It is crucial that Information Technology professions are cognizant of the vital and sensitive role they play in the constantly changing arena that is the technological world. IT professionals must appropriately face daily challenges including: maintaining proper ethical conduct, understanding legal issues, enforcing IT related policies as well as ensure data integrity and security.
Ethics is the code of moral principles that governs an individual's or a group's behavior. In the digital realm it is not a new concept, but the pressures surrounding a need of acceptable compliance has grown as the tech industry expands and evolves. This continued evolution of IT specialists whom have greater access to sensitive systems and information mandates a heightened awareness of ethical responsibilities. Actions must be appropriate to ensure a learned trust is bestowed on the diverse group of IT professionals. The following ethical expectations are recommended for all IT professionals and should be at the forefront of a student's journey at WGU in the College of Information Technology:
Do not use access to data or computing systems to cause harm to others.
Minimize the impact IT projects will have on others’ use of systems or networks.
Ensure the integrity of others’ computing resources based on existing policies.
Do not use computing resources for illegal actions including theft, fraud or other illegal and harmful purposes.
Strictly follow authentication protocols and promote said security method practices.
Adhere to all copyright laws governing the uses of software and computing systems.
Do not use computing resources without authorization or proper observation of policies.
Follow prescribed intellectual property rules and policies to foster trust and integrity.
Be mindful of the ramifications developed software of computing systems might have on a your employer or society.
Strive to provide computing environments and systems which are beneficial to yourself and those it is designed to be utilized by.
Do not share personal account information (i.e. passwords) with others and promote this practice with others.