safe and ethical use
TRANSCRIPT
Safe and Ethical Useof Technology
by: Jennifer Brister
Computer Safety Online• Internet use should support classroom instruction and state
standards.• All students and teachers will use their passwords issued to them by
the technology department• Passwords should be kept in a safe place an not shared with anyone• All data should be backed up at least once a month on an external
drive
Computer Safety Offline• Make sure laptops are secured when you are not using it• Make sure your computer is on a stable desk, table or cart, so it cannot be
accidentally knocked off• Hardware should be purchased through the district, tagged and put on the
school inventory• Computer cords and cables should not be exposed but kept neatly against
the wall.• Never open your computer, leave that to the experienced IT department• Do not share passwords• Backup your data regularly
Social Networking Dos• Treat others with respect• Be friends with people you know in real life• Use strong passwords• Use privacy settings• Verify your friend requests• Verify downloads, attachments, and emails• Model good online behavior
Social Networking Don’ts• Share your personal information such as social security number,
address, telephone number or the school you attend• Participate in cyber-bullying• Communicate with people you don’t know• Use inappropriate language• Believe everything you read is true• Post things anonymously• Upload anything you wouldn’t want anyone to see
Ethical Use of the Internet• Your actions on the internet are just as important as your actions in
the real world• Keep your information private and respect the privacy of others• Use the internet appropriately and productively to enhance and
enrich learning• Abide by copyright laws, respect your property and the property of
others.
Copyright Guidelines• Copyright Laws - protects your work or anyone else’s work from being copied or
used without permission• Fair Use Policy – allows you to use part of copyrighted works for educational
purposes• Text – up to 1000 words, but not more than 10% of book or article• Poems- up to 250 words or the entire poem if less that 250 word,no more than 3 poems by same author, or 5 poems in a collection• Photographs or drawings – up to 5 images or 15 in a collection and images cannot be
changed• Videos - up to 3 min. but no more than 10%, the video clip cannot be changed• Music -up to 30 seconds but no more than 10% of sheet music• Citations - cite your sources, multimedia presentation must include a statement indicating
fair use for educational purposes, copyright information must be included in bibliography
Methods for Checking Plagiarism
• Use online detection tools such as SafeAssign or Plagiarism.org• Look for warning signs such as unusual phrasing, phrases too
sophisticated, or writing style that is different• Enter unusual phrases in search engine and see if anything comes up• Know the websites that offer papers to students• Take notice if a different font is used
Proper Citation Methods• Use the citation requested by your teacher or professor such as APA
or MLA• When you paraphrase or quote you should tell the reader the source
by using in-text citations or citations in parenthesis. • Give the complete citation using the style requested by your teacher
at the end of your paper.
ConclusionIntegrating technology into the classroom can greatly enhance
student learning. We must prepare our students how to use the computer and internet safely to avoid any unethical situations to arise. By using a safe and ethical training we can teach our kids how to properly use technology to become life long learners in the community.
References• Johnson, Doug. (2012) The Classroom Teacher’s Technology Survival
Guide. San Franciso, CA: John Wiley & Sons• Research Guides: Style Manuals and Citation Methods: General
Information. (n.d.). Retrieved February 07, 2017, from http://csulb.libguides.com/style• Reidsville Middle. (n.d.). Retrieved February 07, 2017, from
http://www.rock.k12.nc.us/domain/1103 • Social Networking Do's and Don'ts. (n.d.). Retrieved February 07,
2017, from https://cuit.columbia.edu/cuit/it-security-resources/social-networking-dos-donts