Teaching and Computers. Computer Trespassing. Lorraine Hopping and Craig Dickinson. February 1985. Adapted by Kim Bigelow 2003.

Slides:



Advertisements
Similar presentations
IT: Communication and Impacts
Advertisements

Of.
Welcome to 3rd Grade!.
SO WHAT DOES THE AUP MEAN FOR ME…??? A Presentation for Students in Grades 3-5.
Chapter 6 Test Review.
Applicability of Chapter 222 With Emphasis on MGL c.71, 37H, MGL c.71, 37H1/2, and MGL c.71, 37H3/4 PowerPoint Created By: Elizabeth Tashash, Education.
What to do if you……..
The American Legal System
INTERNET SAFETY FOR STUDENTS
PowerPoint by: Jackie Haller Presentation for incoming Sophomores at the Sophomore Orientation.
Welcome to mrs. Kutterer’s sixth grade class
INTERNET SAFETY.
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
Digital Citizenship Presentation Mr. E. Colston Note to Portfolio Reviewers: The following material is not my own creation, though it has been modified.
Do you know how to keep yourself safe?
INTERNET SAFETY FOR STUDENTS
Grade 5 Student Assistants
8 th Grade Social Studies Juveniles and Adults Under The Law Mr. O’Connor Social Studies.
The Bill of Rights Amendments Two through Ten. The Second Amendment The Second Amendment gives people the right to bear arms (weapons) and the right to.
RULES FOR ONLINE SAFETY BY KYLE K AND JASON. CHECK WITH YOUR PARENTS FIRST ! Don’t ever agree to get together with someone you meet online without checking.
Rebeca Moreo The Learning Zone. First Week When I entered the Southeast Branch library I didn’t know were to go so I went to the front desk. When I walked.
Gifted Hands Ben Carson Report By: Alicia Bernabe 9/15/08 Photo credit.
Digital Driver’s License Please click the button to continue:
COMPUTER ETHICS Do you know the difference between right and wrong?
General Classroom/Ryan Information. Transportation/Bus Procedures Please fill out the transportation form on the front table. Our school will have teachers.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
{ Criminal Trial Procedure What happens when the police arrest a criminal suspect?
Mrs. Stern Computer Applications II. What is Computer Crime?  Criminals Can Operate Anonymously Over the Computer Networks.  Be careful about talking.
Digital Citizenship Grade Why are we here and what is Digital Citizenship? Part 1: What is Private Online? Part 2: Passwords Part 3: Responsibilities.
Legal issues. Computer Misuse Act 1990 Deals with misuse of ICT systems.
Chapter 16.3 Young People and the Courts. Causes of Juvenile Delinquency In most states, anyone under age 18 is considered a juvenile – not yet legally.
Gospel John 8:1-11 Taylor Heberle March 15, 2013.
16.3 Young People and the Courts Civics and Economics.
Welcome to Parent Night! Mrs. Butts’s Class 4 th Grade.
The Bill of Rights. Congress discussed more than 100 proposals for amendments before it sent 12 to the states for approval. –10 were ratified –These 10.
Riding the Internet Highway Internet Safety Rules.
Legal issues The Data Protection Act Legal issues What the Act covers The misuse of personal data By organizations and businesses.
TECHNOLOGY USE AGREEMENT FOR STUDENTS GRADES 3-8 This presentation was created to help students understand the district’s Technology Use Agreement before.
Kyleigh LESLIE. I will never give out my personal information like my phone number, location, and my school.
Module 14: Prenatal and Childhood Development
New Jersey v. TLO Unit 4 Lesson 10.
Using Computers: Legal and Ethical Issues Objectives and Guidelines We Must Follow.
My service learning I completed my service learning at the East Branch Library in Arlington on Thursdays from 4-5:30 pm.
Leadership Project There is high percentage of students dropping out of high school because they don’t want to study or struggle with a lack of money,
Youth Criminal Justice Act. The Youth Criminal Justice Act (YCJA) was passed by parliament in Applies to young people from the age of 12 to 17.
Mrs. Jenkins Review Elective Building Guidelines.
It all depends on your….  The perspective, or vantage point, from which the story is told. It is either a narrator outside the story or a character in.
Mesopotamia. Hammurabi BCE The first Law giver Code of Hammurabi Eye for an eyeMesopotamia.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Juvenile Justice System. Goal of Juvenile Justice To rehabilitate or correct the behavior of juvenile delinquents rather than punish. In North Carolina.
Unit 6: The American Legal System BY: Yaira Peaks.
Kids’ Online Safety Rules. 1. I will not give out personal information such as my address, telephone number, parents’ work address/telephone number without.
Keeping it safe on the internet
E- SAFETY PRESENTATION By: Mohamed Fathy Tip 1Tip 2Tip 3Tip 4Tip 5 And the What is e safety.
Writing an Internet Policy for Your School Kathie Carwile Morgan, ED.D. Liberty University ACSI Washington DC Educator Convention Nov. 22 & 23, 2010 Crystal.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
What is tattling? Telling or complaining about something that someone else did. Why do people tattle?
Do now pg.59 1.What are all the steps in a criminal court case?
Technology Guidelines for Primary Students
Allen ISD Technology Acceptable Use Policy for Students Grades 2-4
The Copyright, Designs and Patents Act 1988
Unit 6: The American Legal System
Technology Guidelines for Students
Mill Creek FSA Parent Night
Digital Driver’s License
Technology Guidelines for Students
Digital Driver’s License
Scribner Road Internet Safety Rules
The Bill of Rights The First 10 Amendments to the Constitution
Kyrene Student Acceptable Use Policy Technology Guidelines
Presentation transcript:

