Port Byron Central School Port Byron NY Computer Ethics Presentation September 2003.

Slides:



Advertisements
Similar presentations
Rockingham County Public Schools Technology Acceptable Use Policy
Advertisements

MADISON COUNTY SCHOOLS ACCEPTABLE USE AND INTERNET SAFETY POLICY.
Northside I.S.D. Acceptable Use Policy
Hart District Acceptable Use Policy Acceptable Use Policy.
Janis Gatewood EDU689 January 27, Faculty and Staff COMPUTER CRIME ACT Section of the Code of Laws of S.C. states that: 1. It is unlawful.
Expectations, Procedures, Policies Developed by Technology Services 1:1 Laptop Initiative.
Technology: Unethical Behavior and Its Consequences Prepared by Tami Genry March 2004.
AUP Acceptable Use Policy Summarized by Mr. Kirsch from the Sioux Falls School District Technology Plan.
Uintah School District Acceptable Use for Computer and Network Access.
Boyertown Area School District Acceptable Use Policy.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
Phoenix Union High School District Governing Board Policy In-Service Technology Usage Electronic Information System (EIS) 2014/2015 School Year.
Riverside Community School District
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
VISD Acceptable Use Policy
INTERNET and CODE OF CONDUCT
What Is Computer Ethics?
Computers Are Your Future Twelfth Edition Spotlight 1: Ethics Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
Computer Ethics – The Ten Commandments
Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 3 Information System Fundamentals.
By Adam, Rachelgail & Kayla. What is internet Ethics? They are principles and guidelines to be applied whilst using the internet. Codes of ethics have.
Possible WebQuest type links  
Describe ethical considerations resulting from technological advances.
Computer Ethics for Computer Users
A cceptable U se P olicy A student’s guide to using technological tools safely and responsibly. Please see BOE Policy #7314 and Regulation #7314R * This.
Employee Guidelines for Acceptable Use of Technology Resources.
© 2001 Business & Information Systems 2/e1 Chapter 3 Information System Fundamentals.
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 3 Information System Fundamentals.
COMPUTER ETHICS Do you know the difference between right and wrong?
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
Clark County School District (CCSD)
Technology in the Bellingham School District. Bellingham School District Network §Connectivity §Communication §Research Practice Responsible Use.
Chapter 7: IT Ethcs Courtney Littlejohn CSCI 101 Thursday 3:30.
Fort Bend ISD Acceptable Use Policy Training Student Training.
Acceptable Use Policy.  The District system includes:  A network of computers that serves all the schools  Saved files on a server for student work.
Fort Bend ISD Acceptable Use Policy Student Training.
ACPS Acceptable Use Policy Grades 3-5. A Good Technology User: Uses the computer and other technology with good intentions and for educational purposes.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
EAST HARDIN MIDDLE SCHOOL MR. ERVIN Internet Safety Policy and Acceptable Use Procedures.
Business Ethics Why should business ethics concern you?
BEING CYBERSMART! ABOUT ONLINE SAFETY AND SECURITY AT SCHOOLS Redelivery Part 1: The AUP.
Essential Components: Acceptable Use Policy Presenter: John Mendes.
The Ten Commandments of Computer Ethics. The 1st Commandment Thou shalt not use a computer to harm Thou shalt not use a computer to harm other people.
8/16/08Computer Ethics Institute Mae Thomas The Ten Commandments of Computer Ethics by the Computer Ethics Institute.
The Ten Commandments of Computer Ethics Written by the Computer Ethics Institute A project of the Brookings Institution
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Ethics Business Law Sunny Hills High School Mrs. Larsen.
Leslie Lambert Q310-2, Winter 2001, Technology Policies The Technology Policies We Need Now and Why Is our current AUP acceptable?
Computer Ethics. Ten Commandments of Computer Ethics Copyright: Computer Ethics Institute Author: Dr. Ramon C. Barquin.
Granbury I.S.D. Acceptable Use Policy for Technology Resources
By: Christina Anderson EDTC 630. AUP stands for Acceptable Use Policy  The AUP is an outline of procedures/rules to inform all students and employees.
The goal of BYOD programs is to expand opportunities for 21st Century learning. However, using personally owned devices at school is a privilege, not.
ALABAMA TECHNOLGY STANDARDS FOR TEACHERS Ethical Issues of Technology Presented by: Shirley Johnson & Keisha D. Smith.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
Computer Ethics. Ethics The rules and standards governing the conduct of an individual with others.
Chichester School District is providing students access to the district’s electronic network. This network includes Internet access, computer services,
EPals ePals is your school account Communicate with group members/teachers stu.gbaps.org.
ETHICS IN USING COMPUTER
School Accounts Presented by: Mrs. Mazzola.
Writing an Internet Policy for Your School Kathie Carwile Morgan, ED.D. Liberty University ACSI Washington DC Educator Convention Nov. 22 & 23, 2010 Crystal.
Marion County Public Schools Acceptable Use Guidelines for Network Access.
District Updates  1. Crisis Go App  2. Bullying Refresher  3. Social Media Policy  4. Teacher Web Pages.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
Computer Ethics IT Fundamentals Battlefield High School.
Crosby ISD Acceptable Use Policy Training
Computers Are Your Future Twelfth Edition
Chapter 16 – Careers in Information Technology
Student User Agreement and Policy 2022
Presentation transcript:

Port Byron Central School Port Byron NY Computer Ethics Presentation September 2003

Ten Commandments of Computer Ethics Commandment: an instruction; a requirement Ethics: a code of conduct; how a person should live.

1.) You shall not use a computer to harm other people. Intentionally interfering with other people’s work Invading the privacy of individuals

2.) You shall not interfere with other people's computer work. Degrading or disrupting equipment, software, or system performance. Using resources to interfere with the proper operation of any computer, or destroy data. Intentionally interfering with other people’s work Invading the privacy of individuals

3.) You shall not snoop around in other people's computer files. Using an account owned by another user, or allowing another user to access your account. (Any problems which arise from the misuse of a user’s password will be that user’s responsibility.) Invading the privacy of individuals

4.) You shall not use a computer to steal. Using resources in any manner that violates Board policy, federal, state, or local law including unauthorized copying or transmission of software.

5.) You shall not use a computer to bear false witness. Initiating or forwarding “chain” letters. Downloading, storing printing, or distributing files or messages that are profane, obscene, threatening, or that use language that offends or tends to degrade others. Urban Legends (e.g. kidney transplants) Unproven rumors (e.g. free coca cola)

6.) You shall not copy or use proprietary software for which you have not paid. Using resources in any manner that violates Board policy, federal, state, or local law including unauthorized copying or transmission of software.

7.) You shall not use other people's computer resources without authorization or proper compensation. Using information obtained through network and computer resources without giving proper credit to the source (plagiarism). Posting personal communication without the original author’s consent.

8.) You shall not appropriate other people's intellectual output. Posting personal communication without the original author’s consent. Using information obtained through network and computer resources without giving proper credit to the source (plagiarism).

9.) You shall think about the social consequences of the program you are writing or the system you are designing. Initiating or forwarding “chain” letters. Downloading, storing, printing, or distributing files or messages that are profane, obscene, threatening, or that use language that offends or tends to degrade others.

10.) You shall always use a computer in ways that show consideration and respect for your fellow humans. Downloading, storing, printing, or distributing files or messages that contain information considered dangerous to the public at large.

District policy states that: A filtering device is in place to remove inappropriate materials. This filter also monitors all Internet activity, and, network activity. Like your locker, access is a privilege, not a right. District officials or system administrators for any reason whatsoever may access all computerized files. The district may disable a user’s account at any time for inappropriate or irresponsible behavior. The building administrator will determine penalties.

FURTHERMORE… Student access is to take place only under direct supervision of a responsible member of the school district’s instructional staff. Use is limited to educational purposes that are directly related to the curriculum which you are studying. No software from outside sources may be loaded or used without written permission from the Technology Coordinator.

Photos on the Web Web pages may include only the first name and the initial of the student’s last name. Use of individual student pictures (video or still), including teacher’s individual web pages must have a signed parent/guardian approval on file with the Technology Coordinator for all students under 18 years of age. Group pictures may be published without approval if names are omitted. Personal information about employees may be published only with their written permission.

CHAT and Student users will not be allowed to join chat groups or discussion groups unless it is for a specific educational purpose and written permission from a parent/guardian and a staff member is obtained. The staff member will directly supervise student participation and ensure that the student unsubscribes when the purpose for the use is over. Use of free accounts (yahoo, hotmail, etc.) is prohibited by students and staff.

PENALTIES Depending on the nature and severity of a violation, a Building Administrator will take disciplinary action. Parent contact is required. If warranted, the administrator shall refer the case to an appropriate school, local, state, or federal authority for disposition. If appropriate, access rights to technology will be denied immediately. Responsibility for costs and damages may be incurred.

References “Ten Commandments of Computer Ethics”. ( Codes/10.Commandments.html) Computer Ethics Institute, Washington DC. (7 July 2003). Codes/10.Commandments.html Port Byron Central School District Technology Code of Conduct for Students. (Adopted July 2000.)