Preview

Buzzle Code Of Ethics

Good Essays
Open Document
Open Document
828 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Buzzle Code Of Ethics
Ethical Computing
QBA 362 w/ Burke
Ltelatk H. Fritz

FRITZ, LTELATK
Ethical Computing QBA 362-Spring 2010

E T H I C AL C O MP UT I NG
1. Find a code of ethics from a firm of your choosing (other than the CPSR or the ACM). What do you think are the best five guiding principles from all the tips that you found?

http://www.buzzle.com/articles/computer-ethics-code-of-ethics-in-computing.html

Code of Ethics


Information stored on the computer should be treated as seriously as written or spoken word.
 Privacy should not be violated. In case of academic use, it is known plagiarism.

   

Information for public viewing should not be modified or deleted or inaccessible since these are considered as destructive acts. Intrusive
…show more content…
Because in general it covers a broad area of things. Treating information stored on computers as if they were written or spoken words, is like asking users to respect the rights of others, as well as their responsibility towards other people’s work. (Individual Responsibility) Leaving other people’s work in tact as they are—without modification or deletion, is important because it preserves the other person’s integrity. It’s kind of the same as walking into (or breaking into ) someone’s home and rearranging their furniture without their knowledge. (Preserving …show more content…
Why is deliberate spreading of viruses unethical? Name five reasons.
 

Intrusive software such as "worms" and "viruses" which are destructive to the computer system is also illegal. (Buzzle ®) Congesting somebody’s system with a lot of unwanted information is also unethical. (Buzzle ®)

 1) Thou shalt not use a computer to harm other people: If it is unethical to harm people by making a bomb, for example, it is equally bad to write a program that handles the timing of the bomb. Or, to put it more simply, if it is bad to steal and destroy other people’s books and notebooks, it is equally bad to access and destroy their files. (CEI) 3

FRITZ, LTELATK
Ethical Computing QBA 362-Spring 2010

 2) Thou shalt not interfere with other people's computer work: Computer viruses are small programs that disrupt other people’s computer work by destroying their files, taking huge amounts of computer time or memory, or by simply displaying annoying messages. Generating and consciously spreading computer viruses is unethical (CEI)  7) Thou shalt not use other people's computer resources without authorization: Multiuser systems use user id’s and passwords to enforce their memory and time allocations, and to safeguard information. You should not try to bypass this authorization system. Hacking a system to break and bypass the authorization is

You May Also Find These Documents Helpful

  • Satisfactory Essays

    unit 4 assignment 2

    • 303 Words
    • 2 Pages

    In addition to those items listed above, personal downloads are to be strictly prohibited. If you should have need of a program or utility which is not accessible in your computer system, then you must submit a request to the IT department identifying the service or application requested, why the application is needed.…

    • 303 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 4222 - 307

    • 395 Words
    • 2 Pages

    5. Personal data processed for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes.…

    • 395 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Assignment 209 NVQ 2

    • 272 Words
    • 2 Pages

    All information is to be kept up to date and accurate and stored securely in a locked cupboard or…

    • 272 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Code of Counduct

    • 350 Words
    • 2 Pages

    2. I’m at work at Cisco and my friend has sent me an email. I know this friend of mine usually sends me either dirty pictures or dirty jokes but it’s my lunch break. I’ll open the email, it’s a dirty joke and picture I send it to my friend. I have now violated the “Unlawful or offensive” rule. I am not allowed to access, distribute, download, or upload material of sexual content or containing offensive language.…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The Computer Misuse Act 1990 it is a law that does not allow certain activities when using computers, this include: hacking into other people's systems, misusing software or helping a person to gain access to protected files on someone's else's computer.…

    • 605 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Choicepoint Attack

    • 401 Words
    • 2 Pages

    • sensitive data should never be removed from a secured worksite without taking precautions such as encrypting files or shredding documents;…

    • 401 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    * Any activities with the intention to create and/or distribute malicious programs into the network (e.g., viruses, worms, Trojan horses, e-mail bombs, malware, etc.) are prohibited.…

    • 1030 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    When ensuring the security of information, records should be stored correctly, any confidential calls or meetings should be private and take place where nobody can accidentally overhear the conversation, all records should be returned to the correct storage place. And any lost, stolen or destroyed records should be reported immediately, you should ensure the proper disposal of any information or records that are no longer needed or are damaged.…

    • 532 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Diploma Level 3 Hsc 38

    • 299 Words
    • 2 Pages

    Personal data processed for any purpose shall not be kept for longer then is necessary.…

    • 299 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Treviño, L. K., & Nelson, K. A. (2007). Managing business ethics: Straight talk about how to do it right (4th ed.). Hoboken, NJ: Wiley.…

    • 1342 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Acceptable Use Policy

    • 1915 Words
    • 8 Pages

    You must respect the privacy of others; for example, you shall not intentionally seek information on, obtain copies of, or modify files, other data, or passwords belonging to others, or represent themselves as another user unless explicitly authorized to do so by that user.…

    • 1915 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Level 3 Teaching Assistant

    • 1040 Words
    • 5 Pages

    Personal data- This includes names and addresses, medical or health records, dates of birth, etc. It needs to be kept secure.…

    • 1040 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Unit 5 Assignment 1

    • 1355 Words
    • 6 Pages

    * To protect all information assets from unauthorized access, use, modification, disclosure, destruction or interference;…

    • 1355 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Code of Ethics

    • 1625 Words
    • 7 Pages

    Provision 7. The nurse participates in the advancement of the profession through contributions to practice, education, administration, and knowledge development.…

    • 1625 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Thou shall not steal, thou shall not kill are probably the most well known of the natural laws. The laws for Thou shall not steal are robbery, burglary, and some offenses under property offenses. Robbery is the felonious taking of money or goods from a victim’s person, or in a victim’s presence and against his or her will, through the use or threat or force and violence (Inciardi, 2010, p. 68). Burglary is the breaking and entering of a dwelling with the intention to commit a felony of misdemeanor (Inciardi, 2010, p.71). Then the property offenses are Larceny, pickpocketing, shoplifting, and fraud to name a few (Inciardi, 2010, p.72-73).The laws for thou shall not kill are murder and manslaughter. Murder is defined as the felonious killing of another human being with the malice aforethought (Inciardi, 2010, p.64). While manslaughter is typically charged when a killing occurs under circumstances that are not severe enough to constitute murder yet are beyond the defenses of justifiable or excusable homicide (Inciardi, 2010, p.66).…

    • 750 Words
    • 3 Pages
    Good Essays