SlideShare a Scribd company logo
Data Protection Act
Core
1. Define the term personal data
and give some examples
2. Define the term sensitive data
and give some examples
3. What are the eight principles of
the Data Protection Act?
Next steps
1. Why do we need the Data
Protection Act?
2. How does the Data Protection
Act apply to Computer Science?
3. If a company breaches the Data
Protection Act, what kind of
punishments can they face?
4. Who are the ICO and how do
they apply to the Data
Protection Act?
Mastery
1. In 2018 the GDPR bought in
new legislation for Data
Protection. Explain how the
GDPR expands Data Protecion
law.
2. Explain some of the logical and
physical protection measures
that companies can deploy to
help protect customer data.
3. Explain the term 'right to be
forgotten' in the context of
Data Protection.
Computer Misuse Act
Core
1. Ientify both physical and logical
threats to computer systems
2. Identify physical ways that
computer systems can be
protected
3. Identify logical ways that
computer systems can be
protected
Next steps
1. What are the three
components of the Computer
Misuse Act?
2. Explore the different
punishments criminals may face
if they break the Computer
Misuse Act.
3. Research a famous case
involving the Computer Misuse
Act. Summarise the crime that
occurred and the punishment
that was handed out.
Mastery
1. Evaluate the statement 'the
Computer Misuse Act is limited
in its scope and scale of
bringing international Cyber
Criminals to justice'.
Copyright Design and Patents Act
Core
Describe the following terms:
1. Copyright
2. Patent
3. Intellectual property
Why do we need Copyright law?
Identify ‘artifacts’ that are covered
by Copyright law.
Next steps
1. What is Creative Commons?
2. What are the four components
of Creative Commons?
3. How does Copyright help
creators of digital works?
4. How long does Copyright last
for?
Mastery
1. How does Creative Commons
link with Copyright law?
2. What is DRM?
3. How does DRM work?
Freedom of Information Act
Core
1. Define the term public
organisation.
2. Why can't you send a Freedom
of Information Act request to
private businesses?
3. Who can make a Freedom of
Information Act request?
Next steps
1. Why is the Freedom of
Information Act perceived as a
law which benefits society?
2. How do you make a Freedom of
Information Act request?
3. What exemptions are there
under the Freedom of
Information Act?
Mastery
1. Research two examples
of famous Freedom of
Information Act requests
2. Summarise what happened in
each case
3. Explain the implications these
two FOIA requests have had on
the affected public
organisation. How has policy
now changed?
Investigatory Powers Act
Core
1. What is the purpose of IPA?
2. Who is IPA targeted at?
3. Summarise the key points from
part 1, 3 and 4 of the IP Act.
Next steps
1. How does IPA apply to
Computer Science?
2. Explain the limitations of
'intercepting' communication.
3. Explain the powers that
authorities have under IPA.
Mastery
1. The IPA has been dubbed
'snoopers charter'. Explain the
reasons behind this.
2. Explain why there is
controversy around IPA in the
context of 'big brother'.
Cultural issues
Core
1. Define the term Internet of
Things.
2. Describe how the Internet of
Things may lead to over-use of
data and technology.
3. How many of the top 25 largest
companies in the world are
technology companies? What
does this tell us about society
today?
Next steps
1. Explain the term 'big brother'
in within the context of
Computer Science.
2. Define the term Globalisation.
3. How is Globalisation
impacting on different cultures
around the world, specifically
related to technology.
Mastery
1. Define the concept of Big Data.
2. How is Big Data being used as a
force for good in the world
today?
3. How might Big Data be used as
a force for bad in the world
today?
4. How is technology impacting on
our right to a private life?

More Related Content

Similar to Ethics and Laws (1).pptx

The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
Rajesh Sakhare
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
Rajesh Sakhare
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
Rajesh Sakhare
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
Rajesh Sakhare
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
Rajesh Sakhare
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
Rajesh Sakhare
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
Rajesh Sakhare
 
Chapter 3 ethics and privacy
Chapter 3 ethics and privacyChapter 3 ethics and privacy
Chapter 3 ethics and privacy
mrzapper
 
Cyber jurisdiction in India
Cyber jurisdiction in IndiaCyber jurisdiction in India
Cyber jurisdiction in India
shamvisingh
 
E Commerce Platform Data Ownership and Legal Protection
E Commerce Platform Data Ownership and Legal ProtectionE Commerce Platform Data Ownership and Legal Protection
E Commerce Platform Data Ownership and Legal Protection
ijtsrd
 
