Copyright for Educators: Legal and Ethical Use

Ace your homework & exams now with Quizwiz!

Psiphon

A free download students find on the Internet that allows them access to websites that school firewalls prevent them from accessing.

phishing

A type of spam used to steal personal information, identity and bank account numbers, or even to attempt face-to-face contact; also known as carding or spoofing.

AUP

Acceptable use policy is a document that clearly outlines what is and is not acceptable behavior for students as well as faculty and staff, and usually includes the consequences of unacceptable behaviors.

public domain

Creative works or information that are not "owned" by an individual but considered part of the common culture.

Creative Commons licensing

Guidelines whereby content creators allow or limit your use to copy, edit, remix, build upon, or distribute all or parts of their work.

firewall

Hardware and/or software that prevents unwanted persons, messages, or software from entering a network or computer.

directory information

Information contained in an education record that generally would not be considered harmful, or invasion of privacy, if disclosed.

malware

Malicious software that can cause significant harm to one or more computers as well as a computer network.

proxy servers

Software applications that perform several functions, including filtering and storing Internet content.

filtering software

Software designed to help prevent students from coming into contact with inappropriate material when using the Internet.

adware

Software that incorporates the presentation of advertisements as a condition for operating it.

spyware

Software that records usage patterns or collects information unknowingly from the user's computer.

virus-protection software

Software that scans computer files to identify and repair files infected by viruses and delete malware.

fair use

The portion of the U.S. Copyright Law that allows limited use of copyrighted material without requiring permission from the use of the copyright holder.

spam

Unwanted messages through e-mail, cell phones, instant- or test- messaging devices, and blogs.

cyberstalking

Using electronic means to stalk someone.

cyberbullying

Using information and communications technologies to harass, defame, or intentionally harm another student or group of students.


Related study sets

Ch 38: Mental Health Assessment of Older Adults

View Set

Chapter 9: Business Intelligence Systems

View Set

Chapter 17: control of cardiovascular function

View Set

Certification/registration/licensure

View Set

Industrial Revolution: What Effect does the Railroad have on Europe?

View Set

Music Appreciation Semester Test Study Guide

View Set