Principles of ACM Code of Ethics and Professional
Principles of ACM Code of Ethics and Professional
Must mitigate unintended harm, intentional harm must be ethically justified and minimized.
Evaluate the potential impact of decisions on all stakeholders; follow best practices to avoid harm.
Assess risks from data aggregation and emergent system properties to avoid unintended harm.
Report signs of potential harm; if leaders do not act, whistleblowing may be necessary, but avoid reckless
reporting.
1.3 Be honest and trustworthy.
An Computing Professional must,
Be transparent and honest about system capabilities, limitations, and issues.
Avoid dishonest conduct such as falsifying data, offering or accepting bribes, or making false claims.
Admit limitations and avoid tasks beyond your expertise.
Report any situations that might affect their judgment.
Keep promises and don't misrepresent an organization's policies or speak on its behalf without
authorization.
1.4 Be fair and take action not to discriminate.
The values of equality, tolerance, respect for others, and justice govern this principle.Fairness requires that
even careful decision processes provide some avenue for redress of grievances.A Computing Professional,
should foster fair participation of all people, including those from underrepresented groups.
Discrimination based on age, color, disability, ethnicity, gender identity, sexual orientation, etc., is a
violation of the Code.
Any form of harassment, including sexual harassment and bullying, is prohibited.
Design technology to be inclusive and accessible to avoid discrimination or oppression.
Offer experiences that help computing professionals understand the consequences, limitations, and complexities of
various systems.
Computing professionals should recognize the inherent risks in systems, such as software errors and complex
interactions, and understand their responsibility to manage these risks.
3.6 Use care when modifying or retiring systems.
Leaders must be cautious when changing or discontinuing system features, as these can impact user productivity.
Before removing support for a legacy system, explore viable alternatives to ensure users have reliable options.
If removal is necessary, developers should help stakeholders smoothly transition to new systems.
Users should be informed well in advance about the risks of continued use of unsupported systems.
Assist users in monitoring the viability of their systems, emphasizing the need for timely replacement of outdated
features or systems.
3.7 Recognize and take special care of systems that become integrated
into the infrastructure of society.
Leaders must ensure responsible management of computer systems integrated into critical societal infrastructure, like
commerce, travel, healthcare, and education.
Establish policies that promote fair access to systems, particularly for those who may face exclusion or discrimination.
Organizations should monitor how their systems are being integrated into society and adjust their ethical
responsibilities accordingly.
As the use of a system evolves, ethical responsibilities can change. Organizations should respond to these shifts to
maintain compliance with the Code of Ethics.
If existing standards of care are lacking, computing professionals have a duty to contribute to the development of
appropriate ethical standards.
4. COMPLIANCE WITH THE CODE
Compliance with a code of ethics means
adhering to a set of principles that guide
ethical behavior and professional integrity.
It involves following established rules and
standards, making decisions based on
ethical values, and treating others with
honesty, fairness, and respect. Compliance
also includes taking responsibility for one’s
actions and reporting unethical conduct. It
reflects a commitment to uphold high
standards and foster a culture of trust and
accountability.
4.1 Uphold, promote, and respect the principles of the Code.
The future of computing relies on professionals excelling in both technical skills and ethical behavior.
Computing professionals should follow the principles outlined in the Code of Ethics.
If professionals notice violations of the Code, they should take steps to address them.
When reasonable, professionals should express their concerns to those believed to be violating the Code.
Professionals should also work to improve the Code of Ethics and its application in the computing field.
These recommendations aim to address the abusive behavior, create a supportive work environment, and ensure
compliance with ethical standards. The case study can be used in a PowerPoint presentation to highlight the impact of
abusive workplace behavior and the need for ethical leadership and workplace responsibility.
Case Study: Malicious Inputs to Content Filters
Background:
Context: The U.S. Children’s Internet Protection Act (CIPA) requires public schools and libraries to block inappropriate
online content to protect minors.
Product: Blocker Plus is an automated Internet content filter used by schools, libraries, and home users to comply with
CIPA regulations.
Technology: Blocker Plus uses a centrally controlled blacklist and machine learning to identify inappropriate content.
The Problem:
Machine Learning Vulnerability: Blocker Plus implemented a user feedback mechanism to improve its machine
learning model.
Exploitation: Activist groups exploited this mechanism to corrupt the classification system, leading to inappropriate
blocking of legitimate content on topics like gay marriage, vaccination, and climate change.
Company Response: Blocker Plus disabled accounts linked to activist groups but kept the corrupted model intact,
fearing greater legal and business risks if they reverted to an outdated version.
Ethical Analysis:
Principles Violated:Principle 1.2 (Avoid Harm): The corrupted model caused harm by suppressing legitimate
information and discriminating based on sexual orientation.
Principle 1.3 (Be Honest and Trustworthy): Blocker Plus did not disclose its system's limitations to stakeholders and
the public.
Principle 1.4 (Be Fair and Take Action Not to Discriminate): The system's misclassification led to discrimination.
Principle 2.4 (Design for Safety and Privacy): Blocker Plus failed to consider the potential misuse of its feedback
mechanism.
Principle 2.5 (Use Appropriate Care for Machine Learning Systems): Blocker Plus did not exercise caution in deploying
machine learning.
Principle 2.7 (Foster Public Awareness and Understanding): Blocker Plus did not provide transparency about the
system's limitations.
Principle 2.8 (Use Public Data Appropriately): Activist groups misused the system's feedback mechanism.
Principle 3.7 (Be Good Stewards of Systems): Blocker Plus failed to ensure proper stewardship, given its impact on
educational infrastructure.
Recommendations:
Fix the Model: Blocker Plus should correct the machine learning model to prevent unjustified censorship.
Transparent Communication: The company should disclose its system's limitations and corrective actions to
stakeholders and the public.
Redesign Feedback Mechanism: Implement safeguards to prevent malicious input and abuse of the system.
Ongoing Monitoring: Regularly monitor and update the machine learning model to prevent future misuse.
These recommendations aim to bring Blocker Plus into compliance with the ACM Code of Ethics, ensuring that the
system is used responsibly and does not cause harm through inappropriate censorship or discrimination.