Cyber Ethics

Req 2b — Ethical Behavior

2b.
Discuss with your counselor examples of ethical and unethical behavior in cyberspace. Include how to act responsibly when you encounter situations such as: coming across an unattended or unlocked computer or mobile device; observing someone type their password or seeing it written down near a computer; or discovering a website that is not properly secured. Explain why these situations require good judgement, and how the Scout Law and personal values should guide your actions.

You find an unlocked phone on a library table. The owner stepped away for a moment. You could scroll through their messages, peek at their photos, or post something from their account as a “joke.” Nobody would know. What do you do?

This is the core of cyber ethics — doing the right thing when technology makes the wrong thing easy and anonymous.

The Ethics Spectrum

Not every online action is clearly “right” or “wrong.” Some fall into gray areas that require real judgment. Here is a framework:

Clearly ethical:

Gray area:

Clearly unethical:

The Three Scenarios

The requirement specifically asks about three situations. Let’s examine each one.

Scenario 1: An Unattended or Unlocked Device

You sit down at a library computer and the previous user is still logged into their email. Or you find a phone on a park bench with no lock screen.

The key principle: access does not equal permission. Just because you can look at someone’s data does not mean you should.

Scenario 2: Seeing Someone’s Password

A classmate types their password in front of you and you catch it. Or you see a sticky note on a monitor with login credentials written on it.

Scenario 3: An Insecure Website

You discover that a website has a security flaw — maybe personal data is visible in the URL, or you can access pages you should not be able to reach.

Why Good Judgment Matters

Technology changes fast, but ethics do not. You will encounter situations that no rule book covers. The Scout Law gives you a framework:

Ethical Issues in Cybersecurity — CompTIA Future of Tech Explore real-world ethical dilemmas in cybersecurity, including privacy, surveillance, and whistleblowing.
Cyber Ethics Decision Guide flowchart with three decision points: Do I have permission, Could this harm someone, Would I do this if someone were watching