SlideShare una empresa de Scribd logo
1 de 7
UNDERSTANDING ISSUES
                         Unit 2
RELATING TO THE USE OF   Legal issues

         INFORMATION
LEGISLATION

Data Protection Act 1998

Freedom of Information Act 2000

Computer Misuse Act 1990

Copyright
YOU TUBE

 $1 billion dollar lawsuit launched against You Tube in 2007
 You Tube was making millions of dollars profit by selling
  advertising space to its growing number of users
 The company filing the lawsuit was Viacom who also had a video
  sharing website and wanted to attract more ‘traffic’
 Viacom owned a lot of the material appearing on the You Tube
  site
 Which law has been breached?

                              • Data Protection Act 1998
                              • Freedom of Information Act 2000
                              • Computer Misuse Act 1990
                              • Copyright
BIN LADEN PHOTOGRAPHS

 Photographs were taken of Bin Laden’s body when he was killed
  in a special forces raid in 2011
 The photographs were taken for official reasons. So that his
  identity could be verified
 There has been much debate about whether or not these images
  should be allowed into the public domain and the effects this
  may have
 Which law is involved in this case?

                              • Data Protection Act 1998
                              • Freedom of Information Act 2000
                              • Computer Misuse Act 1990
                              • Copyright
CANOE MAN’S EMAIL HACKED

 Sky news senior executives gave journalists permission to hack
  into the email account of John Darwin
 Sky claimed it was in the ‘public interest ’ to do this
 They used the information on their website and in TV reports
 Having this extra information would give Sky a competitive edge
  over other broadcasters
 Which law has been breached on this occasion?


                               • Data Protection Act 1998
                               • Freedom of Information Act 2000
                               • Computer Misuse Act 1990
                               • Copyright
SONY PLAYSTATION

 In 2011 user account information was stolen from the Playstation
  Network when someone hacked into their site
 Personal details such as name, address, passwords and possibly
  credit card information was stolen
 A resident of Alabama filed a lawsuit against Sony and several
  other American states are involved in investigations
 Which law has been breached?



                               • Data Protection Act 1998
                               • Freedom of Information Act 2000
                               • Computer Misuse Act 1990
                               • Copyright
PAIRS TASK

   Choose one of the given cases to investigate
   You will produce two pages for a leaflet on legal issues
   Find all the key information that you want to include
   Decide on the order it will appear in the leaflet
   Make the leaflet


   DO NOT COPY AND PASTE ! Use quotes if you need to
   Maximum font size 14
   Maximum number of pictures 2
   Check spelling
   Make sure what you write makes sense!

Más contenido relacionado

La actualidad más candente

History of Scan Commerce
History of Scan Commerce History of Scan Commerce
History of Scan Commerce renaeheib
 
Darknet: We Are Not Alone
Darknet: We Are Not AloneDarknet: We Are Not Alone
Darknet: We Are Not AlonemeJ_madayag
 
How hackers embarrassed technology
How hackers embarrassed technologyHow hackers embarrassed technology
How hackers embarrassed technologyTricon Infotech
 
Presentation Ict
Presentation IctPresentation Ict
Presentation Ictsafa
 
Glyn Moody - from openness to abundance
Glyn Moody - from openness to abundanceGlyn Moody - from openness to abundance
Glyn Moody - from openness to abundanceglynmoody
 
The Electronic struggle
The Electronic struggleThe Electronic struggle
The Electronic struggleDavid Lewis
 
Piracypowerpoint
PiracypowerpointPiracypowerpoint
Piracypowerpointrockinmole
 
Internet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law Center
 
Copyright And Piracy
Copyright And PiracyCopyright And Piracy
Copyright And Piracymsjasmin
 
20 Years of Internet law @Gikii
20 Years of Internet law @Gikii20 Years of Internet law @Gikii
20 Years of Internet law @GikiiChris Marsden
 
The internet
The internetThe internet
The internetReginawal
 

La actualidad más candente (20)

Digital Piracy
Digital PiracyDigital Piracy
Digital Piracy
 
Music Piracy
Music PiracyMusic Piracy
Music Piracy
 
History of Scan Commerce
History of Scan Commerce History of Scan Commerce
History of Scan Commerce
 
Darknet: We Are Not Alone
Darknet: We Are Not AloneDarknet: We Are Not Alone
Darknet: We Are Not Alone
 
How hackers embarrassed technology
How hackers embarrassed technologyHow hackers embarrassed technology
How hackers embarrassed technology
 
Cyberlaws report
Cyberlaws reportCyberlaws report
Cyberlaws report
 
Presentation Ict
Presentation IctPresentation Ict
Presentation Ict
 
Glyn Moody - from openness to abundance
Glyn Moody - from openness to abundanceGlyn Moody - from openness to abundance
Glyn Moody - from openness to abundance
 
Piracy
PiracyPiracy
Piracy
 
Digital law
Digital lawDigital law
Digital law
 
Washington's Privacy Tango
Washington's Privacy TangoWashington's Privacy Tango
Washington's Privacy Tango
 
