Presentation is loading. Please wait.

Presentation is loading. Please wait.

What your students and Parents need to know  The ethical rules we live by also apply to technology.  Make students aware that how technology is.

Similar presentations


Presentation on theme: "What your students and Parents need to know  The ethical rules we live by also apply to technology.  Make students aware that how technology is."— Presentation transcript:

1

2 What your students and Parents need to know

3

4

5  The ethical rules we live by also apply to technology.  Make students aware that how technology is used is as much an ethical issue as hacking or cracking  Teaching good practices is much easier than eliminating bad ones  provide positive images and effectively communicate ethical values in all areas of their lives, those values will be reflected in the technological environment as wel

6  1. Thou shalt not use a computer to harm other people.  2. Thou shalt not interfere with other people's computer work.  3. Thou shalt not snoop around in other people's files.  4. Thou shalt not use a computer to steal.  5. Thou shalt not use a computer to bear false witness.

7  6. Thou shalt not copy or use proprietary software for which you have not paid.  7. Thou shalt not use other people's computer resources without authorization or proper compensation.  8. Thou shalt not appropriate other people's intellectual output.  9. Thou shalt think about the social consequences of the program you write or the system you design.  10. Thou shalt use a computer in ways that show consideration of and respect for your fellow humans. Computer Ethics Institute Author: Dr. Ramon C. Barquin

8 The graph points out that girls are as likely, if not more likely, to be involved in cyberbullying. Both boys and girls report about the same involvement in cyberbullying. Lifetime participation rates are higher for girls, suggesting that they have been engaging in these types of activities longer. You can note some differences in the types of behaviors girls and boys engage in.

9 The graph suggests that all races are vulnerable to cyberbullying. While it appears that White students are more likely to report lifetime experiences with cyberbullying (as a victim and an offender), after 30 days, all races are pretty evenly represented as victims.

10

11  Never to pass on a message that can be harmful or cruel.  Tell a trusted adult.  Teach children on social media sites how to block someone.  Never to post identifying information online.  Monitor computer use.

12  ”Private and confidential data should be collected and used only for purpose intended.  ”District shall establish data collection procedures.  ”Districts must review data privacy policy annually and notify parents and students of their rights.  ”Parents and students have the right to inspect educational records.

13  ”Districts have five (5) days to comply with parental requests to inspect.  ”Parents may request the district to explain a record.  ”Districts must provide copies of records when requested in writing.  ”Parents may use a representative to inspect the records.

14  ”Both parents have full right of access, unless a court orders otherwise.  ”Districts may charge a reasonable fee for copies, unless cost prevents parents/students from exercising their right to inspect.  ”Data privacy rights transfer to students at age 18.

15

16  The employee is guilty of a misdemeanor and is subject to criminal prosecution.  ” A violation is automatically just cause for discipline of the employee.  ” The complainant may recover significant damages plus costs and attorney’s fees.

17  "The legal right granted to an author, a composer, a playwright, a publisher, or a distributor to exclusive publication, production, sale, or distribution of a literary, musical, dramatic, or artistic work.

18  The absence of a copyright notice does not mean that there is no copyright. Copyright protection exists automatically from the moment of creation in a tangible fixed form, which is generally considered to include electronic form. A notice is not required to protect copyright.

19  Literary works (which includes computer software).  Musical works, including any accompanying words.  Dramatic works, including any accompanying music.  Pantomimes and choreographic works.  Pictorial, graphic, and sculptural works.  Motion pictures and other audiovisual works.  Sound recordings.  Architectural works.

20  Ideas, procedures, methods, systems, processes, concepts, principles, discoveries, or devices  Titles, names, short phrases, and slogans; mere listings of ingredients or contents (but some titles and words might be protected under trademark law.  Works that are not fixed in a tangible form of expression, that is not written down or otherwise recorded.  Works consisting entirely of information that is commonly available and contains no originality, from public documents or other common sources); and  Works by the US government.

21  Make the effort to be informed about computers and the Internet.  Promote the use of user names and passwords for each student at your school to help keep track of student usage.  Teach students to keep personal information, along with passwords, private Do not allow your students to use :  a webcam in a private location.  a digital camera without discussing with them acceptable use.  Do not allow your students’ pictures to be used without parental permission.

22  The copyright in a work of authorship immediately becomes the property of the author who created it at the moment it is put into fixed form.

23  Anyone who exploits any of the exclusive rights of copyright without the copyright owner's permission  If a lawsuit is brought in a court, the infringer will have to pay the copyright owner the amount of money the infringer made from using the work.  If the copyright is registered with the U.S. Copyright Office, the infringer may also have to pay copyright owner what's called statutory damages.

24

25  http://www.dosomething.org/tipsandtools/11- facts-about-cyber-bullying http://www.dosomething.org/tipsandtools/11- facts-about-cyber-bullying  http://www.copyright.gov http://www.copyright.gov  http://www.vistaprint.com/marketing-article- detail.aspx?pid=866&GP=2%2f19%2f2012+12%3a0 0%3a16+PM&GPS=2358954468&GNF=0&GPLSID = http://www.vistaprint.com/marketing-article- detail.aspx?pid=866&GP=2%2f19%2f2012+12%3a0 0%3a16+PM&GPS=2358954468&GNF=0&GPLSID =  http://www.cyberbullyingfactshq.com/ http://www.cyberbullyingfactshq.com/  http://www.schneier.com/essay-324.html http://www.schneier.com/essay-324.html  http://www.pbssocal.org/blog/?p=3076 http://www.pbssocal.org/blog/?p=3076  http://www.niot.org/nios-video/students-take- cyberbullying?gclid=CM- alOj5qK4CFbAEQAodqlpLRg http://www.niot.org/nios-video/students-take- cyberbullying?gclid=CM- alOj5qK4CFbAEQAodqlpLRg


Download ppt "What your students and Parents need to know  The ethical rules we live by also apply to technology.  Make students aware that how technology is."

Similar presentations


Ads by Google