Ethics & E-Mail Computer Essentials. R. Stewart Fayetteville High School 2008- 2009 Ethics A set of principles of right conduct A theory or a system of.

Slides:



Advertisements
Similar presentations
Hart District Acceptable Use Policy Acceptable Use Policy.
Advertisements

University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Michael Gowers LLB(Hons) BA(Hons) PGCE TDLB
M. Guymon Pleasant Grove High School Spring 2003 Ethics & Computer Technology Day 18.
Computer Technology Day 18
C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 10 Privacy Policy © Routledge Richard.
Microsoft Outlook is a tool that includes , calendaring, and tasks.
Uintah School District Acceptable Use for Computer and Network Access.
Hectic Ethics Computer Applications Mrs. Wohleb. Objectives Students will be able to: Describe ethical considerations resulting from technological advances.
Security, Privacy, and Ethics Online Computer Crimes.
IST346: Information Ethics. Ethics  Ethics are the principles of conduct that govern a group of people.  Ethics are not morals.  Morals are the proclamation.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
Understanding and Building Basic Networks Chapter 3 The Other Internet.
Legislation Who governs e-commerce?. E-commerce is regulated by laws and guidelines. These aim to ensure that sites operate effectively and that online.
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
Robert Crawford, MBA West Middle School
Have You Read Your Medical Record? Peggy Beck, RHIA, CMT, FAAMT.
INTERNET and CODE OF CONDUCT
Understanding Basics Computer Concepts Unit A.
, & Internet Digital Literacy. A system for sending and receiving messages electronically over computer networks. An account must be opened.
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
WEBPAGE DESIGN Electronic Mail Anatomy of an Message Messages Contain Two Parts: HHeader AAddressing information To From Subject MMessage.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Describe ethical considerations resulting from technological advances.
Ethics & Computer Technology. Ethics are…  A set of principles of right conduct.  A theory or a system of moral values.  The rules or standards.
Electronic Use Policies.   Social Media  Internet.
etiquette Etiquette s always go to any of the following: Staff
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Lindsey Cunningham Education and Technology. What is Digital Citizenship? Digital Citizenship is the principle of teaching appropriate and responsible.
Technology in the Bellingham School District. Bellingham School District Network §Connectivity §Communication §Research Practice Responsible Use.
Computer-Assisted Communication
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Jeopardy Computer Internet Policy & Legal Potpourri Q $100 Q $200 Q $300 Q $400 Q $500 Q $100 Q $200 Q $300 Q $400 Q $500 Final Jeopardy.
Digital Citizenship Created By: Kelli Stinson June 2011.
ELECTRONIC COMMUNICATIONS Standard Grade Computing ELECTRONIC COMMUNICATIONS CHAPTER 10.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Microsoft Office Illustrated Introductory, Second Edition Started with Outlook 2003 Getting.
Microsoft Office XP Illustrated Introductory, Enhanced Started with Outlook 2002 Getting.
Unit Essential Question: How does ethical behavior affect how and why I do things on the computer?
Digital Citizenship Laura Locke ED 505. Netiquette on Social Media Sites  Netiquette is simply defined as “network etiquette.
D. Beecroft Fremont High School Networks.
Etiquette UNT in partnership with TEA. Copyright©. All rights reserved.
R. Stewart Fayetteville High School Ethics & Computer Technology Day 18.
Information Technology & Ethics. Impact The impact of IT on information and communication can be categorized into 4 groups: privacy, accuracy, property,
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
Objective 4.01: Compose effective correspondence.
Computer Technology Timpview High School
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Table of Contents. Lessons 1. Introduction to HIPAA Go Go 2. The Privacy Rule Go Go.
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
INTERNET SAFETY, NETIQUETTE, AND COPYRIGHT LAWS By Alex Pagliaro.
What is HIPAA? Health Insurance Portability and Accountability Act of HIPAA is a major law primarily concentrating on the prolongation of health.
HIPAA Privacy What Every Staff Member Needs to Know.
Social Ethical and Legal Issues Web Design. 3.4 Social, Ethical, and Legal Issues Focus on Reading Main Ideas Ethical, social, and legal guidelines govern.
Computer Technology Internet, ethics, and . EthicsInternetMisc.Internet
When one person sends an electronic message to another person or to a group of people.
Ethical dilemmas arising from information management strategies used by organisations Ethics & Information Systems.
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
Digital Citizenship By: John Beverly.
Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School
DIGITAL BUSINESS APPLICATIONS
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web Lecture 4 This material was developed by Oregon.
BCT 2.00 Analyze Technology Issues
Other Sources of Information
Objective 4.01: Compose effective correspondence
.
Presentation transcript:

Ethics & Computer Essentials

R. Stewart Fayetteville High School Ethics A set of principles of right conduct A theory or a system of moral values The rules or standards governing the conduct of a person or the members of a profession

R. Stewart Fayetteville High School Issues dealing with Ethics Software Licenses Copyrights Citing Internet Information Acceptable Use Policies Rights of Privacy, Accuracy, Property, and Accessibility

R. Stewart Fayetteville High School Software Licenses A legal contract that defines the ways in which you may use a computer program

R. Stewart Fayetteville High School Copyrights A form of legal protection that grants certain exclusive rights to the author of a program or the owner of a copyright Provide severe restrictions on Copying Distribution Reselling

R. Stewart Fayetteville High School Citing Internet Information When using someone else’s information you must give them credit, even if information is obtained from the Internet Internet references should include the following Author’s last name Author’s first name Title of the complete work Version of file number if available Date the document was created Internet address Date you accessed the information (If any information is missing, skip to the next item)

R. Stewart Fayetteville High School Acceptable Use Policies Used to protect a network and the users on that network Guidelines to how a network can and should be used

R. Stewart Fayetteville High School Rights of Privacy, Accuracy, Property, and Accessibility There is an astonishing amount of information stored about you in computer databases This information comes from Banks School Records Medical Records Credit Card Companies Phone Companies Driver’s License Bureau Privacy advocates are encouraging lawmakers to restrict the sale and distribution of information about individuals Started in April 2003, doctors, insurance companies and other health groups have to have a patient’s consent before medical information can be disclosed

R. Stewart Fayetteville High School Privacy Issues Do you think that data about you should be distributed without your permission? Why or why not? What are some situations that you know of where your personal information was shared? Catalogs you didn’t request Credit Card Applications sent to your home advertisements you receive

R. Stewart Fayetteville High School When one person sends an electronic message to another person or to a group of people Important terms Account – provides the rights to a storage area or mailbox Address – the person to whom a message is sent Attachment – any file that travels with a message Netiquette – customs or guidelines for maintaining civilized communication

R. Stewart Fayetteville High School Guidelines for Good Do not type everything in all capital letters Be concise so your messages will be read and not just discarded Use short paragraphs for easier reading on a monitor Leave a blank line between paragraphs for easier reading on a monitor Proofread and spell-check your before sending Provide a meaningful subject line that introduces your message Do not send messages out of anger because you can’t retract the message once it is sent

R. Stewart Fayetteville High School Resources Brown, Gordon W., and Paul A. Sukys. Understanding Personal & Business Law. Misson Hills: Glencoe/McGraw-Hill, Mulbery, Keith. " etiquette requires concise communication." The Daily Herald 17 August 1997: E3. Parsons, June Jamrich, and Dan Oja. Computer Concepts. Boston: Course Technology - Thompson Learning, 2002.