The Electronic struggle
The Electronic struggleThe Electronic struggle
The Electronic struggle
 
Piracypowerpoint
PiracypowerpointPiracypowerpoint
Piracypowerpoint
 
Internet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP Institute
 
Copyright And Piracy
Copyright And PiracyCopyright And Piracy
Copyright And Piracy
 
Media piracy
Media piracyMedia piracy
Media piracy
 
20 Years of Internet law @Gikii
20 Years of Internet law @Gikii20 Years of Internet law @Gikii
20 Years of Internet law @Gikii
 
History of computer crime
History of computer crimeHistory of computer crime
History of computer crime
 
Apple vs. FBI
Apple vs. FBIApple vs. FBI
Apple vs. FBI
 
The internet
The internetThe internet
The internet
 

Destacado

File formats
File formatsFile formats
File formatsMrsNunn
 
Editing techniques
Editing techniquesEditing techniques
Editing techniquesMrsNunn
 
Lesson 5
Lesson 5Lesson 5
Lesson 5MrsNunn
 
Exam system
Exam systemExam system
Exam systemMrsNunn
 
Planning2
Planning2Planning2
Planning2MrsNunn
 
2 questioning techniques v1
2 questioning techniques v12 questioning techniques v1
2 questioning techniques v1MrsNunn
 
Cambridge technicals in it
Cambridge technicals in itCambridge technicals in it
Cambridge technicals in itMrsNunn
 
Lesson 6 dfd issues
Lesson 6 dfd issuesLesson 6 dfd issues
Lesson 6 dfd issuesMrsNunn
 
Lo3=p4, p5, m2, d2
Lo3=p4, p5, m2, d2Lo3=p4, p5, m2, d2
Lo3=p4, p5, m2, d2sparkeyrob
 

Destacado (9)

File formats
File formatsFile formats
File formats
 
Editing techniques
Editing techniquesEditing techniques
Editing techniques
 
Lesson 5
Lesson 5Lesson 5
Lesson 5
 
Exam system
Exam systemExam system
Exam system
 
Planning2
Planning2Planning2
Planning2
 
2 questioning techniques v1
2 questioning techniques v12 questioning techniques v1
2 questioning techniques v1
 
Cambridge technicals in it
Cambridge technicals in itCambridge technicals in it
Cambridge technicals in it
 
Lesson 6 dfd issues
Lesson 6 dfd issuesLesson 6 dfd issues
Lesson 6 dfd issues
 
Lo3=p4, p5, m2, d2
Lo3=p4, p5, m2, d2Lo3=p4, p5, m2, d2
Lo3=p4, p5, m2, d2
 

Similar a Lesson 1

Similar a Lesson 1 (8)

Regulating The Internet
Regulating The InternetRegulating The Internet
Regulating The Internet
 
Polinter08
Polinter08Polinter08
Polinter08
 
Cyberlaws
CyberlawsCyberlaws
Cyberlaws
 
How to keep women safe, online?
How to keep women safe, online?How to keep women safe, online?
How to keep women safe, online?
 
9694 thinking skills wikileaks
9694 thinking skills wikileaks9694 thinking skills wikileaks
9694 thinking skills wikileaks
 
Black berry
Black berryBlack berry
Black berry
 
Internet and Securities
Internet and SecuritiesInternet and Securities
Internet and Securities
 
Ch01
Ch01Ch01
Ch01
 

Más de MrsNunn

Page Plans
Page PlansPage Plans
Page PlansMrsNunn
 
Delivery formats
Delivery formatsDelivery formats
Delivery formatsMrsNunn
 
Production process
Production processProduction process
Production processMrsNunn
 
Curriculum virtae
Curriculum virtaeCurriculum virtae
Curriculum virtaeMrsNunn
 
Questioningv2
Questioningv2Questioningv2
Questioningv2MrsNunn
 
2 questioning techniques v1
2 questioning techniques v12 questioning techniques v1
2 questioning techniques v1MrsNunn
 
Principles and barriers
Principles and barriersPrinciples and barriers
Principles and barriersMrsNunn
 
P4 showing ideas for the website
P4 showing ideas for the websiteP4 showing ideas for the website
P4 showing ideas for the websiteMrsNunn
 
P4 ideas for a social media site
P4 ideas for a social media siteP4 ideas for a social media site
P4 ideas for a social media siteMrsNunn
 
P1 social media products
P1 social media productsP1 social media products
P1 social media productsMrsNunn
 
P3 commercial uses of social media sites
P3 commercial uses of social media sitesP3 commercial uses of social media sites
P3 commercial uses of social media sitesMrsNunn
 
P2 positive and negative effects
P2 positive and negative effectsP2 positive and negative effects
P2 positive and negative effectsMrsNunn
 
P1 social media products
P1 social media productsP1 social media products
P1 social media productsMrsNunn
 
Lo2 ideas for a new social media products
Lo2 ideas for a new social media productsLo2 ideas for a new social media products
Lo2 ideas for a new social media productsMrsNunn
 
Lo2 ideas for a new social media products
Lo2 ideas for a new social media productsLo2 ideas for a new social media products
Lo2 ideas for a new social media productsMrsNunn
 
