0% found this document useful (0 votes)
506 views25 pages

Principles of ACM Code of Ethics and Professional

Uploaded by

22201260
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
506 views25 pages

Principles of ACM Code of Ethics and Professional

Uploaded by

22201260
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

Principles of ACM Code of Ethics

and Professional Conduct:


A Comprehensive Guideline for Computing Professionals
PRESENTED BY:
o Abdullah Bin Hossain oMd.Shirajus Salekin
ID:22201260 ID:22201268

o Pritha Akram oKazi Jamil Jetu


ID:22201237 ID:22201236

o Md.Noushad Jahan Ramim oAfia Mahmud Roshni


ID:22201257 ID:22201238

o Nafis Iqbal Turag


ID:22201232
The ACM Code of Ethics consists of four main sections:
1.section 1 outlines fundamental ethical principles that form the basis for the
remainder of the Code.
2.Section 2 addresses additional, more specific considerations of professional
responsibility.
3. Section 3 guides individuals who have a leadership role, whether in the
workplace or in a volunteer professional capacity.
4.Section 4 explains principles involving compliance with the code for every
ACM member.
WHAT IS ACM CODE OF ETHICS?
Computing professionals actions change the world. To act responsibly,they
should reflect upon the wider impacts of their work, consistently supporting the
public good. The ACM (Association for Computing Machinery) Code of Ethics
and Professional Conduct is a set of guidelines developed to guide the ethical
behavior of computing professionals. It addresses a wide range of ethical issues
relevant to the field of computing, emphasizing the importance of promoting the
public good and responsible professional conduct.
SECTION 1: GENERAL ETHICAL PRINCIPLES
general ethical principle is a foundational
guideline that informs moral conduct and
decision-making in professional contexts. In
the context of the ACM Code of Ethics,
these principles guide computing
professionals in their actions, promoting
integrity, fairness, and responsibility. They
serve as a framework for ethical behavior
and help ensure that technology and
computing practices are used in ways that
benefit society and respect individual
rights.
1.1 Contribute to society and to human well-being,
acknowledging that all people are stakeholders in computing.
This principle concerns to all the computing professionals,
 To deem the quality of life of all people
 To use computing skills for the good of society, enhancing human well-being
 Minimizing harm, Avoid negative consequences, such as threats to health, safety, security,
or privacy.
 Prioritize the needs of those less advantaged when interests conflict.
 Respect diversity and ensure broad accessibility of computing work.
 Contribute to the public good through pro bono or volunteer work.
 Promote sustainability locally and globally to ensure a safe natural environment.
1.2 Avoid Harm
“Harm” means negative consequences, especially when those consequences are significant and unjust.It
includes unjustified injury, destruction of information, damage to property, reputation, or the environment.A
Computer Professional,

 Must mitigate unintended harm, intentional harm must be ethically justified and minimized.
 Evaluate the potential impact of decisions on all stakeholders; follow best practices to avoid harm.
 Assess risks from data aggregation and emergent system properties to avoid unintended harm.
 Report signs of potential harm; if leaders do not act, whistleblowing may be necessary, but avoid reckless
reporting.
1.3 Be honest and trustworthy.
An Computing Professional must,
 Be transparent and honest about system capabilities, limitations, and issues.
 Avoid dishonest conduct such as falsifying data, offering or accepting bribes, or making false claims.
 Admit limitations and avoid tasks beyond your expertise.
 Report any situations that might affect their judgment.
 Keep promises and don't misrepresent an organization's policies or speak on its behalf without
authorization.
1.4 Be fair and take action not to discriminate.
The values of equality, tolerance, respect for others, and justice govern this principle.Fairness requires that
even careful decision processes provide some avenue for redress of grievances.A Computing Professional,
 should foster fair participation of all people, including those from underrepresented groups.
 Discrimination based on age, color, disability, ethnicity, gender identity, sexual orientation, etc., is a
violation of the Code.
 Any form of harassment, including sexual harassment and bullying, is prohibited.
 Design technology to be inclusive and accessible to avoid discrimination or oppression.

1.5 Respect the work required to produce new ideas, inventions,


creative works, and computing artifacts
In this principle,A computing Professional should,
 Give proper credit to creators for their ideas, inventions, and computing artifacts.
 Uphold legal protections for intellectual property, including copyrights, patents, and trade secrets.
 Understand that some exceptions to intellectual property control serve the public interest.
 Participate in projects that benefit society, such as free and open-source software.
 Avoid claiming ownership of work intended for public use or shared in the public domain.
1.6 Respect privacy.
The responsibility of respecting privacy applies to computing professionals in a particularly profound way.A Computing
Professional must,
 Understand the profound impact technology has on privacy due to the rapid and often unseen collection, monitoring,
and exchange of personal information.
 Use personal information only for legitimate purposes without violating the rights of individuals and groups.
 Protect personal data from unauthorized access and accidental disclosure, and ensure the accuracy and provenance
of the data.
 Create clear policies for data collection, use, retention, and disposal, allowing individuals to give informed consent
and manage their own data.
 Collect only the minimum personal information needed and avoid using it for other purposes without the individual's
consent. Be careful when merging data collections to avoid compromising privacy.

