. There are no limits to the things that you can create when you have the ability to write computer
software. ...
*Problem Solving. ...

5
Unit 1: Industry in the Profession
*Work Remotely. ...
*Opportunities. ...
*Augmentation of Your Current Skill Set. ...
*Sense of Accomplishment.

Security Specialist
DEFINITION: Security specialists, also known as cybersecurity specialists, develop and implement security
measures that protect computer networks and systems. Companies often hire security specialists to secure
data networks, prevent security breaches, and make changes to improve security.
ROLE: Security Specialist administers, coordinates, and evaluates security programs that support the strategy,
policies, and standards established for the physical safety of all visitors, employees, or customers to the
organization's facilities and the security of property and assets.
ADVANTAGES: With cyber-attacks, data breaches and leakage of sensitive information on the rise, companies
and governments are placing more efforts on computer security than ever before. This is why computer security
specialists are in great demand at both corporations and at government agencies

Database Administrator
DEFINITION: Database administrators, often called DBAs, make sure that data analysts and other users
can easily use databases to find the information they need. They also ensure that systems perform as they
should by monitoring database operation and providing support.
ROLE: A database administrator ensures the security of a database. A database administrator ensures
integrity in the database, that is, they make sure that all the data stored in the database is not misplaced or
mismatched. A database administrator works to see if the database is always available and accessible.
ADVANTAGES:
*Speeds up Decision Making. ...
*Boosts Data Security and Integrity. ...
*Enhances Collaboration in the Company.

Network Specialist/Administrator
DEFINITION: Plans, install and maintains one or more local areas area networks area. This specialist also
provides networks accounts and access rights to approved users.
ROLE: Network Administrator's role is to ensure the stable operation of the computer networks. This includes
planning, developing, installing, configuring, maintaining, supporting, and optimizing all network hardware,
software, and communication links.

6
Unit 1: Industry in the Profession
ADVANTAGES: Network admins are trained to recognize areas that need improvement, enabling them to
improve a network's efficiency as well as its security. They are also informed of all the latest updates in software
that come out, meaning that they are able to ensure that a business's network remains updated at all times.
Computer Operator
DEFINITION: Works with system software for Network servers, mainframes, and super computers. They monitor
computer performance, install software patches and upgrades, perform backups, and restore data as necessary.
ROLE: Enforces operation and procedures and standards. Diagnoses hardware and software malfunctions and
takes remedial action. Monitors computer performance. Arranges for and supervises equipment maintenance
and repairs.
ADVANTAGES: Digital Computer Operator is responsible for managing computer resources efficiently and
provide a maximum response

Technical Support Specialist


DIFINITION: Troubleshoot hardware and software problems. Good interpersonal skills and patience are required
to this job.
ROLE: Provides technical support identifying, investigating, and resolving user’s problems with computer
software and hardware for problems that are beyond the expertise of Technical Support Representatives. Applies
knowledge of computer software, hardware, and procedures to solve problems.
ADVANTAGES: Technical support personnel are typically among the brightest technical professionals, and must
be ready to support other technology people, such as programmers, operators and hardware engineers.

Web Site Designer


DIFINITION: Creates, tests, posts, and modifies web pages. A good sense of design and artistic talent are
required for this job, along with an understanding of how people use graphical user interfaces.
ROLE: Responsible for designing the overall layout and aesthetic for websites. Their duties include coding
webpages or entire websites, meeting with clients to review website templates or refine their designs and running
tests to preview layouts and website features
ADVANTAGES: Increased Revenue. Simply put a strategically designed and engaging website will attract more
visitors and help convert those visitors into prospects. ...
Credibility. ...
Creates a Strong First Impression. ...
Better Google Rankings. ...
Minimize your Bounce Rate. ...
Brand Consistency.

DO COMPUTER PROFESSIONALS WORK OUTSIDE OF I.T INDUSTRY:

7
Unit 1: Industry in the Profession
In addition to jobs in I.T departments, computer professionals also find a work in companies that produce
computers hardware and software.
1. TECHNICAL WRITER- Creates documentation for large programming and writes the line or printed user
manuals that accompany computers, peripherals devices and software.
2. 2.COMPUTER SALESPERSON OR SALES REP- Sells computers. They might pay personal visits to
potential corporates or staff the order desk of mail- order Computer Company.
3. QUALITY ASSURANCE SPECIALIST- Participates in alpha and beta test cycles of software looking for
bugs or other usability problems.
4. COMPUTER ENGINEER- Designs and tests new hardware products, such as computer chips, circuit
boards, computer and peripheral devices.
5. MANUFACTURING TECHNICIAN- Participates in the fabrication of computer chips, circuit boards,
system units, or peripheral devices.

Advantages of working in IT industry.


