You are on page 1of 44

Legal and Ethical Use of

Technology

KIZZEN WANE ESPINOZA

KRYL TALA BORJA

CHRISTINE JOY TOLENTINO

GEHRARD IVAN LEE MAGPANTAY

NEIL CHOI MACALINAO


 Legal and ethical use of technology in teaching
and learning is crucial to ensuring that
educational institutions and educators are
complying with laws, regulations, and ethical
principles. Here are some key considerationsfor
using technology in a legal and ethical way in
teaching and learning:
Data Privacy Copyright

 Educational institutions and educators should  Educational institutions and educators should
ensure that they comply with data privacy laws respect copyright laws when using digital
and regulations when using technology. This materials in teaching and learning. This means
means that they must protect students' personal that they should only use materials that they
information and data by implementing security have permission to use, such as those that are
measures such as encryption, password in the public domain or under a Creative
protection, and access controls. Commons license.
Accessibility Fair Use
 Educational institutions and
educators should ensure that digital materials  Educational institutions and educators should
and technologies are accessible to all students, be aware of the doctrine of fair use when
including those with using copyrighted materials. This doctrine
disabilities. This means that they should use allows for the limited use of copyrighted
technologies that are compatible with assistive materials for educational purposes, but it is
technologies and provide accommodations for important to understand the specific limits
students who need them. and requirements for fair use.
Cyberbullying Academic Integrity
 Educational institutions and educators should  Educational institutions and educators should
take steps to prevent and address cyberbullying, promote academic integrity when using
which can occur through the use of technology. technology. This means that they should
This means that they should educate students discourage cheating and plagiarism by using
about appropriate online behavior, monitor plagiarism detection software, setting clear
student activity, and respond promptly to expectations for academic honesty, and educating
reports of cyberbullying. students about the consequences of academic
dishonesty.
 By considering these legal and ethical
considerations when using technology in teaching
and learning, educational institutions and
educators can ensure that they are providing a
safe and effective learning environment for all
students.
Ethical Use of School
Technology
 The ethical use of school technology in teaching and
learning is essential to ensuring that students have a
safe, respectful, and responsible learning
environment. Here are some key considerations for
using school technology ethically:
Respect for others Digital citizenship Plagiarism

 Teachers and students  Teachers should promote  Teachers should teach


should respect the rights digital citizenship by students about plagiarism
and privacy of others teaching students to be and how to avoid it when
when using school responsible, ethical, and using school technology.
technology. This means respectful online. This This means teaching
that they should not means teaching students them how to cite sources
share personal about appropriate online properly, how to
information, photos, or behavior, how to protect paraphrase, and how to
videos of others without their personal use plagiarism detection
their consent. They information, and how to tools.
should also avoid online report inappropriate
behavior that may be behavior.
offensive or hurtful to
others.
Safety and security Accessibility Copyright

 Teachers should ensure  Teachers should ensure  Teachers should teach


that students are safe that school technology is students about copyright
and secure when using accessible to all laws and how to respect
school technology. This students, including those the intellectual property
means that they should with disabilities. This of others when using
use age-appropriate means providing school technology. This
technology, monitor accommodations and means teaching them
student activity, and assistive technologies as how to obtain permission
protect student data and needed. to use copyrighted
information. materials and how to
properly cite sources.
Ethical Issues in
Technology and Software
 There are several ethical issues with technology and software in teaching and learning that
educators and institutions need to consider. Here are some of the most significant ethical
issues in technology and software in teaching and learning:

Privacy Bias Accessibility


Technology and software Technology and software can 2 Technology and
can collect and store data on be biased against certain groups software must be accessible to
students, including personal of all
information and academic students based on factors such students, including those with
performance. Educators and as disabilities. Educators and
institutions must ensure that the race, gender, or socio-economic institutions must ensure that the
data collected is kept private and status. Educators and institutions technology and software they
confidential. must ensure that the technology use
and software they use do not are compatible with assistive
perpetuate bias or technologies and provide
discrimination. accommodations for students
who
need them.
Intellectual Property Digital Divide Online Safety Student Data Use

