SAFE AND ETHICAL USE PAGE
SAFE AND ETHICAL USE PAGE
PROTECT YOUR PERSONAL
INFORMATION
0 Identity Name
0 Telephone Numbers
0 Addresses
0 E-mails
0 User Names &Passwords
0 Personal Pictures
PHISHING
A SCAM FISHING FOR YOUR PERSONAL INFORMATION
DO NOT SHARE PERSONAL INFORMATION WITH NO-REPUTABLE SOURCES
OR ENTITIES WITH WHICH YOU ARE UNFAMILIAR
CYBER-BULLYING
CYBER BULLYING
SOCIAL MEDIA IS NOT TO BE USED TO HARASS,
INTIMIDATE, HURT OR CONFRONT OTHERS.
ANYTHING POSTED ON SOCIAL MEDIA THAT
INTENTIONALLY CAUSES HARM IS CONSIDERED
CYBER BULLYING.
CYBER BULLYING IS NOT TOLERATED AND WILL
BE SUBJECT TO THE STUDENT CODE OF
CONDUCT AND POSSIBLY THE POLIC
DEPARTMENT.
SOCIAL NETWORKING DO’S & DON’TS
DO’S
0 Always use privacy settings
0 Ensure you’ve set up a strong password
0 Only allow your close friends and family to view the details of your
social media. All viewers should be personally accepted by you.
0 When logging in to your social media, make sure you are using a
https: for privacy.
0 Check and double check before accepting a friend request. Make
sure the person is who they say they are. Quite often, they are
not.
0 Check and double check any attachments, links, downloads,
emails, pictures that are sent to you. Make sure they are coming
from a reputable source.
0 Always read and closely follow the rules of and social networking
cite in which you participate.
DON’TS
0 Share your passwords or personal login information with
anyone. I mean anyone.
0 Allow applications to access your contacts when it is not
necessary. Be weary of applications that request your contact
list, location, financial information, etc. when it is not
necessary.
0 Share your every move publicly. Do not share information
about your location, upcoming plans, or anything that could
compromise your safety.
0 Forget that any information shared electronically or uploaded
to a cloud or computer may be hacked and shared with the
World. Think twice.
ETHICAL USE OF INTERNET MATERIAL INCLUDING
VIDEOS, MUSIC, AND PRINTED MATERIAL
"Fair use is a legal principle that defines the limitations on the
exclusive rights** of copyright holders. The purpose of these
guidelines is to provide guidance on the application of fair use
principles by educators, scholars and students who develop
multimedia projects using portions of copyrighted works under
fair use rather than by seeking authorization for non-
commercial educational uses. These guidelines apply only to
fair use in the context of copyright and to no other rights."
- From "Fair Use Guidelines For Educational Multimedia*."
Fair Use Guidelines For Educational Multimedia*. July 17,
1996. University of Texas System. 20 Sep. 2006 .
VIDEOS MUST BE USED STRICTLY FOR THE PURPOSES OF
INSTRUCTION. VIDEOS MUST BE RELEVANT TO AND/OR
DIRECTLY USED FOR THE PURPSOES OF ACADEMIC
INSTRUCTION.
IF USED IN AN PRESENTATION THE CREDITS MUST BE CITED.
VIDEOS
MUSIC MUST BE USED
STRICTLY FOR THE PURPOSES
OF INSTRUCTION. MUSIC MUST
BE RELEVANT TO AND/OR
DIRECTLY USED FOR THE
PURPOSES OF ACADEMIC
INSTRUCTION.
MUSIC
IF USED IN A PRESENTATION, THE ORIGINATOR AND
PERFORMER MUST BE CITED.
PRINTED MATERIALS
MUST BE PROPERLY CITED INCLUDING:
TITLE
AUTHOR NAME
PUBLISHER
YEAR PUBLISHED
WHEN IT WAS ACCESSED
Copyright guidelines
Text:
Up to 1000 words, but not more than 10% of the book or
article
Poems:
Up to 250 words or the entire poem if less than 250 words
No more than 3 poems by the same author
No more than 5 poems in a collection of poetry
Copyright guidelines
Photographs or Drawings:
Up to 5 graphics or photographs by the same person
No more than 15 images from a collection
Images cannot be changed.
Video:
Up to 3 minutes but no more than 10% of the entire video
The video clip cannot be changed.
Copyright guidelines
Music:
Up to 30 seconds but no more than 10% of sheet music
Up to 30 seconds but no more than 10% of recording
The music cannot be changed in any major way.
Citations:
Remember to cite your sources.
Multimedia presentation must include a statement indicating fair use for
educational purposes.
Copyright information must be included in bibliography.
PLAGERISM
ALL PAPERS MUST BE SUBMITTED ELECTRONICALLY
AS ALL PAPERS WILL GO THROUGH A
PLAGERISM DETECTION TOOL
TO ENSURE ALL WORKS ARE ORIGINAL.
PROPER CITATION
METHODS
0 APA (American Psychological Association) is used
by Education, Psychology, and Sciences.
0 MLA (Modern Language Association) style is used
by the Humanities.
ALL IMAGES FROM MICROSOFT CLIP ART BROWSER EXCEPT THE FOLLOWING:
0 Slide 4:
https://www.google.com/search?q=PHISHING&espv=2&biw=1440&bih=725&source=lnms&tb
m=isch&sa=X&ved=0ahUKEwjB1JLu4uzNAhXiKMAKHZneDBMQ_AUIBygC
0 Slide 5:
https://www.google.com/search?q=PHISHING&espv=2&biw=1440&bih=725&source=lnms&tb
m=isch&sa=X&ved=0ahUKEwjB1JLu4uzNAhXiKMAKHZneDBMQ_AUIBygC#tbm=isch&q=CYBER
+BULLYING
0 Slide 7:
https://www.google.com/search?q=social+networking+do%27s+and+don%27ts&espv=2&biw=
1440&bih=725&source=lnms&tbm=isch&sa=X&ved=0ahUKEwicj4Cm9-
zNAhVDQiYKHeknAR4Q_AUIBigB
0 SLIDE 12:
https://www.google.com/search?q=VIDEO&espv=2&biw=1440&bih=725&site=webhp&source=
lnms&tbm=isch&sa=X&ved=0ahUKEwjSmMj7gO3NAhVLOiYKHYC9DJcQ_AUICSgE
0 SLIDE 13:
https://www.google.com/search?q=VIDEO&espv=2&biw=1440&bih=725&site=webhp&source=
lnms&tbm=isch&sa=X&ved=0ahUKEwjSmMj7gO3NAhVLOiYKHYC9DJcQ_AUICSgE#tbm=isch&q=
MUSIC
0 SLIDE 17:
https://www.google.com/search?q=Proper+citation+methods&espv=2&biw=1440&bih=725&si
te=webhp&source=lnms&sa=X&ved=0ahUKEwjv75Pphe3NAhVGJiYKHU0OAGoQ_AUIBSgA&dpr
=1

