Upload
natalie-butner
View
218
Download
2
Tags:
Embed Size (px)
Citation preview
Shelby County Technology Scope and Sequence 6-8 #8:
AUP
Computer Fraud
Copyright Violations
Penalties
Nancy LawColumbiana Middle School
AUP
STUDENTS’ ACCEPTABLE USE PRACTICES FOR THE
USE OF TECHNOLOGY
TECHNOLOGY =
Computers
Hardware
Network devices
Software
Peripherals
Accessories
To Summarize AUP: STUDENTS:
Will not use technology to violate any laws.
Will set passwords, i.e. AR, Star, Novell login
Will not harm computers
STUDENTS:
Will not violate copyright laws.
Will close out of programs and log off the computer.
Will not use computers for non-instructional purposes.
Possible Penalties:
Lose computer privileges
Payment of money for damage
Alternative school
Shelby Co. Bd. Of Ed. Student Code of Conduct and Attendance
COPYRIGHT:
What is Copyright?
The copyright law says the person who created the program owns it and is the only one who can give permission to distribute it.
TERMS
INFRINGER – A person or company who copies copyrighted material without permission or authorization.
INFRINGEMENT – the act of violating a copyright by copying or distributing a copyrighted work without permission or authorization.
Intellectual Property
The physical expression of ideas contained in books, music, plays, movies and computer software.
You “steal” intellectual property and violate copyright law when you do the following:
Let a friend copy a new game you just bought
Load the same program on more computers that you have licenses for.
Follow the “One Disk, One Computer” rule
Download Musical CDs
Copy information someone has written and using it as your own.
Download images or music without getting written permission from owner
PUNISHMENT/PENALTIES FOR COPYRIGHT VIOLATORS
CIVIL PUNISHMENT – Copyright holder can sue for money
CRIMINAL – Violator can be sent to jail or fined by the government
COMPUTER FRAUD
HACKER =
A person who goes into someone’s personal files to
change records,
steal information,
destroy files, and/or
look around.
WAYS HACKERS INJURE OTHER COMPUTER USERS
1. People have to spend time and money to restore their files and make them secure again.
2. Violate a person’s privacy by looking in their files even if information is not changed.
HACKERS
3. Steal telephone and computer time and share access codes and passwords.
4. “Dumpster diving” going through office or technical info to get confidential information.
Similar to someone looking through your trash.
HACKERS
5. Crash systems, which cause them to malfunction and not work.
Think about ways we use computer systems and what could happen if they didn’t work.
SOFTWARE PIRACY
Illegal copying of programs
Large scale duplication and distribution
Fines, jail sentences for companies
Sharing a program with a friend
VIRUSES
How do viruses spread?
What damage do they cause?
Punishment?
HOW DOES A VIRUS SPREAD?
Spreads extremely quickly by making copies of itself and infecting files or disks
HOW DOES A VIRUS SPREAD?
Spreads extremely quickly by making copies of itself and infecting files or disks.
HOW DOES A VIRUS SPREAD?
Spreads extremely quickly by making copies of itself and infecting files or disks
HOW DOES A VIRUS SPREAD?
Spreads extremely quickly by making copies of itself and infecting files or disks
VIRUSES
Spread through e-mail attachments.
Never open emails if there is no name.
VIRUSES
Spread by downloading infected programs from the Internet.
(Students are not allowed to download programs on school computers.)
VIRUSES
Spread by sharing infected files or disks.
(Students are not allowed to bring programs from home to load on school computers.)
DAMAGE
WIPE OUT ENTIRE PROGRAMS
CAUSE COMPUTERS TO RUN VERY SLOWLY
BUSINESSES PAY MILLIONS OF DOLLARS A YEAR TO FIGHT VIRUSES/WORMS
PUNISHMENT
Fines
Jail Time
WAYS TO FIGHT COMPUTER CRIME
1. Education
Understand how technology can be used to hurt as well as help people.
How would you feel if you were the victim of a computer hacker.
2. Practice Safe Computing
Don’t share your log-in or password with anyone.
Computer hackers are not cool; they are criminals.
3. Acceptable Use Policy
Students and faculty will follow the AUP which they sign at the beginning of each year.
Click here for TEST !