The Law
For IT use
IT rules
- These rules apply to all equipment. I know that these rules will apply to me at all times when I am using either provided ICT equipment in school or at home, or my own ICT equipment within school, such as computers, cameras, scanners, personal electronic devices including phones, software and networks.
- Take care when using equipment. I will take care when I am using all ICT equipment. I will not break or damage any ICT equipment and if I do break anything then I will report it straight away.
- Ask before using your own ICT equipment. I will not use my own ICT equipment unless I have been given permission by a member of staff. If I am allowed to use my own ICT equipment then I will obey any extra rules I will be given about how I can use it.
- Keep passwords safe. I will always log on using my own user-name and password. I will not tell my login details to anybody else. I know that I will be responsible for everything that is done using my login details. If I think that somebody else knows and has used my login details then I will report it straight away so that my login details can be changed.
- Nothing is secret. I realise that my use of both my own and provided ICT equipment will be monitored and that everything I do may be recorded. I agree that I have no right to privacy and I agree to being monitored and recorded at all times. I realise that the results of this monitoring may be shared with other people if I break any of the rules or if my actions are of a criminal nature.
- Keep personal information safe. I will not disclose any of my personal details to other people, or log any personal details on websites, while using ICT. (Personal details include telephone numbers, addresses and all types of personal financial information.) I agree that I will never pass on the personal details of another person without that person’s permission.
- Understanding copyright. If I am downloading music, video or images, I will check with staff that it is legal and copyright free. I understand that music and video files are often put on the Internet illegally and that by using those files I will be breaking the law.
- Educational uses only. My use of ICT equipment will only be for educational uses, although limited personal use is permitted provided that this is not done during normal working time and does not contravene any of the other rules in this document.
- No hacking. I will not try to access any websites, services, files or other resources that are blocked or which I am not allowed to try to access.
- Unsuitable material. I agree that I will not try to view, send, upload or download material that is unsuitable for viewing. If I accidentally see any unsuitable material then I will immediately close (but not delete, in the case of emails) the material and tell a member of staff. I know I will not be held responsible if I view unsuitable material by accident and I realise that by reporting this I will help to improve the e-safety of my school/youth project. If I am in any doubt about the suitability of any material, or if any doubts are raised, then I will not (re)access the material. I will not access material that has been rated as “unsuitable”.
- Be polite. Proper conduct must be maintained at all times while using ICT. I agree that I will not harass, bully, insult or attack others via email or any other means. The use of strong language, swearing or aggressive behaviour is not acceptable. I will be polite at all times.
.
Copyright
Copyright gives the creators of some types of media rights to control how they're used and distributed. Music, books, video and software can all be covered by copyright law.
Copyright law
Limatations imposed by copyright
When you buy software, for example, copyright law forbids you from:
- Giving a copy to a friend
- Making a copy then selling it
- Using the software on a network (unless the license allows it)
- Renting the software without the permission of the copyright holder
The law that governs copyright in the UK is called the Copyright, Designs and Patents Act 1988.
Prevention of the software piracy
Software companies take many steps to stop software piracy:
- An agreement between the company that developed the software and the user must be agreed before the software is installed. This is called the license agreement and covers copyright
- Certain pieces of software require a unique licence key to be entered before the installation will continue.
- Some applications or programswill only run if the media (CD / DVD) is in the drive.
- Some applications or programs will only run if a special piece of hardware called a dongle is plugged into the back of the compute
ICT laws and safety done properly
Data
Data is processed by computers, the resulting information can then be used to make decisions. You need to know the definitions of data and information and the relationship between the two.
Better Learning with ICT - using data loggers
Misuse
You need to be familiar with the following ideas about data and computer misuse: that data stored electronically is easier to misuse; that software should not be copied without permission; the consequences of software piracy; that hacking can lead to corruption of data, either accidentally or on purpose.
Types of computer misuse
- Hacking
- Data misuse and unauthorised or copying
- copying or distributing copyrighted software,music and film
- Email or chatroom abuses
- Pornography
- Identity and financial abuses
My Ict Project Computers and the law