Acceptable Use Policy
Cyber safety
Cyber security
- “involves protecting that [your personal] information [stored on the computer or online] by preventing, detecting, and responding to attacks.”
Examples
-
- “viruses erasing your entire system,
- someone breaking into your system and altering files,
- someone using your computer to attack others,
-
- or someone stealing your credit card information and making unauthorized purchases”
Cyber bullying
- “repeated use of information technology, including e-mail, instant messaging, blogs, chat rooms, pagers, cell phones, and gaming systems, to deliberately harass, threaten or intimidate others.”
- “practice of using technology to harass, or bully, someone else” which “can range in severity from cruel or embarrassing rumors to threats, harassment, or stalking.”
Examples
-
- sending mean, vulgar, or threatening messages or images;
- posting sensitive, private information about another person;
- pretending to be someone else in order to make that person look bad;
-
- (or) intentionally excluding someone from an online group”
Cyber ethics
- “refers to a code of safe and responsible behavior for the Internet community… understanding the risks of harmful and illegal behavior online and learning how to protect ourselves”
Cyber Crimes (Computer Crimes)
FBI Definition of Cyber Crime
“The Federal Bureau of Investigations (FBI) recognizes four instances of cyber crime:
- Cyber crimes against children
- Theft of intellectual property
- Publication and intentional dissemination of malware
- National and international Internet fraud
- The United States’ executive branch defined a National Strategy to Secure Cyberspace, which put the FBI and the Department of Justice in charge of cyber crime investigation and prosecution.”
Examples
-
- downloading illegal music files
- stealing millions of dollars from online bank accounts
- creating and distributing viruses on other computers
- posting confidential business information on the Internet
- identity theft, where someone steal personal information via phishing or pharming
-
Fair Use
- the conditions under which you can use material that is copyrighted by someone else without paying royalties.
Creative Commons Guidelines
http://creativecommons.org
Unauthorized Electronic Access
Filters for Censorship (Internet Censorship)
http://epic.org/free_speech/censorship/
- “Filtering can be based on ablacklist or be dynamic.”
- methods for censoring content are IP blocking, DNS filtering
- “restricting private internet access to blocking searches for politically volatile keywords.”
Communications Decency Act (CDA)
- criminalizes “indecent” speech on the Internet
|