1 Lesson: Ethics & Safe Practices You arrive at work and use your company’s computer to check your personal e-mail. You also have several bids on eBay, so you take time now to check them. You work for an hour and then chat with friends online. Throughout the day, you only put in five hours of work, however, you are being paid for eight hours. A co-worker questions you about your bad habits and you might say, “So what! Everyone in the office is doing it.” Now, look at it from the point of the owner of the business. How would you feel? You are paying people to work, and they aren’t working. What would you say? What would you do? These are ethical issues people face every day. Ethical and moral issues not just in the computer world but for everyday living on and off the computer! Learning Outcomes 1 Understand the ethical issues of computing at work, school, government, home, and in social interaction. 2 Understand the legal issues when using computers. 3 Consider options to protect identity online. 4 Use safe practices when online. 5 Understand personal responsibilities. 6 Understand global responsibilities 1: Understand the ethical issues of computing at work, school, government, home, and in social interaction. The information age we live in raises all sorts of questions. What can you do on a company’s computer while at work? Are making copies of music, software, or movie 2 DVDs legal? What about school assignments? If someone has posted his or her ideas on the Internet, does that mean you can use that information any way you want? Some questions raised in the computer age are an issue of ethics, while others are an issue of law. Ethics is defined in the dictionary as “a standard of right and wrong; a system of conduct or behavior, moral principles” (Geddes & Grosset, 2002).It is vital that you understand both the law and the ethical standards relating to computer use, because not understanding them can get you in trouble. Take a look at scenario 1: Two friends go to a music store and they both find a CD they really like. They decide that to save money, they will split the cost of buying the CD and then just make a copy so they can both have one. What do you think is wrong here? Having trouble deciding? You are not alone! The right decision would be to save your money so both of you could buy your own CD. Take a look at scenario 2: Rob Pegoraro wrote an article called “Sound Ethics: What to Do with Music CDs after Ripping Them?” Sound Ethics: What To Do With Music CDs After Ripping Them? http://voices.washingtonpost.com/fasterforward/2009/03/sound_ethics_what_to_do_with_m.html ***NOTE: Ms. Revoir has edited this article to fit the subject of this lesson. At a gathering of friends Saturday night, the host made an unusual request: If anybody wants to expand their music collection, take a look at the CDs here -- I've copied them all to my computer, and whatever you don't take is going to Goodwill on Monday. Something like 200 discs were piled up in corners of the host's den, and one or two of the guests started inspecting those stacks to see if they could unearth any keepers. I held back, mainly because with more than enough CDs at home already I didn't feel like spending half an hour pawing through somebody else's collection when I could catch up with friends instead. But there was also this: Since my friend hadn't mentioned anything about deleting his digital copies of any albums I might walk off with, I'd be taking a non-trivial amount of music without paying for it. (Note: I'm going to leave his name out of this. But he does write a blog of his own, so I will understand if he argues his case there.) 3 As I was mulling over that thought, one of the other guests chimed in, saying he'd done almost the same thing -- except instead of donating his CDs to charity, he'd sold most of them on eBay. Question: What would you do -- or what have you already done -- in this situation? As you can see, even adults have trouble making the right decisions! The right decision for the adults would be to destroy the CDs that are no longer being used. Let’s look at scenario 3: A busy college student gets behind in her studies. She is working part time and simply does not have time to write an English paper that is due the next day. As she is looking online, she finds an article that goes right along with the topic her professor assigned. She is able to save hours by simply copying the information and using it word for word in her paper. She submits the paper without giving credit to the original author. These three scenarios are examples of either breaking the law or displaying low ethical standards, the consequences of which can be serious. Advances in technology force society to consider new legal and ethical questions. 2: Understand the legal issues when using computers. Copyright Laws The US Constitution grants Congress the power to enact laws that protect the rights of inventors, musicians, authors, scientists, and so forth. Congress first used this power in 1790 when it passed the first copyright laws designed to protect the rights of those who wrote books and created maps. The two sets of laws that are the most applicable to us today are the Copyright Act of 1976 and the Digital Millennium Copyright Act of 1998. 4 The Copyright Act of 1976 The Copyright Act of 1976 is a law that protects the intellectual property of others from being used without permission. Intellectual property is defined as any creative work that a person develops. It could be the written word, as in a book or magazine article; it can be visual, as in photographs, paintings, drawings, and sketches; it can be music, as in CDs and sheet music; or it can be a combination of these, as in movies and plays. When you buy a book, CD, or DVD there is usually a notice on it that looks like the one in the picture on the right: Notice the statement “all rights reserved.” This means the owner of the copyright has the following rights: 1. the right to reproduce the work 2. the right to create derivative works based on an original work 3. the right to distribute (sell, rent, or lease) copies of the work to the public 4. the right to perform the work publicly 5. the right to display the work publicly 6. the right to broadcast the work publicly Think about the scenario where two friends buy one CD and make