Thinglink

Saturday, 20 June 2015

Digital Footprints

A digital footprint is the data that is left behind by users on digital services.[1] There are two main classifications for digital footprints: passive and active. A passive digital footprint is created when data is collected without the owner knowing, whereas active digital footprints are created when personal data is released deliberately by a user for the purpose of sharing information about oneself by means of websites or social media.[1]


Mermaids Exist! And They Are Seismically Sensitive



Ask geophysicist Guust Nolet of the University of Nice in France if mermaids exist and he will tell you “Yes! And I love them!” He admits they are, of course, a rarity in the ocean. He’s currently tracking two in the Mediterranean and four in the Indian Ocean. And if you want to hear them sing, you’ll have to wait 10 days for them to come to the surface, unless there’s been an earthquake.
Wait what?
Yep, these mermaids are seismically sensitive and Nolet and his team of oceanographers from the United States and France have deployed everyone of them.

PHOTOS: Sea Monsters Real and Imagined
For the first time oceanographers have a fleet of floating seismic detectors cruising the seas. The Mermaids (Mobile Earthquake Recording in Marine Areas by Independent Divers), provide seismic coverage of a large swath of Earth that is mostly invisible to seismologists: the oceanic crust. Unlike ocean bottom seismometers that are stuck on the seafloor for sometimes a year or more at a time, and have to be retrieved using expensive ship time expeditions to learn what data they have recorded, Mermaids will pop to the surface and transmit their data whenever they receive a signal that has a 90 percent chance of being an earthquake.
Turns out most magnitude 6.5 earthquakes can trigger enough commotion, in the form of bubbles and seafloor rumbling, to rise above the din of the regular ocean noise. “We’ve seen magnitudes as low as 5.5 as far away as Mexico,” Nolet told reporters at the American Geophysical Union in San Francisco today.

They track the earthquakes in a similar fashion to land seismometers, only their mobility also gives the Mermaids an advantage for recording additional details from any large aftershocks from an earthquake. For example, during a seismic swarm in the Indian Ocean on Nov. 25, 2013, seismic stations on land captured only two events, whereas one of the Mermaids recorded nearly 200 “triggers” in 13 seismograms.
They can also speak whale. Of course you’d expect mermaids to do so. The noise signatures for whale songs are distinct for each species. Nolet and his team are recommending other scientists take advantage of their Mermaids by including biological and meteorological sensors onto their divers. Each Mermaid can dive down to as far as 2,000 meters.
Next year the team plans to deploy 10 Mermaids around the Galapagos Islands to monitor the seismic signatures from the volcanic magma plume that feeds the islands.
IMAGE: Deploying a Mermaid. Image courtesy of Guust Nolet.

References[edit]

  1. ^ Jump up to: a b Pew Internet: Digital Footprints
  2. Jump up ^ My Digital Footprint: A two-sided digital business model where your privacy will be someone else's business! [Kindle Edition]
  3. Jump up ^ Garfinkel, Simson; Cox, David. "Finding and Archiving the Internet Footprint" (PDF). Presented at the first Digital Lives Research Conference. London, England. 
  4. Jump up ^ COLLINS, KATIE. "Monitoring digital footprints to prevent reputation damage and cyber attacks". Retrieved 8 August 2013. 
  5. Jump up ^ Dalgord, Chelsea. "Cybervetting: The Hiring Process in the Digital Age". 
  6. Jump up ^ Gardham, Duncan (26 Jan 2009). "Threat to privacy under data law, campaigners warn". Telegraph (London). Retrieved 22 March 2014. 
  7. Jump up ^ Sprenger, Polly (26 January 1999). "Sun on Privacy: 'Get Over It'". Wired. Retrieved 22 March 2014. 
  8. Jump up ^ Kosinski, Michal; Stillwell, D.; Graepel, T. (2013). "Private traits and attributes are predictable from digital records of human behavior" (PDF). Proceedings of the National Academy of Sciences 110 (15): 5802–5805. doi:10.1073/pnas.1218772110. 
  9. Jump up ^ Latour, Bruno (15 January 2015). "Beware, your imagination leaves digital traces" (PDF). Column for Times Higher Education Supplement. 
  10. Jump up ^ O’Hara, Kieron; Tuffield, Mischa M.; Shadbolt, Nigel (2008). "Lifelogging: Privacy and empowerment with memories for life". Identity in the Information Society 1 (1): 155–172. doi:10.1007/s12394-009-0008-4. 
  11. Jump up ^ Singer, Natasha (19 June 2013). "Ways to Make Your Online Tracks Harder to Follow". The New York Times Company. Retrieved June 19, 2013. 
  12. Jump up ^ Lobosco, Katie (26 August 2013). "Facebook friends could change your credit score". The Guardian. Retrieved December 19, 2013. 
  13. Jump up ^ "Guantánamo in Germany". The Guardian. Retrieved December 19, 2013. 
  14. Jump up ^ Bellware, Kim. "Mike Seay Gets OfficeMax Junk Mail Referencing Daughter Killed In Car Crash". HuffPost. Retrieved January 24, 2014. 
  15. Jump up ^ "Border refusal for depressed paraplegic shows Canada-U.S. security co-operation has gone too far". The Star (Toronto). 29 November 2013. Retrieved December 19, 2013.

