🕷️ Crawler Inspector

URL Lookup

Direct Parameter Lookup

Raw Queries and Responses

1. Shard Calculation

Query:
Response:
Calculated Shard: 91 (from laksa192)

2. Crawled Status Check

Query:
Response:

3. Robots.txt Check

Query:
Response:

4. Spam/Ban Check

Query:
Response:

5. Seen Status Check

ℹ️ Skipped - page is already crawled

📄
INDEXABLE
CRAWLED
12 days ago
🤖
ROBOTS ALLOWED

Page Info Filters

FilterStatusConditionDetails
HTTP statusPASSdownload_http_code = 200HTTP 200
Age cutoffPASSdownload_stamp > now() - 6 MONTH0.4 months ago
History dropPASSisNull(history_drop_reason)No drop reason
Spam/banPASSfh_dont_index != 1 AND ml_spam_score = 0ml_spam_score=0
CanonicalPASSmeta_canonical IS NULL OR = '' OR = src_unparsedNot set

Page Details

PropertyValue
URLhttps://www.acm.org/code-of-ethics
Last Crawled2026-04-01 08:35:26 (12 days ago)
First Indexed2018-05-31 18:19:25 (7 years ago)
HTTP Status Code200
Meta TitleCode of Ethics
Meta DescriptionEthical and social computing are embodied in the ACM Code of Ethics. The core values expressed in the ACM Code inspire and guide computing professionals. The actions of computing professionals change the world, and the Code is the conscience of the field. Serving as the Hippocratic Oath for the IT Professional, the Software Engineer, the Programmer and all those responsible for shaping and contributing to the future of computing. The Code covers ethics across the computing field, representing the tech code of ethics, computing ethics, software ethics, programming ethics, AI ethics and computing for public good.
Meta Canonicalnull
Boilerpipe Text
Preamble Computing professionals' actions change the world. To act responsibly, they should reflect upon the wider impacts of their work, consistently supporting the public good. The ACM Code of Ethics and Professional Conduct ("the Code") expresses the conscience of the profession. The Code is designed to inspire and guide the ethical conduct of all computing professionals, including current and aspiring practitioners, instructors, students, influencers, and anyone who uses computing technology in an impactful way. Additionally, the Code serves as a basis for remediation when violations occur. The Code includes principles formulated as statements of responsibility, based on the understanding that the public good is always the primary consideration. Each principle is supplemented by guidelines, which provide explanations to assist computing professionals in understanding and applying the principle. Section 1 outlines fundamental ethical principles that form the basis for the remainder of the Code. Section 2 addresses additional, more specific considerations of professional responsibility. Section 3 guides individuals who have a leadership role, whether in the workplace or in a volunteer professional capacity. Commitment to ethical conduct is required of every ACM member, ACM SIG member, ACM award recipient, and ACM SIG award recipient. Principles involving compliance with the Code are given in Section 4. The Code as a whole is concerned with how fundamental ethical principles apply to a computing professional's conduct. The Code is not an algorithm for solving ethical problems; rather it serves as a basis for ethical decision-making. When thinking through a particular issue, a computing professional may find that multiple principles should be taken into account, and that different principles will have different relevance to the issue. Questions related to these kinds of issues can best be answered by thoughtful consideration of the fundamental ethical principles, understanding that the public good is the paramount consideration. The entire computing profession benefits when the ethical decision-making process is accountable to and transparent to all stakeholders. Open discussions about ethical issues promote this accountability and transparency. 1. GENERAL ETHICAL PRINCIPLES. A computing professional should... 1.1 Contribute to society and to human well-being, acknowledging that all people are stakeholders in computing. This principle, which concerns the quality of life of all people, affirms an obligation of computing professionals, both individually and collectively, to use their skills for the benefit of society, its members, and the environment surrounding them. This obligation includes promoting fundamental human rights and protecting each individual's right to autonomy. An essential aim of computing professionals is to minimize negative consequences of computing, including threats to health, safety, personal security, and privacy. When the interests of multiple groups conflict, the needs of those less advantaged should be given increased attention and priority. Computing professionals should consider whether the results of their efforts will respect diversity, will be used in socially responsible ways, will meet social needs, and will be broadly accessible. They are encouraged to actively contribute to society by engaging in pro bono or volunteer work that benefits the public good. In addition to a safe social environment, human well-being requires a safe natural environment. Therefore, computing professionals should promote environmental sustainability both locally and globally. 1.2 Avoid harm. In this document, "harm" means negative consequences, especially when those consequences are significant and unjust. Examples of harm include unjustified physical or mental injury, unjustified destruction or disclosure of information, and unjustified damage to property, reputation, and the environment. This list is not exhaustive. Well-intended actions, including those that accomplish assigned duties, may lead to harm. When that harm is unintended, those responsible are obliged to undo or mitigate the harm as much as possible. Avoiding harm begins with careful consideration of potential impacts on all those affected by decisions. When harm is an intentional part of the system, those responsible are obligated to ensure that the harm is ethically justified. In either case, ensure that all harm is minimized. To minimize the possibility of indirectly or unintentionally harming others, computing professionals should follow generally accepted best practices unless there is a compelling ethical reason to do otherwise. Additionally, the consequences of data aggregation and emergent properties of systems should be carefully analyzed. Those involved with pervasive or infrastructure systems should also consider Principle 3.7. A computing professional has an additional obligation to report any signs of system risks that might result in harm. If leaders do not act to curtail or mitigate such risks, it may be necessary to "blow the whistle" to reduce potential harm. However, capricious or misguided reporting of risks can itself be harmful. Before reporting risks, a computing professional should carefully assess relevant aspects of the situation. 1.3 Be honest and trustworthy. Honesty is an essential component of trustworthiness. A computing professional should be transparent and provide full disclosure of all pertinent system capabilities, limitations, and potential problems to the appropriate parties. Making deliberately false or misleading claims, fabricating or falsifying data, offering or accepting bribes, and other dishonest conduct are violations of the Code. Computing professionals should be honest about their qualifications, and about any limitations in their competence to complete a task. Computing professionals should be forthright about any circumstances that might lead to either real or perceived conflicts of interest or otherwise tend to undermine the independence of their judgment. Furthermore, commitments should be honored. Computing professionals should not misrepresent an organization's policies or procedures, and should not speak on behalf of an organization unless authorized to do so. 1.4 Be fair and take action not to discriminate. The values of equality, tolerance, respect for others, and justice govern this principle. Fairness requires that even careful decision processes provide some avenue for redress of grievances. Computing professionals should foster fair participation of all people, including those of underrepresented groups. Prejudicial discrimination on the basis of age, color, disability, ethnicity, family status, gender identity, labor union membership, military status, nationality, race, religion or belief, sex, sexual orientation, or any other inappropriate factor is an explicit violation of the Code. Harassment, including sexual harassment, bullying, and other abuses of power and authority, is a form of discrimination that, amongst other harms, limits fair access to the virtual and physical spaces where such harassment takes place. The use of information and technology may cause new, or enhance existing, inequities. Technologies and practices should be as inclusive and accessible as possible and computing professionals should take action to avoid creating systems or technologies that disenfranchise or oppress people. Failure to design for inclusiveness and accessibility may constitute unfair discrimination. 1.5 Respect the work required to produce new ideas, inventions, creative works, and computing artifacts. Developing new ideas, inventions, creative works, and computing artifacts creates value for society, and those who expend this effort should expect to gain value from their work. Computing professionals should therefore credit the creators of ideas, inventions, work, and artifacts, and respect copyrights, patents, trade secrets, license agreements, and other methods of protecting authors' works. Both custom and the law recognize that some exceptions to a creator's control of a work are necessary for the public good. Computing professionals should not unduly oppose reasonable uses of their intellectual works. Efforts to help others by contributing time and energy to projects that help society illustrate a positive aspect of this principle. Such efforts include free and open source software and work put into the public domain. Computing professionals should not claim private ownership of work that they or others have shared as public resources. 1.6 Respect privacy. The responsibility of respecting privacy applies to computing professionals in a particularly profound way. Technology enables the collection, monitoring, and exchange of personal information quickly, inexpensively, and often without the knowledge of the people affected. Therefore, a computing professional should become conversant in the various definitions and forms of privacy and should understand the rights and responsibilities associated with the collection and use of personal information. Computing professionals should only use personal information for legitimate ends and without violating the rights of individuals and groups. This requires taking precautions to prevent re-identification of anonymized data or unauthorized data collection, ensuring the accuracy of data, understanding the provenance of the data, and protecting it from unauthorized access and accidental disclosure. Computing professionals should establish transparent policies and procedures that allow individuals to understand what data is being collected and how it is being used, to give informed consent for automatic data collection, and to review, obtain, correct inaccuracies in, and delete their personal data. Only the minimum amount of personal information necessary should be collected in a system. The retention and disposal periods for that information should be clearly defined, enforced, and communicated to data subjects. Personal information gathered for a specific purpose should not be used for other purposes without the person's consent. Merged data collections can compromise privacy features present in the original collections. Therefore, computing professionals should take special care for privacy when merging data collections. 1.7 Honor confidentiality. Computing professionals are often entrusted with confidential information such as trade secrets, client data, nonpublic business strategies, financial information, research data, pre-publication scholarly articles, and patent applications. Computing professionals should protect confidentiality except in cases where there is evidence of a violation of law, of organizational regulations, or of the Code. In these cases, the nature or contents of that information should not be disclosed except to appropriate authorities. A computing professional should consider thoughtfully whether such disclosures are consistent with the Code. 2. PROFESSIONAL RESPONSIBILITIES. A computing professional should... 2.1 Strive to achieve high quality in both the processes and products of professional work. Computing professionals should insist on and support high quality work from themselves and from colleagues. The dignity of employers, employees, colleagues, clients, users, and anyone else affected either directly or indirectly by the work should be respected throughout the process. Computing professionals should respect the right of those involved to transparent communication about the project. Professionals should be cognizant of any serious negative consequences affecting any stakeholder that may result from poor quality work and should resist inducements to neglect this responsibility. 2.2 Maintain high standards of professional competence, conduct, and ethical practice. High quality computing depends on individuals and teams who take personal and group responsibility for acquiring and maintaining professional competence. Professional competence starts with technical knowledge and with awareness of the social context in which their work may be deployed. Professional competence also requires skill in communication, in reflective analysis, and in recognizing and navigating ethical challenges. Upgrading skills should be an ongoing process and might include independent study, attending conferences or seminars, and other informal or formal education. Professional organizations and employers should encourage and facilitate these activities. 2.3 Know and respect existing rules pertaining to professional work. "Rules" here include local, regional, national, and international laws and regulations, as well as any policies and procedures of the organizations to which the professional belongs. Computing professionals must abide by these rules unless there is a compelling ethical justification to do otherwise. Rules that are judged unethical should be challenged. A rule may be unethical when it has an inadequate moral basis or causes recognizable harm. A computing professional should consider challenging the rule through existing channels before violating the rule. A computing professional who decides to violate a rule because it is unethical, or for any other reason, must consider potential consequences and accept responsibility for that action. 