Technology Technology and Technology and Technology and


and software can be software can software can expose software can use
used to create exacerbate the digital students to student data for
and share divide between online risks such as purposes other than
educational students who have cyberbullying, education,
materials, but access to technology online predators, and such as marketing or
educators and and those inappropriate surveillance.
institutions must who do not. content. Educators Educators and
ensure that they Educators and and institutions institutions must
respect institutions must must educate ensure that student
intellectual property ensure that all students on online data is only
rights and students have equal safety, monitor used for educational
copyright laws. access to online activity, and purposes and
technology and take measures to that they have
software to prevent prevent and informed consent
creating an unequal address online risks. from students and
learning parents.
environment.
Unauthorized Access and Use
of
Hardware, Software, Network,
and
Computer Files
 Unauthorized access and use of hardware, software,
networks, and computer files is a serious ethical issue
that can lead to various negative consequences, such as
data breaches, identity theft, and privacy violations.
Here are some ways to prevent unauthorized access to
and use of hardware, software, networks, and computer
files:
Strong Passwords
 Use strong passwords and change them regularly. Educate users on how to create a strong
password that includes uppercase and lowercase letters, numbers, and special characters.

Multi-Factor Authentication

 Use multi-factor authentication to provide an additional layer of security. Multi-factor


authentication requires users to provide more than one form of identification, such as a
password, a fingerprint, or a security token.

Access Controls
 Implement access controls to restrict access to sensitive information and resources. This
means granting users access only to the resources they need to perform their job functions.

Encryption
 Use encryption to protect sensitive data. Encryption is the process of converting data into
code to prevent unauthorized access.
Anti-Virus and Anti-Malware Software

 Use anti-virus and anti-malware software to protect against viruses and malicious software
that can harm computers and steal data.

Monitoring and Auditing


 Monitor and audit computer systems to detect unauthorized access and use of hardware,
software, networks, and computer files. This means monitoring network traffic, computer
logs, and user activity.

Education and Training


 Educate users on how to protect their computer systems and data. Provide training on
security best practices, such as avoiding suspicious emails and websites, and how to report
security incidents.

 By implementing these preventive measures, educational institutions can minimize the risk
of unauthorized access and use of hardware, software, networks, and computer files and
protect the privacy and security of their students, faculty, and staff.
Hardware Theft and
Vandalism
 Hardware theft and vandalism are serious ethical
issues that can cause significant disruption to the
learning environment and Can also result in
financial losses for educational institutions. Here
are some ways to prevent hardware theft and
vandalism:
Physical Security Measures

 Implement physical security measures such as security cameras,


alarms, and locked doors to prevent unauthorized access to
computer labs, classrooms, and other areas where hardware is
stored.
Asset Tracking

 Track hardware assets to monitor their location


and prevent theft. This means keeping an
inventory of all hardware and tracking its
movement.

Secure Storage

 Store hardware in secure locations, such


as locked cabinets or rooms, when not in
use. Ensure that hardware is securely
fastened to prevent theft.
User Education
 Educate users on the importance of hardware
security and how to prevent theft and
vandalism. This means providing training on
how to secure hardware and report any
suspicious activity.

Security Policies

 Develop and enforce security policies that


specify how hardware should be secured and
who is responsible for its security. Policies
should also outline consequences for theft
and vandalism.
Remote Monitoring

 Implement remote monitoring of


computer systems to detect
unauthorized access and use. This
means monitoring network traffic,
computer logs, and user activity.

Marking and Tagging

 Mark and tag hardware to make it more


difficult to sell and easier to identify if it is
stolen. This means labeling hardware with
unique identifiers, such as serial numbers or
asset tags.
 By implementing these preventive measures,
educational institutions can minimize the risk
of hardware theft and vandalism and protect
the integrity of the learning environment.
Software Theft
 Software theft is a serious ethical issue that can lead to
legal consequences and financial losses for educational
institutions. Here are some ways to prevent software
theft:
Software Licenses

 Purchase software licenses for all software


used in the educational institution. This means
ensuring that software is legally purchased
and not illegally downloaded or shared.

Asset Tracking

 Track software assets to monitor their use


and prevent unauthorized sharing or
duplication. This means keeping an
inventory of all software and tracking its
use.
User Education

 Educate users on the importance of


software licenses and how to prevent
software theft. This means providing
training on how to properly use software
and reporting any suspicious activity.

