SlideShare uma empresa Scribd logo
1 de 10
Computer SafetyComputer Safety
What does that mean?What does that mean?
Computer SafetyComputer Safety
Computer Safety has many components:Computer Safety has many components:
Computer ethicsComputer ethics
NetiquetteNetiquette
School District rulesSchool District rules
Internet SafetyInternet Safety
PlagiarismPlagiarism
Computer EthicsComputer Ethics
EthicsEthics
- A set of principles of right conduct/behavior- A set of principles of right conduct/behavior
• Computer EthicsComputer Ethics
- Set of principles of correct behavior while- Set of principles of correct behavior while
using a computerusing a computer
Computer EthicsComputer Ethics
 1. THOU SHALT NOT USE A1. THOU SHALT NOT USE A
COMPUTER TO HARM OTHERCOMPUTER TO HARM OTHER
PEOPLE.PEOPLE.
 2. THOU SHALT NOT INTERFERE2. THOU SHALT NOT INTERFERE
WITH OTHER PEOPLE'SWITH OTHER PEOPLE'S
COMPUTER WORK.COMPUTER WORK.
 3. THOU SHALT NOT SNOOP3. THOU SHALT NOT SNOOP
AROUND IN OTHER PEOPLE'SAROUND IN OTHER PEOPLE'S
COMPUTER FILES.COMPUTER FILES.
 4. THOU SHALT NOT USE A4. THOU SHALT NOT USE A
COMPUTER TO STEAL.COMPUTER TO STEAL.
 5. THOU SHALT NOT USE A5. THOU SHALT NOT USE A
COMPUTERCOMPUTER
TO BEAR FALSE WITNESS.TO BEAR FALSE WITNESS.

 6. THOU SHALT NOT COPY OR USE6. THOU SHALT NOT COPY OR USE
PROPRIETARY SOFTWARE FORPROPRIETARY SOFTWARE FOR
WHICH YOU HAVE NOT PAID.WHICH YOU HAVE NOT PAID.
 7. THOU SHALT NOT USE OTHER7. THOU SHALT NOT USE OTHER
PEOPLE'S COMPUTERPEOPLE'S COMPUTER
RESOURCES WITHOUTRESOURCES WITHOUT
AUTHORIZATION OR PROPERAUTHORIZATION OR PROPER
COMPENSATION.COMPENSATION.
 8. THOU SHALT NOT8. THOU SHALT NOT
APPROPRIATE OTHER PEOPLE'SAPPROPRIATE OTHER PEOPLE'S
INTELLECTUAL OUTPUT.INTELLECTUAL OUTPUT.
 9. THOU SHALT THINK ABOUT THE9. THOU SHALT THINK ABOUT THE
SOCIAL CONSEQUENCES OF THESOCIAL CONSEQUENCES OF THE
PROGRAM YOU ARE WRITING ORPROGRAM YOU ARE WRITING OR
THE SYSTEM YOU ARETHE SYSTEM YOU ARE
DESIGNING.DESIGNING.
 10. THOU SHALT ALWAYS USE A10. THOU SHALT ALWAYS USE A
COMPUTER IN WAYS THAT INSURECOMPUTER IN WAYS THAT INSURE
CONSIDERATION AND RESPECTCONSIDERATION AND RESPECT
FOR YOUR FELLOW HUMANSFOR YOUR FELLOW HUMANS
NetiquetteNetiquette
Develop a list of Do’ and Don'ts ofDevelop a list of Do’ and Don'ts of
communicating on the computercommunicating on the computer
NetiquetteNetiquette
Proper behavior while using the computerProper behavior while using the computer
““Rules of the Road in Cyberspace”Rules of the Road in Cyberspace”
NetiquetteNetiquette
 11. Avoid hurting. Avoid hurting
someone's feelings withsomeone's feelings with
e-mail.e-mail.
 2. Respect other people's2. Respect other people's
online rights.online rights.
 3. Avoid insulting3. Avoid insulting
someone unless you wantsomeone unless you want
to start a flame war.to start a flame war.
 4. If someone insults you,4. If someone insults you,
be calm.be calm.
 5. Avoid "crashing"5. Avoid "crashing"
discussion groups ordiscussion groups or
forums.forums.
 6. Respect the privacy of6. Respect the privacy of
other people.other people.
 7. Be responsible online.7. Be responsible online.
 8. Help other people learn8. Help other people learn
more about the Net.more about the Net.
NetiquetteNetiquette
The following website will help us learnThe following website will help us learn
more about Netiquette:more about Netiquette:
Cyber CitizenCyber Citizen
Bensalem Township School DistrictBensalem Township School District
RulesRules
Bensalem Township School DistrictBensalem Township School District
RulesRules

Mais conteúdo relacionado

Mais procurados

Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacyeiramespi07
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Simon Salter
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Gian Gentile
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!Asma Hossain
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virusLeonor Costa
 
It security and awareness training 5 10-2018
It security and awareness training 5 10-2018It security and awareness training 5 10-2018
It security and awareness training 5 10-2018jubke
 
Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)Cyber Security Infotech
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malwareamiable_indian
 
Introduction to Basic Computer System
Introduction to Basic Computer SystemIntroduction to Basic Computer System
Introduction to Basic Computer SystemReinze Vito
 
Computer security
Computer securityComputer security
Computer securityfiza1975
 
Social Engineering
Social EngineeringSocial Engineering
Social EngineeringCyber Agency
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policygfair3
 
Computer ethics & copyright
Computer ethics & copyrightComputer ethics & copyright
Computer ethics & copyrightAdyns
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness ProgramBill Gardner
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 pptvasanthimuniasamy
 

Mais procurados (20)

Information security
Information securityInformation security
Information security
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
It security and awareness training 5 10-2018
It security and awareness training 5 10-2018It security and awareness training 5 10-2018
It security and awareness training 5 10-2018
 
Types of malware
Types of malwareTypes of malware
Types of malware
 
Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Introduction to Basic Computer System
Introduction to Basic Computer SystemIntroduction to Basic Computer System
Introduction to Basic Computer System
 
Computer security
Computer securityComputer security
Computer security
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
Computer ethics & copyright
Computer ethics & copyrightComputer ethics & copyright
Computer ethics & copyright
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
 

Destaque

Health & safety presentation
Health & safety presentationHealth & safety presentation
Health & safety presentationPhalinng
 
Safe Manual Handling in the Workplace
Safe Manual Handling in the WorkplaceSafe Manual Handling in the Workplace
Safe Manual Handling in the WorkplaceDjCurrie
 
Manual Handling - Shift Materials Safely
Manual Handling - Shift Materials SafelyManual Handling - Shift Materials Safely
Manual Handling - Shift Materials SafelyMandy Bruford
 
Health And Safety
Health And SafetyHealth And Safety
Health And SafetySaimaRafiq
 
Manual Handling Of Loads
Manual Handling Of LoadsManual Handling Of Loads
Manual Handling Of LoadsFrank_Keenan
 
Health issues of ICT
Health issues of ICTHealth issues of ICT
Health issues of ICTCJ900
 
Mh Manual Handling
Mh  Manual HandlingMh  Manual Handling
Mh Manual Handlingneiltilley
 
Manual Handling Ppt
Manual Handling PptManual Handling Ppt
Manual Handling Pptvtsiri
 
Occupational Health & Safety Presentation
Occupational Health & Safety PresentationOccupational Health & Safety Presentation
Occupational Health & Safety PresentationMark Zeeman
 

Destaque (13)

Computer safety
Computer safetyComputer safety
Computer safety
 
Health & safety presentation
Health & safety presentationHealth & safety presentation
Health & safety presentation
 
Safe Manual Handling in the Workplace
Safe Manual Handling in the WorkplaceSafe Manual Handling in the Workplace
Safe Manual Handling in the Workplace
 
Manual Handling
Manual HandlingManual Handling
Manual Handling
 
Manual Handling - Shift Materials Safely
Manual Handling - Shift Materials SafelyManual Handling - Shift Materials Safely
Manual Handling - Shift Materials Safely
 
Health And Safety
Health And SafetyHealth And Safety
Health And Safety
 
Manual Handling Of Loads
Manual Handling Of LoadsManual Handling Of Loads
Manual Handling Of Loads
 
Health issues of ICT
Health issues of ICTHealth issues of ICT
Health issues of ICT
 
Principles of manual handling
Principles of manual handlingPrinciples of manual handling
Principles of manual handling
 
Mh Manual Handling
Mh  Manual HandlingMh  Manual Handling
Mh Manual Handling
 
Manual_handling
Manual_handlingManual_handling
Manual_handling
 
Manual Handling Ppt
Manual Handling PptManual Handling Ppt
Manual Handling Ppt
 
Occupational Health & Safety Presentation
Occupational Health & Safety PresentationOccupational Health & Safety Presentation
Occupational Health & Safety Presentation
 

Semelhante a Computer safety

Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2JeffUrgelles
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computersAl Forte
 
etiquettes-grade 7.pptx
etiquettes-grade 7.pptxetiquettes-grade 7.pptx
etiquettes-grade 7.pptxCynnePataweg
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
Super billing computers are your future
Super billing computers are your futureSuper billing computers are your future
Super billing computers are your futuresuperb11b
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptxglorysunny
 
The 10 Commandments of Computer Ethics
The 10 Commandments of Computer EthicsThe 10 Commandments of Computer Ethics
The 10 Commandments of Computer Ethicssmartinson
 
Computer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing PlatformsComputer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing PlatformsAmplephi
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICSRJ Khan
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9sajida zafar
 
the lesson about the information and communication to technology
the lesson about the information and communication to technologythe lesson about the information and communication to technology
the lesson about the information and communication to technologylcnemedez
 
Lesson-2-Rules-of-Netiquette safety Online
Lesson-2-Rules-of-Netiquette safety OnlineLesson-2-Rules-of-Netiquette safety Online
Lesson-2-Rules-of-Netiquette safety Onlinessuser9cd7f3
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society Sumama Shakir
 
Computer Ethics
Computer EthicsComputer Ethics
Computer EthicsRamki M
 

Semelhante a Computer safety (20)

3 Rd Computer Ethics
3 Rd Computer Ethics3 Rd Computer Ethics
3 Rd Computer Ethics
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computers
 
etiquettes-grade 7.pptx
etiquettes-grade 7.pptxetiquettes-grade 7.pptx
etiquettes-grade 7.pptx
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Super billing computers are your future
Super billing computers are your futureSuper billing computers are your future
Super billing computers are your future
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
Webgraphicorganizerkaur
WebgraphicorganizerkaurWebgraphicorganizerkaur
Webgraphicorganizerkaur
 
Webgraphicorganizerkaur
WebgraphicorganizerkaurWebgraphicorganizerkaur
Webgraphicorganizerkaur
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
Webgraphicorganizerkaur
WebgraphicorganizerkaurWebgraphicorganizerkaur
Webgraphicorganizerkaur
 
The 10 Commandments of Computer Ethics
The 10 Commandments of Computer EthicsThe 10 Commandments of Computer Ethics
The 10 Commandments of Computer Ethics
 
Computer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing PlatformsComputer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing Platforms
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
the lesson about the information and communication to technology
the lesson about the information and communication to technologythe lesson about the information and communication to technology
the lesson about the information and communication to technology
 
Lesson-2-Rules-of-Netiquette safety Online
Lesson-2-Rules-of-Netiquette safety OnlineLesson-2-Rules-of-Netiquette safety Online
Lesson-2-Rules-of-Netiquette safety Online
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 

Mais de ahentz

Tech stats
Tech statsTech stats
Tech statsahentz
 
Workshop Aug
Workshop AugWorkshop Aug
Workshop Augahentz
 
Workshop Aug
Workshop AugWorkshop Aug
Workshop Augahentz
 
Workshop Aug
Workshop AugWorkshop Aug
Workshop Augahentz
 
Workshop Aug
Workshop AugWorkshop Aug
Workshop Augahentz
 
Workshop Aug
Workshop AugWorkshop Aug
Workshop Augahentz
 
Bentech
BentechBentech
Bentechahentz
 
Shafer
ShaferShafer
Shaferahentz
 
Wiki Ning2
Wiki Ning2Wiki Ning2
Wiki Ning2ahentz
 
Makebeliefscomix2
Makebeliefscomix2Makebeliefscomix2
Makebeliefscomix2ahentz
 

Mais de ahentz (11)

