Technology ethics: ◦it is the ethics related to the users of technology, which govern their actions and behaviors towards it, and includes a set of rules and laws that individuals adhere to, and upon which their decisions and actions are based when using this technology. ◦Ethics between the individual using the technology and himself, ◦Ethics between the users each others ◦Ethics between the user and the physical components of the technology ethics of using technology between a person and himself ◦Respect oneself and not expose oneself to dangers that affect the user. ◦Respecting the principles, values, customs and traditions of our society. ◦Avoid entering suspicious, harmful websites, and stick to websites that are appropriate for the age group and meet goals and needs. ◦Respect oneself and not expose oneself to dangers that affect the user. ◦Respecting the principles, values, customs and traditions of our society. ◦Avoid entering suspicious, harmful websites, and stick to websites that are appropriate for the age group and meet goals and needs The ethics of using technology between a person and others ◦ Technology users should identify themselves clearly and frankly, as concealing their identity or impersonating others is unethical. ◦ Respect others, respect their ideas, do not ridicule them, and avoid offending them when communicating with them via various information technology means. ◦ Accuracy and brevity when presenting ideas and communicating with others. ◦ Observe copyright and intellectual property rights for any data or information. The ethics of using technology between a person and others ◦ Avoid violating the privacy of others or violating their right to keep their secrets. ◦ Deal honestly with electronic documents that arrive by mistake via e-mail, return them immediately to their sender, and not exploit them in a bad way. ◦ Avoid harming others by sending malware that damages their devices. ◦ Avoid criticizing the teachings of all religions, and avoid insulting religious symbols, bodies, or peoples. ◦ Avoid publishing any content that puts people’s security, health, or safety at risk, or any content that is inappropriate, immoral, or offensive to people with physical or mental disabilities Ethics of interaction between the user and the technology itself (the device): ◦ Avoid using a communications method that is not licensed locally to capture the network, such as direct capture from satellites or others. ◦ Avoid destroying, changing, or erasing any data or information unlawfully or using it illegally ◦ Avoid collecting any materials or information that affect public morals and ethics or conflict with society’s doctrine and values. ◦ Avoid stealing or exploiting other people’s service codes. ◦ Avoid hacking into systems for the purpose of stealing data, information, money, or any illegal act.