More Related Content

PPTX
SAFE AND ETHICAL USE
PDF
AGM_CERTIFICATE_1992
DOCX
Dom Sebastian Performance Resume
ODP
Seguretat tic
PPTX
Online Tech Skills (M-STEP)
PPTX
Toronto SPS (September 19 2015)
PPTX
Conceptos básicos de PsicoTerapia Online
PPTX
10 تطبيقات من جوجل تسهل حياتك
SAFE AND ETHICAL USE
AGM_CERTIFICATE_1992
Dom Sebastian Performance Resume
Seguretat tic
Online Tech Skills (M-STEP)
Toronto SPS (September 19 2015)
Conceptos básicos de PsicoTerapia Online
10 تطبيقات من جوجل تسهل حياتك

Similar to SAFE AND ETHICAL USE PAGE (20)

PPTX
Safe and ethical use of technology
PPTX
Digital citizenship project
PPT
Legal 08
PPT
Safe and ethical use
PPTX
Safe and ethical use
PPTX
Safe and ethical use
PPTX
Digital citizenship project
PPTX
Digital citizenship 1
PPT
Digital footprints
PPTX
Digitalcitizenproject
PPT
Computer ethical use agreement
PPT
Copyright and internet_safety
PPT
L2 Rules of Netiquette in Empowerment technology
PPTX
Digital citizenship
PPT
Internet safety
KEY
Digital citizenship ss
PPTX
Digital Citizenship
PPTX
Empowerment module 2 -Netiquettes and module 1.2.pptx
PPTX
Professional Development Learning Module Presentation Final
PPTX
Digital citizenship
Safe and ethical use of technology
Digital citizenship project
Legal 08
Safe and ethical use
Safe and ethical use
Safe and ethical use
Digital citizenship project
Digital citizenship 1
Digital footprints
Digitalcitizenproject
Computer ethical use agreement
Copyright and internet_safety
L2 Rules of Netiquette in Empowerment technology
Digital citizenship
Internet safety
Digital citizenship ss
Digital Citizenship
Empowerment module 2 -Netiquettes and module 1.2.pptx
Professional Development Learning Module Presentation Final
Digital citizenship
Ad