1.7 Honor confidentiality.


A Computing Professional,
 must safeguard confidential data like trade secrets, client data, and financial information.
 Confidentiality should be maintained unless the information indicates a violation of law, organizational
regulations, or the Code.
 If disclosure is required, share only with appropriate authorities and ensure it aligns with ethical guidelines.
SECTION 2: PROFESSIONAL RESPONSIBILITIES.
Professional responsibilities are the
obligations and duties that individuals
have within their professions to ensure
ethical behavior, competence,
accountability, and respect for others.
These responsibilities guide
professionals to act in a way that
upholds industry standards, complies
with laws and regulations, and
maintains the integrity and
trustworthiness of their field. The aim
is to promote public safety, fairness,
and the ethical use of professional
expertise.
2.1 A Computing Professional should strive to achieve high quality
in both the processes and products of professional work.
 Computing professionals should uphold high standards in their work and expect the same from colleagues.
 Treat everyone involved, from employers to clients to users, with respect and dignity.
 Ensure clear and open communication with all stakeholders throughout the project.
 Be aware of potential negative outcomes from poor-quality work and avoid compromises that could lead to these
risks.
2.2 Maintain high standards of professional competence, conduct,and
ethical practice.
 Maintaining a high level of technical knowledge and awareness of the social context is key to quality computing.
 Competence includes effective communication, reflective analysis, and the ability to handle ethical challenges.
 Ongoing skill improvement is essential and can be achieved through study, conferences, seminars, and other
educational avenues.
 Employers and professional groups should support and encourage skill development and learning activities.

2.3 Know and respect existing rules pertaining to professional work.


 Follow local, regional, national, and international laws, as well as organizational policies and procedures.
 If a rule is unethical or causes harm, consider challenging it through existing channels.
 Violate rules only with a compelling ethical reason, after considering the potential consequences.
 If one choose to break a rule, accept responsibility for the outcome.
2.4 Accept and provide appropriate professional review.
A computing Professional should,
 Seek and use peer and stakeholder review to ensure high-quality professional work.
 Provide constructive, critical reviews of others' work.

2.5 Give comprehensive and thorough evaluations of computer systems


and their impacts, including analysis of possible risks.
A Computing Professional must,
 provide objective and credible evaluations, recommendations, and testimony.
 Be perceptive, thorough, and objective when evaluating system risks, especially in machine learning.
 Identify and address potential risks; reassess frequently if future risks are unpredictable.
 Report significant risks to appropriate parties.

2.6 Perform work only in areas of competence.


 Computing professionals should evaluate work assignments for feasibility and determine if they are within their
areas of expertise.
 If a lack of required skills is identified, professionals must inform the employer or client.
 The client or employer may choose to delay the project, assign it to someone else, or abandon it based on the
information provided by the professional.
 A computing professional's ethical judgment is crucial in deciding whether to continue with a work assignment.
2.7 Foster public awareness and understanding of computing, related
technologies, and their consequences.
 Computing professionals should share their technical expertise with the public in a clear, respectful, and welcoming
manner.
 Encourage awareness and understanding of computing, including its impacts, limitations, vulnerabilities, and
opportunities.
 Address and correct inaccurate or misleading information related to computing in a respectful way.

2.8 Access computing and communication resources only when


authorized or when compelled by the public good.
 Computing professionals should not access another's system, software, or data without proper authorization or a
compelling public good reason.
 The fact that a system is publicly accessible does not automatically mean that accessing it is authorized.
 In rare cases, unauthorized access may be used to disrupt malicious systems, but extraordinary precautions must
be taken to prevent harm.
2.9 Design and implement systems that are robustly and usably secure.
 Security should be a primary consideration in the design and implementation of computing systems to
prevent harm.
 Computing professionals must ensure systems work as intended and take action to secure them against
misuse, modification, and denial of service.
 Continuous security measures such as monitoring, patching, and vulnerability reporting should be in place
due to evolving threats.
 If data breaches occur, affected parties should be notified promptly and given clear guidance for
remediation.
 Security features should be intuitive and easy to use, avoiding excessive complexity or inappropriate
measures that could inhibit legitimate use.
 If misuse or harm is likely or unavoidable, the best course of action may be to not implement the system.
3. PROFESSIONAL LEADERSHIP PRINCIPLES.

