CSC 312 Documents

THE TEN COMMANDMENTS OF COMPUTER ETHICS

UNCG COMPUTING POLICY

DOD MONITORING WARNING

NON-DISCLOSURE AGREEMENT

ACM SOFTWARE ENGINEERING CODE OF ETHICS
 

The Ten Commandments of Computer Ethics
The Computer Ethics Institute (http://www.cpsr.org/program/ethics/cei.html)

1.  Thou shalt not use a computer to harm other people.
2.  Thou shalt not interfere with other people's computer work.
3.  Thou shalt not snoop around in other people's computer files.
4.  Thou shalt not use a computer to steal.
5.  Thou shalt not use a computer to bear false witness.
6.  Thou shalt not copy nor use proprietary software for which thou hast not paid.
7.  Thou shalt not use other people's computer resources without authorization or proper compensation.
8.  Thou shalt not appropriate other people's intellectual output.
9.  Thou shalt think about the social consequences of the program thou art writing or the system thou art designing.
10. Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans.
 
 

DOD MONITORING WARNING


This is a DoD interest computer system. All DoD interest computer systems and related equipment are intended for the communication, transmission, processing, and storage of official U. S. Government or authorized information only. All DoD interest computer systems are subject to monitoring at all times to ensure proper functioning of equip0ment and systems including security devices and systems, to prevent unauthorized use and violations of statutes and security regulations, to deter criminal activity, and for other similar purposes. Any user of a DoD interest computer system should be aware that any information placed in this system is subject to monitoring and is not subject to any expectation of privacy.

 If monitoring of this or any DoD interest computer system reveals possible evidence of violation of criminal statutes, this evidence and any other related information, including identification information about the user, may be provided to law enforcement officials. If monitoring of this or any other DoD interest computer system reveals violations of security regulations or unauthorized use, employees who violate security regulations or make unauthorized use of DoD interest computer systems are subject to appropriate disciplinary action.
 

Use of this or any other DoD interest computer system
constitutes a consent to monitoring at all times.


Fictitious Company, Inc.

 NON-DISCLOSURE AGREEMENT

In consideration for being granted access to such information and materials, I agree to hold in strictest confidence, all information or materials which come into my posession or of which I become aware while working with Fictitious Company, Inc. (The Company). This Non-Disclosure Agreement shall include but not be limited to all software, source code and algorithms written for or while employed by The Company.

 Excluded from coverage are information or materials: (I) which have previously been made public by The Company; or (II) which are in the public domain; or (III) which are revelaed by the direction of any court.

 Except as required to perform my job, I shall not use, release, copy, reproduce, or disclose such information or materials without the prior written permission of an officer of The Company.

 I understand that my disclosure of such information or materials would cause irreparable injury to The Company. Such an injury would be inadequately compensated in damages, and accordingly, The Company may seek and obtain injunctive relief against the breach or threatened breach of these obligations. I acknowledge that if I violate any of the terms of this Non-Disclosure Agreement, I may be subject to additional remedies which The Company may elect to pursue.

 If a judgment is rendered against me as a result of my failure to comply with the obligations set forth in this Non-Disclosure Agreement, I hereby agree to pay on behalf of The Company all attorneys' fees and court costs associated with said judgment.

 The understandings and obligations set forth in this Agreement shall survive the termination of my association with The Company. At the time of such termination, I agree to immediately return all Company materials and related information to The Company, including but not limited to all copies, on paper or magnetic media, of the source code and algorithms written or obtained while working with Fictitious Company, Inc.
 
 

        Fictitious Company, Inc.        Employee/Contractor
        (spaces for signatures, titles, dates)