SlideShare une entreprise Scribd logo
1  sur  12
Teaching Ethical and Legal use of Technology in the Classroom By Alicia Faust
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Teaching Ethical and Legal use of Technology in The classroom
What is acceptable and appropriate  use if Internet in schools? “ Appropriate use” must always be related to  teaching Computers are there to support a curriculum already  being taught.   The attractiveness or novelty of the computer   should not overpower the student learning.   Computers should not change teaching methods. Their  inclusion should simply help improve learning.
What obligations do teachers and  administrators have as a result of  introducing the Internet into their schools? Acceptable Use Policies: Four essential parts 1. The policy explains how the Internet is connected to teaching and learning. 2. The policy explains student responsibilities while online. 3. The policy explains repercussions that will result from the violation of policies. 4. The policy is written and agreed to by parents and students Equitable access in a school or classroom:  All students must have equal access to computers regardless of gender, special needs, socioeconomic status or race. Teaching and obeying Copyright laws:   Teachers must follow copyright laws and in turn educate students about copyright laws.
Links for templates for acceptable use forms http://165.224.221.98/pubs2005/tech_suite/app_A.asp#H1 http://www.2learn.ca/mapset/SafetyNet/AUPS.html http://www.auditnet.org/docs/internet_acceptable_use_policy_t.htm http://www.awesomelibrary.org/Classroom/Technology/Integrating_Technology/Acceptable_Use_Policies.html
Click here to view a sample acceptable use form
How can teachers teach students ethical,   acceptable and appropriate ways to use the   Internet? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Wikipedia  is an example of an online resource that students should be taught  not  to trust. Below is an example of how  anyone  visiting this site can edit the definition of a word.  Wikipedia  is one of the first choices of websites given when a word is searched on  google . Students are quick to click on the first option when searching online.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
For more information about evaluating web pages click on the link below. http://www.lib.berkeley.edu/TeachingLib/Guides/Internet/Evaluate.html
What should I do if something inappropriate appears on the computer screen when I am working? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],This is a sign I have posted by the computers in my fourth grade classroom
In conclusion ,[object Object],[object Object],[object Object]

Contenu connexe

Tendances

Module 2 - The Demands of the Society from the Teacher as a professional.pdf
Module 2 - The Demands of the Society from the Teacher as a professional.pdfModule 2 - The Demands of the Society from the Teacher as a professional.pdf
Module 2 - The Demands of the Society from the Teacher as a professional.pdfTinAdlawan
 
21st Century Teaching Tools
21st Century Teaching Tools21st Century Teaching Tools
21st Century Teaching ToolsOllie Bray
 
Inductive method by Anna Mapeth Evangelista
Inductive method by Anna Mapeth EvangelistaInductive method by Anna Mapeth Evangelista
Inductive method by Anna Mapeth EvangelistaBSEPhySci14
 
Media, technology, and learning
Media, technology, and learningMedia, technology, and learning
Media, technology, and learningArgie Mabag
 
Instructional Materials & Technology Used in Teaching
Instructional Materials & Technology Used in TeachingInstructional Materials & Technology Used in Teaching
Instructional Materials & Technology Used in TeachingJewel Jem
 
Cyber / digital literacy.pptx
Cyber / digital literacy.pptxCyber / digital literacy.pptx
Cyber / digital literacy.pptxFloralyn Victoria
 
ICT- concept mapping
ICT-  concept mappingICT-  concept mapping
ICT- concept mappingAnju Soman
 
Promoting and Modeling Digital Citizenship and Responsibility
 Promoting and Modeling Digital Citizenship and Responsibility Promoting and Modeling Digital Citizenship and Responsibility
Promoting and Modeling Digital Citizenship and ResponsibilityE Robertson
 
Brief lesson plan - Gerund
Brief lesson plan - GerundBrief lesson plan - Gerund
Brief lesson plan - GerundAubrey Rose
 
Cooperative Learning with the Computer
Cooperative Learning with the ComputerCooperative Learning with the Computer
Cooperative Learning with the ComputerAbraham Malacao
 
