HK = [ Faqs ] [ Archive ] [ Community ] [ Map ] [ Search ] [ Link ] = HK
[ Newsletter ] [ MailingList ] [ Blog ] [ Updates ] [ News ]
     
 
Torna all'HK-Lex-Menu

INTERNET USE POLICY by Laith Mohammed Murad
Name: Laith Mohammed Murad.

ID # : 200011242.

Agenda

Overview

Rule #1 - Personal Safety

Rules #2 & #3 - Interfering

Rules #4 & #5 - Illegal Acts

Rules #6 & #7 & #8- Copying

Rules #9 - Inappropriate Behavior

Rules #10 - Privileges vs.. Rights

Overview

How can we communicate to our students, their parents and our colleagues the standards for acceptable use of copyright materials and ethical use of digital media?

Resources: Developing an Ethical Compass for Worlds of Learning by Doug Johnson

Our Rights: We are following the idea that the public has a right to expect:

To experiment with variations of copyrighted materials for fair use purpose, while preserving the integrity of the original.

To make or have made for them a first generation copy for personal use of an article or other small part of a publicly marketed copyrighted work or a work in a library’s collection for such purposes as study, scholarship, or research.

http://arl.cni.org/scomm/copyright/uses.html

Personal Rights

Rule #1: Thou shalt not use a computer to harm other people or yourself.

Personal Safety and Personal Privacy

Do not post personal information and let a teacher know immediately if you receive an inappropriate message or one that makes you feel uncomfortable

REMEMBER YOU ARE RESPONSIBLE FOR YOUR INDIVIDUAL ACCOUNT AND THE INFORMATION THAT IS ATTACHED TO IT!

INTERFERING

Rule #2: Thou shalt not interfere with other people’s computer work

Respect your fellow classmates. Do not play around with their computer or work.

Rule #3: Thou shalt not snoop around in other people’s computer files

Illegal activities are logging into another person’s account or access another person’s file.

Illegal Acts

Rule #4: Thou shalt not use a computer to steal.

You are not allowed to disrupt the computer system or destroy data.

You are not to use the computer for illegal acts like arranging a drug sale or engaging in criminal gang activities

Rule #5: Thou shalt not use a computer to bear false witness.

RESPECT PRIVACY - Do not repost a message that was sent to you privately without permission.

Nor - Do not send information using someone ellse’s name

Copying

Rule #6: Thou shalt not copy or use proprietary software for which you have not paid.

UNAUTHORIZED copying of software is illegal. See www.inform.umd.edu/software-guide

Rule #7: Thou shalt not use other people’s computer resources without authorization or proper compensation.

You are not allowed to use computer resources for commercial or money-making purposes without authorization.

Rule #8: Thou shalt not appropriate other people’;s intellectual output.
http://uresponsibleuse.uoregon.edu

Plagiarism - You will not take ideas or writing of otthers and present them as they were yours.

Inappropriate Behavior

Rule #9: Thou shalt think about the SOCIAL CONSEQUENCES about the program/e-mail/instant message you are writing or the system that you are designing.

Inappropriate Language(swearing) and Harassment is punishable by law.

Harassment is persistently acting in a manner that distresses or annoys another person

IF YOU ARE TOLD TO STOP SENDING MESSAGES, YOU MUST STOP!

PRIVILEGES VS. RIGHTS

Rule #10: Thou shalt always use a computer in ways that insure consideration and respect for your fellow human beings.

You need to understand your rights as well as your responsibilities.

If you abuse these rights you can:

1) Loose internet computer privileges and/or

2) Legal action can be taken against you.

REMEMBER THAT INTERNET ACCESS IS A PRIVELAGE

NOT A RIGHT!

[ Top ]

Released By DaMe`
Visits [1321593]