Quick navigation:
List of forums
Gay Thailand
Gay Cambodia
Gay Vietnam
Gay World
Everything Else
FAQ & Help
Results 1 to 2 of 2

Thread: Be careful what you wish for!

  1. #1
    Member springco's Avatar
    Join Date
    Aug 2009
    Posts
    74
    Liked
    0

    Be careful what you wish for!

    Here is an excellent article on how the "child porn" issue is being used as a foil to take away all our freedoms and censor anything and everything.

    http://christianengstrom.wordpress.com/ ... -strategy/

  2. #2
    Guest

    Re: Be careful what you wish for!

    Computer Crime & Intellectual Property Section
    United States Department of Justice


    http://www.cybercrime.gov/cyberethics.htm

    Cyberethics

    We live in an exciting time in history. The widespread availability of computers and Internet connections provides unprecedented opportunities to communicate and learn. Unfortunately, although most people use the Internet as a powerful and beneficial tool for communication and education, some individuals exploit the power of the Internet for criminal or terrorist purposes.

    We can minimize the harm that such individuals do by learning ourselves, and teaching young people, how to use the Internet safely and responsibly. The term "cyberethics" refers to a code of safe and responsible behavior for the Internet community. Practicing good cyberethics involves understanding the risks of harmful and illegal behavior online and learning how to protect ourselves, and other Internet users, from such behavior. It also involves teaching young people, who may not realize the potential for harm to themselves and others, how to use the Internet safely and responsibly.

    The information and links below offer guidance and resources for parents and educators and for young people so that they can develop good cyberethics, and get the most out of the exciting new world of the Internet.
    Cyberethics for Parents and Educators
    Cyberethics for Kids
    Cyberethics Web Sites


    MODEL ACCEPTABLE USE POLICY
    INFORMATION TECHNOLOGY RESOURCES IN THE SCHOOLS


    The school's information technology resources, including email and Internet access, are provided for educational purposes. Adherence to the following policy is necessary for continued access to the school's technological resources:

    Students must
    Respect and protect the privacy of others.
    Use only assigned accounts.
    Not view, use, or copy passwords, data, or networks to which they are not authorized.
    Not distribute private information about others or themselves.
    Respect and protect the integrity, availability, and security of all electronic resources.
    Observe all network security practices, as posted.
    Report security risks or violations to a teacher or network administrator.
    Not destroy or damage data, networks, or other resources that do not belong to them, without clear permission of the owner.
    Conserve, protect, and share these resources with other students and Internet users.
    Respect and protect the intellectual property of others.
    Not infringe copyrights (no making illegal copies of music, games, or movies!).
    Not plagiarize.
    Respect and practice the principles of community.
    Communicate only in ways that are kind and respectful.
    Report threatening or discomforting materials to a teacher.
    Not intentionally access, transmit, copy, or create material that violates the school's code of conduct (such as messages that are pornographic, threatening, rude, discriminatory, or meant to harass).
    Not intentionally access, transmit, copy, or create material that is illegal (such as obscenity, stolen materials, or illegal copies of copyrighted works).
    Not use the resources to further other acts that are criminal or violate the school's code of conduct.
    Not send spam, chain letters, or other mass unsolicited mailings.
    Not buy, sell, advertise, or otherwise conduct business, unless approved as a school project.
    Students may, if in accord with the policy above
    Design and post web pages and other material from school resources.
    Use direct communications such as IRC, online chat, or instant messaging with a teacher's permission.
    Install or download software, if also in conformity with laws and licenses, and under the supervision of a teacher.
    Use the resources for any educational purpose.

    Consequences for Violation. Violations of these rules may result in disciplinary action, including the loss of a student's privileges to use the school's information technology resources.

    Supervision and Monitoring. School and network administrators and their authorized employees monitor the use of information technology resources to help ensure that uses are secure and in conformity with this policy. Administrators reserve the right to examine, use, and disclose any data found on the school's information networks in order to further the health, safety, discipline, or security of any student or other person, or to protect property. They may also use this information in disciplinary actions, and will furnish evidence of crime to law enforcement.

    I ACKNOWLEDGE AND UNDERSTAND MY OBLIGATIONS:
    __________________________________________ __________________________
    Student Date
    __________________________________________ __________________________
    Parent/Guardian Date



    PARENTS, PLEASE DISCUSS THESE RULES WITH YOUR STUDENT TO ENSURE HE OR SHE UNDERSTANDS THEM.

    THESE RULES ALSO PROVIDE A GOOD FRAMEWORK FOR YOUR STUDENT'S USE OF COMPUTERS AT HOME, AT LIBRARIES, OR ANYWHERE.

    FOR MORE INFORMATION, SEE http://www.cybercrime.gov.

    http://www.cybercrime.gov/rules/acceptableUsePolicy.htm


    Searching and Seizing Computers and Obtaining Electronic Evidence Manual > Table of Contents
    http://www.justice.gov/criminal/cybercr ... index.html

Similar Threads

  1. Be careful with that Viagra
    By joe552 in forum Sawatdee Gay Thailand
    Replies: 13
    Last Post: January 12th, 2018, 22:59
  2. Asian male prostitutes... careful who you take home
    By Beachlover in forum Everything Else
    Replies: 0
    Last Post: September 4th, 2012, 12:15
  3. This is why Thailand is so careful about foreign ownership
    By Dboy in forum Sawatdee Gay Thailand
    Replies: 29
    Last Post: December 28th, 2010, 14:19
  4. careful this might poke your eyes out
    By witchhunt in forum Sawatdee Gay Thailand
    Replies: 4
    Last Post: September 19th, 2010, 04:25
  5. Be careful with your money transfers to TH
    By travelerjim in forum Sawatdee Gay Thailand
    Replies: 1
    Last Post: February 21st, 2007, 14:11

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
About us
Sawatdee Network is the set of websites for (and about) gay community of Thailand, travelers and tourists in Thailand and in South East Asia.
Please visit us at:
2004-2017 © Sawatdee Gay Thailand - Sawatdee Network