You are on page 1of 2

The Ten Commandments of Computer Ethics

1) Thou shalt not use a computer to harm other people.


 It is unethical by using computer to harm other people, as a user we should not
use the computer with the purpose of hurting or harming other people.
2) Thou shalt not interfere with other people's computer work.
 A person must not take an action that could give an obstacle to anybody's work
and that can destroy anybody using his or her own work (when someone would
change and ruin one's computer works).
3) Thou shalt not snoop around in other people's computer files.
 It may destroy their privacy, reputation and other things they wanted to keep
either maybe for their safety or just for privacy.
4) Thou shalt not use a computer to steal.
 The computer should not be a man's channel or tool to take another's property
such as files, using it to wrongfully earn money and stealing someone's works or
ideas.
Types of Hacker

 White hat hacker


o The term "white hat" in Internet slang refers to an ethical computer
hacker, or a computer security expert, who specializes in penetration
testing and in other testing methodologies that ensures the security of an
organization's information systems.
 Black hat hacker
o A black hat hacker is a person who attempts to find computer security
vulnerabilities and exploit them for personal financial gain or other
malicious reasons.
 Grey hat hacker
o Is a computer hacker or computer security expert who may sometimes
violate laws or typical ethical standards, but does not have the malicious
intent typical of a black hat hacker.
5) Thou shalt not use a computer to bear false witness.
 The computer should not be used in giving wrong or false statements to witness
or say something about a certain thing, event or person.
6) Thou shalt not copy or use proprietary software for which you have not paid.
 Copying or using a software of another's property without paying for it is what
that sixth commandment is trying to convey. It is a wrongful act for you do not
give what is due to the owner and his or her software's usage.
7) Thou shalt not use other people's computer resources without authorization or proper
compensation.
 A person should not benefit or avail of other people's resources without their
permission and without giving them due payment or fee for their resources.
8) Thou shalt not appropriate other people's intellectual output.
 Correcting other's work such as one's intellectual output using the computer is
prohibited. This is what the eight commandment is all about. One doesn't have
the right to judge and correct anyone for his or her work especially when you are
not obliged to do so but correcting it on your own is not the right thing. Everyone
of us is free and have different ideas.
9) Thou shalt think about the social consequences of the program you are writing or the
system you are designing.
 When a Persons wants to create or design some programs and write something,
he or she should consider first the possible effects or influences it could give to
the society or other people before posting, making and sharing it through the
computer. The ninth commandment concentrates on the consequences of one's
work once it is being shown or shared to others.
10) Thou shalt always use a computer in ways that ensure consideration and respect for
your fellow humans.
 The last commandment tells us users about using the computer in a favourable
manner. Using the computer not only according to one's own good and need but
in a way that one can do both things; enjoying the use of computer while giving
respect and being sensitive to others first.

You might also like