SlideShare a Scribd company logo
1 of 14
Download to read offline
ACM
Code of Ethics
PROFESSIONAL PRACTICES (CS – 341)
ACM Code of Ethics
General moral imperatives: “As an ACM member I will…”
Contribute to society and human well-being.
Avoid harm to others.
Be honest and trustworthy.
Be fair and take action not to discriminate.
Honor property rights including copyrights and patents.
Give proper credit for intellectual property.
Respect the privacy of others.
Honor confidentiality.
Specific professional responsibilities: “As an
ACM computing professional I will”:
Strive to achieve the highest quality, effectiveness and dignity in both the process and
products of professional work.
Acquire and maintain professional competence.
Know and respect existing laws pertaining to professional work.
Accept and provide appropriate professional review.
Give comprehensive and thorough evaluations of computer system and their impacts,
including analysis of possible risks.
Honor contracts, agreements, and assigned responsibilities.
Improve public understanding of computing and its consequences.
Access computing and communication resources only when authorized to do so.
Organization leadership imperatives: “As an
ACM member and an organizational leader,
I will:”
Articulate social responsibilities of members of an organizational unit and encourage full acceptance of
those responsibilities.
Manage personnel and resources to design and build information systems that enhance the quality of
working life.
Acknowledge and support proper and authorized uses of an organization’s computing and communication
resources.
Ensure that users and those who will be affected by a design have their needs clearly articulated during
the assessment and design of requirements; later the system must be validated to meet requirements.
Articulate and support policies that protect the dignity of users and others affected by a computing
system.
Create opportunities for members of the organization to learn the principles and limitations of computer
systems.
Ethical decision making: Case 1
Ali is a database programmer
Large statistical program needed by his company.
Company programmers are encouraged to publicize their work
Ali has found himself stuck on a problem
He has persisted at this for several months.
His manager does not recognize complexity of problem.
She insists job be completed in the few days.
Ali remembers:
Co-worker had given him source listings of their current work.
He also has an early version of commercial software developed at another company
Ali studies these programs
Sees two areas of code which could be directly incorporated into his own
program
He uses segments of code both from his coworker and from the
commercial software
He does not tell anyone or mention it in the documentation.
He completes the project and turns it in a day ahead of time.
How does the Code of Ethics help us understand this case?
Applying the code: Case 1
This case highlights issues involving intellectual property
Ali violated professional ethics in two areas:
1. Failure to give credit for another’s work
2. Using code from a commercial package that was copyrighted
If Ali only “looked” at co-worker’s source code:
Could he then write his own program and still have a responsibility to give credit?
Yes: He should have acknowledged credit in documentation.
…Applying the code: Case 1
Use of commercial software code was also not appropriate:
Ali should have checked to determine whether or not company was
authorized to use source code before using it.
In general:
Desirable to share and exchange intellectual materials
But using software is definitely a violation of code.
Ethical decision making: Case 2
Aisha’s company has been hired by a client to build a security system. Because of cost overruns, client has
decided to opt for a less secure system.
Aisha believes information they will store is extremely sensitive.
With weak security:
Employees on workstations could figure out how to access this data.
Online intruders would also have access
Aisha feels strongly that system should be much more secure.
She has tried to explain the risk.
What should Aisha so? Should she refuse to build the system as they request?
Applying the Code: Case 2
This case highlights issues involving privacy.
Company officials:
Have an obligation to protect privacy of their employees. Therefore they should not accept inadequate
security.
Aisha’s first responsibility:
Attempt to educate company officials
If that fails, she needs to consider her contractual obligations in honoring assigned responsibilities.
We don’t have Aisha’s contract, but she may have to choose between her contract and her obligation to
honor privacy and security.
Ethical decision making: Case 3
A software development company has just produced a new software package.
It incorporates new tax laws and prepares both individual and small business tax returns
The president of the company knows that the program has a number of bugs
He also believes the first firm to put this kind of software on the market is likely to capture the largest
market share.
The company widely advertises the package.
When the product is shipped, it includes a disclaimer of responsibility for errors resulting from the use of
the program.
…Ethical decision making: Case 3
The company expects it will receive a number of complaints, queries, and suggestions for modification.
The company plans to use these to make changes and eventually issue updated, improved and
debugged versions. The president argues that this is general industry policy:
“Anyone who buys version 1.0 of a program knows this and will take proper precautions.”
Because of bugs, a number of users filed incorrect tax returns and were penalized by Rev Canada.
Applying the Code: Case 3
This case highlights issues involving legal liability for unreliable code.
Software Company (and president in particular) violated several principles in
the ACM code of ethics. Since he was aware of bugs in the product, he did
not strive to achieve the highest quality.
By failing to inform consumers about bugs to system, principle 2.5 was
violated. Here the risks to users are so great they have to pay penalties for
mistakes which result from the program.
By law companies can make disclaimers only when they are in “good
conscience” (Disclaimer does not meet legal test, violated principle 2.3)
Thank you!