Ict integration in education
Ict integration in educationIct integration in education
Ict integration in educationBoutkhil Guemide
 
Safety Issues with ict
Safety Issues with ictSafety Issues with ict
Safety Issues with ictsromero26
 
ADDIE model plan
ADDIE model planADDIE model plan
ADDIE model planDohaADakik
 
Cybersafety Version1
Cybersafety Version1Cybersafety Version1
Cybersafety Version1sabrinacotta
 
Assure lesson plan 21st century
Assure lesson plan 21st centuryAssure lesson plan 21st century
Assure lesson plan 21st centurycampbellkimone
 
ICT- Pedagogy Iintegration
ICT- Pedagogy IintegrationICT- Pedagogy Iintegration
ICT- Pedagogy IintegrationVasudha Kamat
 
My addie model
My addie modelMy addie model
My addie modelFattimaaaH
 

Tendances (20)

Module 2 - The Demands of the Society from the Teacher as a professional.pdf
Module 2 - The Demands of the Society from the Teacher as a professional.pdfModule 2 - The Demands of the Society from the Teacher as a professional.pdf
Module 2 - The Demands of the Society from the Teacher as a professional.pdf
 
21st Century Teaching Tools
21st Century Teaching Tools21st Century Teaching Tools
21st Century Teaching Tools
 
Inductive method by Anna Mapeth Evangelista
Inductive method by Anna Mapeth EvangelistaInductive method by Anna Mapeth Evangelista
Inductive method by Anna Mapeth Evangelista
 
Ict policies and issues
Ict policies and issuesIct policies and issues
Ict policies and issues
 
Media, technology, and learning
Media, technology, and learningMedia, technology, and learning
Media, technology, and learning
 
Instructional Materials & Technology Used in Teaching
Instructional Materials & Technology Used in TeachingInstructional Materials & Technology Used in Teaching
Instructional Materials & Technology Used in Teaching
 
Cyber / digital literacy.pptx
Cyber / digital literacy.pptxCyber / digital literacy.pptx
Cyber / digital literacy.pptx
 
ICT- concept mapping
ICT-  concept mappingICT-  concept mapping
ICT- concept mapping
 
Promoting and Modeling Digital Citizenship and Responsibility
 Promoting and Modeling Digital Citizenship and Responsibility Promoting and Modeling Digital Citizenship and Responsibility
Promoting and Modeling Digital Citizenship and Responsibility
 
Brief lesson plan - Gerund
Brief lesson plan - GerundBrief lesson plan - Gerund
Brief lesson plan - Gerund
 
Cooperative Learning with the Computer
Cooperative Learning with the ComputerCooperative Learning with the Computer
Cooperative Learning with the Computer
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 
Ict integration in education
Ict integration in educationIct integration in education
Ict integration in education
 
Safety Issues with ict
Safety Issues with ictSafety Issues with ict
Safety Issues with ict
 
ADDIE model plan
ADDIE model planADDIE model plan
ADDIE model plan
 
Cybersafety Version1
Cybersafety Version1Cybersafety Version1
Cybersafety Version1
 
Assure lesson plan 21st century
Assure lesson plan 21st centuryAssure lesson plan 21st century
Assure lesson plan 21st century
 
Sample tos
Sample tosSample tos
Sample tos
 
ICT- Pedagogy Iintegration
ICT- Pedagogy IintegrationICT- Pedagogy Iintegration
ICT- Pedagogy Iintegration
 
My addie model
My addie modelMy addie model
My addie model
 

En vedette

Safe and ethical use of technology in the classroom power point final
Safe and ethical use of technology in the classroom power point finalSafe and ethical use of technology in the classroom power point final
Safe and ethical use of technology in the classroom power point finalejl2
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyRachel Farnese
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computingsappingtonkr
 
Legal & ethical issues when implementing technology
Legal & ethical issues when implementing technologyLegal & ethical issues when implementing technology
Legal & ethical issues when implementing technologypeav1n0
 
