SlideShare a Scribd company logo
LEGAL AND ETHICAL USE OF TECHNOLOGY
CHAPTER 8
PRESENTED BY: MARTIN JON E. BARNACHIA
 Technology and software issues are elaborated for you to
be aware and be guided in doing the right thing and
avoiding the unacceptable acts that may lead you to
committing mistakes or possible software and technology
crimes that’s against the law
ETHICAL USE OF SCHOOL TECHNOLOGY
 When we are young, our parents used to teach us the
right behavior and etiquette. Even in schools and classes,
there are certain behaviors and ethics we need to
observe to achieve a healthy relationships with teachers
and classmates.
ETHICS FOR COMPUTER USERS
1. Use the computer to help people and not to do harm.
2. Use your own or assigned computer unit and not to interfere with others’ work.
3. Us the computer using your own files and not to use others’ files.
4. Us the computer to share information and not to steal others’ information.
5. Use the computer to spread truthful information and not to do character assassination.
6. Use software that are original and legal and not pirated.
7. Use others’ computer resources with permission and not to duplicate it without
authorization.
8. Use your own work and not the work of others.
9. Use the computer that shows respect and consideration for other people and not to do
cyberbullying.
10. Create programs or software having in mind its social impact and not for self-interest.
ETHICAL ISSUES IN TECHNOLOGY AND SOFTWARE
 Unauthorized Access and Use of Hardware, Software, Network,
and Computer Files
 If somebody would use anybody’s computer and files without permission
from the owner, that is called unauthorized access. A person is called a
cracker or a hacker if he/she tries to access a computer or network
illegally to access data and commit malicious acts like identity theft.
 Hacker originally means a computer enthusiast who does well in
computer that benefits other people. However, the term hacker now has
an adverse connotation which refers to a person who breaks into the
computer system to steal or corrupt the data in it.
TIPS IN CREATING A PASSWORD
 Use at least 8 characters.
 Use a combination of upper and lower case letters, words,
numbers and special characters.
 Use joined words together.
 Add one or more numbers at the beginning, middle, or
end of a word.
 Use words from other languages.
 Use a password that can be remembered easily.
 Select a password that can be entered easily even without
looking at the keyboard.
 Do not leave written copies of your passwords anywhere.
 Do not share your password to anyone.
HARDWARE THEFT AND VANDALISM
 Computer Theft – stealing of hardware
and its devices
 Computer Vandalism – act of damaging
or breaking the hardware, cutting the
cables and wires, smashing the computer
and its devices, and deleting of software
or computer files.
SOFTWARE THEFT
 Software piracy is a
form of software theft.
This happens when a
person copies illegally
copyrighted software
for personal or business
use.
EULA (END-USER LICENSE AGREEMENT)
 Single-user license agreement – the common type of license
included in software packages purchased by an individual. Some
of the conditions are:
 Users may install the software on only one computer.
 Users are prohibited to install the software on a network (school computer
lab network)
 Users may make one copy for backup purposes.
 Users are prohibited to give copies to friends and colleagues.
 Going against the
agreement is a violation
of copyright law, thus,
committing a federal
crime. In US, penalties
reach up to $250,000
and up to five years in
jail. In the Philippines,
penalties reach up to
Php1,500,000 and up to
6-9 years imprisonment.
INFORMATION THEFT
 A computer crime when one deliberately steals information for
purposes of studying how to compete with other organizations
or company.
 Encryption is the process of converting readable data to
unreadable one. An encryption key is needed to enable the
person to convert it back in readable form.
MALICIOUS ACT IN SOFTWARE
 Spam – unsolicited junk email sent indiscriminately in bulk, often
for commercial purposes. Much of it is sent by botnets, networks
of virus-infected computers, complicating the process of tracking
down the spammers. According to various estimates, about 80%
of all email in the world may be spam.
 Phishing - a term used to describe a malicious individual or group
of individuals who scam users. They do so by sending e-mails or
creating web pages that are designed to collect an individual's
online bank, credit card, or other login information. Also called as
carding or spoofing.
 Malware - short for
“malicious software” - computer
programs designed to infiltrate
and damage computers without
the users consent. “Malware” is
the general term covering all the
different types of threats to
your computer safety such as
viruses, spyware, worms, trojans,
rootkits and so on.
 Adware - frequently used to
describe a form of malware
(malicious software) which
presents unwanted
advertisements to the user of
a computer. The
advertisements produced
by adware are sometimes in the
form of a pop-up or sometimes
in an "unclosable window".
Educational Technology Chapter 8
Educational Technology Chapter 8
Educational Technology Chapter 8
Educational Technology Chapter 8

More Related Content

What's hot

Code of ethics for teachers
Code of ethics for teachersCode of ethics for teachers
Code of ethics for teachers
De La Salle University
 
Alternative delivery modes
Alternative delivery modesAlternative delivery modes
Alternative delivery modes
Analyn Carag
 
SCHOOL-POLICIES
SCHOOL-POLICIESSCHOOL-POLICIES
SCHOOL-POLICIES
JulielynMAmano
 
Code of Ethics for Teachers
Code of Ethics for Teachers Code of Ethics for Teachers
Code of Ethics for Teachers
Neilson Silva
 
Ethical issues in education
Ethical issues in educationEthical issues in education
Ethical issues in education
Marie Amirtharaj
 
Instructional materials & ict
Instructional materials & ictInstructional materials & ict
Instructional materials & ict
Bright Micah
 
Batas pambansa 232
Batas pambansa 232Batas pambansa 232
Batas pambansa 232
Alice Victor
 
Legal bases of the education system
Legal bases of the education systemLegal bases of the education system
Legal bases of the education system
Keith Pineda
 
Cooperative Administration and Supervision Principles and Practices
Cooperative Administration and Supervision Principles and PracticesCooperative Administration and Supervision Principles and Practices
Cooperative Administration and Supervision Principles and Practices
Mirea Mizushima
 
Assessment of learning 1
Assessment of learning 1Assessment of learning 1
Assessment of learning 1
Roxanne Tiffany Dotillos
 
The teacher in the classroom and community
The teacher in the classroom and communityThe teacher in the classroom and community
The teacher in the classroom and community
Angelie Tugaoen
 
Bringing the world into the classroom through educational technology
Bringing the world into the classroom through educational technologyBringing the world into the classroom through educational technology
Bringing the world into the classroom through educational technology
Annie Claire Camangeg
 
Parent teacher association
Parent teacher associationParent teacher association
Parent teacher association
bhinkley
 
Integrating technology into the curriculum
Integrating technology into the  curriculumIntegrating technology into the  curriculum
Integrating technology into the curriculum
Dr. Hina Kaynat
 
Integrating technology in teaching
Integrating technology in teachingIntegrating technology in teaching
Integrating technology in teaching
Carlo Magno
 
School policies, procedures and contracts
School policies, procedures and contractsSchool policies, procedures and contracts
School policies, procedures and contracts
Harleen Singh
 
Problems and Issues in Philippine Education
Problems and Issues in Philippine EducationProblems and Issues in Philippine Education
Problems and Issues in Philippine Education
Grace Veridiano
 
Non-Formal Education in the Philippines
Non-Formal Education in the PhilippinesNon-Formal Education in the Philippines
Non-Formal Education in the Philippines
Jaja Manalaysay-Cruz
 
Multiple Functions of School
Multiple Functions of SchoolMultiple Functions of School
Multiple Functions of School
Abbie Laudato
 
Code of Ethics for Professional Teachers
Code of Ethics for Professional TeachersCode of Ethics for Professional Teachers
Code of Ethics for Professional Teachers
Jolieto Cambalo Caparida
 

What's hot (20)

Code of ethics for teachers
Code of ethics for teachersCode of ethics for teachers
Code of ethics for teachers
 
Alternative delivery modes
Alternative delivery modesAlternative delivery modes
Alternative delivery modes
 
SCHOOL-POLICIES
SCHOOL-POLICIESSCHOOL-POLICIES
SCHOOL-POLICIES
 
Code of Ethics for Teachers
Code of Ethics for Teachers Code of Ethics for Teachers
Code of Ethics for Teachers
 
Ethical issues in education
Ethical issues in educationEthical issues in education
Ethical issues in education
 
Instructional materials & ict
Instructional materials & ictInstructional materials & ict
Instructional materials & ict
 
Batas pambansa 232
Batas pambansa 232Batas pambansa 232
Batas pambansa 232
 
Legal bases of the education system
Legal bases of the education systemLegal bases of the education system
Legal bases of the education system
 
Cooperative Administration and Supervision Principles and Practices
Cooperative Administration and Supervision Principles and PracticesCooperative Administration and Supervision Principles and Practices
Cooperative Administration and Supervision Principles and Practices
 
Assessment of learning 1
Assessment of learning 1Assessment of learning 1
Assessment of learning 1
 
The teacher in the classroom and community
The teacher in the classroom and communityThe teacher in the classroom and community
The teacher in the classroom and community
 
Bringing the world into the classroom through educational technology
Bringing the world into the classroom through educational technologyBringing the world into the classroom through educational technology
Bringing the world into the classroom through educational technology
 
Parent teacher association
Parent teacher associationParent teacher association
Parent teacher association
 
Integrating technology into the curriculum
Integrating technology into the  curriculumIntegrating technology into the  curriculum
Integrating technology into the curriculum
 
Integrating technology in teaching
Integrating technology in teachingIntegrating technology in teaching
Integrating technology in teaching
 
School policies, procedures and contracts
School policies, procedures and contractsSchool policies, procedures and contracts
School policies, procedures and contracts
 
Problems and Issues in Philippine Education
Problems and Issues in Philippine EducationProblems and Issues in Philippine Education
Problems and Issues in Philippine Education
 
Non-Formal Education in the Philippines
Non-Formal Education in the PhilippinesNon-Formal Education in the Philippines
Non-Formal Education in the Philippines
 
Multiple Functions of School
Multiple Functions of SchoolMultiple Functions of School
Multiple Functions of School
 
Code of Ethics for Professional Teachers
Code of Ethics for Professional TeachersCode of Ethics for Professional Teachers
Code of Ethics for Professional Teachers
 

Similar to Educational Technology Chapter 8

LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
AnnMarieTAquinoII
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
glorysunny
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
Alomgir Hossain
 
TEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptxTEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptx
henrysales6
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
guest65a1c4
 
Computer
ComputerComputer
Computer
faisalbhatti
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
Lakshan Bamunusinghe
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
sr24production
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
Hannah323676
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
NehaRohtagi1
 
Nfwordle
NfwordleNfwordle
Nfwordle
Nadine Fray
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
MdRuga
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Dr. Khaled Bakro
 
Living in the IT Era - Lesson 4.pptx
Living in the IT Era - Lesson 4.pptxLiving in the IT Era - Lesson 4.pptx
Living in the IT Era - Lesson 4.pptx
Froilan Cantillo
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
santosh26kumar2003
 
Cyber Law and Cyber Crime
Cyber Law and Cyber CrimeCyber Law and Cyber Crime
Cyber Law and Cyber Crime
Syangba132
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
Rubi Orbeta
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
JeffUrgelles
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
Rochelle Nato
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
zahid_ned
 

Similar to Educational Technology Chapter 8 (20)

LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
TEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptxTEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptx
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Computer
ComputerComputer
Computer
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
 
Living in the IT Era - Lesson 4.pptx
Living in the IT Era - Lesson 4.pptxLiving in the IT Era - Lesson 4.pptx
Living in the IT Era - Lesson 4.pptx
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Cyber Law and Cyber Crime
Cyber Law and Cyber CrimeCyber Law and Cyber Crime
Cyber Law and Cyber Crime
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

More from Martin Jon Barnachia

Filipino - Komunikasyon
Filipino - KomunikasyonFilipino - Komunikasyon
Filipino - Komunikasyon
Martin Jon Barnachia
 
