Leaflet design for Finding Nemo.

Analysis Problem The manager of the well-known cinema Showcase has approached me. He has explained to me that the leaflets produced for his cinema are lacking in quality. There is a film about to be shown at his cinema and I have been offered to design and produce a leaflet advertising this film. This leaflet must be suitable to the target audience, must appeal to people, must attract people to this cinema and be really eye catching to passers-by. What's the film? The film that I will be researching and developing a leaflet for, is Finding Nemo. The story behind this computer-generated masterpiece revolves around the retrieval of a missing loved one. A tiny clown fish named Nemo is literally plucked from his home in the Great Barrier Reef and imprisoned in a Sydney dentist's aquarium, forcing his overprotective father to overcome his fear of the unknown and come and rescue him. This film is based to children with its computer generated graphics and cute characters, but also appeals highly to adults with its 'older generation' humour and real-time situations. The film is for both sexes. The film also appeals to all types of people, as it is not directed at a certain group. This film is for all. Layout of report For the layout of my report, I will keep it simple but effective. All the writing will be in comic sans, and in size 14. The titles will also be in comic sans but

  • Word count: 2641
  • Level: GCSE
  • Subject: ICT
Access this essay

Privacy and Data Protection: IT Law

IT Law (Public Law Aspects) Seminar 4: Privacy and Data Protection Seminar Paper: The matter of transfer of personal data to a third country particularly in relation to the differences between the EU and the US; The Safe Harbor Principle Teacher: Dr. Gerrit Betlem and Mr. Martin Truman Student: Katharina v. Boehm-Bezing I. Introduction .) An old issue, growing in importance Searching the web, one can see that privacy on the Internet is a big issue. Countless US or EU based human rights initiatives are fighting for the right to privacy. What is the reason for this? Although concerns about consumers' ability to protect their privacy have been in existence for decades, the Internet makes the issue more delicate: Businesses have access to a larger audience, which allows them to collect more data from more people. Furthermore, collection of more specific behavioural information is possible attaching cookies to a hard drive, reporting which websites someone enters.1 In addition, data collection and storage having become much easier, faster and cheaper, cost concerns do not limit data-collection practices.2 At the same time, the market for information about consumers and consumer behaviour is continuously growing, side by side with the expansion of e-commerce. 2.) Definition of the issue Privacy can be defined as "the right of the individual to be protected against

  • Word count: 6759
  • Level: GCSE
  • Subject: ICT
Access this essay

HEALTH AND SEF

By Daniel Smart 10L2 Health & Safety in ICT Commonsense Health & Safety rules (Things you MUST or MUST NOT do) What you must/must not do Why? You must not put water near the computer just in case it is knocked over Do not stare at the screen for to long Do not type when hand is in an uncomfortable position or do not type for a large amount of time Do not leave wires lying around that people could trip over Water can damage the computer and may give someone an electric shock Can damage eyes Can give finger and hand cramp can also damage hand if done excessively Someone may break a bone or risk some other injury Things you found out - from books or the web What I found out Why you must/must not do it The law states that an employer must provide or ensure: . Tilt-able screens 2. Anti-glare screen filters 3. Adjustable chairs 4. Foot supports 5. Suitable lighting 6. Workstations are not cramped 7. When working on a computer there are frequent breaks 8. Appropriate eye and eyesight tests by an optician The employer must do this so that his/her staff are safe from injury/damage, short and long term Source of Information http://www.bbc.co.uk/schools/gcsebitesize/ict/implications/3healthandsafetyrev1.shtml What I found out Why you must/must not do it . There should be no trailing wires 2. Food and drink should not be placed near a machine

  • Word count: 502
  • Level: GCSE
  • Subject: ICT
Access this essay

Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work act, Health & Safety.