My digital footprint and PLN
My digital footprint and PLNMy digital footprint and PLN
My digital footprint and PLNmacfam6
 
Evaluation of educational technology and its current application
Evaluation of educational technology and its current applicationEvaluation of educational technology and its current application
Evaluation of educational technology and its current applicationRhoda malazarte
 
Ethical issues in education
Ethical issues in educationEthical issues in education
Ethical issues in educationMarie Amirtharaj
 
Code of Ethics for Professional Teachers of the Philippines
Code of Ethics for Professional Teachers of the PhilippinesCode of Ethics for Professional Teachers of the Philippines
Code of Ethics for Professional Teachers of the PhilippinesJohn Bernal
 
Module 6 lesson 2
Module 6 lesson 2Module 6 lesson 2
Module 6 lesson 2Boyet Aluan
 
Action Plan for Classroom Technology Integration
Action Plan for Classroom Technology IntegrationAction Plan for Classroom Technology Integration
Action Plan for Classroom Technology IntegrationGarlander
 
Classroom Technology Humor
Classroom Technology HumorClassroom Technology Humor
Classroom Technology HumorDonna Havard
 
Nichole PowerPoint Presentation
Nichole PowerPoint PresentationNichole PowerPoint Presentation
Nichole PowerPoint Presentationnroyston1
 
Effective use of technology in the classroom
Effective use of technology in the classroomEffective use of technology in the classroom
Effective use of technology in the classroomAaron Carn
 
Technology acceptable use policy for students 08202011[1]
Technology acceptable use policy for students 08202011[1]Technology acceptable use policy for students 08202011[1]
Technology acceptable use policy for students 08202011[1]ajdredla
 
Ethics teaching student with asd
Ethics teaching student with asdEthics teaching student with asd
Ethics teaching student with asdsuziw
 
Digital citizenship and_responsibility
Digital citizenship and_responsibilityDigital citizenship and_responsibility
Digital citizenship and_responsibilityEDUC3770
 
Teaching And Learning In A Digital World (Without Breaking The Law)
Teaching And Learning In A Digital World (Without Breaking The Law)Teaching And Learning In A Digital World (Without Breaking The Law)
Teaching And Learning In A Digital World (Without Breaking The Law)Chris Betcher
 
Technology in the Classroom
Technology in the ClassroomTechnology in the Classroom
Technology in the Classroomjordanh
 

En vedette (20)

Safe and ethical use of technology in the classroom power point final
Safe and ethical use of technology in the classroom power point finalSafe and ethical use of technology in the classroom power point final
Safe and ethical use of technology in the classroom power point final
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in Technology
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computing
 
Legal & ethical issues when implementing technology
Legal & ethical issues when implementing technologyLegal & ethical issues when implementing technology
Legal & ethical issues when implementing technology
 
My digital footprint and PLN
My digital footprint and PLNMy digital footprint and PLN
My digital footprint and PLN
 
Evaluation of educational technology and its current application
Evaluation of educational technology and its current applicationEvaluation of educational technology and its current application
Evaluation of educational technology and its current application
 
Ethical issues in education
Ethical issues in educationEthical issues in education
Ethical issues in education
 
Code of Ethics for Professional Teachers of the Philippines
Code of Ethics for Professional Teachers of the PhilippinesCode of Ethics for Professional Teachers of the Philippines
Code of Ethics for Professional Teachers of the Philippines
 
Ethics
EthicsEthics
Ethics
 
Module 6 lesson 2
Module 6 lesson 2Module 6 lesson 2
Module 6 lesson 2
 
Action Plan for Classroom Technology Integration
Action Plan for Classroom Technology IntegrationAction Plan for Classroom Technology Integration
Action Plan for Classroom Technology Integration
 
Classroom Technology Humor
Classroom Technology HumorClassroom Technology Humor
Classroom Technology Humor
 
Nichole PowerPoint Presentation
Nichole PowerPoint PresentationNichole PowerPoint Presentation
Nichole PowerPoint Presentation
 
