SlideShare a Scribd company logo
1 of 12
Professional Ethics

    Code of Ethics
Professional Ethics
• Encompass the personal and corporate standards of
  behaviour expected of professionals
• Set of standards adopted by a professional community
  that are regulated by standards called “codes of ethics”.
• The code of ethics is very important because it gives us
  boundaries that we have to stay within in our
  professional careers.
• The one problem with the code of ethics is that we
  can't always have the answers black and white.
  Sometimes there are grey areas where the answers
  aren't so simple.
Information Scientists CoE
  (American Society for Info Science)
• Responsibility to Individual Persons
  1. strive to make information available to
     individuals who need it
  2. strive both to ensure accuracy and not to
     infringe upon privacy or confidentiality in
     providing information about individuals
  3. protect each information user's and provider's
     right to privacy and confidentiality
  4. respect an information provider's proprietary
     rights
• Responsibility to Society
  1. serve the legitimate information needs of a large
     and complex society while at the same time
     being mindful of individuals' rights
  2. resist efforts to censor publications
  3. play active roles in educating society to
     understand and appreciate the importance of
     information promoting equal opportunity for
     access to information
Filipino IT Professionals CoE
     (Philippine Computing Society)
• Preamble: I will use my special knowledge and
  skills for the benefit of the public. I will serve
  employers and clients with integrity, subject to an
  overriding responsibility to the public interest,
  and I will strive to enhance the competence and
  prestige of the professional. By these, I mean:
1. I will promote public knowledge, understanding
   and appreciation of information technology;
2. I will consider the general welfare and public
   good in the performance of my work;
3. I will advertise goods or professional services in
   a clear and truthful manner; I will comply and
   strictly abide by the intellectual property laws,
   patent laws and other related laws in respect of
   information technology;
4. I will accept full responsibility for the work
   undertaken and will utilize my skills with
   competence and professionalism;
5. I will make truthful statements on my areas of
   competence as well as the capabilities and
   qualities of my products and services;
6. I will not disclose or use any confidential information
   obtained in the course of professional duties without
   the consent of the parties concerned, except when
   required by law;
7. I will try to attain the highest quality in both the
   products and services I offer;
8. I will not knowingly participate in the development of
   Information Technology Systems that will promote
   the commission of fraud and other unlawful acts;
9. I will uphold and improve the IT professional
   standards through continuing professional
   development in order to enhance the IT profession.
Programmers CoE
          (Int’l Programmers Guild)
1. A programmer must......never create or distribute
   malware.
2. ...never write code that is obfuscated or intentionally
   difficult to follow.
3. ...never write documentation that is intentionally
   confusing or inaccurate.
4. ...never reuse copyrighted code unless the proper
   license is purchased or permission is obtained.
5. ...acknowledge (verbally and in source code
   comments) the work of other programmers on which
   the code is based, even if substantial changes are
   made.
6. ...never write code that is deliberately inefficient with the
   intent of later claiming credit for making efficiency
   improvements.
7. ...never intentionally introduce bugs with the intent of
   later claiming credit for fixing the bugs, or to stimulate the
   uptake of later versions.
8. ...never write code that intentionally breaks another
   programmer's code for the purpose of elevating one's
   status.
9. ...never hide known obstacles to a project's completion
   during any phase of development, especially the design
   phase. ...never dishonestly downplay the difficulty of
   completing a project.
10....report any illegal activities of the employer.
11....never defame the profession.
12....never falsely deny the presence of bugs.
13....never reveal the secret corporate knowledge
   of an employer.
14....never accept compensation from multiple
   parties for the same work unless permission is
   given.
15....never perform competitive work without the
   employer's knowledge.
16....never conceal pertinent information from
   other members of the development team.
17....never conceal from the employer their
   financial interest in development resources.
18....never conceal any conflict of interest that may
   affect the project.
19....never seek external profit from a project that
   was funded by a second party without
   permission. If permission is given to resell a
   product, the work should be discounted.
20. . ..never maliciously injure the reputation of an
    employer or members of the development team.
21. ...never misrepresent their knowledge, experience, or
    abilities.
22. ...never take credit for another's work.
23. ...never steal software, especially development tools.
24. ...never conceal the deficiencies of other
    programmers by writing code for them and allowing
    them to pass it off as their own work.
25. ...stay current on the advancement of the field of
    Computer Science.

