Title: 2.) You shall not interfere with other people's compute
1Port Byron Central SchoolPort Byron NY
- Computer Ethics Presentation
- September 2003
2Ten Commandmentsof Computer Ethics
- Commandment an instruction a requirement
- Ethics a code of conduct how a person should
live.
31.) You shall not use a computer to harm other
people.
- Intentionally interfering with other peoples
work - Invading the privacy of individuals
42.) You shall not interfere with other people's
computer work.
- Degrading or disrupting equipment, software, or
system performance. - Using resources to interfere with the proper
operation of any computer, or destroy data. - Intentionally interfering with other peoples
work - Invading the privacy of individuals
53.) You shall not snoop around in other people's
computer files.
- Using an account owned by another user, or
allowing another user to access your account.
(Any problems which arise from the misuse of a
users password will be that users
responsibility.) - Invading the privacy of individuals
64.) You shall not use a computer to steal.
- Using resources in any manner that violates Board
policy, federal, state, or local law including
unauthorized copying or transmission of software.
75.) You shall not use a computer to bear false
witness.
- Initiating or forwarding chain letters.
- Downloading, storing printing, or distributing
files or messages that are profane, obscene,
threatening, or that use language that offends or
tends to degrade others. - Urban Legends (e.g. kidney transplants)
- Unproven rumors (e.g. free coca cola)
86.) You shall not copy or use proprietary
software for which you have not paid.
- Using resources in any manner that violates Board
policy, federal, state, or local law including
unauthorized copying or transmission of software.
97.) You shall not use other people's computer
resources without authorization or proper
compensation.
- Using information obtained through network and
computer resources without giving proper credit
to the source (plagiarism). - Posting personal communication without the
original authors consent.
108.) You shall not appropriate other people's
intellectual output.
- Posting personal communication without the
original authors consent. - Using information obtained through network and
computer resources without giving proper credit
to the source (plagiarism).
119.) You shall think about the social consequences
of the program you are writing or the system you
are designing.
- Initiating or forwarding chain letters.
- Downloading, storing, printing, or distributing
files or messages that are profane, obscene,
threatening, or that use language that offends or
tends to degrade others.
12Â 10.) You shall always use a computer in ways
that show consideration and respect for your
fellow humans.
- Downloading, storing, printing, or distributing
files or messages that contain information
considered dangerous to the public at large.
13District policy states that
- A filtering device is in place to remove
inappropriate materials. - This filter also monitors all Internet activity,
and, network activity. Like your locker, access
is a privilege, not a right. District officials
or system administrators for any reason
whatsoever may access all computerized files. - The district may disable a users account at any
time for inappropriate or irresponsible behavior.
The building administrator will determine
penalties.
14FURTHERMORE
- Student access is to take place only under direct
supervision of a responsible member of the school
districts instructional staff. - Use is limited to educational purposes that are
directly related to the curriculum which you are
studying. - No software from outside sources may be loaded or
used without written permission from the
Technology Coordinator.
15Photos on the Web
- Web pages may include only the first name and the
initial of the students last name. - Use of individual student pictures (video or
still), including teachers individual web pages
must have a signed parent/guardian approval on
file with the Technology Coordinator for all
students under 18 years of age. Group pictures
may be published without approval if names are
omitted. - Personal information about employees may be
published only with their written permission.
16CHAT and E-MAIL
- Student users will not be allowed to join chat
groups or discussion groups unless it is for a
specific educational purpose and written
permission from a parent/guardian and a staff
member is obtained. The staff member will
directly supervise student participation and
ensure that the student unsubscribes when the
purpose for the use is over. - Use of free e-mail accounts (yahoo, hotmail,
etc.) is prohibited by students and staff.
17PENALTIES
- Depending on the nature and severity of a
violation, a Building Administrator will take
disciplinary action. - Parent contact is required.
- If warranted, the administrator shall refer the
case to an appropriate school, local, state, or
federal authority for disposition. - If appropriate, access rights to technology will
be denied immediately. - Responsibility for costs and damages may be
incurred.
18References
- Ten Commandments of Computer Ethics.
(http//courses.cs.vt.edu/cs3604/lib/WorldCodes/1
0.Commandments.html) Computer Ethics Institute,
Washington DC. (7 July 2003). - Port Byron Central School District Technology
Code of Conduct for Students. (Adopted July
2000.)