Effective use of technology in the classroom
Effective use of technology in the classroomEffective use of technology in the classroom
Effective use of technology in the classroom
 
ICF course introduction
ICF course introductionICF course introduction
ICF course introduction
 
Technology acceptable use policy for students 08202011[1]
Technology acceptable use policy for students 08202011[1]Technology acceptable use policy for students 08202011[1]
Technology acceptable use policy for students 08202011[1]
 
Ethics teaching student with asd
Ethics teaching student with asdEthics teaching student with asd
Ethics teaching student with asd
 
Digital citizenship and_responsibility
Digital citizenship and_responsibilityDigital citizenship and_responsibility
Digital citizenship and_responsibility
 
Teaching And Learning In A Digital World (Without Breaking The Law)
Teaching And Learning In A Digital World (Without Breaking The Law)Teaching And Learning In A Digital World (Without Breaking The Law)
Teaching And Learning In A Digital World (Without Breaking The Law)
 
Technology in the Classroom
Technology in the ClassroomTechnology in the Classroom
Technology in the Classroom
 

Similaire à Teaching Ethical and Legal use of Technology in the Classroom

Legal Issues Related To School District Web Sites Cas 4 26 07
Legal Issues Related To School District Web Sites Cas 4 26 07Legal Issues Related To School District Web Sites Cas 4 26 07
Legal Issues Related To School District Web Sites Cas 4 26 07Mike Fisher
 
Web Filters And Other Evil Doers
Web Filters And Other Evil DoersWeb Filters And Other Evil Doers
Web Filters And Other Evil Doerscathtech
 
Web Filters And Other Evil Doers
Web Filters And Other Evil DoersWeb Filters And Other Evil Doers
Web Filters And Other Evil DoersJazayer
 
Privacy, copyright, ip and safe use presentation final
Privacy, copyright, ip and safe use presentation finalPrivacy, copyright, ip and safe use presentation final
Privacy, copyright, ip and safe use presentation finalthsieh
 
Acceptable Internet Use In Schools
Acceptable Internet Use In SchoolsAcceptable Internet Use In Schools
Acceptable Internet Use In Schoolsvlferrari
 
Ferrari v policy
Ferrari v policyFerrari v policy
Ferrari v policyvlferrari
 
Topic 5 Aup
Topic 5  AupTopic 5  Aup
Topic 5 AupBlair E
 
Introduction to edmodo
Introduction to edmodoIntroduction to edmodo
Introduction to edmodoAmanda Cochran
 
Staff training session
Staff training sessionStaff training session
Staff training sessionmander5208
 
Major Concepts of Technology
Major Concepts of TechnologyMajor Concepts of Technology
Major Concepts of TechnologyJoe Tedesco
 
Online teaching and learning resource guide
Online teaching and learning resource guideOnline teaching and learning resource guide
Online teaching and learning resource guidepabraham8064
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policyjsmarr11
 
Acceptable use policy[1]
Acceptable use policy[1]Acceptable use policy[1]
Acceptable use policy[1]jsmarr11
 
A Guide to Acceptable USe Policies in Education
A Guide to Acceptable USe Policies in EducationA Guide to Acceptable USe Policies in Education
A Guide to Acceptable USe Policies in Educationmwolfrey
 
Aet 531 wk 6 individual assignment
Aet 531 wk 6 individual assignmentAet 531 wk 6 individual assignment
Aet 531 wk 6 individual assignmentvolkswagon24
 
Social media policy
Social media policySocial media policy
Social media policyHar1982
 
Technology Integration Initiative
Technology Integration InitiativeTechnology Integration Initiative
Technology Integration Initiativehpetrich
 

Similaire à Teaching Ethical and Legal use of Technology in the Classroom (20)

Legal Issues Related To School District Web Sites Cas 4 26 07
Legal Issues Related To School District Web Sites Cas 4 26 07Legal Issues Related To School District Web Sites Cas 4 26 07
Legal Issues Related To School District Web Sites Cas 4 26 07
 
Web Filters And Other Evil Doers
Web Filters And Other Evil DoersWeb Filters And Other Evil Doers
Web Filters And Other Evil Doers
 