Recently uploaded (20)

PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PDF
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
PPTX
Module on health assessment of CHN. pptx
DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PDF
Literature_Review_methods_ BRACU_MKT426 course material
PDF
Journal of Dental Science - UDMY (2020).pdf
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PPTX
Computer Architecture Input Output Memory.pptx
PPTX
B.Sc. DS Unit 2 Software Engineering.pptx
PPTX
Education and Perspectives of Education.pptx
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PDF
Journal of Dental Science - UDMY (2021).pdf
PDF
My India Quiz Book_20210205121199924.pdf
PDF
Race Reva University – Shaping Future Leaders in Artificial Intelligence
PDF
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PPTX
What’s under the hood: Parsing standardized learning content for AI
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
Module on health assessment of CHN. pptx
Cambridge-Practice-Tests-for-IELTS-12.docx
Literature_Review_methods_ BRACU_MKT426 course material
Journal of Dental Science - UDMY (2020).pdf
Unit 4 Computer Architecture Multicore Processor.pptx
FORM 1 BIOLOGY MIND MAPS and their schemes
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
Computer Architecture Input Output Memory.pptx
B.Sc. DS Unit 2 Software Engineering.pptx
Education and Perspectives of Education.pptx
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
Journal of Dental Science - UDMY (2021).pdf
My India Quiz Book_20210205121199924.pdf
Race Reva University – Shaping Future Leaders in Artificial Intelligence
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
What’s under the hood: Parsing standardized learning content for AI
Ad

