Safe and Ethical Use
of Technology
by: Jennifer Brister
Computer Safety Online
• Internet use should support classroom instruction and state
standards.
• All students and teachers will use their passwords issued to them by
the technology department
• Passwords should be kept in a safe place an not shared with anyone
• All data should be backed up at least once a month on an external
drive
Computer Safety Offline
• Make sure laptops are secured when you are not using it
• Make sure your computer is on a stable desk, table or cart, so it cannot be
accidentally knocked off
• Hardware should be purchased through the district, tagged and put on the
school inventory
• Computer cords and cables should not be exposed but kept neatly against
the wall.
• Never open your computer, leave that to the experienced IT department
• Do not share passwords
• Backup your data regularly
Social Networking Dos
• Treat others with respect
• Be friends with people you know in real life
• Use strong passwords
• Use privacy settings
• Verify your friend requests
• Verify downloads, attachments, and emails
• Model good online behavior
Social Networking Don’ts
• Share your personal information such as social security number,
address, telephone number or the school you attend
• Participate in cyber-bullying
• Communicate with people you don’t know
• Use inappropriate language
• Believe everything you read is true
• Post things anonymously
• Upload anything you wouldn’t want anyone to see
Ethical Use of the Internet
• Your actions on the internet are just as important as your actions in
the real world
• Keep your information private and respect the privacy of others
• Use the internet appropriately and productively to enhance and
enrich learning
• Abide by copyright laws, respect your property and the property of
others.
Copyright Guidelines
• Copyright Laws - protects your work or anyone else’s work from being
copied or used without permission
• Fair Use Policy – allows you to use part of copyrighted works for
educational purposes
• Text – up to 1000 words, but not more than 10% of book or article
• Poems- up to 250 words or the entire poem if less that 250 word,
no more than 3 poems by same author, or 5 poems in a collection
• Photographs or drawings – up to 5 images or 15 in a collection and images cannot be
changed
• Videos - up to 3 min. but no more than 10%, the video clip cannot be changed
• Music -up to 30 seconds but no more than 10% of sheet music
• Citations - cite your sources, multimedia presentation must include a statement
indicating fair use for educational purposes, copyright information must be included
in bibliography
Methods for Checking Plagiarism
• Use online detection tools such as SafeAssign or Plagiarism.org
• Look for warning signs such as unusual phrasing, phrases too
sophisticated, or writing style that is different
• Enter unusual phrases in search engine and see if anything comes up
• Know the websites that offer papers to students
• Take notice if a different font is used
Proper Citation Methods
• Use the citation requested by your teacher or professor such as APA
or MLA
• When you paraphrase or quote you should tell the reader the source
by using in-text citations or citations in parenthesis.
• Give the complete citation using the style requested by your teacher
at the end of your paper.
Conclusion
Integrating technology into the classroom can greatly enhance
student learning. We must prepare our students how to use the
computer and internet safely to avoid any unethical situations to arise.
By using a safe and ethical training we can teach our kids how to
properly use technology to become life long learners in the community.
References
• Johnson, Doug. (2012) The Classroom Teacher’s Technology Survival
Guide. San Franciso, CA: John Wiley & Sons
• Research Guides: Style Manuals and Citation Methods: General
Information. (n.d.). Retrieved February 07, 2017, from
http://csulb.libguides.com/style
• Reidsville Middle. (n.d.). Retrieved February 07, 2017, from
http://www.rock.k12.nc.us/domain/1103
• Social Networking Do's and Don'ts. (n.d.). Retrieved February 07,
2017, from https://cuit.columbia.edu/cuit/it-security-
resources/social-networking-dos-donts

More Related Content

PPTX
Safe and ethical use of technology in the classroom power point final
PPT
Copyright presentation mcfarlandrevised
PPTX
Internet Safety
PPTX
Safe and ethical use of technology
PPT
Student RUP Agreement explained
PPTX
Week 15 ppt eme2040
PPT
Internet Safety_Trinity (ELD&ULD)
PPT
Parent ed is_mh
Safe and ethical use of technology in the classroom power point final
Copyright presentation mcfarlandrevised
Internet Safety
Safe and ethical use of technology
Student RUP Agreement explained
Week 15 ppt eme2040
Internet Safety_Trinity (ELD&ULD)
Parent ed is_mh

