Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged illegal

Rss Feed Group items tagged

Anne Bubnic

Teens Less Likely to Download Illegally When They Know the Laws - 0 views

  • About half of those teens, however, said they were not familiar with these laws, and only 11 percent of them clearly understood the current rules for downloading images, literature, music, movies and software. Teens who were familiar with downloading rules credited their parents, TV or stories in magazines and newspapers, and Web sites — more so than their schools — as resources for information about illegal downloading.
  • Microsoft has enlisted Topics Education, a developer of custom curricula, to help launch the pilot of a broad-based curriculum for middle school and high school educators titled “Intellectual Property Rights Education.”
  • A lack of familiarity with the rules and guidelines for downloading from the Internet contributes to teen opinions that punishment is unnecessary.
  • ...3 more annotations...
  • In general, teenagers regard illegal downloading over the Internet as less offensive than other forms of stealing.
  • Teens rely on parents for rules on downloading.
  • Teens are challenged by peer pressure and their wallets.
  •  
    A Microsoft study done last February found that teenagers between seventh and 10th grades are less likely to illegally download content from the Internet when they know the laws for downloading and sharing content online.
Anne Bubnic

Piracy Kills Music - 0 views

  •  
    In 2005, over 20 billion music files was downloaded illegally. The music industry is trying to come to rights with the problem by working on new and better solutions for legal downloading. The purpose of this site [from Norway] is to work as an eye-opener and to raise a debate around the attitudes towards illegal downloading of music. The campaign site is a movie, especially made for the net, mixed with interactive exercises. In addition to the movie, there are 11 clickable myths & facts.
Anne Bubnic

Safer Mobile Use Implementation Report - 0 views

  •  
    The European Framework for Safer Mobile Use by Younger Teenagers and Children is a self-regulatory initiative of the mobile industry, which puts forward recommendations to ensure that younger teenagers and children can safely access content on their mobile phones. The recommendations are as follows: * Classification of commercial content - mobile operators' own and third-party commercial content should be classified in line with existing national standards of decency and appropriateness so as to identify content unsuitable for viewing by children and younger teenagers; * Access control mechanisms - appropriate means for parents for controlling children's access to this content should be provided; * Education and awareness-raising - mobile operators should work to raise awareness and provide advice to parents on safer use of mobile services, and ensure customers have ready access to mechanisms for reporting safety concerns; * Fighting illegal content on mobile community products and the Internet - mobile operators should work with law enforcement agencies, national authorities and INHOPE or equivalent bodies to combat illegal content on the Internet.
Anne Bubnic

MySpace Mom's Behavior Hateful But Not Illegal - 0 views

  •  
    Lori Drew, the "cyberbully" mom who has been accused of indirectly causing the suicide of a MySpace teen member may have acted heinously, but not illegally, according to a group of Internet legal advocacy groups who filed a legal brief yesterday in the U.S. District Court in California.
Anne Bubnic

Should Info on Facebook Be Grounds for School Suspension? - 0 views

  • School districts across the country have begun to punish students for the material that they publish online. Schools are correct for punishing students for online activities like character defamation of teachers and posting pictures of themselves engaging in illegal activities. Schools must teach students the hard way that wrong actions should be punished no matter where they occur.
  •  
    Question posed in a high school newsletter: If a school comes across online material that depicts a star athlete or school government officer engaging in an illegal activity, should they merely ignore it? Surely, one's moral compass would dictate otherwise. Students must be disciplined for their actions in both the real and virtual worlds.
Anne Bubnic

AB 307 [Chavez Bill ]- California - 0 views

  •  
    AB 307 charges districts to "educate pupils and teachers on the appropriate and ethical use of information technology in the classroom, Internet safety, avoiding plagiarism, the concept, purpose, and significance of a copyright so that pupils can distinguish between lawful and unlawful online downloading, and the implications of illegal peer-to-peer network file sharing."

    This bill shows up as additional items in the planning criteria found in the EETT grant applicationCalifornia Education Code Section 51871.5, -- legislation, monitoring student internet use, ethical use of educational technology in the classroom, information literacy, aspects of information literacy/Internet safety, cyber-bullying, research studies and reports.
Anne Bubnic

