SlideShare a Scribd company logo
1 of 21
LEGAL AND ETHICAL USE OF TECHNOLOGY
CHAPTER 8
PRESENTED BY: MARTIN JON E. BARNACHIA
 Technology and software issues are elaborated for you to
be aware and be guided in doing the right thing and
avoiding the unacceptable acts that may lead you to
committing mistakes or possible software and technology
crimes that’s against the law
ETHICAL USE OF SCHOOL TECHNOLOGY
 When we are young, our parents used to teach us the
right behavior and etiquette. Even in schools and classes,
there are certain behaviors and ethics we need to
observe to achieve a healthy relationships with teachers
and classmates.
ETHICS FOR COMPUTER USERS
1. Use the computer to help people and not to do harm.
2. Use your own or assigned computer unit and not to interfere with others’ work.
3. Us the computer using your own files and not to use others’ files.
4. Us the computer to share information and not to steal others’ information.
5. Use the computer to spread truthful information and not to do character assassination.
6. Use software that are original and legal and not pirated.
7. Use others’ computer resources with permission and not to duplicate it without
authorization.
8. Use your own work and not the work of others.
9. Use the computer that shows respect and consideration for other people and not to do
cyberbullying.
10. Create programs or software having in mind its social impact and not for self-interest.
ETHICAL ISSUES IN TECHNOLOGY AND SOFTWARE
 Unauthorized Access and Use of Hardware, Software, Network,
and Computer Files
 If somebody would use anybody’s computer and files without permission
from the owner, that is called unauthorized access. A person is called a
cracker or a hacker if he/she tries to access a computer or network
illegally to access data and commit malicious acts like identity theft.
 Hacker originally means a computer enthusiast who does well in
computer that benefits other people. However, the term hacker now has
an adverse connotation which refers to a person who breaks into the
computer system to steal or corrupt the data in it.
TIPS IN CREATING A PASSWORD
 Use at least 8 characters.
 Use a combination of upper and lower case letters, words,
numbers and special characters.
 Use joined words together.
 Add one or more numbers at the beginning, middle, or
end of a word.
 Use words from other languages.
 Use a password that can be remembered easily.
 Select a password that can be entered easily even without
looking at the keyboard.
 Do not leave written copies of your passwords anywhere.
 Do not share your password to anyone.
HARDWARE THEFT AND VANDALISM
 Computer Theft – stealing of hardware
and its devices
 Computer Vandalism – act of damaging
or breaking the hardware, cutting the
cables and wires, smashing the computer
and its devices, and deleting of software
or computer files.
SOFTWARE THEFT
 Software piracy is a
form of software theft.
This happens when a
person copies illegally
copyrighted software
for personal or business
use.
EULA (END-USER LICENSE AGREEMENT)
 Single-user license agreement – the common type of license
included in software packages purchased by an individual. Some
of the conditions are:
 Users may install the software on only one computer.
 Users are prohibited to install the software on a network (school computer
lab network)
 Users may make one copy for backup purposes.
 Users are prohibited to give copies to friends and colleagues.
 Going against the
agreement is a violation
of copyright law, thus,
committing a federal
crime. In US, penalties
reach up to $250,000
and up to five years in
jail. In the Philippines,
penalties reach up to
Php1,500,000 and up to
6-9 years imprisonment.
INFORMATION THEFT
 A computer crime when one deliberately steals information for
purposes of studying how to compete with other organizations
or company.
 Encryption is the process of converting readable data to
unreadable one. An encryption key is needed to enable the
person to convert it back in readable form.
MALICIOUS ACT IN SOFTWARE
 Spam – unsolicited junk email sent indiscriminately in bulk, often
for commercial purposes. Much of it is sent by botnets, networks
of virus-infected computers, complicating the process of tracking
down the spammers. According to various estimates, about 80%
of all email in the world may be spam.
 Phishing - a term used to describe a malicious individual or group
of individuals who scam users. They do so by sending e-mails or
creating web pages that are designed to collect an individual's
online bank, credit card, or other login information. Also called as
carding or spoofing.
 Malware - short for
“malicious software” - computer
programs designed to infiltrate
and damage computers without
the users consent. “Malware” is
the general term covering all the
different types of threats to
your computer safety such as
viruses, spyware, worms, trojans,
rootkits and so on.
 Adware - frequently used to
describe a form of malware
(malicious software) which
presents unwanted
advertisements to the user of
a computer. The
advertisements produced
by adware are sometimes in the
form of a pop-up or sometimes
in an "unclosable window".
Educational Technology Chapter 8
Educational Technology Chapter 8
Educational Technology Chapter 8
Educational Technology Chapter 8