Friday, 19 June 2015

Digital Health and Wellness

Digital Health and Wellness


  • Use proper ergonomics

  • Avoid becoming addicted to the Internet or video games

Aim: To create a 'c-book' on what it means to be a digital citizen in the 21st century.

Overview


Digital Health & Wellness is keeping teenagers away from danger of physical and psychological harm. Many problems can be contributed to electronic devices. Teenagers need to be aware of the risks of digital predators that they may meet online. It is crucial that teenagers are informed of the hazards of digital life and how to keep healthy and safe.

As the world today has such a digital importance, and dependence on the internet is high, we need to make sure that people know and understand the physical and psychological damage and risks that can occur.

Without the thorough understanding of digital health and wellness and digital safety, you are under the major risk of being in danger.
People today, especially teenagers, sometimes take for granted the privacy or risks that can be corrupted through the internet. Some children don't realize the dangers they face when innocently browsing the internet, or chatting to someone that they met online.

Ergonomics is the application of information concerning objects, systems, and environments for human use.


Examples



Recent scientific studies are now showing that:

" it may be possible to experience habit-forming chemical reactions to behavior as well as substances"

and thus discussions about Internet addiction have begun to proliferate through the Internet. While some argue that the technological benefits of the Internet are great and therefore it could not be considered an addiction, others have written books, such as Caught in the Net to help people recover from "Internet addiction" and its harmful effects. Some of the warning signs according to Dr. John Suler are:
  • " Denial and lying about the amount of time spent on the computer or about what they are doing on the computer.
  • Excessive fatigue and changes in sleeping habits, such as getting up early or staying up late (in order to spend more time online).
  • Academic problems, usually grades slipping. Sometimes parents might overlook the fact that the computer is the culprit since they assume their children are doing school work at the keyboard.
  • Withdrawal from friends and declining interest in hobbies (online friends and activities are taking the place of the "real" world).
  • Loss of appetite; irritability when cut-off from computer use; a decline in their appearance or hygiene.
  • Disobedience and acting out. Teens may become very hostile when parents confront them. They may deliberately break the computer-use rules that are set. Their reactions may be so intense because they feel that they are being cut off from their attachments to cyberfriends."

-Why is there a controversy over Internet Addiction?
-Your Computer Is Bad for You
-Parents Sue School Over Wi-Fi
-Computers 'could disable children'

Of course there are many hundreds of more examples and issues related to Digital Health and Wellness, but these three are just some basic cases that we have found.

Here are some examples of Internet addiction as it is directly linked to the issue of health and wellness.
  • Katie Couric talks about Internet addiction and how it is becoming a growing problem; it may affect as much as 10 percent of the population. -CBSNews
*


Addiction.jpg
 

Heading of Digital Health and Wellbeing

Digital Health and Wellness   


    Name

    This is a required question

    What is digital health and wellness?

    This is a required question

    Internet addiction is associated with digital health and wellness.

    This is a required question

    Internet addiction has shown to cause which of the following symptoms?

    This is a required question

    Ergonomics is the safe physical use of the computer.

    This is a required question

    Some guidelines to consider for healthy ergonomic behavior are:

    This is a required question

    In regard to internet safety; you should give out personal information online.

    This is a required question

    Report to your parent or teacher any information online that makes you uncomfortable.

    This is a required question

    It is appropriate to agree to meet someone that you have met online without a parent's or teacher's permission.

    This is a required question

Definition and Overview


Digital Health and Wellness is the branch of digital citizenship that focuses on using technology safely and appropriately. In the technological world we live in today our society is becoming dependent on the use of internet. It is becoming increasingly neccessary to inform our students and children about the dangers involved with frequent internet uses.
Digital Health and Wellness Problems

Internet Addiction-
Recent scientific studies are now showing that: " it may be possible to experience habit-forming chemical reactions to behavior as well as substances"(Young, 2012). Internet addiction has become an international problem that is now being recognized as a serious problem. Internet addiction can cause excessive fatigue or loss of sleep, academic problems, withdrawal from friends and family, and behavioral problems in those who suffer from it. Different types of internet addiction can include cybersexual addiction, cyber-relationship addiction, net compulsions, information overload, and computer addiction.