What's hot (19)

PPT
Responsible use presentation
PPTX
Technology in the classroom
PPT
Technology in english_and_language_arts_instru[1]
PPT
Internet Skills Outline
PPTX
Classroom rules 2011-2012
PPT
BYOD presentation- Young Women's Leadership Academy
PDF
Week of sept 4 7, 2012
PDF
Ict code of conduct
PDF
Module 2 lesson 2
PDF
Expectations as an e-Learner EPS
PDF
Copyright crash course ch1 2
PPTX
12 Things to do With Cell Phones in the Classroom
PDF
Learn with the Millenials
PPTX
Safe and ethical use
PPTX
Net smartz teens-presentation-2015 mac
PPT
Powerpointkg
PPTX
Issue with Internet in college (Computer Security and Cyber Law)
PPTX
R B S C P
PPTX
Instilling Netiquettes in Remote Learning
Responsible use presentation
Technology in the classroom
Technology in english_and_language_arts_instru[1]
Internet Skills Outline
Classroom rules 2011-2012
BYOD presentation- Young Women's Leadership Academy
Week of sept 4 7, 2012
Ict code of conduct
Module 2 lesson 2
Expectations as an e-Learner EPS
Copyright crash course ch1 2
12 Things to do With Cell Phones in the Classroom
Learn with the Millenials
Safe and ethical use
Net smartz teens-presentation-2015 mac
Powerpointkg
Issue with Internet in college (Computer Security and Cyber Law)
R B S C P
Instilling Netiquettes in Remote Learning
Ad

Similar to Safe and ethical use (20)

KEY
Internet safety 541
PPTX
Technology in the classroom
PPTX
Digital citizenship project
PPTX
Digital citizenship project
PPT
Computer ethical use agreement
PPTX
Digital citizenship 1
PPTX
Safe and ethical use page
DOCX
Currentissuenotes
PPTX
SAFE AND ETHICAL USE
PDF
Using Your Cybersmarts Online - Rachel Boyd
PPT
Legal 08
PPTX
Safe and ethical use
PPT
Safe and ethical use
PPT
Legalissues
PPTX
SAFE AND ETHICAL USE PAGE
PPTX
Aup ppt
PPTX
Digital Citizenship Presentation
DOCX
Social media policy
PPT
Legalissues
PPTX
Lesson 3 ethical issues
Internet safety 541
Technology in the classroom
Digital citizenship project
Digital citizenship project
Computer ethical use agreement
Digital citizenship 1
Safe and ethical use page
Currentissuenotes
SAFE AND ETHICAL USE
Using Your Cybersmarts Online - Rachel Boyd
Legal 08
Safe and ethical use
Safe and ethical use
Legalissues
SAFE AND ETHICAL USE PAGE
Aup ppt
Digital Citizenship Presentation
Social media policy
Legalissues
Lesson 3 ethical issues
Ad

Recently uploaded (20)

PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PDF
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PPTX
B.Sc. DS Unit 2 Software Engineering.pptx
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
PDF
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 2).pdf
PDF
Empowerment Technology for Senior High School Guide
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PDF
advance database management system book.pdf
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PDF
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 1).pdf
PPTX
Virtual and Augmented Reality in Current Scenario
PDF
semiconductor packaging in vlsi design fab
PPTX
Introduction to pro and eukaryotes and differences.pptx
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PDF
My India Quiz Book_20210205121199924.pdf
PDF
HVAC Specification 2024 according to central public works department
PDF
Mucosal Drug Delivery system_NDDS_BPHARMACY__SEM VII_PCI.pdf
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
B.Sc. DS Unit 2 Software Engineering.pptx
Share_Module_2_Power_conflict_and_negotiation.pptx
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 2).pdf
Empowerment Technology for Senior High School Guide
A powerpoint presentation on the Revised K-10 Science Shaping Paper
Environmental Education MCQ BD2EE - Share Source.pdf
advance database management system book.pdf
Paper A Mock Exam 9_ Attempt review.pdf.
Cambridge-Practice-Tests-for-IELTS-12.docx
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 1).pdf
Virtual and Augmented Reality in Current Scenario
semiconductor packaging in vlsi design fab
Introduction to pro and eukaryotes and differences.pptx
FORM 1 BIOLOGY MIND MAPS and their schemes
My India Quiz Book_20210205121199924.pdf
HVAC Specification 2024 according to central public works department
Mucosal Drug Delivery system_NDDS_BPHARMACY__SEM VII_PCI.pdf

