⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 ch17.htm

📁 美国Macmillan出版社编写的Perl教程《Perl CGI Web Pages for WINNT》
💻 HTM
📖 第 1 页 / 共 3 页
字号:
aware of, any potential damage to the local or global environment.

<P>



<BLOCKQUOTE>

<TABLE>

<TR VALIGN=TOP><TD WIDTH=30>1.2</TD><TD>Avoid harm to others.</TD></TR>

</TABLE>

</BLOCKQUOTE>

<P>

&quot;Harm&quot; means injury or negative consequences, such as

undesirable loss of information, loss of property, property damage,

or unwanted environmental impacts. This principle prohibits use

of computing technology in ways that result in harm to any of

the following: users, the general public, employees, employers.

Harmful actions include intentional destruction or modification

of files and programs leading to serious loss of resources or

unnecessary expenditure of human resources such as the time and

effort required to purge systems of &quot;computer viruses.&quot;

<P>

Well-intended actions, including those that accomplish assigned

duties, may lead to harm unexpectedly. In such an event the responsible

person or persons are obligated to undo or mitigate the negative

consequences as much as possible. One way to avoid unintentional

harm is to carefully consider potential impacts on all those affected

by decisions made during design and implementation.

<P>

To minimize the possibility of indirectly harming others, computing

professionals must minimize malfunctions by following generally

accepted standards for system design and testing. Furthermore,

it is often necessary to assess the social consequences of systems

to project the likelihood of any serious harm to others. If system

features are misrepresented to users, coworkers, or supervisors,

the individual computing professional is responsible for any resulting

injury.

<P>

In the work environment the computing professional has the additional

obligation to report any signs of system dangers that might result

in serious personal or social damage. If one's superiors do not

act to curtail or mitigate such dangers, it may be necessary to

&quot;blow the whistle&quot; to help correct the problem or reduce

the risk. However, capricious or misguided reporting of violations

can, itself, be harmful. Before reporting violations, all relevant

aspects of the incident must be thoroughly assessed. In particular,

the assessment of risk and responsibility must be credible. It

is suggested that advice be sought from other computing professionals.

See principle 2.5 regarding thorough evaluations.

<P>

<BLOCKQUOTE>

<TABLE>

<TR VALIGN=TOP><TD WIDTH=30>1.3</TD><TD>Be honest and trustworthy.</TD></TR>

</TABLE>

</BLOCKQUOTE>

<P>

Honesty is an essential component of trust. Without trust an organization

cannot function effectively. The honest computing professional

will not make deliberately false or deceptive claims about a system

or system design, but will instead provide full disclosure of

all pertinent system limitations and problems.

<P>

A computer professional has a duty to be honest about his or her

own qualifications, and about any circumstances that might lead

to conflicts of&nbsp;interest.

<P>

Membership in volunteer organizations such as ACM may at times

place individuals in situations where their statements or actions

could be interpreted as carrying the &quot;weight&quot; of a larger

group of professionals. An ACM member will exercise care to not

misrepresent ACM or positions and policies of ACM or any ACM units.

<P>

<BLOCKQUOTE>

<TABLE>

<TR VALIGN=TOP><TD WIDTH=30>1.4</TD><TD>Be fair and take action not to discriminate.</TD></TR>

</TABLE>

</BLOCKQUOTE>

<P>

The values of equality, tolerance, respect for others, and the

principles of equal justice govern this imperative. Discrimination

on the basis of race, sex, religion, age, disability, national

origin, or other such factors is an explicit violation of of ACM

policy and will not be tolerated.

<P>

Inequities between different groups of people may result from

the use or misuse of information and technology. In a fair society,all

individuals would have equal opportunity to participate in, or

benefit from, the use of computer resources regardless of race,

sex, religion, age, disability, national origin or other such

similar factors. However, these ideals do not justify unauthorized

use of computer resources nor do they provide an adequate basis

for violation of any other ethical imperatives of this code.

<P>

<BLOCKQUOTE>

<TABLE>

<TR VALIGN=TOP><TD WIDTH=30>1.5</TD><TD>Honor property rights including copyrights and patents.</TD></TR> 

</TABLE>

</BLOCKQUOTE>

<P>

Violation of copyrights, patents, trade secrets and the terms

of license agreements is prohibited by law in most circumstances.

Even when software is not so protected, such violations are contrary

to professional behavior. Copies of software should be made only

with proper authorization. Unauthorized duplication of materials

must not be condoned.

<P>

<BLOCKQUOTE>

<TABLE>

<TR VALIGN=TOP><TD WIDTH=30>1.6</TD><TD>Give proper credit for intellectual property.</TD></TR>

</TABLE>

</BLOCKQUOTE>

<P>

Computing professionals are obligated to protect the integrity

of intellectual property. Specifically, one must not take credit

for other's ideas or work, even in cases where the work has not

been explicitly protected by copyright, patent, etc.

