| Concept | Focus | Protected Entity | Key Risk |
|---|---|---|---|
| Data Protection | Handling personal data | Individuals' information | Misuse or privacy breaches |
| Copyright Law | Protecting creative works | Intellectual property | Illegal copying or distribution |
| Monitoring Law | Observing digital activity | Behavioural data | Excessive surveillance |
Different goals: Each law addresses different risks—data protection safeguards privacy, copyright protects ownership, and monitoring laws balance safety with civil liberties.
Different obligations: Organisations must follow distinct procedures depending on which type of data or activity they are handling, ensuring targeted compliance.
Always link a law to its purpose: In exam responses, emphasise why a law exists, not just what it says. This improves clarity and shows deeper understanding.
Differentiate between personal data and intellectual property: Many students confuse these categories. Personal data relates to individuals, while intellectual property relates to creative work.
Mention consequences when applying laws: Including benefits and drawbacks demonstrates full comprehension, such as improved privacy versus added organisational cost.
Assuming copyright only applies to digital content: Copyright protects all creative works, including physical and digital formats.
Believing data protection bans all data collection: The law does not prevent data collection, but regulates how and why it can be done.
Thinking monitoring is always illegal: Monitoring can be lawful if conducted within legal frameworks and with justifiable purpose.
Cybersecurity linkage: Data protection relies on secure digital systems to enforce privacy rules and prevent breaches.
Ethical computing: Laws reflect broader ethical expectations, encouraging fairness, transparency, and accountability in digital systems.
Global differences: Different countries implement these laws differently, making international digital work require awareness of multiple legal frameworks.