SlideShare a Scribd company logo
1 of 2
Write a Computer Use policy.
Be sure to answer all the required questions, listed below.
Explain ethical computing
Explain plagiarism and copyright infringement.
What is the difference between the two?
How do you know if you are plagiarizing or violating
copyright?
Research plagiarism and find an example of plagiarism that was
in the news.
Explain copyleft.
Explain software piracy.
What are the penalties?
Sharing an Internet connection
Penalties
Explain ethical issues related to using social media.
Give a specific example in which an employee was terminated
due to actions on social media.
Explain an employer’s
legal
right to review employee activities using their technology in
each of the following ways. For each method below , give
specific examples in which the law has been upheld or applied.
Keylogging
Reading emails
Monitoring Internet usage/sites visited

More Related Content

Similar to Write a Computer Use policy.Be sure to answer all the requ.docx

Information Ethics
Information EthicsInformation Ethics
Information Ethics
UMaine
 
Objective Apply decision making frameworks to IT-related ethica.docx
Objective Apply decision making frameworks to IT-related ethica.docxObjective Apply decision making frameworks to IT-related ethica.docx
Objective Apply decision making frameworks to IT-related ethica.docx
juliennehar
 
Ecom present part 2
Ecom present part 2Ecom present part 2
Ecom present part 2
Damo Ward
 
The first step of this assignment is an opportunity to analyze a.docx
The first step of this assignment is an opportunity to analyze a.docxThe first step of this assignment is an opportunity to analyze a.docx
The first step of this assignment is an opportunity to analyze a.docx
rhetttrevannion
 
The Internet and Law Enforcement Challenges The Internet h.docx
The Internet and Law Enforcement Challenges The Internet h.docxThe Internet and Law Enforcement Challenges The Internet h.docx
The Internet and Law Enforcement Challenges The Internet h.docx
kailynochseu
 

Similar to Write a Computer Use policy.Be sure to answer all the requ.docx (15)

Information Ethics
Information EthicsInformation Ethics
Information Ethics
 
Auto Response System for Legal Consultation
Auto Response System for Legal ConsultationAuto Response System for Legal Consultation
Auto Response System for Legal Consultation
 
Objective Apply decision making frameworks to IT-related ethica.docx
Objective Apply decision making frameworks to IT-related ethica.docxObjective Apply decision making frameworks to IT-related ethica.docx
Objective Apply decision making frameworks to IT-related ethica.docx
 
Review questions
Review questionsReview questions
Review questions
 
E Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical LegalE Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical Legal
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Stacy Robin - The Degania Group - Technology and the Law
Stacy Robin - The Degania Group - Technology and the LawStacy Robin - The Degania Group - Technology and the Law
Stacy Robin - The Degania Group - Technology and the Law
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptx
 
Ecom present part 2
Ecom present part 2Ecom present part 2
Ecom present part 2
 
Ethics By ZAK
Ethics By ZAKEthics By ZAK
Ethics By ZAK
 
The first step of this assignment is an opportunity to analyze a.docx
The first step of this assignment is an opportunity to analyze a.docxThe first step of this assignment is an opportunity to analyze a.docx
The first step of this assignment is an opportunity to analyze a.docx
 
Aet531 week6 nnb_final
Aet531 week6 nnb_finalAet531 week6 nnb_final
Aet531 week6 nnb_final
 
1. Research, identify, and discuss at least 2 emerging trends .docx
1. Research, identify, and discuss at least 2 emerging trends .docx1. Research, identify, and discuss at least 2 emerging trends .docx
1. Research, identify, and discuss at least 2 emerging trends .docx
 
The Internet and Law Enforcement Challenges The Internet h.docx
The Internet and Law Enforcement Challenges The Internet h.docxThe Internet and Law Enforcement Challenges The Internet h.docx
The Internet and Law Enforcement Challenges The Internet h.docx
 

More from smithhedwards48727

Write a essay about Gender stereotype in adaptation of fairy t.docx
Write a essay about Gender stereotype in adaptation of fairy t.docxWrite a essay about Gender stereotype in adaptation of fairy t.docx
Write a essay about Gender stereotype in adaptation of fairy t.docx
smithhedwards48727
 
Write a critical evaluation of your learning outcome. In your re.docx
Write a critical evaluation of your learning outcome. In your re.docxWrite a critical evaluation of your learning outcome. In your re.docx
Write a critical evaluation of your learning outcome. In your re.docx
smithhedwards48727
 
Write a cover letter explaining what makes you qualified to take c.docx
Write a cover letter explaining what makes you qualified to take c.docxWrite a cover letter explaining what makes you qualified to take c.docx
Write a cover letter explaining what makes you qualified to take c.docx
smithhedwards48727
 

More from smithhedwards48727 (20)

Write a five page paper that analysis the HispanicLatino politics i.docx
Write a five page paper that analysis the HispanicLatino politics i.docxWrite a five page paper that analysis the HispanicLatino politics i.docx
Write a five page paper that analysis the HispanicLatino politics i.docx
 
Write a five (5) paragraph (or longer) essay response . Write your e.docx
Write a five (5) paragraph (or longer) essay response . Write your e.docxWrite a five (5) paragraph (or longer) essay response . Write your e.docx
Write a five (5) paragraph (or longer) essay response . Write your e.docx
 
Write a few words about Email threats briefly and & An.docx
Write a few words about Email threats briefly and & An.docxWrite a few words about Email threats briefly and & An.docx
Write a few words about Email threats briefly and & An.docx
 
