Discussion about common acceptable-use policies guidelines

What is acceptable use policy (AUP)?

An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet. 

When you sign up with an Internet service provider (ISP), you will usually be presented with an AUP, which states that you agree to adhere to stipulations such as:

  • Not using the service as part of violating any law
  • Not attempting to break the security of any computer network or user
  • Not posting commercial messages to use net groups without prior permission
  • Not attempting to send junk e-mail or spam to anyone who doesn’t want to receive it
  • Not attempting to mil bomb a site with mass amounts of e-mail in order to flood their server

What is Respecting Others in computer ethics:

It is Sharing Computer Resources and act professionally.

In the library world, resource sharing means that you are collaborating with one or more libraries to maximize access to a larger array of resources by sharing the collections of the cooperating libraries or pooling funding to purchase shared digital resources. In this day of shrinking resource dollars, most libraries participate in some type of resource sharing, even when they may not be aware of it.

Resource sharing provides the cooperating libraries with an opportunity to access materials from other libraries, which should result in a cost savings.

First, you would need to decide if you have something worth sharing and whether you are willing to share it. Obviously, this isn’t the time to consider ways to cut costs on best sellers, but you can look at your collections to see what you have that you wouldn’t often inconvenience your own patrons to have checked out to others.

Act Professionally: ITS NOT THE JOB YOU DO, ITS HOW YOU DO THE JOB.

Professionalism, in the sense described in the quotation above, is arguably more important in some occupations than others. It is vital in some because of the life and death decisions that must be made, for example, in medicine. In others, the rapidly changing nature of the occupation makes efficient regulation difficult and so the professional behavior of the practitioners is central to the functioning of that occupation. The central idea behind this book is that this process of rapid change is relevant to information and communications technology (ICT). The technology changes so quickly that regulation will always lag behind.

10 Commandments of Computer Ethics:

Thou shalt not use a computer to harm other people.

Thou shalt not interfere with other people’s computer work.

Thou shalt not snoop around in other people’s computer files.

Thou shalt not use a computer to steal.

Thou shalt not use a computer to bear false witness.

Thou shalt not copy or use proprietary software for which you have not paid (without permission).

Thou shalt not use other people’s computer resources without authorization or proper compensation.

Thou shalt not appropriate other people’s intellectual output.

Thou shalt think about the social consequences of the program you are writing or the system you are designing.

Thou shalt always use a computer in ways that ensure consideration and respect for other humans.

so we are human we need to act like professionally we need to use our humanity. if we create something and i don’t know its already been created or not so i should give a declaimer to give respect to others.

One thought on “Discussion about common acceptable-use policies guidelines

Leave a comment