Download presentation
Presentation is loading. Please wait.
Published by재희 곽 Modified over 6 years ago
1
Computer Ethics • Acceptable Use Policy • Copyright Law • Information Privacy Take Notes (this will be on the quiz)
2
Ethics are: “the principles of conduct governing an individual or a group” Webster Dictionary
3
Computer Ethics for EMS Rules that define right and wrong on the computer defined by the Effingham County BOE for students, teachers, and administrators.
4
Acceptable Use Policies "Legal document outlining acceptable and unacceptable uses of computer systems and networks created by a school district. Ignoring the established AUP is grounds for immediate termination of an employee. This may also include legal prosecution.
5
"Use the Internet and computer resources in an appropriate manner
Acceptable uses "Use the Internet and computer resources in an appropriate manner "“Formally Published” information must have prior approval and abide by district publishing guidelines "Abide by accepted rules of etiquette "Be polite and "No abusive messages "Use appropriate (rated G or PG) language
6
“May not send or receive any illegal
Unacceptable Uses “May not send or receive any illegal material or participate in illegal activity. "Pornography or explicit material. "Weapons related material. "Drug or alcohol related messages. "Any content containing threats or is hatefully, racially, ethically objectionable.
7
More Unacceptable Uses
More Unacceptable Uses "May not intentionally harm data, software or hardware. This includes: creating computer viruses, accessing restricted websites, intranet and internet hacking.
8
PLEASE BE ADVISED: Nothing created, transmitted or done on any hardware owned by the BOE should EVER be considered private The district uses computers, SA, & IM to continually monitor everything that goes in or out of all computers in the district.
9
"Loss of computer privileges "Temporarily "Permanently "Suspension
What can happen? "Loss of computer privileges "Temporarily "Permanently "Suspension "Expulsion "Legal action
10
Copyright Law "The legal protection given to creators of intellectual works which protects them against unauthorized copying and or distribution of their work "Copyright protection is legally “attached” to a work as soon as it is created or tangible "Copyright is not the same as a patent "The owner of a work has the right to “define” copyright restrictions & privileges
11
Scenario #1 Jill buys a new computer game and wants to play the game with Bill over the internet. Bill does not have enough money to buy a copy of the game for himself and asks Jill to come over and load it on his computer so they can both play. Is this a violation of copyright?
12
Answer Scenario #1 YES If Jill had read the license agreement when she installed the software she would know this.
13
Is this a violation of copyright?
Scenario #2 Bob has been surfing through the iTunes library on his computer. He finds a great new band and buys their album with an iTunes gift card that he got for his birthday. Bob creates a compilation CD including his favorite tracks off the downloaded album AND his favorite tracks off a few other albums. Is this a violation of copyright?
14
Answer Scenario #2 NO Listeners are allowed to make compilations (CD, iPod, etc.) as long as they are not distributed and the tracks are only used in ONE compilation at a time.
15
Scenario #3 Joe is given a CD for his birthday. Once he listens to it he realizes that it is not his kind of music, in fact he hates it. Sally likes the music and tells Joe that she will buy it off him. Joe sells the CD for $10. He is pretty sure that it cost more than that but he doesn’t like it anyway. Is this a violation of copyright?
16
Answer Scenario #3 NO Joe was the legal owner of the CD. There is no law against selling your personal property.
17
Think of it this way. . . When you buy media. Music, software, books, etc. You don’t own the media itself. You are just paying for the right to use a copy of it. Each copy you want to use, you must pay for. If you are unsure of your rights as a consumer, read the License Agreement
18
Special Circumstances
Special Circumstances "Educational Fair Use policy "Materials may be borrowed for educational purposes as long as: "Credit is given to the source (say where you got it) "Only pieces are borrowed "Project is deleted when learning is done "Public domain "Not protected by copyright "Created using public funds "Copyright ran out (they’re only good for 95 years)
19
More Special Circumstances
More Special Circumstances "Freeware "Copyrighted but licensed to be copied and distributed freely "Shareware "Copyrighted but free for temporary use (trial software) "Permanent use requires payment "Open source "Not covered by copyright "May be bought and sold "Source code must be left open to other programmers
20
Information exchange ethics
Information exchange ethics "Information is very personal and private "Information is readily available through computers and the Internet "Information is copyrighted "Fair use rules state that other people’s information may be quoted or used in small amounts as long as proper credit is given to the original source and/or owner.
21
The Right to Privacy "Private information is owned by the person it is about (example: grades, medical records, social security number) "Persons under 18 don’t own their private information, their parent or guardian does. "Private information is protected by law The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. -Fourth Amendment
22
Informational Harassment
Informational Harassment "Spamming – sending unsolicited to multiple users "Costs America millions of $$$$ each year "Flaming – public postings designed to embarrass or harass others "Cyber-Bullying (illegal and easy to get caught) "Trolling – public postings designed to provoke inappropriate responses "Also a form of Cyber-Bullying "Phishing – tricking people into giving up sensitive and personal information
23
Plagiarism “ The willful act of presenting another person's work and ideas as your own "Plagiarism is a type of fraud and is illegal “ Can get you permanently expelled from college and/or fired from your job “ Teachers use the internet and careful reading to discover plagiarism “ Plagiarism is easy to avoid “ Use only small portions – to help make your point “ ALWAYS CITE YOUR SOURCE(S)
24
Citing a Source or. . . Avoiding Plagiarism
“ Make an in-text reference at the end of the borrowed quote "Example: John Smith CEO Nabisco foods, "Add a full citation at the end of your work "This is usually done on a separate page called a bibliography "There are many different styles "Needs to include: author, title, publisher, publication year, issue for newspaper and magazines, etc. “ Always use other people’s information in the way it was originally intended to be used
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.