ETHICS. Best Song Ever?! DID THEY BREAK THE LAW?  James Blunt  Black Eyed Peas  Alphaville  Jason Mraz  Train  The Calling  Elton John  Akon.

Slides:



Advertisements
Similar presentations
EthicsEthics, Rules, and LawsRulesLaws Using the computer appropriately.
Advertisements

Using the computer appropriately.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
The First Amendment, Free Expression, Copyrights and Fair Use…
Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Copyright Who Owns It?. Brainstorm PROPERTY Dictionary: The RIGHT to possess, use and dispose of something. Something as a piece of writing in which copyrights.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Ethics and Online Issues
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
 Definition:  Internet safety is when you are safe and mindful of all the dangers of the internet.  Internet safety is also not getting harassed or.
Safe Surfing Tips Internet Safety Tips for Teens By: LaQuacious Garrett.
Ethics & Responsibility
Intellectual Property
Intellectual Property Laws Intellectual Property is  Purely intangible, with no physical characteristics – a person cannot touch it. Intellectual Property.
EthicsEthics, Rules, and LawsRulesLaws Using the computer appropriat ely.
Canadian Copyright Act Became law in January 1924 and was amended in 1988 (Phase I) The second phase amendments were completed in 1997 when Bill C-32.
INTELLECTUAL PROPERTY COPYRIGHTS, PATENTS AND TRADE MARKS.
EthicsEthics, Rules, and LawsRulesLaws Using the computer appropriately.
Kelly Ralph EDUC 318. Points of interest:  Ethical Issues  Social Networking  Acceptable use of policies  Netiquette  Cyberbullying  Student data.
Ethics And Computers. What are Ethics? Ethics Ethics are: Principles that guide behavior OR the rules of right and wrong behavior that you should follow.
26-Oct-2005cse ip © 2005 University of Washington1 Intellectual Property INFO/CSE 100, Autumn 2005 Fluency in Information Technology
Computer Ethics, Privacy and Security. Computer Ethics Computers are involved to some extent in almost every aspect of our lives They often perform life-critical.
Vocabulary review.
COMPUTER ETHICS Do you know the difference between right and wrong?
PREPARED BY: YOUR FIRST AND LAST NAME CURRENT DATE Ethics for Computer Use.
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
COMPUTER ETHICS Computer ethics is the study of standards of right and wrong.
Ethics and Computer Invaders. What are ‘Ethics’? Personal code of conduct accepted by society Using technology appropriately.
For Computer Use in Business
Ethics and Computers. Ethics Ethics are principles that guide behavior Community or Society Professional or School setting Individual Standards.
SAFE AND ETHICAL USE OF TECHNOLOGY By Dorreth Bailey-Oldacre 12/14/14 Professor: Dr. Barbara Gruber, PhD, CETL.
Software : Applications Software
Lucy Ashley. Intellectual property is anything that isn’t tangible that was the result of a person or group using their own ideas. In the context of music,
Unit Word Processing Exploring Ethics  Why copyrights are necessary  How to use technology ethically and legally  How to cite online sources You Will.
University Policy towards Privacy and Network Use Group Members: Serena Lam, Sarah Hong, Charlie Korschun, Zan Fort, Kristen France, and Jason Saltiel.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
Obj. 1.03: Discuss the security and confidentiality issues and ethics-related to data, hardware and software.
EthicsEthics, Rules, and LawsRulesLaws Using the computer appropriately.
Ethics...as related to computer technology. Ethics Definition “the principles of conduct governing an individual or a group” —(Merriam Webster Collegiate.
Software Downloads Jason Long IST 110 Charles Ramsey June 1, 2009.
Computer Ethics Computer Technology 1 By Jill Einerson.
Computer Technology Timpview High School
Ethics Self Imposed Right and Wrong Behavior Described as:
Ethics Computer Literacy. Ethics Definition “the principles of conduct governing an individual or a group” —(Merriam Webster Collegiate Dictionary, 2001)
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
Copyright and Fair Use. Plagiarism? Starting with a term you’ve all heard before: Plagiarism. What is Plagiarism?
Social Ethical and Legal Issues Web Design. 3.4 Social, Ethical, and Legal Issues Focus on Reading Main Ideas Ethical, social, and legal guidelines govern.
Computer Technology Internet, ethics, and . EthicsInternetMisc.Internet
ETHICS. Best Song Ever DID THEY BREAK THE LAW?  James Blunt  Black Eyed Peas  Alphaville  Jason Mraz  Train  The Calling  Elton John  Akon 
Computer Software Heather Allen. Software Copyright Laws It is illegal for anyone to violate any of the rights provided by the copyright law to the owner.
Chapter 15 Digital Citizenship Section 15.1 Communicating in a Digital Society.
Computer Safety and Ethics
Using the computer appropriately
Ethical Issues When Using Computers
Using the computer appropriately.
Intellectual Property- Music
Investigating the correct and legal way to use software
Ethical Issues When Using Computers
Copyright.
Lesson 2- Ethical Use of Digital Resources
BCT 2.00 Analyze Technology Issues
Ethics Computer Technology.
Using the computer appropriately.
Using the computer appropriately.
Lesson 2- Ethical Use of Digital Resources Edit all slides as needed.
Presentation transcript:

ETHICS

Best Song Ever?!

