Ten Commandments
of Computer Ethics
You shall not use a computer to harm other people.
Intentionally interfering with other people’s work
Invading the privacy of individuals
You shall not interfere with other people's computer work.
Degrading or disrupting equipment, software, or system performance.
Using resources to interfere with the proper operation of any computer, or destroy data.
Intentionally interfering with other people’s work
Invading the privacy of individuals
You shall not snoop around in other people's computer files.
Using an account owned by another user, or allowing another user to access your account. (Any problems which arise from the misuse of a user’s password will be that user’s responsibility.)
Invading the privacy of individuals
You shall not use a computer to steal.
Using resources in any manner that violates Board policy, federal, state, or local law including unauthorized copying or transmission of software.
You shall not use a computer to bear false witness.
Initiating or forwarding “chain” letters.
Downloading, storing printing, or distributing files or messages that are profane, obscene, threatening, or that use language that offends or tends to degrade others.
Urban Legends (e.g. kidney transplants)
Unproven rumors (e.g. free coca cola).
You shall not copy or use proprietary software for which you have not paid.
Using resources in any manner that violates Board policy, federal, state, or local law including unauthorized copying or transmission of software.
7. You shall not use other people's computer resources without authorizatioproper compensation.
Using information obtained through network and computer resources without giving proper credit to the source (plagiarism).
Posting personal communication without the original author’s consent.
8. You shall not appropriate other people's intellectual output.
Posting personal communication without the original author’s consent.
Using information obtained through network and computer resources without giving proper credit to the source (plagiarism).
9. You shall think about the social consequences of the program you are writing or the system you are designing.
Initiating or forwarding “chain” letters.
Downloading, storing, printing, or distributing files or messages that are profane, obscene, threatening, or that use language that offends or tends to degrade others.
10. You shall always use a computer in ways that show consideration and respect for your fellow humans.
Downloading, storing, printing, or distributing files or messages that contain information considered dangerous to the public at large.
District policy states that :
A filtering device is in place to remove inappropriate materials.
This filter also monitors all Internet activity, and, network activity. Like your locker, access is a privilege, not a right. District officials or system administrators for any reason whatsoever may access all computerized files.
The district may disable a user’s account at any time for inappropriate or irresponsible behavior. The building administrator will determine penalties.
FURTHERMORE…
Student access is to take place only under direct supervision of a responsible member of the school district’s instructional staff.
Use is limited to educational purposes that are directly related to the curriculum which you are studying.
No software from outside sources may be loaded or used without written permission from the Technology Coordinator.
Photos on the Web
Web pages may include only the first name and the initial of the student’s last name.
Use of individual student pictures (video or still), including teacher’s individual web pages must have a signed parent/guardian approval on file with the Technology Coordinator for all students under 18 years of age. Group pictures may be published without approval if names are omitted.
Personal information about employees may be published only with their written permission.
CHAT and E-MAIL
Student users will not be allowed to join chat groups or discussion groups unless it is for a specific educational purpose and written permission from a parent/guardian and a staff member is obtained. The staff member will directly supervise student participation and ensure that the student unsubscribes when the purpose for the use is over.
Use of free e-mail accounts (yahoo, hotmail, etc.) is prohibited by students and staff.
PENALTIES
Depending on the nature and severity of a violation, a Building Administrator will take disciplinary action.
Parent contact is required.
If warranted, the administrator shall refer the case to an appropriate school, local, state, or federal authority for disposition.
If appropriate, access rights to technology will be denied immediately.
Responsibility for costs and damages may be incurred.
Label: Suka-suka |
Posting Komentar
.::Thank's berat atas komentarnya::.