<P> The commandments have been widely quoted in computer ethics literature but also have been criticized by both the hacker community and some in academia . For instance, Dr. Ben Fairweather of the "Centre for Computing and Social Responsibility" has described them as "simplistic" and overly restrictive . </P> <P> The CISSP--an organization of computer security professionals--has used the commandments as a foundation for its own ethics rules . </P> <Ol> <Li> Thou shalt not use a computer to harm other people . </Li> <Li> Thou shalt not interfere with other people's computer work . </Li> <Li> Thou shalt not snoop around in other people's computer files . </Li> <Li> Thou shalt not use a computer to steal . </Li> <Li> Thou shalt not use a computer to bear false witness . </Li> <Li> Thou shalt not copy or use proprietary software for which you have not paid (without permission). </Li> <Li> Thou shalt not use other people's computer resources without authorization or proper compensation . </Li> <Li> Thou shalt not appropriate other people's intellectual output . </Li> <Li> Thou shalt think about the social consequences of the program you are writing or the system you are designing . </Li> <Li> Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans . </Li> </Ol> <Li> Thou shalt not use a computer to harm other people . </Li>

What are the ten commandments of computer use
find me the text answering this question