0% found this document useful (0 votes)
63 views33 pages

PED 411.lesson 8

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views33 pages

PED 411.lesson 8

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Legal and

Ethical Use of
Technology
PED 411. Lesson 8.
In the use of school technologies,
both teachers and students must
recognize and observe the ethical
use of school technologies to
achieve rightfully the main
purpose of technology – to
support teaching and learning.
OUTLINE

Ethical Issues in
Ethics for
01 Computer Use 02 Technology and
Software

Acceptable and
03 Unacceptable Uses of
School Technology
01
Ethics for Computer Use
Ethics for Computer Use

● Use the computer to help people and not to do harm.


● Use your own or assigned computer unit and not to
interfere with others’ work.
● Use the computer using your own files and not to use
others’ files.
● Use the computer to share information and not to steal
others’ information.
● Use the computer to spread truthful information and not
to do character assassination.
Ethics for Computer Use

● Use software that are original and legal and not pirated.
● Use others’ computer resources with permission and not
to duplicate it without authorization.
● Use your own work and not the work of others.
● Use the computer that shows respect and consideration
for other people and not to do cyberbullying.
● Create programs or software having in mind its social
impact and not for self-interest.
02
Ethical Issues in Technology
and Software
Ethical Issues in Technology and Software

1. Unauthorized Access and Use of


Hardware, Software, Network, and
Computer Files
● Unauthorized Access – using anybody’s
computer and files without permission from the
owner.
● Cracker/Hacker – accessing a computer or
network illegally to acccess data and commit
malicious acts like identity theft.
● Hacker – a person who breaks into the computer
system to steal or corrupt the data in it.
Ethical Issues in Technology and Software

We are advised most of the time


to protect our computer unit,
mobile phones, gadgets, and
files by providing a password so
no one can get into it and block
them from accessing and using
our gadgets and files.
Ethical Issues in Technology and Software

Tips in carefully creating a password:


1. Use at least eight characters.
2. Use a combination of upper and lower case letters, words,
numbers, and special characters.
3. Use joined words together.
4. Add one or more numbers at the beginning, middle, or end of
a word.
5. Use words from other languages.
6. Use a password that can be remembered easily.
Select a password that can be entered easily even without
looking at the keyboard.
7. Do not leave written copies of your passwords anywhere.
8. Do not share your password to anyone.
Ethical Issues in Technology and Software

2. Hardware Theft and Vandalism


● Computer Theft– stealing of hardware and its
devices.
● Computer Vandalism – act of damaging or
breaking the hardware-cutting the cables abd wires,
smashing the computer and its devices – and
deleting of software or computer files.
To prevent hardware theft and vandalism, security system and
precautionary measures are employed in schools such as
setting up of security cameras, installing locks in computer
units, devices, and its wires to keep these in place.

For LCD Projectors, that stay in the classroom, they are housed
in steel brackets with locks. Notebooks or laptops that are being
borrowed by teachers and students for class use are being
closely monitored.
Some schools implement policies that allow the administrators
or person-in-charge of the computer laboratory and other school
equipment to keep the hardware secured and intact.

The best precautionary measure in keeping the hardware safe


is to have full awareness on its security by not leaving it
anywhere and unattended.
Ethical Issues in Technology and Software

3. Software Theft
● Software privacy – is a form of software theft.
This happens when a person copies illegally
copyrighted software for personal or busines use.

● EULA– end-user license agreement or single-user


license agreement in the common type of license
included in software packages purchased by an
individual.
EULA Conditions:
1. Users may install the software on only one computer.
2. Users are prohibited to install the software on a network
(school computer lab network)
3. Users may make one copy for backup purposes
4. Users are prohibited to give copies to friends and colleagues.
Going against the agreement is a violation of
copyright law, thus, committing a federal crime.
In US, penalties reach up to $250,000 and up to
five years in jail.

In the Philippines, penalties reach up to Php


1,500,000 and up to 6-9 years imprisonment.
Schools reinforce policies regarding the
installation and use of computer software
to make sure that the conditions that
have agreed upon are strictly monitored
and followed.
To make these policies known to all, it
would be better if teachers are given
orientation by the academic heads, after
which teachers orient their students
regarding the use of technologies with its
software to prevent such violation.
VARIOUS TYPES OF SOFTWARE LICENSES
Type of License Characteristics Used in Schools

Single-user Software can be installed only in one Used when a school needs
computer. Some license agreements only a few copies of a
allow users to install the software o particular software.
one desktop computer and one Commonly found in small
notebook computer. schools and when
purchasing specialized
software programs.
Multiple-user Software can be installed on a set Cost-effective method to
number of computers, typically install software on more than
5,10,50 or more. Cost varies based one computer. Most
on number of computers. commonly used in schools.
VARIOUS TYPES OF SOFTWARE LICENSES
Type of License Characteristics Used in Schools

Network License Software is installed on the school’s Cost-effective method of


network. The license will specify allowing students and teachers
and the software will control a throughout the school to have
specific number of simultaneous access to an application
users, such as 50, 100, 250, or 500. software program. As schools
Cost varies based on number of continue to install networks,
computers. network license are becoming
common.