a copy to save some money. If you look at the first item in the list, under copyright law you will notice that copying a CD is illegal. If a high school wanted to put on a play but not pay the royalty fees, could they just change the script a little and call it their own work? What if they do not pay the royalty fees and put the play on for free? Both could be considered illegal. As you can see from the list above, copyright laws can be violated even if money is not involved. Why is this important today? Imagine for a moment that you are an aspiring author. You make many sacrifices, researching and working for years on your first book until it’s finished. The publisher raves about how great it is and how many copies you will sell. You think you are going to be rich. However, before it is even on sale, a copy of your book gets stolen and another company prints it and begins selling it. Now all the money 5 you were going to bring in is going to someone else who did not even work for it! Would you be motivated to write another book? Probably not! One purpose of copyright laws is to help give motivation and financial incentives for people to create music, books, plays, paintings, and so forth. Knowing their creations will be protected reassures authors and inventors that they will be given credit for their hard work. Digital Millennium Copyright Act of 1998 New technologies brought with them new questions about copyright. As music began to be shared over the Internet, a company called Napster was created to allow users to upload and download their favorite music files for free. The artists who created the songs did not receive compensation for their work and it became clear that these new questions needed to be resolved. But since the Copyright Act of 1976 did not cover music shared over the Internet, Napster and businesses like it were not technically violating any copyright laws, so they quickly became popular. At the same time, two new problems caught the attention of the Motion Picture Association of America (MPAA). While screening first-run movies, unethical people would secretly record the movie. These illegally made copies were then placed on the Internet for anyone to download and watch free of charge. The other problem the MPAA detected was that encryption codes on commercially distributed DVDs had been cracked. Encryption codes are small software programs at the beginning of music CDs and movie DVDs that prevent people from copying the media. Encryption did not work because people were able to create software programs to crack and disable the encryption codes. Finally, computer software companies, such as Microsoft, noticed that their software CDs were being copied and distributed without permission or payment. Because the Copyright Act of 1976 did not include these issues, they had no way to protect their products legally or to take offenders to court for stealing their products. This free flow of traditionally copyrighted materials cost software companies, artists, and producers millions of dollars. Questions were raised: Who owned the work put out on the Internet? Was anyone in violation of copyright laws? If so, was it the person who uploaded the file, the person or company who stored the file, or the person who downloaded the file? Did the Copyright Act even apply to intellectual property placed on the Internet? 6 Companies needed the law to be changed in order to continue making a profit from their copyrighted material, so they worked to help lawmakers create what became the Digital Millennium Copyright Act. This law defines more clearly that the rights of copyright holders extend to the Internet. It also put in place stiff penalties for violations of these laws. For example, downloading copyrighted material from peer-to-peer networks can now result in fines ranging from $30,000 to $150,000. (Copyright.gov) The Digital Millennium Copyright Act also made it illegal to bypass encryption codes and to distribute software designed to crack security codes on CDs, DVDs, and software. As a result of the new law, the courts ordered Napster to remove all copyrighted songs in their databases. Since then, Napster (now part of Rhapsody), Pandora, and other businesses like it can only distribute media over the Internet for a fee. This fee is then paid to the recording artists. The Fair Use Act “I have a dream that one day this nation will rise up and live out the true meaning of its creed: “We hold these truths to be self-evident: that all men are created equal”” (King, 1963) Great men and women say many profound things. How sad it would be if we only heard great things once. As you write research papers and speeches, quoting someone as powerful as Dr. King can add substance and interest to your work. The Fair Use Act is a law that allows people to use small portions of someone else’s work for the purposes of “criticism, comment, news reporting, teaching, scholarship, and research” (Copyright.gov, 2015.) Teachers and students frequently apply the Fair Use Act when reproducing a small part of a work to illustrate a lesson or assignment. This use is not an infringement of copyright as long as the quote or idea is appropriately cited. The doctrine of fair use applies if the material quoted is being used for nonprofit purposes and if only a small portion of the work is used. Additionally, the use of the material cannot affect the ability of the copyright owner to market the material. 7 Not all intellectual property has a copyright on it. In some cases, individuals and businesses choose to allow more access to their materials than traditional copyrights would allow. These different options are discussed below. Freeware Freeware is classified as software that is distributed for free and can be used as long as you want. However, there are some limitations about how freeware can be used, which vary from program to program. Some popular examples of freeware include Mozilla Firefox, iTunes, and Windows Live Messenger. Shareware Unlike freeware, shareware is only temporarily free. A creator of shareware will allow you to use the software free of charge for a trial period, such as thirty days. After the trial period, you are asked to pay for the software if you want to keep using it. Most shareware will stop working after the trial period. This is done to encourage you to buy the software. Many computer games are offered in shareware versions so you can try them out before buying them. Public Domain Intellectual property that is not protected by copyright law is considered to be “in the public domain,” which means that anyone may use it. Copyright law only protects works for seventy years after the death of their creator, so work that was done before 1945 is now available to anyone. More recent work also enters public domain if it is published by the US government or if the creator cannot prove that he or she created the material and when it was created. You must always give credit to the sources of works you use, even if the work is in the public domain. Open Source When Microsoft created their Windows operating system, there were no programs like Word, Halo, Photoshop (apps), etc. available to run on Windows. Microsoft had to publish some of its operating system code as an open source. This allowed collaborating groups (other companies) to use that source code to develop application software to run on Windows. This is still how other companies develop computer games that run in Windows. The common definition is that it is code shared for the purpose of collaborating on software projects. This idea has now expanded to sites like Wikipedia that are the result of many people contributing information to a single project. 8 Employee Productivity As helpful as computers and technology may be, they also bring with them some serious challenges for businesses. For example, increased access to the Internet and all of the diversions it offers has hurt the productivity of some businesses. Work productivity decreases during big events, such as the Olympics, Christmastime, the presidential election, the Super Bowl, and so on because workers easily get distracted and surf the Internet. Remember the story at the beginning of this lesson about you spending your work time playing on the Internet? Unfortunately, that scenario has become very common in the work place. At Christmastime, employees spend a lot of time shopping for Christmas gifts online; just before Valentine’s Day, employees often order candy and flowers from their computers at work; and during the Super Bowl, employee productivity drops to an all-time low as seen in the headlines below. All this adds up to lost productivity, or in other words, lost money for a company. “How much productivity is really lost the Monday after Super Bowl? By Megan Ribbens, February 4, 2013 http://www.bizjournals.com/orlando/morning_call/2013/02/how-much-productivity-is-reallylost.html The Monday after Super Bowl Sunday typically is highlighted by a lack of productivity in the workplace. According to statistics from outplacement firm Challenger, Gray & Christmas, employers lose $820 million to $850 million in lost productivity, and Harris Interactive reports that about 1.5 million people call in sick and about 4.4 million will be late to work the day after the Super Bowl. Businesses even lose up to $1.1 billion per week due to fantasy football, AOL Jobs reports. 9 It may sound like a lot, but according to AOL Jobs, employers lose more money per year when workers go to the bathroom, eat lunch out of the office or just spend time talking about their weekend. Here’s the breakdown from AOL Jobs: Employees who go to the bathroom cost an estimated $180 billion a year in lost productivity. The employer is not begrudging that you take bathroom breaks. But many people don’t go right back to work. Instead, they swing by a friends desk and chat for a while or they go online and shop, check sports scores, pay their personal bills electronically, and read and answer personal email. Some even spend time chatting with family and friends on their work computer. Employees who eat lunch out of the office cost $500 billion in lost productivity per year. Yes, you are given lunch breaks but many who leave the office for lunch leave early and return late. When they return they check email, stocks, eBay, etc. Employees who talk about their weekends cost $12 billion in lost productivity. Just look at the lost “productivity” here in our classroom because of all the socializing that’s going on! Company Resources Resources are the consumable goods that a company needs to function, such as paper, printer toner (ink), copy machine paper, copier ink, paper clips, pencils, and tape. These are just a few of the resources lost each year as a result of employee theft. Stolen pencils might not seem like a serious problem, but let’s say that your company has fifty employees. Each week forty employees take a pencil home. Some employees take the pencil because they think the company owes it to them. Some employees take the pencil home by mistake. At any rate, forty pencils go missing each week. Over the course of a year this begins to add up: 10 40 pencils × 52 weeks = 2,080 pencils per year That’s a lot of pencils! Now add a similar loss of paper, toner, photocopies, paper clips, sticky notes, and so on and very soon the dollar amount lost is staggering. Also remember that company resources include the computer systems, like e-mail and Internet access. Surfing the Internet for pornography, online gambling, online games, chatting, and online dating during company time takes an employee away from his or her work and can tie up the company’s resources and prevent others from being able to complete their work. Piracy Piracy is the unauthorized and illegal reproduction, sale, and distribution of any copyrighted work. In some cases, a company could be held legally responsible if one of its employees used company resources for piracy. Hacking Hacking is breaking into another person’s or another company’s computer system. In the world today, ideas and information can mean big money. If an unethical employee steals those ideas or information, the company can suffer financially. Each year a news story appears where a student hacked into a university’s computer system to change his or her grades. This is illegal! Consequences range from getting kicked out of school (expelled) to going to jail and paying restitution (money). Acceptable Use Policies As a good student, employee, and citizen, you will be expected to maintain a high code of ethics as you use technology. Remember that ethics are defined as “a standard of right