Security Policies

 Develop and enforce security policies that


specify how software should be used and
who is responsible for its security. Policies
should also outline consequences for
software theft.
Use of Open-Source Software

 Consider using open-source


software, which is licensed under
an open-source license that
allows users to use, modify, and
distribute the software freely.
This can be a cost-effective way to
provide software to students and Regular Software
Monitoring and Auditing faculty. Audits
 Monitor and audit computer
 Conduct regular software
systems to detect
audits to ensure that all
unauthorized software use.
software is properly licensed
This means monitoring
and in compliance with
network traffic, computer
license agreements.
logs, and user activity.
 By implementing these preventive measures,
educational institutions can minimize the risk of
software theft and protect the integrity of their
computer systems .
Information Theft
Information theft is a serious ethical issue that
can lead to various negative consequences, such
as identity theft, financial losses, and
reputational damage. Here are some ways to
prevent information theft:
Access Controls User Education
 Implement access controls  Educate users on the importance
to restrict access to of information security and how
sensitive information. This to prevent information theft.
means granting users This means providing training
access only to the on security best practices, such
information they need to as avoiding suspicious emails
perform their job and websites, and how to report
functions. security incidents.
Encryption

 Use encryption to
protect sensitive
data. Encryption is
the process of
converting data into
code to prevent
unauthorized
access.
Data Backups

 Implement regular data backups to ensure that


important data is not lost in the event of a
security breach.

Monitoring and
Auditing
 Monitor and audit computer systems to
detect unauthorized access and use of
sensitive information. This means
monitoring network traffic, computer logs,
and user activity.
Physical Security
Measures

 Implement physical security measures such


as security cameras, alarms, and locked doors
to prevent unauthorized access to areas
where sensitive information is stored.

Security Policies
Develop and enforce security policies
that specify how sensitive
information should be secured and
who is responsible for its security.
Policies should also outline
consequences for information theft.
Malicious Acts in
Software
 Malicious acts in software, such as viruses, malware,
and ransomware, are a serious ethical issue that can
lead to significant disruptions to the learning
environment and financial losses for educational
institutions. Here are some ways to prevent malicious
acts in software:
Anti-Virus Regular Software User Education
Software Updates
 Educate users on thei
 Install anti-virus software  Keep software up to date importance of software security
on all computers to detect with the latest security and how to prevent malicious acts
and remove viruses and patches and updates to in software. This means providing
malware. prevent vulnerabilities training on how to avoid
from being exploited. suspicious emails and websites
and how to report security
incidents.
Firewall Backups
Protection
 Implement regular backups of data
 Implement firewall protection to to ensure that data can be restored
prevent unauthorized access to in breach case of a security or data
computer systems. loss.
User Security
Permissions Policies

 Implement user permissions to restrict  Develop and enforce security policies that specify
access to sensitive data and functions to how software should be secured and who is
authorized personnel only. responsible for its security. Policies should also
outline consequences for malicious acts in software.
By implementing these preventive measures,
educational institutions can minimize the risk of
malicious software and protect the integrity of their
computer systems.
Acceptable and Unacceptable Uses of School Technology
 Acceptable and unacceptable uses of school technology should be clearly defined and communicated
to all users, including students, faculty, and staff. Here are some examples:
Acceptable uses of school technology Unacceptable uses of school technology

1. Educational purposes: Use school technology to 1. Harassment and bullying: Use school technology
support teaching and learning activities. to harass, bully, or intimidate others.
2. Research: Use school technology for research 2. Illegal activities: Use school technology to engage
purposes related to academic or professional activities. in illegal activities such as hacking, piracy, or
copyright infringement.
3. Communication: Use school technology to 3. Inappropriate content: Access or distribute
communicate with classmates, teachers, and staff in a inappropriate content such as pornography, hate
respectful and professional manner. speech, or violence.
4. Collaboration: Use school technology to 4. Unauthorized access: Attempt to access or modify
collaborate with classmates and teachers on academic school technology systems or data without permission.
or professional projects.
5. Creative work: Use school technology to create and 5. Personal use: Use school technology for personal
share original works that are relevant to academic or activities such as gaming or social media during class
professional activities. time.
By clearly defining and enforcing acceptable and
unacceptable uses of school technology, educational
institutions can create a safe and productive learning
environment for all users. It is important to educate users on
the appropriate use of school technology and to have
consequences for violations of acceptable use policies.

You might also like