New York State: Scrambling for solutions to cyberbullying - 0 views

  • Both the state Senate and Assembly have proposed anti-cyberbullying laws. Kathy Wilson of Sen. Carl Marcellino's (R-Syosset) office said that the Senate has proposed two bills in the last two years that add computers to the list of modes of illegal harassment, but the Assembly passed neither.The Assembly's website states that the Assembly has proposed bills "to define and prohibit the bullying, cyberbullying and hazing of students and others on school property" as well as to add a database for reporting such complaints, but has not passed either yet.
  • Both the state Senate and Assembly have proposed anti-cyberbullying laws. Kathy Wilson of Sen. Carl Marcellino's (R-Syosset) office said that the Senate has proposed two bills in the last two years that add computers to the list of modes of illegal harassment, but the Assembly passed neither.
  • The Assembly's website states that the Assembly has proposed bills "to define and prohibit the bullying, cyberbullying and hazing of students and others on school property" as well as to add a database for reporting such complaints, but has not passed either yet.
  • ...1 more annotation...
  • Matuk said that the task of monitoring children's electronic activities has been complicated by such devices as iPhones, from which I.M.s can be sent from anywhere. "This is going to require partnership between the schools and the community," he added.
  •  
    Schoolyard bullies are a long-standing problem but now, in the age of the Internet, they are increasingly using electronic devices to torment their victims. Because cyberbullying has become so prevalent, several states, including New York, have proposed legislation to control cyberbullying.
Anne Bubnic

SB 818: Missouri Governor Signs Cyber-Bullying Bill into Law - 0 views

  • The Governor signed the bill at a library in St. Charles County, not far from the neighborhood where a 13-year-old girl, Megan Meier, hanged herself in 2006 after receiving taunting messages over the Internet.  The law was passed after the national outcry that followed the suicide of Meier
  • When the full story came to light, and public demand grew for the mother's prosecution, it turned out that what Ms. Drew had done, while clearly malicious, was not against the law as the Missouri Statutes were then written. So the Missouri Legislature and Governor Blunt decided to correct this problem. The new law adds to unlawful harassment electronic means of communication.
  • The new law penalizes those who knowingly communicate with another person who is, or who purports to be, seventeen years of age or younger and recklessly frightens, intimidates, or causes emotional distress to such other person.  Also, the new law makes it a crime "to engage, without good cause, in any other act with the purpose to frighten, intimidate, or cause emotional distress to another person, cause such person to be frightened, intimidated, or emotionally distressed, and such person's response to the act is one of a person of average sensibilities considering the person's age."
  •  
    On June 30th, Missouri governor, Matt Blunt, signed a bill updating state laws against harassment by removing the requirement in the legislation requiring that such harassing communication be written or made over the telephone. Now, harassment from computers, text messages and other electronic devices may also be considered illegal. The amended law also requires school boards to create a written policy requiring schools to report harassment and stalking committed on school property to local police, including such done via the Internet.
Anne Bubnic

Digital Natives » The Ballad of Zack McCune, Part 2 [Video] - 0 views

  •  
    Second installment of a three-part video "The Ballad of Zack McCune" from Berkman Center for Internet & Society.
    What do you do when you're sued by the recording industry? And how do kids and teens reconcile the law (and corporate interests) with a culture of illegal downloading? Last year, Brown University student Zack McCune was faced with both of these questions.
Anne Bubnic

B4UCopy: Copyright Awareness Curriculum for High School/Teens - 0 views

  •  
    Computers make it easy to make copies of computer software, pictures, words, movies and songs. But copyright laws make it illegal to copy the creative work without the owner�s permission. Making copies of a work protected by copyright is just like stealing. The B4UCopy educational program, available for free download, has a goal of raising awareness of copyright laws and reinforce responsible behavior online.
Anne Bubnic

Cyberbullying The Real Threat on the Digital Playground - 0 views

  • "Parents are the key to this whole issue," explains Leasure. "They need to be involved and monitoring the computer and Internet activity of their kids. If they see something that isn't right, they need to act as parents and correct the issue."
  • parental awareness is truly the key to fixing this problem. If your child is the victim - or worse, the bully - it's time to step in. it's not being over-protective; it's trying to stop the current generation from 'virtually' destroying themselves emotionally
  • Cyberbullying Statistics: A recent survey of 395 students, ages 11 to 19, was conducted by the Kids/Teen Division of the Maine-based online safety organization Working To Halt Online Abuse. The study found that: � 28% of students have been cyberbullied, but... � Just over half tell their parents or another adult about it; of the students who did not report the cyberbullying, 25% felt it wasn't a big problem or didn't want to make a big deal out of it � 65% reported the cyberbullying was via IM, followed by email, MySpace, chat rooms and online games � 43% were cyberbullied by someone their age or in the same grade � 30% blocked or deleted the cyberbully, while 16% ignored them � 54 students admitted they had bullied somebody online themselves
  •  
    While reports and stories in the media focusing on Internet predators have become all too frequent, the closer-to-home threat to our children may really be cyberbullying, also known as electronic or online bullying. A recent survey of 395 students (11 to 19 years old) found that 28% of students have been cyberbullied, and more than 1 in 7 admitted to acting as the bully."Cyberbullying could be the biggest online threat facing teens today," says James Leasure, co-founder of Pandora Corp. "Of course Internet predators do still exist, but statistically, kids have a much greater chance of being involved in some way with electronic bullying." Most cases of cyberbullying go undocumented because, fortunately, many kids are able to shrug off the 'unkind words' and look the other way. But there are some cases that make national headlines when they turn into tragedies, such as the Megan Meier case in 2006. Larger cases like this have prompted several states to adopt legislation that makes online bullying illegal.
Anne Bubnic