2.4 Accept and provide appropriate professional review. High quality professional work in computing depends on professional review at all stages. Whenever appropriate, computing professionals should seek and utilize peer and stakeholder review. Computing professionals should also provide constructive, critical reviews of others' work. 2.5 Give comprehensive and thorough evaluations of computer systems and their impacts, including analysis of possible risks. Computing professionals are in a position of trust, and therefore have a special responsibility to provide objective, credible evaluations and testimony to employers, employees, clients, users, and the public. Computing professionals should strive to be perceptive, thorough, and objective when evaluating, recommending, and presenting system descriptions and alternatives. Extraordinary care should be taken to identify and mitigate potential risks in machine learning systems. A system for which future risks cannot be reliably predicted requires frequent reassessment of risk as the system evolves in use, or it should not be deployed. Any issues that might result in major risk must be reported to appropriate parties. 2.6 Perform work only in areas of competence. A computing professional is responsible for evaluating potential work assignments. This includes evaluating the work's feasibility and advisability, and making a judgment about whether the work assignment is within the professional's areas of competence. If at any time before or during the work assignment the professional identifies a lack of a necessary expertise, they must disclose this to the employer or client. The client or employer may decide to pursue the assignment with the professional after additional time to acquire the necessary competencies, to pursue the assignment with someone else who has the required expertise, or to forgo the assignment. A computing professional's ethical judgment should be the final guide in deciding whether to work on the assignment. 2.7 Foster public awareness and understanding of computing, related technologies, and their consequences. As appropriate to the context and one's abilities, computing professionals should share technical knowledge with the public, foster awareness of computing, and encourage understanding of computing. These communications with the public should be clear, respectful, and welcoming. Important issues include the impacts of computer systems, their limitations, their vulnerabilities, and the opportunities that they present. Additionally, a computing professional should respectfully address inaccurate or misleading information related to computing. 2.8 Access computing and communication resources only when authorized or when compelled by the public good. Individuals and organizations have the right to restrict access to their systems and data so long as the restrictions are consistent with other principles in the Code. Consequently, computing professionals should not access another's computer system, software, or data without a reasonable belief that such an action would be authorized or a compelling belief that it is consistent with the public good. A system being publicly accessible is not sufficient grounds on its own to imply authorization. Under exceptional circumstances a computing professional may use unauthorized access to disrupt or inhibit the functioning of malicious systems; extraordinary precautions must be taken in these instances to avoid harm to others. 2.9 Design and implement systems that are robustly and usably secure. Breaches of computer security cause harm. Robust security should be a primary consideration when designing and implementing systems. Computing professionals should perform due diligence to ensure the system functions as intended, and take appropriate action to secure resources against accidental and intentional misuse, modification, and denial of service. As threats can arise and change after a system is deployed, computing professionals should integrate mitigation techniques and policies, such as monitoring, patching, and vulnerability reporting. Computing professionals should also take steps to ensure parties affected by data breaches are notified in a timely and clear manner, providing appropriate guidance and remediation. To ensure the system achieves its intended purpose, security features should be designed to be as intuitive and easy to use as possible. Computing professionals should discourage security precautions that are too confusing, are situationally inappropriate, or otherwise inhibit legitimate use. In cases where misuse or harm are predictable or unavoidable, the best option may be to not implement the system. 3. PROFESSIONAL LEADERSHIP PRINCIPLES. Leadership may either be a formal designation or arise informally from influence over others. In this section, "leader" means any member of an organization or group who has influence, educational responsibilities, or managerial responsibilities. While these principles apply to all computing professionals, leaders bear a heightened responsibility to uphold and promote them, both within and through their organizations. A computing professional, especially one acting as a leader, should... 3.1 Ensure that the public good is the central concern during all professional computing work. People—including users, customers, colleagues, and others affected directly or indirectly—should always be the central concern in computing. The public good should always be an explicit consideration when evaluating tasks associated with research, requirements analysis, design, implementation, testing, validation, deployment, maintenance, retirement, and disposal. Computing professionals should keep this focus no matter which methodologies or techniques they use in their practice. 3.2 Articulate, encourage acceptance of, and evaluate fulfillment of social responsibilities by members of the organization or group. Technical organizations and groups affect broader society, and their leaders should accept the associated responsibilities. Organizations—through procedures and attitudes oriented toward quality, transparency, and the welfare of society—reduce harm to the public and raise awareness of the influence of technology in our lives. Therefore, leaders should encourage full participation of computing professionals in meeting relevant social responsibilities and discourage tendencies to do otherwise. 3.3 Manage personnel and resources to enhance the quality of working life. Leaders should ensure that they enhance, not degrade, the quality of working life. Leaders should consider the personal and professional development, accessibility requirements, physical safety, psychological well-being, and human dignity of all workers. Appropriate human-computer ergonomic standards should be used in the workplace. 3.4 Articulate, apply, and support policies and processes that reflect the principles of the Code. Leaders should pursue clearly defined organizational policies that are consistent with the Code and effectively communicate them to relevant stakeholders. In addition, leaders should encourage and reward compliance with those policies, and take appropriate action when policies are violated. Designing or implementing processes that deliberately or negligently violate, or tend to enable the violation of, the Code's principles is ethically unacceptable. 3.5 Create opportunities for members of the organization or group to grow as professionals. Educational opportunities are essential for all organization and group members. Leaders should ensure that opportunities are available to computing professionals to help them improve their knowledge and skills in professionalism, in the practice of ethics, and in their technical specialties. These opportunities should include experiences that familiarize computing professionals with the consequences and limitations of particular types of systems. Computing professionals should be fully aware of the dangers of oversimplified approaches, the improbability of anticipating every possible operating condition, the inevitability of software errors, the interactions of systems and their contexts, and other issues related to the complexity of their profession—and thus be confident in taking on responsibilities for the work that they do. 3.6 Use care when modifying or retiring systems. Interface changes, the removal of features, and even software updates have an impact on the productivity of users and the quality of their work. Leaders should take care when changing or discontinuing support for system features on which people still depend. Leaders should thoroughly investigate viable alternatives to removing support for a legacy system. If these alternatives are unacceptably risky or impractical, the developer should assist stakeholders' graceful migration from the system to an alternative. Users should be notified of the risks of continued use of the unsupported system long before support ends. Computing professionals should assist system users in monitoring the operational viability of their computing systems, and help them understand that timely replacement of inappropriate or outdated features or entire systems may be needed. 3.7 Recognize and take special care of systems that become integrated into the infrastructure of society. Even the simplest computer systems have the potential to impact all aspects of society when integrated with everyday activities such as commerce, travel, government, healthcare, and education. When organizations and groups develop systems that become an important part of the infrastructure of society, their leaders have an added responsibility to be good stewards of these systems. Part of that stewardship requires establishing policies for fair system access, including for those who may have been excluded. That stewardship also requires that computing professionals monitor the level of integration of their systems into the infrastructure of society. As the level of adoption changes, the ethical responsibilities of the organization or group are likely to change as well. Continual monitoring of how society is using a system will allow the organization or group to remain consistent with their ethical obligations outlined in the Code. When appropriate standards of care do not exist, computing professionals have a duty to ensure they are developed. 4. COMPLIANCE WITH THE CODE. A computing professional should... 4.1 Uphold, promote, and respect the principles of the Code. The future of computing depends on both technical and ethical excellence. Computing professionals should adhere to the principles of the Code and contribute to improving them. Computing professionals who recognize breaches of the Code should take actions to resolve the ethical issues they recognize, including, when reasonable, expressing their concern to the person or persons thought to be violating the Code. 4.2 Treat violations of the Code as inconsistent with membership in the ACM. Each ACM member should encourage and support adherence by all computing professionals regardless of ACM membership. ACM members who recognize a breach of the Code should consider reporting the violation to the ACM, which may result in remedial action as specified in the ACM's Code of Ethics and Professional Conduct Enforcement Policy. The Code and guidelines were developed by the ACM Code 2018 Task Force: Executive Committee Don Gotterbarn (Chair), Bo Brinkman, Catherine Flick, Michael S Kirkpatrick, Keith Miller, Kate Varansky, and Marty J Wolf. Members: Eve Anderson, Ron Anderson, Amy Bruckman, Karla Carter, Michael Davis, Penny Duquenoy, Jeremy Epstein, Kai Kimppa, Lorraine Kisselburgh, Shrawan Kumar, Andrew McGettrick, Natasa Milic-Frayling, Denise Oram, Simon Rogerson, David Shamma, Janice Sipior, Eugene Spafford, and Les Waguespack. The Task Force was organized by the ACM Committee on Professional Ethics. Significant contributions to the Code were also made by the broader international ACM membership. This Code and its guidelines were adopted by the ACM Council on June 22nd, 2018. This Code may be published without permission as long as it is not changed in any way and it carries the copyright notice. Copyright (c) 2018 by the Association for Computing Machinery.
Markdown
![](https://px.ads.linkedin.com/collect/?pid=36002&fmt=gif) [skip to main content](https://www.acm.org/code-of-ethics#SkipTarget) - [Digital Library](https://dl.acm.org/ "Digital Library") - [CACM](https://cacm.acm.org/ "CACM") - [Queue](https://queue.acm.org/ "Queue") - [TechNews](https://technews.acm.org/ "TechNews") - [Career Center](https://jobs.acm.org/ "Career Center") [![ACM Logo](https://www.acm.org/binaries/content/gallery/global/top-menu/acm_logo_tablet.svg)](https://www.acm.org/) [![ACM Logo](https://www.acm.org/binaries/content/gallery/global/top-menu/acm_logo_mobile.svg)](https://www.acm.org/) Advancing Computing as a Science & Profession - [Join](https://www.acm.org/membership/join-acm) - [Volunteer](https://www.acm.org/about-acm/get-involved) - [myACM](https://www.acm.org/membership/myacm-at-a-glance) [Join](https://www.acm.org/membership/join-acm) [Volunteer](https://www.acm.org/about-acm/get-involved) [myACM](https://www.acm.org/membership/myacm-at-a-glance) - [About ACM](https://www.acm.org/code-of-ethics) - [About Home](https://www.acm.org/about-acm) - [About ACM](https://www.acm.org/about-acm/about-the-acm-organization "About ACM") - [ACM's Mission, Vision, Core Values and Goals](https://www.acm.org/about-acm/mission-vision-values-goals "ACM's Mission, Vision, Core Values and Goals") - [Governance](https://www.acm.org/about-acm/governance "Governance") - [ACM Council](https://www.acm.org/about-acm/acm-council "ACM Council") - [Boards and Committees](https://www.acm.org/about-acm/boards-and-committees "Boards and Committees") - [Past Presidents](https://www.acm.org/about-acm/past-presidents "Past Presidents") - [ACM Constitution](https://www.acm.org/about-acm/acm-constitution "ACM Constitution") - [Bylaws](https://www.acm.org/about-acm/acm-bylaws "Bylaws") - [Annual Reports](https://www.acm.org/about-acm/annual-reports-current-fy "Annual Reports") - [History](https://www.acm.org/about-acm/acm-history "History") - [Code of Ethics](https://www.acm.org/code-of-ethics "Code of Ethics") - [Code of Ethics Enforcement Procedures](https://www.acm.org/code-of-ethics/enforcement-procedures "Code of Ethics Enforcement Procedures") - [Stop Harassment](https://www.acm.org/about-acm/policy-against-harassment "Stop Harassment") - [Report Unacceptable Behavior](https://www.acm.org/about-acm/reporting-unacceptable-behavior "Report Unacceptable Behavior") - [Policy on Complaint Process Disclosure](https://www.acm.org/about-acm/disclosure-policy "Policy on Complaint Process Disclosure") - [ACM Statements](https://www.acm.org/about-acm/acm-statements "ACM Statements") - [ACM in the News](https://www.acm.org/media-center/acm-in-the-news "ACM in the News") - [ACM Updates](https://www.acm.org/media-center/acm-updates "ACM Updates") - [Media Center](https://www.acm.org/media-center "Media Center") - [Contact Us](https://www.acm.org/about-acm/contact-us "Contact Us") - About ACM ACM, the world's largest educational and scientific computing society, delivers resources that advance computing as a science and a profession. ACM provides the computing field's premier Digital Library and serves its members and the computing profession with leading-edge publications, conferences, and career resources. [\[Learn More about ACM...