Download presentation
Presentation is loading. Please wait.
Published byNatalie Butner Modified over 10 years ago
1
Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School
2
AUP STUDENTS’ ACCEPTABLE USE PRACTICES FOR THE USE OF TECHNOLOGY
3
TECHNOLOGY = Computers Hardware Network devices Software Peripherals Accessories
4
To Summarize AUP: STUDENTS: Will not use technology to violate any laws. Will set passwords, i.e. AR, Star, Novell login Will not harm computers
5
STUDENTS: Will not violate copyright laws. Will close out of programs and log off the computer. Will not use computers for non- instructional purposes.
6
Possible Penalties: Lose computer privileges Payment of money for damage Alternative school Shelby Co. Bd. Of Ed. Student Code of Conduct and Attendance
7
COPYRIGHT: What is Copyright? The copyright law says the person who created the program owns it and is the only one who can give permission to distribute it.
8
TERMS INFRINGER – A person or company who copies copyrighted material without permission or authorization. INFRINGEMENT – the act of violating a copyright by copying or distributing a copyrighted work without permission or authorization.
9
Intellectual Property The physical expression of ideas contained in books, music, plays, movies and computer software. You “steal” intellectual property and violate copyright law when you do the following:
10
Let a friend copy a new game you just bought
11
Load the same program on more computers that you have licenses for. Follow the “One Disk, One Computer” rule
12
Download Musical CDs
13
Copy information someone has written and using it as your own.
14
Download images or music without getting written permission from owner
15
PUNISHMENT/PENALTIES FOR COPYRIGHT VIOLATORS CIVIL PUNISHMENT – Copyright holder can sue for money CRIMINAL – Violator can be sent to jail or fined by the government
16
COMPUTER FRAUD HACKER = A person who goes into someone’s personal files to change records, steal information, destroy files, and/or look around.
17
WAYS HACKERS INJURE OTHER COMPUTER USERS 1.People have to spend time and money to restore their files and make them secure again. 2.Violate a person’s privacy by looking in their files even if information is not changed.
18
HACKERS 3. Steal telephone and computer time and share access codes and passwords. 4. “Dumpster diving” going through office or technical info to get confidential information. Similar to someone looking through your trash.
19
HACKERS 5.Crash systems, which cause them to malfunction and not work. Think about ways we use computer systems and what could happen if they didn’t work.
20
SOFTWARE PIRACY Illegal copying of programs Large scale duplication and distribution Fines, jail sentences for companies Sharing a program with a friend
21
VIRUSES How do viruses spread? What damage do they cause? Punishment?
22
HOW DOES A VIRUS SPREAD? Spreads extremely quickly by making copies of itself and infecting files or disks HOW DOES A VIRUS SPREAD? Spreads extremely quickly by making copies of itself and infecting files or disks. HOW DOES A VIRUS SPREAD? Spreads extremely quickly by making copies of itself and infecting files or disks HOW DOES A VIRUS SPREAD? Spreads extremely quickly by making copies of itself and infecting files or disks
23
VIRUSES Spread through e-mail attachments. Never open emails if there is no name.
24
VIRUSES Spread by downloading infected programs from the Internet. (Students are not allowed to download programs on school computers.)
25
VIRUSES Spread by sharing infected files or disks. (Students are not allowed to bring programs from home to load on school computers.)
27
DAMAGE WIPE OUT ENTIRE PROGRAMS CAUSE COMPUTERS TO RUN VERY SLOWLY BUSINESSES PAY MILLIONS OF DOLLARS A YEAR TO FIGHT VIRUSES/WORMS
28
PUNISHMENT Fines Jail Time
29
WAYS TO FIGHT COMPUTER CRIME 1. Education Understand how technology can be used to hurt as well as help people. How would you feel if you were the victim of a computer hacker.
30
2. Practice Safe Computing Don’t share your log-in or password with anyone. Computer hackers are not cool; they are criminals.
31
3. Acceptable Use Policy Students and faculty will follow the AUP which they sign at the beginning of each year.
32
Click here for TEST !
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.