Leadership may either be a formal


designation or arise informally from
influence over others. In this section,
“leader”; means any member of an
organization or group who has influence,
educational responsibilities, or
managerial responsibilities. While these
principles apply to all computing
professionals, leaders bear a heightened
responsibility to uphold and promote
them, both within and through their
organizations.
3.1 Ensure that the public good is the central concern during all
professional computing work.
 Computing activities should prioritize people, including users, customers, colleagues, and those indirectly affected.
 The public good should always be considered when evaluating tasks across the computing lifecycle, from research
to disposal.
 The focus on people and the public good must remain consistent, regardless of the methodologies or techniques
used.
3.2 Articulate, encourage acceptance of, and evaluate fulfillment of
social responsibilities by members of the organization or group.
 Leaders of technical organizations should recognize their impact on society and accept the responsibilities that
come with it.
 Organizations should promote quality and transparency in their procedures to reduce harm and increase
awareness of technology's influence.
 Leaders should encourage computing professionals to fulfill social responsibilities and discourage behaviors that
would hinder these efforts.
3.3 Manage personnel and resources to enhance the quality of working
life.
 Leaders should improve, not degrade, the quality of the working environment.
 They should address personal and professional development, accessibility, safety, psychological health, and
human dignity.
 Implement ergonomic standards to ensure a safe and comfortable workplace.
3.4 Articulate, apply, and support policies and processes that reflect the principles
of the Code.
 Leaders should create and communicate with relevant stakeholders clear organizational policies that align with
ethical principles.
 Leaders should encourage and reward adherence to these policies and take action against violations.
 Avoid processes that violate or enable violations of ethical principles.

3.5 Create opportunities for members of the organization or group to


grow as professionals.
 Leaders should ensure that computing professionals have access to educational opportunities to improve their
technical skills, ethics, and professionalism.

 Offer experiences that help computing professionals understand the consequences, limitations, and complexities of
various systems.

 Computing professionals should recognize the inherent risks in systems, such as software errors and complex
interactions, and understand their responsibility to manage these risks.
3.6 Use care when modifying or retiring systems.
 Leaders must be cautious when changing or discontinuing system features, as these can impact user productivity.
 Before removing support for a legacy system, explore viable alternatives to ensure users have reliable options.
 If removal is necessary, developers should help stakeholders smoothly transition to new systems.
 Users should be informed well in advance about the risks of continued use of unsupported systems.
 Assist users in monitoring the viability of their systems, emphasizing the need for timely replacement of outdated
features or systems.
3.7 Recognize and take special care of systems that become integrated
into the infrastructure of society.
 Leaders must ensure responsible management of computer systems integrated into critical societal infrastructure, like
commerce, travel, healthcare, and education.
 Establish policies that promote fair access to systems, particularly for those who may face exclusion or discrimination.
 Organizations should monitor how their systems are being integrated into society and adjust their ethical
responsibilities accordingly.
 As the use of a system evolves, ethical responsibilities can change. Organizations should respond to these shifts to
maintain compliance with the Code of Ethics.
 If existing standards of care are lacking, computing professionals have a duty to contribute to the development of
appropriate ethical standards.
4. COMPLIANCE WITH THE CODE
Compliance with a code of ethics means
adhering to a set of principles that guide
ethical behavior and professional integrity.
It involves following established rules and
standards, making decisions based on
ethical values, and treating others with
honesty, fairness, and respect. Compliance
also includes taking responsibility for one’s
actions and reporting unethical conduct. It
reflects a commitment to uphold high
standards and foster a culture of trust and
accountability.
4.1 Uphold, promote, and respect the principles of the Code.
 The future of computing relies on professionals excelling in both technical skills and ethical behavior.
 Computing professionals should follow the principles outlined in the Code of Ethics.
 If professionals notice violations of the Code, they should take steps to address them.
 When reasonable, professionals should express their concerns to those believed to be violating the Code.
 Professionals should also work to improve the Code of Ethics and its application in the computing field.