More Related Content

What's hot

Basic Concept in Assessment
Basic Concept in AssessmentBasic Concept in Assessment
Basic Concept in AssessmentJarry Fuentes
 
Instructional materials & ict
Instructional materials & ictInstructional materials & ict
Instructional materials & ictBright Micah
 
Republic act no.7836
Republic act no.7836Republic act no.7836
Republic act no.7836Ben Parish
 
Code of Ethics for Professional Teachers of the Philippines
Code of Ethics for Professional Teachers of the PhilippinesCode of Ethics for Professional Teachers of the Philippines
Code of Ethics for Professional Teachers of the PhilippinesJohn Bernal
 
ASSURE MODEL POWERPOINT
ASSURE MODEL POWERPOINTASSURE MODEL POWERPOINT
ASSURE MODEL POWERPOINTXtine Kurisutein
 
12 Principles of High Quality Assessments (Version 2)
12 Principles of High Quality Assessments (Version 2)12 Principles of High Quality Assessments (Version 2)
12 Principles of High Quality Assessments (Version 2)Mr. Ronald Quileste, PhD
 
Network security threats and solutions
Network security threats and solutionsNetwork security threats and solutions
Network security threats and solutionshassanmughal4u
 
Brief lesson plan - Gerund
Brief lesson plan - GerundBrief lesson plan - Gerund
Brief lesson plan - GerundAubrey Rose
 
Technology in Teaching and Learning
Technology in Teaching and LearningTechnology in Teaching and Learning
Technology in Teaching and LearningDr.G.Muppudathi Ph.D.
 
ICT POLICIES, ICT SAFETY ISSUES AND USES OF ICT IN TEACHING AND LEARNING
ICT POLICIES, ICT SAFETY ISSUES AND USES OF ICT IN TEACHING AND LEARNINGICT POLICIES, ICT SAFETY ISSUES AND USES OF ICT IN TEACHING AND LEARNING
ICT POLICIES, ICT SAFETY ISSUES AND USES OF ICT IN TEACHING AND LEARNINGAllan Lloyd Martinez
 
Module 2 lesson 2
Module 2 lesson 2Module 2 lesson 2
Module 2 lesson 2Ira Sagu
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpointgalaxy201
 
Assure lesson plan 21st century
Assure lesson plan 21st centuryAssure lesson plan 21st century
Assure lesson plan 21st centurycampbellkimone
 
Digital law
Digital lawDigital law
Digital lawAlieyn_
 
Educational Technology 2: The computer as a tutor
Educational Technology 2: The computer as a tutor Educational Technology 2: The computer as a tutor
Educational Technology 2: The computer as a tutor Alyssa Denise Valino
 
Grading and reporting
Grading and reportingGrading and reporting
Grading and reportingReynel Dan
 
Safety issues with ict
Safety issues with ictSafety issues with ict
Safety issues with ictcomputers 11
 
Teaching profession (Historical Perspective of Philippine Educational System)
Teaching profession (Historical Perspective of Philippine Educational System)Teaching profession (Historical Perspective of Philippine Educational System)
Teaching profession (Historical Perspective of Philippine Educational System)Franzelle Mae Lignes
 

What's hot (20)

Basic Concept in Assessment
Basic Concept in AssessmentBasic Concept in Assessment
Basic Concept in Assessment
 
Instructional materials & ict
Instructional materials & ictInstructional materials & ict
Instructional materials & ict
 
Republic act no.7836
Republic act no.7836Republic act no.7836
Republic act no.7836
 
Code of Ethics for Professional Teachers of the Philippines
Code of Ethics for Professional Teachers of the PhilippinesCode of Ethics for Professional Teachers of the Philippines
Code of Ethics for Professional Teachers of the Philippines
 
ASSURE MODEL POWERPOINT
ASSURE MODEL POWERPOINTASSURE MODEL POWERPOINT
ASSURE MODEL POWERPOINT
 
12 Principles of High Quality Assessments (Version 2)
12 Principles of High Quality Assessments (Version 2)12 Principles of High Quality Assessments (Version 2)
12 Principles of High Quality Assessments (Version 2)
 
Network security threats and solutions
Network security threats and solutionsNetwork security threats and solutions
Network security threats and solutions
 
Brief lesson plan - Gerund
Brief lesson plan - GerundBrief lesson plan - Gerund
Brief lesson plan - Gerund
 
Technology in Teaching and Learning
Technology in Teaching and LearningTechnology in Teaching and Learning
Technology in Teaching and Learning
 