and wrong; a system 11 of conduct or behavior, also referred to as moral principles.” Schools and companies almost always set the ethical standards and policies for their organization by creating some form of an Acceptable Use Policy (AUP). In most places that you work or before you are given access to any kind of computer system, you are required to sign an AUP. This policy is a guideline or code of conduct for students or employees. Simply stated, the policy is a list of rules of what you can and cannot do with school or company resources. Although your teacher may not have called it an acceptable use policy, you have probably seen one. Teachers often present a disclosure document or a syllabus at the beginning of class each semester which details the rules and the grading methods for the course. This is one form of an AUP. This sample AUP shows my rules for computer use in my classroom. No pornography. No gambling. No online shopping, selling, trading, or dating. No Internet surfing unless it is part of a specific learning assignment. No music or music videos at any time. No games unless they are part of a specific learning assignment such as learning to create software called programming. No personal e-mail such as Yahoo, Hotmail, AOL mail, etc. Although each organization has its own specific set of standards and policies, there are usually some common elements to an AUP. 1. a general statement about the purpose of providing access to the computer network or to the Internet 2. a statement about etiquette (called netiquette) on the Internet and e-mail; policies about being courteous in communications, avoiding illegal online activities, not using the system for personal activities, and so forth 3. a section that emphasizes the importance of not violating copyright law 4. a statement about the consequences of violating the AUP; depending on the organization, consequences may range from suspension of computer privileges to expulsion from school or being fired from a job The AUP protects the student or employee and also the school or company. One way it does this is by making the rules clear and fair for everyone. 12 Some companies do not mind if employees use their computers for personal use, and in other companies it is a serious offense. One role of an AUP is to clearly state what can and cannot be done with company resources. This helps students and employees because they are not left wondering what is and is not allowed. Privacy How does the amendment above apply today? Could a company that tracks your shopping habits be violating your rights? How do privacy rights apply at school and work? When discussing privacy, we are actually talking about two issues; privacy at home, and privacy at work and school. Privacy at Home You have the right to keep certain types of personal information about yourself private. One example is your finances. When you go to your family doctor, you do not want him to know exactly how much money you have in your bank account before he will treat you. What if you do not have enough money to pay for his services at the moment? But you are ill and you need him now! When you apply for a job, you may not want your future employer to know that you race motorcycles on weekends. What if your future employer thinks this activity will cause injuries that will prevent you from coming to work and therefore does not hire you? This type of personal information is protected by law and you are not required to reveal it. But not all information about you is protected. When you shop online at Walmart for example, Target may end up knowing what you bought. Every day, data is collected about our surfing habits, shopping habits, eating habits, and so forth. Most of this data is collected without our knowledge. This is called consumer profiling. There is nothing you 13 can do legally to stop people from collecting this type of information about you. Their right to collect data is protected under the First Amendment. Privacy at Work and School Suppose it is after work hours and you decide to stay late and surf the Internet, maybe do a little shopping, put something up for sale on eBay, chat with friends, and check an online dating website. Your company’s AUP states that doing this is against policy, but it’s after hours, and you figure no one will know. The next day you are called into your boss’s office and given a warning. How did your boss know, and isn’t this a violation of your privacy since it was after hours? On your own computer at home, you can do those types of things, but it is a different story at work. As discussed above, the loss of productivity due to employees using the Internet for personal reasons is staggering and costly. Schools and businesses could also face legal action if you get into pornography or commit a crime using company or school resources. “That’s not fair,” you say. You don’t get into any of those things. The AUP makes the rules fair for everyone by insisting that everyone follows the rules. And since the computer equipment is owned by the company, the company has the right to set the rules. The employees don’t! Monitoring The Bill of Rights does not prevent an employer from keeping tabs on what employees are up to. Employers can monitor telephone calls, e-mail usage (both company e-mail and private e-mail if you access your private email using company equipment), what is on your computer screen, and the documents you create. Deleting your personal emails, phone messages, or Internet history does not always mean they are not available to your employer or school administrator. Employers can monitor employees through electronic devices, cameras, and sound equipment. They are also able to restore deleted items if they need to and use network services to trace where you have been online. Being monitored helps employees and students stay on task. Remember that whether you are at school or work, almost nothing is private! 