Coursework 3E Legislation Explanation of the type of acts I am going to use in this coursework are Data Protection act, Copyright, Computer Misuse, Health and Safety at Work act, Health & Safety (Display Screen Equipment) Regulations Data Protection Act: Explanation: An Act to make new provision for the regulation of the processing of information relating to individuals, including the obtaining, holding, use or disclosure of such information The law gives people the right to find out what personal information is held about them in organisations. The organisations have to make sure that no one steals the information or it doesn't gets loss as if it does the organisation who break the data protection act can be fined and have to pay compensation to the data subject. The Copyright, Design and Patents Act (1989): Explanation: The copy right design and patents act makes it illegal to copy files without the permission of the owner or the copyright holder. The person who uses copyright files without the allowance can be fined at an unlimited price as well as the person who uses the copy knowing that it is copyright protected can also be fined. The Computer misuse act (1990): Explanation: The computer misuse act makes it illegal to do hacking or producing viruses and using them on someone. This act has been designed to cover problems such as hacking or even preventing

  • Word count: 3215
  • Level: GCSE
  • Subject: ICT
Access this essay

The Computer Misuse Act

The Computer Misuse Act, 1990 was passed to deal with the problem of hacking of computer systems. In the early days of hacking, the problem wasn't taken very seriously - it was seen as mischievous behaviour, rather than as something which could cause serious loss or problems to companies, organisations and individuals. Before 1990, it was difficult to prosecute people for hacking - existing laws were not written with that in mind. However, it became increasingly clear that hacking should be against the law, and that the laws should be effective and enforceable. As a result, the Computer Misuse Act was passed in 1990. The Act created three new offences: • Unauthorised access to computer material • Unauthorised access with intent to commit or facilitate commission of further offences • Unauthorised modification of computer material. Unauthorised access to computer material This is the lowest level of offence. It includes, for example, finding or guessing someone's password, then using that to get into a computer system and have a look at the data it contains. This is an offence even if no damage is done, and no files deleted or changed. The very act of accessing materials without authorisation is illegal. This offence carries a penalty of imprisonment up to six months and/or a fine. Unauthorised access with intent to commit or facilitate commission of further

  • Word count: 682
  • Level: GCSE
  • Subject: ICT
Access this essay

Critically evaluate the extent to which it can be said that copyright law gives adequate and appropriate protection to contemporary works of art?

Intellectual Property Law Assessed Essay Student No: 001813779 Question 1. Critically evaluate the extent to which it can be said that copyright law gives adequate and appropriate protection to contemporary works of art? In this essay there are certain questions that need to be resolved in order to completely consider the protection to contemporary works of art under copyright law. In general it will be necessary to consider what exactly contemporary art is in order to understand the extent of the protection, and whether this is reasonable, or is there grounds for reform of the law? Perhaps the law is too strict in this area of litigation, or on the contrary is may be too easy to gain copyright for something that is considered a form of contemporary art? Looking back at the question, by saying to what extent does the law provide adequate and appropriate protection to contemporary works of art, there is an immediate suggestion that there is in fact a problem with the law. How far will the courts go in order to protect so-called contemporary art? In order for a contemporary art form to be considered for copyright there are certain statutory and common law obligations that need to be fulfilled. Firstly it is section 4 (1) of the Copyright, Designs and Patents Act 1988 that defines 'artistic work' as meaning: (a) a graphic work, photograph, sculpture, or collage.

  • Word count: 3584
  • Level: GCSE
  • Subject: ICT
Access this essay

IT And Legislation

Ict And Legislation TABREZ AKHTAR 10E The Data Protection Act (1998) It sets rules for procession of information that you have not given permission for, information about living, identifiable individuals. This means any identifiable data, such as a name or address. Any business storing information must comply with eight principles. These are: * Fairly and lawfully processed * Processed for limited purposes and not any manner incompatible with those purposes * Adequate, relevant and not excessive * Accurate * Not kept for longer than necessary * Processed in line with the data's subject rights * Secure * Not transferred to countries with adequate protection The school ensure they comply with the DPA in dealing with your personal data by letting certain teachers have access to the information. TESCO 'How it can go wrong ' Supermarket Tesco claims to be the biggest dotcom grocer in the world, having taken £146 million in a half-year period between February and August, and making a profit online. In May, Tesco called some of its online customers, asking them to rate its services. Those who reject such contact often refuse to give out a phone number, but Tesco.com will not accept registration without one. The firm says this is so it can call if a delivery is delayed or an item is unavailable. In one case, a 15-minute conversation with

  • Word count: 1642
  • Level: GCSE
  • Subject: ICT
Access this essay

Computer Legislation.

