Download presentation
Presentation is loading. Please wait.
Published byKelly Pinnock Modified over 10 years ago
1
Technology: Unethical Behavior and Its Consequences Prepared by Tami Genry March 2004
2
Expectations According to the Shelby County Board of Education Code of Conduct and Attendance, “students will use the system’s technology resources so as not to waste them, abuse them, interfere with or cause harm to other individuals, institutions, or companies.”
3
Common Misuses Hacking Spreading viruses Unauthorized access Making threats Copyright violation
4
Hacking To gain access to (a computer file or network) illegally or without authorization To alter (a computer set-up or program)
5
Spreading Viruses A virus is a program or piece of code written by someone who uses computers in an unauthorized way, that "infects“ other programs by embedding a copy of itself in them. When these programs are executed, the virus is spread. This normally happens invisibly to the user. A virus cannot infect other computers without assistance. It is continued by vectors such as humans trading programs with their friends. The virus may do nothing. Usually, however, after continuing silently for a while, it starts doing things like writing messages on the terminal or playing strange tricks with the display. Some viruses may do irreversible damage, like deleting files.
6
Unauthorized Access Entering and/or communicating with files, accounts, computers, logs, networks, etc. without official permission being granted.
7
Making Threats Indicating an intent to inflict injury or damage to another person or property.
8
Plagiarizing Stealing or passing off as one’s own, the ideas or words of another Using another’s created product without crediting the source
9
Responsible Use (adapted from the Shelby County Code of Conduct and Attendance) Adhere to all local, state, and federal laws and statutes, including copyright laws Do not use technology maliciously Do not trespass in another user’s files Use only your authorized network account Use technology for educational purposes Notify teacher or other adult whenever you come across dangerous or inappropriate information or messages
10
Responsible Use (continued) (adapted from the Shelby County Code of Conduct and Attendance) Do not waste or monopolize system resources Do not modify technology devices or software Do not attempt to disable or circumvent security measures Do not intentionally harm or remove parts from computers
11
Consequences Consequences Failure to adhere to Shelby County Board of Education policy regarding technology is a Class III violation according to the Code of Conduct. Committing a Class III violation will result in suspension from school and/or bus up to ten days with possible recommendation for expulsion or referral to the Alternative School. Parental contact will be made Law enforcement and/or juvenile court personnel will be contacted and a complaint or petition may be filed ( adapted from the Shelby County Code of Conduct and Attendance)
12
Concluding Thoughts Concluding Thoughts When local, state, and/or federal laws are broken when using technology, criminal charges can be filed and the legal process carried out. It is our desire in the Shelby County School System that technology be used to increase efficiency and productivity, and enhance instruction, so that increased student learning will take place.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.