More Related Content

What's hot

Panunungkulan ni Quirino
Panunungkulan ni QuirinoPanunungkulan ni Quirino
Panunungkulan ni Quirinojetsetter22
 
Larangan ng sining
Larangan ng siningLarangan ng sining
Larangan ng siningNers Iraola
 
Gr.-7-10-Creative-Technologies.pdf
Gr.-7-10-Creative-Technologies.pdfGr.-7-10-Creative-Technologies.pdf
Gr.-7-10-Creative-Technologies.pdfChrisTalla1
 
Pamumuhay ng mga sinaunang pilipino sa panahong pre kolonyal
Pamumuhay ng mga sinaunang pilipino sa panahong pre kolonyalPamumuhay ng mga sinaunang pilipino sa panahong pre kolonyal
Pamumuhay ng mga sinaunang pilipino sa panahong pre kolonyalALVINFREO1
 
Configure Computer System and Network
Configure Computer System and NetworkConfigure Computer System and Network
Configure Computer System and NetworkEILLEN IVY PORTUGUEZ
 
National Capital Region (NCR)
National Capital Region (NCR)National Capital Region (NCR)
National Capital Region (NCR)Divine Dizon
 
COMPUTER SYSTEM SERVICING NC II CURRICULUM GUIDE
COMPUTER SYSTEM SERVICING NC II CURRICULUM GUIDECOMPUTER SYSTEM SERVICING NC II CURRICULUM GUIDE
COMPUTER SYSTEM SERVICING NC II CURRICULUM GUIDEJohndion Ruloma
 
Kapag naiisahan ako ng aking diyos
Kapag naiisahan ako ng aking diyosKapag naiisahan ako ng aking diyos
Kapag naiisahan ako ng aking diyosPRINTDESK by Dan
 
Css Major computer systems and networks
Css Major computer systems and networksCss Major computer systems and networks
Css Major computer systems and networksRhenan Belisario
 
Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012armaexen
 
Tools and Equipment used in CSS NCII
Tools and Equipment used in CSS NCIITools and Equipment used in CSS NCII
Tools and Equipment used in CSS NCIIDepEd-Bataan
 
24 SENADOR NG PILIPINAS
24 SENADOR NG PILIPINAS24 SENADOR NG PILIPINAS
24 SENADOR NG PILIPINASAlice Bernardo
 
Patakarang Pan-ekonomiya sa panahon ng panunungkulan ni Manuel A. Roxas
Patakarang Pan-ekonomiya sa panahon ng panunungkulan ni Manuel A. RoxasPatakarang Pan-ekonomiya sa panahon ng panunungkulan ni Manuel A. Roxas
Patakarang Pan-ekonomiya sa panahon ng panunungkulan ni Manuel A. RoxasAbigail Nicole Paasa
 
Computer system and network configuration
Computer system and network configurationComputer system and network configuration
Computer system and network configurationVon Alvarez
 
1 1st meeting for computer system servicing nc ii
1 1st meeting for computer system servicing nc ii1 1st meeting for computer system servicing nc ii
1 1st meeting for computer system servicing nc iiMarilou Jamero
 
CSS NC II learning Module
CSS NC II learning ModuleCSS NC II learning Module
CSS NC II learning ModuleEdmund Blanco
 
Ang pamamahala ni ferdinand marcos
Ang pamamahala ni ferdinand marcosAng pamamahala ni ferdinand marcos
Ang pamamahala ni ferdinand marcosVal Reyes
 

What's hot (20)

Panunungkulan ni Quirino
Panunungkulan ni QuirinoPanunungkulan ni Quirino
Panunungkulan ni Quirino
 
Larangan ng sining
Larangan ng siningLarangan ng sining
Larangan ng sining
 
Gr.-7-10-Creative-Technologies.pdf
Gr.-7-10-Creative-Technologies.pdfGr.-7-10-Creative-Technologies.pdf
Gr.-7-10-Creative-Technologies.pdf
 
Pamumuhay ng mga sinaunang pilipino sa panahong pre kolonyal
Pamumuhay ng mga sinaunang pilipino sa panahong pre kolonyalPamumuhay ng mga sinaunang pilipino sa panahong pre kolonyal
Pamumuhay ng mga sinaunang pilipino sa panahong pre kolonyal
 
Configure Computer System and Network
Configure Computer System and NetworkConfigure Computer System and Network
Configure Computer System and Network
 
National Capital Region (NCR)
National Capital Region (NCR)National Capital Region (NCR)
National Capital Region (NCR)
 
COMPUTER SYSTEM SERVICING NC II CURRICULUM GUIDE
COMPUTER SYSTEM SERVICING NC II CURRICULUM GUIDECOMPUTER SYSTEM SERVICING NC II CURRICULUM GUIDE
COMPUTER SYSTEM SERVICING NC II CURRICULUM GUIDE
 
