1.9+Policies

=1.9 Policies=



Policies are enforceable measures intended to promote appropriate and discourage inappropriate use relating to information technologies. They can be developed by governments, businesses, private groups or individuals. They normally consist of rules governing access to, or use of, information, hardware, software and networks. For example, a school policy on the use of IT would consist of each user signing an acceptable use policy. It would also address unlawful access to the network through, for example, identify theft or using hacking software, and how these transgressions would be treated. Many websites also require users to agree to specific policies before allowing access to their services.

Policies also affect the exchange of information, for example, by making it subject to copyright laws and raising peoples awareness of plagiarism. In general, policies can promote or restrict access, guide behavior, require the fulfillment of certain conditions prior to or during use, or need to be developed to address unforeseen issues such as cyber-bullying.

Source: // Information technology in a global society guide. 2012 onward. //

** Learning Goals **
Insert Learning Goals Here

** Learning Resources **
ITGSopedia Policies International Standards Organizaton [|How WiFi Works] Sample Acceptable Use Policy Generic Business and Employment Policy Farmington Public Schools Network Policy Data Protection Act (1998) HP Corporate Policies 8 Principles of Data Protection

media type="custom" key="26191788"

** Recent Articles **
@http://money.cnn.com/2014/05/19/technology/security/privacy-policy/ @http://www.slate.com/blogs/future_tense/2014/05/22/california_wants_to_make_online_privacy_policies_a_little_more_understandable.html @http://www.huffingtonpost.com/eva-m-clayton/tech-policies-that-transform-our-future_b_5273844.html @http://www.nytimes.com/2012/09/23/sunday-review/free-speech-in-the-age-of-youtube.html?ref=opinion&_r=0 @http://www.google.com/policies/ @http://www.bbc.co.uk/webwise/guides/data-protection-act @http://www.theleafchronicle.com/article/20140609/NEWS01/306090022/School-board-consider-changes-technology-bullying-policies @http://blog.evernote.com/blog/2011/03/24/three-laws-of-data-protection/ @http://www.bbc.co.uk/schools/gcsebitesize/ict/legal/0dataprotectionactrev7.shtml @https://www.yahoo.com/tech/why-congress-keeps-screwing-up-tech-policy-86644272834.html @http://www.nbcnews.com/tech/internet/ftc-reviewing-new-facebook-user-privacy-policy-violations-f8C11137863

** Required Reading **
Information Technology in a Global Society, Stuart Gray. 1st Edition. © 2012 Stuart Gray. ISBN 9781468023619. Pages **290-306.**This textbook has been developed independently of the International Baccalaureate ® This book was written specifically for the ITGS course, covering technical systems, social impacts and ethical issues, and each area of application.

Digital Planet: Tomorrow’s Technology And You, George and Ben Beekman. 10th Edition. © 2012 Pearson Education. ISBN 9780132091251. Pages ** 358-392. **

This book explains how various technologies work, how they are used to solve problems and extend human capabilities, and how our ever-growing network of digital devices affect our lives, our world, and our future.

Gift of Fire, Sara Baase. 4th Edition. (C) 2013 Pearson Education. ISBN 978013249267-6. Chapters 2 and 3**.** This book examines the Social, Legal, and Ethical issues related to Computing Technologies.

** Key Terms Study Widgets **
media type="custom" key="26191636" [|ITGS Policies Jeopardy Game]