IT190 Assignment Unit 10-Computer Use Policy

01 January, 0001 | 3 Min Read

UNIT 10: ASSIGNMENT 1

Computer Use Policy

Kaplan University

IT190-01

Professor Abramson

May 5, 2015

Computer Use Policy

  1. Ethical computing

Ethical computing is the moral values and standards that control the actions of a person or a group when using a computer. Ethical computing means that you are aware of the harm that can been done such as, identity theft, bank account information stolen people

can become a victim of fraud.

  1. Plagiarism and copyright infringement

Plagiarism is copying or steal someone’s work and using it as if it is yours without giving credit to the sources. Plagiarism is against academic requirements. There are programs such as Turnitin that check for plagiarism. Copyright infringement is a violation of the

copyright and you can sue. Meaning that you cannot copy music, software or videos. In the news ā€œA CNN News Editor was fired for plagiarismā€ According to the article ā€œthe

editor had plagiarized at 50 articleā€ Ohlheiser (2014).

Copy left is software that can be free or paid and it allows users to copy, change and redistribute the software. It also known to be proprietary because can convert the

program.

  1. Software piracy

Software piracy is when you copy software that is legally protected under a copyright and is considered copyright infringement. Software piracy is a direct violation of the EULA and penalties for an individual are fines up to $93,500 and for a company the fines are up

to $467,500 and both can up to five years imprisonment.

  1. Sharing Internet connection

Internet connection sharing (ICS) is when you are able to have network of computers (two or more) that share the same internet connection. It is unethical for you to allow your neighbor to piggyback off your connection because it goes against the ISP

restrictions and EULA.

  1. Ethical issues related to using social media

Social media can be misleading and people misuse the internet. If you post a picture of someone hitting a dog, the message that is perceived that this person has committed cruelty to animals. If you post a picture of you at a Caribbean event dressed in carnival

custom, people with assume that you are doing something inappropriate.

I read an article from St. Louis, MO server that worked for Applebee’s posted a picture of a receipt of a customer that refused to give her a tip. The customer wrote on the receipt of

$34.93 ā€œI give God 10%. Why do you get 18%?ā€Larson (2013).

  1. Employer’s legal right to review your activities using their technology

Your employer have the right to monitor your internet usage and any websites that you visit while using their network. Your employer also has the right to review company email accounts and monitor your keylogging to ensure productivity does not decline.

References:

http://online.vitalsource.com/books/9781323028339/id/ch05figu6 http://online.vitalsource.com/books/9781323028339/id/ch05lev3sec41 http://ethicalcomputing.net/

http://www.techopedia.com/definition/5499/computer-ethics http://techterms.com/definition/computerethics http://techterms.com/definition/plagiarism

http://techterms.com/definition/copyright_infringement

http://tudorlawfirm.com/the-difference-between-plagiarism-and-copyright-infringement/ http://www.plagiarismchecker.com/plagiarism-vs-copyright.php

http://www.thewire.com/national/2014/05/cnn-editor-fired-for-plagiarism/371045/ http://searchenterpriselinux.techtarget.com/definition/copyleft

http://www.techopedia.com/definition/3261/copyleft http://www.gnu.org/copyleft/ http://online.vitalsource.com/books/9781323028339/id/ch04lev3sec22 http://online.vitalsource.com/books/9781323028339/id/gloslev1sec3 http://www.wisegeek.com/what-is-software-piracy.htm

http://techterms.com/definition/piracy

http://www.pcmag.com/encyclopedia/term/51693/software-piracy http://ww2.bsa.org/country/Anti-Piracy/Know%20the%20Law.aspx?sc_lang=en-AU http://www.bsa.org/anti-piracy/tools-page/software-piracy-and-the-law/?sc_lang=en-US http://www.scottandscottllp.com/main/software_piracy_penalties.aspx http://www.wisegeek.com/what-is-internet-connection-sharing.htm

http://www.pcworld.com/article/246953/can_my_neighbor_and_i_share_an_internet_con nection_.html

http://www.wisegeek.com/what-are-media-ethics.htm

http://www.usatoday.com/story/news/nation/2014/03/08/data-online-behaviorresearch/5781447/

http://www.americanbar.org/publications/blt/2014/01/03_harvey.html http://mashable.com/2013/02/01/applebees-fired/ https://www.privacyrights.org/workplace-privacy-and-employee-monitoring http://www.natlawreview.com/article/employers-using-social-media-to-monitoremployees-risks-and-liability

Powered by TCPDF (www.tcpdf.org)

Related posts