ACM Code of Ethics and Professional Conduct
ACM Code of Ethics and Professional Conduct
In this document, "harm" means negative consequences, especially when those consequences are
significant and unjust. Examples of harm include unjustified physical or mental injury,
unjustified destruction or disclosure of information, and unjustified damage to property,
reputation, and the environment. This list is not exhaustive.
Well-intended actions, including those that accomplish assigned duties, may lead to harm. When
that harm is unintended, those responsible are obliged to undo or mitigate the harm as much as
possible. Avoiding harm begins with careful consideration of potential impacts on all those
affected by decisions. When harm is an intentional part of the system, those responsible are
obligated to ensure that the harm is ethically justified. In either case, ensure that all harm is
minimized.
To minimize the possibility of indirectly or unintentionally harming others, computing
professionals should follow generally accepted best practices unless there is a compelling ethical
reason to do otherwise. Additionally, the consequences of data aggregation and emergent
properties of systems should be carefully analyzed. Those involved with pervasive or
infrastructure systems should also consider Principle 3.7.
A computing professional has an additional obligation to report any signs of system risks that
might result in harm. If leaders do not act to curtail or mitigate such risks, it may be necessary to
"blow the whistle" to reduce potential harm. However, capricious or misguided reporting of risks
can itself be harmful. Before reporting risks, a computing professional should carefully assess
relevant aspects of the situation.
1.3 Be honest and trustworthy.
Honesty is an essential component of trustworthiness. A computing professional should be
transparent and provide full disclosure of all pertinent system capabilities, limitations, and
potential problems to the appropriate parties. Making deliberately false or misleading claims,
fabricating or falsifying data, offering or accepting bribes, and other dishonest conduct are
violations of the Code.
Computing professionals should be honest about their qualifications, and about any limitations in
their competence to complete a task. Computing professionals should be forthright about any
circumstances that might lead to either real or perceived conflicts of interest or otherwise tend to
undermine the independence of their judgment. Furthermore, commitments should be honored.
Computing professionals should not misrepresent an organization's policies or procedures, and
should not speak on behalf of an organization unless authorized to do so.
1.4 Be fair and take action not to discriminate.
The values of equality, tolerance, respect for others, and justice govern this principle. Fairness
requires that even careful decision processes provide some avenue for redress of grievances.
Computing professionals should foster fair participation of all people, including those of
underrepresented groups. Prejudicial discrimination on the basis of age, color, disability,
ethnicity, family status, gender identity, labor union membership, military status, nationality,
race, religion or belief, sex, sexual orientation, or any other inappropriate factor is an explicit
violation of the Code. Harassment, including sexual harassment, bullying, and other abuses of
power and authority, is a form of discrimination that, amongst other harms, limits fair access to
the virtual and physical spaces where such harassment takes place.
The use of information and technology may cause new, or enhance existing, inequities.
Technologies and practices should be as inclusive and accessible as possible and computing
professionals should take action to avoid creating systems or technologies that disenfranchise or
ACM Code of Ethics and Professional Conduct
oppress people. Failure to design for inclusiveness and accessibility may constitute unfair
discrimination.
1.5 Respect the work required to produce new ideas, inventions, creative works, and computing
artifacts.
Developing new ideas, inventions, creative works, and computing artifacts creates value for
society, and those who expend this effort should expect to gain value from their work.
Computing professionals should therefore credit the creators of ideas, inventions, work, and
artifacts, and respect copyrights, patents, trade secrets, license agreements, and other methods of
protecting authors' works.
Both custom and the law recognize that some exceptions to a creator's control of a work are
necessary for the public good. Computing professionals should not unduly oppose reasonable
uses of their intellectual works. Efforts to help others by contributing time and energy to projects
that help society illustrate a positive aspect of this principle. Such efforts include free and open
source software and work put into the public domain. Computing professionals should not claim
private ownership of work that they or others have shared as public resources.
1.6 Respect privacy.
The responsibility of respecting privacy applies to computing professionals in a particularly
profound way. Technology enables the collection, monitoring, and exchange of personal
information quickly, inexpensively, and often without the knowledge of the people affected.
Therefore, a computing professional should become conversant in the various definitions and
forms of privacy and should understand the rights and responsibilities associated with the
collection and use of personal information.
Computing professionals should only use personal information for legitimate ends and without
violating the rights of individuals and groups. This requires taking precautions to prevent re-
identification of anonymized data or unauthorized data collection, ensuring the accuracy of data,
understanding the provenance of the data, and protecting it from unauthorized access and
accidental disclosure. Computing professionals should establish transparent policies and
procedures that allow individuals to understand what data is being collected and how it is being
used, to give informed consent for automatic data collection, and to review, obtain, correct
inaccuracies in, and delete their personal data.
