Presentation is loading. Please wait.

Presentation is loading. Please wait.

Technology: Unethical Behavior and Its Consequences Prepared by Tami Genry March 2004.

Similar presentations


Presentation on theme: "Technology: Unethical Behavior and Its Consequences Prepared by Tami Genry March 2004."— Presentation transcript:

1 Technology: Unethical Behavior and Its Consequences Prepared by Tami Genry March 2004

2 Expectations According to the Shelby County Board of Education Code of Conduct and Attendance, “students will use the system’s technology resources so as not to waste them, abuse them, interfere with or cause harm to other individuals, institutions, or companies.”

3 Common Misuses  Hacking  Spreading viruses  Unauthorized access  Making threats  Copyright violation

4 Hacking  To gain access to (a computer file or network) illegally or without authorization  To alter (a computer set-up or program)

5 Spreading Viruses  A virus is a program or piece of code written by someone who uses computers in an unauthorized way, that "infects“ other programs by embedding a copy of itself in them. When these programs are executed, the virus is spread. This normally happens invisibly to the user. A virus cannot infect other computers without assistance. It is continued by vectors such as humans trading programs with their friends. The virus may do nothing. Usually, however, after continuing silently for a while, it starts doing things like writing messages on the terminal or playing strange tricks with the display. Some viruses may do irreversible damage, like deleting files.

6 Unauthorized Access  Entering and/or communicating with files, accounts, computers, logs, networks, etc. without official permission being granted.

7 Making Threats  Indicating an intent to inflict injury or damage to another person or property.

8 Plagiarizing  Stealing or passing off as one’s own, the ideas or words of another  Using another’s created product without crediting the source

9 Responsible Use (adapted from the Shelby County Code of Conduct and Attendance)  Adhere to all local, state, and federal laws and statutes, including copyright laws  Do not use technology maliciously  Do not trespass in another user’s files  Use only your authorized network account  Use technology for educational purposes  Notify teacher or other adult whenever you come across dangerous or inappropriate information or messages

10 Responsible Use (continued) (adapted from the Shelby County Code of Conduct and Attendance)  Do not waste or monopolize system resources  Do not modify technology devices or software  Do not attempt to disable or circumvent security measures  Do not intentionally harm or remove parts from computers

11 Consequences Consequences  Failure to adhere to Shelby County Board of Education policy regarding technology is a Class III violation according to the Code of Conduct. Committing a Class III violation will result in suspension from school and/or bus up to ten days with possible recommendation for expulsion or referral to the Alternative School.  Parental contact will be made  Law enforcement and/or juvenile court personnel will be contacted and a complaint or petition may be filed ( adapted from the Shelby County Code of Conduct and Attendance)

12 Concluding Thoughts Concluding Thoughts  When local, state, and/or federal laws are broken when using technology, criminal charges can be filed and the legal process carried out. It is our desire in the Shelby County School System that technology be used to increase efficiency and productivity, and enhance instruction, so that increased student learning will take place.


Download ppt "Technology: Unethical Behavior and Its Consequences Prepared by Tami Genry March 2004."

Similar presentations


Ads by Google