A Freshman Seminar Workshop

Slides:



Advertisements
Similar presentations
Internet and Network Safety YKSD Policies. YKSD Board Policies 10 Pages of YKSD Board Policies exist for your protection. They are available from your.
Advertisements

Privacy & Other Issues. Acceptable Use Policies When you sign up for an account at school or from an Internet Service Provider, you agree to their rules.
Developed by Technology Services 1:1 Laptop Initiative
Are you being a safe and successful digital citizen? E-safety
Bring Your Own Device This is a boring PowerPoint, but an exciting new opportunity!
Internet etiquette, or netiquette guides us in proper behavior on the Internet. There are widely accepted rules of behavior to follow when you're online.
Internet Safety James Fuller Internet Rules To Remember When asked by friends or strangers, online or offline, never share Account IDs and Passwords.
Washburn High School Student “Responsible Use” Guidelines for Electronic Technologies.
A Freshman Seminar Workshop Developed by Computer and Telecommunication Services A Freshman Seminar Workshop Developed by Computer and Telecommunication.
VISD Acceptable Use Policy
Digital Citizenship Presentation Mr. E. Colston Note to Portfolio Reviewers: The following material is not my own creation, though it has been modified.
INTERNET SAFETY FOR STUDENTS
Internet Ethics. Internet Ethics Cyberspace Cyberspace is like a big city. There are libraries, universities, museums, places to have fun, and plenty.
Electronic Use Policies.   Social Media  Internet.
RULES FOR ONLINE SAFETY BY KYLE K AND JASON. CHECK WITH YOUR PARENTS FIRST ! Don’t ever agree to get together with someone you meet online without checking.
Lisa Jolynn Elrod I NTERNET S AFETY MICROSOFT CLIPART.
Internet Driver’s License è Training è Test è Signed Internet Use Agreement.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Computer-Assisted Communication
Digital Citizenship Created By: Kelli Stinson June 2011.
Acceptable Use Policy.  The District system includes:  A network of computers that serves all the schools  Saved files on a server for student work.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
Riding the Internet Highway Internet Safety Rules.
Online Safety 6th grade. Rules to know Protect your privacy Protect your password Protect the privacy of others Beware of contests, clubs, prizes, & gifts.
PROGRAMMING JAVA Mrs. Taylor Top Ten Best Careers for College Students Mind2it.com 1. Software Engineer 1. Software Engineer 5. Computer Systems.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
TECHNOLOGY USE AGREEMENT FOR STUDENTS GRADES 3-8 This presentation was created to help students understand the district’s Technology Use Agreement before.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Kyleigh LESLIE. I will never give out my personal information like my phone number, location, and my school.
A Discussion of Student Responsibility and the Upper Merion Area School District’s Acceptable Use Policy.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
ALABAMA TECHNOLGY STANDARDS FOR TEACHERS Ethical Issues of Technology Presented by: Shirley Johnson & Keisha D. Smith.
A CCEPTABLE U SE P OLICY Adrienne Ochs EDU D EFINITION Set of rules enforced by one who runs a network, website or a large computer system that.
School Accounts Presented by: Mrs. Mazzola.
Kids’ Online Safety Rules. 1. I will not give out personal information such as my address, telephone number, parents’ work address/telephone number without.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Marion County Public Schools Acceptable Use Guidelines for Network Access.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Inbox Sent Box Subject New Message New Message Delete Password
Internet Safety Is this how to protect children? Justine Sutcliffe.
Internet Etiquette or Netiquette
Frequently asked questions
Safer Internet Day.
Digital Citizenship Grades 4-6
Using the Computer Responsibly
Learn how to protect yourself against common attacks
Online safety Use your CyberSense!.
Student Monmouth College
Freedom Independence Transition
Technology Guidelines for Students
A POWERPOINT MADE TO KEEP YOU SAFE ONLINE!
Appropriate Use of Technology
How many of these apps do you really know?
Internet Safety and Acceptable Use Policies.
Year 7 ICT Introduction By the end of this lesson you will be able to explain/define the following: Who your teacher is What are the classroom expectations.
2009 Proprietary and Confidential
Welcome to the Computer Lab.
Technology Guidelines for Students
Cyber Bullying Nicole Massafaro.
Top Ten Things You Know But Don’t Remember!.
Student User Agreement and Policy 2022
STAYING SAFE WITH TECHNOLOLGY View the following presentation and try to click on the correct answers of the slides with questions.
Uppingham Community College
NVOC Single Sign-On (SSO) for Students!
Scribner Road Internet Safety Rules
The Technology Policies We Need Now and Why
Kyrene Student Acceptable Use Policy Technology Guidelines
Presentation transcript:

