6 th Grade. a. Identify Internet safety and security concerns (Cyber Predators, etc) b. Discuss illegal aspects of software piracy, hacking, and computer.

Slides:



Advertisements
Similar presentations
Internet Safety Rockingham County Public Schools
Advertisements

ACCEPTABLE USE POLICIES.  Use network resources for school work only  Always Log-on/Log-off  AUP/RUP training and signature pages are required  Always.
Technology in Education Issues we need to know. Social, Ethical, and Legal. By: Kara Bushey ECED 201.
Internet Safety/Cyber Ethics
Security, Privacy, and Ethics Online Computer Crimes.
Jiahuan Liu MGQ B7. Definition A copyright provides legal protection to a written or an artistic work Protected work may include images, symbols, novels,
By: Lauren Monteith, Derek Love, Cole Howell, and Reggie Jones.
Intellectual Property
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Possible WebQuest type links  
EthicsEthics, Rules, and LawsRulesLaws Using the computer appropriat ely.
What's in a name? That which we call a rose By any other name would smell as sweet.
Legal/ Ethical Guidelines in the Research and/or Production Process Copyright and Fair Use Academic Integrity.
7/3/08 Created by Mae Thomas Property Rights There can be consequences if you violate others' intellectual property rights. (That is, if you copy something.
Computer Ethics.
Ethics And Computers. What are Ethics? Ethics Ethics are: Principles that guide behavior OR the rules of right and wrong behavior that you should follow.
Keeping Safe While Using the Internet. We live in a community. What are some safety rules we have in our community? Cyberspace is also a community. What.
© Copyright © A Quick Guide. What does the law actually say? Introduced to protect people who have created original pieces of work. Books, Music, Films,
Welcome to Ms. Dickson’s Business Class.
… concern the legal ownership and use of intellectual property, such as software, music, movies, data, and information. Links: Video: Too Much Copyright.
Legal issues. Computer Misuse Act 1990 Deals with misuse of ICT systems.
Computer Security 2 Keeping your computer safe. Computer Security 2 Computer Security 2 includes two lessons:  Lesson 3: Protecting yourself and your.
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Are You a Good Digital Citizen? By Abby Buchanan Image from Microsoft Clip Art.
history, hardware, software, safety, and computer ethics
Intellectual Property A brief explanation. Intellectual Property is a name used for material, or something that is intangible. You may not be able to.
Intellectual Property What’s legal?. Discuss Terms  intellectual property, plagiarism, copyright-patent-trademark, public domain, fair use  piracy,
Ethics. Ethics are the principles and standards we use to decide how to act.
The Ethical Use of Electronic Media. V Computer Ethics  Resources such as images and text on the Internet are copyrighted.  Plagiarism (using.
The Ethical Use of Electronic Media.
Unit Word Processing Exploring Ethics  Why copyrights are necessary  How to use technology ethically and legally  How to cite online sources You Will.
Copyright Can Do A Guide to Understanding the Basics about Copyright.
Intellectual property (cont.) 1. Software as intellectual property 2  The law concerning software is not clear and is steal being formulated  In USA.
Digital Citizenship By Teneka Cannon. . Digital Etiquette also known as Netiquette Definition: a basic set of rule everyone should follow to make Internet.
Plagiarism & Copyright What is it?. What is copyright?  Copyright is a law that protects any created material as soon as somebody makes it.
Intellectual Property an iSafe © Lesson By: Angelica.
Is a worldwide collection of computer networks, cooperating with each other to exchange data. The Internet provides the following main facilities: 1. .
COPYRIGHT.  Designs and Patents Act protects people’s original work from being used without their permission  All the original work is copy right. The.
Social, Ethical and Legal Issues Madeline Webb.  Legal Issues  Social Issues  Ethical Issues.
The Ethical Use of Electronic Media. Guilford County SciVis V
Copyright and the Law Your Name Goes Here.
Keeping it safe on the internet
TECH VOCAB. ETHICS The rules that we use to define behaviors as “right” or “wrong” page 6.
Intellectual Property An iSafe Lesson By: Audrey.
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
Computer Ethics. Ethics Notes Ethics: standards of honesty, morality, and fairnessEthics: standards of honesty, morality, and fairness Public Data: information.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
CyberEthics LARK - Keeping It Legal, Appropriate, Responsible, Kind Grade Piracy, Copyright and Plagiarism LARK - Keeping It Legal, Appropriate,
Social Ethical and Legal Issues Web Design. 3.4 Social, Ethical, and Legal Issues Focus on Reading Main Ideas Ethical, social, and legal guidelines govern.
Intellectual property rights concern the legal ownership and use of intellectual property such as software, music, movies, data, and information. Intellectual.
Copyright Computer crime and cyber security.
Acceptable Use Acceptable Use means following rules when you use computers at school.
Using the computer appropriately
Welcome to Challenger Computer Lab.
The Ethical Use of Electronic Media.
The Ethical Use of Electronic Media
The Ethical Use of Electronic Media.
You will be given the answer. You must give the correct question.
Copyright Laws.
Web Design and Development
Ethical issues in relation to Copyright
BCT 2.00 Analyze Technology Issues
Intellectual Property Rights
Plagiarism, Copyright and Fair Use
A Guide to Understanding the Basics about Copyright
The Ethical Use of Electronic Media.
Copyright & Fair Use What You Need to Know!.
Student Name Student Class
Privacy, Security, and Ethics
Copyright, Design and Patents Act (1988)
Presentation transcript:

6 th Grade

a. Identify Internet safety and security concerns (Cyber Predators, etc) b. Discuss illegal aspects of software piracy, hacking, and computer viruses.

a. Model ethical use of Internet resources (piracy, plagiarism, copyright etc.) b. Access and examine available Web sites on the internet, using different search engines to find information c. Copy/Save text and images from the Internet, citing references according to copyright laws.

Plagiarism-when you take credit for someone else’s ideas Piracy-the act of copying and/or sharing copyrighted material without permission. Hacker-a person who uses his/her expertise to gain access to other people’s computers to get information illegally or do damage Computer virus-a program intentionally designed to cause annoyance or damage to a computer hardware or software

Intellectual Property-ideas and concepts created or owned by a person or company. Copyright-the legal protection for intellectual property. Trademark-a name, symbol, or other feature that identifies a product with a specific owner. (Example- golden arches of McDonald’s

Power point (unit 4 in book) Unit 3 page 109 project 2 for standard 6b The Missing Game (CD) if time permits.