14 Cookies One way information is gathered about you is through something called cookies. This is a small software program that is installed on your computer through the Internet. Most of the time, you do not even know that it is there. It sits quietly working, tracking your every move. Data is gathered about where you work, how much you earn, traffic tickets you receive, your education, insurance, property ownership, medical and hospital information, where you bank, your family history, your favorite hobby or sport, and so much more. This data is then sold to others who use it to send you junk mail, increase the number of pop-ups you see when browsing the Internet, or send you to web pages you really did not want to go to. Whether or not this is legal depends on the types of information being gathered and also the reasons, or intentions, for which it will be used. It is quite possible to have hundreds of cookies on your computer. One or more from every website you have visited. Intent The question of whether or not collecting data is legal comes down to intent. How will your personal data be used? If the intent is to try to sell you something, or to sell your information to someone else, then collecting your personal data is legal. However, if the intent of data collection is to steal your identity or some other malicious intent, then personal data collection is illegal. 3: Consider options to protect identity online. You are identified not only by your first, middle, and last name, but also by your social security number. This is a number that was assigned to you shortly after your birth. Your social security number is very valuable and should be protected. Do not give your social security number to just anyone. If someone asks you for your social security number, talk to your parents and let them help you make the decision about giving your number out. There are a number of ways your identity can be stolen. By stealing your bank account or credit card numbers, people can spend money in your name and leave you to pay the 15 bills. Information about you can be found on bank statements, credit card applications, medical bills, and other mail that has been sent to you. An additional danger comes in the form of “free” offers. These often appear in small windows known as pop-ups. These free offers promise everything from ringtones to a trip on a cruise ship but require you to buy several other products to receive your “free” gift. Even when you buy these other products, companies often make it difficult to claim your prize. The danger here comes when they are not interested in the money from having you buy their products, but they really just want your personal information. This is a perfect setup to take your personal information since in a business transaction, you are often asked to reveal personal information such as your name, address, phone number, and credit card number. Remember, do your online shopping only on secure websites. What steps can you take to prevent identity theft? 1. Guard your personal information such as your social security number and medical insurance information. Keep cards with these numbers on them in a safe place. 2. Before throwing away documents with your personal information on them, use a paper shredder to shred the documents. 3. Use passwords on all your accounts, including your credit card accounts, and your bank and phone accounts. Experts advise that to be truly secure, a password should be unpredictable and never written down. For computer passwords, many recommend a minimum of eight characters, with at least one capital letter, one number, and one symbol. 4. Memorize your computer logins and do not share them with others. 5. Memorize your PINs and passwords to bank accounts and ATM machines. Do not carry them in your purse or wallet. 6. When shopping online, use a secure website. As you are submitting your purchase information, look for a lock icon on the browser’s status bar to ensure the information you provide is secure during transmission. This is a computer industry standard indicating the website is a secure site for using your credit card. If you do not see the lock, check the URL box. If the address begins with https://, it is a secure website. The ‘s’ in the http indicates that your information will be encrypted before sending it on the Internet. Remember, the encryption means that the information is broken up and coded before sending. Anyone 16 intercepting the packet of information will not be able to read the coded information. Only the authorized receiving computer can remove the encryption and put the information together into readable form again. 7. Avoid scams where you receive unsolicited e-mail asking for your personal information. This is known as phishing. There are many websites with excellent information on how to prevent identity theft. I have given you the URLs for some that I think are very good. However, no one is 100 percent safe these days. Learn what to watch for and stay vigilant! And remember, websites move or are removed from the Internet. So if these links do not work, use your search skills to find other articles. How to Prevent Identity Theft http://creditidentitysafe.com/identity-theft-prevention How to Prevent Identity Theft http://www.wikihow.com/Prevent-Identity-Theft Steps to Prevent Identity Theft, and What to Do If It Happens http://www.nytimes.com/2009/05/02/your-money/identitytheft/02idtheftprimer.html?pagewanted=all&_r=0 How to Prevent Identity Theft http://www.cbsnews.com/news/how-to-prevent-identity-theft/ Stranger accesses home computer, spies on Utah County family October 27, 2014 ©KSL ELK RIDGE, Utah County—If you have a computer with a camera on it, it could happen to you. Before you know what’s going on, a stranger is peering inside your home. 17 It happened to Jennifer Bylund, a mother of two who lives in Elk Ridge. With a sparse population and wide open spaces, it’s not exactly a crime-ridden community. But Bylund discovered criminals don’t always knock down doors to infiltrate our lives. “I didn’t know he could get in that easily. It’s scary,” she said. As she sat in front of her computer monitor, with her children nearby, she watched in horror as a stranger turned on the camera and spied on her from her computer. “He saw my kids, he saw my home,” she said. “Yeah, I was shocked, I was shocked that somebody could actually do that.” “It’s a blatant invasion of privacy is what that is. They’re looking into your home,” said FBI special agent James Lamadrid. The FBI says there are thousands of similar complaints across the country. “It’s very simple, it’s very straightforward; they want your money,” he said. Bylund was victimized by a tech support scam. She’d responded to a pop-up ad that warned about problems with her computer. “Because I was paying my bills, it made me worried, so I gave them a call,” she told KSL Investigator Debbie Dujanovic. Besides sending phony pop-ups, scammers call potential victims and pretend they’ve detected suspicious activity that must be addressed immediately. Concerned computer owners then often grant a scammer remote access to their computer, believing there is a problem that needs to be fixed. “I allowed him to get on. All he needed was my email address, my birthday and my first and last name,” said Bylund. As victims watch the monitor, the FBI says scammers remotely access the computer and may do things that convince the victim there’s a problem. 18 “They change the font from white to red, which is very simple to do, and everyone thinks red is bad so when you get that on a computer you think, ‘Oh my goodness, something is wrong with my laptop,’” Lamadrid said. The scammer will turn on the camera as a way to scare a victim to purchase bogus security software. Bylund didn’t fall for it, and after the man asked her for her credit card number to cover his $200 repair fee, she hung up. But by then the scammer had full access to her computer, including personal information, family photos, and the camera that was still on. She turned off the computer and took it to a real computer expert to make sure it was safe to turn back on. She doesn’t know whether the scammer downloaded her personal information for later use, but she does have her family’s privacy back. “What world do we live in where people can actually look into our houses and see our families without our permission. It’s really sad,” she said. Contacted by computer? File a complaint at IC3.gov. Contacted by phone? File a complaint at FTC.gov. Protecting your family Don’t click on suspicious links. This could download malware or lead to phony pop-up warnings of suspicious activity. Don’t share personal information, passwords or grant remote access to someone who contacts you out of the blue. If you’re concerned about someone gaining remote access to the camera on your computer, place a sticky note over the lens. Keep anti-virus software updated. Scan your computer for viruses. 19 4: Use safe practices when online. So far, you have learned about the different ways that harm can come to your documents and your hardware through the sharing of files, e-mail, and various resources on the Internet. You learned that your computer hardware and software are not safe unless you take steps to protect them. What about your own personal safety? The Internet was designed to allow for free exchange of information and ideas. Along with this free exchange of information and ideas there are safety issues that you must be aware of when using the Internet. Children The Internet is a great place if used wisely. Unfortunately, there is also much that is harmful to children and people in general. A great website for kids to learn how to stay safe is www.netsmartzkids.org. Shopping When shopping online, look for the padlock. This represents a secure web site and it is safe to enter your credit card information. Also, look for the https://. The s in the URL means that the web site has taken measures to encrypt your information to keep it safe from theft. E-mail Don’t share your e-mail with just anyone! Companies collect and sell e-mail addresses to other companies for the purpose of sending spam. Also, it is not wise to share your email address with people you have met online through chat or games. People you meet online may not be who they say they are. Finally, if you receive an inappropriate email from anyone, please let your parents know. Cyber bullying is becoming a big issue for people. If you are being bullied, don’t suffer in silence! Tell someone, tell a trusted adult such as a parent, a teacher, a school counselor, etc. Check out these websites for more information: 20 The FTC, or Federal Trade Commission, is a government website with great information: http://www.consumer.ftc.gov/articles/0346-tech-support-scams A couple of years ago, I received a phone call from someone claiming to be from Microsoft. He said I had a serious issue with my computer and he was calling to fix it. It turned out that he planted something on my computer that stole my personal information. Here is information on what to do if someone calls you claiming to be from a ligitmate business like Microsoft or eBay or Amazon, etc.: http://blogs.microsoft.com/cybertrust/2014/02/19/5-things-youneed-to-know-about-tech-support-scams/ Chat Rooms In chat rooms, messages are keyed in using the keyboard in real time. This means that you are talking to someone who is on the Internet at the same time you are. Some chat rooms may show information about a person, or a profile of each person, currently in the chat room with you. But profiles can be falsified. Do not assume that what you see and read in someone’s profile is true. The person may tell you he or she is sixteen years old when he or she may actually be sixty-six years old. If you chat with someone you met online, do not assume they are telling you the truth. A chat room is a perfect place to exaggerate or to be someone else for a while. Anyone can fake it in a chat room. Along with being wary of talking with unknown people, be aware that some people hang out in chat rooms, but rarely join the conversation. These people can read what is written and may be looking for opportunities to take advantage of you. But there are ways to safeguard yourself. One important thing to remember is to never tell people your personal information (address, phone number, last name, school you attend, school mascot, part of the country or state you live in, etc.). Be cautious of those attempting to get such information from you. Another way to remain anonymous is by choosing a chat name that does not reveal too much. When selecting a name, think about what your login name says about you. For example, “Tinkerbell 16” could tell a criminal that you are a girl and that you are probably a teenager. Protect yourself by knowing your friends’ usernames and stick to chatting with them. 21 Anytime you are having a conversation that makes you feel uncomfortable, leave the conversation. And do not hesitate to involve adults for