Page 1375 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1375
the internet grew, IAB issued a statement of policy concerning the
proper use of the internet. The contents of this statement are valid
even today. It is important that you know the basic contents of the
document, titled “Ethics and the Internet,” request for comments
(RFC) 1087, because most codes of ethics can trace their roots back to
this document.
The statement is a brief list of practices considered unethical. Whereas
a code of ethics states what you should do, this document outlines
what you should not do. RFC 1087 states that any activity with the
following purposes is unacceptable and unethical:
Seeks to gain unauthorized access to the resources of the internet
Disrupts the intended use of the internet
Wastes resources (people, capacity, computer) through such
actions
Destroys the integrity of computer-based information
Compromises the privacy of users
Ten Commandments of Computer Ethics
The Computer Ethics Institute created its own code of ethics. The
Ten Commandments of Computer Ethics are as follows:
1. Thou shalt not use a computer to harm other people.
2. Thou shalt not interfere with other people’s computer work.
3. Thou shalt not snoop around in other people’s computer files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness.
6. Thou shalt not copy proprietary software for which you have
not paid.
7. Thou shalt not use other people’s computer resources without
authorization or proper compensation.

