You are on page 1of 5

A.

The Ten Commandments of Computer Ethics

1. Thou shalt not use a computer to harm other people.

Explanation: Computers were invented for a reason, and that is to inform, be informed, entertain,
be entertained and expedite work especially of business matters. Its role is not to deteriorate
another persons career or dignity that is why we must not use computers in that sense.

Examples: We have heard of revolutions about Cyber-Bullying. Some might say its overrated
but it surely will help people from self-destruction. I, myself, have been a victim of such. Since
then, I limit myself from using social media sites, cause I do not want it to happen again.

2. Thou shalt not interfere with other people's computer work.

Explanation: When people are working with a computer, one must observe sense of personal
space. Its hard to be broken out of momentum especially when important transactions are being
done, so if possible prevent one from interfering from people working with computers.
Relationship even just in short time, is at stake.

Example: An example of this is when another keeps on asking you questions during work time.
In Accounting, its really irritating if someone keeps on asking you for stuff or about things, and
yes, in computers, we could save it again or just delete the mistakes but really, its as much
irritating as being bothered in an Accounting work.

3. Thou shalt not snoop around in other people's computer files.

Explanation: Confidentiality is what is highlighted here. One must never snoop up other peoples
files, because somehow a computer is a persons virtual diary. What would you feel if someone
pries over the things you do not want seen?

Example: This commandment is firmly seen in my dads principles, though you can never keep a
secret from him. Its really overwhelming though, that he never snooped out the files from our
computers.

4. Thou shalt not use a computer to steal.

Explanation: Again, a computer is not meant for felon actions. To steal stuff with a computer is
considered illegal and law can sue anyone for doing such actions.

Example: Just two days ago, there was this segment in Nat Geo about hackers from China who
hacked NASA twice. They contained personable data, intellectual property, and highly sensitive
export-controlled data, and were stolen between April 2009 and April 2011. With such actions of
stealing NASAs code they were able to command 23 spacecraft. This incident suggests to be
very discreet about our codes, cause if NASA could be hacked how come yours isnt accessible.
5. Thou shalt not use a computer to bear false witness.

Explanation: A computer is to inform people about facts because nowadays it is widely used by
students to do research on and it is important that if you are going to post or blog about
something, get your facts straight.

Example: When I was in high school, I searched for news to report for my A.P. Class, and I news
channel sites were not developed those years, so I searched for it on a random site and saw this
very interesting topic about Philippines getting banned from Beauty Pageants. I reported it the
next day, but my teacher told me it was all a hoax. I wasnt reprimanded but that day I told
myself Not to believe everything I read from the internet, or get my facts straight if that is
impossible.

6. Thou shalt not copy or use proprietary software for which you have not paid.

Explanation: This is an action of obtaining software in illegal ways either just for personal use or
to resell it, but hear this, Proprietary software is a threat to all users on the Web. When minified,
the code can hide all sorts of nasty items, like spyware and other security risks. said
@CopyrightOffice. Its illegal and in some ways may harm your computer and your integrity.

Example: Downloadable software. We all have seen this on torrent and sites like this, and
likewise purchasing software from pirated sources, yes maybe, it has been paid for, but not as
much as its original price.

7. Thou shalt not use other people's computer resources without authorization or
proper compensation.

Explanation: For me, this is a warning not to borrow computer resources without prior
permission because its unethical, its a sign of non-respect and infringement for others property
and it might cause a conflict thereafter ruining relationships.

Example: Copy-pastes from the internet. Once there was this staff of mine from my high school
newspaper, and passed his poem for the newspaper, but I like reading stuff online, so the time I
recognized the piece, I asked if it was really his, and he admitted that it was not his piece.

8. Thou shalt not appropriate other people's intellectual output.

Explanation: One must not correct or opt any intellectual outputs of another person because it is
not your piece but his and its rude too and it might contain important citations that you erased.

Example: There was this time when a girl tried changing my work, and it got corrupted. All the
time and effort was of waste just because of such unethical action.
9. Thou shalt think about the social consequences of the program you are writing or
the system you are designing.