Ergonomics-
Ergonomics is the safe physical use of the computer. This may include:
  • Picking the right mouse and keyboard. Arthritis can develop from constant typing and clicking.
  • Sitting up straight: Make sure you are straight up in your chair with your back flat against the back and your feet on the gound.
  • Maintain a safe distance from the screen. Do not sit too close, do not stare at the screen for long periods of time.
  • Do not sit for long periods at a time. Frequently get up and do other activities.
  • Simple exercises to warm up the body.
  • For children: Watch modifications provided in video.

Online Safety-
Digital health and wellness includes teaching students internet safety as well. Today, scams are master-minded everyday through the use of the internet. Children must be well aware of what they should and shouldn't do while on the internet. Some rules to consider are:
  • Do not give out any personal information while online.
  • Do not give out your name or picture while online.
  • Meet with parents or teacher to go over rules for being online.
  • Report to your parent or teacher any information/picture online that makes you feel uncomfortable.
  • Do not agree to meet anyone online without your parents or teacher's permission.
  • Do not respond to any innappropriate comments and do not use innapproriate comments yourself.

References

Bickley, D. and Trawick, L. (2013) Digital Health and Wellness. Retrieved from http://www.nisd.net/digitalcitizen/sec_digcit/life_outside_health_6_12.htm

Digiteen (2013) Digital Health and Wellness. Retrieved from http://digiteen09-1.flatclassroomproject.org/Digital+Health+and+Wellness

Leeds Student Medical Practice (September 2012). Computer ergonomics. Retrieved from http://www.leeds.ac.uk/lsmp/healthadvice/computerergonomics/computergonomics.htm

Safekids.com (2013). Kids rules for online safety (for pre-teens). Retrieved from http://www.safekids.com/kids-rules-for-online-safety/

Tanigent LLC. (2013) Digital Health and Wellness. Retrieved from http://lhscommtech.wikispaces.com/Digital+Health+and+Wellness

Young, K. Dr. (12 January 2012) What is internet addiction? Retrieved from http://www.healthyplace.com/addictions/center-for-internet-addiction-recovery/what-is-internet-addiction/

Saturday, 6 June 2015

Digital Commerce

Digital Commerce:electronic buying and selling of goods.
Technology users need to understand that a large share of market economy is being done electronically. Legitimate and legal exchanges are occurring, but the buyer or seller needs to be aware of the issues associated with it. 


History of ecommerce

One of the most popular activities on the Web is shopping. It has much allure in it — you can shop at your leisure, anytime, and in your pajamas. Literally anyone can have their pages built to display their specific goods and services.
History of ecommerce dates back to the invention of the very old notion of "sell and buy", electricity, cables, computers, modems, and the Internet. Ecommerce became possible in 1991 when the Internet was opened to commercial use. Since that date thousands of businesses have taken up residence at web sites.

At first, the term ecommerce meant the process of execution of commercial transactions electronically with the help of the leading technologies such as Electronic Data Interchange (EDI) and Electronic Funds Transfer (EFT) which gave an opportunity for users to exchange business information and do electronic transactions. The ability to use these technologies appeared in the late 1970s and allowed business companies and organizations to send commercial documentation electronically.

Although the Internet began to advance in popularity among the general public in 1994, it took approximately four years to develop the security protocols (for example, HTTP) and DSL which allowed rapid access and a persistent connection to the Internet. In 2000 a great number of business companies in the United States and Western Europe represented their services in the World Wide Web. At this time the meaning of the word ecommerce was changed. People began to define the term ecommerce as the process of purchasing of available goods and services over the Internet using secure connections and electronic payment services. Although the dot-com collapse in 2000 led to unfortunate results and many of ecommerce companies disappeared, the "brick and mortar" retailers recognized the advantages of electronic commerce and began to add such capabilities to their web sites (e.g., after the online grocery store Webvan came to ruin, two supermarket chains, Albertsons and Safeway, began to use ecommerce to enable their customers to buy groceries online). By the end of 2001, the largest form of ecommerce, Business-to-Business (B2B) model, had around $700 billion in transactions.

History of ecommerce is unthinkable without Amazon and Ebay which were among the first Internet companies to allow electronic transactions. Thanks to their founders we now have a handsome ecommerce sector and enjoy the buying and selling advantages of the Internet. Currently there are 5 largest and most famous worldwide Internet retailers: Amazon, Dell, Staples, Office Depot and Hewlett Packard. According to statistics, the most popular categories of products sold in the World Wide Web are music, books, computers, office supplies and other consumer electronics.


