Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
You can change this under Settings & Account at any time.
The Safe, Legal, and Ethical Use of Digital Information and Technology
Transcript of The Safe, Legal, and Ethical Use of Digital Information and Technology
information and technology is possible
when paired with balanced, responsible,
and knowledgeable training.
CIPA Requirements: * Enacted to address children's access to obscene
or harmful internet content. * Schools can receive discounts through the E-rate
program if they adhere to CIPA rules. a. access by minors to inappropriate matter on the
b. the safety and security of minors when using
electronic mail, chat rooms and other forms of
direct electronic communications.
c. unauthorized disclosure, use, and dissemination
of personal information regarding minors,
d. Measures restricting minors' access to materials
harmful to them. * Schools must have 2 additional certifications:
1. Internet safety policies must include monitoring
the online activities of minors;
2. As required by the Protecting Children in the 21st
Century Act, they must provide for educating
minors about inappropriate online behavior. Schools' Internet Policy must address: * Students must be vigilantly
monitored when using computers
and the internet.
* Students must be taught the
importance of not giving out
personal information on the internet.
* Most students have always had the
internet as part of their everyday
lives. The internet feels less foreign to kids because they have encountered social networking sites at young ages. The idea that they might keep some things to themselves seems stranger to them than it does to us. Legal and Ethical? This is a gray area for many people.
Whenever someone uses the works of another person -- pictures, words, music, etc. that is copyrighted -- that is stealing unless due credit is given.
Students copy and paste at will, without giving much thought to legality. 4 Factors to Determine whether a use is fair 1. The purpose of the copying, and copying to support
an educational use meets this standard.
2. How much has been copied.
3. What kind of material has been copied.
4. The potential financial loss to the creator. Game Classroom Website that has an easy to understand Q&A game on Copyrighting. www.gameclassroom.com Misinformation is Harmful Kids are told that using technology is high-risk behavior.
Downloading music is compared to stealing a bicycle, even though many downloads are lawful.
This discourages kids from following their natural inclination to be innovative and inquisitive. Ten Commandments of Computer Ethics 1. Thou shalt not use a computer to harm other people.
2. Thou shalt not interfere with other people's
3. Thou shalt not snoop around in other people's files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness.
6. Thou shalt not copy or use proprietary software for
which you have not paid.
7. Thou shalt not use other people's computer
resources without authorization or proper
8. Thou shalt not appropriate other people's
9. Thou shalt think about the social consequences of
the program you write or the system you design.
10. Thou shalt use a computer in ways that show
consideration of and respect for your fellow
Excerpt from Education World.