11
Teaching and Computers. Computer Trespassing. Lorraine Hopping and Craig Dickinson. February 1985. Adapted by Kim Bigelow 2003

Teaching and Computers. Computer Trespassing. Lorraine Hopping and Craig Dickinson. February 1985. Adapted by Kim Bigelow 2003

Embed Size (px)

Citation preview

Page 1: Teaching and Computers. Computer Trespassing. Lorraine Hopping and Craig Dickinson. February 1985. Adapted by Kim Bigelow 2003

Teaching and Computers. Computer Trespassing. Lorraine Hopping and Craig Dickinson. February 1985. Adapted by Kim Bigelow 2003

Page 2: Teaching and Computers. Computer Trespassing. Lorraine Hopping and Craig Dickinson. February 1985. Adapted by Kim Bigelow 2003

Proposed Computer Break-In Rule

Anyone who is caught using a computer, either at home or at school, to access school computer files without permission must report to the principal. The principal will notify the parents and hold a hearing. Students judged guilty of illegal access could receive the following punishments:

1. If the offender enters school computer files but does not alter the contents, he or she could be suspended for three to five days.

2. If the offender changes, damages, or erases information in school computer files, he or she could be expelled.

3. If the offender steals money or goods from school accounts, he or she could be expelled and ordered to repay all damages or losses.

4. Anyone who commits any of the above crimes may also be reported to the local police department, which may bring legal charges against him or her.

Page 3: Teaching and Computers. Computer Trespassing. Lorraine Hopping and Craig Dickinson. February 1985. Adapted by Kim Bigelow 2003

Hypothetical Cases:

What would be the most severe punishment?

1. A sixth grader stole the password for the school computer from a teacher’s desk. She accessed the computer and destroyed many of the files, including all the grades for the fifth grade. (She could be expelled under item 2 of the rules)

2. A third grader tried to break into the school computer “just for fun.” He did not succeed. (He could not be punished under the rules)

3. A fifth grader used his home computer to access the school computer files. He didn’t change any information, but he saw who failed the last math test. Later, he made fun of those students who failed. (He could be suspended for three to five days under rule 1)

4. A seventh grader was given the task of entering paren’ts addresses into the school computer. Having finished the job early, she use the computer to look at other school records, including teachers’ salaries and students’ discipline records. (She could not be punished under the rule. It only covers access without permission to school computers)

Page 4: Teaching and Computers. Computer Trespassing. Lorraine Hopping and Craig Dickinson. February 1985. Adapted by Kim Bigelow 2003

5. A fourth grader used her home computer to break into the school’s supply files. She ordered a tape recorder to be sent to her home and charged it to the school. (She could be expelled under rule 3 and would have to pay for the tape recorder.)

6. An eight grader was asked by his teacher to enter some programs he wrote into a computer file so that other teachers could use them. In doing so, he accidentally destroyed other programs that were in the file. (He could not be punished because he had permission to access the school computers)

7. A fifth grader went into the computer lab at recess and made copies of some of the software programs to use at home. The programs were copyrighted (meaning they could not be copied legally). (She could not be punished under the rules. Had she destroyed or changed the programs, she could have been expelled under rule 2. Had the programs contained private information such as a record of students’ grades, she could have been suspended under rule 1.)

Page 5: Teaching and Computers. Computer Trespassing. Lorraine Hopping and Craig Dickinson. February 1985. Adapted by Kim Bigelow 2003

YOU MAKE THE RULES!

• Right now there are no rules for computer trespassing. You have to do what you feel is right. Unfortunately, there are some people who do not always do the right thing.

• Help me make some rules that teachers and students must follow at school

• Read the rules and tell me if they should be cut, changed, or kept as is

• At the end write your own rule that you think we should have at the school.

Page 6: Teaching and Computers. Computer Trespassing. Lorraine Hopping and Craig Dickinson. February 1985. Adapted by Kim Bigelow 2003

1.

If the offender enters school computer files but does not alter the contents, he or she could be suspended for three to five days.

I think this rule should be (cut, changed, kept)

because

Page 7: Teaching and Computers. Computer Trespassing. Lorraine Hopping and Craig Dickinson. February 1985. Adapted by Kim Bigelow 2003

2.

If the offender changes, damages, or erases information in school computer files, he or she could be expelled.I think this rule should be (cut, changed, kept as is)

because:

Page 8: Teaching and Computers. Computer Trespassing. Lorraine Hopping and Craig Dickinson. February 1985. Adapted by Kim Bigelow 2003

3.

If the offender steals money or goods from school accounts, he or she could be expelled and ordered to repay all damages or losses.

I think this rule should be (cut, changed, kept as is)

because:

Page 9: Teaching and Computers. Computer Trespassing. Lorraine Hopping and Craig Dickinson. February 1985. Adapted by Kim Bigelow 2003

4.

Anyone who commits any of the above crimes may also be reported to the local police department, which may bring legal charges against him or her.

I think this rule should be (cut, changed, kept as is)

because:

Page 10: Teaching and Computers. Computer Trespassing. Lorraine Hopping and Craig Dickinson. February 1985. Adapted by Kim Bigelow 2003

My Own Rule:

Page 11: Teaching and Computers. Computer Trespassing. Lorraine Hopping and Craig Dickinson. February 1985. Adapted by Kim Bigelow 2003

By: ___________________