\]](https://www.acm.org/about-acm/about-the-acm-organization) - [![Regional Councils.jpg](https://www.acm.org/binaries/ctaimagelarge/content/gallery/acm/ctas/regional-councils.jpg)](https://www.acm.org/about-acm/regional-councils) [ACM Regional Councils](https://www.acm.org/about-acm/regional-councils) [![ACM History](https://www.acm.org/binaries/ctaimagelarge/content/gallery/acm/ctas/history.jpg)](https://www.acm.org/about-acm/acm-history) [ACM: Formed at the Dawn of Computing](https://www.acm.org/about-acm/acm-history) - [Membership](https://www.acm.org/code-of-ethics) - [Membership Home](https://www.acm.org/membership) - [About Membership](https://www.acm.org/membership/about-acm-membership "About Membership") - [Membership Options](https://www.acm.org/membership/membership-options "Membership Options") - [Membership Benefits](https://www.acm.org/membership/membership-benefits "Membership Benefits") - [Ambassadors for ACM](https://www.acm.org/membership/ambassadors-for-acm "Ambassadors for ACM") - [People of ACM](https://www.acm.org/membership/people-of-acm "People of ACM") - [Members in the News](https://www.acm.org/media-center/members-in-the-news "Members in the News") - [MemberNet](https://www.acm.org/membership/acm-membernet-archive "MemberNet") - [Join](https://www.acm.org/membership/join-acm "Join") - [Renew](https://www.acm.org/membership/acm-membership-renewal "Renew") - [Subscribe](https://www.acm.org/membership/subscribe-publications "Subscribe") - [Manage your Account / myACM](https://www.acm.org/membership/myacm-at-a-glance "Manage your Account / myACM") - [Distinguished Speakers](https://speakers.acm.org/ "Distinguished Speakers") - [Contact Us](https://www.acm.org/membership/membership-contact "Contact Us") - ACM Membership ACM offers the resources, access and tools to invent the future. No one has a larger global network of professional peers. No one has more exclusive content. No one presents more forward-looking events. Or confers more prestigious awards. Or provides a more comprehensive learning center. [\[Learn More about ACM Membership...\]](https://www.acm.org/membership/about-acm-membership) - [![skills-bundle.jpg](https://www.acm.org/binaries/ctaimagelarge/content/gallery/acm/ctas/learning-center/skills-bundle-add-on.jpg)](https://learning.acm.org/skills-bundle) [ACM Skills Bundle Add-On](https://learning.acm.org/skills-bundle) [![ACM membership FAQ](https://www.acm.org/binaries/ctaimagelarge/content/gallery/acm/ctas/membership-faq.jpg)](https://www.acm.org/membership/csfaq) [Customer Service FAQs](https://www.acm.org/membership/csfaq) [![Ambassador for ACM Program](https://www.acm.org/binaries/ctaimagelarge/content/gallery/acm/ctas/ambassadors-for-acm.jpg)](https://www.acm.org/membership/ambassadors-for-acm/ambassadors-for-acm) [Become an Ambassador for ACM](https://www.acm.org/membership/ambassadors-for-acm/ambassadors-for-acm) - [Publications](https://www.acm.org/code-of-ethics) - [Publications Home](https://www.acm.org/publications) - [About Publications](https://www.acm.org/publications/about-publications "About Publications") - [Digital Library](https://www.acm.org/publications/digital-library "Digital Library") - [CACM](https://www.acm.org/cacm "CACM") - [Journals](https://www.acm.org/publications/journals "Journals") - [Magazines](https://www.acm.org/publications/magazines "Magazines") - [Books](https://www.acm.org/publications/acm-books "Books") - [Conference Proceedings](https://www.acm.org/publications/proceedings "Conference Proceedings") - [ICPS](https://www.acm.org/publications/icps "ICPS") - [SIGs Newsletters](https://www.acm.org/publications/newsletters "SIGs Newsletters") - [Blue Diamond Newsletter](https://www.acm.org/publications/pubs-newsletter-archive "Blue Diamond Newsletter") - [For Authors](https://www.acm.org/publications/submit "For Authors") - [Primary Article Templates](https://www.acm.org/publications/taps/word-template-workflow "Primary Article Templates") - [Open Access](https://www.acm.org/publications/openaccess "Open Access") - [Artifacts and Reproducibility](https://www.acm.org/publications/artifacts "Artifacts and Reproducibility") - [New ACM Journals](https://www.acm.org/publications/new-journals "New ACM Journals") - [Propose New Publications](https://www.acm.org/publications/start-a-new-acm-publication "Propose New Publications") - [Policies](https://www.acm.org/publications/policies/toc "Policies") - [Report a Potential Violation](https://www.acm.org/publications/policies/publications-violation "Report a Potential Violation") - [Ethics & Plagiarism](https://www.acm.org/publications/policies/ethics-and-plagiarism-update "Ethics & Plagiarism") - [Reviewer Training & Certification Course](https://reviewers.acm.org/training-course "Reviewer Training & Certification Course") - [Publications Board](https://www.acm.org/publications/publications-board-committees "Publications Board") - [Subscribe](https://www.acm.org/publications/subscribe "Subscribe") - [Advertise](https://www.acm.org/publications/advertising "Advertise") - [Contact Us](https://www.acm.org/publications/publications-hq-staff-contacts "Contact Us") - About ACM Publications For more than 60 years, the best and brightest minds in computing have come to ACM to meet, share ideas, publish their work and change the world. ACM's publications are among the most respected and highly cited in the field because of their longstanding focus on quality and their ability to attract pioneering thought leaders from both academia and industry. [\[Learn More about ACM Publications...\]](https://www.acm.org/publications/about-publications) - [![Publish your work](https://www.acm.org/binaries/ctaimagelarge/content/gallery/acm/ctas/publish-your-work.jpg)](https://www.acm.org/publications/authors) [Publish with ACM](https://www.acm.org/publications/authors) [![practical\_content\_journals.jpg](https://www.acm.org/binaries/ctaimagelarge/content/gallery/acm/ctas/practical_content_journals.jpg)](https://www.acm.org/publications/papers-for-practitioners) [Select Application-Oriented Papers](https://www.acm.org/publications/papers-for-practitioners) [![artifact-badges.jpg](https://www.acm.org/binaries/ctaimagelarge/content/gallery/acm/ctas/publications/artifact-badges.jpg)](https://www.acm.org/publications/artifacts) [Software and Data Artifacts in the ACM Digital Library](https://www.acm.org/publications/artifacts) - [SIGs](https://www.acm.org/code-of-ethics) - [Special Interest Groups Home](https://www.acm.org/special-interest-groups) - [About SIGs](https://www.acm.org/special-interest-groups/about-special-interest-groups "About SIGs") - [SIG Listing](https://www.acm.org/special-interest-groups/sigs-by-knowledge-area "SIG Listing") - [Emerging Interest Groups](https://www.acm.org/special-interest-groups/eigs "Emerging Interest Groups") - [SIG Awards](http://awards.acm.org/sig-awards "SIG Awards") - [SIG Chapters](https://www.acm.org/special-interest-groups/sig-chapters "SIG Chapters") - [Publications](https://www.acm.org/special-interest-groups/sig-newsletters "Publications") - [Conferences](https://www.acm.org/conferences "Conferences") - [Join a SIG](https://www.acm.org/special-interest-groups/join-a-sig "Join a SIG") - [Volunteer Resources](https://www.acm.org/special-interest-groups/volunteer-resources "Volunteer Resources") - [SIG Leaders](https://www.acm.org/special-interest-groups/sig-governance "SIG Leaders") - [Contact Us](https://www.acm.org/special-interest-groups/contact-sigs "Contact Us") - Special Interest Groups ACM's Special Interest Groups (SIGs) represent major areas of computing, addressing the interests of technical communities that drive innovation. SIGs offer a wealth of conferences, publications and activities focused on specific computing sub-disciplines. They enable members to share expertise, discovery and best practices. [\[Learn More about ACM's SIGs...\]](https://www.acm.org/special-interest-groups/about-special-interest-groups) - [![Join an ACM SIG](https://www.acm.org/binaries/ctaimagelarge/content/gallery/acm/ctas/join-an-acm-sig.jpg)](https://www.acm.org/special-interest-groups/join) [Join an ACM SIG](https://www.acm.org/special-interest-groups/join) [![promoting-sharing.jpg](https://www.acm.org/binaries/ctaimagelarge/content/gallery/acm/ctas/publications/authors/promoting-sharing.jpg)](https://www.acm.org/virtual-conferences) [Virtual Conferences: A Guide to Best Practices](https://www.acm.org/virtual-conferences) - [Conferences](https://www.acm.org/code-of-ethics) - [Conferences Home](https://www.acm.org/conferences) - [About Conferences](https://www.acm.org/conferences/about-conferences "About Conferences") - [Conferences FAQ](https://www.acm.org/publications/open-access-model-for-acm-and-sig-sponsored-conferences-frequently-asked-questions "Conferences FAQ") - [Conference Series](http://dl.acm.org/events.cfm "Conference Series") - [Upcoming Conferences](https://www.acm.org/conferences/conference-events "Upcoming Conferences") - [Get Conference Proceedings](https://www.acm.org/conferences/conference-proceedings "Get Conference Proceedings") - [Upcoming Submission Deadlines](https://www.acm.org/conferences/upcoming-submission-deadlines "Upcoming Submission Deadlines") - [ACM Author Rights & Permissions](http://authors.acm.org/ "ACM Author Rights & Permissions") - [Best Paper Awards](https://www.acm.org/conferences/best-paper-awards "Best Paper Awards") - [Volunteer Resources](https://www.acm.org/special-interest-groups/volunteer-resources "Volunteer Resources") - [Contact Us](https://www.acm.org/special-interest-groups/contact-sigs "Contact Us") - ACM and its Special Interest Groups Host More Than 170 Events Worldwide Our conferences, workshops and symposia unite innovators like you to push computing technology forward and to continue the legacy that unites us as like-minded thinkers and makers. [\[Learn More about ACM Conferences...\]](https://www.acm.org/conferences/about-conferences) - [![Find a SIG Conference](https://www.acm.org/binaries/ctaimagelarge/content/gallery/acm/ctas/find-a-sig-conference.jpg)](https://www.acm.org/conferences/conference-events) [Find an ACM Conference](https://www.acm.org/conferences/conference-events) [![promoting-sharing.jpg](https://www.acm.org/binaries/ctaimagelarge/content/gallery/acm/ctas/publications/authors/promoting-sharing.jpg)](https://www.acm.org/virtual-conferences) [Virtual Conferences: A Guide to Best Practices](https://www.acm.org/virtual-conferences) - [Chapters](https://www.acm.org/code-of-ethics) - [Chapters Home](https://www.acm.org/chapters) - [About Chapters](https://www.acm.org/chapters/about-chapters "About Chapters") - [Professional Chapters](https://www.acm.org/chapters/professionals "Professional Chapters") - [Student Chapters](https://www.acm.org/chapters/students "Student Chapters") - [Meetups](https://www.acm.org/chapters/acm-meetups "Meetups") - [Newsletter](https://www.acm.org/chapters/chapter-newsletters/chapter-newsletters-archive "Newsletter") - [Calendar of Local Activities](https://www.acm.org/chapters/local-activities "Calendar of Local Activities") - [Distinguished Speakers](https://speakers.acm.org/ "Distinguished Speakers") - [Annual Reports](https://www.acm.org/chapters/chapters-annual-reports "Annual Reports") - [Find a Chapter](https://www.acm.org/chapters/find-a-chapter "Find a Chapter") - [Start a Chapter](https://www.acm.org/chapters/start-chapter "Start a Chapter") - [Chapter Policies](https://www.acm.org/chapters/chapter-policies "Chapter Policies") - [Chapter Administrative Interface](https://www.acm.org/chapters/chapter-administrative-interface "Chapter Administrative Interface") - [Contact Us](https://www.acm.org/chapters/chapters-contact "Contact Us") - About ACM Chapters ACM’s Professional and Student chapters worldwide serve as hubs of activity for ACM members and the computing community at large. They provide seminars, lectures, learning forums and networking opportunities with peers and experts across the computing spectrum. \[[Learn More about ACM Chapters...](https://www.acm.org/chapters/about-chapters)\] - [![chapter\_box.jpg](https://www.acm.org/binaries/ctaimagelarge/content/gallery/acm/ctas/chapter_box.jpg)](https://www.acm.org/chapters/chapter-in-a-box) [Chapter-in-a-Box: Everything You Need to Run and Grow Your ACM Chapter](https://www.acm.org/chapters/chapter-in-a-box) [![](https://www.acm.org/binaries/ctaimagelarge/content/gallery/acm/ctas/chapters-admin-interface.jpg)](https://www.acm.org/chapters/chapter-administrative-interface) [Chapter Administrative Interface](https://www.acm.org/chapters/chapter-administrative-interface) [![](https://www.acm.org/binaries/ctaimagelarge/content/gallery/acm/ctas/start-a-chapter.jpg)](https://www.acm.org/chapters/start-chapter) [Start an ACM Chapter](https://www.acm.org/chapters/start-chapter) - [Awards](https://www.acm.org/code-of-ethics) - [Awards Home](https://www.acm.org/awards) - [About Awards](http://awards.acm.org/ "About Awards") - [Award Recipients](http://awards.acm.org/award_winners "Award Recipients") - [ACM Fellows](http://awards.acm.org/fellows "ACM Fellows") - [ACM Advanced Member Grades](http://awards.acm.org/advanced-member-grades "ACM Advanced Member Grades") - [ACM Awards Committee](http://awards.acm.org/committees "ACM Awards Committee") - [Nominate](http://awards.acm.org/award-nominations "Nominate") - [Award Sponsors](http://awards.acm.org/sponsors "Award Sponsors") - [Establish a New Award](http://awards.acm.org/guides "Establish a New Award") - [Contact Us](http://awards.acm.org/contact-us "Contact Us") - About ACM Awards ACM recognizes excellence through its eminent awards for technical and professional achievements and contributions in computer science and information technology. It also names as Fellows and Distinguished Members those members who, in addition to professional accomplishments, have made significant contributions to ACM's mission. [More on ACM Awards](http://awards.acm.org/) - [![2025 ACM A.M. Turing Award recipients Charles H. Bennett and Gilles Brassard](https://www.acm.org/binaries/ctaimagelarge/content/gallery/acm/ctas/awards/turing-2025-bennett-brassard.jpg)](https://awards.acm.org/about/2025-turing) [Charles Bennett and Gilles Brassard Receive 2025 ACM A.M. Turing Award](https://awards.acm.org/about/2025-turing) [![ACM Fellows](https://www.acm.org/binaries/ctaimagelarge/content/gallery/acm/ctas/awards/acm-fellows-member-badge.jpg)](https://www.acm.org/media-center/2026/january/fellows-2025) [ACM Names 2025 Fellows](https://www.acm.org/media-center/2026/january/fellows-2025) [![ACM Distinguished Members](https://www.acm.org/binaries/ctaimagelarge/content/gallery/acm/ctas/awards/acm-distinguished-member-badge.jpg)](https://awards.acm.org/distinguished-members) [ACM