Many technology companies offer employee- friendly- working conditions that include child care, flexible
hours, and the opportunity to work from home.
As in any industry, the exact nature of a job depends on the company and the particular projects that are in
the works.
Can I work at an IT job from home?
Workers in many industries are interested in telecommuting – using available technology to work from home or
an off-site location. Telecommuters tend to be more productive and work longer hours because they have no
commute time, and they are not interrupted by routine office chatter. The internet and telecommunications
technologies have made an impact on the availability of telecommuting opportunity for workers. It has become
common for employees to collaborate through e-mail, fax, group, and, and video conferencing.

What are the basic qualifications for IT industry?


Qualification for most IT industry jobs include some type of higher education, certification, or computer
experience. A bachelor’s degree in a computer – related discipline is as the most prevalent requirement, but
some employers accept a two-year associate degree.
How important is Certification?

certification exam is an objective test that verifies your level of knowledge about a particular technology or
subject. Certification alone is rarely sufficient to qualify you for a job in the IT industry. A certification exam is an
objective test that verifies your level of knowledge about a particular technology or subject or subject.
Job Hunting Basics
How do I find a job in the IT industry?
In many ways, finding a job in the IT industry is just like finding a job in any order industry. Effective job seekers
begin by taking stock of their qualifications, identifying job titles relevant to the skills, identifying potential

8
Unit 1: Industry in the Profession
employers, and considering the geographic area in which they want to work. They then create a carefully worded
resume, and work with employment agencies and recruiting firms.

How can I use the internet to find a job?


The internet has become an important tool for job hunters. In 1994, about 10,000 resumes were posted on the
web. Today, the web plays hosts to millions of resumes. The Internet can figure into your job hunt in several
ways, including researching potential jobs and employers, posting your resume, locating job leads, and
corresponding with potential employers.
WHERE DO I START?
You should begin by defining for which you are qualified. In the IT, Job titles are not standardized. Non-
standardized job titles can pose a problem for job hunters, especially those who use search engines to locate
job openings. Failure to enter one of many titles for a job might mean that job hunter misses a good opportunity.
Although many job search site maintain their own lists of equivalent job titles, job hunters in IT industry should
take some time to compile their own list of equivalent titles relevant search terms. You can compile such a list
by entering job titles and computer industry into a general search engine such as google. Connect to the sites
the search produces and take note of any job titles that seem applicable.
RESUME AND WEB PORTFOLIOS
Do I need an online resume?
As computer professional, you are expected to use technology effectively for everyday tasks. You can
demonstrate this ability to prospective employers by the way you threat your resume. You can prepare your
resume in formats suitable for different computer platforms and delivery methods.
PRINT- You should save one version of your resume as a beautifully formatted word processing file. You might
consider using desktop publishing software to put it on high-quality paper. Make sure that you can output the file
that holds your resume into PDF that can be read on MAC, PC and Linux computers, in case prospective
employer asks you to send it an e-mail attachment.
EMAIL- Before sending your resume as attachment, try to discover the formats that is easiest for your prospective
employer to use. PDF is university accepted format. Microsoft’s
DOC and DOCX formats are also widely used.

HTML and XML- You might also want to create HTML and XML
versions of your resume. You can paste the HTML version into
an HTML-formatted e-mail message or post it on website
provided by your school or ISP. You might also consider
developing an XML resume based on standard XML stylesheets.
SHOULD AN IT INDUSTRY RESUME CONTAIN ANY SPECIAL
ELEMENTS?
-Regardless on the industry in which you seek employment, an
effective resume is dear, correct, and easy to read. When
developing your resume, ask friends, coworkers, and career

9
Unit 1: Industry in the Profession
counselors to review your drafts and provide suggestions for improvement.

HOW CAN MY RESUME GET MAXIMUM EXPOSURE IN AN ONLINE JOB DATABASE?


For resumes that become part of a computer-searchable database, experts recommended that you focus on
nouns not verbs. At one time the trend was to pepper your resume with action phrases and power verbs, such
as “implemented successful solutions” and creative innovative algorithms”

What is a Web portfolio?


A web portfolio is a hypertext version of your resume, which might contain links to the relevant website, such as
past employers, your alma mater, and samples of your work. For example, a programmer might include a link to
one of her particularly well-documented and elegant programs, or a web designer might provide links to all sites
that he/she designed.
Should I jazz up my web portfolio with multimedia?
Current technology gives you the ability to personalize your web portfolio with photos, your favorite music, or
even portraits that demonstrate your speaking and communication abilities. You might want to keep such
multimedia presentations on hand, but supply them only when requested.
Where do I post my Web portfolio?
You can post your Web portfolio on a professional network, such as LinkedIn. Just remember that your personal
website is an open book to prospective employers. If you don’t want them to know the details about your spring
break.