Running head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docx
Running head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docxRunning head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docx
Running head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docx
jeanettehully
 
Ronit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptxRonit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptx
ManuGupta344215
 
Chapter2
Chapter2Chapter2
Chapter2
Pibi Lu
 
Data Protection in India
Data Protection in IndiaData Protection in India
Data Protection in India
Home
 
Legal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information SecurityLegal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information Security
Gamentortc
 
Legal Issues in Research Data Collection and Sharing: An Introduction by EUDA...
Legal Issues in Research Data Collection and Sharing: An Introduction by EUDA...Legal Issues in Research Data Collection and Sharing: An Introduction by EUDA...
Legal Issues in Research Data Collection and Sharing: An Introduction by EUDA...
EUDAT
 
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
IRJET Journal
 
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
IRJET Journal
 
Data protection act
Data protection act Data protection act
Data protection act
Iqbal Bocus
 

Similar to Ethics and Laws (1).pptx (19)

The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
Chapter 3 ethics and privacy
Chapter 3 ethics and privacyChapter 3 ethics and privacy
Chapter 3 ethics and privacy
 
Cyber jurisdiction in India
Cyber jurisdiction in IndiaCyber jurisdiction in India
Cyber jurisdiction in India
 
E Commerce Platform Data Ownership and Legal Protection
E Commerce Platform Data Ownership and Legal ProtectionE Commerce Platform Data Ownership and Legal Protection
E Commerce Platform Data Ownership and Legal Protection
 
Running head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docx
Running head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docxRunning head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docx
Running head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docx
 
Ronit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptxRonit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptx
 
Chapter2
Chapter2Chapter2
Chapter2
 
Data Protection in India
Data Protection in IndiaData Protection in India
Data Protection in India
 
Legal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information SecurityLegal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information Security
 
Legal Issues in Research Data Collection and Sharing: An Introduction by EUDA...
Legal Issues in Research Data Collection and Sharing: An Introduction by EUDA...Legal Issues in Research Data Collection and Sharing: An Introduction by EUDA...
Legal Issues in Research Data Collection and Sharing: An Introduction by EUDA...
 
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
 
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
 
Data protection act
Data protection act Data protection act
Data protection act
 

Recently uploaded

Hindu Marriage Act hhhjjdsruog, 1955.pdf
Hindu Marriage Act hhhjjdsruog, 1955.pdfHindu Marriage Act hhhjjdsruog, 1955.pdf
Hindu Marriage Act hhhjjdsruog, 1955.pdf
mayurpandit108
 
Human Rights- Unit wise Jurisprudence of Human Rights Its nature, theories, ...
Human Rights- Unit wise Jurisprudence of Human Rights  Its nature, theories, ...Human Rights- Unit wise Jurisprudence of Human Rights  Its nature, theories, ...
Human Rights- Unit wise Jurisprudence of Human Rights Its nature, theories, ...
amarnathkhatokar
 
Esipf Consultants: Best Epf Consultancy Service In Delhi
Esipf Consultants: Best Epf Consultancy Service In DelhiEsipf Consultants: Best Epf Consultancy Service In Delhi
Esipf Consultants: Best Epf Consultancy Service In Delhi
esipfconsultantsoffp
 
Legal Reforms of Jayasthiti Malla in Nepalese History.pptx
Legal Reforms of Jayasthiti Malla in Nepalese History.pptxLegal Reforms of Jayasthiti Malla in Nepalese History.pptx
Legal Reforms of Jayasthiti Malla in Nepalese History.pptx
Asmeeta4
 
Contract Law - for MBA Subject at PIM SJP
Contract Law  - for MBA Subject at PIM SJPContract Law  - for MBA Subject at PIM SJP
Contract Law - for MBA Subject at PIM SJP
RMHaroon1
 
Proforma B in Panchkula RERA Complaint Authority
Proforma B in Panchkula RERA Complaint AuthorityProforma B in Panchkula RERA Complaint Authority
Proforma B in Panchkula RERA Complaint Authority
Satish Mishra LegalSeva
 
UofT biyezheng degree offer diploma Transcript
UofT biyezheng degree offer diploma TranscriptUofT biyezheng degree offer diploma Transcript
UofT biyezheng degree offer diploma Transcript
qpeqmso
 
