Legislation

Gain insights into the key computing-related legislation, including Intellectual Property, the Computer Misuse Act, and the Data Protection Act. Understand how these laws impact the use and development of technology.


Contents
  1. Copyright
  2. Creative Commons
  3. Patents
  4. Design Rights
  5. Trademarks
  6. Software Licences
  7. Proprietary Licence
  8. Open Source Licence
  9. Data Protection Act
  10. Computer Misuse Act

Copyright protects creative work (Literary, Dramatic, Artistic, Sound, and Film) by giving the creator the the exclusive right to use their own work. Copyright prevents anyone copying, broadcasting, renting, and adapting creative work.

Copyright work often is accompanied by a  ©  but it is not required.

How does a creative work become protected by copyright?

Copyright is automatic, you don’t need to apply for it. It usually lasts for seventy years after the author / creator has died. Once the copyright has expired the work goes into the public domain, this means anyone can use it freely.

Exceptions to Copyright Protection

Creative work protected by copyright law can be used for the following purposes: 

  • Private research/study - A student may use a copyright image in a presentation for a school project
  • Educational purposes - A teacher might use copyright content to help teach a concept
  • Criticism - A Film reviewer might us a small clip from a film to help explain what they like / dislike about it
  • Private back-ups - The owner of a DVD might create a digital copy of the disk incase the disk becomes damaged
  • Satire - A comedian may satirise a TV show or Film.

These exceptions are called ‘fair dealings’ or ‘fair use’. These do not always all full use of a copyright work, for example: A reviewer cannot include a digital version of a whole film as a part of their review.

If you need to use someone else's creative work for any other purpose, you must ask their permission and a obtain  license to use it.

Consequences

Copyright law is a civil law, therefore those in breach do not end up in prison. Initially those in breach may be sent a cease and desist notice by the copyright owner, and if they do not comply they may be taken to court so that the copyright owner can claim damages.

Edexcel GCSE Computer Science
Pearson BTEC Digital Information Technology
OCR GCSE Computer Science

Some copyright owners want to allow their work to be used by others. Many do this with the use of a Creative Commons licence.

A Creative Commons license allows people to use someone elses copyright work under certain conditions.

These conditions can include

  • If the copyright work can be modified in anyway
  • If the copyright work can be used for commerical purposes
  • If any derivative must be released under the Creative Commons licence
  • If any derivative work must attribute the copyright owner.

If the Creative Commons licence is breached then the normal consequences of copyright law applies. Under a Creative Commons licence the owner would not need to be contacted unless their work was going to be used in a way not described by the conditions of the licence.

OCR GCSE Computer Science

Patents cover inventions and specially how an invention works.

To apply for a patent, it must be: new, something that can be used or made, and innovative.

Patents are difficult to get as lawyers must ensure that a patent is not derivative or is something that already exists - this can take up to five years. When applying for a patent how the invention work must be documented and publicly available for anyone to view. Even though publicly viewable, no one other than the patent owner can legally use the invention unless it is licenced or sold.

Once a patent expires anyone may use the invention and make money from it. Patents last for a maxium of 20 years, and the owner may need to renew the patent every 5 years to continue to exclusivly use / sell their invention.

Some people argue that patents stifle innovation by preventing others using new inventions.

Edexcel GCSE Computer Science
Pearson BTEC Digital Information Technology
OCR GCSE Computer Science

Design rights protect the design / shape of a product and is used to protect products from being counterfeited.

Design right can be automatic and give some protection for 10-15 years, but registering a design can provide longer protection up to 25 years, but will incur a fee.

Pearson BTEC Digital Information Technology
OCR GCSE Computer Science

Trademarks protect brands and brand identities.

A trademark, for example, would protect a company logo and prevent another company using a very similar logo which may confuse customers.

Trademarks last upto 10 years, and may be reapplied for when they expire. Registering a Trademark costs at least £170.