JOB LISTING
Where can I find a list a job opening?
To find job openings, you can begin with the usual sources of job listing: the newspaper’s Help wanted section,
your school career placement office, and your local state employment agency.
How online employment do service work?
An online employment service maintains a database that contains thousands job openings posted by employers.
Do I have to manually search every online employment service?
The Internet offers thousands of employment services, each with unique job announcements.

10
Unit 1: Industry in the Profession
LESSON 3: CODE OF ETHICS OF ICT PROFESSIONALS, ACM
REQUIREMENTS
LEARNING CONTENT
Who are Computing Professionals?

⮚ Computing professionals are individuals who use them


knowledge of computers and computing technology to
create, design, maintain, or use the computer-based system.

⮚ Computing professionals include hardware designers,


software
engineers, database administrators, system analysts, and
computer scientists.

Computing Professionals Execute a Variety of Tasks

⮚ They are engaged in system design and develop specifications for new computer systems and instruction
pipelines for super-scalar processors and detect timing problems in embedded systems.

⮚ Their task is critical since their actions impact computer systems, which turn to have an impact on the
welfare of system users directly and indirectly.
Why Code of Ethics is Important for Computing Professionals?

⮚ Professional ethics is a subject that all organizations regardless of size, must address.

⮚ They are responsible for ensuring that the system they build and maintain is reliable, safe, secure,
resilient, dependable, usable, and accessible.

⮚ For instance, engineers developing Al Technologies have increased professional responsibility.

⮚ The ACM organization has established similar codes for computing professionals to conduct discipline
on computing professionals.
What is Code of Ethics?

⮚ A code of ethics is a set of guidelines to help professionals thread their way through a sometimes tangled
web of ethical on the job decisions.

⮚ Most code of ethics are created for specific career field, such as Medicine, Accounting, Information
Technology(IT).
Ten Commandments from The Computer Ethics Institute
1. Thou shalt not use a computer to harm other people.
2. Thou shalt interfere with other people’s computer work.
3. Thou shalt not snoop around in other people’s computer files.
4. Thou shalt not use a computer to steal.

11
Unit 1: Industry in the Profession
5. Thou shalt not use a computer to bear false witness.
6. Thou shalt not copy or use proprietary software for which you have not paid.
7. Thou shalt not use other people’s computer resources without authorization or proper compensation
8. Thou shalt not appropriate other people’s intellectual output.
9. Thou shalt think about the social consequences of the program you are writing or the system you are for
designing other people.
10. Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans.
Detailed Code of Ethics
Association for Computing Machinery (ACM)

⮚ ACM is a worldwide scientific and educational


computing society formed in 1947.

⮚ It is a non-profit professional membership


organization with approximately 100,000 student
and professional members as of 2019.

⮚ ACM is the largest computing society, it


strengthens the profession’s collective voice
through strong leadership, the highest standards,
and recognition of technical standards.

▪ The ACM has developed a code of ethics for computing professionals, which serves as a guide for making
decisions in the field. The code of ethics covers topics such as responsibilities to clients, employers, other
professionals, and the public. The ACM members are expected to follow these codes and exhibit the
highest level of professional competence and responsibility.
▪ The ACM committee updated its Code of Ethics and Professional Conduct in 2018. The new rewrite of
the ACM code of ethics and professional conduct has brought it up-to-date with new technologies and
societal demands. This code encourages computing professionals to adhere to standards while working
in the tech field.
GENERAL ETHICAL PRINCIPLES.
A computing professional should…
1.1. Contribute to society and to human well-being, acknowledging that all people are stakeholders in
computing its concern for the equality of life of all people, affirms an obligation of computing
professionals to use their skills for the benefit of society, its members, and the environment surrounding
them.
1.2. Avoid Harm. Avoiding harm begins with careful consideration of potential impacts on all those affected
by decisions. When harm is intentionally part of the system, those responsible are obligated to ensure
that the harm is ethically justified.
1.3. Be Honest and Trustworthy. Honestly is an essential component of trustworthiness. A computing
professional should be transparent and provide full disclosure of all pertinent system capabilities,
limitations, and potential problems to the appropriate parties.
1.4. Be fair and take action not to discriminate. The values of equality, tolerance, respect for others, and
justice govern this principle. Fairness requires that even careful decision process some avenue for the
redress of grievances.

12
Unit 1: Industry in the Profession
1.5. Respect the work required to produce new ideas, invent inventions creative works, and
computing artifacts. Computing professionals should therefore credit the creators of ideas, inventions,
works, and artifacts. And respect copyrights, license agreements, and other methods of protecting author
‘the s works.
1.6. Respect privacy. Computing professionals should become conversant in the various definition and
forms of privacy and should understand the rights and responsibilities associated with the collection and
use of personal information.
1.7. Honor confidentiality. Computing professionals are often entrusted with confidential information such
as trade secrets, client data, nonpublic business strategies, financial information, research data, pre-
publication scholarly articles, and patient application.
2. PROFESSIONAL RESPONSIBILITIES.
A computing professional should…
2.1. Strive to achieve high quality in both the process and products of professional work.

