Vous êtes sur la page 1sur 37

LEGAL & ETHiCAL

USE OF
SCHOOL TECHNOLOGY
This chapter will enlighten you on the
proper and ethical use of software and
other school technologies.

Technology and software issues are


also elaborated in order for you to be
aware and be guided in doing the right
thing and avoiding the unacceptable
acts that may lead you to committing
mistakes or possible software and
technology crimes that against the law.
The Ethics
of
Computer Users
1. Help people and not to do harm.
2. Unit and files/ information ownership.
3. Share information
4. No to character assassination.
5. Use genuine software.
6. Mind your own business.
7. Prevent cyber bullying.
8. Create programs or software (social
impact)
Ethical Issues
in
Technology and Software
1.
Unauthorized
Access and use
of Hardware,
Software,
Network, and
Computer
Privacy
- Diaries, Messages, E-mails
Cracker/ Hacker Files.
- unauthorized access
- commit malicious acts (identity
Theft)
In creating a Password

• Use at least 8 characters


• Use a combination of upper and lower case
letters, words, number, and special
characters.
• Use joined words together.
• And one or more numbers at the beginning,
middle, or end of a word.
In creating a Password
• Use words from other languages.
• Use a password that can be
remembered easily.
• Select a password that can be entered
easily even without looking at the
keyboards.
• Don’t leave written copies of your
passwords anywhere.
• Don’t share your password to anyone.
FIREWALL

Restricts Teachers It is a security


and Students from system (Hardware
accessing malicious and/ or Software)
data that may do that blocks
harm in school’s unauthorized
computer hardware, access to data on
software, and files. a network.
Security challenges encountered by
school administration and Teachers

Computer Theft
- Stealing of hardware and its devices
Computer Vandalism
- is the act of damaging or breaking the
hardware; cutting cables and wires, smashing
the computer and its devices and deleting of
software or computer files.
Computer Protection
Security Cameras

Installing locks on the


computer units, devices and
its wires to keep them safe.
The best precautionary measure in
keeping the hardware safe is to have full
awareness on its security by not leaving it
anywhere and unattended.
Software Theft
- Software privacy

- Happens when a
person copies
illegally copyrighted
software for
personal or
business use.
A Software must be purchased

- right to use only not owned


- license (conditions prior to its use)
- agreement (prior to its use)
- End- user license
EULA agreement
- Single user license agreement

Common types of license included in software


packages purchased by an individual. (users)
• May install the software on only one computer
• Are prohibited to install the software on a
network (school computer lab network)
• May take one copy for back up purposes.
• Are prohibited to give copies to friends and
colleagues.
How is it illegal?

Going against the agreement is a violation of


copyright law, thus committing a federal crime.

U.S. penalties reach up to $250,000 and up to


five years in jail.

Philippines penalties breach up to


Php1,500,000 and up to 6- 9 years
imprisonment.
Schools enforce policies
regarding the installation and use
of computer software to make sure that
the conditions that have agreed upon are
strictly monitored and followed. To make
these policies known to all, it would be
better if Teachers are given orientation by
the academic heads, after which Teachers
orient their students regarding the use of
technologies with its software to prevent
such violations. (see MS Word table)
Information Theft

- It is a Computer crime when one


deliberately steals information for purposes in
how to compete with other organization or
companies.

- Getting confidential information about school


administration, academic officials, teachers,
staff, and students without legal authorization.
Encryption
- Implemented by the schools to prevent access
of information through the use of computers and
networks.
- It is the process of converting readable data to
unreadable one.
An encryption key is needed to enable the
person to back it in readable form.
The person who illegally accesses the
information would only see characters that do
not contain any meaning.
Malicious Acts in Software

The following malicious acts are commonly


experienced in e-mails, cellphones, instant
or text messaging devices and blogs.

• Spam
• Spam messages
• Phishing
• Malware
• Adware
Spam
- Unwanted messages received through e-mails
discussion boards, text messaging devices, and
others.
- Truly annoying for it fills up your inbox and then
later wastes your time in deleting these spam
messages
- It is sent through instant messaging device
(spim)
- It is sent through internet Telephony (split)
Spam Messages

-It can be reduced if not prevented by adjusting


the built- in settings in your e-mails to delete
spam automatically.

Outlook Express has in its set up that can


block messages from a particular sender or
subject.
Prevention
Email filtering can also be done by signing
up in your internet service provider.
- It blocks unwanted e-mail messages from
designated sources.
Anti- spam can also help block these
unwanted messages before it reaches your
inbox.

Issues: block and remove valid/ legal e-mail


messages.
Phishing

- May also be called as carding or spoofing.

- It is a scam in which an agent sends a


legitimate e-mail that attempts to steal
personal and financial information including
bank account numbers of the recipient.
Malware

- Is a malicious software that causes harm to


one or more computers.

- It enters to the scene when an attachment to a


message that carries a virus is opened and
then later shared to other computers via
network or via portable storage medium
(CD, external hard drive flash drive, etc.)
Adware

- Is a software that incorporates the presentation


of advertisement as condition for operating
software.
Acceptable and Unacceptable
Uses of School Technology

Schools may have different rules and


regulations or policies in implementing
acceptable and un acceptable use of school
technology. It is important to set this policies so
everyone in school, administration, academic
officials, Teachers, staff and students may be
guided and act accordingly in the proper use of
technologies. (see MS Word table)

Vous aimerez peut-être aussi