Fillmore Central school Computer Ethics Presentation September 2016
Fillmore Central school Computer Ethics Presentation September 2016
Ten Commandments of Computer Ethics § Commandment: an instruction; a requirement § Ethics: a code of conduct; how a person should live.
1. ) You shall not use a computer to harm other people. § Intentionally interfering with other people’s work § Invading the privacy of individuals
2. ) You shall not interfere with other people's computer work. § Degrading or disrupting equipment, software, or system performance. § Using resources to interfere with the properation of any computer, or destroy data. § Intentionally interfering with other people’s work. § Invading the privacy of individuals.
3. ) You shall not snoop around in other people's computer files. § Using an account owned by another user, or allowing another user to access your account. § Any problems which arise from the misuse of a user’s password will be that user’s responsibility. § Invading the privacy of individuals.
4. ) You shall not use a computer to steal. § Using resources in any manner that violates School Board policy, federal, state, or local law including unauthorized copying or transmission of software.
5. ) You shall not use a computer to bear false witness. § Initiating or forwarding “chain” letters. § Downloading, storing printing, or distributing files or messages that are profane, obscene, threatening, or that use language that offends or tends to degrade others. § Urban Legends (e. g. kidney transplants) § Unproven rumors (e. g. free coca cola)
6. ) You shall not copy or use proprietary software for which you have not paid. § Using resources in any manner that violates School Board policy, federal, state, or local law including unauthorized copying or transmission of software.
7. ) You shall not use other people's computer resources without authorization or proper compensation. § Using information obtained through network and computer resources without giving proper credit to the source (plagiarism). § Posting personal communication without the original author’s consent.
8. ) You shall not appropriate other people's intellectual output. § Posting personal communication without the original author’s consent. § Using information obtained through network and computer resources without giving proper credit to the source (plagiarism).
9. ) You shall think about the social consequences of the program you are writing or the system you are designing. § Initiating or forwarding “chain” letters. § Downloading, storing, printing, or distributing files or messages that are profane, obscene, threatening, or that use language that offends or tends to degrade others.
10. ) You shall always use a computer in ways that show consideration and respect for your fellow humans. § Downloading, storing, printing, or distributing files or messages that contain information considered dangerous to the public at large.
District policy states that: § A filtering device is in place to remove inappropriate materials. § This filter also monitors all Internet activity, and, network activity. § Like your locker, access is a privilege, not a right. § District officials or system administrators for any reason whatsoever may access all computerized files. § The district may disable a user’s account at any time for inappropriate or irresponsible behavior. § The building administrator will determine penalties.
FURTHERMORE… § Student access is to take place only under direct supervision of a responsible member of the school district’s instructional staff. § Use is limited to educational purposes that are directly related to the curriculum which you are studying. § No software from outside sources may be loaded or used without written permission from the Technology Coordinator.
PENALTIES § Depending on the nature and severity of a violation, a Building Administrator will take disciplinary action. § Parent contact is required. § If warranted, the administrator shall refer the case to an appropriate school, local, state, or federal authority for disposition. § If appropriate, access rights to technology will be denied immediately. § Responsibility for costs and damages may be incurred.
Please use responsibly!
References § “Ten Commandments of Computer Ethics”. courses. cs. vt. edu/ ~cs 3604/lib/World. Codes/10. Commandments. html Computer Ethics Institute, Washington DC. (7 July 2003).
- Slides: 17