More Related Content

What's hot

Ieee code of ethics
Ieee code of ethicsIeee code of ethics
Ieee code of ethicsWaqar Ahmad
 
computer misuse n criminal law
computer misuse n criminal lawcomputer misuse n criminal law
computer misuse n criminal lawHamza Cheema
 
BCS ethical dilemmas
BCS ethical dilemmasBCS ethical dilemmas
BCS ethical dilemmasBonny
 
Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 
Software Engineering Code Of Ethics And Professional Practice
Software Engineering Code Of Ethics And Professional PracticeSoftware Engineering Code Of Ethics And Professional Practice
Software Engineering Code Of Ethics And Professional Practice Saqib Raza
 
Professional Practice Course Outline
Professional Practice Course OutlineProfessional Practice Course Outline
Professional Practice Course OutlineSaqib Raza
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethicsSKS
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information SecurityDr. Loganathan R
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
computing profession and core skills
computing profession and core skillscomputing profession and core skills
computing profession and core skillsHamza Cheema
 
Ethics for it professionals and it users
Ethics for it professionals and it usersEthics for it professionals and it users
Ethics for it professionals and it usersBhanja Kishor Samudra
 
Professional Code of Ethics in Software Engineering
Professional Code of Ethics in Software EngineeringProfessional Code of Ethics in Software Engineering
Professional Code of Ethics in Software EngineeringLemi Orhan Ergin
 
Software Engineering Ethics
Software Engineering EthicsSoftware Engineering Ethics
Software Engineering EthicsKapil Rajpurohit
 
Software Engineering Code of Ethics
Software Engineering Code of EthicsSoftware Engineering Code of Ethics
Software Engineering Code of EthicsAbdel Salam Sayyad
 
Accountability And Auditing In Professional Practice
Accountability And Auditing In Professional PracticeAccountability And Auditing In Professional Practice
Accountability And Auditing In Professional PracticeSyed Hassan Ali
 

What's hot (20)

Ieee code of ethics
Ieee code of ethicsIeee code of ethics
Ieee code of ethics
 
computer misuse n criminal law
computer misuse n criminal lawcomputer misuse n criminal law
computer misuse n criminal law
 
BCS ethical dilemmas
BCS ethical dilemmasBCS ethical dilemmas
BCS ethical dilemmas
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Software Engineering Code Of Ethics And Professional Practice
Software Engineering Code Of Ethics And Professional PracticeSoftware Engineering Code Of Ethics And Professional Practice
Software Engineering Code Of Ethics And Professional Practice
 
Professional Practice Course Outline
Professional Practice Course OutlineProfessional Practice Course Outline
Professional Practice Course Outline
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
 
Chapter 1: Professional Issues in Software Engineering
Chapter 1: Professional Issues in Software Engineering  Chapter 1: Professional Issues in Software Engineering
Chapter 1: Professional Issues in Software Engineering
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Codes of ethics
Codes of ethicsCodes of ethics
Codes of ethics
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
professional practice case study
professional practice case study professional practice case study
professional practice case study
 
computing profession and core skills
computing profession and core skillscomputing profession and core skills
computing profession and core skills
 
Ethics for it professionals and it users
Ethics for it professionals and it usersEthics for it professionals and it users
Ethics for it professionals and it users
 
Professional Code of Ethics in Software Engineering
Professional Code of Ethics in Software EngineeringProfessional Code of Ethics in Software Engineering
Professional Code of Ethics in Software Engineering
 
Software Engineering Ethics
Software Engineering EthicsSoftware Engineering Ethics
Software Engineering Ethics
 
Software Engineering Code of Ethics
Software Engineering Code of EthicsSoftware Engineering Code of Ethics
Software Engineering Code of Ethics
 
