Computer Law

Computer Law
Year 7 - Digital Literacy 
1 / 24
next
Slide 1: Slide
ComputingLower Secondary (Key Stage 3)

This lesson contains 24 slides, with interactive quizzes, text slides and 2 videos.

time-iconLesson duration is: 50 min

Items in this lesson

Computer Law
Year 7 - Digital Literacy 

Slide 1 - Slide

KO: To be-able to identify and explain the different 'Computer Laws'
All
To be-able to identify the different Computer Laws.

Most 
To be-able to explain what the Copyright Act, Computer Misuse Act and GDPR do.

Some
To be-able to explain and identify what the implications of breaching the different Computer Laws are.

Slide 2 - Slide

Slide 3 - Slide

What do you think the previous images mean?

Slide 4 - Slide

Computer Misuse
What is 'Computer Misuse'?

Computer misuse refers to any unauthorised or inappropriate use of computer systems, software, or data. It can involve actions such as hacking, installing malware, stealing confidential information, or using computer resources for illegal activities.

Slide 5 - Slide

Examples of Computer Misuse
Recognise these four below?

Hacking, Malware, Phishing, Cyberbullying

These are all examples of Computer Misuse

Slide 6 - Slide

Let's talk about the example you have just seen

Slide 7 - Slide

Computer Misuse Act 1990
The Computer Misuse Act 1990 is a UK law that is in place to prevent unauthorised access to computer systems and data, as well as other forms of computer-related criminal activity. This law covers: England and Wales; Scotland; Northern Ireland.


The Computer Misuse Act 1990 consists of three main offenses:


  • Unauthorised access to computer systems.
  • Unauthorised access with intent to commit or facilitate a crime.
  • Unauthorised modification of computer systems.


The penalties for offenses under the Computer Misuse Act 1990 can range from fines to imprisonment, depending on the severity of the offense.





Slide 8 - Slide

Did you know?
  • 39% of UK businesses reported suffering a cyber attack in 2022.

  • In the year ending March 2022, there were an estimated 1.6 million (1,633,000) incidents of computer misuse experienced by adults aged 18 and over in England and Wales.

  • Garibaldi was a victim to a cyber attack...

Slide 9 - Slide

What do we do as a school to stop 'Computer Misuse'?

Slide 10 - Slide

GDPR (General Data Protection Regulation) 
GDPR (General Data Protection Regulation), is a law that protects our data.  

It governs the collection, use, and storage of personal data across the UK and and Europe.

Slide 11 - Slide

Slide 12 - Video

What happens if we do not follow the GDPR?

Slide 13 - Slide

What could happen if you don't follow the rules...
  • Legal Penalties: If you don't follow the GDPR, it can lead to significant financial penalties.

  • Reputational Damage: Failure to adhere to GDPR principles can result in reputational damage for businesses.

  • Business Restrictions: In some cases, serious violations of the GDPR can lead to restrictions on business operations.

There are many more...


Slide 14 - Slide

What does the acronym GDPR stand for?

Slide 15 - Slide

Do you know what the word 'Copyright' means?

Slide 16 - Slide

Slide 17 - Video

Copyright, Designs and Patents Act 1988
  • It provides legal protection for original creative works, designs, and inventions.

  •  It gives creators exclusive rights to control the reproduction, distribution, adaptation, and public performance or display of their works.

  • The CDPA is specific to the United Kingdom. Other countries have their own copyright, design, and patent laws.

Slide 18 - Slide

What do you think the punishments of breaching the 'Copyright law' are?

Slide 19 - Slide

Consequences of breaching Copyright
  • Legal Action
  • Fined
  • Reputation Damage 

Slide 20 - Slide

What is the purpose of GDPR?
A
To restrict access to personal data by individuals
B
To promote data breaches
C
To allow companies to collect and use personal data freely
D
To protect personal data and privacy of EU citizens

Slide 21 - Quiz

What is the purpose of the Computer Misuse Act?
A
To allow hackers to access any computer.
B
To protect computer users and their data from unauthorized access and modification.
C
To make all computer activities legal.
D
To promote the use of computers.

Slide 22 - Quiz

What year was the Computer Misuse Act created?

Slide 23 - Slide

Scenario:

I am going to go and download some music off an illegal site, what law would I be breaking?

Slide 24 - Slide