DID THEY BREAK THE LAW?  James Blunt  Black Eyed Peas  Alphaville  Jason Mraz  Train  The Calling  Elton John  Akon  John Denver  Lady Gaga U2 The Last Goodnight Maroon 5 The Beatles Bob Marley Men at Work Jack Johnson Spice Girls Green Day A-ha Toto Eagle Eye Cherry Beyonce Kelly Clarkston Jason Derulo Smashing Pumpkins Joan Osborn Avril Levigne The offspring Timberland OneRepubic Eminem Rhianna Bon Jovi Aqua Red Hot Chilli Peppers Gregory Brothers MGMT Andrea Bocielli Axis of Awesome Missy Higgins

“ ICE, ICE, BABY”

“ UNDER PRESSURE”

D D DIFFERENT? YOU BE THE JUDGE.

WHAT THE COURTS SAID...  It came to light that Vanilla Ice had sampled Queen and David Bowie’s “Under Pressure” without consent or license. Ice Ice Baby hit number one on the charts in the United States and Vanilla Ice became the one ‘under pressure’. Vanilla Ice altered the rhythm of the baseline thinking he would thereby avoid any question of credit, royalties, license or even permission. This case never went to court as it was clear that Vanilla Ice had stolen the sample without permission. He settled out of court with Queen and David Bowie for an undisclosed but very likely very high amount. Ice Ice Baby has been released in many different versions, since then, with all of the legal procedures followed.

ROBIN THICKE VS. MARVIN GAYE  Robin Thicke’s Song  Marvin Gaye’s Song  Judge awarded that Robin Thicke had to pay Marvin Gaye’s family $7 Million dollars for using his song  Robin Thicke’s song had previously made him over $10 Million at that point

ETHICS  Standards of right and wrong behavior  A gauge of personal integrity  The basis of trust and cooperation in relationships with others

WHAT ETHICS ARE NOT  Laws and instructions  Detailed instructions for every possible situation  Flexible and changing depending on each unique person or situation

WHERE DO THEY COME FROM?  Values of a society  Values of a school, business, or organization  Values from family and heritage  Values of an individual

WHAT ARE RULES?  Specific guidelines about appropriate behavior  Acceptable Use Policies (AUPs)  Professional Codes of Ethics  Classroom Disclosure Documents

WHAT ARE LAWS?  Regulations passed by state and federal bodies

WHAT, THESE ARE LAWS?  Alabama: It is considered an offense to open an umbrella on a street, for fear of spooking horses  California: Peacocks have the right of way to cross any street, including driveways  Idaho: Illegal for a man to give his sweetheart a box of candy weighing less than fifty pounds.  Montana: It is illegal to have a sheep in the cab of your truck without a chaperone.  Utah: It is illegal to detonate any nuclear weapon.

BUT EVERYONE IS DOING IT You may not be discovered, this time, but next time...  A serial number may be traced  A help line may become suspicious  An acquaintance may report you  A web address may record your visits  And more...

COPYRIGHT LAWS  Software developers own their programs.  Software buyers only own the right to use the software according to the license agreement.  No copying, reselling, lending, renting, leasing, or distributing is legal without the software owner’s permission.

TYPES OF COPYRIGHT Public Domain Freeware Shareware All Rights Reserved Creative Commons

PUBLIC DOMAIN  Has no owner and is not protected by copyright law.  It was either created with public funds, or the ownership was forfeited by the creator.  Rare  Unreliable  Poor quality  Virus-laden

FREEWARE LICENSE Has an owner but you can use it without paying for it Freeware is free because the license says it is, but it’s still under the owner’s control.  Gmail  Google Chrome  Firefox  Internet Explorer  Spotify

SHAREWARE LICENSE Licensed for a trial period, but you must pay for it for continued use  Game Demos  Photoshop Trial  Microsoft Office 30 day trial

ALL RIGHTS RESERVED Must be used exactly as the license states. You can’t legally use it- -or even possess it-- without the owner’s permission. Examples: Music Movies Books

CREATIVE COMMONS  Type of copyright where you give permission to make changes to created work  Collaborative copyright used for education and other collaborative projects  Wikipedia  Wired.com  Ted Talks

VIRUS REVIEW  Virus: Software that is harmful to your computer  Worm: Virus that eats through holes in the network

MORE VIRUS REVIEW  Virus: A virus sent through  Trojan Horse: A bad program that is disguised as something good

SNEAKY, SNEAKY  Adware: Pop ups or advertisements  Malware: Software that aids in gathering personal information and sold to others

HOW TO PROTECT YOUR PC  Anti virus software  Firewall  Be careful what you download