The History Of Ecommerce: How Did It All Begin?

Posted by Miva Merchant to Articles on October 26th, 2011

By definition, ecommerce or electronic commerce, is the buying and selling of products or services via the Internet. For many Americans, ecommerce is something we participate in on a daily basis, like online bill payment or purchasing from an e-tailer.
Nowadays the thought of living without ecommerce seems unfathomable, complicated and an inconvenience to many. It wasn’t until only a few decades ago that the idea of ecommerce had even appeared.
Ecommerce was introduced 40 years ago and, to this day, continues to grow with new technologies, innovations, and thousands of businesses entering the online market each year. The convenience, safety, and user experience of ecommerce has improved exponentially since its inception in the 1970’s. This article will address some of the key players and milestones of ecommerce.

Digital Security

Digital Security
It is the responsibility of each Client to read and understand this legal notice and the terms and conditions pursuant to which an acquisition of financial contracts via this site is governed.
The Link to prezi cyber-crime: 
https://prezi.com/eb3rktzzlu4j/edit/#4_95982358

Issues surrounding security, the risks of T&C’s

Electronic Transaction
Some federal, state and territory governments encourage the adoption of electronic commerce by enacting and enabling legalisation. In Australia many bills and acts have been passed to resolve legal issues and make electronic transaction more authenticated, such as the Electronic Transaction Act (ETA)[3]. 

Privacy & Security
While shopping on the Internet, most people typically do not think about what is happening in the background. Web shopping is generally very easy. We click on a related site, go into that site, buy the required merchandise by adding it to our cart, enter our credit card details and then expect delivery within a couple of days. This entire process looks very simple but a developer or businessmen knows exactly how many hurdles need to be jumped to complete the order. Customer information has to pass through several hands so security and privacy of the information are a major concern.

Copyright & Trademark
Many attempts have been made to address the issues related to copyrights on digital content. E-commerce has a tremendous impact on copyright and related issues, and the scope of copyrights is affecting how e-commerce evolves. It is essential that legal rules are set and applied appropriately to ensure that digital technology does not undermine the basic doctrine of copyright and related rights. From one perspective, the Internet has been described as "the world's biggest copy machine" [7].

Online Terms, Conditions, Policies and Laws
At the moment, most online privacy policies are produced by private businesses for individual companies. Governments are developing legislation to support and strengthen the privacy protection measures of many businesses. These initiatives are aimed at regulating the storage, use and disclosure by businesses of personal information.
Privacy legislation is designed to protect a person's personal information. The privacy laws of their host country affect overseas companies. Every organisation should be very careful while applying terms and conditions for the electronic transaction for Internet users. Privacy and security policies not only reflect the organizations practice but also the rules and regulations for doing business with the company. Major issues regarding the legalization of electronic transactions include the following.
— Ensure proper online contracts.
— Record retention obligations.
— Original documentation, in terms of TAX and VAT requirements.
— Import/export regulations.
— Exchange control regulation.
— Foreign data protection law.

E-Business and Legal Issues
The technological basis of e-commerce is basically Web client/server middleware, or what is called three-tier architectures. The client tier is the Web browser involving some type of form processing. The middle tier is the Web server, often with transaction processing. The Web server in turn links to the third tier, a database processing the order information. Some of the issues are strictly Internet-related, such as domain names and trademarks, linking and framing, clickware (and shrinkware), and metatag use. Others are traditional issues applied to the Internet, such as copyright, contracts, consumer protection, privacy, taxation, regulated industries and

Conclusion
Most of the legal issues surrounding electronic commerce are not new. Lawyers should, however, be able to recognise the increased significance of certain legal issues to the online environment. In understanding the technical, contractual, intellectual property and regulatory issues, which have enhanced importance in the new economy, the lawyer is well placed to assist clients in pro-actively minimising their exposure to legal liability

Different types of cyber-crime

1. THEFT OF TELECOMMUNICATIONS SERVICES The "phone phreakers" of three decades ago set a precedent for what has become a major criminal industry. By gaining access to an organisation's telephone switchboard (PBX) individuals or criminal organisations can obtain access to dial-in/dial-out circuits and then make their own calls or sell call time to third parties (Gold 1999). Offenders may gain access to the switchboard by impersonating a technician, by fraudulently obtaining an employee's access code, or by using software available on the internet(Tendler and Nuttall 1996).