Names 2025 Distinguished Members](https://awards.acm.org/distinguished-members) - [Education](https://www.acm.org/code-of-ethics) - [Education Home](https://www.acm.org/education) - [About Education](https://www.acm.org/education/about-education "About Education") - [Curricula Recommendations](https://www.acm.org/education/curricula-recommendations "Curricula Recommendations") - [Affiliated Organizations](https://www.acm.org/education/affiliated-educational-organizations "Affiliated Organizations") - [ACM Learning Center](https://learning.acm.org/ "ACM Learning Center") - [Resources for Educators](https://www.csteachers.org/ "Resources for Educators") - [Resources for Graduating Students](https://www.acm.org/education/resources-for-grads "Resources for Graduating Students") - [Education Board and Advisory Committee](https://www.acm.org/education/education-governance "Education Board and Advisory Committee") - [Reports and Studies](https://www.acm.org/education/reports "Reports and Studies") - [Contact Us](https://www.acm.org/education/education-contact "Contact Us") - Education ACM’s educational activities, conducted primarily through our Education Board and Advisory Committee, range from the K-12 space (CSTA) and two-year programs to undergraduate, graduate, and doctoral-level education, and professional development for computing practitioners at every stage of their career... [\[Learn More about Education…\]](https://www.acm.org/education/about-education) - [![Image of webinar panel](https://www.acm.org/binaries/ctaimagelarge/content/gallery/acm/ctas/education/webinar-ethical-societal-impact-gen-ai-ed-3.jpg)](https://events.zoom.us/ev/AtuHJus2q1kd25Cg5TbA1X0xMxHycnA-Fo0hpdKranVPmnbTQ2AF~AoWR-8D8rhoKVIgc7KmIt61qrgDrhYkGYdPmS_18kyw0XESUooeHW5S2lg) [Ethical and Social Impacts of GenAI in Computing Education: Case Studies](https://events.zoom.us/ev/AtuHJus2q1kd25Cg5TbA1X0xMxHycnA-Fo0hpdKranVPmnbTQ2AF~AoWR-8D8rhoKVIgc7KmIt61qrgDrhYkGYdPmS_18kyw0XESUooeHW5S2lg) [![Image of Angelica Lo Duca](https://www.acm.org/binaries/ctaimagelarge/content/gallery/acm/ctas/people/angelica-lo-duca-techtalk.jpg)](https://events.zoom.us/ev/AnVWkl_U-CxgGyPj9q_-i68HOJGFWwiUKKUsxY3hKq_zlAfgcmz-~AqIkLPCyvSeInFpIJynBvZcWQO8hhHS2UIs3bPP5M6KltfMMnckSTIRYcA) [How to Extract Meaningful Insights from Data](https://events.zoom.us/ev/AnVWkl_U-CxgGyPj9q_-i68HOJGFWwiUKKUsxY3hKq_zlAfgcmz-~AqIkLPCyvSeInFpIJynBvZcWQO8hhHS2UIs3bPP5M6KltfMMnckSTIRYcA) [![Image of Russ Cox](https://www.acm.org/binaries/ctaimagelarge/content/gallery/acm/ctas/people/russ-cox-bytecast.jpg)](https://learning.acm.org/bytecast/ep78-russ-cox) [ByteCast Ep78: Russ Cox](https://learning.acm.org/bytecast/ep78-russ-cox) - [Learning Center](https://www.acm.org/code-of-ethics) - [Learning Center Home](https://learning.acm.org/) - [About the Learning Center](https://learning.acm.org/about "About the Learning Center") - [E-Learning](https://learning.acm.org/e-learning "E-Learning") - [Member Offers](https://learning.acm.org/member-offers "Member Offers") - [TechTalks](https://learning.acm.org/techtalks "TechTalks") - [ByteCast](https://learning.acm.org/bytecast "ByteCast") - [Resources](https://learning.acm.org/resources "Resources") - [FAQs](https://learning.acm.org/faq "FAQs") - [Practitioner Board](https://learning.acm.org/practitioner-board "Practitioner Board") - [Professional Development Committee](https://learning.acm.org/professional-development-committee "Professional Development Committee") - About ACM Learning Center The ACM Learning Center offers ACM members access to lifelong learning tools and resources. Our E-Learning collections offer complimentary access to more than 80,000 online books, courses, and videos from top content publishers. The ACM TechTalk series brings leading computing luminaries and visionaries to your screen. Members enjoy exclusive offers and discounts on IT industry certifications and vendor-specific training. - [![Image of Ray Eitel-Porter](https://www.acm.org/binaries/ctaimagelarge/content/gallery/acm/ctas/people/ray-eitel-porter-bytecast.jpg)](https://learning.acm.org/bytecast/ep82-ray-eitel-porter) [ByteCast Ep82: Ray Eitel-Porter](https://learning.acm.org/bytecast/ep82-ray-eitel-porter) [![Image of Nicole Forsgren](https://www.acm.org/binaries/ctaimagelarge/content/gallery/acm/ctas/people/nicole-forsgren-bytecast.jpg)](https://learning.acm.org/bytecast/ep81-nicole-forsgren) [ByteCast Ep81: Nicole Forsgren](https://learning.acm.org/bytecast/ep81-nicole-forsgren) [![Image of Andrew Barto and Richard Sutton](https://www.acm.org/binaries/ctaimagelarge/content/gallery/acm/ctas/learning-center/barto-sutton-bytecast.jpg)](https://learning.acm.org/bytecast/ep80-andrew-barto--richard-sutton) [ByteCast Ep80: Andrew Barto & Richard Sutton](https://learning.acm.org/bytecast/ep80-andrew-barto--richard-sutton) - [Public Policy](https://www.acm.org/code-of-ethics) - [Public Policy Home](https://www.acm.org/public-policy) - [About](https://www.acm.org/public-policy/about "About") - [Tech Policy Council](https://www.acm.org/public-policy/tpc "Tech Policy Council") - [Europe Policy](https://www.acm.org/public-policy/europe-tpc "Europe Policy") - [US Policy](https://www.acm.org/public-policy/ustpc "US Policy") - [Expanding Regions](https://www.acm.org/public-policy/ertpc "Expanding Regions") - [ACM TechBriefs](https://www.acm.org/public-policy/techbriefs "ACM TechBriefs") - [Policy Products](https://www.acm.org/public-policy/public-policy-statements "Policy Products") - [HotTopics Webinars](https://www.acm.org/public-policy/ustpc/hottopics "HotTopics Webinars") - [Media Releases](https://www.acm.org/media-center "Media Releases") - [Contact Us](https://www.acm.org/public-policy/public-policy-contact "Contact Us") - Public Policy ACM provides independent, nonpartisan, and technology-neutral research and resources to policy leaders, stakeholders, and the public about public policy issues, drawn from the deep technical expertise of the computing community. [\[Learn More about ACM's Public Policy Work...\]](https://www.acm.org/public-policy/about) - [![TechBrief on Buying Versus Building LLMs](https://www.acm.org/binaries/ctaimagelarge/content/gallery/acm/ctas/public-policy/tech-briefs/techbrief-iss16-buy-build-llm.jpg)](https://dl.acm.org/doi/pdf/10.1145/3797946) [TechBrief on Buying Versus Building LLMs](https://dl.acm.org/doi/pdf/10.1145/3797946) [![tpc-remote-proctoring-software.jpg](https://www.acm.org/binaries/ctaimagelarge/content/gallery/acm/ctas/public-policy/tpc-remote-proctoring-software.jpg)](https://www.acm.org/binaries/content/assets/public-policy/remote-proctoring-statement.pdf) [USTPC Issues Revised Statement on Remote Proctoring](https://www.acm.org/binaries/content/assets/public-policy/remote-proctoring-statement.pdf) [![europetpc-diggreencerts-stmt.jpg](https://www.acm.org/binaries/ctaimagelarge/content/gallery/acm/ctas/public-policy/europetpc-diggreencerts-stmt.jpg)](https://www.acm.org/binaries/content/assets/public-policy/europetpc-diggreencerts-stmt.pdf) [ACM Europe TPC Statement on Digital Green Certificates](https://www.acm.org/binaries/content/assets/public-policy/europetpc-diggreencerts-stmt.pdf) - [Diversity, Equity & Inclusion](https://www.acm.org/code-of-ethics) - [Diversity, Equity and Inclusion Home](https://www.acm.org/diversity-inclusion) - [About Diversity, Equity and Inclusion](https://www.acm.org/diversity-inclusion/about "About Diversity, Equity and Inclusion") - [Forming Diverse Teams](https://www.acm.org/diversity-inclusion/diverse-teams "Forming Diverse Teams") - [Words Matter](https://www.acm.org/diversity-inclusion/words-matter "Words Matter") - [ACM Celebrates Awareness Months](https://www.acm.org/diversity-inclusion/awareness-months "ACM Celebrates Awareness Months") - [ACM Code of Ethics](https://www.acm.org/diversity-inclusion/code-of-ethics "ACM Code of Ethics") - [Stop Harassment](https://www.acm.org/diversity-inclusion/stop-harassment "Stop Harassment") - [Contact Us](https://www.acm.org/diversity-inclusion/contact-us "Contact Us") - [Report Unacceptable Behavior](https://www.acm.org/diversity-inclusion/report-unacceptable-behavior "Report Unacceptable Behavior") - [ACM-W](https://women.acm.org/ "ACM-W") - Diversity, Equity, and Inclusion Anyone, from any background, should feel encouraged to participate and contribute to ACM. ACM is committed to creating an environment that welcomes new ideas and perspectives, and where hostility or other antisocial behaviors are not tolerated. [\[Learn More about ACM's Commitment to Diversity, Equity, and Inclusion...\]](https://www.acm.org/diversity-inclusion/about) - [![Image with the text, ](https://www.acm.org/binaries/ctaimagelarge/content/gallery/acm/ctas/diversity-inclusion/dei-cacm/dei-cacm-articles.jpg)](https://www.acm.org/diversity-inclusion/dei-cacm-articles) [DEI Articles in CACM](https://www.acm.org/diversity-inclusion/dei-cacm-articles) [![Image with the text, ](https://www.acm.org/binaries/ctaimagelarge/content/gallery/acm/ctas/diversity-inclusion/dei-ce-webinars.jpg)](https://www.acm.org/diversity-inclusion/dei-ce-webinars) [DEI CE Webinars](https://www.acm.org/diversity-inclusion/dei-ce-webinars) [![Image of different skin tone hands in a high-five circle](https://www.acm.org/binaries/ctaimagelarge/content/gallery/acm/ctas/diversity-inclusion/di-teams.jpg)](https://www.acm.org/diversity-inclusion/diverse-teams) [How Diverse Is Your Team?](https://www.acm.org/diversity-inclusion/diverse-teams) ACM Code of Ethics and Professional Conduct - [Home](https://www.acm.org/) - [Code of Ethics](https://www.acm.org/code-of-ethics) # ACM Code of Ethics and Professional Conduct ## Preamble Computing professionals' actions change the world. To act responsibly, they should reflect upon the wider impacts of their work, consistently supporting the public good. The ACM Code of Ethics and Professional Conduct ("the Code") expresses the conscience of the profession. The Code is designed to inspire and guide the ethical conduct of all computing professionals, including current and aspiring practitioners, instructors, students, influencers, and anyone who uses computing technology in an impactful way. Additionally, the Code serves as a basis for remediation when violations occur. The Code includes principles formulated as statements of responsibility, based on the understanding that the public good is always the primary consideration. Each principle is supplemented by guidelines, which provide explanations to assist computing professionals in understanding and applying the principle. Section 1 outlines fundamental ethical principles that form the basis for the remainder of the Code. Section 2 addresses additional, more specific considerations of professional responsibility. Section 3 guides individuals who have a leadership role, whether in the workplace or in a volunteer professional capacity. Commitment to ethical conduct is required of every ACM member, ACM SIG member, ACM award recipient, and ACM SIG award recipient. Principles involving compliance with the Code are given in Section 4. The Code as a whole is concerned with how fundamental ethical principles apply to a computing professional's conduct. The Code is not an algorithm for solving ethical problems; rather it serves as a basis for ethical decision-making. When thinking through a particular issue, a computing professional may find that multiple principles should be taken into account, and that different principles will have different relevance to the issue. Questions related to these kinds of issues can best be answered by thoughtful consideration of the fundamental ethical principles, understanding that the public good is the paramount consideration. The entire computing profession benefits when the ethical decision-making process is accountable to and transparent to all stakeholders. Open discussions about ethical issues promote this accountability and transparency. ## 1\. GENERAL ETHICAL PRINCIPLES. *A computing professional should...* ### 1\.1 Contribute to society and to human well-being, acknowledging that all people are stakeholders in computing. This principle, which concerns the quality of life of all people, affirms an obligation of computing professionals, both individually and collectively, to use their skills for the benefit of society, its members, and the environment surrounding them. This obligation includes promoting fundamental human rights and protecting each individual's right to autonomy. An essential aim of computing professionals is to minimize negative consequences of computing, including threats to health, safety, personal security, and privacy. When the interests of multiple groups conflict, the needs of those less advantaged should be given increased attention and priority. Computing professionals should consider whether the results of their efforts will respect diversity, will be used in socially responsible ways, will meet social needs, and will be broadly accessible. They are encouraged to actively contribute to society by engaging in pro bono or volunteer work that benefits the public good. In addition to a safe social environment, human well-being requires a safe natural environment. Therefore, computing professionals should promote environmental sustainability both locally and globally. ### 1\.2 Avoid harm. In this document, "harm" means negative consequences, especially when those consequences are significant and unjust. Examples of harm include unjustified physical or mental injury, unjustified destruction or disclosure of information, and unjustified damage to property, reputation, and the environment. This list is not exhaustive. Well-intended actions, including those that accomplish assigned duties, may lead to harm. When that harm is unintended, those responsible are obliged to undo or mitigate the harm as much as possible. Avoiding harm begins with careful consideration of potential impacts on all those affected by decisions. When harm is an intentional part of the system, those responsible are obligated to ensure that the harm is ethically justified. In either case, ensure that all harm is minimized. To minimize the possibility of indirectly or unintentionally harming others, computing professionals should follow generally accepted best practices unless there is a compelling ethical reason to do otherwise. Additionally, the consequences of data aggregation and emergent properties of systems should be carefully analyzed. Those involved with pervasive or infrastructure systems should also consider Principle 3.7. A computing professional has an additional obligation to report any signs of system risks that might result in harm. If leaders do not act to curtail or mitigate such risks, it may be necessary to "blow the whistle" to reduce potential harm. However, capricious or misguided reporting of risks can itself be harmful. Before reporting risks, a computing professional should carefully assess relevant aspects of the situation. ### 1\.3 Be honest