Accountability And Auditing In Professional Practice
Accountability And Auditing In Professional PracticeAccountability And Auditing In Professional Practice
Accountability And Auditing In Professional Practice
 

Similar to ACM code of ethics

Professional practices week 2 lec 2.pptx
Professional practices week 2 lec 2.pptxProfessional practices week 2 lec 2.pptx
Professional practices week 2 lec 2.pptxbahmed0192
 
professional ethics
professional ethicsprofessional ethics
professional ethicsHamza Cheema
 
Ethics and software engineering
Ethics and software engineeringEthics and software engineering
Ethics and software engineeringSolomon Nsumba
 
Ethics and TechnologyACM Code of Ethics Project Guidelines.docx
Ethics and TechnologyACM Code of Ethics Project Guidelines.docxEthics and TechnologyACM Code of Ethics Project Guidelines.docx
Ethics and TechnologyACM Code of Ethics Project Guidelines.docxSANSKAR20
 
Super billing computers, ethics, social values
Super billing computers, ethics, social valuesSuper billing computers, ethics, social values
Super billing computers, ethics, social valuessuperb11b
 
professional Issues in COmputer science and Engineering
professional Issues in COmputer science and Engineeringprofessional Issues in COmputer science and Engineering
professional Issues in COmputer science and EngineeringMohibullah Saail
 
Activity 3 - Ethical Dilemma.docx
Activity 3 - Ethical Dilemma.docxActivity 3 - Ethical Dilemma.docx
Activity 3 - Ethical Dilemma.docxAmanmundey
 
ACS Code of Professional Conduct Case Studies .docx
ACS Code of Professional Conduct Case Studies .docxACS Code of Professional Conduct Case Studies .docx
ACS Code of Professional Conduct Case Studies .docxnettletondevon
 
ACS Code of Professional Conduct Case Studies .docx
ACS Code of Professional Conduct Case Studies .docxACS Code of Professional Conduct Case Studies .docx
ACS Code of Professional Conduct Case Studies .docxbobbywlane695641
 
Businesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxBusinesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxdewhirstichabod
 
BackgroundEthical issues can sometimes be complex and require mo.docx
BackgroundEthical issues can sometimes be complex and require mo.docxBackgroundEthical issues can sometimes be complex and require mo.docx
BackgroundEthical issues can sometimes be complex and require mo.docxwilcockiris
 
BackgroundEthical issues can sometimes be complex and require mo.docx
BackgroundEthical issues can sometimes be complex and require mo.docxBackgroundEthical issues can sometimes be complex and require mo.docx
BackgroundEthical issues can sometimes be complex and require mo.docxjasoninnes20
 
Essay #2 ethical considerations
Essay #2   ethical considerationsEssay #2   ethical considerations
Essay #2 ethical considerationsjandrewsxu
 
Essay #2 ethical considerations
Essay #2   ethical considerationsEssay #2   ethical considerations
Essay #2 ethical considerationsjandrewsxu
 
Professional Ethics
Professional EthicsProfessional Ethics
Professional EthicsIMAD HASSAN
 
BBA 3551, Information Systems Management 1 Course Lea.docx
 BBA 3551, Information Systems Management 1 Course Lea.docx BBA 3551, Information Systems Management 1 Course Lea.docx
BBA 3551, Information Systems Management 1 Course Lea.docxaryan532920
 
Ethical Considerations in Open-Source Software Usage
Ethical Considerations in Open-Source Software UsageEthical Considerations in Open-Source Software Usage
Ethical Considerations in Open-Source Software Usageepidemicaa
 

Similar to ACM code of ethics (20)

Professional practices week 2 lec 2.pptx
Professional practices week 2 lec 2.pptxProfessional practices week 2 lec 2.pptx
Professional practices week 2 lec 2.pptx
 
professional ethics
professional ethicsprofessional ethics
professional ethics
 
Ethics and software engineering
Ethics and software engineeringEthics and software engineering
Ethics and software engineering
 
PPIT Lecture 4
PPIT Lecture 4PPIT Lecture 4
PPIT Lecture 4
 
Ethics and TechnologyACM Code of Ethics Project Guidelines.docx
Ethics and TechnologyACM Code of Ethics Project Guidelines.docxEthics and TechnologyACM Code of Ethics Project Guidelines.docx
Ethics and TechnologyACM Code of Ethics Project Guidelines.docx
 