2. COMMUNICATIONS IN FURTHERANCE OF CRIMINAL CONSPIRACIES Just as legitimate organisations in the private and public sectors rely upon information systems for communications and record keeping, so too are the activities of criminal organisations enhanced by technology. There is evidence of telecommunications equipment being used to facilitate organised drug trafficking, gambling, prostitution, money laundering, child pornography and trade in weapons (in those jurisdictions where such activities are illegal)(Grant, David and Grabosky 1997).
 

3. TELECOMMUNICATIONS PIRACY Digital technology permits perfect reproduction and easy dissemination of print, graphics, sound, and multimedia combinations. The temptation to reproduce copyrighted material for personal use, for sale at a lower price, or indeed, for free distribution, has proven irresistable to many. This has caused considerable concern to owners of copyrighted material. Each year, it has been estimated that losses of between US$15 and US$17 billion are sustained by industry by reason of copyright infringement (United States, Information Infrastructure Task Force 1995, 131).



4. ELECTRONIC MONEY LAUNDERING AND TAX EVASION For some time now, electronic funds transfers have assisted in concealing and in moving the proceeds of crime. Emerging technologies will greatly assist in concealing the origin of ill-gotten gains. Legitimately derived income may also be more easily concealed from taxation authorities(Wahlert 1996).



5. ELECTRONIC VANDALISM, TERRORISM AND EXTORTION As never before, western industrial society is dependent upon complex data processing and telecommunications systems. Damage to, or interference with, any of these systems can lead to catastrophic consequences. Whether motivated by curiosity or vindictiveness electronic intruders cause inconvenience at best, and have the potential for inflicting massive harm (Hundley and Anderson 1995, Schwartau 1994).



6. ILLEGAL INTERCEPTION OF TELECOMMUNICATIONS Developments in telecommunications provide new opportunities for electronic eavesdropping. From activities as time-honoured as surveillance of an unfaithful spouse, to the newest forms of political and industrial espionage, telecommunications interception has increasing applications. Here again, technological developments create new vulnerabilities. It has been reported that the notorious American hacker Kevin Poulsen was able to gain access to law enforcement and national security wiretap data prior to his arrest in 1991 (Littman 1997).



7. ELECTRONIC FUNDS TRANSFER FRAUD Electronic funds transfer systems have begun to proliferate, and so has the risk that such transactions may be intercepted and diverted. Valid credit card numbers can be intercepted electronically, as well as physically; the digital information stored on a card can be counterfeited(Denning 1999, 55).

References

1. Bond, Robert, "International Legal Issues of E-Commerce" Legal Updates, http://www.faegre.com, 2003.

2. Sayer, Peter and Deveaux, Sarah, "Jurisdiction in Cyberspace" IDG News Service Friday, July 28, 2000 see also http://www.pcworld.com

3. Western Australia Dept of Industry and Resources, http://www.law.gov.au/www/securitylawHome.nsf/

4. McGinty, Jim, http://www.ministers.wa.gov.au

5. Barr, David D. "The Need of a Broad Standard in Global E-Commerce" The Internet Law Journal, Dec. 26, 2000

6. "Law, Ethics and Cyber Crime" Prentice Hall 2003

7. "Its the World's Biggest Copy Machine," PC Week, January 27, 1997.

8. "Intellectual Property on the Internet", A survey of issues. [Copyrights and Related Issues], http://ecommerce.wipo.int/survey/

9. Greenspan, Robyn "Downloaders Disregard Legal, Copyright Issues", http://www.internetnews.com, August 1, 2003.

10. Shoniregun, C.A., "Intellectual Property Rights of Multimedia Enriched Websites", Communication of the ACM: Ubiquity, Volume 3, Issue 37, Oct 29. (2002).

Digital Rights and Responsibilities

Digital Rights and Responsibility: those freedoms extended to everyone in a digital world.
Just as in the American Constitution where there is a Bill of Rights, there is a basic set of rights extended to every digital citizen. Digital citizens have the right to privacy, free speech, etc. Basic digital rights must be addressed, discussed, and understood in the digital world. 

Acceptable Use Policy

Please see below for the Capital Area Advanced Research and Education Network's (CAAREN's) acceptable use policy.
  • Use of CAAREN services shall be in support of the network's and member institutions' core missions of research and education
  • CAAREN services may be used for all legal purposes, provided such use does not adversely affect CAAREN or other members' operations, as determined by CAAREN
  • The network may not be used for:
    • Any illegal activity
    • Gaining access to systems for which one does not have authorization
  • Institutions eligible for CAAREN membership may not share an individual connection and must connect to CAAREN separately
  • Member traffic may be subject to other acceptable use policies when such traffic transits other networks (e.g., Internet2)
A list of basic rights and responsibilities of students for Acceptable Use Policy

Student Rights and Responsibilities

Preamble

Academic institutions exist for the transmission of knowledge, the pursuit of truth, the development of students, and the promotion of the general well being of society. Free inquiry and free expression are indispensable to the attainment of these goals. As members of this academic community, students are encouraged to develop the capacity for critical judgment and to engage in a sustained and independent search for truth.

