ICT_Legal (2012) pt 2

Category: Education

Presentation Description

No description available.


Presentation Transcript

ICT and the Legal Stuff Hacking, Badging, Managing, etc.:

ICT and the Legal Stuff Hacking, Badging, Managing, etc. Part 2: Computer Misuse , Licensing, AUP DJL


Focus By the end of this session you will be able to: Identify and describe additional statutes. Consider solutions that ( i ) may reduce illegal and/or unethical activities (ii) afford some protection (iii) provide a positive model for effective use

Modelling a safe, legal ICT environment:

Modelling a safe, legal ICT environment Appropriate use E-Safety ( self & others) Data protection and management Copyright Heath and safety Robust systems and practices

Changes in practice and behaviour:

Changes in practice and behaviour None are especially new, just facilitated… Copy & Paste Remixing intellectual property Hacking (old) vs. Hacking (new) Anti-social habits (harassment of all kinds) Deliberate vs. inadvertent, but “ignorance is no excuse”. Public vs. private Flaming Godwin’s Law Twitter !

Ways to break the law or act unethically with ICT :

Ways to break the law or act unethically with ICT Fraud Theft Copying Obscenity Racism Libel Blackmail Inadequate working conditions Intimidation/ harassment Hacking/cracking Passing off/plagiarism Invasion of privacy Stalking Blasphemy Sedition Inadequate adjustments for disabilities

Recent legislation covering potential issues:

Recent legislation covering potential issues Copyright, Designs and Patents Act 1988 Data Protection Act 2000 Computer Misuse Act 1990 Human Rights Act 1998 Defamation Act 1996 Telecommunications (Fraud) Act 1997 Race Relations Act 1976 Criminal Justice Act 1988 / 1993 Criminal Justice and Public Order Act 1994 Regulation of Investigatory Powers Act 2000 Freedom of Information Act 2000 Digital Economy Act 2010 ( faltering ) Protection of Children Act 1999 Disability Discrimination Act 1995 & 2005

Hacking, Badging, Managing:

Hacking – Computer Misuse Act 1990 Badging – Creative Commons Licensing Managing - Acceptable Use Policy Hacking, Badging, Managing

Hacker vs. Cracker:

Hacker vs. Cracker Hacker means someone who finds weaknesses in a computer or computer network, though the term can also refer to someone with an advanced understanding of computers and computer networks. Wikipedia Cracker means someone who finds and exploits weaknesses in a computer or computer network, BUT … there’s good hacking and bad hacking … SO: Hacker means someone who delights in having an intimate understanding of the internal workings of a system, computers and computer networks in particular . TechRepublic

Computer Misuse Act (1990):

Serious offences with serious penalties Knowingly gaining unauthorised access: to cause a computer to perform any function with intent to secure access to any program or data held in any computer (1-2 yr ); i n order to commission further crime (1-5 yr ); t o damage or impair the operation of a computer (1-10 yr ) 3A : supplying the tools for offences 1 or 3 Computer Misuse Act (1990)

Prince Philip’s Prestel mailbox:

Prince Philip’s Prestel mailbox 1975: Shockwave Rider, Science Fiction story about a computer worm 1983, F red Cohen creates the first virus 1984, BBC microcomputer , Prestel (rip): Story 1988, Morris Worm … probably an accident but convicted; bad program! 2002, Gary McKinnon accused of the “biggest military computer hack of all time”; 2012, Home secretary cancels extradition. See: 10 Worst Computer Viruses of All Time See: Top 10 most famous hackers

Badging … i.e. Licensing:

Badging … i.e. Licensing © … recordings Defaults Ensuring clarity of entitlements Alt + Ctrl + C

UK Copyright Service:

UK Copyright Service Guidance on producing copyright notice Why Where What Some typical copyright licenses

Remixing legally …:

Remixing legally … The issue: Intellectual Property . DRM or Copyright management? Visicalc : early spreadsheet not protected (by patent) 1981: Xerox Star and Apple Windows (and Apple loses to Microsoft ) 2003, Teenager sued … 2010, Case loser unsure how she'll pay 2011: £33,000 for software theft And it works the other way too … but, it can be complicated!

Creative Commons :

Creative Commons Copyleft - derivative rights are inherited Creative Commons standardized way to give public permission to share and use creative work — on chosen conditions. m anage rights w ork alongside copyright s earch for Creative Commons content (add to browser) Legal Code – Commons Deed – Machine Readable Lawrence Lessig – for regulation that favours the individual

The Licenses:

The Licenses Compare and Contrast activity … Authorstream :

Now create a license for your Moodle site:

Go to the Creative Common License Chooser and create a license for your Moodle site. http ://creativecommons.org/choose / Add the license to your Moodle site. Now create a license for your Moodle site

Acceptable use policies:

Acceptable use policies ICT and Acceptable Use Policies What is the purpose of IT? Why is it being used? Code of conduct and responsibility for actions. Specific areas of activity supported by the school Specific areas of unacceptable activities Sanctions A detailed University example is here West Sussex Education authority has a good set of materials . AUP materials at The Key, a School Leadership service . Education and Training UK also have AUP material.

All sorts of headings …:

All sorts of headings … Teaching and learning – how internet use will enhance learning Managing internet access – email, content on the school website, social networking, protection of personal data Policy decisions – authorising internet access, assessing risks, handling e-safety complaints, managing cyberbullying , managing learning platforms Communications policy – introducing the e-safety policy to staff and pupils, enlisting parents' support Email and internet use Mobile phones Cameras , photography and video Other electronic equipment Communication between staff and student


Consider Style of language Communication with parents and carers Acceptable use guidelines for staff Acceptable use guidelines for pupils Use of images and digital video on school websites Acceptable use of ICT facilities within the school library Safe use of the technologies Signed acceptances? Sanctions? Removal from school. Involvement of parents or other external agencies. Ban on using ICT facilities. Restricted or closely supervised access to ICT facilities

PowerPoint Presentation:


authorStream Live Help