Super billing computers, ethics, social values
Super billing computers, ethics, social valuesSuper billing computers, ethics, social values
Super billing computers, ethics, social values
 
professional Issues in COmputer science and Engineering
professional Issues in COmputer science and Engineeringprofessional Issues in COmputer science and Engineering
professional Issues in COmputer science and Engineering
 
Activity 3 - Ethical Dilemma.docx
Activity 3 - Ethical Dilemma.docxActivity 3 - Ethical Dilemma.docx
Activity 3 - Ethical Dilemma.docx
 
ACS Code of Professional Conduct Case Studies .docx
ACS Code of Professional Conduct Case Studies .docxACS Code of Professional Conduct Case Studies .docx
ACS Code of Professional Conduct Case Studies .docx
 
ACS Code of Professional Conduct Case Studies .docx
ACS Code of Professional Conduct Case Studies .docxACS Code of Professional Conduct Case Studies .docx
ACS Code of Professional Conduct Case Studies .docx
 
Businesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxBusinesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docx
 
Ethics.ppt
Ethics.pptEthics.ppt
Ethics.ppt
 
Chap05
Chap05Chap05
Chap05
 
BackgroundEthical issues can sometimes be complex and require mo.docx
BackgroundEthical issues can sometimes be complex and require mo.docxBackgroundEthical issues can sometimes be complex and require mo.docx
BackgroundEthical issues can sometimes be complex and require mo.docx
 
BackgroundEthical issues can sometimes be complex and require mo.docx
BackgroundEthical issues can sometimes be complex and require mo.docxBackgroundEthical issues can sometimes be complex and require mo.docx
BackgroundEthical issues can sometimes be complex and require mo.docx
 
Essay #2 ethical considerations
Essay #2   ethical considerationsEssay #2   ethical considerations
Essay #2 ethical considerations
 
Essay #2 ethical considerations
Essay #2   ethical considerationsEssay #2   ethical considerations
Essay #2 ethical considerations
 
Professional Ethics
Professional EthicsProfessional Ethics
Professional Ethics
 
BBA 3551, Information Systems Management 1 Course Lea.docx
 BBA 3551, Information Systems Management 1 Course Lea.docx BBA 3551, Information Systems Management 1 Course Lea.docx
BBA 3551, Information Systems Management 1 Course Lea.docx
 
Ethical Considerations in Open-Source Software Usage
Ethical Considerations in Open-Source Software UsageEthical Considerations in Open-Source Software Usage
Ethical Considerations in Open-Source Software Usage
 

More from Muhammad Haroon

Basic blocks and flow graph in Compiler Construction
Basic blocks and flow graph in Compiler ConstructionBasic blocks and flow graph in Compiler Construction
Basic blocks and flow graph in Compiler ConstructionMuhammad Haroon
 
Address in the target code in Compiler Construction
Address in the target code in Compiler ConstructionAddress in the target code in Compiler Construction
Address in the target code in Compiler ConstructionMuhammad Haroon
 
Code generator in Compiler Construction
Code generator in Compiler ConstructionCode generator in Compiler Construction
Code generator in Compiler ConstructionMuhammad Haroon
 
Target language in compiler design
Target language in compiler designTarget language in compiler design
Target language in compiler designMuhammad Haroon
 
Heap management in Compiler Construction
Heap management in Compiler ConstructionHeap management in Compiler Construction
Heap management in Compiler ConstructionMuhammad Haroon
 
Storage organization and stack allocation of space
Storage organization and stack allocation of spaceStorage organization and stack allocation of space
Storage organization and stack allocation of spaceMuhammad Haroon
 
Backpatching in Compiler Construction
Backpatching in Compiler ConstructionBackpatching in Compiler Construction
Backpatching in Compiler ConstructionMuhammad Haroon
 
Type checking in Compiler Construction
Type checking in Compiler ConstructionType checking in Compiler Construction
Type checking in Compiler ConstructionMuhammad Haroon
 
Type conversion in Compiler Construction
Type conversion in Compiler ConstructionType conversion in Compiler Construction
Type conversion in Compiler ConstructionMuhammad Haroon
 
Semantic analysis in Compiler Construction
Semantic analysis in Compiler ConstructionSemantic analysis in Compiler Construction
Semantic analysis in Compiler ConstructionMuhammad Haroon
 
