SlideShare a Scribd company logo
1 of 13
Technology and software issues are also elaborated in order for you to be aware
and be guided in doing the right thing and avoiding the unacceptable acts that may
lead you to committing mistakes or possible software and technology crimes that’s
against the law
ETHICAL USE OF SCHOOL TECHNOLOGY
When we are young our parents used to teach us the right behavior and
etiquette. Even in schools and classes , there are certain behaviors and ethics we
need to observe to achieve a healthy relationships with teachers and classmates.
ETHICS FOR COMPUTER USER
1. Use the computer to help people and not to do harm.
2. Use your own assigned computer unit and not to interfere with others work.
3. Use the computer using your own files and not to use others files.
4. Use the computer to share information and not to steal others information.
5. Use the computer to spread truthful information and not to do character assassination.
6. Use software that are original an legal not pirated.
7. Use others computer resources with permission and not to duplicate it without authorization.
8. Use your own work and not the work of others .
9. Use the computer that shows respect and consideration for the other people and not to do cyber bullying.
10. Create programs or software having in mind its social impact and not for self interest.
ETHICAL ISSUES IN TECHNOLOGY
1. Unauthorized Access and Use of Hardware, software, Network, and Computer Files
There are many cases when we want something's to be kept private and would not allow others to use it, such as diaries, messages in our phones and e-
mails, and many others.
SOME TIPS IN CAREFULLY CREATING A PASSWORD
*Use at least characters.
*Use a combination of upper and lower case letters, words, numbers, and special characters.
*Use join words together.
*Use words from other languages.
*Add one or more numbers at the beginning, middle, or end of a word.
*Use a password that can remembered easily.
*Select a password that can be entered easily even without looking at the keyboard.
*Do not leave written copies of your password anywhere.
* Do not share your password to anyone.
2. HARDWARE THEFT AND VANDALISM
Hardware Theft and Vandalism are some of the security challenges encountered by school administrators and teachers.
3. SOFTWARE THEFT
Software piracy is a form of software theft. These happens when a person copies illegally copyrighted software for personal or
business.
An end-user licence agreement (EULA) or single-user license agreement is the common type of license included in software
packages purchased by an individual .some of the conditions are:
*Users may install the software on only one computer.
*users are prohibited to install the software on a network (school computer lab network)
*Users may make copy for back up purposes.
*Users are prohibited to give copies to friends and copies to friends and colleagues.
Various Types of Software Licenses Used in Education
Types of
license
Characteristics Used in Schools
Single-user Software can be
installed only in one
computer. Some
license agreements
allow users to install
the software on one
desktop computer and
one notebook
computer.
Used when school needs
only if you copies of
particular software.
Commonly found in
small schools and when
purchasing specialized
software programs.
Multiple-
user
Software can be
installed on a set of
computers, typically 5,
10, 50, or more. Cost
varies based on
number of computers.
Cost –effective method
to install software or
more than one computer.
Most commonly used in
schools.
Network License Software is installed on the
schools network. The
license will specify and the
software will control a
specific number of
simultaneous users, such as
50, 250, or 500. Cost varies
based on number of
computers.
Cost-effective method of
allowing students and
teachers throughout the
school to have access to in
application software
program. As schools
continue to install networks,
network license are
becoming more common.
Community License Frequently used
with software
distributed on
CDs/DVDs. Any
number of
programs can be
purchased from
either macintosh or
PC platforms.
Very cost-effective
method for school
districts to purchase
large quantities of
software. Saving can
be significant over
individual CD or
DVD pricing.
4. INFORMATION THEFT
-information theft is a computer crime when one deliberately steals information for
purposes of studying how to compete with other organization or companies.
5. Malicious Acts in Software
-the following malicious acts are commonly experienced in emails, cell phones, or text
messaging devices and blogs.
 Spam is an unwanted message being received through emails, discussions, text
messaging devices, and others.
 Phishing may also be called as carding or spoofing.
 Spam message can be reduce if not prevented by adjusting the settings in your
emails to delete spam automatically.
 Malware is a malicious software that causes harm to one or more computers.
 Adware is a software that incorporates the presentation of advertisements and
condition for operating the software.
ACCEPTABLE AND UNACCEPTABLE
USES OF SCHOOL TECHNOLOGY
Schools may have different rules and
regulations or policies in implementing
acceptable and unacceptable used of school
technology.
Examples of Acceptable Use
of School Technology
Examples of Unacceptable
Use of School Technology
 Abiding by the policies and
procedures of other
networks that are accessed.
 Being polite and using
appropriate language.
 Deleting unwanted messages
or old data from computers
and servers.
 Enforcing appropriate used
and reporting misuse or
security issues.
 Altering software by deleting
files, downloading programs,
or copying or installing
unauthorized files or
programs.
 Assuming the identity or
using the passwords or
materials of another.
 Conducting commercial
activities, advertising
products, or taking part in
political lobbying.
 Running antivirus
software on downloaded
files, attachments,
peripherals, or disks.
 Signing correspondence.
 Using online time
efficiently.
 Using the internet
ethically and legally.
 Downloading text,
graphics or software, or
engaging in behaviours
that may considered
obscene, abusive, libelous,
indescent, vulgar, profane,
or lewd.
 Gaining access to any
pay- for -view site.
 Giving out your own or
others’ private
information, such as
address, phone number,
or passwords.
 Harassing an individual
using the internet.
 Plagiarizing
 Transmitting material that
violates any local or
countries regulation, or
obscene material.
 Vandalizing equipment,
digital files, or wilfully
spreading computer
viruses.

More Related Content

What's hot

SAFETY ISSUES ON THE USE OF ICT INCLUDING E-SAFETY RULES
SAFETY ISSUES ON THE USE OF ICT INCLUDING E-SAFETY RULESSAFETY ISSUES ON THE USE OF ICT INCLUDING E-SAFETY RULES
SAFETY ISSUES ON THE USE OF ICT INCLUDING E-SAFETY RULESNethBataller1
 
The Teaching Prof.- A closer Look at the Teacher & the Teaching Prof. in ASEA...
The Teaching Prof.- A closer Look at the Teacher & the Teaching Prof. in ASEA...The Teaching Prof.- A closer Look at the Teacher & the Teaching Prof. in ASEA...
The Teaching Prof.- A closer Look at the Teacher & the Teaching Prof. in ASEA...Wilvin Galla
 
Instructional materials & ict
Instructional materials & ictInstructional materials & ict
Instructional materials & ictBright Micah
 
Approaches to School Curriculum
Approaches to School CurriculumApproaches to School Curriculum
Approaches to School CurriculumJunila Tejada
 
Approaches to Curriculum Design
Approaches to Curriculum DesignApproaches to Curriculum Design
Approaches to Curriculum DesignGeraldine Cachero
 
Different Types of Instructional Materials
Different Types of Instructional MaterialsDifferent Types of Instructional Materials
Different Types of Instructional MaterialsRoy Capangpangan
 
GLOBAL EDUCATION AND GLOBAL TEACHER
GLOBAL EDUCATION AND GLOBAL TEACHERGLOBAL EDUCATION AND GLOBAL TEACHER
GLOBAL EDUCATION AND GLOBAL TEACHEREduard Orsal
 
ASSURE Model
ASSURE ModelASSURE Model
ASSURE Modelacnopit
 
Module 1 lesson 3 - Role of Technology for teaching and learning
Module 1 lesson 3 - Role of Technology for teaching and learningModule 1 lesson 3 - Role of Technology for teaching and learning
Module 1 lesson 3 - Role of Technology for teaching and learningIra Sagu
 
Brief lesson plan - Gerund
Brief lesson plan - GerundBrief lesson plan - Gerund
Brief lesson plan - GerundAubrey Rose
 
Online Resources, Educational Sites and Portals
Online Resources, Educational Sites and PortalsOnline Resources, Educational Sites and Portals
Online Resources, Educational Sites and PortalsIra Sagu
 
Lesson 1 ict competency standards for philippine pre-service teacher education
Lesson 1 ict competency standards for philippine pre-service teacher educationLesson 1 ict competency standards for philippine pre-service teacher education
Lesson 1 ict competency standards for philippine pre-service teacher educationIra Sagu
 
Basic Concept in Assessment
Basic Concept in AssessmentBasic Concept in Assessment
Basic Concept in AssessmentJarry Fuentes
 
Roles of technology for teaching and learning
Roles of technology for teaching and learningRoles of technology for teaching and learning
Roles of technology for teaching and learningerwin marlon sario
 

What's hot (20)

6 features of a curriculum
6 features of a curriculum6 features of a curriculum
6 features of a curriculum
 
Ict policies and issues
Ict policies and issuesIct policies and issues
Ict policies and issues
 
SAFETY ISSUES ON THE USE OF ICT INCLUDING E-SAFETY RULES
SAFETY ISSUES ON THE USE OF ICT INCLUDING E-SAFETY RULESSAFETY ISSUES ON THE USE OF ICT INCLUDING E-SAFETY RULES
SAFETY ISSUES ON THE USE OF ICT INCLUDING E-SAFETY RULES
 
The Teaching Prof.- A closer Look at the Teacher & the Teaching Prof. in ASEA...
The Teaching Prof.- A closer Look at the Teacher & the Teaching Prof. in ASEA...The Teaching Prof.- A closer Look at the Teacher & the Teaching Prof. in ASEA...
The Teaching Prof.- A closer Look at the Teacher & the Teaching Prof. in ASEA...
 
Instructional materials & ict
Instructional materials & ictInstructional materials & ict
Instructional materials & ict
 
Approaches to School Curriculum
Approaches to School CurriculumApproaches to School Curriculum
Approaches to School Curriculum
 
Approaches to Curriculum Design
Approaches to Curriculum DesignApproaches to Curriculum Design
Approaches to Curriculum Design
 
Different Types of Instructional Materials
Different Types of Instructional MaterialsDifferent Types of Instructional Materials
Different Types of Instructional Materials
 
Educational Technology Chapter 8
Educational Technology Chapter 8Educational Technology Chapter 8
Educational Technology Chapter 8
 
Module 1 - Lesson 1.pptx
Module 1 - Lesson 1.pptxModule 1 - Lesson 1.pptx
Module 1 - Lesson 1.pptx
 
GLOBAL EDUCATION AND GLOBAL TEACHER
GLOBAL EDUCATION AND GLOBAL TEACHERGLOBAL EDUCATION AND GLOBAL TEACHER
GLOBAL EDUCATION AND GLOBAL TEACHER
 
ASSURE Model
ASSURE ModelASSURE Model
ASSURE Model
 
Module 1 lesson 3 - Role of Technology for teaching and learning
Module 1 lesson 3 - Role of Technology for teaching and learningModule 1 lesson 3 - Role of Technology for teaching and learning
Module 1 lesson 3 - Role of Technology for teaching and learning
 
Brief lesson plan - Gerund
Brief lesson plan - GerundBrief lesson plan - Gerund
Brief lesson plan - Gerund
 
14 learner centered principles
14 learner centered principles14 learner centered principles
14 learner centered principles
 
Online Resources, Educational Sites and Portals
Online Resources, Educational Sites and PortalsOnline Resources, Educational Sites and Portals
Online Resources, Educational Sites and Portals
 
ASSURE MODEL POWERPOINT
ASSURE MODEL POWERPOINTASSURE MODEL POWERPOINT
ASSURE MODEL POWERPOINT
 
Lesson 1 ict competency standards for philippine pre-service teacher education
Lesson 1 ict competency standards for philippine pre-service teacher educationLesson 1 ict competency standards for philippine pre-service teacher education
Lesson 1 ict competency standards for philippine pre-service teacher education
 
Basic Concept in Assessment
Basic Concept in AssessmentBasic Concept in Assessment
Basic Concept in Assessment
 
Roles of technology for teaching and learning
Roles of technology for teaching and learningRoles of technology for teaching and learning
Roles of technology for teaching and learning
 

Similar to LEGAL ANND ETHICAL USE OF TECHNOLOGY

Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Dr. Khaled Bakro
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of itsr24production
 
Super billing computer ethics, privacy and security
Super billing computer ethics, privacy and securitySuper billing computer ethics, privacy and security
Super billing computer ethics, privacy and securitysuperb11b
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006Ben Rothke
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2JeffUrgelles
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9sajida zafar
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4leahg118
 
Module4 policies&procedures-b
Module4   policies&procedures-bModule4   policies&procedures-b
Module4 policies&procedures-bBbAOC
 
ComputingEthics.pptx
ComputingEthics.pptxComputingEthics.pptx
ComputingEthics.pptxMuruganS82
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptxglorysunny
 
Computer security and_privacy
Computer security and_privacyComputer security and_privacy
Computer security and_privacythinkict
 
Computer use slideshow 3 5 final 2008
Computer use slideshow 3 5 final 2008Computer use slideshow 3 5 final 2008
Computer use slideshow 3 5 final 2008JulieRen141
 
Back to school - CYBER SAFETY
Back to school - CYBER SAFETYBack to school - CYBER SAFETY
Back to school - CYBER SAFETYSairam
 

Similar to LEGAL ANND ETHICAL USE OF TECHNOLOGY (20)

Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
 
Draft Computer Acceptable Use Policy
Draft Computer Acceptable Use PolicyDraft Computer Acceptable Use Policy
Draft Computer Acceptable Use Policy
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
Super billing computer ethics, privacy and security
Super billing computer ethics, privacy and securitySuper billing computer ethics, privacy and security
Super billing computer ethics, privacy and security
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
 
Week 4 grade_4
Week 4 grade_4Week 4 grade_4
Week 4 grade_4
 
Module4 policies&procedures-b
Module4   policies&procedures-bModule4   policies&procedures-b
Module4 policies&procedures-b
 
ComputingEthics.pptx
ComputingEthics.pptxComputingEthics.pptx
ComputingEthics.pptx
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
Computer security and_privacy
Computer security and_privacyComputer security and_privacy
Computer security and_privacy
 
SOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptxSOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptx
 
Computer use slideshow 3 5 final 2008
Computer use slideshow 3 5 final 2008Computer use slideshow 3 5 final 2008
Computer use slideshow 3 5 final 2008
 
Back to school - CYBER SAFETY
Back to school - CYBER SAFETYBack to school - CYBER SAFETY
Back to school - CYBER SAFETY
 
Computer
ComputerComputer
Computer
 

More from Chano Alfornon

Hermeneutical Phenomenology
Hermeneutical PhenomenologyHermeneutical Phenomenology
Hermeneutical PhenomenologyChano Alfornon
 
Curriculum Development (Unfinish Work) Professional Education
Curriculum Development (Unfinish Work) Professional EducationCurriculum Development (Unfinish Work) Professional Education
Curriculum Development (Unfinish Work) Professional EducationChano Alfornon
 
Technology pedagogical content knowledge (tpack) and technology integration p...
Technology pedagogical content knowledge (tpack) and technology integration p...Technology pedagogical content knowledge (tpack) and technology integration p...
Technology pedagogical content knowledge (tpack) and technology integration p...Chano Alfornon
 
Evaluating Educational Technology
Evaluating Educational TechnologyEvaluating Educational Technology
Evaluating Educational TechnologyChano Alfornon
 
Ed.tech.ii chapter 6 (instructional software for classroom use)
Ed.tech.ii chapter 6 (instructional software for classroom use)Ed.tech.ii chapter 6 (instructional software for classroom use)
Ed.tech.ii chapter 6 (instructional software for classroom use)Chano Alfornon
 
SOFTWARE FOR EDUCATORS AND STUDENTS
SOFTWARE FOR EDUCATORS AND STUDENTS SOFTWARE FOR EDUCATORS AND STUDENTS
SOFTWARE FOR EDUCATORS AND STUDENTS Chano Alfornon
 

More from Chano Alfornon (6)

Hermeneutical Phenomenology
Hermeneutical PhenomenologyHermeneutical Phenomenology
Hermeneutical Phenomenology
 
Curriculum Development (Unfinish Work) Professional Education
Curriculum Development (Unfinish Work) Professional EducationCurriculum Development (Unfinish Work) Professional Education
Curriculum Development (Unfinish Work) Professional Education
 
Technology pedagogical content knowledge (tpack) and technology integration p...
Technology pedagogical content knowledge (tpack) and technology integration p...Technology pedagogical content knowledge (tpack) and technology integration p...
Technology pedagogical content knowledge (tpack) and technology integration p...
 
Evaluating Educational Technology
Evaluating Educational TechnologyEvaluating Educational Technology
Evaluating Educational Technology
 
Ed.tech.ii chapter 6 (instructional software for classroom use)
Ed.tech.ii chapter 6 (instructional software for classroom use)Ed.tech.ii chapter 6 (instructional software for classroom use)
Ed.tech.ii chapter 6 (instructional software for classroom use)
 
SOFTWARE FOR EDUCATORS AND STUDENTS
SOFTWARE FOR EDUCATORS AND STUDENTS SOFTWARE FOR EDUCATORS AND STUDENTS
SOFTWARE FOR EDUCATORS AND STUDENTS
 

Recently uploaded

Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 

Recently uploaded (20)

TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 

LEGAL ANND ETHICAL USE OF TECHNOLOGY

  • 1.
  • 2. Technology and software issues are also elaborated in order for you to be aware and be guided in doing the right thing and avoiding the unacceptable acts that may lead you to committing mistakes or possible software and technology crimes that’s against the law
  • 3. ETHICAL USE OF SCHOOL TECHNOLOGY When we are young our parents used to teach us the right behavior and etiquette. Even in schools and classes , there are certain behaviors and ethics we need to observe to achieve a healthy relationships with teachers and classmates.
  • 4. ETHICS FOR COMPUTER USER 1. Use the computer to help people and not to do harm. 2. Use your own assigned computer unit and not to interfere with others work. 3. Use the computer using your own files and not to use others files. 4. Use the computer to share information and not to steal others information. 5. Use the computer to spread truthful information and not to do character assassination. 6. Use software that are original an legal not pirated. 7. Use others computer resources with permission and not to duplicate it without authorization. 8. Use your own work and not the work of others . 9. Use the computer that shows respect and consideration for the other people and not to do cyber bullying. 10. Create programs or software having in mind its social impact and not for self interest.
  • 5. ETHICAL ISSUES IN TECHNOLOGY 1. Unauthorized Access and Use of Hardware, software, Network, and Computer Files There are many cases when we want something's to be kept private and would not allow others to use it, such as diaries, messages in our phones and e- mails, and many others. SOME TIPS IN CAREFULLY CREATING A PASSWORD *Use at least characters. *Use a combination of upper and lower case letters, words, numbers, and special characters. *Use join words together. *Use words from other languages. *Add one or more numbers at the beginning, middle, or end of a word. *Use a password that can remembered easily. *Select a password that can be entered easily even without looking at the keyboard. *Do not leave written copies of your password anywhere. * Do not share your password to anyone.
  • 6. 2. HARDWARE THEFT AND VANDALISM Hardware Theft and Vandalism are some of the security challenges encountered by school administrators and teachers. 3. SOFTWARE THEFT Software piracy is a form of software theft. These happens when a person copies illegally copyrighted software for personal or business. An end-user licence agreement (EULA) or single-user license agreement is the common type of license included in software packages purchased by an individual .some of the conditions are: *Users may install the software on only one computer. *users are prohibited to install the software on a network (school computer lab network) *Users may make copy for back up purposes. *Users are prohibited to give copies to friends and copies to friends and colleagues.
  • 7. Various Types of Software Licenses Used in Education Types of license Characteristics Used in Schools Single-user Software can be installed only in one computer. Some license agreements allow users to install the software on one desktop computer and one notebook computer. Used when school needs only if you copies of particular software. Commonly found in small schools and when purchasing specialized software programs. Multiple- user Software can be installed on a set of computers, typically 5, 10, 50, or more. Cost varies based on number of computers. Cost –effective method to install software or more than one computer. Most commonly used in schools.
  • 8. Network License Software is installed on the schools network. The license will specify and the software will control a specific number of simultaneous users, such as 50, 250, or 500. Cost varies based on number of computers. Cost-effective method of allowing students and teachers throughout the school to have access to in application software program. As schools continue to install networks, network license are becoming more common. Community License Frequently used with software distributed on CDs/DVDs. Any number of programs can be purchased from either macintosh or PC platforms. Very cost-effective method for school districts to purchase large quantities of software. Saving can be significant over individual CD or DVD pricing.
  • 9. 4. INFORMATION THEFT -information theft is a computer crime when one deliberately steals information for purposes of studying how to compete with other organization or companies. 5. Malicious Acts in Software -the following malicious acts are commonly experienced in emails, cell phones, or text messaging devices and blogs.  Spam is an unwanted message being received through emails, discussions, text messaging devices, and others.  Phishing may also be called as carding or spoofing.  Spam message can be reduce if not prevented by adjusting the settings in your emails to delete spam automatically.  Malware is a malicious software that causes harm to one or more computers.  Adware is a software that incorporates the presentation of advertisements and condition for operating the software.
  • 10. ACCEPTABLE AND UNACCEPTABLE USES OF SCHOOL TECHNOLOGY Schools may have different rules and regulations or policies in implementing acceptable and unacceptable used of school technology.
  • 11. Examples of Acceptable Use of School Technology Examples of Unacceptable Use of School Technology  Abiding by the policies and procedures of other networks that are accessed.  Being polite and using appropriate language.  Deleting unwanted messages or old data from computers and servers.  Enforcing appropriate used and reporting misuse or security issues.  Altering software by deleting files, downloading programs, or copying or installing unauthorized files or programs.  Assuming the identity or using the passwords or materials of another.  Conducting commercial activities, advertising products, or taking part in political lobbying.
  • 12.  Running antivirus software on downloaded files, attachments, peripherals, or disks.  Signing correspondence.  Using online time efficiently.  Using the internet ethically and legally.  Downloading text, graphics or software, or engaging in behaviours that may considered obscene, abusive, libelous, indescent, vulgar, profane, or lewd.  Gaining access to any pay- for -view site.  Giving out your own or others’ private information, such as address, phone number, or passwords.
  • 13.  Harassing an individual using the internet.  Plagiarizing  Transmitting material that violates any local or countries regulation, or obscene material.  Vandalizing equipment, digital files, or wilfully spreading computer viruses.