Presentation.  Suppression of speech or public communication.

Slides:



Advertisements
Similar presentations
ACCEPTABLE USE POLICIES.  Use network resources for school work only  Always Log-on/Log-off  AUP/RUP training and signature pages are required  Always.
Advertisements

BELL WORK Why do you think people are bullies?.
BULLYING What Is The Definition of Bullying?
VISD Acceptable Use Policy
CYBER SAFETY RACHEL FOULGER & JANELL TOMLINSON. Cyber Bullying Violence In Media Pornography Fraud & Copyright Be Kind On Line.
By Yevgeniy Zubkov.  Cyber bullying Cyber bulling is very serious if cyber bulling is happing to you, you should tell a trusted adult.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Lathrop Intermediate School Cyber Savvy Week December 1 – December 5, 2014 Be RespectfulBe ResponsibleBe Safe Science Classrooms – Thursday, December 4,
Student Technology Use. 1. I can share passwords with my parents and teachers.
DIGITAL CITIZENSHIP DIGITAL CITIZENSHIP By: Erica Lewis ED 505.
Elementary GCCISD Agreement for Computing and Electronic Communications.
Digital Citizenship Texting vs. Sexting Cyberbullying.
Mrs. Jefferson Business Information Management I.
Employee Guidelines for Acceptable Use of Technology Resources.
Digital Citizenship Project.  The etiquette guidelines that govern behavior when communicating on the internet have become known as netiquette.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
A guide to netiquette, copyright & fair use, plagiarism, internet and computer safety By Briana Horton.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
By: Tina Hill.  This is the unwritten rules of the different media sites on the internet.
Copyright and Fair Use What you need to know! Mastery objective: Students will be able to define copyright and fair use and discuss how copyright and fair.
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
Staying Safe Online A Practical Guide for Middle School Students.
Digital Citizenship Created By: Kelli Stinson June 2011.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
Digital Citizenship Project By Allen Naylor Ed 505.
Digital Citizenship. Topics  Netiquette  Copyright and Fair Use  Plagiarism  Safety on the Internet  Safety on your Computer.
Digital Citizenship Working and playing in a digital word.
BY CONTESSA RUSHING ED 505 TECHNOLOGY AND EDUCATION.
PREPARED BY: SYAIDATUL SYAZANA BT PAUZI INTRODUCTION What is the definition of Phishing Hacking.
Intellectual Property What’s legal?. Discuss Terms  intellectual property, plagiarism, copyright-patent-trademark, public domain, fair use  piracy,
The Freedom of Information Act (FOIA) is a law that gives you the right to access information from the federal government. It is often described as the.
As a student in the NCCVT school district, you are privileged to have access to your own individual account on the District network. Your account.
There is no safety in silence
COMPUTER SOLUTIONS 1 **Notes from DVD: I Was Cyberbullied.
Digital Citizenship By Lori Gray.
Laws Jamie Dunn.
 Carla Bates Technology and Education ED 505.  Social Media Sites are interactive webpages, blogs, and other user created sites that all others to create,
Internet safety By Kenan.  Viruses are written by malicious programmers who wish to cause problems for other computer users.  The primary source of.
LAUSD Responsible Use Policy (RUP) BUL – Attachment A.
Internet safety By Suman Nazir
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
Intellectual Property an iSafe © Lesson By: Angelica.
Security and Ethics Safeguards and Codes of Conduct.
Electronic Mail. Gmail Accounts USERNAME Skyward PASSWORD Same password as you use to log in to your computer.
5 different ways to get tricked on the internet. 1. Viruses A virus is a computer malware program that copies it’s files to the computer. This may allow.
Woodland Hills School District Computer Network Acceptable Use Policy.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
COPYRIGHT TERMS BROADCAST LAW. AUTHOR/ARTIST The creator of a work.
Intellectual Property An iSafe Lesson By: Audrey.
Understanding the dangers of living online.  Personal networking (Facebook, MySpace, etc.)  Research information  Download music  Gaming  Instant.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Animation The rapid display of a sequence of images of 2-D or 3-D artwork/model positions, in order to create an illusion of movement.
Web bugs are tiny graphic files embedded in messages and Web pages that are designed to monitor who is reading the message or Web page and.
Digital Citizenship Project Submitted by: Etta Pope Instructor: Laurie Fowler.
Delete CyberBullying Boston Public Schools Cyber Safety Campaign.
Chapter 15 Digital Citizenship Section 15.1 Communicating in a Digital Society.
Physical Safety Issues
A Student Guide to Copyright and Fair Use
Physical Safety Issues
Technology Guidelines for Students
Lesson 2- Ethical Use of Digital Resources
Internet Safety Vocabulary
Technology Guidelines for Students
LEGAL TERMS IN DIGITAL MEDIA
Physical Safety Issues
Woodland Hills School District
Kyrene Student Acceptable Use Policy Technology Guidelines
Presentation transcript:

Presentation

 Suppression of speech or public communication.

 Laws granting the creator exclusive rights to the use of his or her intellectual property.

 An additional license agreement from the owner of the intellectual property allowing creative use by another person.

 Using a computer and the Internet to harass, threaten, embarrass and humiliate another person.

 Allowing only some information to flow to your computer or through your network.

 Posting inappropriate, angry, and/or abusive comments about someone online.

 Creations of the mind.

 Written words or images which degrade or injure another person’s reputation or good name.

 A written agreement between the owner/developer of software and the end user (you).

 The attempt to acquire sensitive information such as usernames, passwords, and credit card details through electronic communication.

 Illegal copying or use of computer software and digital media such as music and movies.

 Oral or verbal defamation of character by telling untrue things about another person.

 Unsolicited and unwanted messages.