Learning Objectives Can I discuss the copyright law Can I identify why organisations must protect data Can I describe how legislation affect computer use.

Slides:



Advertisements
Similar presentations
By Andy Scott, Michael Murray and Adam Kanopa
Advertisements

Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
Unit 4- Assignment 3 P5, P6, M2 BTEC Business Level 3.
BT2103 Developing Small Systems for Business Lecture 2 Databases, Data Management, And The Legal Framework.
Learning Objectives Can I understand what is a computer virus and worm is Can I identify risks when using technology (E- Safety) Can I discuss cyber bullying.
Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 6. Using Networks 1 Network Hardware - Hub Hub - A hub is used when you have.
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
GCSE ICT Computers and the Law. Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Legislation in ICT.
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
The Data Protection Act The Data Protection Act controls how your personal information is used by organisations, businesses or the government. Everyone.
The Legal Framework Can you work out which slide each bullet point should go on?!
Computer Misuse Act (1990). What is Computer Misuse Act (1990)? The Computer Misuse Act of 1990 is a law in the UK that makes illegal certain activities,
Administrative Practices Outcome 1
Describe ethical considerations resulting from technological advances.
General Purpose Packages
I.C.T laws By Luke Honeyfield 12. Laws relating to I.C.T  Copyright, Design, Patents  Data protection ACT  Computer misuse ACT  Health and safety.
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
Law Additional Exercise ANSWERS. Question #1 (a) Any one of: gain unauthorised access (1st) to computer material (1) gain (unauthorised) access to computer.
Section 6 Theory Software Copyright, Viruses and Hacking.
Ethical and Legal Issues v Ethical and legal issues are relevant to any project involving systems development. – privacy – professionalism – ownership.
Computer Misuse Act 1990 Altering computer material without permission Accessing computer material without permission with intent to commit further criminal.
Crime & Malpractice AS Module Heathcote Ch. 10.
By Alexander smart. What is a viruses ? A Computer Virus is a software program that is designed to copy itself over and over again. Viruses do NOT damage.
Chapter 6 – Computer Viruses/Hacking and Prevention Starter Task – How can a virus effect your computer? Last Lesson: - Software Copyright & illegal Downloads.
Files are at risk from loss if your computer breaks or if you get a virus. Files can also become corrupted. Solutions: Make regular back ups of files Use.
Code of Conduct 344 Code of Conduct 344. Code of Conduct 344 Introduction; Do you agree with the following statements? Employers need their employees.
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
BTEC ICT Legal Issues Data Protection Act (1998) Computer Misuse Act (1990) Freedom of Information Act (2000)
Everyone has a duty to comply with the Act, including employers, employees, trainees, self-employed, manufacturers, suppliers, designers, importers of.
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
Introduction to Student Name Student Class.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
Setting Up New iPad. STEP 1 Click on “English” STEP 2 Click on “United States”
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
The Computer Misuse Act of1990 The Copyright, Designs & Patents Act of
Computer Misuse By: Alex Meadows Michael Read. How can you misuse a computer? Accessing data stored electronically Copying software without permission.
Information Systems Unit 3.
Legal Implications You need to know about the following:
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
In your pairs What is your law? Why is it important to have the law? How was law broken? Give examples of how to avoid being prosecuted under the law or.
DoS Attacks Phishing Keylogging Computer Laws/Acts.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
ICT and the Law You need to know about 3 laws covering the use and misuse of ICT.
Business Ethics and Social Responsibility GCSE Business and Communication Systems Business and Communication Systems.
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
BTEC Level 3 Unit 3: Information Systems Mr Satari Lesson 7 & 8.
Section 13 Activities. Activity 1 Complete the following table with possible reasons why ICT security might be compromised Security BreachPossible reason.
Computer Misuse Act INTRODUCTION The Computer Misuse Act became law in August Under the Act hacking and the introduction of viruses are criminal.
NEVER USE YOUR REAL NAME ALAWYS USE A NICKNAME IS SOMEONE SENDS SOME NASTY OR RUDE DON’T DELET IT SHOW IT TO SOMEONE DON’T GIVE ANYONE YOU DON’T KNOW A.
Learning Intention Legislations impact on security of information
Legislation in ICT.
Lesson Objectives Aims You should be able to:
Understanding the issues related to the use of information
Data Protection Act and Computer Misuse Act ANSWERS.
Computer Misuse Act 1990.
Unit 7 – Organisational Systems Security
Legal and Ethical Issues
Copyright, Designs and Patents Act 1988
Legislation in ICT.
Computer Misuse Act 1990 GCSE ICT.
How it affects policies and procedures
Revision Lesson 10X5.
Presentation transcript:

Learning Objectives Can I discuss the copyright law Can I identify why organisations must protect data Can I describe how legislation affect computer use Can I describe what the computer misuse Act is CommunicationTeamwork Independence

Lesson Outcome Improved understanding of issues of computer misuse

Starter In pairs discuss where you would find the C logo at the top left hand corner of this slide. Challenge – In pairs On a post it create a definition for the keyword copyright

Copyright This is the legal recognition that a creative work belongs to you if you are the 'copyright' owner. This means that anyone wishing to make use of the work for non-personal use will need to get your agreement. 'Creative works' includes almost anything a person can produce for other people e.g. > Literature > music > film > software code You have automatic copyright for any works that you create, unlike a trademark which you have to apply for.

Mini Plenary Return to your post note– with a different coloured pen; can you annotate and add any more information about the copyright

The Computer Misuse Act enables people to be prosecuted if they commit one of the following offences: 1. Unauthorised access to computer material 2. Unauthorised access with intent to commit or facilitate a crime 3. Unauthorised modification of computer material. This mainly relates to hacking and distributing viruses although other computer related crimes can be tried under this Act. If you are found guilty of these offences you could face up to a five year prison sentence and a very hefty fine.

What would a Year 7 Hayes student need to do to break the Computer misuse Act? Challenge – What terms did you accept and agree to when logging on?

Protecting your data Your User ID identifies you to the network, it enables the server to retrieve your files and it defines your access rights. Your User ID does not need to be kept a secret. Eg Your password is the second part of the log-on security. It identifies that you are the person to whom the User ID belongs. It must be kept a secret.

You now have 10 minutes to add the following keyword definitions to your vocab sheet Copyright Law Computer Misuse Act Protecting your computer – User ID and Password

Plenary Using the table on the next slide RAG yourself on your learning this lesson – you must include 2 What worked Well(WWW) and 1 Even better If (EBI)

GreenI Can identify why organisations must protect data I Can describe how legislation affect computer use I Can describe what the computer misuse Act is I Can discuss the copyright law AmberI Can identify why organisations must protect data I Can describe how legislation affect computer use RedCan I discuss the copyright law