DL11 - Computer Law

1 / 29
suivant
Slide 1: Diapositive
ComputingLower Secondary (Key Stage 3)

Cette leçon contient 29 diapositives, avec quiz interactifs, diapositives de texte et 1 vidéo.

time-iconLa durée de la leçon est: 50 min

Éléments de cette leçon

Slide 1 - Diapositive

What is todays session about?

Slide 2 - Diapositive

Computer Law
Year 7 - Digital Literacy 

Slide 3 - Diapositive

KO: To be-able to identify and explain the different 'Computer Laws'
All
To be-able to identify the different Computer Laws.

Most 
To be-able to explain what the Copyright Act, Computer Misuse Act and GDPR do.

Some
To be-able to explain and identify what the implications of breaching the different Computer Laws are.

Slide 4 - Diapositive

How can people misuse a computer ?

Slide 5 - Carte mentale

Examples of Computer Misuse
Logging in as someone else (without permission)
Deleting, changing files (without permission)
Deploying Malware of any kind
Hacking
These are all examples of Computer Misuse

Slide 6 - Diapositive

Computer Misuse Act
What is 'Computer Misuse'?

The Computer Misuse act: States it is illegal to perform :

Unauthorised access to computer material
Unauthorised access with the intent to modify or impair
Unauthorised access with the intent to commit further crime

Slide 7 - Diapositive

What do you think Malware is?

Slide 8 - Question ouverte

Malware
Mal = Malicious
ware = software
Software that is specifically made to disrupt, damage or gain unauthorised access to a computer system

Slide 9 - Diapositive

Types of Malware?

Slide 10 - Carte mentale

MALWARE
NOT MALWARE
Firewall
Spyware
Virus
Compression
Trojan
Worm
Encryption
Compiler
Ransomware

Slide 11 - Question de remorquage

Did you know?
  • 39% of UK businesses reported suffering a cyber attack in 2022.

  • In the year ending March 2022, there were an estimated 1.6 million (1,633,000) incidents of computer misuse experienced by adults aged 18 and over in England and Wales.

  • Garibaldi was a victim to a cyber attack...

Slide 12 - Diapositive

What do we do as a school to stop 'Computer Misuse'?

Slide 13 - Diapositive

Manipulating the person
Not all computer law is around the device and equipment
Many attacks are on the individual
This attack is known as SOCIAL ENGINEERING

Slide 14 - Diapositive

Phishing - What is it and how to spot it?

Slide 15 - Diapositive

GDPR (General Data Protection Regulation) 
GDPR (General Data Protection Regulation), is a law that protects our data. 
so any information about you personally 

It governs the collection, use, and storage of personal data across the UK and and Europe.

Slide 16 - Diapositive

Slide 17 - Vidéo

What happens if we do not follow the GDPR?

Slide 18 - Diapositive

What could happen if you don't follow the rules...
  • Legal Penalties: Fines

  • Disciplinary/loss of job

  • Reputational Damage: Your company gets a bad rep so people less likely to use it

  • Business Restrictions: In extreme cases the company might be restricted from doing certain things

There are many more...


Slide 19 - Diapositive

What does the acronym GDPR stand for?
A
General Data Protection Regulation
B
Guarded Data Prevention Rules
C
General Data Prevention Rules
D
Generic Device for Protecting Rules

Slide 20 - Quiz

Do you know what the word 'Copyright' means?

Slide 21 - Diapositive

Reading Task
You have a few minutes to read THIS LINK
Consider the following questions:
  • What is copyright
  • How do you follow this law
You will then be asked to answer without the site

Slide 22 - Diapositive

What is copyright (no referring back to the site) ?

Slide 23 - Question ouverte

Copyright, Designs and Patents Act 1988
  • It provides legal protection intellectual property :
  1. original creative works, 
  2. designs, 
  3. and inventions.

  •  It gives creators exclusive rights to control their intellectual property

If you intend to use someone else's intellectual property you should:
  • Get permission (which could involve a cost)

Slide 24 - Diapositive

Famous Real life example

Slide 25 - Diapositive

What is the purpose of GDPR?
A
To restrict access to personal data by individuals
B
To promote data breaches
C
To allow companies to collect and use personal data freely
D
To protect personal data and privacy of EU citizens

Slide 26 - Quiz

Staying the right side of copyright law
Use royalty free sites, for example:
  • www.pixabay.com
  • www.pexels.com

Slide 27 - Diapositive

What is the purpose of the Computer Misuse Act?
A
Stops Hackers and malware
B
Makes it illegal to gain unauthorised access to computer systems
C
Protect all personal data that is stored about someone
D
Makes it illegal to make viruses

Slide 28 - Quiz

Extension
Using your research skills look into these three malware threats:
  • Virus
  • Worm
  • Trojan

Create a resource that compares the three.  What do they do and how are they different?

Slide 29 - Diapositive