Tech stats
Tech statsTech stats
Tech stats
 
Workshop Aug
Workshop AugWorkshop Aug
Workshop Aug
 
Workshop Aug
Workshop AugWorkshop Aug
Workshop Aug
 
Workshop Aug
Workshop AugWorkshop Aug
Workshop Aug
 
Workshop Aug
Workshop AugWorkshop Aug
Workshop Aug
 
Workshop Aug
Workshop AugWorkshop Aug
Workshop Aug
 
Bentech
BentechBentech
Bentech
 
Diigo
DiigoDiigo
Diigo
 
Shafer
ShaferShafer
Shafer
 
Wiki Ning2
Wiki Ning2Wiki Ning2
Wiki Ning2
 
Makebeliefscomix2
Makebeliefscomix2Makebeliefscomix2
Makebeliefscomix2
 

Computer safety

  • 1. Computer SafetyComputer Safety What does that mean?What does that mean?
  • 2. Computer SafetyComputer Safety Computer Safety has many components:Computer Safety has many components: Computer ethicsComputer ethics NetiquetteNetiquette School District rulesSchool District rules Internet SafetyInternet Safety PlagiarismPlagiarism
  • 3. Computer EthicsComputer Ethics EthicsEthics - A set of principles of right conduct/behavior- A set of principles of right conduct/behavior • Computer EthicsComputer Ethics - Set of principles of correct behavior while- Set of principles of correct behavior while using a computerusing a computer
  • 4. Computer EthicsComputer Ethics  1. THOU SHALT NOT USE A1. THOU SHALT NOT USE A COMPUTER TO HARM OTHERCOMPUTER TO HARM OTHER PEOPLE.PEOPLE.  2. THOU SHALT NOT INTERFERE2. THOU SHALT NOT INTERFERE WITH OTHER PEOPLE'SWITH OTHER PEOPLE'S COMPUTER WORK.COMPUTER WORK.  3. THOU SHALT NOT SNOOP3. THOU SHALT NOT SNOOP AROUND IN OTHER PEOPLE'SAROUND IN OTHER PEOPLE'S COMPUTER FILES.COMPUTER FILES.  4. THOU SHALT NOT USE A4. THOU SHALT NOT USE A COMPUTER TO STEAL.COMPUTER TO STEAL.  5. THOU SHALT NOT USE A5. THOU SHALT NOT USE A COMPUTERCOMPUTER TO BEAR FALSE WITNESS.TO BEAR FALSE WITNESS.   6. THOU SHALT NOT COPY OR USE6. THOU SHALT NOT COPY OR USE PROPRIETARY SOFTWARE FORPROPRIETARY SOFTWARE FOR WHICH YOU HAVE NOT PAID.WHICH YOU HAVE NOT PAID.  7. THOU SHALT NOT USE OTHER7. THOU SHALT NOT USE OTHER PEOPLE'S COMPUTERPEOPLE'S COMPUTER RESOURCES WITHOUTRESOURCES WITHOUT AUTHORIZATION OR PROPERAUTHORIZATION OR PROPER COMPENSATION.COMPENSATION.  8. THOU SHALT NOT8. THOU SHALT NOT APPROPRIATE OTHER PEOPLE'SAPPROPRIATE OTHER PEOPLE'S INTELLECTUAL OUTPUT.INTELLECTUAL OUTPUT.  9. THOU SHALT THINK ABOUT THE9. THOU SHALT THINK ABOUT THE SOCIAL CONSEQUENCES OF THESOCIAL CONSEQUENCES OF THE PROGRAM YOU ARE WRITING ORPROGRAM YOU ARE WRITING OR THE SYSTEM YOU ARETHE SYSTEM YOU ARE DESIGNING.DESIGNING.  10. THOU SHALT ALWAYS USE A10. THOU SHALT ALWAYS USE A COMPUTER IN WAYS THAT INSURECOMPUTER IN WAYS THAT INSURE CONSIDERATION AND RESPECTCONSIDERATION AND RESPECT FOR YOUR FELLOW HUMANSFOR YOUR FELLOW HUMANS
  • 5. NetiquetteNetiquette Develop a list of Do’ and Don'ts ofDevelop a list of Do’ and Don'ts of communicating on the computercommunicating on the computer
  • 6. NetiquetteNetiquette Proper behavior while using the computerProper behavior while using the computer ““Rules of the Road in Cyberspace”Rules of the Road in Cyberspace”
  • 7. NetiquetteNetiquette  11. Avoid hurting. Avoid hurting someone's feelings withsomeone's feelings with e-mail.e-mail.  2. Respect other people's2. Respect other people's online rights.online rights.  3. Avoid insulting3. Avoid insulting someone unless you wantsomeone unless you want to start a flame war.to start a flame war.  4. If someone insults you,4. If someone insults you, be calm.be calm.  5. Avoid "crashing"5. Avoid "crashing" discussion groups ordiscussion groups or forums.forums.  6. Respect the privacy of6. Respect the privacy of other people.other people.  7. Be responsible online.7. Be responsible online.  8. Help other people learn8. Help other people learn more about the Net.more about the Net.
  • 8. NetiquetteNetiquette The following website will help us learnThe following website will help us learn more about Netiquette:more about Netiquette: Cyber CitizenCyber Citizen
  • 9. Bensalem Township School DistrictBensalem Township School District RulesRules
  • 10. Bensalem Township School DistrictBensalem Township School District RulesRules