Seek Truth and
Teachers and students should be honest, fair, and
courageous in gathering, interpreting and expressing information for the
benefit of others. They should:
the accuracy of information from all sources and exercise care to avoid
identify sources. The consumers of your information product must be able
to make their own judgment of its value.
question the sourcesí motives.
distort or misrepresent the content of photos, videos, or other media
without explanation of intent and permission from the informationís owner.
Image enhancement for technical clarity is permissible.
the story of the human experience boldly, even when it is unpopular to do
your own cultural values and avoid imposing those values on others.
stereotyping by race, gender, age, religion, ethnicity, geography, sexual
orientation, disability, physical appearance or social status.
voice to the voiceless; official and unofficial sources of information can
be equally valid.
between opinion and fact when expressing ideas. Analysis and commentary
should be labeled and not misrepresent fact or context.
Ethical teachers and students treat information sources, subjects,
colleagues, and information consumers as human beings deserving of respect.
and expressing information should never cause harm or threaten to be
harmful to any one person or group of people.
that private people in their private pursuits have a greater right to
control information about themselves than do others.
all possible outcomes to the information you express, guarding against
potential harm to others.
- Never use
information from another person without proper citation and permission.
Teachers and students are accountable to their readers, listeners,
viewers and to each other.
and explain information and invite dialogue about your conduct as a
the information consumer to voice grievances about your information
mistakes and correct them promptly.
unethical information practices of others.
Information and its Infrastructure
Information, in the Information
Age, is property. Information is the fabric that defines much of what we do
from day to day, and this rich and potent fabric is fragile.
undertake any action that has the potential to damage any part of this
information infrastructure. These actions include, but are not limited to
illegally hacking into a computer system, launching or distributing
viruses or other damaging software, physically damaging or altering
hardware or software, or publishing information that you know is untrue
and potentially harmful.
to proper authorities any activities that could potentially result in harm
to the information infrastructure.
By David Warlick, (http://davidwarlick.com/)