Cyber safety rules may curb net bullying - 0 views

  •  
    New safety rules from Telestra aim to give parents a tool in the fight against cyber bullying, with many struggling to understand what they can do to protect their children.Families should learn how to report cyberbullying and to work on building trust about discussing online problems. The article gives five suggestions for how adults can become an internet parent:
    Familiarize yourself - talk with your child about their use of the internet.
    Explore - websites and technologies yourself.
    Restrict inappropriate content and consider parental controls such as filtering.
    Talk to your child and encourage open communication
    Know - be aware of the potential dangers and know where to report potentially illegal or inappropriate behaviour online.

Anne Bubnic

Cyberethics: Downloading Music from the Internet | eMINTS - 0 views

  •  
    Cyberethics curriculum from the eMINTS project. These sites highlight the debate about downloading music from the Internet for free. Watch videos of musicians expressing their thoughts on the issue. There is also information about copyright law and explanations about why these types of downloads are considered illegal and unethical. The sites are helpful for teachers who want students to debate the issue. There are links to eThemes Resources on Internet safety and computer basics.
Anne Bubnic

Is Cyber Bullying Illegal? - 2 views

  •  
    In the United States, there's no federal law against cyber bullying -- yet. A bill introduced to the House of Representatives last year would make it against the law to "transmit in interstate or foreign commerce any communication, with the intent to coerce, intimidate, harass, or cause substantial emotional distress to a person, using electronic means to support severe, repeated, and hostile behavior." Anyone found guilty of this crime could face a fine or a prison term of up to two years.
Anne Bubnic

Students: Music Downloading - Answer the Question - 2 views

  •  
    One of eight interactive case studies for kids (GR 4-8) from Cable In the Classroom: Power to Learn.
    Educating students about the legal and ethical aspects of illegal downloading offers the best opportunity to minimize the ethics gap which allows otherwise law-abiding kids to break the rules. Case studies are explored. Students are asked to develop an essay question. The graphics are Nickelodeon style. For the entire series, check out: http://powertolearn.com/internet_smarts/interactive_case_studies/index.shtml
Anne Bubnic

Quarter of eight-to-12-year-olds on Facebook, MySpace or Bebo - 2 views

  •  
    A quarter of UK internet users aged eight to 12 had profiles on Facebook, Bebo or MySpace last year, research has found, although the lowest minimum age set on any of the sites is 13. Ofcom's annual Children's Media Literacy Audit for 2009 also had bad news for the music industry, finding that 44% of children between 12 and 15 thought downloading shared copies of films and music for free should not be illegal.
Anne Bubnic

Identity Theft and Children - 0 views

  • Financial identity theft: This most commonly occurs when the Social Security Number (SSN) and name is used to establish new lines of credit.
  • Criminal identity theft: This typically occurs when a person “borrows” the information of the minor to get a driver’s license or uses the child’s identity when caught in a criminal act. This person may be an illegal immigrant who bought the information or a relative who has had a license suspended or revoked.
  • Identity Cloning: Cloning is when a identity thief uses an identity for financial, criminal, and governmental purposes. Most frequently, profilers have people in positions where they are able to collect information about minors and then sell it on the black market. The most frequent purchasers of this information, in our experience, are illegal immigrants or people who are trying to “restart” their lives and avoid arrest
  •  
    A fact sheet from the Identity Theft Resource Center identifying three kinds of identity theft: financial identity theft, criminal identity theft and identity cloning.
Anne Bubnic

Digital Citizenship: Monitoring Technology Use & Abuse [pdf] - 0 views

  •  
    THE JOURNAL (arcticle) by Mike Ribble and Gerald Bailey. Provides a five-step program for creating a digital citizenship program in your school.Over the last two years, it has become evident that a behavior pattern of misuse and abuse with respect to technology is \nbeginning to emerge in our society. This outbreak of \ntechnology misuse and abuse is documented in continual news \ncoverage on TV, in newspapers and on the Internet - both \ninside and outside of schools. The endless list of misuse and \nabuse includes hacking into school servers, using e-mail to \nintimidate or threaten students, illegally downloading music, \nplagiarizing information from the Internet, using cellular \nphones during class time, accessing pornographic Web sites, \nand playing video games during class. Therefore, if you are \nusing technology in your district, you must begin to deal with \ndigital citizenship in a significant way. \n
buyglobalshop