Safe and ethical use

  • 1. Safe and Ethical Use of Technology by: Jennifer Brister
  • 2. Computer Safety Online • Internet use should support classroom instruction and state standards. • All students and teachers will use their passwords issued to them by the technology department • Passwords should be kept in a safe place an not shared with anyone • All data should be backed up at least once a month on an external drive
  • 3. Computer Safety Offline • Make sure laptops are secured when you are not using it • Make sure your computer is on a stable desk, table or cart, so it cannot be accidentally knocked off • Hardware should be purchased through the district, tagged and put on the school inventory • Computer cords and cables should not be exposed but kept neatly against the wall. • Never open your computer, leave that to the experienced IT department • Do not share passwords • Backup your data regularly
  • 4. Social Networking Dos • Treat others with respect • Be friends with people you know in real life • Use strong passwords • Use privacy settings • Verify your friend requests • Verify downloads, attachments, and emails • Model good online behavior
  • 5. Social Networking Don’ts • Share your personal information such as social security number, address, telephone number or the school you attend • Participate in cyber-bullying • Communicate with people you don’t know • Use inappropriate language • Believe everything you read is true • Post things anonymously • Upload anything you wouldn’t want anyone to see
  • 6. Ethical Use of the Internet • Your actions on the internet are just as important as your actions in the real world • Keep your information private and respect the privacy of others • Use the internet appropriately and productively to enhance and enrich learning • Abide by copyright laws, respect your property and the property of others.
  • 7. Copyright Guidelines • Copyright Laws - protects your work or anyone else’s work from being copied or used without permission • Fair Use Policy – allows you to use part of copyrighted works for educational purposes • Text – up to 1000 words, but not more than 10% of book or article • Poems- up to 250 words or the entire poem if less that 250 word, no more than 3 poems by same author, or 5 poems in a collection • Photographs or drawings – up to 5 images or 15 in a collection and images cannot be changed • Videos - up to 3 min. but no more than 10%, the video clip cannot be changed • Music -up to 30 seconds but no more than 10% of sheet music • Citations - cite your sources, multimedia presentation must include a statement indicating fair use for educational purposes, copyright information must be included in bibliography
  • 8. Methods for Checking Plagiarism • Use online detection tools such as SafeAssign or Plagiarism.org • Look for warning signs such as unusual phrasing, phrases too sophisticated, or writing style that is different • Enter unusual phrases in search engine and see if anything comes up • Know the websites that offer papers to students • Take notice if a different font is used
  • 9. Proper Citation Methods • Use the citation requested by your teacher or professor such as APA or MLA • When you paraphrase or quote you should tell the reader the source by using in-text citations or citations in parenthesis. • Give the complete citation using the style requested by your teacher at the end of your paper.
  • 10. Conclusion Integrating technology into the classroom can greatly enhance student learning. We must prepare our students how to use the computer and internet safely to avoid any unethical situations to arise. By using a safe and ethical training we can teach our kids how to properly use technology to become life long learners in the community.
  • 11. References • Johnson, Doug. (2012) The Classroom Teacher’s Technology Survival Guide. San Franciso, CA: John Wiley & Sons • Research Guides: Style Manuals and Citation Methods: General Information. (n.d.). Retrieved February 07, 2017, from http://csulb.libguides.com/style • Reidsville Middle. (n.d.). Retrieved February 07, 2017, from http://www.rock.k12.nc.us/domain/1103 • Social Networking Do's and Don'ts. (n.d.). Retrieved February 07, 2017, from https://cuit.columbia.edu/cuit/it-security- resources/social-networking-dos-donts