Only the minimum amount of personal information necessary should be collected in a system.
The retention and disposal periods for that information should be clearly defined, enforced, and
communicated to data subjects. Personal information gathered for a specific purpose should not
be used for other purposes without the person's consent. Merged data collections can
compromise privacy features present in the original collections. Therefore, computing
professionals should take special care for privacy when merging data collections.
1.7 Honor confidentiality.
Computing professionals are often entrusted with confidential information such as trade secrets,
client data, nonpublic business strategies, financial information, research data, pre-publication
scholarly articles, and patent applications. Computing professionals should protect
confidentiality except in cases where it is evidence of the violation of law, of organizational
regulations, or of the Code. In these cases, the nature or contents of that information should not
be disclosed except to appropriate authorities. A computing professional should consider
thoughtfully whether such disclosures are consistent with the Code.
2. PROFESSIONAL RESPONSIBILITIES.
A computing professional should...
ACM Code of Ethics and Professional Conduct
2.1 Strive to achieve high quality in both the processes and products of professional work.
Computing professionals should insist on and support high quality work from themselves and
from colleagues. The dignity of employers, employees, colleagues, clients, users, and anyone
else affected either directly or indirectly by the work should be respected throughout the process.
Computing professionals should respect the right of those involved to transparent
communication about the project. Professionals should be cognizant of any serious negative
consequences affecting any stakeholder that may result from poor quality work and should resist
inducements to neglect this responsibility.
2.2 Maintain high standards of professional competence, conduct, and ethical practice.
High quality computing depends on individuals and teams who take personal and group
responsibility for acquiring and maintaining professional competence. Professional competence
starts with technical knowledge and with awareness of the social context in which their work
may be deployed. Professional competence also requires skill in communication, in reflective
analysis, and in recognizing and navigating ethical challenges. Upgrading skills should be an
ongoing process and might include independent study, attending conferences or seminars, and
other informal or formal education. Professional organizations and employers should encourage
and facilitate these activities.
2.3 Know and respect existing rules pertaining to professional work.
"Rules" here include local, regional, national, and international laws and regulations, as well as
any policies and procedures of the organizations to which the professional belongs. Computing
professionals must abide by these rules unless there is a compelling ethical justification to do
otherwise. Rules that are judged unethical should be challenged. A rule may be unethical when it
has an inadequate moral basis or causes recognizable harm. A computing professional should
consider challenging the rule through existing channels before violating the rule. A computing
professional who decides to violate a rule because it is unethical, or for any other reason, must
consider potential consequences and accept responsibility for that action.
2.4 Accept and provide appropriate professional review.
High quality professional work in computing depends on professional review at all stages.
Whenever appropriate, computing professionals should seek and utilize peer and stakeholder
review. Computing professionals should also provide constructive, critical reviews of others'
work.
2.5 Give comprehensive and thorough evaluations of computer systems and their impacts,
including analysis of possible risks.
Computing professionals are in a position of trust, and therefore have a special responsibility to
provide objective, credible evaluations and testimony to employers, employees, clients, users,
and the public. Computing professionals should strive to be perceptive, thorough, and objective
when evaluating, recommending, and presenting system descriptions and alternatives.
Extraordinary care should be taken to identify and mitigate potential risks in machine learning
systems. A system for which future risks cannot be reliably predicted requires frequent
reassessment of risk as the system evolves in use, or it should not be deployed. Any issues that
might result in major risk must be reported to appropriate parties.
2.6 Perform work only in areas of competence.
A computing professional is responsible for evaluating potential work assignments. This includes
evaluating the work's feasibility and advisability, and making a judgment about whether the
work assignment is within the professional's areas of competence. If at any time before or during
the work assignment the professional identifies a lack of a necessary expertise, they must
ACM Code of Ethics and Professional Conduct
disclose this to the employer or client. The client or employer may decide to pursue the
assignment with the professional after additional time to acquire the necessary competencies, to
pursue the assignment with someone else who has the required expertise, or to forgo the
assignment. A computing professional's ethical judgment should be the final guide in deciding
whether to work on the assignment.
2.7 Foster public awareness and understanding of computing, related technologies, and their
consequences.
As appropriate to the context and one's abilities, computing professionals should share technical
knowledge with the public, foster awareness of computing, and encourage understanding of
computing. These communications with the public should be clear, respectful, and welcoming.
Important issues include the impacts of computer systems, their limitations, their vulnerabilities,
and the opportunities that they present. Additionally, a computing professional should
respectfully address inaccurate or misleading information related to computing.
