Quiz Anti Piracy 101.

Slides:



Advertisements
Similar presentations
The IT Workplace Kaye Burton & Karen Le Rossignol Communication in an IT Environment (2000)
Advertisements

Laptop Responsibilities Memorial Middle School Laredo ISD.
Hart District Acceptable Use Policy Acceptable Use Policy.
ACCEPTABLE USE POLICIES.  Use network resources for school work only  Always Log-on/Log-off  AUP/RUP training and signature pages are required  Always.
Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
Internet Piracy. History In the 1980’s mail was used to distribute pirated material Pirated material originally consisted of copyrighted games, software,
Understanding Issues in Implementing Technology in the Classroom Legal, Ethical, Social, and Human Issues National Educational Technology Standards for.
Security, Privacy, and Ethics Online Computer Crimes.
Unauthorized Online Usage of Music Files  Streaming on Personal Websites  Downloading From Illegal Websites.
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
VISD Acceptable Use Policy
Jiahuan Liu MGQ B7. Definition A copyright provides legal protection to a written or an artistic work Protected work may include images, symbols, novels,
For Students of Humble ISD
Electronic Piracy Your Name Here. What is Copyright? Visit ector=piracy_online_the_law Define copyright.
Music Piracy Created by Kenet-Alise. What is Piracy? Piracy is when you copy someone idea and sale it as your idea for money this is also illegal.* *
P2P file sharing Know the risks. Peer-to-peer (P2P) file sharing convenient way to share public-domain: – music – audio – images – documents – software.
EthicsEthics, Rules, and LawsRulesLaws Using the computer appropriat ely.
LPISD Acceptable Use Guidelines La Porte ISD students are fortunate to have access to a wide variety of technology to help make learning more.
Full electronic participation in society Issues: Lack of technology for everyone Not allowing/accounting for accommodations that students need Properly.
Ethics And Computers. What are Ethics? Ethics Ethics are: Principles that guide behavior OR the rules of right and wrong behavior that you should follow.
Computer Technology, Mrs. Tom. Using technology in a safe, legal, and responsible way Netiquette – Proper etiquette used in electronic communications.
Copyright Ignorance of the law is no excuse. Respecting the law If you copy a work protected by copyright and give or sell it to others, you are breaking.
Computer Ethics Christina McCorkle.
COMPUTER ETHICS Do you know the difference between right and wrong?
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
Unethical use of Computers and Networks
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
COMPUTER ETHICS Computer ethics is the study of standards of right and wrong.
ACPS Acceptable Use Policy Grades 3-5. A Good Technology User: Uses the computer and other technology with good intentions and for educational purposes.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
Principles of Arts, Audio/Video Production Copyright Law ©
Copyright and the Law For more information contact:
Software Licensing. Software License  Software Licenses are agreements between the user and the software developer.  The user accepts this agreement.
AUP, Netiquette, Copyright & Fair Use Wilkes University – Internet Literacy for Educators Cathy W. Dowd Spring 2009.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Ethics. Ethics are the principles and standards we use to decide how to act.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Unit Word Processing Exploring Ethics  Why copyrights are necessary  How to use technology ethically and legally  How to cite online sources You Will.
Should media copyright laws be more strictly enforced? Compose and copyright CD, Produce instrumentals, Film Music Video By: La’Vell Williams.
MUSIC PIRACY By: E. Lockhart. MUSIC PIRACY Music Piracy is illegally downloading music from a fake website that has plagiarized copyrighted music.
Software Piracy By: B. Kaniecki.
A Discussion of Student Responsibility and the Upper Merion Area School District’s Acceptable Use Policy.
Internet Safety Internet Safety LPM
By: Christina Anderson EDTC 630. AUP stands for Acceptable Use Policy  The AUP is an outline of procedures/rules to inform all students and employees.
Well, sir, from the sounds of it, you've got yourself some pirated software. I'm afraid there's nothing we can do to help you.`
LAUSD Responsible Use Policy (RUP) BUL – Attachment A.
Ethics...as related to computer technology. Ethics Definition “the principles of conduct governing an individual or a group” —(Merriam Webster Collegiate.
Online Journalism in Agricultural Communication Agricultural Communication and Leadership.
By: Ashley, Sabiha, and Roshaan. Software Piracy is the unauthorized copying of software. By buying the software, you become a licensed user rather than.
Copyright and the Law Your Name Goes Here.
 Legal Issues-copyright and fair use, privacy, software piracy, acceptable use  Social Issues- digital divide, cyber bullying, online interaction 
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Ethics Computer Literacy. Ethics Definition “the principles of conduct governing an individual or a group” —(Merriam Webster Collegiate Dictionary, 2001)
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
Computer Software Heather Allen. Software Copyright Laws It is illegal for anyone to violate any of the rights provided by the copyright law to the owner.
Internet Acceptable Use Policy
Crosby ISD Acceptable Use Policy Training
Tips for becoming a good cyber citizen
Are You and Your Students Responsible Digital Citizens?
Legal and Ethical Responsibilities
You will be given the answer. You must give the correct question.
Investigating the correct and legal way to use software
LAUSD Responsible Use Policy (RUP)
Copyright.
The Issues with Technology in education
What is Information Security?
Issues in Implementing Technology in Schools
Common Copyright Misconceptions
Common Copyright Misconceptions
Student Name Student Class
Presentation transcript:

