GCSE COMPUTER SCIENCE The Bigger Picture

Slides:



Advertisements
Similar presentations
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
Advertisements

Cookies Are small text filer with or unique ID tag that are embedded in a Web browser and saved on the user hard drive. Cookies also make it possible.
Legislation in ICT.
Software Copyright. Learning Objectives: By the end of this topic you should be able to:
HSC: All My Own Work Copyright.
By: Lauren Monteith, Derek Love, Cole Howell, and Reggie Jones.
GCSE Business Studies Unit 1 Introduction To Small Businesses Enterprise GCSE Business Studies Unit 1 Introduction to Small Businesses GCSE Business Studies.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
MPU 3252 Invention & Innovation Chapter 3: Let’s Invent & Innovate.
 Provide a basis for determining who in the organization should control access to a particular item of information.
Intellectual Property Rights: Protection or Monopolization?
Ethics & Responsibility
Stage 8 Protecting Your Idea
General Purpose Packages
Using UK Intellectual Property Office website and learning outcomes to structure brief but effective Intellectual Property Rights learning.
OCR Nationals Technological Innovation and E-Commerce Unit version.
Intellectual property (IP): the basics IP: what’s in it for you?
Protecting your product What is Intellectual Property (IP)? Legal rights that result from intellectual activity in the industrial, scientific, literary.
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
Intellectual Property. Copyright The right to copy or reproduce a created work –federal legislation gives this right to author or owner and controls infringements.
Chapter 11 The Role of Government in Our Economy Section 11.1 Government as Regulator.
Copyright Research By: Ben Renton BTEC Level 3 ICT.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 17 Software as Intellectual Property.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Developing Technology Glencoe Chapter 2 Section 3 Pages
Intellectual Property Laws and Fair Use Guidelines for Educational Multimedia.
1 Ethics of Computing MONT 113G, Spring 2012 Session 32 Software as Intellectual Property.
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
Computer Ethics Chapter 14 – Computers: Understanding Technology.
Unit Word Processing Exploring Ethics  Why copyrights are necessary  How to use technology ethically and legally  How to cite online sources You Will.
© 2010 Pearson Education, Inc. | Publishing as Prentice Hall. Computer Literacy for IC 3 Unit 3: Living Online Chapter 2: Searching for Information.
HSC: All My Own Work What is copyright and what does it protect? How does it relate to me?
Copyright and Intellectual Property Right 1. 2 Use and Protection of Intellectual Property in Online Business Intellectual property (general term) includes:
Patents Presented by Cutting Edge Homework Development.
M ORAL AND ETHICAL ISSUES. Use and Abuse of Personal and Private Data All the information stored on Computer is governed by law or legislation. The main.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
COPYRIGHT LAW. TYPES OF WORKS PROTECTED Literary works Musical works and lyrics Dramatic works Choreographic works Pictures, graphics, and sculptures.
COPYRIGHT.  Designs and Patents Act protects people’s original work from being used without their permission  All the original work is copy right. The.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
CODES OF CONDUCT IN GAMES DEVELOPMENT. By Nikku (Nick)
Copyright. What is Copyright? Copyright is a form of legal protection for the creator of a piece of work. It gives the creator (an author, composer, artist,
Let’s Talk about Intellectual Property Copyright Plagiarism Fair Use.
Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, music, movies, symbols, names, images, and designs.
ICT and the Law You need to know about 3 laws covering the use and misuse of ICT.
Unit 10.  Every year millions of new business ideas are developed worldwide. In the past successful business ideas developed by small startup business.
Intellectual property (IP) - What is it?. Intellectual property (IP) Refers to creations of the mind, such as inventions; literary and artistic works;
OCR Nationals - Unit 8 E-commerce – go to slide 11.
Chapter 15 Digital Citizenship Section 15.1 Communicating in a Digital Society.
Intro to Intellectual Property 3.0
How many of the following companies can you identify in 1 minute?
Legal, Ethical and Ownership issues
Paper 1 | GCSE Computer Science | Ethical, legal, cultural & environmental issues | Required knowledge How to investigate & discuss Computer Science technologies.
Handout 2: Data Protection and Copyright
Legislation in ICT.
Data Protection Act.
Legal and Ethical Issues in E-Commerce
What’s happening here? Olivia and Tom are studying for a Degree in Structural Engineering. Their task is to design a steel structure and calculate the.
Learning Area 1 Information And Communication Technology and Society
FUTURE JOBS READERS Level 2-② App Developers.
Unit 27 Web Server Scripting Extended Diploma in ICT
Ethical, Legal, Cultural and Environmental Concerns
Topic 6: The Bigger Picture
The Legal Environment Key legal issues in international business
Ethics & Privacy CSCI 101.
Legislation in ICT.
Ethical and Social Issues in Information Systems
Intellectual Property
Protecting Your Idea.
Chapter # 6 Intellectual Property
Copyright, Design and Patents Act (1988)
Presentation transcript:

GCSE COMPUTER SCIENCE The Bigger Picture 4.3 Legal, Ethical and Ownership Issues

Write these three definitions in your book. Legal, Ethical and Ownership Issues LEGAL Legal Issues are those that can land an offender with a heavy fine or prison sentence. ETHICAL Ethical issues are not necessarily breaking the law, but make an individual or organisation choose between something deemed right (ethical) or something deemed wrong (unethical). OWNERSHIP Ownership issues are those that can lead to a dispute between a copyright (or similar legislation) holder and a person or organisation infringing that copyright. ACTIVITY Write these three definitions in your book.

Privacy http://wadds.co.uk/2014/02/02/mobile-phone-family/ Read this article: http://wadds.co.uk/2014/02/02/mobile-phone-family/

Activity 1 Answer these questions using the article you have just read by Stephen Waddington. 1 How might advertisers make use of this location information? 2 What are the benefits of making location information available to others? 3 What are the drawbacks? 4 What does the algorithm developed by Birmingham University do?

goo.gl/M3e1cY Privacy Read this article: Activity 2 Answer these questions using the article by James Ball. 1 What personal information does Google hold about James? 2 What other information is there about James that he can’t find out about? 3 Google uses cookies to determine which adverts to display. What is a cookie?

goo.gl/aYTpt0 Legal Issues Read this article: Activity 3 Answer these questions using webpage above 1 What is the Computer Misuse Act? 2 What year was the act passed? 3 What three sections is the act broken down into? 4 Find an example of what each of the three sections stops you doing.

INTELLECTUAL PROPERTY IP and Patents INTELLECTUAL PROPERTY Refers to creation of the mind, such as inventions, literacy and artistic work. Also called IP. PATENT Is the exclusive right granted by a government to an inventor to manufacture, use or sell an invention for a certain number of years. ACTIVITY Write these two definitions in your book.

Answer the following questions Activity 4 Answer the following questions What is a patent? What can be patented? What can’t be patented? How long does a patent last? What often happens if someone doesn’t apply for a patent soon enough? What does the term ‘intellectual property’ (IP) mean? ARM’s revenue comes entirely from IP licensing. Explain how this works. What does ‘patent infringement’ entail? Why are there so many patent infringement cases relating to mobile phones being fought around the world? Why could ‘patent wars’ be a bad thing for consumers? Oracle and Google are also involved in an on-going dispute over a patent. What is it all about?

Acts

Copyright, Design and Patents Act Acts An Act of Parliament is a form of legislation. The three acts you need to understand are: 1 Data Protection Act 2 Copyright, Design and Patents Act 3 Computer Misuse Act

COPYRIGHT, DESIGN AND PATENTS ACT Acts DATA PROTECTION ACT The DPA is a law designed to protect personal data stored on computers or in an organised paper filing system. COPYRIGHT, DESIGN AND PATENTS ACT This act was introduced to protect the investment of time, money and effort by the people who create original pieces of work. COMPUTER MISUSE ACT This act was introduced to prevent an individual or organisation from accessing computers systems they are not authorised to. This is what hackers are guilty of! ACTIVITY Write these three definitions in your book.

Activity 5 Complete this table by identifying the relevant legislation for each scenario: What they did Relevant legislation 1. Jim hacked into the private Facebook account of someone he works with. Computer Misuse Act 2. OAW Inc produced a mobile that included a feature for which another company holds the patent. Copyright, Design and Patents Act 3. A hospital trust sold redundant computer equipment on an Internet auction site. It failed to erase the contents of the computers’ hard drives held sensitive patient data. Data Protection Act 4. Youssra developed a mobile phone app which Mike modified, rebranded and sold. 5. PKW failed to respond to Jo’s request to see all the personal data the company holds about her. 6. Unknown to visitors to PKW’s website, a cookie was automatically downloaded to their computer and used to record details of the pages they visited. 7. Two men hacked into the servers of a major record company and stole unreleased music. 8. A company imported and sold devices, which are widely used to help people to play unlicensed versions of games. Possible answers: Copyright, Design and Patents Act, Data Protection Act or Computer Misuse Act