The Art Institute of California degree offer diploma Transcript
The Art Institute of California degree offer diploma TranscriptThe Art Institute of California degree offer diploma Transcript
The Art Institute of California degree offer diploma Transcript
qgoomz
 
The Canadian Atlantic Immigration Program (AIP)
The Canadian Atlantic Immigration Program (AIP)The Canadian Atlantic Immigration Program (AIP)
The Canadian Atlantic Immigration Program (AIP)
BridgeWest.eu
 
The Role of Police Misconduct Attorneys in Seeking Justice
The Role of Police Misconduct Attorneys in Seeking JusticeThe Role of Police Misconduct Attorneys in Seeking Justice
The Role of Police Misconduct Attorneys in Seeking Justice
Steering Law
 
Buckingham degree offer diploma Transcript
Buckingham degree offer diploma TranscriptBuckingham degree offer diploma Transcript
Buckingham degree offer diploma Transcript
geesuk
 
Here's the Latest Todd Rokita Grievance That was Filed
Here's the Latest Todd Rokita Grievance  That was FiledHere's the Latest Todd Rokita Grievance  That was Filed
Here's the Latest Todd Rokita Grievance That was Filed
Abdul-Hakim Shabazz
 
MAKING LARGE-SCALE SOLAR PROJECTS VIABLE IN VIETNAM: INNOVATIVE APPROACHES IN...
MAKING LARGE-SCALE SOLAR PROJECTS VIABLE IN VIETNAM: INNOVATIVE APPROACHES IN...MAKING LARGE-SCALE SOLAR PROJECTS VIABLE IN VIETNAM: INNOVATIVE APPROACHES IN...
MAKING LARGE-SCALE SOLAR PROJECTS VIABLE IN VIETNAM: INNOVATIVE APPROACHES IN...
Dr. Oliver Massmann
 
RERA Panchkula Registration Late Fee Info
RERA Panchkula Registration Late Fee InfoRERA Panchkula Registration Late Fee Info
RERA Panchkula Registration Late Fee Info
Satish Mishra LegalSeva
 
Law-Commission-Report-267-on-Hate-Speech.pdf
Law-Commission-Report-267-on-Hate-Speech.pdfLaw-Commission-Report-267-on-Hate-Speech.pdf
Law-Commission-Report-267-on-Hate-Speech.pdf
bhavenpr
 
Dallas Criminal Attorney | Frisco Criminal Attorney- Reggie London
Dallas Criminal Attorney | Frisco Criminal Attorney- Reggie LondonDallas Criminal Attorney | Frisco Criminal Attorney- Reggie London
Dallas Criminal Attorney | Frisco Criminal Attorney- Reggie London
ReggieLondon Lawyer
 
WSDFSDFDFSDFSDFSDFDSFSDGGGGSGASGDDGGDGDSGSG
WSDFSDFDFSDFSDFSDFDSFSDGGGGSGASGDDGGDGDSGSGWSDFSDFDFSDFSDFSDFDSFSDGGGGSGASGDDGGDGDSGSG
WSDFSDFDFSDFSDFSDFDSFSDGGGGSGASGDDGGDGDSGSG
detoate2
 
Petition for Writ of Certiorari.pdf
Petition for Writ of Certiorari.pdfPetition for Writ of Certiorari.pdf
Petition for Writ of Certiorari.pdf
almondtree2525
 
Untitled document criminal history page.pdf
Untitled document criminal history page.pdfUntitled document criminal history page.pdf
Untitled document criminal history page.pdf
braydenstoch777
 
VIETNAM FROM A FRONTIER MARKET TO AN EMERGING MARKET – RECOMMENDATIONS TO ACH...
VIETNAM FROM A FRONTIER MARKET TO AN EMERGING MARKET – RECOMMENDATIONS TO ACH...VIETNAM FROM A FRONTIER MARKET TO AN EMERGING MARKET – RECOMMENDATIONS TO ACH...
VIETNAM FROM A FRONTIER MARKET TO AN EMERGING MARKET – RECOMMENDATIONS TO ACH...
Dr. Oliver Massmann
 

Recently uploaded (20)

Hindu Marriage Act hhhjjdsruog, 1955.pdf
Hindu Marriage Act hhhjjdsruog, 1955.pdfHindu Marriage Act hhhjjdsruog, 1955.pdf
Hindu Marriage Act hhhjjdsruog, 1955.pdf
 
Human Rights- Unit wise Jurisprudence of Human Rights Its nature, theories, ...
Human Rights- Unit wise Jurisprudence of Human Rights  Its nature, theories, ...Human Rights- Unit wise Jurisprudence of Human Rights  Its nature, theories, ...
Human Rights- Unit wise Jurisprudence of Human Rights Its nature, theories, ...
 