Kapag naiisahan ako ng aking diyos
Kapag naiisahan ako ng aking diyosKapag naiisahan ako ng aking diyos
Kapag naiisahan ako ng aking diyos
 
Css Major computer systems and networks
Css Major computer systems and networksCss Major computer systems and networks
Css Major computer systems and networks
 
TLE 10 (ICT): LAN Cabling
TLE 10 (ICT): LAN CablingTLE 10 (ICT): LAN Cabling
TLE 10 (ICT): LAN Cabling
 
Power arroyo
Power arroyoPower arroyo
Power arroyo
 
Network
NetworkNetwork
Network
 
Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012
 
Tools and Equipment used in CSS NCII
Tools and Equipment used in CSS NCIITools and Equipment used in CSS NCII
Tools and Equipment used in CSS NCII
 
24 SENADOR NG PILIPINAS
24 SENADOR NG PILIPINAS24 SENADOR NG PILIPINAS
24 SENADOR NG PILIPINAS
 
Patakarang Pan-ekonomiya sa panahon ng panunungkulan ni Manuel A. Roxas
Patakarang Pan-ekonomiya sa panahon ng panunungkulan ni Manuel A. RoxasPatakarang Pan-ekonomiya sa panahon ng panunungkulan ni Manuel A. Roxas
Patakarang Pan-ekonomiya sa panahon ng panunungkulan ni Manuel A. Roxas
 
Computer system and network configuration
Computer system and network configurationComputer system and network configuration
Computer system and network configuration
 
1 1st meeting for computer system servicing nc ii
1 1st meeting for computer system servicing nc ii1 1st meeting for computer system servicing nc ii
1 1st meeting for computer system servicing nc ii
 
CSS NC II learning Module
CSS NC II learning ModuleCSS NC II learning Module
CSS NC II learning Module
 
Ang pamamahala ni ferdinand marcos
Ang pamamahala ni ferdinand marcosAng pamamahala ni ferdinand marcos
Ang pamamahala ni ferdinand marcos
 

Similar to 6 professional ethics

SE18_Lec 11_ Software Code of Ethics
SE18_Lec 11_ Software Code of EthicsSE18_Lec 11_ Software Code of Ethics
SE18_Lec 11_ Software Code of EthicsAmr E. Mohamed
 
SE_Lec 10_ Software Code of Ethics
SE_Lec 10_ Software Code of EthicsSE_Lec 10_ Software Code of Ethics
SE_Lec 10_ Software Code of EthicsAmr E. Mohamed
 
SPI101_WEEK-3-4_Computer-Ethics.ppsx
SPI101_WEEK-3-4_Computer-Ethics.ppsxSPI101_WEEK-3-4_Computer-Ethics.ppsx
SPI101_WEEK-3-4_Computer-Ethics.ppsxozaixyzo
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computerFatin Izzaty
 
Social Media and the Workplace: Navigating in a New World
Social Media and the Workplace: Navigating in a New WorldSocial Media and the Workplace: Navigating in a New World
Social Media and the Workplace: Navigating in a New WorldThis account is closed
 
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018Fizaril Amzari Omar
 
chapter 6 Ethics and Professionalism of ET.pptx
chapter 6   Ethics and Professionalism of ET.pptxchapter 6   Ethics and Professionalism of ET.pptx
chapter 6 Ethics and Professionalism of ET.pptxAmanuelZewdie4
 
Hr Handbook
Hr HandbookHr Handbook
Hr Handbooktmvivek
 
Bringing your-own-device usage policy for abc university collage employees
Bringing your-own-device usage policy for abc university collage employeesBringing your-own-device usage policy for abc university collage employees
Bringing your-own-device usage policy for abc university collage employeesKushmi Anuththara
 
professional ethics
professional ethicsprofessional ethics
professional ethicsHamza Cheema
 
Professional societies
Professional societiesProfessional societies
Professional societiesSulman Ahmed
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computeribrahimtbl3147
 
Super billing computers are your future
Super billing computers are your futureSuper billing computers are your future
Super billing computers are your futuresuperb11b
 
profession and it professionalism
profession and it professionalismprofession and it professionalism
profession and it professionalismHamza Cheema
 

Similar to 6 professional ethics (20)

SE18_Lec 11_ Software Code of Ethics
SE18_Lec 11_ Software Code of EthicsSE18_Lec 11_ Software Code of Ethics
SE18_Lec 11_ Software Code of Ethics
 