help, like a parent or a teacher. It is much safer to set up a private room where you invite only your friends. Always check the username before inviting that person in. When in doubt, refuse entry to the person. Proper netiquette rules apply in all chat rooms. Netiquette is a combination of net (meaning Internet) and etiquette (meaning proper behavior). Be courteous; watch your language and the tone of voice in your writing. Sarcasm is particularly hard to recognize online, so be careful not to write something sarcastically if you think it might be taken seriously. Most importantly, do not write anything that is offensive or degrading. Online Dating Like chat rooms, online dating services can also be very dangerous because it is easy for people to exaggerate the truth or mislead and take advantage of others. Generally, these sites only allow people who are over the age of eighteen to join. Never agree to meet someone alone whom you have only met online and make certain your parents or guardians know about any relationships that develops online. Gambling The Internet has made it so people can bet on just about anything and everything, from cockroach races to whether your first baby will be a boy or a girl. Many states have outlawed any sort of gambling, including online gambling, altogether. In states where gambling is legal, most have made it illegal for anyone under eighteen years old. All too often, people who do gamble become addicted, and the effects can be devastating. I watched a very close family member get drawn into a gambling addiction over several years that eventually became one cause of his divorce. He reached a point where he could not think clearly and chose gambling over providing food for his family. Unfortunately, it was common for him to drop $1,000 on gambling while his wife and children were going without food, warm clothing, or a working car. A study published in Psychology of Addictive Behaviors reports that people who use the Internet to gamble are more likely to have “problematic” or “pathological” gambling problems compared to those who gamble in casinos (Ladd & Petry, 2002). 22 Pornography While the Internet has made available all sorts of great information, it has also brought some harmful things as well. Unfortunately, pornography has become a very real danger on the Internet. Viewing pornography will lead to horrible consequences. A few years ago, I worked with a young man who had a wife and two very young children at home. He used company equipment to download pornographic material. His work suffered, his attitude toward his coworkers changed, and his overall attitude toward life changed, making him a difficult person to work with. After several warnings and being sent to counseling, he would not quit viewing pornography. He ended up being fired. Like gambling, pornography can become an addiction. This addiction can destroy careers, families, and self-esteem. Addictions can be overcome, but it may take years of hard work and at great cost. The Child Pornography Prevention Act of 1996 has strict penalties for people who create, store, or distribute pornography that involves minors. Remember that a minor is anyone under the age of eighteen. Even if minors agree to being photographed or if the picture was taken by another minor, it is still a violation of the law. Forwarding obscene pictures or even having them on a computer or cellphone can also result in legal trouble. If a school finds out that some of its students are involved in pornography, those involved will likely face harsh penalties that may include suspension or expulsion. In addition, the problem is not just a school problem; the law requires that the school hand the students involved over to police. Although it is illegal to market pornographic materials to minors, these materials are so prevalent online that you will still need to take some steps to avoid them. The first and most important step is to involve your parents or guardians. They should know what sites you are visiting and what other people are sending to you. Most search engines have a preference setting which can be set to filter out a good portion of inappropriate materials. There are also online filtering programs available (click the link below for a free filtering program) that will block sites with improper content. If you receive inappropriate material through your e-mail or on a cellphone, you should immediately speak with a parent, guardian, or school official. http://www1.k9webprotection.com/ 23 5: Understand personal responsibilities So, just what is your personal responsibility? The online community created a new word for this called netiquette. At no point is it ever appropriate to spam, flame, cyberbully, libel, or slander another individual or company! Understand the vocabulary words below and don’t do them! Phishing Wikipedia.org says: “Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.” In other words, the e-mail or pop-up ad is asking for your information. A couple of years ago, a pop-up ad appeared on my students’ computers in my classroom. The ad said “Congratulations, you won!” When a student clicked on the button, a screen appeared that asked for his name, address, and phone number. He never received the prize that was offered in the ad. Since then, phishing scams have gotten more and more sophisticated. Always be extremely cautious about everything online. Spamming Spam is unsolicited and unwanted e-mail messages—lots and lots of junk e-mail. Chances are that you get spam in your e-mail all the time. Some spam can have filthy subject lines and messages. When you are on a network, your network administrator will filter most of the messages; however, some may still make it through to your Inbox. On your home computer, all you can do is click the spam or junk mail button to put the message into your Spam folder or you can delete message. Unfortunately, you still see the subject line before deleting and can be left with an ugly picture in your mind. You can also call your ISP and make a complaint. 