Uppingham Community College

Slides:



Advertisements
Similar presentations
Northside I.S.D. Acceptable Use Policy
Advertisements

Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
POSSIBLE THREATS TO DATA
1.8 Malpractice and Crime In this section you must be able to: Explain the consequences of malpractice and crime on information systems. Describe the possible.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
INTERNET SAFETY FOR STUDENTS
Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 6. Using Networks 1 Network Hardware - Hub Hub - A hub is used when you have.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
Prepared by: Nahed Al-Salah
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Legislation in ICT.
Legislation Who governs e-commerce?. E-commerce is regulated by laws and guidelines. These aim to ensure that sites operate effectively and that online.
Legalities of ICT Chapter 7.
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
INTERNET SAFETY FOR STUDENTS
Internet as Teaching Tool Kenneth R. Szulczyk Lecture 5.
The Legal Framework Can you work out which slide each bullet point should go on?!
Issues Raised by ICT.
Computer Misuse Act (1990). What is Computer Misuse Act (1990)? The Computer Misuse Act of 1990 is a law in the UK that makes illegal certain activities,
Legislation For e-commerce to operate correctly, it needs to adhere to the relevant legislation. These laws protect both the business and the consumer.
I.C.T laws By Luke Honeyfield 12. Laws relating to I.C.T  Copyright, Design, Patents  Data protection ACT  Computer misuse ACT  Health and safety.
IT Security for Users By Matthew Moody.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Section 6 Theory Software Copyright, Viruses and Hacking.
Crime & Malpractice AS Module Heathcote Ch. 10.
Legal issues. Computer Misuse Act 1990 Deals with misuse of ICT systems.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Holiday Homework The school building may be closing early but this doesn’t mean that the learning has to stop. You teachers have set you work to do in.
Level 2 IT Users Qualification – Unit 1 Improving Productivity Cory Street.
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
To understand: The ingredients of the news;  The difference between fact and opinion;  How to keep news safe and legal;  How to use appropriate questions;
ISquad Instructional Support Get Going With File Management for PCs.
Internet Safety Internet Safety LPM
Teacher Rooming Equipment Rules / Expectations Login / Passwords Technical Issues Homework Printing.
LEGISLATION. DATA PROTECTION ACT (1998) The aim of this act give people the right to know what information is held about them. It also sets out rules.
Computer crimes.
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
Week 2: Video Project W301 Technology Integration in Teaching (Fall 2007) Chun-Yi Lin.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Computing, Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
Computer Misuse Act 1990 Anti-hacking legislation.
Learning Objectives Can I discuss the copyright law Can I identify why organisations must protect data Can I describe how legislation affect computer use.
Moral, Ethical, legal and cultural issues How technical innovation leads to moral, ethical, legal and cultural issues How our own moral and ethical beliefs.
Judith Davis – Community Safety Officer Northumberland County Council.
Internet Safety Is this how to protect children? Justine Sutcliffe.
Learning Intention Legislations impact on security of information
The Computer Misuse Act 1990
Legislation in ICT.
Anti-hacking legislation
TB2 Lesson 5 Data Protection
Cyber Crime Today we will look at: Different types of cyber-crime
Uppingham Community College
De Bohun Primary School
How To Help Your Child With Homework
Ethical, Legal, Cultural and Environmental Concerns
The dark web By Riley. Sampare.
Legislation in ICT.
Computer Misuse Act 1990 GCSE ICT.
How it affects policies and procedures
LO1 - Know about aspects of cyber security
Uppingham Community College
Uppingham Community College
Uppingham Community College
The social impact of ICT on society
Uppingham Community College
Presentation transcript:

Uppingham Community College Computer Misuse Act

Teacher Lead Activity Computer Misuse Act 1990 What have we found out Teacher Lead Activity Computer Misuse Act 1990 The students will have completed some homework which requires them to find out more about the computer misuse act 1990. Lets find out what they’ve learnt before watching the video. You can snow ball (paper fight) / Write on desks / post its – something which really gets the students engaged. I have a number of board games if you’re interested.

When is it right to hack? YOUTUBE VIDEO CLIP In groups discuss Are ‘Anonymous’ right to be exposing members of ISIS around the world?

What have we found out YOUTUBE VIDEO CLIP In groups discuss Are ‘Anonymous’ right to be exposing members of ISIS around the world?

Computer Misuse Act Specifically designed to control hackers and the illegal access to files. Hackers used to be seen as the cheeky child who would annoy you. People soon began to realise that they pose a serious threat to security. The act does 3 things: It is illegal to access files that you have no right to access. It is illegal to access files for use for more serious crimes such as fraud and blackmail. It is illegal to change any data that does not belong to you. Includes planting viruses and deleting files.

WHY DO WE HAVE LAWS LIKE THE COMPUTER MISUSE ACT? Examples 1) A student hacks into SIMS to impress his friends….. Is this a crime…. 3) Later he decides he’s going to log back onto the system and alter his grades…. He doesn’t manage to find his grades…… Is this a crime? WHY DO WE HAVE LAWS LIKE THE COMPUTER MISUSE ACT? 2) A week later he succeeds and finds his report card… he alters his grade….. This is a crime Unauthorised modification of data Unauthorised access Unauthorised modification of data Unauthorised access with intent

Can you find any other laws and legislation? Computer misuse act – Homework Data protection act Freedom of information act Copyright, Designs and Patents act Electronic Communications Act Use a search engine to find some information. You must reference what you have found by including the website address. Your teacher will show you how to use a search engine efficiently Teach students about how they can use the advanced search or speech marks to improve their search results.

New Success Criteria Use a search engine effectively Reference the website address Interpret results into your own worlds Show that you have saved your research in a folder with a realistic name. Present the information in a format which is easier for your audience. Use this success criteria to make changes to your poster and make sure that you have the correct target audience The criteria for this piece of work is checking that they can reference information they find on the internet.

Plenary Teacher Lead Activity