SE_Lec 10_ Software Code of Ethics
SE_Lec 10_ Software Code of EthicsSE_Lec 10_ Software Code of Ethics
SE_Lec 10_ Software Code of Ethics
 
SPI101_WEEK-3-4_Computer-Ethics.ppsx
SPI101_WEEK-3-4_Computer-Ethics.ppsxSPI101_WEEK-3-4_Computer-Ethics.ppsx
SPI101_WEEK-3-4_Computer-Ethics.ppsx
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Corporate ethics
Corporate ethicsCorporate ethics
Corporate ethics
 
Ethics in-information-security
Ethics in-information-securityEthics in-information-security
Ethics in-information-security
 
Social Media and the Workplace: Navigating in a New World
Social Media and the Workplace: Navigating in a New WorldSocial Media and the Workplace: Navigating in a New World
Social Media and the Workplace: Navigating in a New World
 
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
chapter 6 Ethics and Professionalism of ET.pptx
chapter 6   Ethics and Professionalism of ET.pptxchapter 6   Ethics and Professionalism of ET.pptx
chapter 6 Ethics and Professionalism of ET.pptx
 
week 2 lec 3 PP.pptx
week 2 lec 3 PP.pptxweek 2 lec 3 PP.pptx
week 2 lec 3 PP.pptx
 
Hr Handbook
Hr HandbookHr Handbook
Hr Handbook
 
Bringing your-own-device usage policy for abc university collage employees
Bringing your-own-device usage policy for abc university collage employeesBringing your-own-device usage policy for abc university collage employees
Bringing your-own-device usage policy for abc university collage employees
 
professional ethics
professional ethicsprofessional ethics
professional ethics
 
Professional societies
Professional societiesProfessional societies
Professional societies
 
Social Media Policy
Social Media PolicySocial Media Policy
Social Media Policy
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Super billing computers are your future
Super billing computers are your futureSuper billing computers are your future
Super billing computers are your future
 
profession and it professionalism
profession and it professionalismprofession and it professionalism
profession and it professionalism
 

More from Rheigh Henley Calderon

8 problem solving with the case logic structure
8 problem solving with the case logic structure8 problem solving with the case logic structure
8 problem solving with the case logic structureRheigh Henley Calderon
 
5 problem solving with the sequential logic structure
5 problem solving with the sequential logic structure5 problem solving with the sequential logic structure
5 problem solving with the sequential logic structureRheigh Henley Calderon
 
4 introduction to programming structure
4 introduction to programming structure4 introduction to programming structure
4 introduction to programming structureRheigh Henley Calderon
 
2 beginning problem solving concepts for the computer
2 beginning problem solving concepts for the computer2 beginning problem solving concepts for the computer
2 beginning problem solving concepts for the computerRheigh Henley Calderon
 
1 introduction to problem solving and programming
1 introduction to problem solving and programming1 introduction to problem solving and programming
1 introduction to problem solving and programmingRheigh Henley Calderon
 

More from Rheigh Henley Calderon (20)

10 data structures
10 data structures10 data structures
10 data structures
 
9 processing arrays
9 processing arrays9 processing arrays
9 processing arrays
 
8 problem solving with the case logic structure
8 problem solving with the case logic structure8 problem solving with the case logic structure
8 problem solving with the case logic structure
 
7 problem solving with loops
7 problem solving with loops7 problem solving with loops
7 problem solving with loops
 
6 problem solving with decisions
6 problem solving with decisions6 problem solving with decisions
6 problem solving with decisions
 
5 problem solving with the sequential logic structure
5 problem solving with the sequential logic structure5 problem solving with the sequential logic structure
5 problem solving with the sequential logic structure
 
4 introduction to programming structure
4 introduction to programming structure4 introduction to programming structure
4 introduction to programming structure
 
3 programming concepts
3 programming concepts3 programming concepts
3 programming concepts
 
2 beginning problem solving concepts for the computer
2 beginning problem solving concepts for the computer2 beginning problem solving concepts for the computer
2 beginning problem solving concepts for the computer
 
1 introduction to problem solving and programming
1 introduction to problem solving and programming1 introduction to problem solving and programming
1 introduction to problem solving and programming
 
9 technical support
9 technical support9 technical support
9 technical support
 
8 customer service
8 customer service8 customer service
8 customer service
 
7 laptop repair
7 laptop repair7 laptop repair
7 laptop repair
 
6 laptop basics
6 laptop basics6 laptop basics
6 laptop basics
 
5 pc maintenance
5 pc maintenance5 pc maintenance
5 pc maintenance
 
4 pc repair
4 pc repair4 pc repair
4 pc repair
 
3 pc upgrade
3 pc upgrade3 pc upgrade
3 pc upgrade
 
2 pc assembly
2 pc assembly2 pc assembly
2 pc assembly
 
1 hardware fundamentals
1 hardware fundamentals1 hardware fundamentals
1 hardware fundamentals
 
