The Ethics of Technology
Guidelines for Ethical Use of Intellectual
Haddonfield Public Schools
Haddonfield, New Jersey
Table of Contents
Did you know?
When you buy a piece of software, you
buy the right to install it on ONE computer.
Installation on more than one machine
is a violation of copyright law.
Aside from the fact that as educators
we should be modeling ethical behaviour,
software publishers do prosecute violators.
It is important to be able to document
the purchase of legal copies of software
when questioned. Without such documentation,
the person under whose control it is,
and the school district, are liable for
monetary fines as well as other legal
retribution. (In addition, if a student
has installed any piece of software,
he/she is in violation of the Haddonfield
AUP agreement.) It is important
that we make sure that students understand
the AUP and that we expect them to uphold
that agreement. Failure to do either
makes the individual teacher as well as
the district mutually responsible for
any violation of copyright.
LICENSE - A
license to install is a contract between
the purchaser and the developer/publisher
of that software.
In most installations
you will find a screen that either
informs you, or informs with the additional
requirement that you click a “yes”
button indicating you agree to the
license contract, before you
can install the program. The
information basically says that the
program is protected by copyright
law and international treaties.
That Unauthorized reproduction
(which means installation on more
machines than you purchased the license
for) or distribution of the program
may result in severe civil and criminal
penalties, and will be prosecuted
to the maximum extent possible under
KINDS OF LICENSES
Single User: This
is the license that the consumer usually
purchases. It is a purchase of
the license to install software on
a single machine.
This license, made available through publishing
and distribution houses, designates a
specific number of machines that a program
may be installed on, usually at a single
site. The number usually runs from
5-10, and is a more cost effective way
to do multiple installations
Again, a license made available through
publishing and distribution houses which
designates a specific number of machines
that a program may be installed on, in
larger numbers than the Lab Pack license.
Allows for a more cost effective way to
do large numbers of installations at a
In a large school district, this would
be the most cost effective way to purchase
software for installations throughout.
Allows for installation of a program on
a server, with individual users accessing
the program from whatever workstation
they are using. With good bandwidth
between the machines and the servers,
this can be an effective licensing method.
For information regarding
software piracy, visit the Business Software
Alliance website from the following link:
spam, phishing and virus threats have
brought to the fore the need to remind
about the lack of privacy in use, and
risks to computer/network systems.
Also, I wish to reinforce the
need for all of us to use our system's
e-mail and Internet access appropriately.
In actuality no
one anywhere should consider e-mail or
Internet sites to be private or secure.
Both can be accessed by those who choose
to hack the information. Also, in
security situations such as viruses and
others, where there is threat to the server
and our district computers and network,
the Network Administrator may need to
scan files on the network.
Many businesses monitor
e-mails and Internet logs (we do not)
regularly, with Acceptable Use Policies
(AUP) strongly enforced. Current
case law indicates that employers are
within their legal rights to monitor (access)
all information that resides on their
networks and systems without giving prior
- Our district's AUP
has been signed by all students.
- The expectation is
that all users including staff adhere
to that AUP and hold students accountable
for their use.
This AUP can be found
The staff AUP is posted
Obviously, none of us
can control the content of e-mail and
attachments that we receive, but we can
control what happens once it hits our
Inbox. Remember to empty your Deleted
Items folder. If you choose, you
can block specific senders to your e-mail
providing security over and above the
filters we have in place at the server
I’m hoping that
this will heighten everyone’s awareness
of the importance of the way we use the
district technology on a personal level.
Certainly correspondence is acceptable
and even desirable. Just know that there
may be situations where it must be scanned,
or may be hacked, and privacy cannot be
guaranteed. Choose your words accordingly:
if you don’t want anyone except the receiver
to read it, don’t put it in an email.
Many an email has been mistakenly “replied
to all”. Don’t save or store inappropriate
messages or attachments, and navigate
the Internet professionally.
April 12, 1999
Can Teach Costly Lessons"
By Elizabeth Gardner
This is an
excellent and informative article, however
we can no longer provide a link to it,
as it has been removed from the web, and
we do not have permission to publish it
on our site. We have, however,
received permission to copy it and consequently
it is available to all staff in the Ethics
of Technology document found in the Teacher