ICT POLICIES, ICT SAFETY ISSUES AND USES OF ICT IN TEACHING AND LEARNING
ICT POLICIES, ICT SAFETY ISSUES AND USES OF ICT IN TEACHING AND LEARNINGICT POLICIES, ICT SAFETY ISSUES AND USES OF ICT IN TEACHING AND LEARNING
ICT POLICIES, ICT SAFETY ISSUES AND USES OF ICT IN TEACHING AND LEARNING
 
Educational Technology 1 Technology in Education
Educational Technology 1 Technology in EducationEducational Technology 1 Technology in Education
Educational Technology 1 Technology in Education
 
Module 2 lesson 2
Module 2 lesson 2Module 2 lesson 2
Module 2 lesson 2
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
Assure lesson plan 21st century
Assure lesson plan 21st centuryAssure lesson plan 21st century
Assure lesson plan 21st century
 
Digital law
Digital lawDigital law
Digital law
 
Final narrative
Final narrativeFinal narrative
Final narrative
 
Educational Technology 2: The computer as a tutor
Educational Technology 2: The computer as a tutor Educational Technology 2: The computer as a tutor
Educational Technology 2: The computer as a tutor
 
Grading and reporting
Grading and reportingGrading and reporting
Grading and reporting
 
Safety issues with ict
Safety issues with ictSafety issues with ict
Safety issues with ict
 
Teaching profession (Historical Perspective of Philippine Educational System)
Teaching profession (Historical Perspective of Philippine Educational System)Teaching profession (Historical Perspective of Philippine Educational System)
Teaching profession (Historical Perspective of Philippine Educational System)
 

Similar to Educational Technology Chapter 8

LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxAnnMarieTAquinoII
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptxglorysunny
 
TEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptxTEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptxhenrysales6
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of NetiquetteACLC Antipolo
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of itsr24production
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionHannah323676
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9NehaRohtagi1
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxMdRuga
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Dr. Khaled Bakro
 
Living in the IT Era - Lesson 4.pptx
Living in the IT Era - Lesson 4.pptxLiving in the IT Era - Lesson 4.pptx
Living in the IT Era - Lesson 4.pptxFroilan Cantillo
 
Cyber Law and Cyber Crime
Cyber Law and Cyber CrimeCyber Law and Cyber Crime
Cyber Law and Cyber CrimeSyangba132
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2JeffUrgelles
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of NetiquetteRochelle Nato
 

Similar to Educational Technology Chapter 8 (20)

LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
TEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptxTEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptx
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Computer
ComputerComputer
Computer
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of Netiquette
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
 
Living in the IT Era - Lesson 4.pptx
Living in the IT Era - Lesson 4.pptxLiving in the IT Era - Lesson 4.pptx
Living in the IT Era - Lesson 4.pptx
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Cyber Law and Cyber Crime
Cyber Law and Cyber CrimeCyber Law and Cyber Crime
Cyber Law and Cyber Crime
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 

More from Martin Jon Barnachia

More from Martin Jon Barnachia (14)

Filipino - Komunikasyon
Filipino - KomunikasyonFilipino - Komunikasyon
Filipino - Komunikasyon
 
Environmental Science - Biogeochemical Cycle
Environmental Science - Biogeochemical CycleEnvironmental Science - Biogeochemical Cycle
Environmental Science - Biogeochemical Cycle
 
Gender Sensitivity
Gender SensitivityGender Sensitivity
Gender Sensitivity
 
Chistology - Johannine Christology
Chistology - Johannine ChristologyChistology - Johannine Christology
Chistology - Johannine Christology
 
World religion - New Movements in Japan
World religion - New Movements in JapanWorld religion - New Movements in Japan
World religion - New Movements in Japan
 
World Religion - Hinduism
World Religion - HinduismWorld Religion - Hinduism
World Religion - Hinduism
 
Developmental Reading
Developmental ReadingDevelopmental Reading
Developmental Reading
 
Educational Technology Chapter 7
Educational Technology Chapter 7Educational Technology Chapter 7
Educational Technology Chapter 7
 
Educational Technology 2 Chapter 5
Educational Technology 2 Chapter 5Educational Technology 2 Chapter 5
Educational Technology 2 Chapter 5
 
Legal Foundation of Education
Legal Foundation of EducationLegal Foundation of Education
Legal Foundation of Education
 
Social institutions
Social institutionsSocial institutions
Social institutions
 
Connectionism Theory
Connectionism TheoryConnectionism Theory
Connectionism Theory
 
The teaching proffession
The teaching proffessionThe teaching proffession
The teaching proffession
 
Rizal in Paris
Rizal in ParisRizal in Paris
Rizal in Paris
 

Recently uploaded

Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 

Recently uploaded (20)

Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 

Educational Technology Chapter 8

  • 1. LEGAL AND ETHICAL USE OF TECHNOLOGY CHAPTER 8 PRESENTED BY: MARTIN JON E. BARNACHIA
  • 2.  Technology and software issues are elaborated for you to be aware and be guided in doing the right thing and avoiding the unacceptable acts that may lead you to committing mistakes or possible software and technology crimes that’s against the law
  • 3. ETHICAL USE OF SCHOOL TECHNOLOGY  When we are young, our parents used to teach us the right behavior and etiquette. Even in schools and classes, there are certain behaviors and ethics we need to observe to achieve a healthy relationships with teachers and classmates.
  • 4. ETHICS FOR COMPUTER USERS 1. Use the computer to help people and not to do harm. 2. Use your own or assigned computer unit and not to interfere with others’ work. 3. Us the computer using your own files and not to use others’ files. 4. Us the computer to share information and not to steal others’ information. 5. Use the computer to spread truthful information and not to do character assassination. 6. Use software that are original and legal and not pirated. 7. Use others’ computer resources with permission and not to duplicate it without authorization. 8. Use your own work and not the work of others. 9. Use the computer that shows respect and consideration for other people and not to do cyberbullying. 10. Create programs or software having in mind its social impact and not for self-interest.
  • 5. ETHICAL ISSUES IN TECHNOLOGY AND SOFTWARE  Unauthorized Access and Use of Hardware, Software, Network, and Computer Files  If somebody would use anybody’s computer and files without permission from the owner, that is called unauthorized access. A person is called a cracker or a hacker if he/she tries to access a computer or network illegally to access data and commit malicious acts like identity theft.  Hacker originally means a computer enthusiast who does well in computer that benefits other people. However, the term hacker now has an adverse connotation which refers to a person who breaks into the computer system to steal or corrupt the data in it.
  • 6. TIPS IN CREATING A PASSWORD  Use at least 8 characters.  Use a combination of upper and lower case letters, words, numbers and special characters.  Use joined words together.  Add one or more numbers at the beginning, middle, or end of a word.  Use words from other languages.  Use a password that can be remembered easily.  Select a password that can be entered easily even without looking at the keyboard.  Do not leave written copies of your passwords anywhere.  Do not share your password to anyone.
  • 7. HARDWARE THEFT AND VANDALISM  Computer Theft – stealing of hardware and its devices  Computer Vandalism – act of damaging or breaking the hardware, cutting the cables and wires, smashing the computer and its devices, and deleting of software or computer files.
  • 8. SOFTWARE THEFT  Software piracy is a form of software theft. This happens when a person copies illegally copyrighted software for personal or business use.
  • 9. EULA (END-USER LICENSE AGREEMENT)  Single-user license agreement – the common type of license included in software packages purchased by an individual. Some of the conditions are:  Users may install the software on only one computer.  Users are prohibited to install the software on a network (school computer lab network)  Users may make one copy for backup purposes.  Users are prohibited to give copies to friends and colleagues.
  • 10.  Going against the agreement is a violation of copyright law, thus, committing a federal crime. In US, penalties reach up to $250,000 and up to five years in jail. In the Philippines, penalties reach up to Php1,500,000 and up to 6-9 years imprisonment.
  • 11.
  • 12.
  • 13. INFORMATION THEFT  A computer crime when one deliberately steals information for purposes of studying how to compete with other organizations or company.  Encryption is the process of converting readable data to unreadable one. An encryption key is needed to enable the person to convert it back in readable form.
  • 14. MALICIOUS ACT IN SOFTWARE  Spam – unsolicited junk email sent indiscriminately in bulk, often for commercial purposes. Much of it is sent by botnets, networks of virus-infected computers, complicating the process of tracking down the spammers. According to various estimates, about 80% of all email in the world may be spam.
  • 15.  Phishing - a term used to describe a malicious individual or group of individuals who scam users. They do so by sending e-mails or creating web pages that are designed to collect an individual's online bank, credit card, or other login information. Also called as carding or spoofing.
  • 16.  Malware - short for “malicious software” - computer programs designed to infiltrate and damage computers without the users consent. “Malware” is the general term covering all the different types of threats to your computer safety such as viruses, spyware, worms, trojans, rootkits and so on.
  • 17.  Adware - frequently used to describe a form of malware (malicious software) which presents unwanted advertisements to the user of a computer. The advertisements produced by adware are sometimes in the form of a pop-up or sometimes in an "unclosable window".