presentation on ethics - Bellingham Public Schools

Download Report

Transcript presentation on ethics - Bellingham Public Schools

Technology
in the
Bellingham School District
Bellingham School District Network
 Connectivity
 Communication
 Research
Practice Responsible Use
Connectivity
Insert network.gif here
Electronic Mail
Use it as a primary tool for
communication with others: teachers,
group members, friends. 80/20 rule.
! Messages are not entirely secure
Cautionary Note
 Files and communications may
be reviewed to maintain system
integrity
 Users should not expect that files
stored on district servers will be
private
Responsible Use
What is Ethical Use?
 Know and model district rules concerning
student use of e-mail and Internet
 Know that you need a license for every kind
of software on the computers.
 Know and model the board policy on
copyrighted materials.
Student Responsibilities
 General school rules apply
 Understand District and School rules




harassment, language
passwords, privacy
copyright
appropriate use of resources
 Independent student use permitted upon
submission of permission forms
The Following Behaviors
are
Not Permitted
On the BSD Network
Using the network for:
 Assisting a campaign for election
 Commercial purposes
 Promoting, supporting or celebrating
religion or religious institutions
 Using obscene
language
Sending or displaying offensive
messages or pictures
 Harassing, insulting or
attacking others
Engaging in practices
that threaten the
network
 Loading files that may
introduce a virus.
 Hacking into network
files.
 Circumventing network
security.
Trespassing in others’ folders,
documents or files
 Using others’
passwords
 Pretending to be
someone other than
yourself on the
network.
Intentionally wasting limited
resources:
Chain Letters
 Greetings to large groups
 Sending graphics and .exe

files
 Playing games from home
or on the internet
 Downloading or forwarding games
Violating copyright laws
Copying
information from
someone else’s
work without giving
credit to the source.
Installing software on any school
computer.
Research
RESEARCH CYCLE
Questioning
Planning
Gathering
Sorting
Synthesizing
Evaluating
The network is our means of
communication and research.
It is up to each one of us to
help maintain and preserve the
integrity and efficiency of the
network.
The End
 Always
Log Off
Properly
Select “Close all
Files and logon as a
new user” (fourth
choice)

Clean up around
your computer.
