Digital Law
Too many times we see or read something from a students’ assignment and think something about it is “off.” And too many times the question posed to them, “Where did you get this information…” is quickly answered with one dangerous word-
“Google!”
Many students are desensitized from the fact that taking information from a source like Google is illegal because accessing and sharing information is so incredibly easy. It’s important to inform this generation and future generations about the legal ramifications of technology use.
How Can We help?
Ribble best notes that we “must carefully explain to our students that, although the internet is a good source of information, material should not be taken without citing the source” (2015). Not only do we need to understand and abide to what’s lawful, we need to educate our youth of whats legal and illegal. We must also emphasize that we have digital footprints that could define our future (Ribble, 2015).
Ribble best notes that we “must carefully explain to our students that, although the internet is a good source of information, material should not be taken without citing the source” (2015). Not only do we need to understand and abide to what’s lawful, we need to educate our youth of whats legal and illegal. We must also emphasize that we have digital footprints that could define our future (Ribble, 2015).
Other Digital
|
Essential Questions
(Ribble, 2015, p.42). |
Digital Law Keywords
(Ribble, 2015, p.44). |
Know your Digital Rights and Restrictions
There are many regulations and policies when it comes to file sharing sites, pirating software, subverting DRM technologies, hacking, identify theft, and more. One of the most informative sites on these issues and other digital laws comes from the United States Department of Justice. They have an organized division called the Computer Crime and Intellectual Property Section, which is also known as the CCIPS. Its website reveals that:
"CCIPS is responsible for implementing the Department's national strategies in combating computer and intellectual property crimes worldwide. CCIPS prevents, investigates, and prosecutes computer crimes by working with other government agencies, the private sector, academic institutions, and foreign counterparts. Section attorneys work to improve the domestic and international infrastructure-legal, technological, and operational-to pursue network criminals most effectively. The Section's enforcement responsibilities against intellectual property crimes are similarly multi-faceted. Intellectual Property (IP) has become one of the principal U.S. economic engines, and the nation is a target of choice for thieves of material protected by copyright, trademark, or trade-secret designation. In pursuing all these goals, CCIPS attorneys regularly run complex investigations, resolve unique legal and investigative issues raised by emerging computer and telecommunications technologies; litigate cases; provide litigation support to other prosecutors; train federal, state, and local law enforcement personnel; comment on and propose legislation; and initiate and participate in international efforts to combat computer and intellectual property crime” (The United States Department of Justice, 2016).
Learn more at: The United States Department of Justice- CCIPS Documents and Reports
Learn more at: The United States Department of Justice- CCIPS Documents and Reports
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Technology DONTs in Education
1. Sending or displaying offensive messages or pictures;
2. Using obscene language and/or accessing material or visual depictions that are obscene as defined in section 1460 of Title 18, United States Code; 3. Using or accessing material or visual depictions that are child pornography, as defined in section 2256 of Title 18, United States Code; 4. Using or accessing material or visual depictions that are harmful to minors including any pictures, images, graphic image files or other material or visual depictions that taken as a whole and with respect to minors, appeals to a prurient interest in nudity, sex, or excretion; 5. Depicting, describing, or representing in a patently offensive way, with respect to what is suitable for minors, sexual acts or conduct; or taken as a whole, lacks serious literary, artistic, political, or scientific value as to minors; 6. Cyberbullying; 7. Inappropriate online behavior, including inappropriate interaction with other individuals on social networking sites and in chat rooms; 8. Harassing, insulting, or attacking others; 9. Damaging computers, computer systems, or computer networks/computers; 10. Violating copyright laws; 11. Using another’s password; 12. Trespassing in another’s folders, work or files; 13. Intentionally wasting limited resources; 14. Employing the computer networks/computers for commercial purposes; and/or 15. Engaging in other activities that do not advance the educational purposes for which computer networks/computers are provided. (Voorhees Township Board of Education, 2016).. |
Technology DOs in Education 1. Use that encourages efficient, cooperative and creative methods to perform educational tasks
2. Use in support of research and education; 3. To provide unique resources to and collaborative projects with educational partners; 4. Users are responsible for the activity recorded to their network accounts and are responsible for notifying staff when they believe a breach of security has occurred; 5. Your right to free speech applies to your communication on the Internet. 6. The District Network and all related resources are considered a limited forum, similar to the school newspaper, and therefore the district may lawfully restrict your speech for valid educational reasons (Voorhees Township Board of Education, 2016).. |
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Public Service Announcement
This public service announcement addresses Voorhees' lawful Acceptable Use Policy and Regulations, which can also relate to general rules of being a digital citizen.