SAFE AND ETHICAL USE PAGE

  • 3. PROTECT YOUR PERSONAL INFORMATION 0 Identity Name 0 Telephone Numbers 0 Addresses 0 E-mails 0 User Names &Passwords 0 Personal Pictures
  • 4. PHISHING A SCAM FISHING FOR YOUR PERSONAL INFORMATION DO NOT SHARE PERSONAL INFORMATION WITH NO-REPUTABLE SOURCES OR ENTITIES WITH WHICH YOU ARE UNFAMILIAR
  • 6. CYBER BULLYING SOCIAL MEDIA IS NOT TO BE USED TO HARASS, INTIMIDATE, HURT OR CONFRONT OTHERS. ANYTHING POSTED ON SOCIAL MEDIA THAT INTENTIONALLY CAUSES HARM IS CONSIDERED CYBER BULLYING. CYBER BULLYING IS NOT TOLERATED AND WILL BE SUBJECT TO THE STUDENT CODE OF CONDUCT AND POSSIBLY THE POLIC DEPARTMENT.
  • 8. DO’S 0 Always use privacy settings 0 Ensure you’ve set up a strong password 0 Only allow your close friends and family to view the details of your social media. All viewers should be personally accepted by you. 0 When logging in to your social media, make sure you are using a https: for privacy. 0 Check and double check before accepting a friend request. Make sure the person is who they say they are. Quite often, they are not. 0 Check and double check any attachments, links, downloads, emails, pictures that are sent to you. Make sure they are coming from a reputable source. 0 Always read and closely follow the rules of and social networking cite in which you participate.
  • 9. DON’TS 0 Share your passwords or personal login information with anyone. I mean anyone. 0 Allow applications to access your contacts when it is not necessary. Be weary of applications that request your contact list, location, financial information, etc. when it is not necessary. 0 Share your every move publicly. Do not share information about your location, upcoming plans, or anything that could compromise your safety. 0 Forget that any information shared electronically or uploaded to a cloud or computer may be hacked and shared with the World. Think twice.
  • 10. ETHICAL USE OF INTERNET MATERIAL INCLUDING VIDEOS, MUSIC, AND PRINTED MATERIAL "Fair use is a legal principle that defines the limitations on the exclusive rights** of copyright holders. The purpose of these guidelines is to provide guidance on the application of fair use principles by educators, scholars and students who develop multimedia projects using portions of copyrighted works under fair use rather than by seeking authorization for non- commercial educational uses. These guidelines apply only to fair use in the context of copyright and to no other rights." - From "Fair Use Guidelines For Educational Multimedia*." Fair Use Guidelines For Educational Multimedia*. July 17, 1996. University of Texas System. 20 Sep. 2006 .
  • 11. VIDEOS MUST BE USED STRICTLY FOR THE PURPOSES OF INSTRUCTION. VIDEOS MUST BE RELEVANT TO AND/OR DIRECTLY USED FOR THE PURPSOES OF ACADEMIC INSTRUCTION. IF USED IN AN PRESENTATION THE CREDITS MUST BE CITED. VIDEOS
  • 12. MUSIC MUST BE USED STRICTLY FOR THE PURPOSES OF INSTRUCTION. MUSIC MUST BE RELEVANT TO AND/OR DIRECTLY USED FOR THE PURPOSES OF ACADEMIC INSTRUCTION. MUSIC IF USED IN A PRESENTATION, THE ORIGINATOR AND PERFORMER MUST BE CITED.
  • 13. PRINTED MATERIALS MUST BE PROPERLY CITED INCLUDING: TITLE AUTHOR NAME PUBLISHER YEAR PUBLISHED WHEN IT WAS ACCESSED
  • 14. Copyright guidelines Text: Up to 1000 words, but not more than 10% of the book or article Poems: Up to 250 words or the entire poem if less than 250 words No more than 3 poems by the same author No more than 5 poems in a collection of poetry
  • 15. Copyright guidelines Photographs or Drawings: Up to 5 graphics or photographs by the same person No more than 15 images from a collection Images cannot be changed. Video: Up to 3 minutes but no more than 10% of the entire video The video clip cannot be changed.
  • 16. Copyright guidelines Music: Up to 30 seconds but no more than 10% of sheet music Up to 30 seconds but no more than 10% of recording The music cannot be changed in any major way. Citations: Remember to cite your sources. Multimedia presentation must include a statement indicating fair use for educational purposes. Copyright information must be included in bibliography.
  • 17. PLAGERISM ALL PAPERS MUST BE SUBMITTED ELECTRONICALLY AS ALL PAPERS WILL GO THROUGH A PLAGERISM DETECTION TOOL TO ENSURE ALL WORKS ARE ORIGINAL.
  • 18. PROPER CITATION METHODS 0 APA (American Psychological Association) is used by Education, Psychology, and Sciences. 0 MLA (Modern Language Association) style is used by the Humanities.
  • 19. ALL IMAGES FROM MICROSOFT CLIP ART BROWSER EXCEPT THE FOLLOWING: 0 Slide 4: https://www.google.com/search?q=PHISHING&espv=2&biw=1440&bih=725&source=lnms&tb m=isch&sa=X&ved=0ahUKEwjB1JLu4uzNAhXiKMAKHZneDBMQ_AUIBygC 0 Slide 5: https://www.google.com/search?q=PHISHING&espv=2&biw=1440&bih=725&source=lnms&tb m=isch&sa=X&ved=0ahUKEwjB1JLu4uzNAhXiKMAKHZneDBMQ_AUIBygC#tbm=isch&q=CYBER +BULLYING 0 Slide 7: https://www.google.com/search?q=social+networking+do%27s+and+don%27ts&espv=2&biw= 1440&bih=725&source=lnms&tbm=isch&sa=X&ved=0ahUKEwicj4Cm9- zNAhVDQiYKHeknAR4Q_AUIBigB 0 SLIDE 12: https://www.google.com/search?q=VIDEO&espv=2&biw=1440&bih=725&site=webhp&source= lnms&tbm=isch&sa=X&ved=0ahUKEwjSmMj7gO3NAhVLOiYKHYC9DJcQ_AUICSgE 0 SLIDE 13: https://www.google.com/search?q=VIDEO&espv=2&biw=1440&bih=725&site=webhp&source= lnms&tbm=isch&sa=X&ved=0ahUKEwjSmMj7gO3NAhVLOiYKHYC9DJcQ_AUICSgE#tbm=isch&q= MUSIC 0 SLIDE 17: https://www.google.com/search?q=Proper+citation+methods&espv=2&biw=1440&bih=725&si te=webhp&source=lnms&sa=X&ved=0ahUKEwjv75Pphe3NAhVGJiYKHU0OAGoQ_AUIBSgA&dpr =1