Number of Visitors :
View My Stats
Custom Search

Wednesday, August 6, 2008

ACM Professional Code of Conduct


According to the ACM
2.02. Not knowingly use software that is obtained or retained either illegally or unethically. What this means in terms of hackers is that they are not to download or copy files illegally or unethically. Any use outside the manufacturer's explicit “Terms of use” contract violates this.
2.06. Identify, document, collect evidence and report to the client or the employer promptly if, in their opinion, a project is likely to fail, to prove too expensive, to violate intellectual property law, or otherwise to be problematic. What this means in terms of hackers is that they shouldn’t take advantages of flaws in their employer’s programs to cause mischeif or deliberate destruction of data.
2.07. Identify, document, and report significant issues of social concern, of which they are aware, in software or related documents, to the employer or the client. What this means in terms of hackers is that they should notify their employer of any flaws in the programs that they own or are designing.
2.09. Promote no interest adverse to their employer or client, unless a higher ethical concern is being compromised; in that case, inform the employer or another appropriate authority of the ethical concern. What this means in terms of hackers, is that if the employer doesn’t listen to the employee’s concerns, the person has every right, every obligation to report said inattention to the proper authorities.
3.03. Identify, define and address ethical, economic, cultural, legal and environmental issues related to work projects. In terms of hackers, this means that they aren’t to take advantage of the ethical et al issues related to their work projects.
3.04. Ensure that they are qualified for any project on which they work or propose to work by an appropriate combination of education and training, and experience. What this means is, despite the fact that hackers are good programers, because of their likelyhood to commit crimes (even if “white hats,”) they should be disqualified from being hired simply because of what they are.
3.06. Work to follow professional standards, when available, that are most appropriate for the task at hand, departing from these only when ethically or technically justified. Hackers usually don't use any “prifessional standards.”
3.07. Strive to fully understand the specifications for software on which they work. Hackers tend to break code with errors in order to understand how it works.
3.12. Work to develop software and related documents that respect the privacy of those who will be affected by that software. Hackers create spyware.
3.13. Be careful to use only accurate data derived by ethical and lawful means, and use it only in ways properly authorized. Most methods hackers use are neither legal nor ethical.
3.14. Maintain the integrity of data, being sensitive to outdated or flawed occurrences. Hackers purposely seek to corrupt data and exploit flawed code.
6.01. Help develop an organizational environment favorable to acting ethically. Hackers don't do this.
6.05. Not promote their own interest at the expense of the profession, client or employer. Hackers generally put their self interest above anything else.
6.06. Obey all laws governing their work, unless, in exceptional circumstances, such compliance is inconsistent with the public interest. Hackers don’t follow the laws because hacking is illegal.

No comments: