KEMBAR78
bs7 2nd Term Wk11 Computing | PDF | Intellectual Property | Information Security
0% found this document useful (0 votes)
31 views10 pages

bs7 2nd Term Wk11 Computing

The document outlines weekly lesson notes for a B7 Computing class, focusing on information security and intellectual property rights. It details activities for learning, including discussions on key principles of information security such as confidentiality, integrity, and availability, as well as legal issues surrounding intellectual property. The lesson also emphasizes the importance of copyright laws and the consequences of infringement.

Uploaded by

Eben Ellison
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views10 pages

bs7 2nd Term Wk11 Computing

The document outlines weekly lesson notes for a B7 Computing class, focusing on information security and intellectual property rights. It details activities for learning, including discussions on key principles of information security such as confidentiality, integrity, and availability, as well as legal issues surrounding intellectual property. The lesson also emphasizes the importance of copyright laws and the consequences of infringement.

Uploaded by

Eben Ellison
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 10

WEEKLY LESSON NOTES – B7

WEEK 11
Date: 21-03-2025 DAY: Subject: Computing
Strand: Communication
Duration: Networks
Class Sub Strand: Information
Class: B7 Size: Security
Indicator: Lesson:
Content Standard:
B7.3.3.1.1 Discuss the key principles of
B7.3.3.1. Recognize data threats and means of information
protection
security 1 of 2
Performance Indicator: Core Competencies:
Learners can describe the principles of
information security. CI 6.3: DL5.1:
Reference: Computing Curriculum P.g. 18-20
Keywords:

Activities For Learning & Assessment Resources Progression


Pictures and
STARTER (5 MINS) videos Describing the
principles of
Using questions and answers, revise the previous lesson
with learners. information
security.
Share performance indicators and introduce the
lesson.

MAIN (35 MINS)


Brainstorm learners to explain the meaning of information
security.
Information security covers the tools and processes that organizations use to protect information.

Research in pairs the key principles of information security.


Example: confidentiality, integrity and availability
Guide learners to discuss the three key principles of information security.
Confidentiality
Confidentiality measures are designed to prevent unauthorized disclosure of
information. The purpose of the confidentiality principle is to keep personal
information private and to ensure that it is visible and accessible only to those
individuals who own it or need it to perform their organizational functions.
Integrity
Consistency includes protection against unauthorized changes (additions,
deletions, alterations, etc.) to data. The principle of integrity ensures that data is
accurate and reliable and is not modified incorrectly, whether accidentally or
maliciously.

Availability
Availability is the protection of a system’s ability to make software systems and data
fully available when a user needs it (or at a specified time). The purpose of availability is
to make the technology infrastructure,
the applications and the data available when they are needed for an
organizational process or for an organization’s customers.

Guide learners to research and analyze scenarios involving information security.


Example:
Bob, driving down a main street in his patrol car notices smoke coming out of a
warehouse. His partner, Alice, reports the emergency from her car. Alice enters the
address of the building, a brief description of its location (i.c., north west corner),
and an emergency level.

In addition to a fire unit, she requests several paramedic units on the scene given
that area appear to be relatively busy. She confirms her input and waits for an
acknowledgment.

John, the Dispatcher, is alerted to the emergency by a beep of his workstation. He


reviews the information submitted by Alice and acknowledges the report. He
allocates a fire unit and two paramedic units to the Incident site and sends their
estimated arrival time (ETA) to Alice.

Alice received the acknowledgment and the ETA.

REFLECTION (10 MINS)


We have learnt the key principles of information security.
Use peer discussion and effective questioning to find out from learners
what they have learnt during the lesson.

Take feedback from learners and summarize the lesson.


Homework/Project Work/Community Engagement
Suggestions
 Identify and explain the key principles of information security
Cross-Curriculum Links/Cross-Cutting Issues
None
Potential Misconceptions/Student Learning Difficulties
The facilitator/teacher can arrange to use a nearby Senior High School (SHS) ICT laboratory
Date: 21-03 2025 DAY: Subject: Computing
Strand: Communication
Duration: Networks
Class Sub Strand: Information
Class: B7 Size: Security
Indicator: Lesson:
Content Standard:
B7.3.3.1.2 Explore the legal issues regarding
B7.3.3.1. Recognize data threats and means of intellectual
protection
property rights 2 of 2
Performance Indicator: Core Competencies:
Learners can discuss legal issues regarding intellectual
property rights CI 6.3: DL5.1:
Reference: Computing Curriculum P.g. 18-20
Keywords:

Activities For Learning & Assessment Resources Progression


Pictures and
STARTER (5 MINS) videos Demonstrating
how to compose
Using questions and answers, revise the previous lesson
with learners. and send email
messages.
Share performance indicators and introduce the
lesson.

MAIN (35 MINS)

Brainstorm learners to explain the following terms..


Intellectual Property (IP): Intellectual Property (IP) is the property that is as a
result of the creativity of the mind of a person.

Intellectual Property Right (ILR) : Intellectual Property Right is the exclusive


right given to inventors for their Intellectual Property. It is also the exclusive
right given to inventors on the production, sale, hiring, etc. of the things they
have invented.

Guide learners to discuss the types of Intellectual Property.


guide learners to differentiate between the various legal
issues mentioned. (e.g. Copyright, Patent, Trademark,
Piracy, Copyright Infringement) Trademark
Trademark is formally registered name, word, logo, symbol or image that is used
to identify the manufacturer or distributor of products or services. The symbol for
trademark is Tm or ®.

Patent
Patent is an exclusive right given to inventors to manufacture, use or sell
inventions for limited period of time.

Piracy: Piracy is the unauthorized copying and distribution of copyrighted materials. A


person who is copying and distributing without authorization is a PIRATE. Pirates
produce the counterfeits of the original materials and sell them at low prices .

Plagiarism: Plagiarism is the taking of someone's work or idea and claiming it as your
own. It is a criminal act and is punishable under the copyright laws of Ghana .

Copyright
Copyright is the legal right given to inventors of original works on the use,
production, reproduction, rental and sale of their works. In other words, it’s the right
that does not allow individuals to copy intellectual property of the original owner. It
controls the production of intellectual property right.

Copyright Infringements
Copyright infringement is an act of reproducing, copying, imitating, selling,
distributing, using, exhibiting, etc. a copyright product or material without
permission from the inventor.

Guide learners to discuss issues pertaining to copyright (e.g. freeware,


shareware, crippleware). Freeware is software, most often proprietary, that is
distributed at no monetary cost to the end user. There is no agreed-upon set of rights,
license, or EULA that defines freeware unambiguously; every publisher defines its own
rules for the freeware it offers.

Shareware is software that is distributed free on a trial basis with the understanding
that the user may need or want to pay for it later. Some software developers offer a
shareware version of their program with a built-in expiration date (after 30 days, the
user can no longer get access to the program.
Crippleware has been defined in realms of both computer software and hardware. In
software, crippleware means that "vital features of the program such as printing or
the ability to save files are disabled until the user purchases a registration key".
Guide learners to discuss the consequences associated with breaking these laws.

Reasons for Copyright Protection (Laws)


 To encourage people to be innovative and invent new things.
 To ensure that inventors gain financial benefits from their hard work.
 To increase the revenue of the Nation as it is easy to tax copyrighted materials.
 To protect the works of inventors.
 To promote development because new things will always be produced.

Consequences of Breaking Copyright Laws


 Fine, imprisonment or both on the culprits / offenders.
 Confiscation of items.
 Discourages people from inventing new things.
 Inventors lose financial rewards from their inventions.
 Government loses revenue in the form of taxes and levies.

REFLECTION (10 MINS)


We have learnt how to compose and send email messages.

Use peer discussion and effective questioning to find out from learners
what they have learnt during the lesson.

Take feedback from learners and summarize the lesson.


Homework/Project Work/Community Engagement
Suggestions
 What is copyright law?
 Identify any four importance of the copyright law
 State four consequence of copyright infringement.
Cross-Curriculum Links/Cross-
Cutting Issues None
Potential Misconceptions/Student Learning Difficulties
The facilitator/teacher can arrange to use a nearby Senior High School (SHS) ICT laboratory

You might also like