Intermediate code and three address instructions
Intermediate code and three address instructionsIntermediate code and three address instructions
Intermediate code and three address instructionsMuhammad Haroon
 
LR(0) parser in Compiler Consturction
LR(0) parser in Compiler ConsturctionLR(0) parser in Compiler Consturction
LR(0) parser in Compiler ConsturctionMuhammad Haroon
 
LR(1) CLR(1) Parser with Example
LR(1) CLR(1) Parser with ExampleLR(1) CLR(1) Parser with Example
LR(1) CLR(1) Parser with ExampleMuhammad Haroon
 
Powerful presentation components and skills
Powerful presentation components and skillsPowerful presentation components and skills
Powerful presentation components and skillsMuhammad Haroon
 
Terms of reference in Professional Practices
Terms of reference in Professional PracticesTerms of reference in Professional Practices
Terms of reference in Professional PracticesMuhammad Haroon
 
7 habits of highly effective people
7 habits of highly effective people7 habits of highly effective people
7 habits of highly effective peopleMuhammad Haroon
 

More from Muhammad Haroon (20)

Basic blocks and flow graph in Compiler Construction
Basic blocks and flow graph in Compiler ConstructionBasic blocks and flow graph in Compiler Construction
Basic blocks and flow graph in Compiler Construction
 
Address in the target code in Compiler Construction
Address in the target code in Compiler ConstructionAddress in the target code in Compiler Construction
Address in the target code in Compiler Construction
 
Code generator in Compiler Construction
Code generator in Compiler ConstructionCode generator in Compiler Construction
Code generator in Compiler Construction
 
Target language in compiler design
Target language in compiler designTarget language in compiler design
Target language in compiler design
 
Heap management in Compiler Construction
Heap management in Compiler ConstructionHeap management in Compiler Construction
Heap management in Compiler Construction
 
Storage organization and stack allocation of space
Storage organization and stack allocation of spaceStorage organization and stack allocation of space
Storage organization and stack allocation of space
 
Backpatching in Compiler Construction
Backpatching in Compiler ConstructionBackpatching in Compiler Construction
Backpatching in Compiler Construction
 
Type checking in Compiler Construction
Type checking in Compiler ConstructionType checking in Compiler Construction
Type checking in Compiler Construction
 
Type conversion in Compiler Construction
Type conversion in Compiler ConstructionType conversion in Compiler Construction
Type conversion in Compiler Construction
 
Semantic analysis in Compiler Construction
Semantic analysis in Compiler ConstructionSemantic analysis in Compiler Construction
Semantic analysis in Compiler Construction
 
Intermediate code and three address instructions
Intermediate code and three address instructionsIntermediate code and three address instructions
Intermediate code and three address instructions
 
LALR(1) parser
LALR(1) parserLALR(1) parser
LALR(1) parser
 
LR(0) parser in Compiler Consturction
LR(0) parser in Compiler ConsturctionLR(0) parser in Compiler Consturction
LR(0) parser in Compiler Consturction
 
SLR(1) parser
SLR(1) parserSLR(1) parser
SLR(1) parser
 
LR(1) CLR(1) Parser with Example
LR(1) CLR(1) Parser with ExampleLR(1) CLR(1) Parser with Example
LR(1) CLR(1) Parser with Example
 
Powerful presentation components and skills
Powerful presentation components and skillsPowerful presentation components and skills
Powerful presentation components and skills
 
Terms of reference in Professional Practices
Terms of reference in Professional PracticesTerms of reference in Professional Practices
Terms of reference in Professional Practices
 
Code of conduct .
Code of conduct .Code of conduct .
Code of conduct .
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
7 habits of highly effective people
7 habits of highly effective people7 habits of highly effective people
7 habits of highly effective people
 

Recently uploaded

Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 

Recently uploaded (20)

Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 

ACM code of ethics

  • 1. ACM Code of Ethics PROFESSIONAL PRACTICES (CS – 341)
  • 2. ACM Code of Ethics General moral imperatives: “As an ACM member I will…” Contribute to society and human well-being. Avoid harm to others. Be honest and trustworthy. Be fair and take action not to discriminate. Honor property rights including copyrights and patents. Give proper credit for intellectual property. Respect the privacy of others. Honor confidentiality.
  • 3. Specific professional responsibilities: “As an ACM computing professional I will”: Strive to achieve the highest quality, effectiveness and dignity in both the process and products of professional work. Acquire and maintain professional competence. Know and respect existing laws pertaining to professional work. Accept and provide appropriate professional review. Give comprehensive and thorough evaluations of computer system and their impacts, including analysis of possible risks. Honor contracts, agreements, and assigned responsibilities. Improve public understanding of computing and its consequences. Access computing and communication resources only when authorized to do so.
  • 4. Organization leadership imperatives: “As an ACM member and an organizational leader, I will:” Articulate social responsibilities of members of an organizational unit and encourage full acceptance of those responsibilities. Manage personnel and resources to design and build information systems that enhance the quality of working life. Acknowledge and support proper and authorized uses of an organization’s computing and communication resources. Ensure that users and those who will be affected by a design have their needs clearly articulated during the assessment and design of requirements; later the system must be validated to meet requirements. Articulate and support policies that protect the dignity of users and others affected by a computing system. Create opportunities for members of the organization to learn the principles and limitations of computer systems.
  • 5. Ethical decision making: Case 1 Ali is a database programmer Large statistical program needed by his company. Company programmers are encouraged to publicize their work Ali has found himself stuck on a problem He has persisted at this for several months. His manager does not recognize complexity of problem. She insists job be completed in the few days. Ali remembers: Co-worker had given him source listings of their current work. He also has an early version of commercial software developed at another company
  • 6. Ali studies these programs Sees two areas of code which could be directly incorporated into his own program He uses segments of code both from his coworker and from the commercial software He does not tell anyone or mention it in the documentation. He completes the project and turns it in a day ahead of time. How does the Code of Ethics help us understand this case?
  • 7. Applying the code: Case 1 This case highlights issues involving intellectual property Ali violated professional ethics in two areas: 1. Failure to give credit for another’s work 2. Using code from a commercial package that was copyrighted If Ali only “looked” at co-worker’s source code: Could he then write his own program and still have a responsibility to give credit? Yes: He should have acknowledged credit in documentation.
  • 8. …Applying the code: Case 1 Use of commercial software code was also not appropriate: Ali should have checked to determine whether or not company was authorized to use source code before using it. In general: Desirable to share and exchange intellectual materials But using software is definitely a violation of code.
  • 9. Ethical decision making: Case 2 Aisha’s company has been hired by a client to build a security system. Because of cost overruns, client has decided to opt for a less secure system. Aisha believes information they will store is extremely sensitive. With weak security: Employees on workstations could figure out how to access this data. Online intruders would also have access Aisha feels strongly that system should be much more secure. She has tried to explain the risk. What should Aisha so? Should she refuse to build the system as they request?
  • 10. Applying the Code: Case 2 This case highlights issues involving privacy. Company officials: Have an obligation to protect privacy of their employees. Therefore they should not accept inadequate security. Aisha’s first responsibility: Attempt to educate company officials If that fails, she needs to consider her contractual obligations in honoring assigned responsibilities. We don’t have Aisha’s contract, but she may have to choose between her contract and her obligation to honor privacy and security.
  • 11. Ethical decision making: Case 3 A software development company has just produced a new software package. It incorporates new tax laws and prepares both individual and small business tax returns The president of the company knows that the program has a number of bugs He also believes the first firm to put this kind of software on the market is likely to capture the largest market share. The company widely advertises the package. When the product is shipped, it includes a disclaimer of responsibility for errors resulting from the use of the program.
  • 12. …Ethical decision making: Case 3 The company expects it will receive a number of complaints, queries, and suggestions for modification. The company plans to use these to make changes and eventually issue updated, improved and debugged versions. The president argues that this is general industry policy: “Anyone who buys version 1.0 of a program knows this and will take proper precautions.” Because of bugs, a number of users filed incorrect tax returns and were penalized by Rev Canada.
  • 13. Applying the Code: Case 3 This case highlights issues involving legal liability for unreliable code. Software Company (and president in particular) violated several principles in the ACM code of ethics. Since he was aware of bugs in the product, he did not strive to achieve the highest quality. By failing to inform consumers about bugs to system, principle 2.5 was violated. Here the risks to users are so great they have to pay penalties for mistakes which result from the program. By law companies can make disclaimers only when they are in “good conscience” (Disclaimer does not meet legal test, violated principle 2.3)