Ten Commandments of Computer Ethics

The Ten Commandments of Computer Ethics were created in 1992 by the Computer Ethics Institute. The commandments were introduced in the paper "In Pursuit of a 'Ten Commandments' for Computer Ethics" by Ramon C. Barquin as a means to create "a set of standards to guide and instruct people in the ethical use of computers." [1] The Ten Commandments of Computer Ethics copies the style of the Ten Commandments from The Bible and uses the archaic "thou shalt" and "thou shalt not" found in the King James version.

The commandments have been widely quoted in computer ethics literature [2] but also have been criticized by both the hacker community [3] and some in academia. For instance, Dr. Ben Fairweather of the "Centre for Computing and Social Responsibility" has described them as "simplistic" and overly restrictive.[4]

The CISSP — an organization of computer security professionals — has used the commandments as a foundation for its own ethics rules.[5]

The Ten Commandments

  1. Thou shalt not use a computer to harm other people.
  2. Thou shalt not interfere with other people's computer work.
  3. Thou shalt not snoop around in other people's computer files.
  4. Thou shalt not use a computer to steal.
  5. Thou shalt not use a computer to bear false witness
  6. Thou shalt not copy or use proprietary software for which you have not paid.
  7. Thou shalt not use other people's computer resources without authorization or proper compensation.
  8. Thou shalt not appropriate other people's intellectual output.
  9. Thou shalt think about the social consequences of the program you are writing or the system you are designing.
  10. Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans.
[Sic. The confusion of "thou" and "you" is in the original.[6]]

The Ten Commandments

  1. Do not use a computer to harm others
  2. Do not interfere with other people's computer work.
  3. Do not snoop around in other people's computer files.
  4. Do not use a computer to steal.
  5. Do not use a computer to bear false witness
  6. Do not copy or use proprietary software for which you have not paid.
  7. Do not use other people's computer resources without authorization or proper compensation.
  8. Do not appropriate other people's intellectual output.
  9. Do think about the social consequences of the program you are writing or the system you are designing.
  10. Do always use a computer in ways that ensure consideration and respect for your fellow humans.


Exegesis

References

  1. Barquin, Ramon C. (May 7, 1992). "In pursuit of 'Ten Commandments' for Computer Ethics". Computer Ethics Institute. Retrieved 2013-08-17.
  2. Kathy Fitzpatrick, Carolyn Bronstein (2006). Ethics in Public Relations: Responsible Advocacy. Sage Publications. p. 116. ISBN 1-4129-1798-0.
  3. Computer Ethics - Lecture 10
  4. CCSR:Commentary on the 'Ten Commandments for Computer Ethics'
  5. Official (ISC)2 Guide to the CISSP CBK
  6. "The Ten Commandments of Computer Ethics" (PDF). Retrieved 2012-05-22.

External links