SlideShare une entreprise Scribd logo
1  sur  21
LEGAL AND ETHICAL USE OF TECHNOLOGY
CHAPTER 8
PRESENTED BY: MARTIN JON E. BARNACHIA
 Technology and software issues are elaborated for you to
be aware and be guided in doing the right thing and
avoiding the unacceptable acts that may lead you to
committing mistakes or possible software and technology
crimes that’s against the law
ETHICAL USE OF SCHOOL TECHNOLOGY
 When we are young, our parents used to teach us the
right behavior and etiquette. Even in schools and classes,
there are certain behaviors and ethics we need to
observe to achieve a healthy relationships with teachers
and classmates.
ETHICS FOR COMPUTER USERS
1. Use the computer to help people and not to do harm.
2. Use your own or assigned computer unit and not to interfere with others’ work.
3. Us the computer using your own files and not to use others’ files.
4. Us the computer to share information and not to steal others’ information.
5. Use the computer to spread truthful information and not to do character assassination.
6. Use software that are original and legal and not pirated.
7. Use others’ computer resources with permission and not to duplicate it without
authorization.
8. Use your own work and not the work of others.
9. Use the computer that shows respect and consideration for other people and not to do
cyberbullying.
10. Create programs or software having in mind its social impact and not for self-interest.
ETHICAL ISSUES IN TECHNOLOGY AND SOFTWARE
 Unauthorized Access and Use of Hardware, Software, Network,
and Computer Files
 If somebody would use anybody’s computer and files without permission
from the owner, that is called unauthorized access. A person is called a
cracker or a hacker if he/she tries to access a computer or network
illegally to access data and commit malicious acts like identity theft.
 Hacker originally means a computer enthusiast who does well in
computer that benefits other people. However, the term hacker now has
an adverse connotation which refers to a person who breaks into the
computer system to steal or corrupt the data in it.
TIPS IN CREATING A PASSWORD
 Use at least 8 characters.
 Use a combination of upper and lower case letters, words,
numbers and special characters.
 Use joined words together.
 Add one or more numbers at the beginning, middle, or
end of a word.
 Use words from other languages.
 Use a password that can be remembered easily.
 Select a password that can be entered easily even without
looking at the keyboard.
 Do not leave written copies of your passwords anywhere.
 Do not share your password to anyone.
HARDWARE THEFT AND VANDALISM
 Computer Theft – stealing of hardware
and its devices
 Computer Vandalism – act of damaging
or breaking the hardware, cutting the
cables and wires, smashing the computer
and its devices, and deleting of software
or computer files.
SOFTWARE THEFT
 Software piracy is a
form of software theft.
This happens when a
person copies illegally
copyrighted software
for personal or business
use.
EULA (END-USER LICENSE AGREEMENT)
 Single-user license agreement – the common type of license
included in software packages purchased by an individual. Some
of the conditions are:
 Users may install the software on only one computer.
 Users are prohibited to install the software on a network (school computer
lab network)
 Users may make one copy for backup purposes.
 Users are prohibited to give copies to friends and colleagues.
 Going against the
agreement is a violation
of copyright law, thus,
committing a federal
crime. In US, penalties
reach up to $250,000
and up to five years in
jail. In the Philippines,
penalties reach up to
Php1,500,000 and up to
6-9 years imprisonment.
INFORMATION THEFT
 A computer crime when one deliberately steals information for
purposes of studying how to compete with other organizations
or company.
 Encryption is the process of converting readable data to
unreadable one. An encryption key is needed to enable the
person to convert it back in readable form.
MALICIOUS ACT IN SOFTWARE
 Spam – unsolicited junk email sent indiscriminately in bulk, often
for commercial purposes. Much of it is sent by botnets, networks
of virus-infected computers, complicating the process of tracking
down the spammers. According to various estimates, about 80%
of all email in the world may be spam.
 Phishing - a term used to describe a malicious individual or group
of individuals who scam users. They do so by sending e-mails or
creating web pages that are designed to collect an individual's
online bank, credit card, or other login information. Also called as
carding or spoofing.
 Malware - short for
“malicious software” - computer
programs designed to infiltrate
and damage computers without
the users consent. “Malware” is
the general term covering all the
different types of threats to
your computer safety such as
viruses, spyware, worms, trojans,
rootkits and so on.
 Adware - frequently used to
describe a form of malware
(malicious software) which
presents unwanted
advertisements to the user of
a computer. The
advertisements produced
by adware are sometimes in the
form of a pop-up or sometimes
in an "unclosable window".
Educational Technology Chapter 8
Educational Technology Chapter 8
Educational Technology Chapter 8
Educational Technology Chapter 8

