Download presentation
Presentation is loading. Please wait.
Published byClaud Richards Modified over 9 years ago
1
Computer Technology, Mrs. Tom
2
Using technology in a safe, legal, and responsible way Netiquette – Proper etiquette used in electronic communications
3
Spamming – Sending unsolicited junk mail or bulk mail Flaming – Bashing, insulting, or using profanity on the internet
4
Use of the internet or other electronic device to harm or harass in a deliberate, repeated, and hostile manner. What to do if you are cyber bullied: Don’t respond Tell an adult Keep copies as evidence
5
Libel A published, false statement that is damaging to a person’s reputation Slander A verbal, false statement that is damaging to a person’s reputation
6
Censorship Suppression of speech or other public communication Harmful Sensitive Obscene Indecent Controversial Filtering Keeping out unwanted material
7
A work or invention that is the result of creativity to which one has rights and for which one may apply for a patent, copyright, trademark, etc.
8
The rights possessed by the owner of information or resources. Copyright gives the owner the right to: Copy Distribute Use Sell Display Lease Perform Rent
9
What else can be copyrighted? A movie you see at a theater Your brother’s wedding video A software program like Microsoft Excel A sculpture in a museum A piece of music A drawing your sister does for your mom A picture a photographer takes
10
An original work is copyrighted once it’s in tangible form. You can’t copyright a thought. If something is registered with the US Copyright Office, you’ll see this symbol ©. Hmmm…
11
Is it okay to copy something that doesn’t have the © symbol on it? NO. You still need the permission of the owner. Remember, any original work in tangible form is automatically protected by copyright. The © symbol only means that it is registered with the Copyright office.
12
A license that lets you dictate how others may use your work. Allows you to keep your copyright but allows others to copy or distribute your work provided they give you credit and only on the conditions you specify.
14
To protect a name or symbol so others cannot use it without your permission The registered trademark symbol means the trademark has been registered with the proper government entity
15
Information available for anyone to copy like pictures, music, or software.
16
Public Information Information that CAN be used without permission. Private Information Information that CANNOT be used without your permission.
17
PublicPrivate Full Name Phone Number Home Address Grades Medical Records
18
Illegal copying, distribution, or use of software, CDs or DVDs, movies, music, etc. Piracy is a federal crime with serious penalties.
19
I s it okay to use other people’s information without giving them credit? N O. Give credit where credit is due!
20
You are allowed to paraphrase or quote if you don’t change meaning and give proper credit to author (like in a References page). You are allowed to paraphrase or quote if you don’t change meaning and give proper credit to author (like in a References page).
21
When you purchase software for the computer, you’re not buying the software itself, but the right to use it (also called a license). A software license is a legal contract that defines the ways in which you may use a computer program.
22
There are 3 types of software licenses.
23
You get the software for free!
24
You can use the software on a trial basis and purchase it at the end of the trial. (Some features may be disabled until you purchase the full version.)
25
You can purchase the software and install it on one computer.
27
When you INSTALL the program, you agree to abide by the EULA, a legally- binding contract.
28
A policy that is established by the computer owners regarding acceptable use of that computer (usually part of a network).
29
Alpine School District has an Acceptable Use Policy. You and your parent/guardian signed the AUP giving you access to the Internet and school’s computers.
30
1.Acceptable Use of the School Computers/Internet 2. Ethical Conduct
31
Specific “Dos” Use computers for school-related assignments Follow basic netiquette Specific “Don’ts” Do not access chat rooms, personal email, or Instant Messenger Do not access or distribute inappropriate materials (pornography, obscene, or threatening material) Do not engage in illegal activities Do not change settings/configuration of computer More at... http://alpinedistrict.org/policy/proc_5225.pdf
32
Computer use is a privilege, not a right. Remember, you did not buy the computer you use at school. You can lose your computer privileges if you misuse them.
34
April found some great information on the Internet for her report. She only paraphrased a small amount of the material and doesn’t want to cite the source. Is this ethical? NO. This is called plagiarism. You have to give credit where it’s due.
35
Tyler likes his friend Bill’s computer game. Tyler borrows it from Bill to install it on Tyler’s computer at home. Is this ethical? NO. Most software license agreements allow software to be installed on only one computer at a time.
36
Todd copied images off of a freeware clip art site to put on his own homepage. Is it ethical? YES. But Todd should see if the site requires anything. Some ask that you provide a link back to their clip art site.
37
Rick got a list of written ideas for a new computer program from his co- worker Jason. Jason gave Rick permission to share the ideas at a company meeting. Is it ethical? YES. Rick had Jason’s permission to use the information.
38
Charlene bought some songs off of iTunes and then burned them onto CDs to give to her 3 best friends. Is it ethical? NO. You can make one backup copy of a song or CD, but that backup copy is not to be distributed to anyone else, including family and friends.
39
BIS 1400 Materials. Utah State University Download.com US Copyright Office Adobe.com http://www.channelone.com/news/2003/09/04/file_swapp ers/index.html Clipart from the Microsoft Office xp suite Megan Hansen. “Ethics and Copyright” presentation
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.