Quiz Anti Piracy 101

Question 1.  True or False:  If you lend a program that you legally own to a friend to install on his/her computer it is perfectly legal. A  True  B   False

Question 2.  Which of the following are correct reasons for not purchasing pirated software? A. It may crash, or otherwise destroy, your computer B. You can purchase genuine copies of software from ITS for incredible prices C. Pirated software may infect your computer with a virus D. Pirated software often doesn't function as well as legal versions and may crash frequently E. All of the above

Question 3.  Which of the following are legal alternatives for downloading music? A.  Visit iTunes and download music.  B.  Get a P2P software program and download songs through that software from other people who are sharing off of their computers. C.  Borrow a friend's CD and burn yourself a copy.  D.  Shoplift a CD from a music store  E.  All of the above  

Question 4.  Which of the following are legal? (Select all that apply) .  A.   Purchasing music online from a site such as Musicmatch to download to your computer B.  Get a P2P software program and download songs through that software from other people who are sharing off of their computers.  C.  Borrow a friend's CD and burn yourself a copy. D.   Purchasing discounted copies of software from your university or other reputable organization.  E.  All of the above  

Question 5.  Which of the following is a potential consequence of illegal downloading? A. Being expelled from the university B.   Jail time C.   Being charged a large fine D.   Difficulty finding future employment E.    All of the above

Question 6.  Downloading music, movies or software is the equivalent of which of the following crimes? A.  Murder  B.   Shoplifting  C.  Traffic Violations (Speeding tickets, etc) D.  Slander E.  All of the above 

Question 7.  If I download a song from an illegal source just to see if I like it, it's not illegal as long as I delete it after determining whether I like it or not.  True or False? A True   B  False 

Question 8.  Which of the following are considered "User Responsibilities" according to the university's IT Resource Acceptable Use Policy A . To respect the privacy of others  B.  To respect the rights of others C.  To respect the intended usage of resources  D.  To adhere to all general University policies and procedures including, but not limited to, policies on proper use of information resources, information technology, and networks; acquisition, use, and disposal of University-owned computer equipment; use of telecommunications equipment; ethical and legal use of software; and ethical and legal use of administrative data E.   All of the above

Question 9.  According to federal copyright laws, what is a copyrighted work? (Visit the Purdue University Copyright policy web site ) A.   pantomimes and choreographic works B.   musical works C.   motion pictures  D.   All of the above except for A  E.    All of the above