I. Access

Montclair State is an Equal Opportunity/Affirmative Action institution and does not discriminate on the basis of race, ethnicity, religion, gender, sexual orientation, creed, national origin, ancestry, age, marital status, handicap, or Vietnam-era veteran status in providing access to the University's benefits, services, and employment opportunities in compliance with relevant federal and state legislation.
The University is open to all students who are qualified according to its admission standards, within the limits of its funding and facilities.

II. Classroom

The professor in the classroom and in conference should encourage free discussion, inquiry, and expression. Student performance will be evaluated solely on an appropriate basis, not on opinions or conduct in matters unrelated to academic standards. Students shall be made aware of the standards by which they are to be evaluated and that procedures exist by which the standards are reviewed and evaluated. Faculty bear responsibility to inform students of their grading standards and procedures.

A. Protection of Freedom of Expression

Students are free to take exception, in a reasonable manner, to the data or views offered in any course of study and to reserve judgment about matters of opinion. They are, nonetheless, responsible for learning the content of any course of study for which they are enrolled. The instructor will judge the extent to which the student has met this requirement.
Discussion and expression of all views relevant to the subject matter are recognized as necessary to the educational process, but students have no right to restrict the freedom of professors to teach or of the right of other students to learn. If a student persists in disruptive behavior in class after the professor has explained the unacceptability of such conduct, the professor may dismiss the student from the class and may refer the matter to appropriate personnel for disciplinary proceedings.

B. Protection Against Improper Disclosure

Information about student views, beliefs, life styles, and political associations, which professors acquire in the course of their work as teachers, advisors, and counselors, is considered confidential. Protection of students against improper disclosure is a serious professional obligation and is mandated by the Federal Family Rights and Privacy Act of 1974.

III. Student Records

A. Permanent Educational Records

Montclair State has a carefully considered policy as to the information which should be a part of a student's permanent educational records and the conditions of access to each are set forth in an explicit policy statement.
Transcripts of academic records contain only information about academic status. Information from disciplinary or counseling files is not available to unauthorized persons on campus, or to any persons off campus without the express consent of the student involved except by court order or in cases where the safety of persons or property is involved. Provisions are also made for periodic routine destruction of non-current disciplinary records and counseling files. Administrative staff and faculty member should respect confidential information about students, which they acquire in the course of their work. A policy statement pertaining to this matter may be obtained from the Office of the Vice President for Student Development and Campus Life.

B. Directory Information

http://www.montclair.edu/sdcl/ferpa/
Under the Family Education Rights and Privacy Act of 1974 (FERPA), Montclair State may provide information of a directory nature to those who request it without the consent of the student. However, students are entitled to know what is classified as directory information and have the right to request that it not be disclosed by contacting the Office of the Dean of Students within the first two weeks of each semester.

IV. Student Development & Campus Life

In Student Development and Campus Life, certain standards are maintained to preserve the freedom of students.

A. Freedom of Association

Students bring to the campus a variety of interests previously acquired and develop many new interests as members of the college community. They should be free to organize and join associations to promote their common interests.
  1. Membership, policies, and actions of student organizations will be determined by vote of only those persons who hold bona fide student membership in the college.
  2. Affiliation with an extramural organization will not itself disqualify a student organization from institutional recognition.
  3. Campus advisors are required, but each organization is free to choose its own advisor. Campus advisors advise organizations according to each individual constitution. They do not have the authority to control the policies of such organizations.
  4. Student organizations are required by the Student Government Association (SGA) to submit a statement of purpose, criteria for membership, rules of procedure, and a current list of officers to the President of the Student Government Association.
  5. Campus organizations, including those affiliated with an extramural organization, shall have no policies or procedures, which violate university policy or applicable rules.

B. Demonstration Regulation

General Policy
Montclair State University’s policy and procedures concerning demonstrations and assemblies is based on a balance between two principles.  The first principle is the right of members of the University community to freedom of assembly and speech and the benefits to be derived in a free society and in a free and open University from fostering discourse and permitting the exchange of ideas.  No member of the University community shall be subject to any limitation or penalty for demonstrating or assembling with others for the expression of his/her viewpoint.  The second principle is the right of all members of the University community to be able to engage without disruption in all University organized activities, including, but not limited to, educational, scholarly, research, business, cultural, informational, recreational, or public outreach activities.

