Computing
Computer Science LearnITWithMrC ⛯ Year 7 Year 8 Year 9 GCSE
Responsive image

Lesson Video

74

Lesson Tasks

  • Watch the Lesson video
    Make notes if needed.
  • Open your Learning Journal
    Complete Task 1 in your Learning Journal
  • Complete the learning activities
    Make sure you complete the book tasks in your Unit Booklet
  • Complete End of Task Assessment
    Update your learning objectives

What do I need to Learn?

0 results forGuest
I need to learn how to understand and explain the current ethical legal and environmental impact and risks of digital technology on society.
I need to learn how to understand and explain data privacy Issues
I need to learn how to understand and explain the issues in regards to Cyber Security
I need to learn how to understand and explain the issues in regards to Mobile Technologies
I need to learn how to understand and explain the issues in regards to Cloud Storage

Key Terms

Copyright Designs and Patents Act Computer Misuse Act Data Protection Act Freedom of Information Act Creative Commons Licensing
Lesson: 3.8 Legislation (AQA GCSE Computer Science 8525)

Lesson: 3.8 Legislation

Lesson: 3.8 Legislation (AQA GCSE Computer Science 8525)

Learning Objectives

  • Understand the key UK legislation relevant to computer use and software development.
  • Explain the impact of each law on individuals and organisations.
  • Evaluate scenarios in which these laws apply.

Key Laws Covered

Each student should choose one of the key laws listed below, research it further using online resources or textbooks, and prepare a short 2–3 minute presentation explaining what the law is, why it is important, and how it affects the use of computers in society. Present your findings to your group or the whole class.

  • Data Protection Act 2018 (incorporating GDPR): Governs the handling of personal data by organisations.
  • Computer Misuse Act 1990: Addresses unauthorised access to computer systems and related crimes.
  • Copyright, Designs and Patents Act 1988: Protects intellectual property and the rights of creators.
  • Freedom of Information Act 2000: Grants public access to data held by public authorities.
  • Regulation of Investigatory Powers Act 2000: Controls surveillance and investigation methods used by public bodies.

Class Activity

Work in small groups. Each group should choose one of the scenarios below. Read your chosen scenario carefully and identify which piece(s) of legislation it relates to. Write a short explanation justifying your choices. Be prepared to share your reasoning with the class.

  • Scenario 1: An employee at a company takes a client database and uses it to start a rival business.
  • Scenario 2: A hacker breaks into a school’s system to change exam results.
  • Scenario 3: A student downloads and shares copyrighted music and software online.
  • Scenario 4: A journalist requests emails from a local council about a housing project.
  • Scenario 5: A government agency intercepts phone calls without a warrant.
  • Scenario 6: A retail website stores customer credit card details in an unsecured database.

Discussion Questions

  1. How does the Data Protection Act 2018 affect how businesses store customer data?
  2. Why is the Computer Misuse Act important for cybersecurity?
  3. What are the implications of the Copyright, Designs and Patents Act for software developers?

Homework Task

Research and write a 300-word report on a real-life case study involving a breach of one of the laws above. Describe the event, the legislation broken, and the outcome.

Exam Help

Exam questions will be taken from the following areas:

  • cyber security
  • mobile technologies
  • wireless networking
  • cloud storage
  • theft of computer code
  • issues around copyright of algorithms
  • cracking
  • hacking
  • wearable technologies
  • computer based implants.