and trustworthy. Honesty is an essential component of trustworthiness. A computing professional should be transparent and provide full disclosure of all pertinent system capabilities, limitations, and potential problems to the appropriate parties. Making deliberately false or misleading claims, fabricating or falsifying data, offering or accepting bribes, and other dishonest conduct are violations of the Code. Computing professionals should be honest about their qualifications, and about any limitations in their competence to complete a task. Computing professionals should be forthright about any circumstances that might lead to either real or perceived conflicts of interest or otherwise tend to undermine the independence of their judgment. Furthermore, commitments should be honored. Computing professionals should not misrepresent an organization's policies or procedures, and should not speak on behalf of an organization unless authorized to do so. ### 1\.4 Be fair and take action not to discriminate. The values of equality, tolerance, respect for others, and justice govern this principle. Fairness requires that even careful decision processes provide some avenue for redress of grievances. Computing professionals should foster fair participation of all people, including those of underrepresented groups. Prejudicial discrimination on the basis of age, color, disability, ethnicity, family status, gender identity, labor union membership, military status, nationality, race, religion or belief, sex, sexual orientation, or any other inappropriate factor is an explicit violation of the Code. Harassment, including sexual harassment, bullying, and other abuses of power and authority, is a form of discrimination that, amongst other harms, limits fair access to the virtual and physical spaces where such harassment takes place. The use of information and technology may cause new, or enhance existing, inequities. Technologies and practices should be as inclusive and accessible as possible and computing professionals should take action to avoid creating systems or technologies that disenfranchise or oppress people. Failure to design for inclusiveness and accessibility may constitute unfair discrimination. ### 1\.5 Respect the work required to produce new ideas, inventions, creative works, and computing artifacts. Developing new ideas, inventions, creative works, and computing artifacts creates value for society, and those who expend this effort should expect to gain value from their work. Computing professionals should therefore credit the creators of ideas, inventions, work, and artifacts, and respect copyrights, patents, trade secrets, license agreements, and other methods of protecting authors' works. Both custom and the law recognize that some exceptions to a creator's control of a work are necessary for the public good. Computing professionals should not unduly oppose reasonable uses of their intellectual works. Efforts to help others by contributing time and energy to projects that help society illustrate a positive aspect of this principle. Such efforts include free and open source software and work put into the public domain. Computing professionals should not claim private ownership of work that they or others have shared as public resources. ### 1\.6 Respect privacy. The responsibility of respecting privacy applies to computing professionals in a particularly profound way. Technology enables the collection, monitoring, and exchange of personal information quickly, inexpensively, and often without the knowledge of the people affected. Therefore, a computing professional should become conversant in the various definitions and forms of privacy and should understand the rights and responsibilities associated with the collection and use of personal information. Computing professionals should only use personal information for legitimate ends and without violating the rights of individuals and groups. This requires taking precautions to prevent re-identification of anonymized data or unauthorized data collection, ensuring the accuracy of data, understanding the provenance of the data, and protecting it from unauthorized access and accidental disclosure. Computing professionals should establish transparent policies and procedures that allow individuals to understand what data is being collected and how it is being used, to give informed consent for automatic data collection, and to review, obtain, correct inaccuracies in, and delete their personal data. Only the minimum amount of personal information necessary should be collected in a system. The retention and disposal periods for that information should be clearly defined, enforced, and communicated to data subjects. Personal information gathered for a specific purpose should not be used for other purposes without the person's consent. Merged data collections can compromise privacy features present in the original collections. Therefore, computing professionals should take special care for privacy when merging data collections. ### 1\.7 Honor confidentiality. Computing professionals are often entrusted with confidential information such as trade secrets, client data, nonpublic business strategies, financial information, research data, pre-publication scholarly articles, and patent applications. Computing professionals should protect confidentiality except in cases where there is evidence of a violation of law, of organizational regulations, or of the Code. In these cases, the nature or contents of that information should not be disclosed except to appropriate authorities. A computing professional should consider thoughtfully whether such disclosures are consistent with the Code. ## 2\. PROFESSIONAL RESPONSIBILITIES. *A computing professional should...* ### 2\.1 Strive to achieve high quality in both the processes and products of professional work. Computing professionals should insist on and support high quality work from themselves and from colleagues. The dignity of employers, employees, colleagues, clients, users, and anyone else affected either directly or indirectly by the work should be respected throughout the process. Computing professionals should respect the right of those involved to transparent communication about the project. Professionals should be cognizant of any serious negative consequences affecting any stakeholder that may result from poor quality work and should resist inducements to neglect this responsibility. ### 2\.2 Maintain high standards of professional competence, conduct, and ethical practice. High quality computing depends on individuals and teams who take personal and group responsibility for acquiring and maintaining professional competence. Professional competence starts with technical knowledge and with awareness of the social context in which their work may be deployed. Professional competence also requires skill in communication, in reflective analysis, and in recognizing and navigating ethical challenges. Upgrading skills should be an ongoing process and might include independent study, attending conferences or seminars, and other informal or formal education. Professional organizations and employers should encourage and facilitate these activities. ### 2\.3 Know and respect existing rules pertaining to professional work. "Rules" here include local, regional, national, and international laws and regulations, as well as any policies and procedures of the organizations to which the professional belongs. Computing professionals must abide by these rules unless there is a compelling ethical justification to do otherwise. Rules that are judged unethical should be challenged. A rule may be unethical when it has an inadequate moral basis or causes recognizable harm. A computing professional should consider challenging the rule through existing channels before violating the rule. A computing professional who decides to violate a rule because it is unethical, or for any other reason, must consider potential consequences and accept responsibility for that action. ### 2\.4 Accept and provide appropriate professional review. High quality professional work in computing depends on professional review at all stages. Whenever appropriate, computing professionals should seek and utilize peer and stakeholder review. Computing professionals should also provide constructive, critical reviews of others' work. ### 2\.5 Give comprehensive and thorough evaluations of computer systems and their impacts, including analysis of possible risks. Computing professionals are in a position of trust, and therefore have a special responsibility to provide objective, credible evaluations and testimony to employers, employees, clients, users, and the public. Computing professionals should strive to be perceptive, thorough, and objective when evaluating, recommending, and presenting system descriptions and alternatives. Extraordinary care should be taken to identify and mitigate potential risks in machine learning systems. A system for which future risks cannot be reliably predicted requires frequent reassessment of risk as the system evolves in use, or it should not be deployed. Any issues that might result in major risk must be reported to appropriate parties. ### 2\.6 Perform work only in areas of competence. A computing professional is responsible for evaluating potential work assignments. This includes evaluating the work's feasibility and advisability, and making a judgment about whether the work assignment is within the professional's areas of competence. If at any time before or during the work assignment the professional identifies a lack of a necessary expertise, they must disclose this to the employer or client. The client or employer may decide to pursue the assignment with the professional after additional time to acquire the necessary competencies, to pursue the assignment with someone else who has the required expertise, or to forgo the assignment. A computing professional's ethical judgment should be the final guide in deciding whether to work on the assignment. ### 2\.7 Foster public awareness and understanding of computing, related technologies, and their consequences. As appropriate to the context and one's abilities, computing professionals should share technical knowledge with the public, foster awareness of computing, and encourage understanding of computing. These communications with the public should be clear, respectful, and welcoming. Important issues include the impacts of computer systems, their limitations, their vulnerabilities, and the opportunities that they present. Additionally, a computing professional should respectfully address inaccurate or misleading information related to computing. ### 2\.8 Access computing and communication resources only when authorized or when compelled by the public good. Individuals and organizations have the right to restrict access to their systems and data so long as the restrictions are consistent with other principles in the Code. Consequently, computing professionals should not access another's computer system, software, or data without a reasonable belief that such an action would be authorized or a compelling belief that it is consistent with the public good. A system being publicly accessible is not sufficient grounds on its own to imply authorization. Under exceptional circumstances a computing professional may use unauthorized access to disrupt or inhibit the functioning of malicious systems; extraordinary precautions must be taken in these instances to avoid harm to others. ### 2\.9 Design and implement systems that are robustly and usably secure. Breaches of computer security cause harm. Robust security should be a primary consideration when designing and implementing systems. Computing professionals should perform due diligence to ensure the system functions as intended, and take appropriate action to secure resources against accidental and intentional misuse, modification, and denial of service. As threats can arise and change after a system is deployed, computing professionals should integrate mitigation techniques and policies, such as monitoring, patching, and vulnerability reporting. Computing professionals should also take steps to ensure parties affected by data breaches are notified in a timely and clear manner, providing appropriate guidance and remediation. To ensure the system achieves its intended purpose, security features should be designed to be as intuitive and easy to use as possible. Computing professionals should discourage security precautions that are too confusing, are situationally inappropriate, or otherwise inhibit legitimate use. In cases where misuse or harm are predictable or unavoidable, the best option may be to not implement the system. ## 3\. PROFESSIONAL LEADERSHIP PRINCIPLES. Leadership may either be a formal designation or arise informally from influence over others. In this section, "leader" means any member of an organization or group who has influence, educational responsibilities, or managerial responsibilities. While these principles apply to all computing professionals, leaders bear a heightened responsibility to uphold and promote them, both within and through their organizations. *A computing professional, especially one acting as a leader, should...