Getting Along on the ’Net Rules of the Road on the Information Superhighway A Freshman Seminar Workshop Developed by Computer and Telecommunication Services

Driver’s Training Manual Test your driving skills Study session What’s your score? Questions

Acceptable Use Standards Appropriate use of facilities Appropriate use of accounts Appropriate use of accessible materials Reliability and integrity of facilities Rules and regulations Proprietary rights Privacy System safeguards

Campus Conduct Code Standard #2 College records Standard #3 Disruptive behavior Standard #7 Harassment Standard #11 Inappropriate behavior Standard #12 Unauthorized use Standard #14 Unauthorized entry Standard #17 Violations of college policy or state law

State and Federal Law NJ Title 2A:38A-3 - Damage to electronic resources NJ Title 2C:20-8 - Theft of service USC Title 18, Section 2252 - Distribution of pornography to minors USC Title 18, Section 1302 – Scams and pyramid schemes USC title 18, Section 1030 – Theft of service and damage to electronic resources USC Title 17 – Copyrights

Common Sense Human beings use computers E-mail is not necessarily confidential You are not the center of the universe You are what you write When in doubt, assume the best Avoid flame wars Respect the opinions of others

Local Customs Read and keep welcome messages Lurk before you leap Stay on point Share the floor Summarize discussions

#1 False Appropriate use of computer accounts My roommate isn’t using his/her account and I need to get some work done for class. I can’t remember my password so it’s okay to use that account until I can my get my password reset. False Appropriate use of computer accounts

#2 False Appropriate use of computer accounts I get free Internet access at Stockton. My parents pay for my tuition so they’re entitled to use my computer account to access the Internet. False Appropriate use of computer accounts

#3 False Appropriate use of computing facilities My computer is connected to the campus network. I’m really great at web page design. I do all my work on my own computer and all my files are on my computer so it’s okay for me to run my business from Stockton. False Appropriate use of computing facilities

#4 False Reliability and Integrity of Computing Facilities There’s this really cute guy/girl in my English class who won’t go out with me. I’ve sent him/her five e-mail messages without a response. It won’t hurt to send just one more. #4 False Reliability and Integrity of Computing Facilities

#5 False Proprietary Rights I have my own computer, but I can’t afford to buy all the software used in my classes. I only use it for class, so I should be free to copy software from the lab computers. False Proprietary Rights EXIT

#6 False Appropriate use of computer accounts Stockton has some really exciting activities on campus. I want to let everyone know what my club is doing. It’s okay to send an e-mail announcement to every student. False Appropriate use of computer accounts

#7 False Reliability and Integrity of Computing Facilities Many computer systems have weaknesses that can be exploited. It is up to the computer owner to be sure his/her computer is safe. If I can break into a computer, any damage is the owner’s responsibility not mine. False Reliability and Integrity of Computing Facilities

#8 False Appropriate use of computer accounts I received e-mail about a very important social issue that has legislation pending in Congress. The sender asked me to “sign” the bottom and send it along to 10 other people. It’s all right to do this. False Appropriate use of computer accounts

#9 False Reliability and Integrity of Computing Facilities For a joke, I changed the mail address on Netscape and subscribed my roommate to this really weird mailing Now s/he gets a hundred mail messages a day. S/he just deletes the messages so it’s not hurting anything. False Reliability and Integrity of Computing Facilities

#10 False Appropriate use of accessible materials The college network can access any site on the Internet. This means that I am free to use the computers in the campus labs to visit any site, even if someone else is upset by the images displayed on the screen. False Appropriate use of accessible materials

Questions ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ?