Computering
Select three of the scenarios below and write up a paragraph for EACH scenario analyzing the ethical issues. Use the Ten Commandments of Computer Ethics as your frame of reference. At a minimum, identify the violator(s), violation(s), which commandment(s) they violate, why, and/or how, and what you feel should happen to the violator(s).
A company’s employee uses their work computer to test some software that their friend bought. It only takes a few minutes and they uninstall it after they are done.
A company’s employee gives a friend who works at a different company a copy of a proprietary software for them to use.
A company’s employee was curious as to what the “higher-ups” pay looks like. They break the passcodes and take a quick peek at the salaries.
A bank teller transfers money from a customer account into their account to pay a bill that is overdue. Three days later, the bank teller gets paid and transfers the money back.
A college student shares their password and computer lab access id with a fellow student who is not taking a computer class that requires a lab. The fellow student uses three hours of computer time to complete the government homework and prints a few recipes for their mom.
You are a software developer and you are asked to develop an app that will intentionally generate inaccurate information for a client. You are told in no uncertain terms that you must develop the app or lose your job.You write the program.
Sample Solution
Scenario 1: Company Employee Testing Friend's Software
- Analysis:
- The violator is the employee.
- The violation is using company resources (the computer) for personal gain or for a non-work-related activity.
- This primarily violates the commandment "Thou shalt not use other people's computer resources without authorization or proper compensation."
- Even though the software was uninstalled, the employee used company hardware and time without explicit permission. This is considered unauthorized use.
- While the infraction is minor, the employee should receive a verbal warning and be reminded of company policies regarding personal use of company resources. This reinforces the importance of respecting company property and time.
Scenario 2: Employee Giving Proprietary Software to a Friend
- Analysis:
- The violator is the employee.
- The violation is copyright infringement and unauthorized distribution of proprietary software.
- This directly violates the commandment "Thou shalt not copy or use proprietary software for which you have not paid."
- Proprietary software is the intellectual property of the company, and distributing it without authorization is illegal and unethical. This act can cause financial harm to the company.
- The employee should face serious disciplinary action, potentially including termination and legal repercussions. The company may also pursue legal action against the friend and their company.
Scenario 3: Employee Viewing Salaries
- Analysis:
- The violator is the employee.
- The violation is unauthorized access to confidential information.
- This violates the commandment "Thou shalt not snoop around in other people's computer files."
- Salaries are considered private and confidential information. Breaking passcodes to access them is a serious breach of privacy and trust.
- The employee should be terminated. This is a severe breach of trust and would be very hard to recover from. Depending on the company policies, and the laws of the region, legal actions could also be taken.