Presentation is loading. Please wait.

Presentation is loading. Please wait.

Janis Gatewood EDU689 January 27, 2010. Faculty and Staff COMPUTER CRIME ACT Section 16-16-20 of the Code of Laws of S.C. states that: 1. It is unlawful.

Similar presentations


Presentation on theme: "Janis Gatewood EDU689 January 27, 2010. Faculty and Staff COMPUTER CRIME ACT Section 16-16-20 of the Code of Laws of S.C. states that: 1. It is unlawful."— Presentation transcript:

1 Janis Gatewood EDU689 January 27, 2010

2 Faculty and Staff COMPUTER CRIME ACT Section 16-16-20 of the Code of Laws of S.C. states that: 1. It is unlawful for a person to willfully, knowingly, maliciously, and without authorization or for an unauthorized purpose to: a. directly or indirectly access or cause to be accessed a computer, computer system, or computer network for the purpose of: i. devising or executing a scheme or artifice to defraud; ii. obtaining money, property, or service, by means of false or fraudulent pretenses, representations, promises; or

3 Faculty and Staff iii. committing any other crime. b. alter, damage, destroy, or modify a computer, computer system, computer network, computer software, computer program, or data contained in that computer, computer system, computer program, or computer network or introduce a computer contaminant into that computer, computer system, computer program, or computer network. (7/2/2002)

4 Teachers Main goal for teachers is to improve student academic achievement through the effective use of technology. Computer programs purchased with district funds must be used with fidelity. School Districts require faculty, staff, and students to sign a technology use form as evidence in case a violation occurs. ***Take care when forwarding email. Emails that are forwarded are considered approved by the sender. ***Even though you have deleted a file, it can be recovered!

5 Computer Ethics For All The Ten Dos and Donts of Computer Ethics 1. Do not use a computer to harm other people. 2. Do not interfere with other people's computer work. 3. Do not snoop around in other people's computer files. 4. Do not use a computer to steal. 5. Do not use a computer to bear false witness. 6. Do not copy or use proprietary software for which you have not paid. 7. Do not use other people's computer resources without authorization or proper compensation. 8. Do not appropriate other people's intellectual output. 9. Do think about the social consequences of the program you are writing or the system you are designing. 10. Do always use a computer in ways that insure consideration and respect for your fellow humans

6 Student Use of Technology Students have many opportunities to use technology through the use of computers, the Internet, and the network. Filtering and monitoring software are used to restrict student access to inappropriate websites. Schools cannot be held responsible for inappropriate or offensive material and how it is used. If students are irresponsible when using the resources available to them, they may lose the privilege of their use and could be subject to disciplinary action.

7 Acceptable Use for Students Student e-mail accounts are available for educational purposes. Web pages must be about curriculum, and school-authorized activities. Students may not publish personal pages as part of school websites. Students who vandalize equipment or programs will lose use privileges. This includes creating or transmitting computer viruses, deletion or alteration of files/applications of other users, removing protection from restricted areas, or blocking access to information, applications, or areas of the network. School equipment cannot be used for commercial advertising, fundraising, or unethical/illegal solicitation. Copyrighted material may not be used without verifiable permission.

8 Acceptable Use for Students Students must not send or knowingly receive messages/ information that violates the school's behavior code, including inappropriate, offensive, and/or disruptive messages or information. Purchases must not be made with a credit card. Do not access, attempt to access, and/or alter information in restricted areas of any network. Do not download or load any software or applications without permission from the building network administrator.

9 References Horry County Schools.(n.d.) Personnel Handbook. January 15, 2011.www.horrycountyschools.net S.C. State Department of Education. (n.d.) Technology Services. January 15, 2011, http://ed.sc.gov/agency/Accountability/Technology- Services/ http://ed.sc.gov/agency/Accountability/Technology- Services/ Computer Ethics Inst


Download ppt "Janis Gatewood EDU689 January 27, 2010. Faculty and Staff COMPUTER CRIME ACT Section 16-16-20 of the Code of Laws of S.C. states that: 1. It is unlawful."

Similar presentations


Ads by Google