C. Freedom of Inquiry and Expression

  1. Students and student organizations are free to examine and to discuss all questions of interest to them, and to express opinions publicly and privately. They are also free to support causes by orderly means, which do not disrupt the regular and essential operations of Montclair State. It should be made clear to the academic and the larger community that in their public expressions or demonstrations, students or student organizations speak only for themselves.
  2. Duly organized student groups are encouraged to invite and to hear any person of their own choosing. Routine procedures required by MSU before a guest speaker is invited to appear on campus are designed only to insure that there is orderly scheduling of facilities and adequate preparation for the event, that the occasion is conducted in a manner appropriate to an academic community, and does not infringe on the rights of others. Institutional control of campus facilities is not used as a device of censorship. It should be made clear to the academic and larger community that sponsorship of guest speakers does not necessarily imply approval or endorsement of the views expressed, either by the sponsoring group or the university.

D. Student Participation in Institutional Government

As constituents of the university community, students should be free, individually and collectively, to express their views on issues of institutional policy and on matters of general interest to the student body. The student body should have clearly defined processes to participate with the Administration in the formation and application of institutional policy affecting academic and student affairs. The role of the Student Government and both its general and specific responsibilities should be made explicit, and the actions of the Student Government within the areas of its jurisdiction should be reviewed only through orderly and prescribed procedures as delineated by the Board of Trustees of Montclair State University through the constitution of the Student Government Association. The role of the Student Government Association is to serve as the official student voice for students on matters of all university policy and concern.

E. Student Publications

Student publications and the student press are a valuable aid in establishing and maintaining an atmosphere of free and responsible discussion and of intellectual exploration on the campus. They are a means of bringing student concerns to the attention of the faculty and institutional authorities, and of formulating student opinions on various issues on the campus and in the world at large.
Montclair State provides editorial freedom and financial autonomy for the student publications to maintain their integrity of purpose as vehicles for free inquiry and free expression in an academic community.
Institutional authorities, in consultation with students and faculty, have a responsibility to provide written clarification of the role of the student publications, the standards to be used in their evaluation, and the limitations on external control of the operation. At the same time, the editorial freedom of student editors and student managers entails corollary responsibilities to be governed by the canons of responsible journalism, such as the avoidance of libel, indecency, undocumented allegations, attacks on personal integrity, and the techniques of harassment and innuendo. The following provisions protect the editorial freedom of student publications.
  1. The student press should be free of censorship and advance approval of copy, and its editors and managers should be free to develop their own editorial policies and news coverage.
  2. Editors and managers of student publications should be protected from arbitrary suspension and removal because of student, faculty, administrative, or public disapproval of editorial policy or content. Only for proper and stated causes should editors and managers be subject to removal and then by orderly and prescribed procedures. The agency responsible for the appointment of editors and managers should be the agency responsible for their removal.
  3. All student publications should explicitly state on the editorial page that the opinions therein expressed are not necessarily those of the university or student body.

V. Off-Campus Freedom of Students

A. Exercise of Rights of Citizenship

Students are both citizens and members of the university community. As citizens students enjoy the same freedoms of speech, peaceful assembly, and right of petition that other citizens enjoy and, as members of the university community, they are subject to the obligations, which accrue to them by virtue of this voluntary membership. Institutional powers shall not be employed to inhibit such intellectual and personal development of students as is often promoted by their exercise of the rights of citizenship off campus.

B. University's Interest

Students who violate the law may incur penalties prescribed by statutes and civil authorities. Montclair State's interest as an academic community may be involved by violation of law and may provide a basis for disciplinary action.
Students who violate the law may incur penalties prescribed by civil authorities, but institutional authority will not be used to merely duplicate the function of general laws. Only where the institution's interest as an academic community is distinct and clearly involved shall the special authority of the university be asserted.

VI. Student Rights Within the Instructional Context

In the interest of enhancing the quality of student life and of maintaining and improving excellent relationships between students and faculty, the Student Affairs Council of the Faculty Senate has adopted the following list of student rights within the instructional context:

VII. Student Right to Know

  1. Student Right-to-Know - December 1, 1995 - Part V pp. 61775-88 (34 CFR Part 668.46). These regulations implement remaining provisions of the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act. Text of the Jeanne M. Cleary Disclosure of Campus Security is available on the web at www.montclair.edu/universitypolice/clery/
  2. Equity in Athletics - November 29, 1995 - Part V pp. 61423-42 (34 CFR Part 668). These regulations implement the Equity in Athletics Disclosure Act, which requires the disclosure information on men and women's intercollegiate athletic programs
http://www.montclair.edu/dean-of-students/handbook/

F. HUMAN RELATIONS STATEMENT ON CAMPUS CLIMATE FOR CIVILITY AND HUMAN DIGNITY

Montclair State University recognizes its responsibility to foster an atmosphere of respect, understanding and good will among individuals and groups, with special sensitivity to those most likely to be subjected to disrespect, abuse and misunderstanding because of age, disability, ethnicity, gender, gender identity or expression, national origin, race, religion, and sexual orientation. The goal is to create an unbiased community where all individuals feel free to express themselves in ways that are appropriate in a multi-ethnic and multi-cultural society and to pursue their work and study in an atmosphere which values individuality and diversity.

