INTERNET USE POLICY by Laith Mohammed Murad
Name: Laith Mohammed Murad.
ID # : 200011242.
Agenda
Overview
Rule #1 - Personal Safety
Rules #2 & #3 - Interfering
Rules #4 & #5 - Illegal Acts
Rules #6 & #7 & #8- Copying
Rules #9 - Inappropriate Behavior
Rules #10 - Privileges vs.. Rights
Overview
How can we communicate to our students, their parents and our colleagues the standards for acceptable use of copyright materials and ethical use of digital media?
Resources: Developing an Ethical Compass for Worlds of Learning by Doug Johnson
Our Rights: We are following the idea that the public has a right to expect:
To experiment with variations of copyrighted materials for fair use purpose, while preserving the integrity of the original.
To make or have made for them a first generation copy for personal use of an article or other small part of a publicly marketed copyrighted work or a work in a library’s collection for such purposes as study, scholarship, or research.
http://arl.cni.org/scomm/copyright/uses.html
Personal Rights
Rule #1: Thou shalt not use a computer to harm other people or yourself.
Personal Safety and Personal Privacy
Do not post personal information and let a teacher know immediately if you receive an inappropriate message or one that makes you feel uncomfortable
REMEMBER YOU ARE RESPONSIBLE FOR YOUR INDIVIDUAL ACCOUNT AND THE INFORMATION THAT IS ATTACHED TO IT!
INTERFERING
Rule #2: Thou shalt not interfere with other people’s computer work
Respect your fellow classmates. Do not play around with their computer or work.
Rule #3: Thou shalt not snoop around in other people’s computer files
Illegal activities are logging into another person’s account or access another person’s file.
Illegal Acts
Rule #4: Thou shalt not use a computer to steal.
You are not allowed to disrupt the computer system or destroy data.
You are not to use the computer for illegal acts like arranging a drug sale or engaging in criminal gang activities
Rule #5: Thou shalt not use a computer to bear false witness.
RESPECT PRIVACY - Do not repost a message that was sent to you privately without permission.
Nor - Do not send information using someone ellse’s name
Copying
Rule #6: Thou shalt not copy or use proprietary software for which you have not paid.
UNAUTHORIZED copying of software is illegal. See www.inform.umd.edu/software-guide
Rule #7: Thou shalt not use other people’s computer resources without authorization or proper compensation.
You are not allowed to use computer resources for commercial or money-making purposes without authorization.
Rule #8: Thou shalt not appropriate other people’;s intellectual output.
http://uresponsibleuse.uoregon.edu
Plagiarism - You will not take ideas or writing of otthers and present them as they were yours.
Inappropriate Behavior
Rule #9: Thou shalt think about the SOCIAL CONSEQUENCES about the program/e-mail/instant message you are writing or the system that you are designing.
Inappropriate Language(swearing) and Harassment is punishable by law.
Harassment is persistently acting in a manner that distresses or annoys another person
IF YOU ARE TOLD TO STOP SENDING MESSAGES, YOU MUST STOP!
PRIVILEGES VS. RIGHTS
Rule #10: Thou shalt always use a computer in ways that insure consideration and respect for your fellow human beings.
You need to understand your rights as well as your responsibilities.
If you abuse these rights you can:
1) Loose internet computer privileges and/or
2) Legal action can be taken against you.
REMEMBER THAT INTERNET ACCESS IS A PRIVELAGE
NOT A RIGHT!