Responsible Use Of Computers

Computer Ethics

Generally, ethics is a system of standard moral behavior governing the appropriate conduct for a person or group in the society. For example, considering proper and ethical use of school or company resources, many schools and businesses have policies that specify which activities are allowed and which are not. These policies are often available as a written document known as code of conduct included in a student or employee handbook.

Code of ethics is the summary of the moral guidelines adopted by a particular organization to address such issues as honesty, integrity, fairness, responsibility to others, proper use of intellectual property, confidentiality, and accountability.

So while “codes of conduct” usually address specific activities that can and cannot be performed, “codes of ethics” cover broader ethical standards of conduct.

What you’ll learn in this post :

  • You will know sample rule or code of conduct as computer user
  • You will know and understand what it means to be a copyright holder
  • Know the issue with privacy concern in using the computer.

 

Computer Ethics


computer_ethics

Guidelines for the morally acceptable use of computers in our society are therefore referred to as computer ethics. Every computer must demonstrate responsible ways of using it to get the needed information. Etiquette is the conventional requirements for polite behavior, properties of conduct and good manners in the society. Netiquette, is a word for network and online communication etiquette.

There are written and unwritten rules of etiquette that governs online interaction between users of internet resources like mailing lists, e-mail, chat rooms, instant messaging, internet forums, online social networks (Facebook, Twitter), etc.

The Computer Ethics Institute makes a sample rule or code of conduct for all computer users, part of which states as follows:

  • Remember the human. When you communicate electronically, try not to hurt people’s feelings.
  • Respect other people’s privacy. Do not read people’s private mails.
  • Do not use a computer to harm other people.
  • Do not interfere with other people’s computer work.
  • Do not snoop around in other people’s computer files.
  • Do not use a computer to steal.
  • Do not copy or use proprietary software for which you have not paid.
  • Do not use other people’s computer resources without authorization or proper compensation.

 

Copyrights


copyrightCopyright is the exclusive legal right or protection that prohibits the use or copying of intellectual property without permission from the copyright holder. Such intellectual properties include an original artwork, musical composition, literary work such as a book, movie, software, painting, etc. an infringement of a copyright is the reproduction, distribution, performance, or display of any copyright protected work without permission of the copyright owner or without compulsory license.


 

Privacy Concern


private privacyPrivacy is the right to personal information or the right to be left alone. It includes both freedom from government interference in private or family matters and confidentiality of such things as personal correspondence, telephone calls, e-mail, financial information, and medical histories.

In recent years, courts have recognized a right to privacy and have also been well-established in constitutions worldwide. However, there are concerns that privacy may be eroded by the widespread use of advanced information technologies. This is in respect of personal information that selected people or organizations have legitimately recorded. Such organizations include banks, electoral commission, hospitals, universities, police, birth and death registry, international passports and National ID card registry. The danger being raised is that the information collected by these organizations may be misused.


 

If you liked this article and find it helpful, please feel free to share and don’t hesitate to ask any question or share your thoughts or experiences in the comments section below.

You May Also Like

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.