Digital Etiquette

Digital Etiquette: electronic standards of conduct or procedure.
Technology users often see this area as one of the most pressing problems when dealing with Digital Citizenship. We recognize inappropriate behavior when we see it, but before people use technology they do not learn digital etiquette.


Digital Code of Conduct for education institutes

If a participant engages in harassing behavior, the organizers may take any action they deem appropriate, including warning the offender or expulsion from the DLF Forum or DLF event. If you are being harassed, notice that someone else is being harassed, or have any other concerns, please contact a member of the DLF staff immediately.
Expectations are that equipment for the reception, decoding and interactive processing of digital broadcasting and related services will contribute substantially to the electricity consumption of households in European Community in the near future. Depending on the penetration level, the specifications of the equipment and the requirements of the service provider, a total European consumption of up to 23 TWh per year can be estimated.




Digital Code of Conduct


Digital Citizenship is having the knowledge, skills and attitudes needed to demonstrate responsible, respectful and safe behaviour when using technology or participating in digital environments.
John Oliver’s Digital Code of Conduct reflects, and is in accordance with, the school’s “J Code”, the district’s policies regarding student conduct, and the province’s BC Human Rights Code.
Acting Responsibly
  • I will demonstrate ethical behaviour in the digital world just as I would in the real world
  • I will use technology in an appropriate manner
  • I will make appropriate digital decisions by committing myself to a high standard of conduct and procedure
  • I will NOT break any laws or rules dealing with the use of technology
  • I will follow the established rules surrounding technology and take responsibility for my actions
Acting Respectfully
  • I will respect myself and others through my actions
  • I will demonstrate respectful digital etiquette
  • I will not use technology in a harmful, degrading, or inappropriate manner
  • I will demonstrate consideration of, and respect for, school and peer technological resources and use them appropriately
  • I will model good digital behaviour

Acting Safely

  • I will act safely in the digital world to prevent disruption or harm to myself and others
  • I will work to have a balanced, healthy lifestyle relationship with technology
  • I will protect myself and others by reporting digital abuse of people and property
  • I will ensure the privacy of my own information​
10 Points of netiquette

1.When typing never write in all capital letters.   That is shouting.  People don’t like it when you shout at them in person.  And they sure don’t like when you shout at them on the net!

2. Don’t plagiarize.  Someone spent a long time coming up with their content.  When you borrow something from someone, give them the credit.  Site their name or their site.  Give the site when you have gotten your information.

3.Use proper quotes and always use the whole quote.  Don’t take quotes out of context and don’t be selective about which part of the quote you want to use.

4.Don’t gossip and keep personal information personal.  Don’t tell stories that you don’t know for a fact to be true.  And often, just because it’s true, doesn’t mean that it needs to be repeated. 

5.Don’t steal those photographs off the web even if they are a perfect fit for what you need.  Chances are they are copyrighted and someone spent a long time putting that together.  Get permission and give credit where credit is due.

6.Watch your language.  No potty mouths.

7. Be patient with internet newbies.  Know that they are just learning like you did once upon a time.

8. No spamming.  Remember that spam is unwanted electronic messages or sending the same electronic message over and over.  This can get you in a lot of trouble on some sites and as a general rule it just irritates everyone else.

9. If you are using a header (such as in an email) make sure your content really pertains to the header.  You must admit it would really stink if the header said something about football, for example, and the email was really about your newest and greatest business idea.   Just stay on topic and the problem is solved.

10. Avoid overuse of emoticons.  You know… those cute little smiley faces.  They really lose their cuteness when overused and tend to irritate people.

We value your attendance.
Code of Conduct inspired by: http://geekfeminism.wikia.com/wiki/Conference_anti-harassment.


Code of conduct:


1. Remember the Human
2. Adhere to the same standards of behavior online that you follow in real life
3. Know where you are in cyberspace
4. Respect other people's time and bandwidth
5. Make yourself look good online
6. Share expert knowledge
7. Help keep flame wars under control
8. Respect other people's privacy
9. Don't abuse your Power
10. Be forgiving of other people's mistakes