Write a essay about Gender stereotype in adaptation of fairy t.docx
Write a essay about Gender stereotype in adaptation of fairy t.docxWrite a essay about Gender stereotype in adaptation of fairy t.docx
Write a essay about Gender stereotype in adaptation of fairy t.docx
 
write a draft of your research paper. in your draft copy, develop th.docx
write a draft of your research paper. in your draft copy, develop th.docxwrite a draft of your research paper. in your draft copy, develop th.docx
write a draft of your research paper. in your draft copy, develop th.docx
 
Write a draft of your Research Paper.In your draft c.docx
Write a draft of your Research Paper.In your draft c.docxWrite a draft of your Research Paper.In your draft c.docx
Write a draft of your Research Paper.In your draft c.docx
 
Write a detailed, analytical paragraph on the short story, incorpora.docx
Write a detailed, analytical paragraph on the short story, incorpora.docxWrite a detailed, analytical paragraph on the short story, incorpora.docx
Write a detailed, analytical paragraph on the short story, incorpora.docx
 
Write a dialogue involving at least 10 - 15 interchanges about the e.docx
Write a dialogue involving at least 10 - 15 interchanges about the e.docxWrite a dialogue involving at least 10 - 15 interchanges about the e.docx
Write a dialogue involving at least 10 - 15 interchanges about the e.docx
 
Write a detailed report on one of the following topics1- Differ.docx
Write a detailed report on one of the following topics1- Differ.docxWrite a detailed report on one of the following topics1- Differ.docx
Write a detailed report on one of the following topics1- Differ.docx
 
Write a detailed report about a residential burglary. You are the of.docx
Write a detailed report about a residential burglary. You are the of.docxWrite a detailed report about a residential burglary. You are the of.docx
Write a detailed report about a residential burglary. You are the of.docx
 
Write a detailed report about a armed robbery to a convenience store.docx
Write a detailed report about a armed robbery to a convenience store.docxWrite a detailed report about a armed robbery to a convenience store.docx
Write a detailed report about a armed robbery to a convenience store.docx
 
Write a detailed report on International Association of classifi.docx
Write a detailed report on International Association of classifi.docxWrite a detailed report on International Association of classifi.docx
Write a detailed report on International Association of classifi.docx
 
Write a detailed report (15 pages excluding references and intro pag.docx
Write a detailed report (15 pages excluding references and intro pag.docxWrite a detailed report (15 pages excluding references and intro pag.docx
Write a detailed report (15 pages excluding references and intro pag.docx
 
Write a detailed evaluation of CWU — why you decided to come here to.docx
Write a detailed evaluation of CWU — why you decided to come here to.docxWrite a detailed evaluation of CWU — why you decided to come here to.docx
Write a detailed evaluation of CWU — why you decided to come here to.docx
 
Write a detail Psychiatric diagnosis and Treatment planregimen .docx
Write a detail Psychiatric diagnosis and Treatment planregimen .docxWrite a detail Psychiatric diagnosis and Treatment planregimen .docx
Write a detail Psychiatric diagnosis and Treatment planregimen .docx
 
Write a description of a process of doing grocery shopping so that y.docx
Write a description of a process of doing grocery shopping so that y.docxWrite a description of a process of doing grocery shopping so that y.docx
Write a description of a process of doing grocery shopping so that y.docx
 
Write a critical evaluation of your learning outcome. In your re.docx
Write a critical evaluation of your learning outcome. In your re.docxWrite a critical evaluation of your learning outcome. In your re.docx
Write a critical evaluation of your learning outcome. In your re.docx
 
write a description of Federich Woehler, Martin Kamen, Cornelis Bern.docx
write a description of Federich Woehler, Martin Kamen, Cornelis Bern.docxwrite a description of Federich Woehler, Martin Kamen, Cornelis Bern.docx
write a description of Federich Woehler, Martin Kamen, Cornelis Bern.docx
 
Write a cover letter explaining what makes you qualified to take c.docx
Write a cover letter explaining what makes you qualified to take c.docxWrite a cover letter explaining what makes you qualified to take c.docx
Write a cover letter explaining what makes you qualified to take c.docx
 
Write a critical essay on one of the following topics related to.docx
Write a critical essay on one of the following topics related to.docxWrite a critical essay on one of the following topics related to.docx
Write a critical essay on one of the following topics related to.docx
 

Recently uploaded

MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MysoreMuleSoftMeetup
 
Orientation Canvas Course Presentation.pdf
Orientation Canvas Course Presentation.pdfOrientation Canvas Course Presentation.pdf
Orientation Canvas Course Presentation.pdf
Elizabeth Walsh
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 

Recently uploaded (20)

21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Ernest Hemingway's For Whom the Bell Tolls
Ernest Hemingway's For Whom the Bell TollsErnest Hemingway's For Whom the Bell Tolls
Ernest Hemingway's For Whom the Bell Tolls
 
Orientation Canvas Course Presentation.pdf
Orientation Canvas Course Presentation.pdfOrientation Canvas Course Presentation.pdf
Orientation Canvas Course Presentation.pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 

Write a Computer Use policy.Be sure to answer all the requ.docx

  • 1. Write a Computer Use policy. Be sure to answer all the required questions, listed below. Explain ethical computing Explain plagiarism and copyright infringement. What is the difference between the two? How do you know if you are plagiarizing or violating copyright? Research plagiarism and find an example of plagiarism that was in the news. Explain copyleft. Explain software piracy. What are the penalties? Sharing an Internet connection
  • 2. Penalties Explain ethical issues related to using social media. Give a specific example in which an employee was terminated due to actions on social media. Explain an employer’s legal right to review employee activities using their technology in each of the following ways. For each method below , give specific examples in which the law has been upheld or applied. Keylogging Reading emails Monitoring Internet usage/sites visited