Web Filters And Other Evil Doers
Web Filters And Other Evil DoersWeb Filters And Other Evil Doers
Web Filters And Other Evil Doers
 
Privacy, copyright, ip and safe use presentation final
Privacy, copyright, ip and safe use presentation finalPrivacy, copyright, ip and safe use presentation final
Privacy, copyright, ip and safe use presentation final
 
Acceptable Internet Use In Schools
Acceptable Internet Use In SchoolsAcceptable Internet Use In Schools
Acceptable Internet Use In Schools
 
Ferrari v policy
Ferrari v policyFerrari v policy
Ferrari v policy
 
Topic 5 Aup
Topic 5  AupTopic 5  Aup
Topic 5 Aup
 
Introduction to edmodo
Introduction to edmodoIntroduction to edmodo
Introduction to edmodo
 
Staff training session
Staff training sessionStaff training session
Staff training session
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Chapter6
Chapter6Chapter6
Chapter6
 
Major Concepts of Technology
Major Concepts of TechnologyMajor Concepts of Technology
Major Concepts of Technology
 
Online teaching and learning resource guide
Online teaching and learning resource guideOnline teaching and learning resource guide
Online teaching and learning resource guide
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
Week 15 ppt eme2040
Week 15 ppt eme2040Week 15 ppt eme2040
Week 15 ppt eme2040
 
Acceptable use policy[1]
Acceptable use policy[1]Acceptable use policy[1]
Acceptable use policy[1]
 
A Guide to Acceptable USe Policies in Education
A Guide to Acceptable USe Policies in EducationA Guide to Acceptable USe Policies in Education
A Guide to Acceptable USe Policies in Education
 
Aet 531 wk 6 individual assignment
Aet 531 wk 6 individual assignmentAet 531 wk 6 individual assignment
Aet 531 wk 6 individual assignment
 
Social media policy
Social media policySocial media policy
Social media policy
 
Technology Integration Initiative
Technology Integration InitiativeTechnology Integration Initiative
Technology Integration Initiative
 

Dernier

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Dernier (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Teaching Ethical and Legal use of Technology in the Classroom

  • 1. Teaching Ethical and Legal use of Technology in the Classroom By Alicia Faust
  • 2.
  • 3. What is acceptable and appropriate use if Internet in schools? “ Appropriate use” must always be related to teaching Computers are there to support a curriculum already being taught. The attractiveness or novelty of the computer should not overpower the student learning. Computers should not change teaching methods. Their inclusion should simply help improve learning.
  • 4. What obligations do teachers and administrators have as a result of introducing the Internet into their schools? Acceptable Use Policies: Four essential parts 1. The policy explains how the Internet is connected to teaching and learning. 2. The policy explains student responsibilities while online. 3. The policy explains repercussions that will result from the violation of policies. 4. The policy is written and agreed to by parents and students Equitable access in a school or classroom: All students must have equal access to computers regardless of gender, special needs, socioeconomic status or race. Teaching and obeying Copyright laws: Teachers must follow copyright laws and in turn educate students about copyright laws.
  • 5. Links for templates for acceptable use forms http://165.224.221.98/pubs2005/tech_suite/app_A.asp#H1 http://www.2learn.ca/mapset/SafetyNet/AUPS.html http://www.auditnet.org/docs/internet_acceptable_use_policy_t.htm http://www.awesomelibrary.org/Classroom/Technology/Integrating_Technology/Acceptable_Use_Policies.html
  • 6. Click here to view a sample acceptable use form
  • 7.
  • 8. Wikipedia is an example of an online resource that students should be taught not to trust. Below is an example of how anyone visiting this site can edit the definition of a word. Wikipedia is one of the first choices of websites given when a word is searched on google . Students are quick to click on the first option when searching online.
  • 9.
  • 10. For more information about evaluating web pages click on the link below. http://www.lib.berkeley.edu/TeachingLib/Guides/Internet/Evaluate.html
  • 11.
  • 12.