Contenu connexe

Tendances

1987 Philippine Constitution Article XIV Education, Science & Technology, Ar...
1987 Philippine  Constitution Article XIV Education, Science & Technology, Ar...1987 Philippine  Constitution Article XIV Education, Science & Technology, Ar...
1987 Philippine Constitution Article XIV Education, Science & Technology, Ar...Jan Paolo Leyva
 
Teaching Profession
Teaching ProfessionTeaching Profession
Teaching ProfessionJhen Intero
 
PHILOSOPHICAL FOUNDATION OF EDUCATION.pptx
PHILOSOPHICAL FOUNDATION OF EDUCATION.pptxPHILOSOPHICAL FOUNDATION OF EDUCATION.pptx
PHILOSOPHICAL FOUNDATION OF EDUCATION.pptxJarvenSaguin
 
Code of ethics powerpoint
Code of ethics powerpointCode of ethics powerpoint
Code of ethics powerpoint09066811502
 
TTL-! Module 3 lesson 1
TTL-! Module 3 lesson 1 TTL-! Module 3 lesson 1
TTL-! Module 3 lesson 1 Ira Sagu
 
Cyber / digital literacy.pptx
Cyber / digital literacy.pptxCyber / digital literacy.pptx
Cyber / digital literacy.pptxFloralyn Victoria
 
Seven philosopies of Education
Seven philosopies of EducationSeven philosopies of Education
Seven philosopies of Educationjenerwin columna
 
Philosophy in teaching
Philosophy in teachingPhilosophy in teaching
Philosophy in teachingDepEd
 
John Dewey and Progressivism
John Dewey and ProgressivismJohn Dewey and Progressivism
John Dewey and ProgressivismAlma Reynaldo
 
Hypermedia
HypermediaHypermedia
HypermediaH S
 
Copyright and plagiarism
Copyright and plagiarismCopyright and plagiarism
Copyright and plagiarismJerry Stovall
 
ICT competencies of teachers
ICT competencies of teachersICT competencies of teachers
ICT competencies of teachersMart Laanpere
 
Approaches to values educ development
Approaches to values educ developmentApproaches to values educ development
Approaches to values educ developmentFlora Salandanan
 
Legal foundation of education
Legal foundation of educationLegal foundation of education
Legal foundation of educationAloy Salas
 
Technology for Teaching and Learning 1
Technology for Teaching and Learning 1Technology for Teaching and Learning 1
Technology for Teaching and Learning 1RheanneMaePrincesa
 

Tendances (20)

1987 Philippine Constitution Article XIV Education, Science & Technology, Ar...
1987 Philippine  Constitution Article XIV Education, Science & Technology, Ar...1987 Philippine  Constitution Article XIV Education, Science & Technology, Ar...
1987 Philippine Constitution Article XIV Education, Science & Technology, Ar...
 
Integration of ICT in Teaching and Learning
Integration  of  ICT in Teaching and LearningIntegration  of  ICT in Teaching and Learning
Integration of ICT in Teaching and Learning
 
Teaching Profession
Teaching ProfessionTeaching Profession
Teaching Profession
 
The 21st century teacher and learner
The 21st century teacher and learner The 21st century teacher and learner
The 21st century teacher and learner
 
PHILOSOPHICAL FOUNDATION OF EDUCATION.pptx
PHILOSOPHICAL FOUNDATION OF EDUCATION.pptxPHILOSOPHICAL FOUNDATION OF EDUCATION.pptx
PHILOSOPHICAL FOUNDATION OF EDUCATION.pptx
 
Code of ethics powerpoint
Code of ethics powerpointCode of ethics powerpoint
Code of ethics powerpoint
 
TTL-! Module 3 lesson 1
TTL-! Module 3 lesson 1 TTL-! Module 3 lesson 1
TTL-! Module 3 lesson 1
 
Cyber / digital literacy.pptx
Cyber / digital literacy.pptxCyber / digital literacy.pptx
Cyber / digital literacy.pptx
 
Seven philosopies of Education
Seven philosopies of EducationSeven philosopies of Education
Seven philosopies of Education
 