* ### 3\.1 Ensure that the public good is the central concern during all professional computing work. People—including users, customers, colleagues, and others affected directly or indirectly—should always be the central concern in computing. The public good should always be an explicit consideration when evaluating tasks associated with research, requirements analysis, design, implementation, testing, validation, deployment, maintenance, retirement, and disposal. Computing professionals should keep this focus no matter which methodologies or techniques they use in their practice. ### 3\.2 Articulate, encourage acceptance of, and evaluate fulfillment of social responsibilities by members of the organization or group. Technical organizations and groups affect broader society, and their leaders should accept the associated responsibilities. Organizations—through procedures and attitudes oriented toward quality, transparency, and the welfare of society—reduce harm to the public and raise awareness of the influence of technology in our lives. Therefore, leaders should encourage full participation of computing professionals in meeting relevant social responsibilities and discourage tendencies to do otherwise. ### 3\.3 Manage personnel and resources to enhance the quality of working life. Leaders should ensure that they enhance, not degrade, the quality of working life. Leaders should consider the personal and professional development, accessibility requirements, physical safety, psychological well-being, and human dignity of all workers. Appropriate human-computer ergonomic standards should be used in the workplace. ### 3\.4 Articulate, apply, and support policies and processes that reflect the principles of the Code. Leaders should pursue clearly defined organizational policies that are consistent with the Code and effectively communicate them to relevant stakeholders. In addition, leaders should encourage and reward compliance with those policies, and take appropriate action when policies are violated. Designing or implementing processes that deliberately or negligently violate, or tend to enable the violation of, the Code's principles is ethically unacceptable. ### 3\.5 Create opportunities for members of the organization or group to grow as professionals. Educational opportunities are essential for all organization and group members. Leaders should ensure that opportunities are available to computing professionals to help them improve their knowledge and skills in professionalism, in the practice of ethics, and in their technical specialties. These opportunities should include experiences that familiarize computing professionals with the consequences and limitations of particular types of systems. Computing professionals should be fully aware of the dangers of oversimplified approaches, the improbability of anticipating every possible operating condition, the inevitability of software errors, the interactions of systems and their contexts, and other issues related to the complexity of their profession—and thus be confident in taking on responsibilities for the work that they do. ### 3\.6 Use care when modifying or retiring systems. Interface changes, the removal of features, and even software updates have an impact on the productivity of users and the quality of their work. Leaders should take care when changing or discontinuing support for system features on which people still depend. Leaders should thoroughly investigate viable alternatives to removing support for a legacy system. If these alternatives are unacceptably risky or impractical, the developer should assist stakeholders' graceful migration from the system to an alternative. Users should be notified of the risks of continued use of the unsupported system long before support ends. Computing professionals should assist system users in monitoring the operational viability of their computing systems, and help them understand that timely replacement of inappropriate or outdated features or entire systems may be needed. ### 3\.7 Recognize and take special care of systems that become integrated into the infrastructure of society. Even the simplest computer systems have the potential to impact all aspects of society when integrated with everyday activities such as commerce, travel, government, healthcare, and education. When organizations and groups develop systems that become an important part of the infrastructure of society, their leaders have an added responsibility to be good stewards of these systems. Part of that stewardship requires establishing policies for fair system access, including for those who may have been excluded. That stewardship also requires that computing professionals monitor the level of integration of their systems into the infrastructure of society. As the level of adoption changes, the ethical responsibilities of the organization or group are likely to change as well. Continual monitoring of how society is using a system will allow the organization or group to remain consistent with their ethical obligations outlined in the Code. When appropriate standards of care do not exist, computing professionals have a duty to ensure they are developed. ## 4\. COMPLIANCE WITH THE CODE. *A computing professional should...* ### 4\.1 Uphold, promote, and respect the principles of the Code. The future of computing depends on both technical and ethical excellence. Computing professionals should adhere to the principles of the Code and contribute to improving them. Computing professionals who recognize breaches of the Code should take actions to resolve the ethical issues they recognize, including, when reasonable, expressing their concern to the person or persons thought to be violating the Code. ### 4\.2 Treat violations of the Code as inconsistent with membership in the ACM. Each ACM member should encourage and support adherence by all computing professionals regardless of ACM membership. ACM members who recognize a breach of the Code should consider reporting the violation to the ACM, which may result in remedial action as specified in the ACM's Code of Ethics and Professional Conduct Enforcement Policy. *** *The Code and guidelines were developed by the ACM Code 2018 Task Force: Executive Committee Don Gotterbarn (Chair), Bo Brinkman, Catherine Flick, Michael S Kirkpatrick, Keith Miller, Kate Varansky, and Marty J Wolf. Members: Eve Anderson, Ron Anderson, Amy Bruckman, Karla Carter, Michael Davis, Penny Duquenoy, Jeremy Epstein, Kai Kimppa, Lorraine Kisselburgh, Shrawan Kumar, Andrew McGettrick, Natasa Milic-Frayling, Denise Oram, Simon Rogerson, David Shamma, Janice Sipior, Eugene Spafford, and Les Waguespack. The Task Force was organized by the ACM Committee on Professional Ethics. Significant contributions to the Code were also made by the broader international ACM membership. This Code and its guidelines were adopted by the ACM Council on June 22nd, 2018.* *This Code may be published without permission as long as it is not changed in any way and it carries the copyright notice. Copyright (c) 2018 by the Association for Computing Machinery.* ## - [ACM Code of Ethics](https://www.acm.org/code-of-ethics) - [Report a Potential Code Violation](https://services.acm.org/ethics/report.cfm) - [Using the Code](https://www.acm.org/code-of-ethics/using-the-code) - [Case Studies](https://www.acm.org/code-of-ethics/case-studies) - [Previous Versions of the ACM Code](https://www.acm.org/code-of-ethics/previous-versions) - [Other Codes](https://www.acm.org/code-of-ethics/other-codes) - [The Code 2018 Update Project](https://www.acm.org/code-of-ethics/code-2018-update-project) - [About ACM's Committee on Professional Ethics (COPE)](https://www.acm.org/code-of-ethics/cope) - [Follow us on BlueSky](https://bsky.app/profile/acm-ethics.bsky.social) ## On This Page - [Preamble](https://www.acm.org/code-of-ethics#h-preamble) - [1\. GENERAL ETHICAL PRINCIPLES.](https://www.acm.org/code-of-ethics#h-1.-general-ethical-principles.) - [1\.1 Contribute to society and to human well-being, acknowledging that all people are stakeholders in computing.](https://www.acm.org/code-of-ethics#h-1.1-contribute-to-society-and-to-human-well-being,-acknowledging-that-all-people-are-stakeholders-in-computing.) - [1\.2 Avoid harm.](https://www.acm.org/code-of-ethics#h-1.2-avoid-harm.) - [1\.3 Be honest and trustworthy.](https://www.acm.org/code-of-ethics#h-1.3-be-honest-and-trustworthy.) - [1\.4 Be fair and take action not to discriminate.](https://www.acm.org/code-of-ethics#h-1.4-be-fair-and-take-action-not-to-discriminate.) - [1\.5 Respect the work required to produce new ideas, inventions, creative works, and computing artifacts.](https://www.acm.org/code-of-ethics#h-1.5-respect-the-work-required-to-produce-new-ideas,-inventions,-creative-works,-and-computing-artifacts.) - [1\.6 Respect privacy.](https://www.acm.org/code-of-ethics#h-1.6-respect-privacy.) - [1\.7 Honor confidentiality.](https://www.acm.org/code-of-ethics#h-1.7-honor-confidentiality.) - [2\. PROFESSIONAL RESPONSIBILITIES.](https://www.acm.org/code-of-ethics#h-2.-professional-responsibilities.) - [2\.1 Strive to achieve high quality in both the processes and products of professional work.](https://www.acm.org/code-of-ethics#h-2.1-strive-to-achieve-high-quality-in-both-the-processes-and-products-of-professional-work.) - [2\.2 Maintain high standards of professional competence, conduct, and ethical practice.](https://www.acm.org/code-of-ethics#h-2.2-maintain-high-standards-of-professional-competence,-conduct,-and-ethical-practice.) - [2\.3 Know and respect existing rules pertaining to professional work.](https://www.acm.org/code-of-ethics#h-2.3-know-and-respect-existing-rules-pertaining-to-professional-work.) - [2\.4 Accept and provide appropriate professional review.](https://www.acm.org/code-of-ethics#h-2.4-accept-and-provide-appropriate-professional-review.) - [2\.5 Give comprehensive and thorough evaluations of computer systems and their impacts, including analysis of possible risks.](https://www.acm.org/code-of-ethics#h-2.5-give-comprehensive-and-thorough-evaluations-of-computer-systems-and-their-impacts,-including-analysis-of-possible-risks.) - [2\.6 Perform work only in areas of competence.](https://www.acm.org/code-of-ethics#h-2.6-perform-work-only-in-areas-of-competence.) - [2\.7 Foster public awareness and understanding of computing, related technologies, and their consequences.](https://www.acm.org/code-of-ethics#h-2.7-foster-public-awareness-and-understanding-of-computing,-related-technologies,-and-their-consequences.) - [2\.8 Access computing and communication resources only when authorized or when compelled by the public good.](https://www.acm.org/code-of-ethics#h-2.8-access-computing-and-communication-resources-only-when-authorized-or-when-compelled-by-the-public-good.) - [2\.9 Design and implement systems that are robustly and usably secure.](https://www.acm.org/code-of-ethics#h-2.9-design-and-implement-systems-that-are-robustly-and-usably-secure.) - [3\. PROFESSIONAL LEADERSHIP PRINCIPLES.](https://www.acm.org/code-of-ethics#h-3.-professional-leadership-principles.) - [3\.1 Ensure that the public good is the central concern during all professional computing work.](https://www.acm.org/code-of-ethics#h-3.1-ensure-that-the-public-good-is-the-central-concern-during-all-professional-computing-work.) - [3\.2 Articulate, encourage acceptance of, and evaluate fulfillment of social responsibilities by members of the organization or group.](https://www.acm.org/code-of-ethics#h-3.2-articulate,-encourage-acceptance-of,-and-evaluate-fulfillment-of-social-responsibilities-by-members-of-the-organization-or-group.) - [3\.3 Manage personnel and resources to enhance the quality of working life.](https://www.acm.org/code-of-ethics#h-3.3-manage-personnel-and-resources-to-enhance-the-quality-of-working-life.) - [3\.4 Articulate, apply, and support policies and processes that reflect the principles of the Code.](https://www.acm.org/code-of-ethics#h-3.4-articulate,-apply,-and-support-policies-and-processes-that-reflect-the-principles-of-the-code.) - [3\.5 Create opportunities for members of the organization or group to grow as professionals.](https://www.acm.org/code-of-ethics#h-3.5-create-opportunities-for-members-of-the-organization-or-group-to-grow-as-professionals.) - [3\.6 Use care when modifying or retiring systems.](https://www.acm.org/code-of-ethics#h-3.6-use-care-when-modifying-or-retiring-systems.) - [3\.7 Recognize and take special care of systems that become integrated into the infrastructure of society.](https://www.acm.org/code-of-ethics#h-3.7-recognize-and-take-special-care-of-systems-that-become-integrated-into-the-infrastructure-of-society.) - [4\. COMPLIANCE WITH THE CODE.](https://www.acm.org/code-of-ethics#h-4.-compliance-with-the-code.) - [4\.1 Uphold, promote, and respect the principles of the Code.](https://www.acm.org/code-of-ethics#h-4.1-uphold,-promote,-and-respect-the-principles-of-the-code.) - [4\.2 Treat violations of the Code as](https://www.acm.org/code-of-ethics#h-4.2-treat-violations-of-the-code-as-inconsistent-with-membership-in-the-acm.) ## [Download a PDF of the ACM Code Booklet](https://www.acm.org/binaries/content/assets/about/acm-code-of-ethics-booklet.pdf) ACM recently updated its Code of Ethics and Professional Conduct. The revised Code of Ethics addresses the significant advances in computing technology since the 1992 version, as well as the growing pervasiveness of computing in all aspects of society. To promote the Code throughout the computing community, ACM created a booklet, which includes the Code, case studies that illustrate how the Code can be applied to situations that arise in everyday practice and suggestions on how the Code can be used in educational settings and in companies and organizations. [![](https://www.acm.org/binaries/ctaimagelarge/content/gallery/acm/ctas/cope-code/code-booklet.jpg)](https://www.acm.org/binaries/content/assets/about/acm-code-of-ethics-booklet.pdf) ## [PDF of the ACM Code of Ethics](https://www.acm.org/binaries/content/assets/about/acm-code-of-ethics-and-professional-conduct.pdf) ## [计算机协会道德୚职业行为准则](https://www.acm.org/code-of-ethics/the-code-in-chinese) ## [Código de Ética y Conducta Profesional de ACM](https://www.acm.org/code-of-ethics/the-code-in-spanish) ## [Supporting the Professionalism of ACM Members](https://www.acm.org/code-of-ethics/cope) The ACM Committee on Professional Ethics (COPE) is responsible for promoting ethical conduct among computing professionals by publicizing the Code of Ethics and by offering interpretations of the Code; planning and reviewing activities to educate membership in ethical decision making on issues of professional conduct; and reviewing and recommending updates to the Code of Ethics and its guidelines. [![](https://www.acm.org/binaries/ctaimagelarge/content/gallery/acm/ctas/public-policy/cope_background_logo.jpg)](https://www.acm.org/code-of-ethics/cope) ## [Using the Code: Case Studies](https://www.acm.org/code-of-ethics/case-studies) With the release of the updated Code of Ethics, ACM has created companion case studies that demonstrate how the principles of the Code can be applied to specific ethical challenges. Illustrative examples of hypothetical violations of or adherence to specific principles found in the Code—highlighting key nuances and directives—form the basis of the case studies. [![](https://www.acm.org/binaries/ctaimagelarge/content/gallery/acm/ctas/cope-code/code-ethics-case-studies-1.jpg)](https://www.acm.org/code-of-ethics/case-studies) ## [Code of Ethics Enforcement Procedures](https://www.acm.org/code-of-ethics/enforcement-procedures) ACM expects all ACM and ACM Special Interest Group (SIG) members to make a commitment to engage in ethical professional conduct and abide by ACM’s Code of Ethics. This policy describes ACM’s procedure for enforcing the Code and may be used for complaints brought to ACM via ACM's other policies. ## IFIP Bases New Code of Ethics on ACM's At its virtual General Assembly held in September, the International Federation for Information Processing (IFIP) adopted a new IFIP Code of Ethics and Professional Conduct. The code was adapted from [ACM's Code of Ethics](https://www.acm.org/code-of-ethics), which itself had been through consultation and development with members of IFIP, IEEE and other national and international bodies and companies. "As an international member of IFIP, ACM endorses the proposed IFIP Code of Ethics as a common international standard for computing and the profession," said ACM CEO Vicki Hanson. [Read the IFIP news release](https://www.ifipnews.org/ifip-adopts-new-code-ethics-professional-conduct). ![](https://www.acm.org/binaries/ctaimagelarge/content/gallery/acm/ctas/cope-code/ifip-code-ethics.jpg) - About ACM - [About ACM](https://www.acm.org/about-acm "About ACM") - [Volunteer](https://www.acm.org/about-acm/get-involved "About ACM") - Membership - [Join ACM](https://www.acm.org/membership/join-acm "Membership") - [Renew My Membership](https://www.acm.org/membership/acm-membership-renewal "Membership") - [Membership Options](https://www.acm.org/membership/membership-options "Membership") - [Membership Benefits](https://www.acm.org/membership/membership-benefits "Membership") - [MyACM Sign In](https://www.acm.org/membership/myacm-at-a-glance "Membership") - Publications - [About Publications](https://www.acm.org/publications/about-publications "Publications") - [Digital Library](https://www.acm.org/publications/digital-library "Publications") - [Submit a Paper](http://dl.acm.org/pubs.cfm "Publications") - [Advertise with ACM](https://www.acm.org/publications/advertising "Publications") - Chapters - [Chapter Admin Interface](https://www.acm.org/chapters/chapter-administrative-interface "Chapters") - [Chapter Activities Calendar](https://www.acm.org/chapters/local-activities "Chapters") - [Start a Chapter](https://www.acm.org/chapters/start-chapter "Chapters") - Special Interest Groups - [SIGs Newsletter](https://www.acm.org/special-interest-groups/sig-newsletters "Special Interest Groups") - Awards - [About ACM's Awards](https://www.acm.org/awards/about-awards "Awards") - Conferences - [ACM's Conferences](https://www.acm.org/conferences "Conferences") - Code of Ethics - [ACM's Code of Ethics](https://www.acm.org/code-of-ethics "Code of Ethics") - [Enforcement Procedures](https://www.acm.org/code-of-ethics/enforcement-procedures "Code of Ethics") - Media Center - [ACM Media Center](https://www.acm.org/media-center "Media Center") - [Advertise with ACM](https://www.acm.org/publications/advertising "Media Center") - Education - [Education Home](https://www.acm.org/education "Education") - Privacy Policy - [Privacy Policy Home](https://www.acm.org/privacy-policy "Privacy Policy") *** ![ACM Logo](https://www.acm.org/binaries/content/gallery/acm/logos/logo_footer_acm.png) - [![Facebook logo](https://www.acm.org/binaries/content/gallery/acm/social-media/icon_facebook.png)](https://www.facebook.com/AssociationForComputingMachinery/) - [![Twitter logo](https://www.acm.org/binaries/content/gallery/acm/social-media/icon_x_twitter.png)](https://twitter.com/theofficialacm) - [![LinkedIn logo](https://www.acm.org/binaries/content/gallery/acm/social-media/icon_linkedin.png)](https://www.linkedin.com/company/association-for-computing-machinery) - [![Reddit logo](https://www.acm.org/binaries/content/gallery/acm/social-media/icon_reddit.png)](https://www.reddit.com/user/TheOfficialACM) - [![YouTube logo](https://www.acm.org/binaries/content/gallery/acm/social-media/icon_youtube.png)](https://www.youtube.com/user/TheOfficialACM) - [![Instagram](https://www.acm.org/binaries/content/gallery/acm/social-media/icon_instagram.png)](https://www.instagram.com/theofficialacm/) - [![Flickr](https://www.acm.org/binaries/content/gallery/acm/social-media/icon_flickr.png)](https://www.flickr.com/photos/theofficialacm) - [![Mastodon](https://www.acm.org/binaries/content/gallery/acm/social-media/icon_mastodon.png)](https://mastodon.acm.org/@ACM) - [![Bluesky](https://www.acm.org/binaries/content/gallery/acm/social-media/icon_bluesky.png)](https://bsky.app/profile/acm.org) - [![WeChat](https://www.acm.org/binaries/content/gallery/acm/social-media/icon_wechat.png)](https://www.acm.org/binaries/content/gallery/images-mail/wechat-qr-code.png) - [![Substack](https://www.acm.org/binaries/content/gallery/acm/social-media/icon_substack.png)](https://substack.com/@theofficialacm) - [![Email](https://www.acm.org/binaries/content/gallery/acm/social-media/icon_mail.png)](mailto:acmhelp@acm.org) - [Home](https://www.acm.org/) - [Sitemap](https://www.acm.org/sitemap) - [Contact Us](https://www.acm.org/about-acm/contact-us) - [Member Services](https://www.acm.org/membership/acm-hq-contact) - [Privacy Policy](https://www.acm.org/privacy-policy) - [Social Media Policy](https://www.acm.org/media-center/social-media-policy) - [Accessibility](https://www.acm.org/accessibility) - [Cookie Declaration](https://www.acm.org/cookie-declaration) - Copyright © 2026, ACM, Inc
Readable Markdown
## Preamble Computing professionals' actions change the world. To act responsibly, they should reflect upon the wider impacts of their work, consistently supporting the public good. The ACM Code of Ethics and Professional Conduct ("the Code") expresses the conscience of the profession. The Code is designed to inspire and guide the ethical conduct of all computing professionals, including current and aspiring practitioners, instructors, students, influencers, and anyone who uses computing technology in an impactful way. Additionally, the Code serves as a basis for remediation when violations occur. The Code includes principles formulated as statements of responsibility, based on the understanding that the public good is always the primary consideration. Each principle is supplemented by guidelines, which provide explanations to assist computing professionals in understanding and applying the principle. Section 1 outlines fundamental ethical principles that form the basis for the remainder of the Code. Section 2 addresses additional, more specific considerations of professional responsibility. Section 3 guides individuals who have a leadership role, whether in the workplace or in a volunteer professional capacity. Commitment to ethical conduct is required of every ACM member, ACM SIG member, ACM award recipient, and ACM SIG award recipient. Principles involving compliance with the Code are given in Section 4. The Code as a whole is concerned with how fundamental ethical principles apply to a computing professional's conduct. The Code is not an algorithm for solving ethical problems; rather it serves as a basis for ethical decision-making. When thinking through a particular issue, a computing professional may find that multiple principles should be taken into account, and that different principles will have different relevance to the issue. Questions related to these kinds of issues can best be answered by thoughtful consideration of the fundamental ethical principles, understanding that the public good is the paramount consideration. The entire computing profession benefits when the ethical decision-making process is accountable to and transparent to all stakeholders. Open discussions about ethical issues promote this accountability and transparency. ## 1\. GENERAL ETHICAL PRINCIPLES. *A computing professional should...* ### 1\.1 Contribute to society and to human well-being, acknowledging that all people are stakeholders in computing. This principle, which concerns the quality of life of all people, affirms an obligation of computing professionals, both individually and collectively, to use their skills for the benefit of society, its members, and the environment surrounding them. This obligation includes promoting fundamental human rights and protecting each individual's right to autonomy. An essential aim of computing professionals is to minimize negative consequences of computing, including threats to health, safety, personal security, and privacy. When the interests of multiple groups conflict, the needs of those less advantaged should be given increased attention and priority. Computing professionals should consider whether the results of their efforts will respect diversity, will be used in socially responsible ways, will meet social needs, and will be broadly accessible. They are encouraged to actively contribute to society by engaging in pro bono or volunteer work that benefits the public good. In addition to a safe social environment, human well-being requires a safe natural environment. Therefore, computing professionals should promote environmental sustainability both locally and globally. ### 1\.2 Avoid harm. In this document, "harm" means negative consequences, especially when those consequences are significant and unjust. Examples of harm include unjustified physical or mental injury, unjustified destruction or disclosure of information, and unjustified damage to property, reputation, and the environment. This list is not exhaustive. Well-intended actions, including those that accomplish assigned duties, may lead to harm. When that harm is unintended, those responsible are obliged to undo or mitigate the harm as much as possible. Avoiding harm begins with careful consideration of potential impacts on all those affected by decisions. When harm is an intentional part of the system, those responsible are obligated to ensure that the harm is ethically justified. In either case, ensure that all harm is minimized. To minimize the possibility of indirectly or unintentionally harming others, computing professionals should follow generally accepted best practices unless there is a compelling ethical reason to do otherwise. Additionally, the consequences of data aggregation and emergent properties of systems should be carefully analyzed. Those involved with pervasive or infrastructure systems should also consider Principle 3.7. A computing professional has an additional obligation to report any signs of system risks that might result in harm. If leaders do not act to curtail or mitigate such risks, it may be necessary to "blow the whistle" to reduce potential harm. However, capricious or misguided reporting of risks can itself be harmful. Before reporting risks, a computing professional should carefully assess relevant aspects of the situation. ### 1\.3 Be honest and trustworthy. Honesty is an essential component of trustworthiness. A computing professional should be transparent and provide full disclosure of all pertinent system capabilities, limitations, and potential problems to the appropriate parties. Making deliberately false or misleading claims, fabricating or falsifying data, offering or accepting bribes, and other dishonest conduct are violations of the Code. Computing professionals should be honest about their qualifications, and about any limitations in their competence to complete a task. Computing professionals should be forthright about any circumstances that might lead to either real or perceived conflicts of interest or otherwise tend to undermine the independence of their judgment. Furthermore, commitments should be honored. Computing professionals should not misrepresent an organization's policies or procedures, and should not speak on behalf of an organization unless authorized to do so. ### 1\.4 Be fair and take action not to discriminate. The values of equality, tolerance, respect for others, and justice govern this principle. Fairness requires that even careful decision processes provide some avenue for redress of grievances. Computing professionals should foster fair participation of all people, including those of underrepresented groups. Prejudicial discrimination on the basis of age, color, disability, ethnicity, family status, gender identity, labor union membership, military status, nationality, race, religion or belief, sex, sexual orientation, or any other inappropriate factor is an explicit violation of the Code. Harassment, including sexual harassment, bullying, and other abuses of power and authority, is a form of discrimination that, amongst other harms, limits fair access to the virtual and physical spaces where such harassment takes place. The use of information and technology may cause new, or enhance existing, inequities. Technologies and practices should be as inclusive and accessible as possible and computing professionals should take action to avoid creating systems or technologies that disenfranchise or oppress people. Failure to design for inclusiveness and accessibility may constitute unfair discrimination. ### 1\.5 Respect the work required to produce new ideas, inventions, creative works, and computing artifacts. Developing new ideas, inventions, creative works, and computing artifacts creates value for society, and those who expend this effort should expect to gain value from their work. Computing professionals should therefore credit the creators of ideas, inventions, work, and artifacts, and respect copyrights, patents, trade secrets, license agreements, and other methods of protecting authors' works. Both custom and the law recognize that some exceptions to a creator's control of a work are necessary for the public good. Computing professionals should not unduly oppose reasonable uses of their intellectual works. Efforts to help others by contributing time and energy to projects that help society illustrate a positive aspect of this principle. Such efforts include free and open source software and work put into the public domain. Computing professionals should not claim private ownership of work that they or others have shared as public resources. ### 1\.6 Respect privacy. The responsibility of respecting privacy applies to computing professionals in a particularly profound way. Technology enables the collection, monitoring, and exchange of personal information quickly, inexpensively, and often without the knowledge of the people affected. Therefore, a computing professional should become conversant in the various definitions and forms of privacy and should understand the rights and responsibilities associated with the collection and use of personal information. Computing professionals should only use personal information for legitimate ends and without violating the rights of individuals and groups. This requires taking precautions to prevent re-identification of anonymized data or unauthorized data collection, ensuring the accuracy of data, understanding the provenance of the data, and protecting it from unauthorized access and accidental disclosure. Computing professionals should establish transparent policies and procedures that allow individuals to understand what data is being collected and how it is being used, to give informed consent for automatic data collection, and to review, obtain, correct inaccuracies in, and delete their personal data. Only the minimum amount of personal information necessary should be collected in a system. The retention and disposal periods for that information should be clearly defined, enforced, and communicated to data subjects. Personal information gathered for a specific purpose should not be used for other purposes without the person's consent. Merged data collections can compromise privacy features present in the original collections. Therefore, computing professionals should take special care for privacy when merging data collections. ### 1\.7 Honor confidentiality. Computing professionals are often entrusted with confidential information such as trade secrets, client data, nonpublic business strategies, financial information, research data, pre-publication scholarly articles, and patent applications. Computing professionals should protect confidentiality except in cases where there is evidence of a violation of law, of organizational regulations, or of the Code. In these cases, the nature or contents of that information should not be disclosed except to appropriate authorities. A computing professional should consider thoughtfully whether such disclosures are consistent with the Code. ## 2\. PROFESSIONAL RESPONSIBILITIES. *A computing professional should...