Cyber Ethics

From the Department of Information Technology

What is Cyber Ethics?

  • Cyber ethics refers to the code of responsible behavior on the Internet. Just as we are taught to act responsibly in everyday life, with lessons such as “don’t take what doesn’t belong to you,” and “do not harm others,” — we must act responsibly in the cyber world as well..

What are Responsible Behaviors on the Internet?

  • Responsible behavior on the Internet in many ways aligns with acceptable behavior in everyday life, but the consequences can be significantly different. For example, verbal gossiping is generally limited to the immediate audience (those within earshot) and may well be forgotten the next day. However, gossiping on the Internet can reach a far wider audience. The “words” are not forgotten the next day, but may live on the Internet for days, months or years and cause tremendous harm.
  • Some people try to hide behind a false sense of anonymity on the Internet, believing that it does not matter if they behave badly online because no one knows who they are or how to identify them, but this is not always true. Computers, browsers, and Internet service providers may keep logs of their activities which can be used to identify illegal or inappropriate behavior.

The basic rule is do not do something in cyber space that you would consider wrong or illegal in everyday life.

When determining responsible behaviors, consider the following:

• Do not use rude or offensive language.

• Do not be a bully on the Internet. Do not call people names, lie about them, send embarrassing pictures of them, or do anything else to try to hurt them.

• Do not copy information from the Internet and claim it as yours. This is plagiarism.

• Adhere to copyright restrictions when downloading material including software, games, movies, or music from the Internet.

• Do not break into someone else’s computer.

• Do not use someone else’s password.

• Do not attempt to infect or in any way try to make someone else’s computer unusable.

We were taught the rules of “right and wrong” growing up. We just need to apply the same rules to cyber space!

For more information on Cyber Ethics visit:

– Broadcom

– Microsoft Security Cyber Ethics

– StaySafeOnLine

For more monthly information security tips

  • If it is practically impossible for the Facility to respond to your request within the five-day period, we must state this in writing, explaining the conditions that make the response impossible. This will allow us seven additional working days to respond to your request, giving us a total of 12 working days to respond to your request.


The information provided in the Monthly Security Tips Newsletters is intended to increase the security awareness of an organization’s end users and to help them behave in a more secure manner within their work environment. While some of the tips may relate to maintaining a home computer, the increased awareness is intended to help improve the organization’s overall information security posture. Organizations have permission–and in fact are encouraged–to brand and redistribute this newsletter in whole for educational, non-commercial purposes.

These tips are brought to you in the Commonwealth of Virginia by the
Virginia Information Technologies Agency
in coordination with: Central State Hospital
Information Sharing and Analysis Center.