Online Ethics, Safety, and Privacy Module 6. Go to Follow these breadcrumbs: Engineering &...

Post on 25-Dec-2015

213 views 0 download

Tags:

Transcript of Online Ethics, Safety, and Privacy Module 6. Go to Follow these breadcrumbs: Engineering &...

Online Ethics,

Safety, and PrivacyModule 6

Go to www.brainpop.com Follow these breadcrumbs: Engineering & Technology Digital Citizenship, Digital Etiquette, TAKE CLASSIC QUIZ EMAIL your results to

kyshacoleman08@gmai

l.com

Bellr

inger

(7-1

0 m

inute

s)

WO

RD

STU

DY

copyright

Eth

ical

Guid

elin

es

Check with teacher before downloading large files Be sure not to abuse

company or school e-

mail systems (digital

paper trail) Avoid plagiarism

Eth

ical

Guid

elin

es

Do not take home computer-related resources i.e. CD-ROMS Only use legal file

sharing sites Follow copyright laws Evaluate information

on website (relevant,

reliable, recent, verifiable)

Use

com

pute

rs for w

hat

they a

re fo

r . . . WO

RK

! GAMES

PERSONAL

EMAIL

OFFENSIVE

MATERIAL

ON THE

INTERNET

BIG

BR

OTH

ER

’S

WATC

HIN

G . . .

Hidden

software

application

s watch

what you

do

Keystrokes

Everything

users do

while on

machine

What

emails are

sent

Ready

for

som

e

DO

TS?

Tech Check, page 100

Copyr

ights

and

Wro

ngs

A copyright protects

someone who creates

an original work. Books, plays, sentences Protection provided by

the Copyright Act of

1976

How

do y

ou

copyr

ight

an o

rigin

al

work

?

If you create an original work, it is automatically protected Registering with

Copyright Office in the

Library of Congress provides additional protections

Want

to u

se

copyr

ighte

d

work

?

Obtain permission (authorization) for the

copyright holder Book: letter to

publisher Web: contact webmaster or author

of article

How

long b

efo

re

copyr

ights

ex

pir

e?

Works created since January 1, 1978: 70

years after the creator’s death Before then, anywhere

from 28 to 67 years from date of creation

(with options for renewal)

Exp

ired W

ork

s

Once a work’s copyright has expired,

it’s in the public domain—nobody owns it Although public

domain is free, still cite the source.

Is t

his

a f

act

? “If it does not say it is

copyrighted, it is not

copyrighted”

Is t

his

a f

act

? “ I found it on the

Internet, therefore it is

okay for me to copy it”

Is t

his

a f

act

? “It is okay to put copyrighted material

on my website, because I do not charge people to look

at it”

Is t

his

a f

act

?

“I have changed the

material, so it is no longer copyrighted”

Only the owner of the

copyright can make derivative works (new works based on

the existing material)

Is t

his

a f

act

?

“ I can reprint the material, because it is

considered fair use” Fair use refers to the

right to reprint brief excerpts from copyrighted works without permission.

Ready

for

som

e

more

DO

TS?

Tech Check, page 103

Ess

ay

com

ing t

o a

class

room

near

you!

5 paragraphs (intro, 3

body, conclusion) Typed Single-spaced (enter

twice between paragraphs) Theme: Tips for Online

Ethics, Safety, and Privacy Due Date: August 29 th

Print and submit

Neti

quett

e Rules of etiquette for

online communication

media provided by the

Internet Email, chat rooms, newsgroups

E-m

ail most widely used

Internet convenience Changed how people

live, work, and socialize

Make

a g

ood

impre

ssio

n Be clear and concise Keep responses in

context Proper spelling, capitalization, and grammar

Do n

ot

send

larg

e

att

ach

ments

. . .

. . . Unless recipient is

expecting it Takes time to download

When f

orw

ard

ing

. . . Trim off unnecessary

information Delete e-mail addresses for prior forwarded names

Watc

h w

hat

you

type! Don’t say anything

about someone you wouldn’t want them to

hear. Even after deleted, message is still there

for a while

Chain

lett

ers

. . .

Never send or forward

chain letters Often fraudulent

Do N

ot

“Spam

Junk e-mail Billion dollar problem Clogs email systems Wastes time

Do n

ot

SH

OU

T Avoid using capital

letters All caps considered to

be rude

Chat

Room

s Can be useful

communication tools Can also be a ball of

confusion

Choose

wis

ely

Some have questionable people Do some research first

Behave

like

you

are

face

-to-f

ace

Words can be misinterpreted

Treat

oth

ers

like

.

. . . You would treat them

in person Don’t threaten, harass, or abuse any

participants

Take

turn

s w

ith

the c

onve

rsati

on

Allow people to finish

their thoughts Don’t interrupt

Be a

ware

of

“lurk

ers

” People who are

reading, but not taking

part in conversation

New

sgro

ups

Join one with rules for

participation Stay on topic Do not flame (aggressive or insulting letter)

Know your facts Do not hide behind a

screen name

Tech Check, page 106

Dot . . . Dot . . . Dot . . . Or Goose

Egg?

Sta

ying S

afe

O

nlin

e

Always evaluate to whom you are sending

information and why

you are sending it. Beware of identity theft (someone taking

your personal information)

Inte

rnet

Sca

ms

Phishing: scam in which an identity thief

sends you an e-mail pretending to represent a company

Posing as a foreigner

asking for money Identify theft protection and credit

repair “You won a prize!”

Preca

uti

ons

Know to whom you are

giving information Why are you giving

information Never give out SSN, DOB, or mother’s maiden name without

adult consent Never give personal info to someone met

in a chat room Never give your password to anyone

Tech Check, page 110

Time to check! (your learning,

that is)

Essa

y: Onlin

e E

thics,

Safe

ty, and Priva

cyLet’s quietly work on our

essay.

Ass

ess

ment

Go to classroom website,

My Links, Computer Applications/Interactive

Multimedia, Technology

Handbook Select Module 6 Online

Ethics, Safety, and Privacy

Scroll down to Module 6

Assessment Online Ethics,

Safety and Privacy Complete 1-22 on your

notebook paper. Submit.