To Summarize AUP: STUDENTS: Will not use technology to violate any laws. Will set passwords, i.e. AR, Star, Novell login Will not harm computers
STUDENTS: Will not violate copyright laws. Will close out of programs and log off the computer. Will not use computers for non- instructional purposes.
Possible Penalties: Lose computer privileges Payment of money for damage Alternative school Shelby Co. Bd. Of Ed. Student Code of Conduct and Attendance
COPYRIGHT: What is Copyright? The copyright law says the person who created the program owns it and is the only one who can give permission to distribute it.
TERMS INFRINGER – A person or company who copies copyrighted material without permission or authorization. INFRINGEMENT – the act of violating a copyright by copying or distributing a copyrighted work without permission or authorization.
Intellectual Property The physical expression of ideas contained in books, music, plays, movies and computer software. You “steal” intellectual property and violate copyright law when you do the following:
Let a friend copy a new game you just bought
Load the same program on more computers that you have licenses for. Follow the “One Disk, One Computer” rule
Download Musical CDs
Copy information someone has written and using it as your own.
Download images or music without getting written permission from owner
PUNISHMENT/PENALTIES FOR COPYRIGHT VIOLATORS CIVIL PUNISHMENT – Copyright holder can sue for money CRIMINAL – Violator can be sent to jail or fined by the government
COMPUTER FRAUD HACKER = A person who goes into someone’s personal files to change records, steal information, destroy files, and/or look around.
WAYS HACKERS INJURE OTHER COMPUTER USERS 1.People have to spend time and money to restore their files and make them secure again. 2.Violate a person’s privacy by looking in their files even if information is not changed.
HACKERS 3. Steal telephone and computer time and share access codes and passwords. 4. “Dumpster diving” going through office or technical info to get confidential information. Similar to someone looking through your trash.
HACKERS 5.Crash systems, which cause them to malfunction and not work. Think about ways we use computer systems and what could happen if they didn’t work.
SOFTWARE PIRACY Illegal copying of programs Large scale duplication and distribution Fines, jail sentences for companies Sharing a program with a friend
VIRUSES How do viruses spread? What damage do they cause? Punishment?
HOW DOES A VIRUS SPREAD? Spreads extremely quickly by making copies of itself and infecting files or disks HOW DOES A VIRUS SPREAD? Spreads extremely quickly by making copies of itself and infecting files or disks. HOW DOES A VIRUS SPREAD? Spreads extremely quickly by making copies of itself and infecting files or disks HOW DOES A VIRUS SPREAD? Spreads extremely quickly by making copies of itself and infecting files or disks
VIRUSES Spread through attachments. Never open s if there is no name.
VIRUSES Spread by downloading infected programs from the Internet. (Students are not allowed to download programs on school computers.)
VIRUSES Spread by sharing infected files or disks. (Students are not allowed to bring programs from home to load on school computers.)
DAMAGE WIPE OUT ENTIRE PROGRAMS CAUSE COMPUTERS TO RUN VERY SLOWLY BUSINESSES PAY MILLIONS OF DOLLARS A YEAR TO FIGHT VIRUSES/WORMS
PUNISHMENT Fines Jail Time
WAYS TO FIGHT COMPUTER CRIME 1. Education Understand how technology can be used to hurt as well as help people. How would you feel if you were the victim of a computer hacker.
2. Practice Safe Computing Don’t share your log-in or password with anyone. Computer hackers are not cool; they are criminals.
3. Acceptable Use Policy Students and faculty will follow the AUP which they sign at the beginning of each year.