Site hosted by Angelfire.com: Build your free website today!
My Ethics Page
CTC Standards
14,15, 25, 29, and 30
Identify issues involved in the access to, use, and
control of computers in our society.

My Objectives
for my students


To become ethical in the computer environment. 

To follow the guidelines of 'Netiquette on the Internet. 

To become aware of the legal issues involved with computer crime and misuse. 

My Concerns

Spamming
Safety of students
Hacking
Age appropriate sites
Computer viruses
Privacy
 ***************************
Freedom of speech
 *****************************

INTERNET CODE OF ETHICS FOR STUDENTS

--------------------------------------------------------------------------------

Students wishing to use school computers and the Internet must observe the terms of the computer user's Code of Ethics. Violation of any of the terms will result in disciplinary action which will include temporary or permanent suspension of computer privileges and other disciplinary measures.

--------------------------------------------------------------------------------

SECTION 1: GENERAL INTERNET CODE OF ETHICS
Access to the Internet is provided to students for educational research and electronic communications for educational purposes only. Therefore:

Use of the Internet without the knowledge and permission of a teacher or other authorized personnel is prohibited.
Use of the Internet without a clearly defined educational objective, understood by both student and teacher, is not allowed.
Use of the Internet to view, copy, save or distribute unauthorized text files, graphics files, sound files or video files is forbidden.
Deletion, examination, copying, or modification of files or data belonging to other users without their consent is prohibited.
Unauthorized, deliberate action which damages or disrupts a computing system, alters its normal performance, or causes it to malfunction is prohibited.
Internet activities that use excessive network resources in ways that prevent others from accessing the network are not allowed.
Publishing of any material with abusive, harassing, threatening, or objectionable language is forbidden.
Use of the network for any non-educational purpose is prohibited.

--------------------------------------------------------------------------------

SECTION 2: ELECTRONIC MAIL
Whenever you send electronic mail, your assigned user name is included in the mail message. You are responsible for all electronic mail originating from your user name. Therefore:

Sending electronic mail messages using an unauthorized user name is prohibited.
Any unauthorized attempt to read, delete, copy, or modify the electronic mail of other users is prohibited.
Attempts at sending harassing, obscene and/or other threatening electronic mail to another user are prohibited.
The use of abusive or otherwise objectionable language in either public or private messages is prohibited.
Attempts at sending unsolicited junk mail, "for-profit" messages, or chain letters are prohibited.

--------------------------------------------------------------------------------

SECTION 3: NETWORK SECURITY
As a user of a network, you may be allowed to access other networks (and/or the computer systems attached to those networks). Therefore:

The use of systems and/or networks in attempts to gain unauthorized access to remote systems is prohibited.
The interception, copying, distributing, decryption or use of the login names and/or passwords of others is prohibited.
Intentional attempts to "crash" network systems or programs are prohibited.
Any attempt to secure a higher level of privilege on Network systems is prohibited.