📄 ch17.htm
字号:
aware of, any potential damage to the local or global environment.
<P>
<BLOCKQUOTE>
<TABLE>
<TR VALIGN=TOP><TD WIDTH=30>1.2</TD><TD>Avoid harm to others.</TD></TR>
</TABLE>
</BLOCKQUOTE>
<P>
"Harm" means injury or negative consequences, such as
undesirable loss of information, loss of property, property damage,
or unwanted environmental impacts. This principle prohibits use
of computing technology in ways that result in harm to any of
the following: users, the general public, employees, employers.
Harmful actions include intentional destruction or modification
of files and programs leading to serious loss of resources or
unnecessary expenditure of human resources such as the time and
effort required to purge systems of "computer viruses."
<P>
Well-intended actions, including those that accomplish assigned
duties, may lead to harm unexpectedly. In such an event the responsible
person or persons are obligated to undo or mitigate the negative
consequences as much as possible. One way to avoid unintentional
harm is to carefully consider potential impacts on all those affected
by decisions made during design and implementation.
<P>
To minimize the possibility of indirectly harming others, computing
professionals must minimize malfunctions by following generally
accepted standards for system design and testing. Furthermore,
it is often necessary to assess the social consequences of systems
to project the likelihood of any serious harm to others. If system
features are misrepresented to users, coworkers, or supervisors,
the individual computing professional is responsible for any resulting
injury.
<P>
In the work environment the computing professional has the additional
obligation to report any signs of system dangers that might result
in serious personal or social damage. If one's superiors do not
act to curtail or mitigate such dangers, it may be necessary to
"blow the whistle" to help correct the problem or reduce
the risk. However, capricious or misguided reporting of violations
can, itself, be harmful. Before reporting violations, all relevant
aspects of the incident must be thoroughly assessed. In particular,
the assessment of risk and responsibility must be credible. It
is suggested that advice be sought from other computing professionals.
See principle 2.5 regarding thorough evaluations.
<P>
<BLOCKQUOTE>
<TABLE>
<TR VALIGN=TOP><TD WIDTH=30>1.3</TD><TD>Be honest and trustworthy.</TD></TR>
</TABLE>
</BLOCKQUOTE>
<P>
Honesty is an essential component of trust. Without trust an organization
cannot function effectively. The honest computing professional
will not make deliberately false or deceptive claims about a system
or system design, but will instead provide full disclosure of
all pertinent system limitations and problems.
<P>
A computer professional has a duty to be honest about his or her
own qualifications, and about any circumstances that might lead
to conflicts of interest.
<P>
Membership in volunteer organizations such as ACM may at times
place individuals in situations where their statements or actions
could be interpreted as carrying the "weight" of a larger
group of professionals. An ACM member will exercise care to not
misrepresent ACM or positions and policies of ACM or any ACM units.
<P>
<BLOCKQUOTE>
<TABLE>
<TR VALIGN=TOP><TD WIDTH=30>1.4</TD><TD>Be fair and take action not to discriminate.</TD></TR>
</TABLE>
</BLOCKQUOTE>
<P>
The values of equality, tolerance, respect for others, and the
principles of equal justice govern this imperative. Discrimination
on the basis of race, sex, religion, age, disability, national
origin, or other such factors is an explicit violation of of ACM
policy and will not be tolerated.
<P>
Inequities between different groups of people may result from
the use or misuse of information and technology. In a fair society,all
individuals would have equal opportunity to participate in, or
benefit from, the use of computer resources regardless of race,
sex, religion, age, disability, national origin or other such
similar factors. However, these ideals do not justify unauthorized
use of computer resources nor do they provide an adequate basis
for violation of any other ethical imperatives of this code.
<P>
<BLOCKQUOTE>
<TABLE>
<TR VALIGN=TOP><TD WIDTH=30>1.5</TD><TD>Honor property rights including copyrights and patents.</TD></TR>
</TABLE>
</BLOCKQUOTE>
<P>
Violation of copyrights, patents, trade secrets and the terms
of license agreements is prohibited by law in most circumstances.
Even when software is not so protected, such violations are contrary
to professional behavior. Copies of software should be made only
with proper authorization. Unauthorized duplication of materials
must not be condoned.
<P>
<BLOCKQUOTE>
<TABLE>
<TR VALIGN=TOP><TD WIDTH=30>1.6</TD><TD>Give proper credit for intellectual property.</TD></TR>
</TABLE>
</BLOCKQUOTE>
<P>
Computing professionals are obligated to protect the integrity
of intellectual property. Specifically, one must not take credit
for other's ideas or work, even in cases where the work has not
been explicitly protected by copyright, patent, etc.