8 cyber crimes
8 cyber crimes8 cyber crimes
8 cyber crimes
 

Recently uploaded

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 

6 professional ethics

  • 1. Professional Ethics Code of Ethics
  • 2. Professional Ethics • Encompass the personal and corporate standards of behaviour expected of professionals • Set of standards adopted by a professional community that are regulated by standards called “codes of ethics”. • The code of ethics is very important because it gives us boundaries that we have to stay within in our professional careers. • The one problem with the code of ethics is that we can't always have the answers black and white. Sometimes there are grey areas where the answers aren't so simple.
  • 3. Information Scientists CoE (American Society for Info Science) • Responsibility to Individual Persons 1. strive to make information available to individuals who need it 2. strive both to ensure accuracy and not to infringe upon privacy or confidentiality in providing information about individuals 3. protect each information user's and provider's right to privacy and confidentiality 4. respect an information provider's proprietary rights
  • 4. • Responsibility to Society 1. serve the legitimate information needs of a large and complex society while at the same time being mindful of individuals' rights 2. resist efforts to censor publications 3. play active roles in educating society to understand and appreciate the importance of information promoting equal opportunity for access to information
  • 5. Filipino IT Professionals CoE (Philippine Computing Society) • Preamble: I will use my special knowledge and skills for the benefit of the public. I will serve employers and clients with integrity, subject to an overriding responsibility to the public interest, and I will strive to enhance the competence and prestige of the professional. By these, I mean: 1. I will promote public knowledge, understanding and appreciation of information technology; 2. I will consider the general welfare and public good in the performance of my work;
  • 6. 3. I will advertise goods or professional services in a clear and truthful manner; I will comply and strictly abide by the intellectual property laws, patent laws and other related laws in respect of information technology; 4. I will accept full responsibility for the work undertaken and will utilize my skills with competence and professionalism; 5. I will make truthful statements on my areas of competence as well as the capabilities and qualities of my products and services;
  • 7. 6. I will not disclose or use any confidential information obtained in the course of professional duties without the consent of the parties concerned, except when required by law; 7. I will try to attain the highest quality in both the products and services I offer; 8. I will not knowingly participate in the development of Information Technology Systems that will promote the commission of fraud and other unlawful acts; 9. I will uphold and improve the IT professional standards through continuing professional development in order to enhance the IT profession.
  • 8. Programmers CoE (Int’l Programmers Guild) 1. A programmer must......never create or distribute malware. 2. ...never write code that is obfuscated or intentionally difficult to follow. 3. ...never write documentation that is intentionally confusing or inaccurate. 4. ...never reuse copyrighted code unless the proper license is purchased or permission is obtained. 5. ...acknowledge (verbally and in source code comments) the work of other programmers on which the code is based, even if substantial changes are made.
  • 9. 6. ...never write code that is deliberately inefficient with the intent of later claiming credit for making efficiency improvements. 7. ...never intentionally introduce bugs with the intent of later claiming credit for fixing the bugs, or to stimulate the uptake of later versions. 8. ...never write code that intentionally breaks another programmer's code for the purpose of elevating one's status. 9. ...never hide known obstacles to a project's completion during any phase of development, especially the design phase. ...never dishonestly downplay the difficulty of completing a project.
  • 10. 10....report any illegal activities of the employer. 11....never defame the profession. 12....never falsely deny the presence of bugs. 13....never reveal the secret corporate knowledge of an employer. 14....never accept compensation from multiple parties for the same work unless permission is given. 15....never perform competitive work without the employer's knowledge.
  • 11. 16....never conceal pertinent information from other members of the development team. 17....never conceal from the employer their financial interest in development resources. 18....never conceal any conflict of interest that may affect the project. 19....never seek external profit from a project that was funded by a second party without permission. If permission is given to resell a product, the work should be discounted.
  • 12. 20. . ..never maliciously injure the reputation of an employer or members of the development team. 21. ...never misrepresent their knowledge, experience, or abilities. 22. ...never take credit for another's work. 23. ...never steal software, especially development tools. 24. ...never conceal the deficiencies of other programmers by writing code for them and allowing them to pass it off as their own work. 25. ...stay current on the advancement of the field of Computer Science.