24 If you do call your ISP, you will need to keep the offending e-mail message so you can forward it on to your ISP. Then you can permanently delete it. Flaming Wikipedia.org says: “Flaming is a hostile and insulting interaction between Internet users, often involving the use of profanity.” It is never appropriate to post insulting and abusive comments about others online! Cyberbullying The anonymity of cyberspace sometimes makes people say hateful or hurtful things that they normally would not say if the person were standing right in front of them. Cyberbullying happens when people gossip, pass rumors, threaten, or harass using technology. Through the use of computers, Internet, and cellphones, people sometimes forget that they are talking to or about real people with feelings. Cyberbullying is a huge issue facing schools today. All schools have a zero-tolerance policy regarding it. If you are being bullied by someone, be sure to keep the texts, e-mails, or messages and show them to an adult. Many times bullies are not punished because victims do not tell on them. You can stop being a victim. Tell someone! Many kids think making fun of others or passing rumors online is not a big deal. In some cases, this could be considered libel, which is against the law and can carry stiff penalties. If you are part of the problem, stop! Pretend that the person you are bullying is someone in your family. How would you feel if your little sister were the victim? Being a teenager is hard. Do not make it harder for someone else. Check out this video: Cyberbullying: You Can’t Take It Back https://www.youtube.com/watch?v=fLP3TIl_Hek 25 Check out NetSmartz Workshop http://www.netsmartz.org/resources/reallife.htm Cyberbullying is using a computer and the Internet to harass, threaten, embarrass, or humiliate another person. Most people are familiar with face-to-face bullying. At school or work, people can get away from bullies by going home. Not so easy now with cyberbullying. Every time someone turns on a computer and enters the Internet, there is the possibility of encountering a cyberbully. This is a growing problem nationwide. If you are being bullied, tell a parent! Tell a teacher! Tell a school administrator! Tell someone! You do not have to live with it! Check out the website below for more information on cyberbullying. http://teenadvice.about.com/od/schoolviolence/a/cyberbullying1.htm Libel Written words or images which degrade or injure another person’s reputation or good name are called libel. You may have heard it phrased as defamation of character. The law says that it must have been published, false, and injurious before you can sue another person. Slander Slander, on the other hand, is the oral or verbal defamation of someone’s reputation. Telling one or more people an untruth about another person is slander, and it is morally and legally wrong! 6: Understand global responsibilities Censorship Wikipedia.org says: “Censorship is the suppression of speech, public communication or other information which may be considered objectionable, harmful, sensitive, politically incorrect or inconvenient as determined by 26 governments, media outlets, authorities or other groups or institutions.” A couple of years ago, I went to China. Whenever something came on TV (we were watching CNN) that the government didn’t like, our TV screen in the hotel would go black. A few seconds later or when the story was over, the picture would appear again. This was censorship. Filtering Filtering is allowing in only information or websites that are needed for the job and excluding information and websites with questionable content. You may have experienced this at school. For example, YouTube and Facebook may be unavailable because your school district has filtered it out. Intellectual property Wikipedia.org says: “Intellectual property is a legal term that refers to creations of the mind. Examples of intellectual property include music, literature, and other artistic works; discoveries and inventions; and words, phrases, symbols, and designs. Under intellectual property laws, owners of intellectual property are granted certain exclusive rights. Some common types of intellectual property rights are copyright, patents, and industrial design rights; and the rights that protect trademarks, trade dress, and in some jurisdictions trade secrets.” Piracy The illegal copying and use of computer software and digital media such as music and movies is called piracy. According to the software license agreement, computer software developers give you the right to make a backup copy of the software CD in the event the original CD is damaged. Where people get into trouble is the illegal sharing of software, 27 games, music, and movies. Do not make a copy and loan or give it to your friends! If they like the game, music, or movie that much, they need to buy their own copies! Copyright Wikipedia.org says: “Copyright is a form of intellectual property and is the legal right created by law that grants the creator of an original work the exclusive rights to its use and distribution with the intention of enabling the creator to receive compensation for their intellectual effort.” For example: A photographer owns the intellectual property rights of the pictures he took, even if the pictures were of you. Licensing I purchased some computer software a few months ago. Before I broke the seal that kept the box closed, I noticed some writing that said, “By opening this product I was agreeing to the terms of the software license.” In other words, once the seal was broken I was under contract with the company to comply with their license agreement even if I had not read the license agreement. Most software license agreements will tell you that you can install the software on computers that you personally own. That means that you cannot install it on your friend’s computer even if you use his computer some of the time. Read the license agreement even if you don’t understand all of it now. Creative Commons Creative commons are additions to copyright licenses that provide rules for the public use of copyrighted intellectual property. It helps the copyrighted owner of the property maintain control of the property while giving others license to use and develop his or her own products. If you have been in a school play or performed in a school choir, you used material (script or sheet music) that allowed you or the director “creative commons” to modify your performance from the original. Ms. Revoir will show a video called CyberSafety by Films Media Group (19 minutes) sometime during this unit.