<P>
<BLOCKQUOTE>
<TABLE>
<TR VALIGN=TOP><TD WIDTH=30>1.7</TD><TD>Respect the privacy of others.</TD></TR>
</TABLE>
</BLOCKQUOTE>
<P>
Computing and communication technology enables the collection
and exchange of personal information on a scale unprecedented
in the history of civilization. Thus there is increased potential
for violating the privacy of individuals and groups. It is the
responsibility of professionals to maintain the privacy and integrity
of data describing individuals. This includes taking precautions
to ensure the accuracy of data, as well as protecting it from
unauthorized access or accidental disclosure to inappropriate
individuals. Furthermore, procedures must be established to allow
individuals to review their records and correct inaccuracies.
<P>
This imperative implies that only the necessary amount of personal
information be collected in a system, that retention and disposal
periods for that information be clearly defined and enforced,
and that personal information gathered for a specific purpose
not be used for other purposes without consent of the individual(s).
These principles apply to electronic communications, including
electronic mail, and prohibit procedures that capture or monitor
electronic user data, including messages,without the permission
of users or bona fide authorization related to system operation
and maintenance. User data observed during the normal duties of
system operation and maintenance must be treated with strictest
confidentiality, except in cases where it is evidence for the
violation of law, organizational regulations, or this Code. In
these cases, the nature or contents of that information must be
disclosed only to proper authorities. (See 1.9)
<P>
<BLOCKQUOTE>
<TABLE>
<TR VALIGN=TOP><TD WIDTH=30>1.8</TD><TD>Honor confidentiality.</TD></TR>
</TABLE>
</BLOCKQUOTE>
<P>
The principle of honesty extends to issues of confidentiality
of information whenever one has made an explicit promise to honor
confidentiality or, implicitly, when private information not directly
related to the performance of one's duties becomes available.
The ethical concern is to respect all obligations of confidentiality
to employers, clients, and users unless discharged from such obligations
by requirements of the law or other principles of this Code.
<H3>2. MORE SPECIFIC PROFESSIONAL RESPONSIBILITIES</H3>
<P>
As an ACM computing professional I will...
<P>
<BLOCKQUOTE>
<TABLE>
<TR VALIGN=TOP><TD WIDTH=30>2.1</TD><TD>Strive to achieve the highest quality, effectiveness and dignity
in both the process and products of professional work.</TD></TR>
</TABLE>
</BLOCKQUOTE>
<P>
Excellence is perhaps the most important obligation of a professional.
The computing professional must strive to achieve quality and
to be cognizant of the serious negative consequences that may
result from poor quality in a system.
<P>
<BLOCKQUOTE>
<TABLE>
<TR VALIGN=TOP><TD WIDTH=30>2.2</TD><TD>Acquire and maintain professional competence.</TD></TR>
</TABLE>
</BLOCKQUOTE>
<P>
Excellence depends on individuals who take responsibility for
acquiring and maintaining professional competence. A professional
must participate in setting standards for appropriate levels of
competence, and strive to achieve those standards. Upgrading technical
knowledge and competence can be achieved in several ways: doing
independent study; attending seminars, conferences, or courses;
and being involved in professional organizations.
<P>
<BLOCKQUOTE>
<TABLE>
<TR VALIGN=TOP><TD WIDTH=30>2.3</TD><TD>Know and respect existing laws pertaining to professional work.</TD></TR>
</TABLE>
</BLOCKQUOTE>
<P>
ACM members must obey existing local, state, province, national,
and international laws unless there is a compelling ethical basis
not to do so. Policies and procedures of the organizations in
which one participates must also be obeyed. But compliance must
be balanced with the recognition that sometimes existing laws
and rules may be immoral or inappropriate and, therefore, must
be challenged. Violation of a law or regulation may be ethical
when that law or rule has inadequate moral basis or when it conflicts
with another law judged to be more important. If one decides to
violate a law or rule because it is viewed as unethical, or for
any other reason, one must fully accept responsibility for one's
actions and for the consequences.
<P>
<BLOCKQUOTE>
<TABLE>
<TR VALIGN=TOP><TD WIDTH=30>2.4</TD><TD>Accept and provide appropriate professional review.</TD></TR>
</TABLE>
</BLOCKQUOTE>
<P>
Quality professional work, especially in the computing profession,
depends on professional reviewing and critiquing. Whenever appropriate,
individual members should seek and utilize peer review as well
as provide critical review of the work of others.
<P>
<BLOCKQUOTE>
<TABLE>
<TR VALIGN=TOP><TD WIDTH=30>2.5</TD><TD>Give comprehensive and thorough evaluations of computer systems
and their impacts, including analysis of possible risks.</TD></TR>
</TABLE>
</BLOCKQUOTE>
<P>
Computer professionals must strive to be perceptive, thorough,
and objective when evaluating, recommending, and presenting system
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -