SlideShare a Scribd company logo
SAFE AND ETHICAL USE OF
TECHNOLOGY
Allison Loyd
Tech/503
April 30, 2016
INTRODUCTION
• In this presentation we will explore guidelines for the Safe and Ethical Use of
Technology in the classroom
• If you remember nothing else from this presentation, remember these “Three Rules
of Technology Ethics” (Johnson, 2012):
• Privacy – I will protect my privacy and respect the privacy of others
• Property – I will protect my property and respect the property of others
• Appropriate use – I will use technology in constructive ways and in ways that do not
break the rules of my family, faith, school, or government
COMPUTER SAFETY
• Hardware
• Handle hardware with care, sit safely, grasp firmly, use protective covers for portable
devices
• Use only the original charging cord and ensure the cord isn’t in a high traffic area
• Passwords
• Use a different password for each site/application
• Change your password frequently
• Make your passwords at least 12 characters in length using upper and lower case,
special characters, and numbers
• Don’t share it with anyone!
COMPUTER SAFETY (CONT)
• Backups
• Backup all important data on your device regularly
• Use your OS tools and a USB drive to backup the whole computer
• Or, use cloud tools to backup certain folders – such as DropBox, GoogleDrive, or Mozy
• Malware
• Be sure you are running some type of malware protection and frequent only legitimate
web sites
• Beware of pop-ups made to look like system messages
• Don’t open attachments you weren’t expecting
• Updates
• Apply the updates your OS manufacturer recommends (Microsoft, Apple)
• Include applications like Office, Flash, Java
SOCIAL NETWORKING
DOS AND DON’TS
Do’s
• Have a positive social presence, be
aware of your “digital footprint”
• Use the web site’s settings to share
only to friends, keep publically
accessible information minimal
• Use a complex password
• Be careful of strangers who want to
“friend” you
Don’ts
• Post questionable/embarrassing photos
• Express negative opinions
• Post your address or other information
that could be used to find you
• Cyberbully others
• Engage with “trolls” or “cyberbullies”
ETHICAL USE OF
INTERNET MATERIALS
• Students must be careful to use video, music, and printed material from the Internet
appropriately. This material is someone’s “Intellectual Property” and they have the
right to control how it is used and in some cases be compensated for it.
• Don’t assume just because its posted online and that it is easy to copy it, that it is ok
to do so
• It’s not ok to download music without paying for it
• Don’t use printed material without properly citing the reference
• It’s not OK to provide free copies of copyrighted material, even if you paid for it
COPYRIGHT GUIDELINES
• Check if material is copyrighted before use, when in doubt, DON’T USE IT
• Look for material available legally under “Creative Commons”, but include attribution and
follow the markings
• Commercial Use: Unless indicated, cannot be used for commercial purposes
• Transformation: owner may specify that you cannot alter the item to use it
• Share alike: any item based on an transformation of this item must also be available under
Creative Commons
• Some copyrighted items can be used under “Fair Use”. The following guidelines were
proposed - use at your own risk! (Waxer and Baum 2006)
• 10 percent or 1000 words of a copyrighted text
• up to 10 percent but not more than 30 seconds of a musical work
• 10 percent or three minutes of a motion picture
• a picture but no more than five images by the same creator
• up to 10 percent or 2,500 fields from a database
PLAGIARISM
• Definition: to use the words or ideas of another person as if they were your own
words or ideas (Merriam Webster)
• Plagiarism is not tolerated in an educational setting and could result in loss of all
credit for an assignment and disciplinary actions
• Plagiarism can also be a copyright violation
• To avoid getting accused, use a plagiarism checker such as
http://smallseotools.com/plagiarism-checker/
PROPER CITATIONS
• Properly citing any material you use in your assignments can avoid accusations of
plagiarism and potentially avoid copyright issues
• We will follow APA guidelines for citations. Use an online citation generator tool
such as http://www.citationmachine.net for quick and easy citations
• Within the body of your text, use a short parenthetical reference such as (Loyd,
2016) which correlates with a detailed citation on your reference page such as:
• Loyd, A. (2016). Safe and Ethical Use of Technology. Tampa, FL: Self.
REFERENCES
• Johnson, D. (2012). The Classroom Teacher's Technology Survival Guide (1st ed.).
San Francisco, CA: Jossey-Bass.
• Plagiarize. (n.d.). Retrieved April 30, 2016, from http://www.merriam-
webster.com/dictionary/plagiarize
• Waxer, B. M., and M. L. Baum. 2006. Internet surf and turf revealed: The essential
guide to copy- right, fair use, and finding media. Boston, MA: Thomson Course
Technology.

More Related Content

What's hot

Digital citizenship powerpoint
Digital citizenship powerpointDigital citizenship powerpoint
Digital citizenship powerpoint
JannahAboulhassan
 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
kelly kusmulyono
 
Safety issues with ICT
Safety issues with ICTSafety issues with ICT
Safety issues with ICTcomputers 11
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rules
Mazni Salleh
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Naheelah Irving
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
jovellconde1
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
egschool
 
Online ethics
Online ethicsOnline ethics
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internet
Maricrs Alfarö
 
The ten commandments of computer ethics
The ten commandments of computer ethicsThe ten commandments of computer ethics
The ten commandments of computer ethics
salj_16
 
The Digital Divide
The Digital DivideThe Digital Divide
The Digital Divide
Anjan Mahanta
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
RoshanMaharjan13
 
Digital footprint presentation
Digital footprint presentationDigital footprint presentation
Digital footprint presentationsahrdebeck52
 
Social, Legal and Ethical Issues in Educational Technology and Innovations
Social, Legal and Ethical Issues in Educational Technology and InnovationsSocial, Legal and Ethical Issues in Educational Technology and Innovations
Social, Legal and Ethical Issues in Educational Technology and Innovations
121487
 
1.1 introduction toict
1.1 introduction toict1.1 introduction toict
1.1 introduction toict
Hafeezah Muhamad
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
Arunmozhi Ramesh
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
harriscountypubliclibrary
 

What's hot (20)

Digital citizenship powerpoint
Digital citizenship powerpointDigital citizenship powerpoint
Digital citizenship powerpoint
 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
 
Safety issues with ICT
Safety issues with ICTSafety issues with ICT
Safety issues with ICT
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rules
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
INTERNET ETIQUETTE AND NETIQUETTE
INTERNET ETIQUETTE AND NETIQUETTEINTERNET ETIQUETTE AND NETIQUETTE
INTERNET ETIQUETTE AND NETIQUETTE
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internet
 
The ten commandments of computer ethics
The ten commandments of computer ethicsThe ten commandments of computer ethics
The ten commandments of computer ethics
 
The Digital Divide
The Digital DivideThe Digital Divide
The Digital Divide
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Digital footprint presentation
Digital footprint presentationDigital footprint presentation
Digital footprint presentation
 
Social, Legal and Ethical Issues in Educational Technology and Innovations
Social, Legal and Ethical Issues in Educational Technology and InnovationsSocial, Legal and Ethical Issues in Educational Technology and Innovations
Social, Legal and Ethical Issues in Educational Technology and Innovations
 
Digital+safety+powerpoint
Digital+safety+powerpointDigital+safety+powerpoint
Digital+safety+powerpoint
 
1.1 introduction toict
1.1 introduction toict1.1 introduction toict
1.1 introduction toict
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 

Similar to Safe and ethical use of technology

Safe and ethical use
Safe and ethical useSafe and ethical use
Safe and ethical use
jenniferbrister
 
Digital Citizenship Presentation
Digital Citizenship PresentationDigital Citizenship Presentation
Digital Citizenship Presentationmhporter1
 
Cyber safety by Lorraine Flores
Cyber safety by Lorraine FloresCyber safety by Lorraine Flores
Cyber safety by Lorraine Flores
lorrflores
 
Digital citizenship project
Digital citizenship projectDigital citizenship project
Digital citizenship projectfig2381
 
Safe and ethical use
Safe and ethical useSafe and ethical use
Safe and ethical use
paulbennett2271
 
Digital Citizenship_Lecture.pptx
Digital Citizenship_Lecture.pptxDigital Citizenship_Lecture.pptx
Digital Citizenship_Lecture.pptx
JCGonzaga1
 
Legal and social impacts on ICT
Legal and social impacts on ICTLegal and social impacts on ICT
Legal and social impacts on ICT
Middle East International School
 
Netiquette, Copyright, and Plagiarism
Netiquette, Copyright, and Plagiarism Netiquette, Copyright, and Plagiarism
Netiquette, Copyright, and Plagiarism
brileyrourk
 
Internet safety
Internet safetyInternet safety
Internet safety
martdale
 
Technology in the classroom
Technology in the classroomTechnology in the classroom
Technology in the classroomejl2
 
Technology in the classroom
Technology in the classroomTechnology in the classroom
Technology in the classroom
ejl2
 
CST 20363 Session 6 Cyberspace
CST 20363 Session 6 CyberspaceCST 20363 Session 6 Cyberspace
CST 20363 Session 6 Cyberspace
oudesign
 
Plagiarism, netiquette, and copyright info
Plagiarism, netiquette, and copyright infoPlagiarism, netiquette, and copyright info
Plagiarism, netiquette, and copyright infokaitlin234
 
Copyright!
Copyright!Copyright!
Copyright!marklemb
 
Educational Technology 1
Educational Technology 1Educational Technology 1
Educational Technology 1
Angelica Vargas
 
Copy It Right © Guidelines for 21st C Teachers
Copy It Right © Guidelines for 21st C TeachersCopy It Right © Guidelines for 21st C Teachers
Copy It Right © Guidelines for 21st C Teachers
Liz Gray
 
Digital Citizenship Presentation
Digital Citizenship PresentationDigital Citizenship Presentation
Digital Citizenship Presentation
hjhteach
 
PLAGIARISM_THE BASICS FOR UNDERGRAD STUDENTS
PLAGIARISM_THE BASICS FOR UNDERGRAD STUDENTSPLAGIARISM_THE BASICS FOR UNDERGRAD STUDENTS
PLAGIARISM_THE BASICS FOR UNDERGRAD STUDENTS
Beschara Karam
 
Copyright presentation mcfarlandrevised
Copyright presentation mcfarlandrevisedCopyright presentation mcfarlandrevised
Copyright presentation mcfarlandrevisedsusanrmcfarland
 

Similar to Safe and ethical use of technology (20)

Safe and ethical use
Safe and ethical useSafe and ethical use
Safe and ethical use
 
Digital Citizenship Presentation
Digital Citizenship PresentationDigital Citizenship Presentation
Digital Citizenship Presentation
 
Cyber safety by Lorraine Flores
Cyber safety by Lorraine FloresCyber safety by Lorraine Flores
Cyber safety by Lorraine Flores
 
Digital citizenship project
Digital citizenship projectDigital citizenship project
Digital citizenship project
 
Safe and ethical use
Safe and ethical useSafe and ethical use
Safe and ethical use
 
Digital Citizenship_Lecture.pptx
Digital Citizenship_Lecture.pptxDigital Citizenship_Lecture.pptx
Digital Citizenship_Lecture.pptx
 
Legal and social impacts on ICT
Legal and social impacts on ICTLegal and social impacts on ICT
Legal and social impacts on ICT
 
Searching the Internet
Searching the InternetSearching the Internet
Searching the Internet
 
Netiquette, Copyright, and Plagiarism
Netiquette, Copyright, and Plagiarism Netiquette, Copyright, and Plagiarism
Netiquette, Copyright, and Plagiarism
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Technology in the classroom
Technology in the classroomTechnology in the classroom
Technology in the classroom
 
Technology in the classroom
Technology in the classroomTechnology in the classroom
Technology in the classroom
 
CST 20363 Session 6 Cyberspace
CST 20363 Session 6 CyberspaceCST 20363 Session 6 Cyberspace
CST 20363 Session 6 Cyberspace
 
Plagiarism, netiquette, and copyright info
Plagiarism, netiquette, and copyright infoPlagiarism, netiquette, and copyright info
Plagiarism, netiquette, and copyright info
 
Copyright!
Copyright!Copyright!
Copyright!
 
Educational Technology 1
Educational Technology 1Educational Technology 1
Educational Technology 1
 
Copy It Right © Guidelines for 21st C Teachers
Copy It Right © Guidelines for 21st C TeachersCopy It Right © Guidelines for 21st C Teachers
Copy It Right © Guidelines for 21st C Teachers
 
Digital Citizenship Presentation
Digital Citizenship PresentationDigital Citizenship Presentation
Digital Citizenship Presentation
 
PLAGIARISM_THE BASICS FOR UNDERGRAD STUDENTS
PLAGIARISM_THE BASICS FOR UNDERGRAD STUDENTSPLAGIARISM_THE BASICS FOR UNDERGRAD STUDENTS
PLAGIARISM_THE BASICS FOR UNDERGRAD STUDENTS
 
Copyright presentation mcfarlandrevised
Copyright presentation mcfarlandrevisedCopyright presentation mcfarlandrevised
Copyright presentation mcfarlandrevised
 

Recently uploaded

The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 

Recently uploaded (20)

The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 

Safe and ethical use of technology

  • 1. SAFE AND ETHICAL USE OF TECHNOLOGY Allison Loyd Tech/503 April 30, 2016
  • 2. INTRODUCTION • In this presentation we will explore guidelines for the Safe and Ethical Use of Technology in the classroom • If you remember nothing else from this presentation, remember these “Three Rules of Technology Ethics” (Johnson, 2012): • Privacy – I will protect my privacy and respect the privacy of others • Property – I will protect my property and respect the property of others • Appropriate use – I will use technology in constructive ways and in ways that do not break the rules of my family, faith, school, or government
  • 3. COMPUTER SAFETY • Hardware • Handle hardware with care, sit safely, grasp firmly, use protective covers for portable devices • Use only the original charging cord and ensure the cord isn’t in a high traffic area • Passwords • Use a different password for each site/application • Change your password frequently • Make your passwords at least 12 characters in length using upper and lower case, special characters, and numbers • Don’t share it with anyone!
  • 4. COMPUTER SAFETY (CONT) • Backups • Backup all important data on your device regularly • Use your OS tools and a USB drive to backup the whole computer • Or, use cloud tools to backup certain folders – such as DropBox, GoogleDrive, or Mozy • Malware • Be sure you are running some type of malware protection and frequent only legitimate web sites • Beware of pop-ups made to look like system messages • Don’t open attachments you weren’t expecting • Updates • Apply the updates your OS manufacturer recommends (Microsoft, Apple) • Include applications like Office, Flash, Java
  • 5. SOCIAL NETWORKING DOS AND DON’TS Do’s • Have a positive social presence, be aware of your “digital footprint” • Use the web site’s settings to share only to friends, keep publically accessible information minimal • Use a complex password • Be careful of strangers who want to “friend” you Don’ts • Post questionable/embarrassing photos • Express negative opinions • Post your address or other information that could be used to find you • Cyberbully others • Engage with “trolls” or “cyberbullies”
  • 6. ETHICAL USE OF INTERNET MATERIALS • Students must be careful to use video, music, and printed material from the Internet appropriately. This material is someone’s “Intellectual Property” and they have the right to control how it is used and in some cases be compensated for it. • Don’t assume just because its posted online and that it is easy to copy it, that it is ok to do so • It’s not ok to download music without paying for it • Don’t use printed material without properly citing the reference • It’s not OK to provide free copies of copyrighted material, even if you paid for it
  • 7. COPYRIGHT GUIDELINES • Check if material is copyrighted before use, when in doubt, DON’T USE IT • Look for material available legally under “Creative Commons”, but include attribution and follow the markings • Commercial Use: Unless indicated, cannot be used for commercial purposes • Transformation: owner may specify that you cannot alter the item to use it • Share alike: any item based on an transformation of this item must also be available under Creative Commons • Some copyrighted items can be used under “Fair Use”. The following guidelines were proposed - use at your own risk! (Waxer and Baum 2006) • 10 percent or 1000 words of a copyrighted text • up to 10 percent but not more than 30 seconds of a musical work • 10 percent or three minutes of a motion picture • a picture but no more than five images by the same creator • up to 10 percent or 2,500 fields from a database
  • 8. PLAGIARISM • Definition: to use the words or ideas of another person as if they were your own words or ideas (Merriam Webster) • Plagiarism is not tolerated in an educational setting and could result in loss of all credit for an assignment and disciplinary actions • Plagiarism can also be a copyright violation • To avoid getting accused, use a plagiarism checker such as http://smallseotools.com/plagiarism-checker/
  • 9. PROPER CITATIONS • Properly citing any material you use in your assignments can avoid accusations of plagiarism and potentially avoid copyright issues • We will follow APA guidelines for citations. Use an online citation generator tool such as http://www.citationmachine.net for quick and easy citations • Within the body of your text, use a short parenthetical reference such as (Loyd, 2016) which correlates with a detailed citation on your reference page such as: • Loyd, A. (2016). Safe and Ethical Use of Technology. Tampa, FL: Self.
  • 10. REFERENCES • Johnson, D. (2012). The Classroom Teacher's Technology Survival Guide (1st ed.). San Francisco, CA: Jossey-Bass. • Plagiarize. (n.d.). Retrieved April 30, 2016, from http://www.merriam- webster.com/dictionary/plagiarize • Waxer, B. M., and M. L. Baum. 2006. Internet surf and turf revealed: The essential guide to copy- right, fair use, and finding media. Boston, MA: Thomson Course Technology.