Buy Google AdSense Accounts - Best Quality Everything Google AdSense Accounts 2024 - 0 views

  •  
    Google AdSense is a important tool that has revolutionized the way millions of website possessors induce income online. But what exactly is it? In simple terms, Google AdSense is an advertising program by Google that allows website possessors to display targeted advertisements on their spots and earn plutocrat when callers click on those advertisements. It works by using Google's vast network of advertisers who bid for announcement placements on colorful websites. When someone visits a website with AdSense advertisements, Google's algorithms dissect the content of the runner and display applicable advertisements that are most likely to be of interest to the caller. This way, website possessors can monetize their online presence and advertisers can reach a wider followership, creating a mutually salutary arrangement. Buy Google AdSense Accounts How Does Google AdSense Work? Google AdSense is a extensively popular online advertising program that enables website possessors and generators to monetize their content by displaying targeted advertisements on their platforms. But how does Google AdSense actually work? Let's dive into the details. At its core, Google AdSense works by connecting advertisers and website possessors. Advertisers, who are seeking to promote their products or services, produce advertisements through the Google Advertisements platform. These advertisements also suffer a rigorous review process by Google to insure they meet their guidelines and programs. Buy Google AdSense Accounts Website possessors who wish to induce profit from their online content can subscribe up for an AdSense account through the Google AdSense website. Once approved, they gain access to a unique law grain which they can integrate into their website's HTML. This law enables the AdSense program to automatically display applicable and targeted advertisements to their callers. To determine the applicability of the advertisements displayed, Google AdSense utilizes a com
Anne Bubnic

Protecting Your Online Identity and Reputation - 0 views

  • Remember that nothing is temporary online. The virtual world is full of opportunities to interact and share with people around the world. It's also a place where nothing is temporary and there are no "take-backs." A lot of what you do and say online can be retrieved online even if you delete it — and it's a breeze for others to copy, save, and forward your information.
  • Mark your profiles as private. Anyone who accesses your profile on a social networking site can copy or screen-capture information and photos that you may not want the world to see. Don't rely on the site's default settings. Read each site's instructions or guidelines to make sure you're doing everything you can to keep your material private.
  • Safeguard your passwords and change them frequently. If someone logs on to a site and pretends to be you, they can trash your identity. Pick passwords that no one will guess (don't use your favorite band or your dog's birthday; try thinking of two utterly random nouns and mixing in a random number), and change them often. Never share them with anyone other than your parents or a trusted adult. Not even your best friend, boyfriend, or girlfriend should know your private passwords!
  • ...6 more annotations...
  • Don't post inappropriate or sexually provocative pictures or comments. Things that seem funny or cool to you right now might not seem so cool years from now — or when a teacher, admissions officer, or potential employer sees them. A good rule of thumb is: if you'd feel weird if your grandmother, coach, or best friend's parents saw it, it's probably not a good thing to post. Even if it's on a private page, it could be hacked or copied and forwarded.
  • Don't respond to inappropriate requests. Research shows that a high percentage of teens receive inappropriate messages and solicitations when they're online. These can be scary, strange, and even embarrassing. If you feel harassed by a stranger or a friend online, tell an adult you trust immediately. It is never a good idea to respond. Responding is only likely to make things worse, and might result in you saying something you wish you hadn't.
  • Take a breather to avoid "flaming." File this one under "nothing's temporary online": If you get the urge to fire off an angry IM or comment on a message board or blog, it's a good idea to wait a few minutes, calm down, and remember that the comments may stay up (with your screen name right there) long after you've regained your temper and maybe changed your mind.
  • Learn about copyrights. It's a good idea to learn about copyright laws and make sure you don't post, share, or distribute copyrighted images, songs, or files. Sure, you want to share them, but you don't want to accidentally do anything illegal that can come back to haunt you later.
  • Check yourself. Chances are, you've already checked your "digital footprint" — nearly half of all online users do. Try typing your screen name or email address into a search engine and see what comes up. That's one way to get a sense of what others see as your online identity.
  • Take it offline. In general, if you have questions about the trail you're leaving online, don't be afraid to ask a trusted adult. Sure, you might know more about the online world than a lot of adults do, but they have life experience that can help.
  •  
    Advice for teens from www.kidshealth.org. Here are some things to consider to safeguard your online identity and reputation:
    1. Remember that nothing is temporary online
    2. Mark your profile as private.
    3. Safeguard your passwords and change them regularly.
    4. Don't post inappropriate or sexually provocative pictures or comments.
    5. Don't respond to inappropriate requests
    6. Take a breather to avoid "flaming."
    7. Learn about copyrights.
    8. Check your digital footprint.
    9. Take it offline.
1 - 20 of 31 Next ›
Showing 20 items per page