Community Frequently used with software Very cost-effective method for


License distributed on CDs/DVDs. Any school districts to purchase
number of programs can be large quantities of software.
purchased from either Macintosh or Savings can be significant over
PC platforms. individual CD or DVD pricing.
Ethical Issues in Technology and Software

4. Information Theft
● Information theft – a computer crime when one
deliberately steals information for purposes of
studying how to compete with other organizations or
companies. Getting confidential information about
school administrators, academic officials, teachers,
staff, and students without legal authorization.
To prevent access of information through the use of
computers and networks, schools implement the use of
encryption. Encryption is the process of converting
readable data to unreadable one. An encryption key is
needed to enable the person to convert it back in
readable form. A person who illegally accesses the
information would only see characters that do not
contain any meaning.
Ethical Issues in Technology and Software

5. Malicious Acts in Software


● commonly experienced in e-mails, cellphones,
instant or text messaging devices and blogs.
Spam – an unwanted message being received through e-
mails, discussion boards, text messaging devices,
and others.
Spim – a spam sent through instant messaging devices

Split – a spam sent through internet telephony

Phishing – also called as carding or spoofing. A scam in


which an agent sends a legitimate-looking email
that attempts to steal personal and financial
information including bank account numbers of the
recipient.
Spam messages can be reduced if not prevented by
adjusting the built-in settings in your e-mails to delete
spam automatically. Outlook express has in its set up that
can block messages from a particular sender or subject.
.
.
Email filtering can also be done by signing up in your
Internet service provider. E-mail filtering blocks unwanted e-
mail messages from designated sources. Antispam program
can also help block these unwanted messages before it
reaches your inbox. The problem that these antispam and e-
mail filtering can bring is that it sometimes block and remove
valid/legal e-mail messages.
.
Malware – a malicious software that causes harm to one or
more computers. This malware enters to the scene when an
attachment to a message that carries a virus is opened and
then later shared to other computers via network or via
portable storage medium (CD, external hard drive, flash
drive, etc).

Adware – is a software that incorporates the presentation


of advertisement as condition for operating the software.
Acceptable and

03 Unacceptable Uses of
School Technology
Schools may have different rules
and regulations or policies in
implementing acceptable and
unacceptable use of school
technology. It is important to set
these policies so everyone in
school, administrators, academic
officials, teachers, staff,and
students may be guided and act
accordingly in the proper use of
school technologies.
Acceptable and Unacceptable Uses of
School Technology

Examples of Acceptable Use of School Technology

1. Abiding by the policies and procedures of other networks that are accessed.
2. Being polite and using appropriate language.
3. Deleting unwanted messages or old data from computers and servers.
4. Enforcing appropriate use and reporting misuse or security issues.
5. Running antivirus software on downloaded files, attachments, peripherals, or disks.
6. Signing correspondence.
7. Using online time efficiently.
8. Using the Internet ethically and legally.
Acceptable and Unacceptable Uses of
School Technology
Examples of Unacceptable Use of School Technology
1. Altering software by deleting files, downloading programs, or copying or installing
unauthorized files or programs.
2. Assuming the identity or using the passwords or materials of another.
3. Conducting commercial activities, advertising products, or taking part in political
lobbying.
4. Downloading text, graphics, or software, or engaging in behaviors that may be
considered obscene, abusive, libelous, indecent, vulgar, profane, or lewd.
5. Gaining access to any pay-for-view site.
6. Giving out your own or other’s private information, such as address, phone number,
or passwords.
7. Harassing an individual using the Internet.
8. Plagiarizing
9. Transmitting material that violates any local or country’s regulation, such as
copyrighted, threatening, or obscene material.
10. Vandalizing equipment, digital files, or willfully spreading computer viruses.
Technology shouldn’t just be a gimmick to motivate learning. It should
open a whole new world of possibilities for learning.
~Geurin, n.d.
Thank you!

CREDITS: This presentation template was created


by Slidesgo, including icons by Flaticon,
infographics & images by Freepik
Please keep this slide for attribution

You might also like