Teaching and Computers. Computer Trespassing. Lorraine Hopping and Craig Dickinson. February Adapted by Kim Bigelow 2003

Proposed Computer Break-In Rule Anyone who is caught using a computer, either at home or at school, to access school computer files without permission must report to the principal. The principal will notify the parents and hold a hearing. Students judged guilty of illegal access could receive the following punishments: 1.If the offender enters school computer files but does not alter the contents, he or she could be suspended for three to five days. 2.If the offender changes, damages, or erases information in school computer files, he or she could be expelled. 3.If the offender steals money or goods from school accounts, he or she could be expelled and ordered to repay all damages or losses. 4.Anyone who commits any of the above crimes may also be reported to the local police department, which may bring legal charges against him or her.

Hypothetical Cases: What would be the most severe punishment? 1. A sixth grader stole the password for the school computer from a teacher’s desk. She accessed the computer and destroyed many of the files, including all the grades for the fifth grade. (She could be expelled under item 2 of the rules) 2.A third grader tried to break into the school computer “just for fun.” He did not succeed. (He could not be punished under the rules) 3.A fifth grader used his home computer to access the school computer files. He didn’t change any information, but he saw who failed the last math test. Later, he made fun of those students who failed. (He could be suspended for three to five days under rule 1) 4.A seventh grader was given the task of entering paren’ts addresses into the school computer. Having finished the job early, she use the computer to look at other school records, including teachers’ salaries and students’ discipline records. (She could not be punished under the rule. It only covers access without permission to school computers)

5. A fourth grader used her home computer to break into the school’s supply files. She ordered a tape recorder to be sent to her home and charged it to the school. (She could be expelled under rule 3 and would have to pay for the tape recorder.) 6. An eight grader was asked by his teacher to enter some programs he wrote into a computer file so that other teachers could use them. In doing so, he accidentally destroyed other programs that were in the file. (He could not be punished because he had permission to access the school computers) 7.A fifth grader went into the computer lab at recess and made copies of some of the software programs to use at home. The programs were copyrighted (meaning they could not be copied legally). (She could not be punished under the rules. Had she destroyed or changed the programs, she could have been expelled under rule 2. Had the programs contained private information such as a record of students’ grades, she could have been suspended under rule 1.)

YOU MAKE THE RULES! Right now there are no rules for computer trespassing. You have to do what you feel is right. Unfortunately, there are some people who do not always do the right thing. Help me make some rules that teachers and students must follow at school Read the rules and tell me if they should be cut, changed, or kept as is At the end write your own rule that you think we should have at the school.

1. If the offender enters school computer files but does not alter the contents, he or she could be suspended for three to five days. I think this rule should be (cut, changed, kept) because

2. If the offender changes, damages, or erases information in school computer files, he or she could be expelled. I think this rule should be (cut, changed, kept as is) because:

3. If the offender steals money or goods from school accounts, he or she could be expelled and ordered to repay all damages or losses. I think this rule should be (cut, changed, kept as is) because:

4. Anyone who commits any of the above crimes may also be reported to the local police department, which may bring legal charges against him or her. I think this rule should be (cut, changed, kept as is) because:

My Own Rule:

By: ___________________