![Page 1: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/1.jpg)
Ethical Issues in Computing
![Page 2: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/2.jpg)
Ethical and Social Issues Privacy
Government surveillance Corporate surveillance Web tracking/weblogs Email archives
Security Viruses Crackers
Intellectual Property Software/digital media
• Piracy• File sharing
Open source movement Computer Crime
Theft of property Destruction of property
Free Speech Issues Junk email Censorship Pornography Harassment
Information overload Spam Virtual office
Information warfare DOS and other attacks Retaliatory viruses
The digital divide Race Gender Ethnicity Rural/urban The poor
New forms of Relationships Communication Business
• Telecommuting• Information as a commodity
Leisure/Recreation Software development
Open Source Liability for bugs
• Reliability Interoperability
New codes of conduct The ACM code The Hacker Ethic
New health issues RSI Addictions (internet, gaming, etc.) Ergonomics
Artificial intelligence Humanizing our machines Strengths and weaknesses
Computers in education Use of technology
CS-1094 Computers and Society
![Page 3: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/3.jpg)
ACM Code
![Page 4: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/4.jpg)
ACM
Association for Computing Machineryhttp://www.acm.org
Commitment to ethical professional conduct is expected of every member.
![Page 5: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/5.jpg)
Section 1
Fundamental Ethical ConsiderationsNot specific to computingServe as the context for our actions in
computing and elsewhere
![Page 6: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/6.jpg)
1.1 Contribute to society and human well-being
“…computing professionals must attempt to ensure that the products of their efforts will be used in socially responsible ways, will meet social needs, and will avoid harmful effects to health and welfare.”
Example: Star Wars programming
![Page 7: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/7.jpg)
![Page 8: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/8.jpg)
![Page 9: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/9.jpg)
![Page 10: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/10.jpg)
![Page 11: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/11.jpg)
![Page 12: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/12.jpg)
![Page 13: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/13.jpg)
![Page 14: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/14.jpg)
1.2 Avoid harm to others
To minimize harm “computing professionals must minimize malfunctions by following generally accepted standards for system design and testing.”
Example: Therac Radiation machine AT&T telephone system crash Dallas/Fort Worth airport radar crash Patches and Service Packs
Related issue: Software liability
![Page 15: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/15.jpg)
![Page 16: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/16.jpg)
![Page 17: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/17.jpg)
![Page 18: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/18.jpg)
![Page 19: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/19.jpg)
![Page 20: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/20.jpg)
1.3 Be honest and trustworthy
Providing “full disclosure of all pertinent system limitations and problems.”
Example: ?
![Page 21: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/21.jpg)
![Page 22: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/22.jpg)
![Page 23: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/23.jpg)
1.4 Be fair and take action not to discriminate
“Inequities between different groups of people may result from the use or misuse of information and technology.”
Example: The Digital Divide
![Page 24: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/24.jpg)
![Page 25: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/25.jpg)
58.1%53.6% 53.3% 51.1% 47.9% 47.1%
39.8% 39.7% 36.2%31.1% 29.2% 29.2% 26.6% 24.5% 22.5% 21.3%
10.3%
0%10%20%30%40%50%60%70%80%90%
100%
Sweden
Denm
ark
Nethe
rland
s
Finlan
d
Austri
a
United
Sta
tes
United
King
dom
Irelan
d
Luxe
mbo
urg
EU Ave
rage
Belgium
Ger
man
y
Icela
nd
Franc
e
Spain
Portu
gal
Gre
ece
Note: EU country estimates are for February 2001 and US estimates are for August 2000.Source: European Union, http://europa.eu.int/information_society/eeurope/index_en.htm and U.S. Department of Commerce, Economic and Statistics Administration.
![Page 26: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/26.jpg)
Greater than 50% of People Use The Internet (35)Approx. 50% of People Use the Internet (9)Less Than 50% of People Use the Internet (6)
Sept. 2001
![Page 27: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/27.jpg)
August. 2000
Source: NTIA and ESA, U.S. Department of Commerce, using U.S. Census Bureau Current Population Survey Supplements
![Page 28: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/28.jpg)
0
10
20
30
40
50
60
70
80
90
100
0 5 10 15 20 25 30 35 40 45 50 55 60 65 70 75 80
Age (Centered 3-year moving avg.)
Per
cent
Dec. 1998
Sept. 2001
Aug. 2000
Oct. 1997
Computer and Internet Use at Any Location Age Distribution (3 year moving average), Percent of Persons Age 3 to 80
Source: NTIA and ESA, U.S. Department of Commerce, using U.S. Census Bureau Current Population Survey Supplements
![Page 29: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/29.jpg)
0
10
20
30
40
50
60
70
80
90
100
Married Couple withChildren
Male with Children Female with Children Households withoutChildren
Pe
rce
nt
Oct. 1997 Dec. 1998 Aug. 2000 Sept. 2001
62.0
45.8 45.349.5
Computer and Internet Use Anywhere by Type of Household, Persons Age 3 +
![Page 30: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/30.jpg)
0
10
20
30
40
50
60
70
80
Asian Amer. &Pacific Isl.