Explanation: Think before you Click. Before clicking one must enter three gates. Ask yourself
first Is it necessary? Secondly, Is it true?. Lastly, Is it kind?

Example: There was this one time my sister just kept on clicking stuff on the computer without
reading at all, then something went wrong with the computer, like it turned violet and so on. The
computer then got destroyed and was never recovered.

10. Thou shalt always use a computer in ways that ensure consideration and respect
for your fellow humans.

Explanation: Again, computers are for positive stuff only and use it wisely, that is for my
understanding. The golden rule Do not do to others, what you would not want done to you. can
sink in here, because if we just focus on the things important to us and only necessary, we would
not harm anyone in anyway.

Example: My mom has been a very professional user of computer, never have been involved in
such felonies or offenses or issues.

Sources:
1 http://cpsr.org/issues/ethics/cei/

2 http://www.dailymail.co.uk/sciencetech/article-2110506/Chinese-
hackers-control-Nasa-lab-commands-23-spacecraft.html#ixzz4HjXiZFYQ
B. Republic Act 8792

REPUBLIC ACT NO. 8792 also known as "Electronic Commerce Act of


2000, which was approved on June 14, 2000, is an act providing for the
recognition and use of electronic commercial and non-commercial
transactions and documents, penalties for unlawful use thereof, and for other
purposes

Their objective is to facilitate domestic and international dealings,


transactions, arrangements agreements, contracts and exchanges and storage of
information through the utilization of electronic, optical and similar medium,
mode, instrumentality and technology to recognize the authenticity and reliability
of electronic documents related to such activities and to promote the universal use
of electronic transaction in the government and general public.

This law ensures people that anyone may be safe from browsing their computers
and provides actions to do the same ethical actions. It consists of list of important
reminders to conserve and protect a persons physicality, mentality, emotionality,
morality and foremost, dignity. It rectifies the past occurrences through providing
penalties for illicit actions such provided in Section 33:
Penalties. - The following Acts, shall be penalized by fine and/or imprisonment, as follows:

(a) Hacking or crackling with refers to unauthorized access into or interference in a computer
system/server or information and communication system; or any access in order to corrupt,
alter, steal, or destroy using a computer or other similar information and communication
devices, without the knowledge and consent of the owner of the computer or information and
communications system, including the introduction of computer viruses and the like, resulting
in the corruption, destruction, alteration, theft or loss of electronic data messages or
electronic documents shall be punished by a minimum fine of One Hundred Thousand pesos
(P 100,000.00) and a maximum commensurate to the damage incurred and a mandatory
imprisonment of six (6) months to three (3) years;

(b) Piracy or the unauthorized copying, reproduction, dissemination, or distribution,


importation, use, removal, alteration, substitution, modification, storage, uploading,
downloading, communication, making available to the public, or broadcasting of protected
material, electronic signature or copyrighted works including legally protected sound
recordings or phonograms or information material on protected works, through the use of
telecommunication networks, such as, but not limited to, the internet, in a manner that
infringes intellectual property rights shall be punished by a minimum fine of one hundred
thousand pesos (P 100,000.00) and a maximum commensurate to the damage incurred and
a mandatory imprisonment of six (6) months to three (3) years;
(c) Violations of the Consumer Act of Republic Act No. 7394 and other relevant to pertinent
laws through transaction covered by or using electronic data messages or electronic
documents, shall be penalized with the same penalties as provided in those laws;

(d) Other violations of the provisions of this Act, shall be penalized with a maximum penalty
of one million pesos (P 1,000,000.00) or six (6) years imprisonment.

Likewise, it assists in present events through giving us guidelines in Chapter III Communication of
Electronic Data Messages or Electronic Documents. Lastly, it ensures that the future for future users
safety, and necessity satiated, and that only would be provided.

To elaborate more, do you somehow remember the I Love You virus? I never got to be in
that generation but my dad has mentioned this to us. It actually originated from the Philippines and
so they enacted this very Republic Act just to prevent things like this to happen again. It was really
traumatic according to them such that a lot of computers were shut down and turned unusable.

Source:
3 http://www.lawphil.net/statutes/repacts/ra2000/ra_8792_2000.html

You might also like