I INF 306 Lecture Notes - Lecture 6: Comprehensive Crime Control Act Of 1984, Computer Ethics, Proprietary Software
Document Summary
Information systems professions are too wide ranging: no uniform authority, aba, ama, no binding code, this makes it difficult differentiating , white hats, black hats, grey hats. Thou shalt not use a computer to harm other people. Thou shalt not interfere with other people"s computer work. Thou shalt not snoop around in other people"s computer files. Thou shalt not use a computer to steal. Thou shalt not use a computer to bear false witness. Thou shalt not copy or use proprietary software for which you have not paid. Thou shalt not use other people"s computer resources without authorization or. Thou shalt not appropriate other people"s intellectual output. Thou shalt think about the social consequences of the program you are writing. Or the system you are designing: thou shalt always use a computer in ways that insure consideration and. Who reads these things: creates a contract binding the licensor and licensee, written agreements, click agreements, installation agreements, shrink wrap agreements.