* ### 2\.1 Strive to achieve high quality in both the processes and products of professional work. Computing professionals should insist on and support high quality work from themselves and from colleagues. The dignity of employers, employees, colleagues, clients, users, and anyone else affected either directly or indirectly by the work should be respected throughout the process. Computing professionals should respect the right of those involved to transparent communication about the project. Professionals should be cognizant of any serious negative consequences affecting any stakeholder that may result from poor quality work and should resist inducements to neglect this responsibility. ### 2\.2 Maintain high standards of professional competence, conduct, and ethical practice. High quality computing depends on individuals and teams who take personal and group responsibility for acquiring and maintaining professional competence. Professional competence starts with technical knowledge and with awareness of the social context in which their work may be deployed. Professional competence also requires skill in communication, in reflective analysis, and in recognizing and navigating ethical challenges. Upgrading skills should be an ongoing process and might include independent study, attending conferences or seminars, and other informal or formal education. Professional organizations and employers should encourage and facilitate these activities. ### 2\.3 Know and respect existing rules pertaining to professional work. "Rules" here include local, regional, national, and international laws and regulations, as well as any policies and procedures of the organizations to which the professional belongs. Computing professionals must abide by these rules unless there is a compelling ethical justification to do otherwise. Rules that are judged unethical should be challenged. A rule may be unethical when it has an inadequate moral basis or causes recognizable harm. A computing professional should consider challenging the rule through existing channels before violating the rule. A computing professional who decides to violate a rule because it is unethical, or for any other reason, must consider potential consequences and accept responsibility for that action. ### 2\.4 Accept and provide appropriate professional review. High quality professional work in computing depends on professional review at all stages. Whenever appropriate, computing professionals should seek and utilize peer and stakeholder review. Computing professionals should also provide constructive, critical reviews of others' work. ### 2\.5 Give comprehensive and thorough evaluations of computer systems and their impacts, including analysis of possible risks. Computing professionals are in a position of trust, and therefore have a special responsibility to provide objective, credible evaluations and testimony to employers, employees, clients, users, and the public. Computing professionals should strive to be perceptive, thorough, and objective when evaluating, recommending, and presenting system descriptions and alternatives. Extraordinary care should be taken to identify and mitigate potential risks in machine learning systems. A system for which future risks cannot be reliably predicted requires frequent reassessment of risk as the system evolves in use, or it should not be deployed. Any issues that might result in major risk must be reported to appropriate parties. ### 2\.6 Perform work only in areas of competence. A computing professional is responsible for evaluating potential work assignments. This includes evaluating the work's feasibility and advisability, and making a judgment about whether the work assignment is within the professional's areas of competence. If at any time before or during the work assignment the professional identifies a lack of a necessary expertise, they must disclose this to the employer or client. The client or employer may decide to pursue the assignment with the professional after additional time to acquire the necessary competencies, to pursue the assignment with someone else who has the required expertise, or to forgo the assignment. A computing professional's ethical judgment should be the final guide in deciding whether to work on the assignment. ### 2\.7 Foster public awareness and understanding of computing, related technologies, and their consequences. As appropriate to the context and one's abilities, computing professionals should share technical knowledge with the public, foster awareness of computing, and encourage understanding of computing. These communications with the public should be clear, respectful, and welcoming. Important issues include the impacts of computer systems, their limitations, their vulnerabilities, and the opportunities that they present. Additionally, a computing professional should respectfully address inaccurate or misleading information related to computing. ### 2\.8 Access computing and communication resources only when authorized or when compelled by the public good. Individuals and organizations have the right to restrict access to their systems and data so long as the restrictions are consistent with other principles in the Code. Consequently, computing professionals should not access another's computer system, software, or data without a reasonable belief that such an action would be authorized or a compelling belief that it is consistent with the public good. A system being publicly accessible is not sufficient grounds on its own to imply authorization. Under exceptional circumstances a computing professional may use unauthorized access to disrupt or inhibit the functioning of malicious systems; extraordinary precautions must be taken in these instances to avoid harm to others. ### 2\.9 Design and implement systems that are robustly and usably secure. Breaches of computer security cause harm. Robust security should be a primary consideration when designing and implementing systems. Computing professionals should perform due diligence to ensure the system functions as intended, and take appropriate action to secure resources against accidental and intentional misuse, modification, and denial of service. As threats can arise and change after a system is deployed, computing professionals should integrate mitigation techniques and policies, such as monitoring, patching, and vulnerability reporting. Computing professionals should also take steps to ensure parties affected by data breaches are notified in a timely and clear manner, providing appropriate guidance and remediation. To ensure the system achieves its intended purpose, security features should be designed to be as intuitive and easy to use as possible. Computing professionals should discourage security precautions that are too confusing, are situationally inappropriate, or otherwise inhibit legitimate use. In cases where misuse or harm are predictable or unavoidable, the best option may be to not implement the system. ## 3\. PROFESSIONAL LEADERSHIP PRINCIPLES. Leadership may either be a formal designation or arise informally from influence over others. In this section, "leader" means any member of an organization or group who has influence, educational responsibilities, or managerial responsibilities. While these principles apply to all computing professionals, leaders bear a heightened responsibility to uphold and promote them, both within and through their organizations. *A computing professional, especially one acting as a leader, should...* ### 3\.1 Ensure that the public good is the central concern during all professional computing work. People—including users, customers, colleagues, and others affected directly or indirectly—should always be the central concern in computing. The public good should always be an explicit consideration when evaluating tasks associated with research, requirements analysis, design, implementation, testing, validation, deployment, maintenance, retirement, and disposal. Computing professionals should keep this focus no matter which methodologies or techniques they use in their practice. ### 3\.2 Articulate, encourage acceptance of, and evaluate fulfillment of social responsibilities by members of the organization or group. Technical organizations and groups affect broader society, and their leaders should accept the associated responsibilities. Organizations—through procedures and attitudes oriented toward quality, transparency, and the welfare of society—reduce harm to the public and raise awareness of the influence of technology in our lives. Therefore, leaders should encourage full participation of computing professionals in meeting relevant social responsibilities and discourage tendencies to do otherwise. ### 3\.3 Manage personnel and resources to enhance the quality of working life. Leaders should ensure that they enhance, not degrade, the quality of working life. Leaders should consider the personal and professional development, accessibility requirements, physical safety, psychological well-being, and human dignity of all workers. Appropriate human-computer ergonomic standards should be used in the workplace. ### 3\.4 Articulate, apply, and support policies and processes that reflect the principles of the Code. Leaders should pursue clearly defined organizational policies that are consistent with the Code and effectively communicate them to relevant stakeholders. In addition, leaders should encourage and reward compliance with those policies, and take appropriate action when policies are violated. Designing or implementing processes that deliberately or negligently violate, or tend to enable the violation of, the Code's principles is ethically unacceptable. ### 3\.5 Create opportunities for members of the organization or group to grow as professionals. Educational opportunities are essential for all organization and group members. Leaders should ensure that opportunities are available to computing professionals to help them improve their knowledge and skills in professionalism, in the practice of ethics, and in their technical specialties. These opportunities should include experiences that familiarize computing professionals with the consequences and limitations of particular types of systems. Computing professionals should be fully aware of the dangers of oversimplified approaches, the improbability of anticipating every possible operating condition, the inevitability of software errors, the interactions of systems and their contexts, and other issues related to the complexity of their profession—and thus be confident in taking on responsibilities for the work that they do. ### 3\.6 Use care when modifying or retiring systems. Interface changes, the removal of features, and even software updates have an impact on the productivity of users and the quality of their work. Leaders should take care when changing or discontinuing support for system features on which people still depend. Leaders should thoroughly investigate viable alternatives to removing support for a legacy system. If these alternatives are unacceptably risky or impractical, the developer should assist stakeholders' graceful migration from the system to an alternative. Users should be notified of the risks of continued use of the unsupported system long before support ends. Computing professionals should assist system users in monitoring the operational viability of their computing systems, and help them understand that timely replacement of inappropriate or outdated features or entire systems may be needed. ### 3\.7 Recognize and take special care of systems that become integrated into the infrastructure of society. Even the simplest computer systems have the potential to impact all aspects of society when integrated with everyday activities such as commerce, travel, government, healthcare, and education. When organizations and groups develop systems that become an important part of the infrastructure of society, their leaders have an added responsibility to be good stewards of these systems. Part of that stewardship requires establishing policies for fair system access, including for those who may have been excluded. That stewardship also requires that computing professionals monitor the level of integration of their systems into the infrastructure of society. As the level of adoption changes, the ethical responsibilities of the organization or group are likely to change as well. Continual monitoring of how society is using a system will allow the organization or group to remain consistent with their ethical obligations outlined in the Code. When appropriate standards of care do not exist, computing professionals have a duty to ensure they are developed. ## 4\. COMPLIANCE WITH THE CODE. *A computing professional should...* ### 4\.1 Uphold, promote, and respect the principles of the Code. The future of computing depends on both technical and ethical excellence. Computing professionals should adhere to the principles of the Code and contribute to improving them. Computing professionals who recognize breaches of the Code should take actions to resolve the ethical issues they recognize, including, when reasonable, expressing their concern to the person or persons thought to be violating the Code. ### 4\.2 Treat violations of the Code as inconsistent with membership in the ACM. Each ACM member should encourage and support adherence by all computing professionals regardless of ACM membership. ACM members who recognize a breach of the Code should consider reporting the violation to the ACM, which may result in remedial action as specified in the ACM's Code of Ethics and Professional Conduct Enforcement Policy. *** *The Code and guidelines were developed by the ACM Code 2018 Task Force: Executive Committee Don Gotterbarn (Chair), Bo Brinkman, Catherine Flick, Michael S Kirkpatrick, Keith Miller, Kate Varansky, and Marty J Wolf. Members: Eve Anderson, Ron Anderson, Amy Bruckman, Karla Carter, Michael Davis, Penny Duquenoy, Jeremy Epstein, Kai Kimppa, Lorraine Kisselburgh, Shrawan Kumar, Andrew McGettrick, Natasa Milic-Frayling, Denise Oram, Simon Rogerson, David Shamma, Janice Sipior, Eugene Spafford, and Les Waguespack. The Task Force was organized by the ACM Committee on Professional Ethics. Significant contributions to the Code were also made by the broader international ACM membership. This Code and its guidelines were adopted by the ACM Council on June 22nd, 2018.* *This Code may be published without permission as long as it is not changed in any way and it carries the copyright notice. Copyright (c) 2018 by the Association for Computing Machinery.*
Shard91 (laksa)
Root Hash6385618855135636491
Unparsed URLorg,acm!www,/code-of-ethics s443