Protecting the 10 Commandments of Internet Ethics
2024-07-08 Terry Gaul
As computer technology continued its rapid progression towards the turn of the century, the Computer Ethics Institute felt the need to request that computer users treat each other with “consideration and respect.” I was reminded of that sentiment in an article written by Vick Beasley, of the Electronic Publishing Network (EPN), who reminded readers of the 10 commandments of computer ethics that were published by the Institute in 1992. It was intended that the commandments would serve as “ethical principles to guide individuals in using technology in a responsible, respectful, and beneficial manner.”
As simple and straightforward as the commandments may be, I think most people today would be hard pressed to argue against their underlying sentiment:
- Thou shalt not use a computer to harm other people.
- Thou shalt not interfere with other people's computer work.
- Thou shalt not snoop around in other people's computer files.
- Thou shalt not use a computer to steal.
- Thou shalt not use a computer to bear false witness.
- Thou shalt not copy or use proprietary software for which you have not paid (without permission).
- Thou shalt not use other people's computer resources without authorization or proper compensation.
- Thou shalt not appropriate other people's intellectual output.
- Thou shalt think about the social consequences of the program you are writing or the system you are designing.
- Thou shalt always use a computer in ways that ensure consideration and respect for other humans
Peter S. Vogel, Foley & Lardner LLP, took the commandments a step farther in 2016 and noted in a blog that one could easily substitute the term “Internet” for “computer” and the same tenets would hold true today.
Admirable sentiments indeed, but in today’s Internet-connected world, we all know that commandments can be broken and rules are not always to be followed. Let’s look at a few examples:
- Cyberattacks against Internet-connected devices, industrial systems, and critical infrastructure have been well documented.
- Ransomware attacks and other types of network breaches have wreaked havoc on consumers and organizations worldwide.
- The rampant theft of credit card and financial data, medical records, and other private data is commonplace.
- Unlicensed use of proprietary software is a global problems costing economies $billions.
- Illegal copying, counterfeiting, and theft of IP cause extensive damage to corporate image and profits.
These are just a few of the ways that nefarious actors are using computer technology and the Internet to break the commandments. Fortunately, there are security companies like Wibu-Systems whose sole focus is to develop technology designed to prevent such crimes and their underlying consequences. With an unwavering motto of “Perfection in security, licensing, and protection,” Wibu-Systems’ goal is to develop and deliver solutions that enable company’s to stay a step or two in front of the criminal minds. Our solutions are based on state-of-the-art software protection mechanisms, like cryptography, authentication protocols, secure boot, code moving, and obfuscation, and secure licensing techniques that challenge and thwart even the most aggressive hacking techniques.
If you are interested in learning more about protecting your digital assets, I invite you to visit our resource center where we host a wealth of software protection and licensing knowledge, including recorded webinars, white papers, use cases, case studies, and more.
Contributor
Terry Gaul
Vice President Sales USA
Terry Gaul is a sales and business development professional with extensive experience in the software and technology sectors. He has been involved with software protection and licensing technologies for more than 20 years and currently serves as Vice President of Sales at Wibu-Systems USA. When he is not helping customers with software licensing, Terry typically can be found coaching his daughters' soccer teams or camping with his family on the Maine coast.