Вы находитесь на странице: 1из 2

Ten Commandments of Computer Ethics

Created by the Computer Ethics Institutei

1. Thou Shalt Not Use A Computer To Harm Other People.


2. Thou Shalt Not Interfere With Other Peoples Computer Work.
3. Thou Shalt Not Snoop Around In Other Peoples Computer Files.
4. Thou Shalt Not Use A Computer To Steal.
5. Thou Shalt Not Use A Computer To Bear False Witness.
6. Thou Shalt Not Copy Or Use Proprietary Software For Which You have
Not Paid.
7. Thou Shalt Not Use Other Peoples Computer Resources Without
Authorization Or Proper Compensation.
8. Thou Shalt Not Appropriate Other Peoples Intellectual Output.
9. Thou Shalt Think About The Social Consequences Of The Program You
Are Writing Or The System You Are Designing.
10.Thou Shalt Always Use A Computer In Ways That Insure Consideration
And Respect For Your Fellow Humans.
The Ten Commandments of Computer Ethics were first presented in Dr. Ramon C. Barquin's
paper, "In Pursuit of a 'Ten Commandments' for Computer Ethics."

http://computerethicsinstitute.org/publications/tencommandments.html . The Computer Ethics Institute


(CEI) is a 501(c) 3 research, education and public policy organization focused on the interface of advances
in information technologies within ethical frameworks. Its constituency is comprised of professionals from
the academic, corporate and public policy, information technology and religious communities. In addition,
its constituency is multi-disciplined, multi-cultural, cross-generational and international.

CS 651 - Course Ethical Requirements


Please access and read the Marshall University Information Technology Acceptable Use
Policy http://www.marshall.edu/president/board/Policies/MUBOG IT-1 Info Tech
Acceptable Use.pdf. There will be no assignments in this course that require
unethical behavior. If you go beyond the scope of an assignment or use the material to

access a computer without authorization, you are in violation of the principles of the
above statement. The intent of this course is to teach you how to protect an employers
computing resources. By signing the following statement, you agree to abide by the
ethical requirements that have been established for this course.
In this course I am learning network and computer security principles. It is a 16-week
long course, with a prerequisite of a general understanding of operating systems and
computer networks. I realize that this learning is just a beginning.

I assure the instructor, the University, and the world that I am a caring,
responsible, and principled person. I will help create a better world. Never will I
engage in activity that deprives others in order to benefit from it.
The techniques and links that I am exposed to are for educational purposes only.
As a power-user of computers and future network or systems administrator, I must
be familiar with the tools that may be used to bring a network down. I may need
to engage in a legitimate form of hacking, or more precisely, ethical hacking, as a
consultant who performs security audits. This is the driving force in learning the
past attack techniques.
I will not directly provide anyone with the tools to create mischief. Nor shall I
pass my knowledge to others without verifying that they also subscribe to the
principles apparent in this statement.
I will not circumvent any security measure applied to a network to practice any
skills learned in this course.
I will use only the facilities provided by my instructor as necessary to complete an
assignment.
I will not engage in or condone any form of illegal activity including unauthorized
break-ins, cracking, or denial of service attacks.
My signature indicates my agreement with the conditions of this course. I am
aware that my instructor will assign a grade of F for violation of this agreement.

Mahesh Kaveti

01-24-2016

__________________________
_______________________________________
Name of the student
Signature and Date
901823886

Marshall ID Number (901)

Вам также может понравиться