2.8 Access computing and communication resources only when authorized or when compelled
by the public good.
Individuals and organizations have the right to restrict access to their systems and data so long as
the restrictions are consistent with other principles in the Code. Consequently, computing
professionals should not access another's computer system, software, or data without a
reasonable belief that such an action would be authorized or a compelling belief that it is
consistent with the public good. A system being publicly accessible is not sufficient grounds on
its own to imply authorization. Under exceptional circumstances a computing professional may
use unauthorized access to disrupt or inhibit the functioning of malicious systems; extraordinary
precautions must be taken in these instances to avoid harm to others.
2.9 Design and implement systems that are robustly and usably secure.
Breaches of computer security cause harm. Robust security should be a primary consideration
when designing and implementing systems. Computing professionals should perform due
diligence to ensure the system functions as intended, and take appropriate action to secure
resources against accidental and intentional misuse, modification, and denial of service. As
threats can arise and change after a system is deployed, computing professionals should integrate
mitigation techniques and policies, such as monitoring, patching, and vulnerability reporting.
Computing professionals should also take steps to ensure parties affected by data breaches are
notified in a timely and clear manner, providing appropriate guidance and remediation.
To ensure the system achieves its intended purpose, security features should be designed to be as
intuitive and easy to use as possible. Computing professionals should discourage security
precautions that are too confusing, are situationally inappropriate, or otherwise inhibit legitimate
use.
In cases where misuse or harm are predictable or unavoidable, the best option may be to not
implement the system.
3. PROFESSIONAL LEADERSHIP PRINCIPLES.
Leadership may either be a formal designation or arise informally from influence over others. In
this section, "leader" means any member of an organization or group who has influence,
educational responsibilities, or managerial responsibilities. While these principles apply to all
computing professionals, leaders bear a heightened responsibility to uphold and promote them,
both within and through their organizations.
A computing professional, especially one acting as a leader, should...
3.1 Ensure that the public good is the central concern during all professional computing work.
ACM Code of Ethics and Professional Conduct
3.7 Recognize and take special care of systems that become integrated into the infrastructure of
society.
Even the simplest computer systems have the potential to impact all aspects of society when
integrated with everyday activities such as commerce, travel, government, healthcare, and
education. When organizations and groups develop systems that become an important part of the
infrastructure of society, their leaders have an added responsibility to be good stewards of these
systems. Part of that stewardship requires establishing policies for fair system access, including
for those who may have been excluded. That stewardship also requires that computing
professionals monitor the level of integration of their systems into the infrastructure of society.
As the level of adoption changes, the ethical responsibilities of the organization or group are
likely to change as well. Continual monitoring of how society is using a system will allow the
organization or group to remain consistent with their ethical obligations outlined in the Code.
When appropriate standards of care do not exist, computing professionals have a duty to ensure
they are developed.
4. COMPLIANCE WITH THE CODE.
A computing professional should...
4.1 Uphold, promote, and respect the principles of the Code.
The future of computing depends on both technical and ethical excellence. Computing
professionals should adhere to the principles of the Code and contribute to improving them.
Computing professionals who recognize breaches of the Code should take actions to resolve the
ethical issues they recognize, including, when reasonable, expressing their concern to the person
or persons thought to be violating the Code.
4.2 Treat violations of the Code as inconsistent with membership in the ACM.
Each ACM member should encourage and support adherence by all computing professionals
regardless of ACM membership. ACM members who recognize a breach of the Code should
consider reporting the violation to the ACM, which may result in remedial action as specified in
the ACM's Code of Ethics and Professional Conduct Enforcement Policy.
The Code and guidelines were developed by the ACM Code 2018 Task Force: Executive
Committee Don Gotterbarn (Chair), Bo Brinkman, Catherine Flick, Michael S Kirkpatrick, Keith
Miller, Kate Varansky, and Marty J Wolf. Members: Eve Anderson, Ron Anderson, Amy
Bruckman, Karla Carter, Michael Davis, Penny Duquenoy, Jeremy Epstein, Kai Kimppa,
Lorraine Kisselburgh, Shrawan Kumar, Andrew McGettrick, Natasa Milic-Frayling, Denise
Oram, Simon Rogerson, David Shamma, Janice Sipior, Eugene Spafford, and Les Waguespack.
The Task Force was organized by the ACM Committee on Professional Ethics. Significant
contributions to the Code were also made by the broader international ACM membership. This
Code and its guidelines were adopted by the ACM Council on June 22nd, 2018.
This Code may be published without permission as long as it is not changed in any way and it
carries the copyright notice. Copyright (c) 2018 by the Association for Computing Machinery.