⮚ Computing professionals should insist on and support high-quality work from themselves and from
colleagues.
2.2. Maintain a high standard of professional competence, conduct, and ethical practice.

⮚ High-quality computing depends on individuals and teams who take personal and group responsibility for
acquiring and maintaining professional competence.
2.3. Know and respect existing rules pertaining to professional work.

⮚ Computing professionals must abide by these rules unless there is a compelling justification to do
otherwise. Rules that are judged unethical should be challenged.
2.4. Accept and provide an appropriate professional review

⮚ Computing professionals should seek and utilize peer and stakeholder review. And should also provide
constructive, critical reviews of others’ work.
2.5. Give a comprehensive and thorough evaluation of the computer system and their impacts, including
analysis and possible risks.

⮚ Computing professionals are in a position of trust, and they have a special responsibility to provide
objective, credible evaluations and testimony to employees, clients, users, and the public.
2.6. Perform work only in areas of competence.

⮚ A computing professional is responsible for evaluating potential work assignments. This includes
evaluating the work’s feasibility and advisability and making a judgment about whether the work
assignment is within the professionals are of competence.
2.7. Foster public awareness and understanding of computing, related technologies, and their
consequences.
 Computing professionals should share technical knowledge with the public, foster awareness of
computing, and encourage understanding of computing.

13
Unit 1: Industry in the Profession
2.8. Access computing and communication resources only when authorized or when compelled by the
public good.
 Computing professionals should not access another a computer system, software, or data without a
reasonable belief that such an action would be authorized or a compelling belief that it is consistent with
the public good.
2.9. Design and implement systems that are robustly and usably resource.

⮚ Breaches of computer security cause harm. Robust should be a primary consideration when designing
and implementing the system. Computing professionals should take steps to ensure parties affected by
data breaches are notified in a timely and dear manner, providing appropriate guidance and remediation.
3. PROFESSIONAL LEADERSHIP PRINCIPLES.
While these principles apply to all computing professionals, leaders bear a heightened responsibility to
uphold and promote them, both within and through organizations.
A computing professional, especially one acting as a leader, should…
3.1. Ensure that the public good is the central concern during all professional computing work.

⮚ The public good should always be an explicit consideration when evaluating tasks associated with
research, requirements analysis, design and etc. Computing professionals should keep this focus no
matter which methodologies or techniques they use in it practice.
3.2. Articulate, encourage acceptance of, and evaluate fulfillment of social responsibilities by members
of the organization or group.

⮚ Technical organizations and groups affect broader affect society, and their leaders should accept the
associated responsibilities. Leaders should encourage the full participation of computing professionals in
meeting relevant social responsibilities.
3.3. Manage personnel and resources to enhance the quality of working life.

⮚ Leaders should consider the personal and professional development, accessibility requirements, physical
safety, psychological well-being, and human dignity of all workers.
3.4. Articulate, apply and support policies and processes that reflect the quality of working life.

⮚ Leaders should pursue clearly defined organizational policies that are consistent with the code and
effectively communicate them to relevant stakeholders. Implementing processes that deliberately of
negligently violate, or tend to enable to violation of, the Code’s principle is ethically unacceptable.

3.5. Create opportunities for members of the organization or group to grow as professionals.

⮚ Educational opportunities are essential for all organizations and group members. Leaders should ensure
that opportunities are available to computing professionals to help improve their knowledge and skills in
professionalism.
3.6. Use care when modifying or retiring system

14
Unit 1: Industry in the Profession
⮚ Interface changes, the removal of features, and even software updates have an impact on the productivity
of users and the quality of their work. Leaders should take care with changing or discontinuing support
for system features on which people still depend.
3.7. Recognize and take special care of the system that become integrated into the infrastructure of
society.

⮚ When organizations or groups develop systems that become an important part of the infrastructure of
society, their leaders have an added responsibility to be good stewards of these systems.
4. COMPLIANCE WITH THE CODE.
A computing professional should…
4.1. Uphold, promote, and respect the principles of the Code.

⮚ Computing professionals should adhere to the principles of the Code and contribute to improving them.
4.2. Treat violations of the Code as inconsistent with membership in the ACM.

⮚ Each ACM member should encourage and support adherence by all computing professionals regardless
of ACM membership. ACM members who recognize a breach of the Code should consider reporting the
violation to the ACM, which may result in remedial action as specified in the ACM’s Code of Ethics
Professional Conduct Enforcement Policy.

15

You might also like