<P>

<BLOCKQUOTE>

<TABLE>

<TR VALIGN=TOP><TD WIDTH=30>1.7</TD><TD>Respect the privacy of others.</TD></TR>

</TABLE>

</BLOCKQUOTE>

<P>

Computing and communication technology enables the collection

and exchange of personal information on a scale unprecedented

in the history of civilization. Thus there is increased potential

for violating the privacy of individuals and groups. It is the

responsibility of professionals to maintain the privacy and integrity

of data describing individuals. This includes taking precautions

to ensure the accuracy of data, as well as protecting it from

unauthorized access or accidental disclosure to inappropriate

individuals. Furthermore, procedures must be established to allow

individuals to review their records and correct inaccuracies.

<P>

This imperative implies that only the necessary amount of personal

information be collected in a system, that retention and disposal

periods for that information be clearly defined and enforced,

and that personal information gathered for a specific purpose

not be used for other purposes without consent of the individual(s).

These principles apply to electronic communications, including

electronic mail, and prohibit procedures that capture or monitor

electronic user data, including messages,without the permission

of users or bona fide authorization related to system operation

and maintenance. User data observed during the normal duties of

system operation and maintenance must be treated with strictest

confidentiality, except in cases where it is evidence for the

violation of law, organizational regulations, or this Code. In

these cases, the nature or contents of that information must be

disclosed only to proper authorities. (See 1.9)

<P>

<BLOCKQUOTE>

<TABLE>

<TR VALIGN=TOP><TD WIDTH=30>1.8</TD><TD>Honor confidentiality.</TD></TR>

</TABLE>

</BLOCKQUOTE>

<P>

The principle of honesty extends to issues of confidentiality

of information whenever one has made an explicit promise to honor

confidentiality or, implicitly, when private information not directly

related to the performance of one's duties becomes available.

The ethical concern is to respect all obligations of confidentiality

to employers, clients, and users unless discharged from such obligations

by requirements of the law or other principles of this Code.

<H3>2. MORE SPECIFIC PROFESSIONAL RESPONSIBILITIES</H3>

<P>

As an ACM computing professional I will...

<P>

<BLOCKQUOTE>

<TABLE>

<TR VALIGN=TOP><TD WIDTH=30>2.1</TD><TD>Strive to achieve the highest quality, effectiveness and dignity

in both the process and products of professional work.</TD></TR>

</TABLE>

</BLOCKQUOTE>

<P>

Excellence is perhaps the most important obligation of a professional.

The computing professional must strive to achieve quality and

to be cognizant of the serious negative consequences that may

result from poor quality in a system.

<P>

<BLOCKQUOTE>

<TABLE>

<TR VALIGN=TOP><TD WIDTH=30>2.2</TD><TD>Acquire and maintain professional competence.</TD></TR>

</TABLE>

</BLOCKQUOTE>

<P>

Excellence depends on individuals who take responsibility for

acquiring and maintaining professional competence. A professional

must participate in setting standards for appropriate levels of

competence, and strive to achieve those standards. Upgrading technical

knowledge and competence can be achieved in several ways: doing

independent study; attending seminars, conferences, or courses;

and being involved in professional organizations.

<P>

<BLOCKQUOTE>

<TABLE>

<TR VALIGN=TOP><TD WIDTH=30>2.3</TD><TD>Know and respect existing laws pertaining to professional work.</TD></TR>



</TABLE>

</BLOCKQUOTE>

<P>

ACM members must obey existing local, state, province, national,

and international laws unless there is a compelling ethical basis

not to do so. Policies and procedures of the organizations in

which one participates must also be obeyed. But compliance must

be balanced with the recognition that sometimes existing laws

and rules may be immoral or inappropriate and, therefore, must

be challenged. Violation of a law or regulation may be ethical

when that law or rule has inadequate moral basis or when it conflicts

with another law judged to be more important. If one decides to

violate a law or rule because it is viewed as unethical, or for

any other reason, one must fully accept responsibility for one's

actions and for the consequences.

<P>

<BLOCKQUOTE>

<TABLE>

<TR VALIGN=TOP><TD WIDTH=30>2.4</TD><TD>Accept and provide appropriate professional review.</TD></TR>

</TABLE>

</BLOCKQUOTE>

<P>

Quality professional work, especially in the computing profession,

depends on professional reviewing and critiquing. Whenever appropriate,

individual members should seek and utilize peer review as well

as provide critical review of the work of others.

<P>

<BLOCKQUOTE>

<TABLE>

<TR VALIGN=TOP><TD WIDTH=30>2.5</TD><TD>Give comprehensive and thorough evaluations of computer systems

and their impacts, including analysis of possible risks.</TD></TR>

</TABLE>

</BLOCKQUOTE>

<P>

Computer professionals must strive to be perceptive, thorough,

and objective when evaluating, recommending, and presenting system

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -