Ethics & E-Mail Computer Technology. Ethics are…  A set of principles of right conduct.  A theory or a system of moral values.  The rules or standards.

Slides:



Advertisements
Similar presentations
Hart District Acceptable Use Policy Acceptable Use Policy.
Advertisements

1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
M. Guymon Pleasant Grove High School Spring 2003 Ethics & Computer Technology Day 18.
Computer Technology Day 18
Microsoft Outlook is a tool that includes , calendaring, and tasks.
Uintah School District Acceptable Use for Computer and Network Access.
Hectic Ethics Computer Applications Mrs. Wohleb. Objectives Students will be able to: Describe ethical considerations resulting from technological advances.
Security, Privacy, and Ethics Online Computer Crimes.
Understanding and Building Basic Networks Chapter 3 The Other Internet.
Legislation Who governs e-commerce?. E-commerce is regulated by laws and guidelines. These aim to ensure that sites operate effectively and that online.
Robert Crawford, MBA West Middle School
INTERNET and CODE OF CONDUCT
Introduction This power point presentation will give and explain the varies types of digital citizenship. It is always important to know what you are.
Understanding Basics Computer Concepts Unit A.
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
, & Internet Digital Literacy. A system for sending and receiving messages electronically over computer networks. An account must be opened.
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
Internet Ethics. Internet Ethics Cyberspace Cyberspace is like a big city. There are libraries, universities, museums, places to have fun, and plenty.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Ethics & Computer Essentials. R. Stewart Fayetteville High School Ethics A set of principles of right conduct A theory or a system of.
Electronic Use Policies.   Social Media  Internet.
Ethics And Computers. What are Ethics? Ethics Ethics are: Principles that guide behavior OR the rules of right and wrong behavior that you should follow.
Internet and Computer Rules If you want to use the computers you need to follow the rules.
Welcome to Causey Computer Lab! Computer Applications Mrs. Clements.
Computer Ethics for Computer Users
Employee Guidelines for Acceptable Use of Technology Resources.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
COMPUTER ETHICS Do you know the difference between right and wrong?
Lindsey Cunningham Education and Technology. What is Digital Citizenship? Digital Citizenship is the principle of teaching appropriate and responsible.
Technology in the Bellingham School District. Bellingham School District Network §Connectivity §Communication §Research Practice Responsible Use.
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Jeopardy Computer Internet Policy & Legal Potpourri Q $100 Q $200 Q $300 Q $400 Q $500 Q $100 Q $200 Q $300 Q $400 Q $500 Final Jeopardy.
Welcome to Ms. Dickson’s Business Class.
Digital Citizenship Created By: Kelli Stinson June 2011.
Digital Citizenship Project By Allen Naylor Ed 505.
Slide 3-1 Chapter 3 Terms Electronic Commerce and Internet Technologies Introduction to Information Systems Judith C. Simon.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
ELECTRONIC COMMUNICATIONS Standard Grade Computing ELECTRONIC COMMUNICATIONS CHAPTER 10.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Microsoft Office Illustrated Introductory, Second Edition Started with Outlook 2003 Getting.
Microsoft Office XP Illustrated Introductory, Enhanced Started with Outlook 2002 Getting.
Digital Citizen Project Xiomara Hernandez. Topics Defined Netiquette on Social Media Sites Copyright and Fair Use Plagiarism Safety on the Internet Safety.
Digital Citizenship Laura Locke ED 505. Netiquette on Social Media Sites  Netiquette is simply defined as “network etiquette.
And more……. ‘Leadership and communication are inseparable. You can’t have one without the other.’ ---Claude I. Taylor.
D. Beecroft Fremont High School Networks.
Etiquette UNT in partnership with TEA. Copyright©. All rights reserved.
Ethical Internet Use TECH 503 By A. Greenwell. Ethics in the Virtual World We all grow up learning the rules, regulations, and laws of the real world.
 Carla Bates Technology and Education ED 505.  Social Media Sites are interactive webpages, blogs, and other user created sites that all others to create,
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
R. Stewart Fayetteville High School Ethics & Computer Technology Day 18.
Digital Citizenship By: William Rickman Digital Citizenship is the knowledge for children and other computer users to know how to appropriately use the.
Information Technology & Ethics. Impact The impact of IT on information and communication can be categorized into 4 groups: privacy, accuracy, property,
LAUSD Responsible Use Policy (RUP) BUL – Attachment A.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Computer Technology Timpview High School
Ethics Computer Literacy. Ethics Definition “the principles of conduct governing an individual or a group” —(Merriam Webster Collegiate Dictionary, 2001)
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
INTERNET SAFETY, NETIQUETTE, AND COPYRIGHT LAWS By Alex Pagliaro.
HIPAA Privacy What Every Staff Member Needs to Know.
Social Ethical and Legal Issues Web Design. 3.4 Social, Ethical, and Legal Issues Focus on Reading Main Ideas Ethical, social, and legal guidelines govern.
Computer Technology Internet, ethics, and . EthicsInternetMisc.Internet
When one person sends an electronic message to another person or to a group of people.
Welcome to Challenger Computer Lab.
Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web Lecture 4 This material was developed by Oregon.
BCT 2.00 Analyze Technology Issues
Other Sources of Information
.
Student User Agreement and Policy 2022
Presentation transcript:

Ethics & Computer Technology

Ethics are…  A set of principles of right conduct.  A theory or a system of moral values.  The rules or standards governing the conduct of a person or the members of a profession.

Ethics: Situation 1  You are hired to manage the network at a local business. On your first day of work, your boss hands you the latest upgrade for Microsoft Office and asks you to install it on all the computers in the business. When you ask if the business has a site license, your boss says “No, do you have a problem with that?”  What should you do?

Ethics: Situation 2  You are hired as programmer for a local school district. The Superintendent asks you to write software that will monitor online access and report online activities to the Superintendent. No permission has been given for this access to be monitored and the Superintendent feels that if people don’t know they are being monitored it won’t hurt them.  Should you write the program?

Ethics Apply To…  Software Licenses  Copyrights  Citing Internet Information  Acceptable Use Policies  Rights of Privacy, Accuracy, Property, and Accessibility

Software Licenses  A legal contract that defines the ways in which you may use a computer program.

Copyrights  A form of legal protection that grants certain exclusive rights to the author of a program or the owner of a copyright.  Provide severe restrictions on… Copying Distribution Reselling

Citing Internet Information  When you use someone else’s information you must give them credit, even if information is obtained from the Internet.  Internet references should include the following Author’s last name Author’s first name Title of the complete work Version of file number if available Date the document was created Internet address Date you accessed the information (If any information is missing, skip to the next item)

Acceptable Use Policies  Protects a network and the users on that network.  Guidelines on what users may do when they access a network.

Rights of Privacy, Accuracy, Property, and Accessibility  There is a large amount of information stored about you in computer databases.  This information comes from Banks School Records Medical Records Credit Card Companies Phone Companies Driver’s License Bureau  Privacy advocates are encouraging lawmakers to restrict the sale and distribution of information about individuals.  Started in April 2003, doctors, insurance companies and other health groups have to have a patient’s consent before medical information can be disclosed.

Privacy Issues  Do you think that data about you should be distributed without your permission? Why or why not?  Do you know of any situations where your personal information was shared? Catalogs you didn’t request. Credit Card Applications sent to your home. advertisements you receive.

 When one person sends an electronic message to another person or to a group of people.  Important terms Account – provides the rights to a storage area or mailbox. Address – the person to whom a message is sent. Attachment – any file that travels with a message. Netiquette – customs or guidelines for maintaining civilized communication.

Guidelines for Good  Do not type everything in all capital letters.  Be concise so your messages will be read and not just discarded.  Use short paragraphs for easier reading on a monitor.  Leave a blank line between paragraphs for easier reading on a monitor.  Proofread and spell-check your before sending.  Provide a meaningful subject line that introduces your message.  Do not send messages out of anger because you can’t retract the message once it is sent.

Resources Brown, Gordon W., and Paul A. Sukys. Understanding Personal & Business Law. Misson Hills: Glencoe/McGraw-Hill, Mulbery, Keith. " etiquette requires concise communication." The Daily Herald 17 August 1997: E3. Parsons, June Jamrich, and Dan Oja. Computer Concepts. Boston: Course Technology - Thompson Learning, 2002.