Esipf Consultants: Best Epf Consultancy Service In Delhi
Esipf Consultants: Best Epf Consultancy Service In DelhiEsipf Consultants: Best Epf Consultancy Service In Delhi
Esipf Consultants: Best Epf Consultancy Service In Delhi
 
Legal Reforms of Jayasthiti Malla in Nepalese History.pptx
Legal Reforms of Jayasthiti Malla in Nepalese History.pptxLegal Reforms of Jayasthiti Malla in Nepalese History.pptx
Legal Reforms of Jayasthiti Malla in Nepalese History.pptx
 
Contract Law - for MBA Subject at PIM SJP
Contract Law  - for MBA Subject at PIM SJPContract Law  - for MBA Subject at PIM SJP
Contract Law - for MBA Subject at PIM SJP
 
Proforma B in Panchkula RERA Complaint Authority
Proforma B in Panchkula RERA Complaint AuthorityProforma B in Panchkula RERA Complaint Authority
Proforma B in Panchkula RERA Complaint Authority
 
UofT biyezheng degree offer diploma Transcript
UofT biyezheng degree offer diploma TranscriptUofT biyezheng degree offer diploma Transcript
UofT biyezheng degree offer diploma Transcript
 
The Art Institute of California degree offer diploma Transcript
The Art Institute of California degree offer diploma TranscriptThe Art Institute of California degree offer diploma Transcript
The Art Institute of California degree offer diploma Transcript
 
The Canadian Atlantic Immigration Program (AIP)
The Canadian Atlantic Immigration Program (AIP)The Canadian Atlantic Immigration Program (AIP)
The Canadian Atlantic Immigration Program (AIP)
 
The Role of Police Misconduct Attorneys in Seeking Justice
The Role of Police Misconduct Attorneys in Seeking JusticeThe Role of Police Misconduct Attorneys in Seeking Justice
The Role of Police Misconduct Attorneys in Seeking Justice
 
Buckingham degree offer diploma Transcript
Buckingham degree offer diploma TranscriptBuckingham degree offer diploma Transcript
Buckingham degree offer diploma Transcript
 
Here's the Latest Todd Rokita Grievance That was Filed
Here's the Latest Todd Rokita Grievance  That was FiledHere's the Latest Todd Rokita Grievance  That was Filed
Here's the Latest Todd Rokita Grievance That was Filed
 
MAKING LARGE-SCALE SOLAR PROJECTS VIABLE IN VIETNAM: INNOVATIVE APPROACHES IN...
MAKING LARGE-SCALE SOLAR PROJECTS VIABLE IN VIETNAM: INNOVATIVE APPROACHES IN...MAKING LARGE-SCALE SOLAR PROJECTS VIABLE IN VIETNAM: INNOVATIVE APPROACHES IN...
MAKING LARGE-SCALE SOLAR PROJECTS VIABLE IN VIETNAM: INNOVATIVE APPROACHES IN...
 
RERA Panchkula Registration Late Fee Info
RERA Panchkula Registration Late Fee InfoRERA Panchkula Registration Late Fee Info
RERA Panchkula Registration Late Fee Info
 
Law-Commission-Report-267-on-Hate-Speech.pdf
Law-Commission-Report-267-on-Hate-Speech.pdfLaw-Commission-Report-267-on-Hate-Speech.pdf
Law-Commission-Report-267-on-Hate-Speech.pdf
 
Dallas Criminal Attorney | Frisco Criminal Attorney- Reggie London
Dallas Criminal Attorney | Frisco Criminal Attorney- Reggie LondonDallas Criminal Attorney | Frisco Criminal Attorney- Reggie London
Dallas Criminal Attorney | Frisco Criminal Attorney- Reggie London
 
WSDFSDFDFSDFSDFSDFDSFSDGGGGSGASGDDGGDGDSGSG
WSDFSDFDFSDFSDFSDFDSFSDGGGGSGASGDDGGDGDSGSGWSDFSDFDFSDFSDFSDFDSFSDGGGGSGASGDDGGDGDSGSG
WSDFSDFDFSDFSDFSDFDSFSDGGGGSGASGDDGGDGDSGSG
 
