Using the computer appropriately.

Slides:



Advertisements
Similar presentations
EthicsEthics, Rules, and LawsRulesLaws Using the computer appropriately.
Advertisements

Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
MADISON COUNTY SCHOOLS ACCEPTABLE USE AND INTERNET SAFETY POLICY.
Ethics and Online Issues
Using the computer appropriately.
Introduction to Information Literacy 1 M06: Economic, Legal, and Social Issues for Use of Information See also: Chapter 7, Riedling.
Hectic Ethics Computer Applications Mrs. Wohleb. Objectives Students will be able to: Describe ethical considerations resulting from technological advances.
Social and Ethical Issues Piracy & Copyright. Piracy.
Ethics and Online Issues
Computers Are Your Future Twelfth Edition Spotlight 1: Ethics Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
Intellectual Property
EthicsEthics, Rules, and LawsRulesLaws Using the computer appropriat ely.
C©PYRIGHT & FAIR USE.
Canadian Copyright Act Became law in January 1924 and was amended in 1988 (Phase I) The second phase amendments were completed in 1997 when Bill C-32.
EthicsEthics, Rules, and LawsRulesLaws Using the computer appropriately.
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
Ethics And Computers. What are Ethics? Ethics Ethics are: Principles that guide behavior OR the rules of right and wrong behavior that you should follow.
Computer Ethics for Computer Users
Computer Ethics, Privacy and Security. Computer Ethics Computers are involved to some extent in almost every aspect of our lives They often perform life-critical.
COMPUTER ETHICS. What is Computer Ethics? Ethics is a set of moral principles that govern the behavior of a group or individual. computer ethics is set.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
PREPARED BY: YOUR FIRST AND LAST NAME CURRENT DATE Ethics for Computer Use.
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Copyright Juan Romero The University of Texas at Brownsville EDTC 6340 Summer II.
COMPUTER ETHICS Computer ethics is the study of standards of right and wrong.
Ethics and Computer Invaders. What are ‘Ethics’? Personal code of conduct accepted by society Using technology appropriately.
For Computer Use in Business
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Ethics and Computers. Ethics Ethics are principles that guide behavior Community or Society Professional or School setting Individual Standards.
PlagiarismPlagiarism Christine G. Balmes Cristian S. Mendoza Maika E. Laguartilla.
Unit Word Processing Exploring Ethics  Why copyrights are necessary  How to use technology ethically and legally  How to cite online sources You Will.
Court Systems and Practices. Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission. 2.
1.The Nature, Impact, and Issue of Information Technology 1.5Basic Legal Framework relating to the Use of IT.
Principles of LPSCS. Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission. Copyright.
Using Computers: Legal and Ethical Issues Objectives and Guidelines We Must Follow.
Well, sir, from the sounds of it, you've got yourself some pirated software. I'm afraid there's nothing we can do to help you.`
EthicsEthics, Rules, and LawsRulesLaws Using the computer appropriately.
Ethics...as related to computer technology. Ethics Definition “the principles of conduct governing an individual or a group” —(Merriam Webster Collegiate.
Computer Ethics Computer Technology 1 By Jill Einerson.
Computer Technology Timpview High School
Computer Technology RULES, LAWS, ETHICS By Megan Rees.
Ethics Self Imposed Right and Wrong Behavior Described as:
Computer Ethics. Ethics Notes Ethics: standards of honesty, morality, and fairnessEthics: standards of honesty, morality, and fairness Public Data: information.
Ethics Computer Literacy. Ethics Definition “the principles of conduct governing an individual or a group” —(Merriam Webster Collegiate Dictionary, 2001)
Writing an Internet Policy for Your School Kathie Carwile Morgan, ED.D. Liberty University ACSI Washington DC Educator Convention Nov. 22 & 23, 2010 Crystal.
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
Ethical Issues. Introduction to Copyright, Plagiarism Get out your note sheet.
Social Ethical and Legal Issues Web Design. 3.4 Social, Ethical, and Legal Issues Focus on Reading Main Ideas Ethical, social, and legal guidelines govern.
ETHICS. Best Song Ever DID THEY BREAK THE LAW?  James Blunt  Black Eyed Peas  Alphaville  Jason Mraz  Train  The Calling  Elton John  Akon 
Computer Software Heather Allen. Software Copyright Laws It is illegal for anyone to violate any of the rights provided by the copyright law to the owner.
What is it and why should I care?. Copyright Basic Copyright InternetMultimedia Fair Use.
Plagiarism, Fair Use and Copyright Laws
Computer Safety and Ethics
Computers Are Your Future Twelfth Edition
Using the computer appropriately
Ethical and Legal Issues
Ethical Issues When Using Computers
Using the computer appropriately.
Investigating the correct and legal way to use software
Ethical Issues When Using Computers
Copyright.
Lesson 2- Ethical Use of Digital Resources
BCT 2.00 Analyze Technology Issues
Ethics and Online Issues
Copyright, Designs and Patents Act 1988
Ethics Computer Technology.
Using the computer appropriately.
Lesson 2- Ethical Use of Digital Resources Edit all slides as needed.
Kyrene Student Acceptable Use Policy Technology Guidelines
Presentation transcript:

Using the computer appropriately. Ethics, Rules, and Laws Using the computer appropriately.

What are ethics Standards of right and wrong behavior A gauge of personal integrity The basis of trust and cooperation in relationships with others

What are ethics not? Laws that carry a criminal penalty Detailed instructions for every possible situation Flexible and changing depending on each unique person or situation

Where do ethics come from? Values of a society Values of a school, business, or organization Values from family and heritage Values of an individual

An ethical person . . . Has an inner sense of what is moral and

is able to choose correct behavior in many different situations, including those that are new and different.

What follows an unethical choice? Lost opportunities Destruction of trust Damage to people and things And . . . ?

What are rules Specific guidelines about appropriate use of computers as outlined in . . . Acceptable Use Policies (AUPs) Professional Codes of Ethics Classroom Disclosures

with . . . consequences and punishments issued by the computer owners if rules are violated.

What are laws Regulations passed by state and federal bodies that protect against some forms of misuse of computers and information resources.

So what if I break the law? You may not be discovered, this time, but next time . . . A serial number may be traced A help line may become suspicious An acquaintance may report you A web address may record your visits And more . . .

And just like that, you’re a criminal . . . with a record and maybe a fine and maybe even a jail sentence when you’re convicted of breaking the law.

Copyright laws. Software developers own their programs. Software buyers only own the right to use the software according to the license agreement. No copying, reselling, lending, renting, leasing, or distributing is legal without the software owner’s permission.

Software licenses: Four types Public Domain Freeware Shareware All Rights Reserved

Public Domain License This software has no owner and is not protected by copyright law. It was either created with public funds, or the ownership was forfeited by the creator. Rare Unreliable Poor quality Virus-laden No cost? That may be exactly how much this software is worth.

Freeware License Freeware is copyrighted software that is licensed to be copied and distributed without charge. Freeware is free because the license says it is, but it’s still under the owner’s control. Some freeware is “really good stuff.” Pegasus Mail Eudora Light Netscape Internet Explorer

Shareware License Some shareware trials expire on a certain date The software is licensed for copying and sharing for a trial period, but payment must be made to the owner for permanent use. Some shareware trials expire on a certain date Payment depends on the honor system Purchasing (the right to use) the software may also get you a version with more powerful features and published documentation.

All Rights Reserved License May be used by the purchaser according the exact details spelled out in the license agreement. You can’t legally use it--or even possess it-- without the owner’s permission.

Software License Agreement Excerpts from QuarkXPress software license agreement The software and accompanying documentation may not be transmitted electronically, including over the Internet, rented, loaned, leased, sold, distributed, made available, directly or indirectly, for USE by any other person or entity not covered by this License Agreement. Customers who have purchased a Single-User license may INSTALL and USE the SOFTWARE on one computer. IF YOU DO NOT ACCEPT THIS LICENSE AGREEMENT, DO NOT OPEN THE ENCLOSED PACKET OR BREAK THE SEAL ON THE CD-ROM The only right granted to the Customer is the right to USE the SOFTWARE and accompanying documentation in accordance with this License Agreement. The customer may not modify, translate, copy, reproduce, reverse engineer, disassemble, decompile, or otherwise derive source code from, the SOFTWARE or accompanying documentation, or use it as a basis for the preparation of other software programs

Even if you can. Even if no one will ever find out. Follow the license agreement or you will be breaking the law.

Software piracy. Conviction of a first offense can result in a fine of up to 250,000. and a jail sentence of up to five years. (Bowyer, 1996, 255)

Laws about nuisance or harassment. It doesn’t matter if your intention was to be funny, or friendly, or something else. If the person you contact through the Internet is uncomfortable, Or it’s illegal. STOP!

Laws concerning fraud or plagiarism. Individuals who create “intellectual property” have the right to receive credit Owners of recorded works deserve to be protected from the incorrect use of their creations

Be sure to give credit where credit is due. Cite borrowed material with textual citations and a references slide using an accepted format. Use material in a way that preserves the meaning and context intended by the author

Laws about vandalism. Attempts to harm or destroy data or hardware of another user, agency, or network can be prosecuted to the full extent of the law.

Laws about privacy. Private information cannot be legally used without permission from its owner. Information is owned by the person it describes. Medical records and school grades are protected by privacy laws.

Other categories of personal information have become more public in recent years. Courts have not set a consistent precedent to preserve the privacy of your full name, address, telephone numbers, debts you owe, court judgments against you, courses you’ve taken, and police actions relating to you.

Be ethical. Don’t share personal information without that person’s permission.

Always consider ethics, rules, and laws as you choose how to behave when using computers.

References Bower, Kevin W. Ethics and Computing. IEEE Computer Society Press, 1996. Hilton, Dr. Thomas, et. Al. “Ethics Teaching Module.” http://complit.usu.edu/ethics_modules.html. (23 Oct. 2002)

Questions