2.) You shall not interfere with other people's compute - PowerPoint PPT Presentation

About This Presentation
Title:

2.) You shall not interfere with other people's compute

Description:

2.) You shall not interfere with other people's computer work. ... Urban Legends (e.g. kidney transplants) Unproven rumors (e.g. free coca cola) ... – PowerPoint PPT presentation

Number of Views:84
Avg rating:3.0/5.0
Slides: 19
Provided by: SYS5
Category:

less

Transcript and Presenter's Notes

Title: 2.) You shall not interfere with other people's compute


1
Port Byron Central SchoolPort Byron NY
  • Computer Ethics Presentation
  • September 2003

2
Ten Commandmentsof Computer Ethics
  • Commandment an instruction a requirement
  • Ethics a code of conduct how a person should
    live.

3
1.) You shall not use a computer to harm other
people.
  • Intentionally interfering with other peoples
    work
  • Invading the privacy of individuals

4
2.) You shall not interfere with other people's
computer work.
  • Degrading or disrupting equipment, software, or
    system performance.
  • Using resources to interfere with the proper
    operation of any computer, or destroy data.
  • Intentionally interfering with other peoples
    work
  • Invading the privacy of individuals

5
3.) You shall not snoop around in other people's
computer files.
  • Using an account owned by another user, or
    allowing another user to access your account.
    (Any problems which arise from the misuse of a
    users password will be that users
    responsibility.)
  • Invading the privacy of individuals

6
4.) You shall not use a computer to steal.
  • Using resources in any manner that violates Board
    policy, federal, state, or local law including
    unauthorized copying or transmission of software.

7
5.) You shall not use a computer to bear false
witness.
  • Initiating or forwarding chain letters.
  • Downloading, storing printing, or distributing
    files or messages that are profane, obscene,
    threatening, or that use language that offends or
    tends to degrade others.
  • Urban Legends (e.g. kidney transplants)
  • Unproven rumors (e.g. free coca cola)

8
6.) You shall not copy or use proprietary
software for which you have not paid.
  • Using resources in any manner that violates Board
    policy, federal, state, or local law including
    unauthorized copying or transmission of software.

9
7.) You shall not use other people's computer
resources without authorization or proper
compensation.
  • Using information obtained through network and
    computer resources without giving proper credit
    to the source (plagiarism).
  • Posting personal communication without the
    original authors consent.

10
8.) You shall not appropriate other people's
intellectual output.
  • Posting personal communication without the
    original authors consent.
  • Using information obtained through network and
    computer resources without giving proper credit
    to the source (plagiarism).

11
9.) You shall think about the social consequences
of the program you are writing or the system you
are designing.
  • Initiating or forwarding chain letters.
  • Downloading, storing, printing, or distributing
    files or messages that are profane, obscene,
    threatening, or that use language that offends or
    tends to degrade others.

12
 10.) You shall always use a computer in ways
that show consideration and respect for your
fellow humans.
  • Downloading, storing, printing, or distributing
    files or messages that contain information
    considered dangerous to the public at large.

13
District policy states that
  • A filtering device is in place to remove
    inappropriate materials.
  • This filter also monitors all Internet activity,
    and, network activity. Like your locker, access
    is a privilege, not a right. District officials
    or system administrators for any reason
    whatsoever may access all computerized files.
  • The district may disable a users account at any
    time for inappropriate or irresponsible behavior.
    The building administrator will determine
    penalties.

14
FURTHERMORE
  • Student access is to take place only under direct
    supervision of a responsible member of the school
    districts instructional staff.
  • Use is limited to educational purposes that are
    directly related to the curriculum which you are
    studying.
  • No software from outside sources may be loaded or
    used without written permission from the
    Technology Coordinator.

15
Photos on the Web
  • Web pages may include only the first name and the
    initial of the students last name.
  • Use of individual student pictures (video or
    still), including teachers individual web pages
    must have a signed parent/guardian approval on
    file with the Technology Coordinator for all
    students under 18 years of age. Group pictures
    may be published without approval if names are
    omitted.
  • Personal information about employees may be
    published only with their written permission.

16
CHAT and E-MAIL
  • Student users will not be allowed to join chat
    groups or discussion groups unless it is for a
    specific educational purpose and written
    permission from a parent/guardian and a staff
    member is obtained. The staff member will
    directly supervise student participation and
    ensure that the student unsubscribes when the
    purpose for the use is over.
  • Use of free e-mail accounts (yahoo, hotmail,
    etc.) is prohibited by students and staff.

17
PENALTIES
  • Depending on the nature and severity of a
    violation, a Building Administrator will take
    disciplinary action.
  • Parent contact is required.
  • If warranted, the administrator shall refer the
    case to an appropriate school, local, state, or
    federal authority for disposition.
  • If appropriate, access rights to technology will
    be denied immediately.
  • Responsibility for costs and damages may be
    incurred.

18
References
  • Ten Commandments of Computer Ethics.
    (http//courses.cs.vt.edu/cs3604/lib/WorldCodes/1
    0.Commandments.html) Computer Ethics Institute,
    Washington DC. (7 July 2003).
  • Port Byron Central School District Technology
    Code of Conduct for Students. (Adopted July
    2000.)
Write a Comment
User Comments (0)
About PowerShow.com