Petition for Writ of Certiorari.pdf
Petition for Writ of Certiorari.pdfPetition for Writ of Certiorari.pdf
Petition for Writ of Certiorari.pdf
 
Untitled document criminal history page.pdf
Untitled document criminal history page.pdfUntitled document criminal history page.pdf
Untitled document criminal history page.pdf
 
VIETNAM FROM A FRONTIER MARKET TO AN EMERGING MARKET – RECOMMENDATIONS TO ACH...
VIETNAM FROM A FRONTIER MARKET TO AN EMERGING MARKET – RECOMMENDATIONS TO ACH...VIETNAM FROM A FRONTIER MARKET TO AN EMERGING MARKET – RECOMMENDATIONS TO ACH...
VIETNAM FROM A FRONTIER MARKET TO AN EMERGING MARKET – RECOMMENDATIONS TO ACH...
 

Ethics and Laws (1).pptx

  • 1. Data Protection Act Core 1. Define the term personal data and give some examples 2. Define the term sensitive data and give some examples 3. What are the eight principles of the Data Protection Act? Next steps 1. Why do we need the Data Protection Act? 2. How does the Data Protection Act apply to Computer Science? 3. If a company breaches the Data Protection Act, what kind of punishments can they face? 4. Who are the ICO and how do they apply to the Data Protection Act? Mastery 1. In 2018 the GDPR bought in new legislation for Data Protection. Explain how the GDPR expands Data Protecion law. 2. Explain some of the logical and physical protection measures that companies can deploy to help protect customer data. 3. Explain the term 'right to be forgotten' in the context of Data Protection.
  • 2. Computer Misuse Act Core 1. Ientify both physical and logical threats to computer systems 2. Identify physical ways that computer systems can be protected 3. Identify logical ways that computer systems can be protected Next steps 1. What are the three components of the Computer Misuse Act? 2. Explore the different punishments criminals may face if they break the Computer Misuse Act. 3. Research a famous case involving the Computer Misuse Act. Summarise the crime that occurred and the punishment that was handed out. Mastery 1. Evaluate the statement 'the Computer Misuse Act is limited in its scope and scale of bringing international Cyber Criminals to justice'.
  • 3. Copyright Design and Patents Act Core Describe the following terms: 1. Copyright 2. Patent 3. Intellectual property Why do we need Copyright law? Identify ‘artifacts’ that are covered by Copyright law. Next steps 1. What is Creative Commons? 2. What are the four components of Creative Commons? 3. How does Copyright help creators of digital works? 4. How long does Copyright last for? Mastery 1. How does Creative Commons link with Copyright law? 2. What is DRM? 3. How does DRM work?
  • 4. Freedom of Information Act Core 1. Define the term public organisation. 2. Why can't you send a Freedom of Information Act request to private businesses? 3. Who can make a Freedom of Information Act request? Next steps 1. Why is the Freedom of Information Act perceived as a law which benefits society? 2. How do you make a Freedom of Information Act request? 3. What exemptions are there under the Freedom of Information Act? Mastery 1. Research two examples of famous Freedom of Information Act requests 2. Summarise what happened in each case 3. Explain the implications these two FOIA requests have had on the affected public organisation. How has policy now changed?
  • 5. Investigatory Powers Act Core 1. What is the purpose of IPA? 2. Who is IPA targeted at? 3. Summarise the key points from part 1, 3 and 4 of the IP Act. Next steps 1. How does IPA apply to Computer Science? 2. Explain the limitations of 'intercepting' communication. 3. Explain the powers that authorities have under IPA. Mastery 1. The IPA has been dubbed 'snoopers charter'. Explain the reasons behind this. 2. Explain why there is controversy around IPA in the context of 'big brother'.
  • 6. Cultural issues Core 1. Define the term Internet of Things. 2. Describe how the Internet of Things may lead to over-use of data and technology. 3. How many of the top 25 largest companies in the world are technology companies? What does this tell us about society today? Next steps 1. Explain the term 'big brother' in within the context of Computer Science. 2. Define the term Globalisation. 3. How is Globalisation impacting on different cultures around the world, specifically related to technology. Mastery 1. Define the concept of Big Data. 2. How is Big Data being used as a force for good in the world today? 3. How might Big Data be used as a force for bad in the world today? 4. How is technology impacting on our right to a private life?