P3 commercial uses of social media sites
P3 commercial uses of social media sitesP3 commercial uses of social media sites
P3 commercial uses of social media sitesMrsNunn
 
P3 commercial uses of social media sites
P3 commercial uses of social media sitesP3 commercial uses of social media sites
P3 commercial uses of social media sitesMrsNunn
 
P2 positive and negative effects
P2 positive and negative effectsP2 positive and negative effects
P2 positive and negative effectsMrsNunn
 
P1 social media products
P1 social media productsP1 social media products
P1 social media productsMrsNunn
 

Más de MrsNunn (20)

Page Plans
Page PlansPage Plans
Page Plans
 
Delivery formats
Delivery formatsDelivery formats
Delivery formats
 
Production process
Production processProduction process
Production process
 
Sources
SourcesSources
Sources
 
Curriculum virtae
Curriculum virtaeCurriculum virtae
Curriculum virtae
 
Questioningv2
Questioningv2Questioningv2
Questioningv2
 
2 questioning techniques v1
2 questioning techniques v12 questioning techniques v1
2 questioning techniques v1
 
Principles and barriers
Principles and barriersPrinciples and barriers
Principles and barriers
 
P4 showing ideas for the website
P4 showing ideas for the websiteP4 showing ideas for the website
P4 showing ideas for the website
 
P4 ideas for a social media site
P4 ideas for a social media siteP4 ideas for a social media site
P4 ideas for a social media site
 
P1 social media products
P1 social media productsP1 social media products
P1 social media products
 
P3 commercial uses of social media sites
P3 commercial uses of social media sitesP3 commercial uses of social media sites
P3 commercial uses of social media sites
 
P2 positive and negative effects
P2 positive and negative effectsP2 positive and negative effects
P2 positive and negative effects
 
P1 social media products
P1 social media productsP1 social media products
P1 social media products
 
Lo2 ideas for a new social media products
Lo2 ideas for a new social media productsLo2 ideas for a new social media products
Lo2 ideas for a new social media products
 
Lo2 ideas for a new social media products
Lo2 ideas for a new social media productsLo2 ideas for a new social media products
Lo2 ideas for a new social media products
 
P3 commercial uses of social media sites
P3 commercial uses of social media sitesP3 commercial uses of social media sites
P3 commercial uses of social media sites
 
P3 commercial uses of social media sites
P3 commercial uses of social media sitesP3 commercial uses of social media sites
P3 commercial uses of social media sites
 
P2 positive and negative effects
P2 positive and negative effectsP2 positive and negative effects
P2 positive and negative effects
 
P1 social media products
P1 social media productsP1 social media products
P1 social media products
 

Lesson 1

  • 1. UNDERSTANDING ISSUES Unit 2 RELATING TO THE USE OF Legal issues INFORMATION
  • 2. LEGISLATION Data Protection Act 1998 Freedom of Information Act 2000 Computer Misuse Act 1990 Copyright
  • 3. YOU TUBE  $1 billion dollar lawsuit launched against You Tube in 2007  You Tube was making millions of dollars profit by selling advertising space to its growing number of users  The company filing the lawsuit was Viacom who also had a video sharing website and wanted to attract more ‘traffic’  Viacom owned a lot of the material appearing on the You Tube site  Which law has been breached? • Data Protection Act 1998 • Freedom of Information Act 2000 • Computer Misuse Act 1990 • Copyright
  • 4. BIN LADEN PHOTOGRAPHS  Photographs were taken of Bin Laden’s body when he was killed in a special forces raid in 2011  The photographs were taken for official reasons. So that his identity could be verified  There has been much debate about whether or not these images should be allowed into the public domain and the effects this may have  Which law is involved in this case? • Data Protection Act 1998 • Freedom of Information Act 2000 • Computer Misuse Act 1990 • Copyright
  • 5. CANOE MAN’S EMAIL HACKED  Sky news senior executives gave journalists permission to hack into the email account of John Darwin  Sky claimed it was in the ‘public interest ’ to do this  They used the information on their website and in TV reports  Having this extra information would give Sky a competitive edge over other broadcasters  Which law has been breached on this occasion? • Data Protection Act 1998 • Freedom of Information Act 2000 • Computer Misuse Act 1990 • Copyright
  • 6. SONY PLAYSTATION  In 2011 user account information was stolen from the Playstation Network when someone hacked into their site  Personal details such as name, address, passwords and possibly credit card information was stolen  A resident of Alabama filed a lawsuit against Sony and several other American states are involved in investigations  Which law has been breached? • Data Protection Act 1998 • Freedom of Information Act 2000 • Computer Misuse Act 1990 • Copyright
  • 7. PAIRS TASK  Choose one of the given cases to investigate  You will produce two pages for a leaflet on legal issues  Find all the key information that you want to include  Decide on the order it will appear in the leaflet  Make the leaflet  DO NOT COPY AND PASTE ! Use quotes if you need to  Maximum font size 14  Maximum number of pictures 2  Check spelling  Make sure what you write makes sense!