White Black Hispanic
Perc
ent
Oct. 1997 Dec. 1998 Aug. 2000 Sept. 2001
60.4 59.9
39.8
31.6
Internet Use Anywhere by Race/Hispanic Origin, Percent of Persons Age 3 +
![Page 31: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/31.jpg)
![Page 32: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/32.jpg)
![Page 33: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/33.jpg)
1.5 Honor property rights including copyrights and patent
More than moral duty it is legal obligation
Patents, intellectual property with or without copyrights, license agreements
“Unauthorized duplication of materials must not be condoned.”
Example: Pirated software, etc.
![Page 34: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/34.jpg)
![Page 35: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/35.jpg)
![Page 36: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/36.jpg)
![Page 37: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/37.jpg)
![Page 38: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/38.jpg)
![Page 39: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/39.jpg)
![Page 40: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/40.jpg)
![Page 41: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/41.jpg)
![Page 42: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/42.jpg)
1.6 Give proper credit for intellectual property
Don’t take credit for someone else’s work or ideas Example: Group effort on individual’s labs
• Combated by websites to compare versions
Term paper sites Contracted assignment services Code libraries
Anti-plagiarism websites Beyond intellectual property rights
The Open Source Movement
![Page 43: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/43.jpg)
![Page 44: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/44.jpg)
![Page 45: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/45.jpg)
![Page 46: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/46.jpg)
![Page 47: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/47.jpg)
![Page 48: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/48.jpg)
![Page 49: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/49.jpg)
![Page 50: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/50.jpg)
1.7 Respect the privacy of others
Only collect the necessary amounts of data Procedures governing
appropriate access appropriate usedata security
Examples: Government TIA program
![Page 51: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/51.jpg)
![Page 52: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/52.jpg)
![Page 53: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/53.jpg)
![Page 54: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/54.jpg)
![Page 55: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/55.jpg)
![Page 56: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/56.jpg)
1.8 Honor confidentiality
If you say you won’t reveal information, you don’t!
If you don’t promise confidentiality you say so in a way that people hear you.Examples: Websites that bury confidentiality
in the fine print of their Privacy Policies.
![Page 57: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/57.jpg)
![Page 58: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/58.jpg)
Sections 2-4
(Not on the final exam)
![Page 59: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/59.jpg)
Section 2
More Specific Professional Responsibilities 2.1 Strive to achieve the highest quality, effectiveness
and dignity in both the process and products of professional work.
• Your reputation is only as strong as your code. 2.2 Acquire and maintain professional competence
• Stay active in the profession and current advances. 2.3 Know and respect existing laws pertaining to
professional work• Professional organizations often help with this
2.4 Accept and provide appropriate professional review 2.5 Give comprehensive and thorough evaluations of
computer systems and their impacts, including analysis of possible risks
![Page 60: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/60.jpg)
Section 2
More Specific Professional Responsibilities2.6 Honor contracts, agreements, and assigned
responsibilities2.7 Improve public understanding of computing and
its consequences2.8 Access computing and communication
resources only when authorized to do so
![Page 61: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/61.jpg)
Section 3
Organizational Leadership Imperatives 3.1 Articulate social responsibilities of members of an
organizational unit and encourage full acceptance of those responsibilities
3.2 Manage personnel and resources to design and build information systems that enhance the quality of working life
3.3 Acknowledge and support proper and authorized uses of an organization’s computing and communication resources
3.4 Ensure that users and those who will be affected by a system have their needs clearly articulated during the assessment and design of requirements; later the system must be validated to meet requirements.
![Page 62: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/62.jpg)
Section 3
Organizational Leadership Imperatives3.5 Articulate and support policies that protect the
dignity of users and others affected by a computing system.
3.6 Create opportunities for members of the organization to learn the principles and limitations of computer systems.
![Page 63: Ethical Issues in Computing. Ethical and Social Issues Privacy Government surveillance Corporate surveillance Web tracking/weblogs Email archives Security](https://reader036.vdocument.in/reader036/viewer/2022062519/5697c0221a28abf838cd34a5/html5/thumbnails/63.jpg)
Section 4
Compliance with the code As an ACM member I will …
4.1 Uphold and promote the principles of this Code• The future of the computing profession depends on both technical
and ethical excellence
4.2 Treat violations of this code as inconsistent with membership in the ACM
• Adherence is voluntary• Violations by gross misconduct are grounds for membership
termination