Philosophy in teaching
Philosophy in teachingPhilosophy in teaching
Philosophy in teaching
 
John Dewey and Progressivism
John Dewey and ProgressivismJohn Dewey and Progressivism
John Dewey and Progressivism
 
E portfolio presentation
E portfolio presentationE portfolio presentation
E portfolio presentation
 
Hypermedia
HypermediaHypermedia
Hypermedia
 
Copyright and plagiarism
Copyright and plagiarismCopyright and plagiarism
Copyright and plagiarism
 
ICT competencies of teachers
ICT competencies of teachersICT competencies of teachers
ICT competencies of teachers
 
Educational technology 1
Educational technology 1Educational technology 1
Educational technology 1
 
Approaches to values educ development
Approaches to values educ developmentApproaches to values educ development
Approaches to values educ development
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Legal foundation of education
Legal foundation of educationLegal foundation of education
Legal foundation of education
 
Technology for Teaching and Learning 1
Technology for Teaching and Learning 1Technology for Teaching and Learning 1
Technology for Teaching and Learning 1
 

Similaire à Educational Technology Chapter 8

LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxAnnMarieTAquinoII
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptxglorysunny
 
TEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptxTEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptxhenrysales6
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of NetiquetteACLC Antipolo
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of itsr24production
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionHannah323676
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9NehaRohtagi1
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxMdRuga
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Dr. Khaled Bakro
 
Living in the IT Era - Lesson 4.pptx
Living in the IT Era - Lesson 4.pptxLiving in the IT Era - Lesson 4.pptx
Living in the IT Era - Lesson 4.pptxFroilan Cantillo
 
Cyber Law and Cyber Crime
Cyber Law and Cyber CrimeCyber Law and Cyber Crime
Cyber Law and Cyber CrimeSyangba132
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2JeffUrgelles
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of NetiquetteRochelle Nato
 

Similaire à Educational Technology Chapter 8 (20)

LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
TEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptxTEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptx
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Computer
ComputerComputer
Computer
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of Netiquette
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
 
Living in the IT Era - Lesson 4.pptx
Living in the IT Era - Lesson 4.pptxLiving in the IT Era - Lesson 4.pptx
Living in the IT Era - Lesson 4.pptx
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Cyber Law and Cyber Crime
Cyber Law and Cyber CrimeCyber Law and Cyber Crime
Cyber Law and Cyber Crime
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 

Plus de Martin Jon Barnachia (14)

Filipino - Komunikasyon
Filipino - KomunikasyonFilipino - Komunikasyon
Filipino - Komunikasyon
 
Environmental Science - Biogeochemical Cycle
Environmental Science - Biogeochemical CycleEnvironmental Science - Biogeochemical Cycle
Environmental Science - Biogeochemical Cycle
 
Gender Sensitivity
Gender SensitivityGender Sensitivity
Gender Sensitivity
 
Chistology - Johannine Christology
Chistology - Johannine ChristologyChistology - Johannine Christology
Chistology - Johannine Christology
 
World religion - New Movements in Japan
World religion - New Movements in JapanWorld religion - New Movements in Japan
World religion - New Movements in Japan
 
World Religion - Hinduism
World Religion - HinduismWorld Religion - Hinduism
World Religion - Hinduism
 
Developmental Reading
Developmental ReadingDevelopmental Reading
Developmental Reading
 
Educational Technology Chapter 7
Educational Technology Chapter 7Educational Technology Chapter 7
Educational Technology Chapter 7
 
Educational Technology 2 Chapter 5
Educational Technology 2 Chapter 5Educational Technology 2 Chapter 5
Educational Technology 2 Chapter 5
 
Legal Foundation of Education
Legal Foundation of EducationLegal Foundation of Education
Legal Foundation of Education
 
Social institutions
Social institutionsSocial institutions
Social institutions
 
Connectionism Theory
Connectionism TheoryConnectionism Theory
Connectionism Theory
 
The teaching proffession
The teaching proffessionThe teaching proffession
The teaching proffession
 
Rizal in Paris
Rizal in ParisRizal in Paris
Rizal in Paris
 

Dernier

BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 

Dernier (20)

BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 

Educational Technology Chapter 8

  • 1. LEGAL AND ETHICAL USE OF TECHNOLOGY CHAPTER 8 PRESENTED BY: MARTIN JON E. BARNACHIA
  • 2.  Technology and software issues are elaborated for you to be aware and be guided in doing the right thing and avoiding the unacceptable acts that may lead you to committing mistakes or possible software and technology crimes that’s against the law
  • 3. ETHICAL USE OF SCHOOL TECHNOLOGY  When we are young, our parents used to teach us the right behavior and etiquette. Even in schools and classes, there are certain behaviors and ethics we need to observe to achieve a healthy relationships with teachers and classmates.
  • 4. ETHICS FOR COMPUTER USERS 1. Use the computer to help people and not to do harm. 2. Use your own or assigned computer unit and not to interfere with others’ work. 3. Us the computer using your own files and not to use others’ files. 4. Us the computer to share information and not to steal others’ information. 5. Use the computer to spread truthful information and not to do character assassination. 6. Use software that are original and legal and not pirated. 7. Use others’ computer resources with permission and not to duplicate it without authorization. 8. Use your own work and not the work of others. 9. Use the computer that shows respect and consideration for other people and not to do cyberbullying. 10. Create programs or software having in mind its social impact and not for self-interest.
  • 5. ETHICAL ISSUES IN TECHNOLOGY AND SOFTWARE  Unauthorized Access and Use of Hardware, Software, Network, and Computer Files  If somebody would use anybody’s computer and files without permission from the owner, that is called unauthorized access. A person is called a cracker or a hacker if he/she tries to access a computer or network illegally to access data and commit malicious acts like identity theft.  Hacker originally means a computer enthusiast who does well in computer that benefits other people. However, the term hacker now has an adverse connotation which refers to a person who breaks into the computer system to steal or corrupt the data in it.
  • 6. TIPS IN CREATING A PASSWORD  Use at least 8 characters.  Use a combination of upper and lower case letters, words, numbers and special characters.  Use joined words together.  Add one or more numbers at the beginning, middle, or end of a word.  Use words from other languages.  Use a password that can be remembered easily.  Select a password that can be entered easily even without looking at the keyboard.  Do not leave written copies of your passwords anywhere.  Do not share your password to anyone.
  • 7. HARDWARE THEFT AND VANDALISM  Computer Theft – stealing of hardware and its devices  Computer Vandalism – act of damaging or breaking the hardware, cutting the cables and wires, smashing the computer and its devices, and deleting of software or computer files.
  • 8. SOFTWARE THEFT  Software piracy is a form of software theft. This happens when a person copies illegally copyrighted software for personal or business use.
  • 9. EULA (END-USER LICENSE AGREEMENT)  Single-user license agreement – the common type of license included in software packages purchased by an individual. Some of the conditions are:  Users may install the software on only one computer.  Users are prohibited to install the software on a network (school computer lab network)  Users may make one copy for backup purposes.  Users are prohibited to give copies to friends and colleagues.
  • 10.  Going against the agreement is a violation of copyright law, thus, committing a federal crime. In US, penalties reach up to $250,000 and up to five years in jail. In the Philippines, penalties reach up to Php1,500,000 and up to 6-9 years imprisonment.
  • 11.
  • 12.
  • 13. INFORMATION THEFT  A computer crime when one deliberately steals information for purposes of studying how to compete with other organizations or company.  Encryption is the process of converting readable data to unreadable one. An encryption key is needed to enable the person to convert it back in readable form.
  • 14. MALICIOUS ACT IN SOFTWARE  Spam – unsolicited junk email sent indiscriminately in bulk, often for commercial purposes. Much of it is sent by botnets, networks of virus-infected computers, complicating the process of tracking down the spammers. According to various estimates, about 80% of all email in the world may be spam.
  • 15.  Phishing - a term used to describe a malicious individual or group of individuals who scam users. They do so by sending e-mails or creating web pages that are designed to collect an individual's online bank, credit card, or other login information. Also called as carding or spoofing.
  • 16.  Malware - short for “malicious software” - computer programs designed to infiltrate and damage computers without the users consent. “Malware” is the general term covering all the different types of threats to your computer safety such as viruses, spyware, worms, trojans, rootkits and so on.
  • 17.  Adware - frequently used to describe a form of malware (malicious software) which presents unwanted advertisements to the user of a computer. The advertisements produced by adware are sometimes in the form of a pop-up or sometimes in an "unclosable window".