Environmental Science - Biogeochemical Cycle
Environmental Science - Biogeochemical CycleEnvironmental Science - Biogeochemical Cycle
Environmental Science - Biogeochemical Cycle
Martin Jon Barnachia
 
Gender Sensitivity
Gender SensitivityGender Sensitivity
Gender Sensitivity
Martin Jon Barnachia
 
Chistology - Johannine Christology
Chistology - Johannine ChristologyChistology - Johannine Christology
Chistology - Johannine Christology
Martin Jon Barnachia
 
World religion - New Movements in Japan
World religion - New Movements in JapanWorld religion - New Movements in Japan
World religion - New Movements in Japan
Martin Jon Barnachia
 
World Religion - Hinduism
World Religion - HinduismWorld Religion - Hinduism
World Religion - Hinduism
Martin Jon Barnachia
 
Developmental Reading
Developmental ReadingDevelopmental Reading
Developmental Reading
Martin Jon Barnachia
 
Educational Technology Chapter 7
Educational Technology Chapter 7Educational Technology Chapter 7
Educational Technology Chapter 7
Martin Jon Barnachia
 
Educational Technology 2 Chapter 5
Educational Technology 2 Chapter 5Educational Technology 2 Chapter 5
Educational Technology 2 Chapter 5
Martin Jon Barnachia
 
Legal Foundation of Education
Legal Foundation of EducationLegal Foundation of Education
Legal Foundation of Education
Martin Jon Barnachia
 
Social institutions
Social institutionsSocial institutions
Social institutions
Martin Jon Barnachia
 
Connectionism Theory
Connectionism TheoryConnectionism Theory
Connectionism Theory
Martin Jon Barnachia
 
The teaching proffession
The teaching proffessionThe teaching proffession
The teaching proffession
Martin Jon Barnachia
 
Rizal in Paris
Rizal in ParisRizal in Paris
Rizal in Paris
Martin Jon Barnachia
 

More from Martin Jon Barnachia (14)

Filipino - Komunikasyon
Filipino - KomunikasyonFilipino - Komunikasyon
Filipino - Komunikasyon
 
Environmental Science - Biogeochemical Cycle
Environmental Science - Biogeochemical CycleEnvironmental Science - Biogeochemical Cycle
Environmental Science - Biogeochemical Cycle
 
Gender Sensitivity
Gender SensitivityGender Sensitivity
Gender Sensitivity
 
Chistology - Johannine Christology
Chistology - Johannine ChristologyChistology - Johannine Christology
Chistology - Johannine Christology
 
World religion - New Movements in Japan
World religion - New Movements in JapanWorld religion - New Movements in Japan
World religion - New Movements in Japan
 
World Religion - Hinduism
World Religion - HinduismWorld Religion - Hinduism
World Religion - Hinduism
 
Developmental Reading
Developmental ReadingDevelopmental Reading
Developmental Reading
 
Educational Technology Chapter 7
Educational Technology Chapter 7Educational Technology Chapter 7
Educational Technology Chapter 7
 
Educational Technology 2 Chapter 5
Educational Technology 2 Chapter 5Educational Technology 2 Chapter 5
Educational Technology 2 Chapter 5
 
Legal Foundation of Education
Legal Foundation of EducationLegal Foundation of Education
Legal Foundation of Education
 
Social institutions
Social institutionsSocial institutions
Social institutions
 
Connectionism Theory
Connectionism TheoryConnectionism Theory
Connectionism Theory
 
The teaching proffession
The teaching proffessionThe teaching proffession
The teaching proffession
 
Rizal in Paris
Rizal in ParisRizal in Paris
Rizal in Paris
 

Recently uploaded

How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
Kavitha Krishnan
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 

Recently uploaded (20)

How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 

Educational Technology Chapter 8

  • 1. LEGAL AND ETHICAL USE OF TECHNOLOGY CHAPTER 8 PRESENTED BY: MARTIN JON E. BARNACHIA
  • 2.  Technology and software issues are elaborated for you to be aware and be guided in doing the right thing and avoiding the unacceptable acts that may lead you to committing mistakes or possible software and technology crimes that’s against the law
  • 3. ETHICAL USE OF SCHOOL TECHNOLOGY  When we are young, our parents used to teach us the right behavior and etiquette. Even in schools and classes, there are certain behaviors and ethics we need to observe to achieve a healthy relationships with teachers and classmates.
  • 4. ETHICS FOR COMPUTER USERS 1. Use the computer to help people and not to do harm. 2. Use your own or assigned computer unit and not to interfere with others’ work. 3. Us the computer using your own files and not to use others’ files. 4. Us the computer to share information and not to steal others’ information. 5. Use the computer to spread truthful information and not to do character assassination. 6. Use software that are original and legal and not pirated. 7. Use others’ computer resources with permission and not to duplicate it without authorization. 8. Use your own work and not the work of others. 9. Use the computer that shows respect and consideration for other people and not to do cyberbullying. 10. Create programs or software having in mind its social impact and not for self-interest.
  • 5. ETHICAL ISSUES IN TECHNOLOGY AND SOFTWARE  Unauthorized Access and Use of Hardware, Software, Network, and Computer Files  If somebody would use anybody’s computer and files without permission from the owner, that is called unauthorized access. A person is called a cracker or a hacker if he/she tries to access a computer or network illegally to access data and commit malicious acts like identity theft.  Hacker originally means a computer enthusiast who does well in computer that benefits other people. However, the term hacker now has an adverse connotation which refers to a person who breaks into the computer system to steal or corrupt the data in it.
  • 6. TIPS IN CREATING A PASSWORD  Use at least 8 characters.  Use a combination of upper and lower case letters, words, numbers and special characters.  Use joined words together.  Add one or more numbers at the beginning, middle, or end of a word.  Use words from other languages.  Use a password that can be remembered easily.  Select a password that can be entered easily even without looking at the keyboard.  Do not leave written copies of your passwords anywhere.  Do not share your password to anyone.
  • 7. HARDWARE THEFT AND VANDALISM  Computer Theft – stealing of hardware and its devices  Computer Vandalism – act of damaging or breaking the hardware, cutting the cables and wires, smashing the computer and its devices, and deleting of software or computer files.
  • 8. SOFTWARE THEFT  Software piracy is a form of software theft. This happens when a person copies illegally copyrighted software for personal or business use.
  • 9. EULA (END-USER LICENSE AGREEMENT)  Single-user license agreement – the common type of license included in software packages purchased by an individual. Some of the conditions are:  Users may install the software on only one computer.  Users are prohibited to install the software on a network (school computer lab network)  Users may make one copy for backup purposes.  Users are prohibited to give copies to friends and colleagues.
  • 10.  Going against the agreement is a violation of copyright law, thus, committing a federal crime. In US, penalties reach up to $250,000 and up to five years in jail. In the Philippines, penalties reach up to Php1,500,000 and up to 6-9 years imprisonment.
  • 11.
  • 12.
  • 13. INFORMATION THEFT  A computer crime when one deliberately steals information for purposes of studying how to compete with other organizations or company.  Encryption is the process of converting readable data to unreadable one. An encryption key is needed to enable the person to convert it back in readable form.
  • 14. MALICIOUS ACT IN SOFTWARE  Spam – unsolicited junk email sent indiscriminately in bulk, often for commercial purposes. Much of it is sent by botnets, networks of virus-infected computers, complicating the process of tracking down the spammers. According to various estimates, about 80% of all email in the world may be spam.
  • 15.  Phishing - a term used to describe a malicious individual or group of individuals who scam users. They do so by sending e-mails or creating web pages that are designed to collect an individual's online bank, credit card, or other login information. Also called as carding or spoofing.
  • 16.  Malware - short for “malicious software” - computer programs designed to infiltrate and damage computers without the users consent. “Malware” is the general term covering all the different types of threats to your computer safety such as viruses, spyware, worms, trojans, rootkits and so on.
  • 17.  Adware - frequently used to describe a form of malware (malicious software) which presents unwanted advertisements to the user of a computer. The advertisements produced by adware are sometimes in the form of a pop-up or sometimes in an "unclosable window".