4.2 Treat violations of the Code as inconsistent with membership in the


ACM.
 ACM members should encourage all computing professionals to adhere to the ACM Code of Ethics, whether or not
they are ACM members.
 ACM members are encouraged to report any breaches of the Code to the ACM, which may lead to remedial actions
as per the ACM's Enforcement Policy.
 The ACM Code of Ethics was developed by a task force chaired by Don Gotterbarn and included an executive
committee and a broader team of contributing members.
 The ACM Code of Ethics was developed by a task force chaired by Don Gotterbarn and included an executive
committee and a broader team of contributing members.
 The development of the Code involved significant contributions from the broader international ACM membership.
Case Study: Abusive Workplace Behavior
Background:
 Person: Diane recently joined a research team in an industry-leading technology company.
 Role: Diane's technical leader, Max, is a recognized expert in augmented reality but has a reputation for being
mercurial and abusive.
 Behavior: Max has a history of verbal abuse, berating team members for minor mistakes, and even removing women
from journal submissions as punishment.
The Incident:
 Trigger: Diane made a code update that caused a glitch in the prototype just before a live demo.
 Max's Reaction: Max verbally attacked Diane, barred her from the demo, and removed her from stage appearances.
 Management Response: Diane approached the team manager, Jean, who dismissed her concerns, suggesting that
abuse was the "price to pay" for working with a high-profile team.
Ethical Analysis:
Max's Violations:
 Principle 1.1 (Contribute to Society and Human Well-being): Max's abusive behavior undermines a safe and
healthy workplace.
 Principle 1.5 (Give Credit for Work): Removing names from journal submissions dishonestly denies team members
proper credit.
 Principle 1.4 (Be Fair and Take Action Not to Discriminate): Max's punitive actions targeted women, indicating
discrimination and abuse of power.
 Principle 2.2 (Maintain Professional Communication): Max's verbal abuse is inconsistent with high standards of
professional communication.
Jean's Violations:
 Principle 3.3 (Manage Personnel Responsibly): By allowing Max's behavior and suggesting that Diane "grow up," Jean
failed to ensure the psychological well-being and dignity of team members.
 Principle 3.4 (Comply with Code Principles): Jean's inaction reflects a failure to enforce policies consistent with the
ACM Code of Ethics.
Recommendations:
 Addressing Abuse: The company should immediately address Max's abusive behavior, ensuring a safe and
professional work environment.
 Supporting Affected Team Members: Provide support and compensation to those who experienced discrimination or
abuse, including Diane.
 Management Accountability: Hold Jean accountable for failing to address the abusive behavior and violating code
principles.
 Workplace Training: Implement mandatory training on workplace ethics, discrimination, and harassment prevention.
 Whistleblower Protections: Establish clear channels for reporting abuse and ensure protection for whistleblowers.

These recommendations aim to address the abusive behavior, create a supportive work environment, and ensure
compliance with ethical standards. The case study can be used in a PowerPoint presentation to highlight the impact of
abusive workplace behavior and the need for ethical leadership and workplace responsibility.
Case Study: Malicious Inputs to Content Filters
Background:
 Context: The U.S. Children’s Internet Protection Act (CIPA) requires public schools and libraries to block inappropriate
online content to protect minors.
 Product: Blocker Plus is an automated Internet content filter used by schools, libraries, and home users to comply with
CIPA regulations.
 Technology: Blocker Plus uses a centrally controlled blacklist and machine learning to identify inappropriate content.
The Problem:
 Machine Learning Vulnerability: Blocker Plus implemented a user feedback mechanism to improve its machine
learning model.
 Exploitation: Activist groups exploited this mechanism to corrupt the classification system, leading to inappropriate
blocking of legitimate content on topics like gay marriage, vaccination, and climate change.
 Company Response: Blocker Plus disabled accounts linked to activist groups but kept the corrupted model intact,
fearing greater legal and business risks if they reverted to an outdated version.
Ethical Analysis:
 Principles Violated:Principle 1.2 (Avoid Harm): The corrupted model caused harm by suppressing legitimate
information and discriminating based on sexual orientation.
 Principle 1.3 (Be Honest and Trustworthy): Blocker Plus did not disclose its system's limitations to stakeholders and
the public.
 Principle 1.4 (Be Fair and Take Action Not to Discriminate): The system's misclassification led to discrimination.
 Principle 2.4 (Design for Safety and Privacy): Blocker Plus failed to consider the potential misuse of its feedback
mechanism.
 Principle 2.5 (Use Appropriate Care for Machine Learning Systems): Blocker Plus did not exercise caution in deploying
machine learning.
 Principle 2.7 (Foster Public Awareness and Understanding): Blocker Plus did not provide transparency about the
system's limitations.
 Principle 2.8 (Use Public Data Appropriately): Activist groups misused the system's feedback mechanism.
 Principle 3.7 (Be Good Stewards of Systems): Blocker Plus failed to ensure proper stewardship, given its impact on
educational infrastructure.
Recommendations:
 Fix the Model: Blocker Plus should correct the machine learning model to prevent unjustified censorship.
 Transparent Communication: The company should disclose its system's limitations and corrective actions to
stakeholders and the public.
 Redesign Feedback Mechanism: Implement safeguards to prevent malicious input and abuse of the system.
 Ongoing Monitoring: Regularly monitor and update the machine learning model to prevent future misuse.
These recommendations aim to bring Blocker Plus into compliance with the ACM Code of Ethics, ensuring that the
system is used responsibly and does not cause harm through inappropriate censorship or discrimination.

You might also like