Computer Legislation The information on this document is for the purpose of different computer legislations Below are some Act uses for computer legislations. > Data Protection Act 1998 > Computer Misuse Act 1990 > Computer Fraud and Abuse Act 1986 > Child Online Protection Act 1998 > The Copyright, Designs and Patents Act 1988 > Computers Crimes Act 1988 > Official Secrets Acts 1911-1989 > Criminal Law > Anti-Cybercrime Act of 2002 > The Computer Security Act of 1987 Data Protection Act 1998 - UK & USA The Data Protection Act of 1998 applies to personal data that is available on the computers or in some structured manual files. The type of data that the Act refers to is data that is being collected, adapted, organised, altered, recorded, used, disclosed, combined, destroyed, or data that is simply being held. The Act establishes eight mandatory procedures that organisations which process data must follow. Data is required to be: * Lawfully and fairly processed * Processed for limited purposes * Adequate, relevant and not excessive * Accurate, and kept up-to-data where necessary * Not kept for longer than necessary * Processed in accordance with individuals' rights * Kept secure * Not transferred to non-European Economic Area Countries without adequate protection As part of complying with the principles, controllers must: * meet one of

  • Word count: 2219
  • Level: GCSE
  • Subject: ICT
Access this essay

Data protection act

Data protection act The data protection act protects data from being stolen. For example peoples personal data. The data protection act was brought down to parliament to control the way information is handled and to give legal right to people who have information stored about them. The data protection act is a law to protect your personal data stored on your computer. The law was passed by parliament to control the way data is stored. The law is useful because no one can legally see your data other than your self or someone you want to show any data to. If some one tried to 'hack' into some of your data, they would be doing so illegally and if they were caught they would most likely to be sent to jail. The computer misuse act The computer misuse act was made to protect people from hackers and crackers. The law prevents hackers from sending viruses that could damage other people's computers. But the law still has flaws in it; some people use the loopholes and others, knowing the law hack anyway knowing the risks and penalties of being caught. The computer misuse act also lets you view data about your self, and if you want to you can request to have it deleted. The computer misuse act protects people's network from being hacked into. For example peoples passwords being found out. This also prevents hackers (people who get into a network with out being authorized. Even

  • Word count: 975
  • Level: GCSE
  • Subject: ICT
Access this essay

The Legislations That Protect Individuals and Groups Form Misuse of ICT

The Legislations That Protect Individuals and Groups Form Misuse of ICT In this section I am going to demonstrate my knowledge of the legislation by describing it and explaining how it protects me. I will also explain what it does and does not do for me. What is legislation? Legislation means a law or a set of laws, which have been made by parliament. With many people using computers, and many people storing valuable information I them i.e. bank account numbers etc. there are also many people who try to get this information with the intent to misuse it. In order to tackle these problems new legislations have been made. These new legislations include Data Protection Act, The Computer Misuse Act, The Health And Safety At Work Act, and the Regulation Of Investigatory Powers Act. Below I will look at all the mentioned legislations in close detail and explain what they mean, how it protects me, other people i.e. adults (and in employments), my community and look at the positive and negative aspects of the legislations. Data Protection Act The Data Protection Act reads that data discovered by one person to another person may only be used for the certain reason for which they were discovered. Information may only be kept for an appropriate length of time and must not be shown to other people without the permission of the data owner. Schools, for example, may keep information

  • Word count: 1810
  • Level: GCSE
  • Subject: ICT
Access this essay