Edexcel GCSE Computer Science
Pearson BTEC Digital Information Technology

When you pay or download for software you don’t own it, you are simply given the right to use it for specific purposes.

All software comes with a licence. A licence is a document which describes what you are allowed to do with it.

The two licences are: Proprietary and Open Source.

Edexcel GCSE Computer Science
OCR GCSE Computer Science

A proprietary licence is used for software you pay for. Proprietary licences prevent users from copying and freely distributing the software. It may limit how many people who can use it, or how long it may be used for.

There are benefits of a proprietary licence, these can be divided between the interests of the business which sells the software and the customers of the software.

  Advantages
Businesses
  • Proprietary licences allow businesses to make money from software

  • Protects software from misuse or redistribution

Customers
  • Proprietary software tends to be better supported

  • Proprietary software tends to be higher quality 

Edexcel GCSE Computer Science
OCR GCSE Computer Science

Software can be released under an Open Source licence. The Open Source licence is used to give it’s users more freedom including the ability to freely distribute, modify, and view the source code that makes up the software.

Open Source is Free as in Freedom – not always as in Free (money).

Why choose to the Open Source licence?

  • Some people don’t develop software to make money. 
  • Open source licences open up software to open collaboration.
  • Some software may be beneficial to more people when freely available

Example: OpenSSL

OpenSSL is an open source package installed on billions of devices and manages secure communication over networks.

It is managed by two people with limited funding.

It is a vital part of software and secure connections on the internet could not occur without it.

Benefits of an Open Source licence

There are benefits of using an Open Source licence, these can be divided between the interests of the business which sells the software and the customers of the software.

  Advantages
Businesses
  • People can contribute to the software adding features 

Customers
  • Can change the software to meet their needs

  • Can redistribute the software as needed

  • Source code can be seen and reviewed

Edexcel GCSE Computer Science
OCR GCSE Computer Science

Companies and organisations hold your personal data and its incredibly valuable - not just to the companies, but to data brokers, and hackers.

To protect your data and ensure these companies treat it with respect, all companies must comply with the Data Protection Act (DPA).

The Data Protection Act was updated in 2018 to bring it in line with technological advances and the ways companies have been using data.

Consent

When collecting data on users and customers, organisations must have the consent to hold and use their data.  

Consent must be:

  • Freely given by the user
  • Specific to the purposes the data will be used for
  • Informed
  • Be possible to revoke

Key Principles

The Data Protection Act sets out seven key principles:

  • Lawfulness, fairness and transparency - Data must be collected lawfully, fairly and the user must know it is being collected
  • Purpose limitation - The data must only be collected and used for a specific purpose, which the user must be aware of 
  • Data minimisation - Only the data required for the intended purpose may be collected
  • Accuracy - Data must be kept up to date
  • Storage limitation - Data must only be held for as long as it is needed, and not excessively  
  • Integrity and confidentiality (security) - Data must be stored and destroyed securely
  • Accountability - The company will be accountable for the data is holds and may be incur penalties for not adhering to the DPA

 The Data Controller

Organisations must have a data controller - a person who is responsible for the organisations compliance with the Data Protection Act.

Organisations that are in breach may face large fines. 

Edexcel GCSE Computer Science
Pearson BTEC Digital Information Technology
OCR GCSE Computer Science

In response to crimes been committed on computers the Computer Misuse Act was created

Introduced to prevent unauthorised access to computer systems.

Three main offences:

  • Unauthorised access to computer material - Gaining access to a computer system without permission, for example: logging into a users account without there consent. 
  • Unauthorised access with the intent to commit further offences - Once gaining access, intending to commit further crimes, for example: stealing data to commit Identity Theft.
  • Unauthorised modification of computer material - Deleting files, changing files, installing malware, etc.

Committing any of the offences can lead to fines and or time in prison.

Edexcel GCSE Computer Science
Pearson BTEC Digital Information Technology
OCR GCSE Computer Science