Copyright for Educators: Legal and Ethical Use
Psiphon
A free download students find on the Internet that allows them access to websites that school firewalls prevent them from accessing.
phishing
A type of spam used to steal personal information, identity and bank account numbers, or even to attempt face-to-face contact; also known as carding or spoofing.
AUP
Acceptable use policy is a document that clearly outlines what is and is not acceptable behavior for students as well as faculty and staff, and usually includes the consequences of unacceptable behaviors.
public domain
Creative works or information that are not "owned" by an individual but considered part of the common culture.
Creative Commons licensing
Guidelines whereby content creators allow or limit your use to copy, edit, remix, build upon, or distribute all or parts of their work.
firewall
Hardware and/or software that prevents unwanted persons, messages, or software from entering a network or computer.
directory information
Information contained in an education record that generally would not be considered harmful, or invasion of privacy, if disclosed.
malware
Malicious software that can cause significant harm to one or more computers as well as a computer network.
proxy servers
Software applications that perform several functions, including filtering and storing Internet content.
filtering software
Software designed to help prevent students from coming into contact with inappropriate material when using the Internet.
adware
Software that incorporates the presentation of advertisements as a condition for operating it.
spyware
Software that records usage patterns or collects information unknowingly from the user's computer.
virus-protection software
Software that scans computer files to identify and repair files infected by viruses and delete malware.
fair use
The portion of the U.S. Copyright Law that allows limited use of copyrighted material without requiring permission from the use of the copyright holder.
spam
Unwanted messages through e-mail, cell phones, instant- or test- messaging devices, and blogs.
cyberstalking
Using electronic means to stalk someone.
cyberbullying
Using information and communications technologies to harass, defame, or intentionally harm another student or group of students.