Adapted by Melinda Buterbaugh Teacher Librarian.  Be polite when you are sending messages to people.  Treat other people the way you would like to be.

Slides:



Advertisements
Similar presentations
Internet and Network Safety YKSD Policies. YKSD Board Policies 10 Pages of YKSD Board Policies exist for your protection. They are available from your.
Advertisements

Janis Gatewood EDU689 January 27, Faculty and Staff COMPUTER CRIME ACT Section of the Code of Laws of S.C. states that: 1. It is unlawful.
Ethical Use of Others’ Works If you use someone’s research or work for information, you must give them credit for the information. If you use someone else’s.
Let’s Talk about Intellectual Property
Ebinport Students Encourage Internet Safety. “Doing the Right thing online.” January 2012.
Whose Is It Anyway? What is Plagiarism?. When you create a project for class, how do you let people know that it’s yours? Write your name on it. by Ruth.
Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
SO WHAT DOES THE AUP MEAN FOR ME…??? A Presentation for Students in Grades 3-5.
When you or someone else uses a computer or cell phone to cause harm or distress to other kids, this is called.
INTERNET SAFETY.
INTERNET SAFETY FOR STUDENTS
With great power…comes great responsibility
Ten Commandments of Cyber Ethics. I. Thou shalt not use a computer to harm people Be polite when you are sending messages to people. Treat other people.
1 Presented by Ahmad Bahaitham Mohammad Felemban.
JCSD-aw Citizenship in an e-World Johnston Community School District.
Using internet and cell phones safely
COMPUTER ETHICS What does it mean to be “ethical” on the computer?
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
Digital Citizenship Presentation Mr. E. Colston Note to Portfolio Reviewers: The following material is not my own creation, though it has been modified.
Internet Etiquette or Netiquette BY: Jennifer Rudd Nov
What Is Computer Ethics?
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
INTERNET SAFETY FOR STUDENTS
Internet Safety Guidelines
Possible WebQuest type links  
Describe ethical considerations resulting from technological advances.
Digital Citizenship By Bhavna. Plagiarism Plagiarism is illegal and can get you arrested. If a teacher finds out you used plagiarism he/she can fail you.
Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage.
Computer Ethics.
STOP BULLYING NOW! KayeDee Smith and Kassidy Osbourne.
Surfing the Internet Teaching Children about the SMARTS of using the Internet Are you being responsible when you use the Internet??? B E SMART! B E RESPONSIBLE!
COMPUTER ETHICS. What is Computer Ethics? Ethics is a set of moral principles that govern the behavior of a group or individual. computer ethics is set.
COMPUTER ETHICS Do you know the difference between right and wrong?
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
DIGITAL CITIZENSHIP BY MAYSAA Stage 2 WHAT IS DIGITAL CITIZENSHIP? 0 Digital Citizenship is safely connecting with groups on the internet. 0 It involves.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
6 th Grade. a. Identify Internet safety and security concerns (Cyber Predators, etc) b. Discuss illegal aspects of software piracy, hacking, and computer.
Digital Citizenship Project By Lacy Brown. Netiquette Netiquette is etiquette for the internet. Netiquette is etiquette for the internet. You should be.
The Computer Labs are a valuable tool for learning at Prattville High School While in the labs, students will Follow appropriate code of conduct. Adhere.
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Cyber Bullying By Mrs. Giambri. What is Cyber Bullying? What is Cyber Bullying? ( What is Cyber Bullying? Cyber bullying.
The Ten Commandments of Computer Ethics. The 1st Commandment Thou shalt not use a computer to harm Thou shalt not use a computer to harm other people.
8/16/08Computer Ethics Institute Mae Thomas The Ten Commandments of Computer Ethics by the Computer Ethics Institute.
The Ten Commandments of Computer Ethics Written by the Computer Ethics Institute A project of the Brookings Institution
Computer Ethics CSCI 101 Kara kelly. Ethics Ethics can be defined as a discipline in which one attempts to identify, organize, analyze, and justify human.
Ethics. Ethics are the principles and standards we use to decide how to act.
Ethics Business Law Sunny Hills High School Mrs. Larsen.
Kyleigh LESLIE. I will never give out my personal information like my phone number, location, and my school.
Unit Word Processing Exploring Ethics  Why copyrights are necessary  How to use technology ethically and legally  How to cite online sources You Will.
Computer Ethics. Ten Commandments of Computer Ethics Copyright: Computer Ethics Institute Author: Dr. Ramon C. Barquin.
On-line Safety and Student . I understand there are certain rules I need to follow when I am online.
COPYRIGHT ISSUES IN EDUCATION Presentation by Ben Hilt.
Plagiarism and Copyright Pamela Dear EDU 566 – Summer 2002 Professor Persson Permission Granted for Educational Non-profit Uses.
RESPONSIBLE DIGITAL CITIZENSHIP At the Safety Booth.
Digital Citizenship By: William Rickman Digital Citizenship is the knowledge for children and other computer users to know how to appropriately use the.
Digital Citizenship. What is a Digital Citizen? Digital Citizens are people who use technology often and appropriately. Digital Citizens are people who.
Using Computers: Legal and Ethical Issues Objectives and Guidelines We Must Follow.
LAUSD Responsible Use Policy (RUP) BUL – Attachment A.
Ethics Unit 1. What does ethical mean? Following rules or doing the right thing.
Digital access is the equal chance for every country to be able access digital technology. Every person in the world should be able to have access to.
Cruising Rules Don’t give anyone your personal information! Such as:  Name  Phone number  Address  School Address.
Keeping it safe on the internet
Part 1 WHAT SHOULD HAVE BEEN COVERED DAY ONE Ms. T. N. Jones1.
Internet Etiquette or Netiquette
Internet Etiquette or Netiquette
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Internet Etiquette or Netiquette
Internet Safety Guidelines
Welcome to the Computer Lab.
Elementary Copyright ©
Presentation transcript:

Adapted by Melinda Buterbaugh Teacher Librarian

 Be polite when you are sending messages to people.  Treat other people the way you would like to be treated.  Think before you hit the “send” command. The things you text or could hurt someone.

 If someone forgets to log out, log out for them.  Leave other people’s files alone.  Treat other people the way you would like to be treated.

 Be careful to “log out” of sites you have signed into.  Be a good Cyber Citizen: If someone forgets to log out, log out for them.

 Illegal gambling and fraud are examples of using a computer to steal.  Using your computer as place to store illegal or stolen information is wrong.  Using or texting to plan crimes is wrong.

 “False witness” means telling lies about people.  Be considerate of other people’s feelings. Don’t spread rumors.

 “Software” is a term for computer programs. Software allows you to do things on the computer.  Examples are video games, media players like iTunes, and word processing programs like MS Word.  “Open source” and “shareware” are free and OK to use.

 “Authorization” means permission.  “Computer resources” are people’s hardware (the computer) and software (the programs).  If it’s not yours, ASK first.

 “Intellectual output” can be books, artwork, music, films, magazine articles, video games.  “Appropriate” means copying other people’s work and passing it off as your own. If you do use someone else’s work, cite your source.  My sources for this lesson are cited at the very end of this slide show.

 If you create a computer program that helps others steal or do anything against the law, you have done wrong.  Hacking is wrong. Examples of hacking are shutting down or defacing web sites and creating and sending viruses.

 The computer is a wonderful tool.  There are lots of positive ways to use a computer. Can you think of some?

 “Ten Commandments of Cyber Ethics.” The Cyber Citizen Partnership. 10 Jun ments.html ments.html  “What Is Cyber Crime?” The Cyber Citizen Partnership. 10 Jun