Computer Misuse Act 1990. INTRODUCTION The Computer Misuse Act became law in August 1990. Under the Act hacking and the introduction of viruses are criminal.

Slides:



Advertisements
Similar presentations
By Andy Scott, Michael Murray and Adam Kanopa
Advertisements

Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
E-commerce Law Crime and e-commerce. There are various ways that crime and e-commerce overlap. Some are peculiar to e-commerce – fraud, others are relevant.
Cyber Law & Islamic Ethics CICT3523 COMPUTER CRIMES.
COMPUTER CRIMES - THE LAW ENFORCMENT PERSPECTIVE By: Wilfred A Nathan Computer Forensic Branch Criminal Investigation Department Singapore Police Force.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
Crimes Against Property 1.Grab an iPad 2. Tap on the Big L app 3. Log into the blog (log-ins) 4. Answer the Crimes Against Property Questions.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Using Your Knowledge – Security Threats
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
GCSE ICT Computers and the Law. Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
COMPUTER CRIME An Overview Agenda u Background and History u Potential Criminals u Ethics Survey u Criminal Activity u Preventative Measures u Background.
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
U.S criminal law’s reinforcement of technological measures protecting property: where the DMCA fits in Elliot N. Turrini Assistant U.S. Attorney Computer.
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Hazards of Hacking. Hacking Originally, hacking was used to describe a programmer who was very skilled at his/her profession Often, this person knew programming.
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
L o g o Types of Computer Crime Zhuravlev Alexander 326 MSLU.
Unit 3 Criminal Law Introduction and The Nature of Criminal Law.
The Data Protection Act The Data Protection Act controls how your personal information is used by organisations, businesses or the government. Everyone.
The Legal Framework Can you work out which slide each bullet point should go on?!
Computer Misuse Act (1990). What is Computer Misuse Act (1990)? The Computer Misuse Act of 1990 is a law in the UK that makes illegal certain activities,
General Purpose Packages
I.C.T laws By Luke Honeyfield 12. Laws relating to I.C.T  Copyright, Design, Patents  Data protection ACT  Computer misuse ACT  Health and safety.
Data Protection and Computer Misuse Act material Modified by Eric from Mary’s slides.
Computer crime University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot March 2011 March 2011 ITSS 4201 Internet Insurance and.
Computer Misuse Act 1990 Altering computer material without permission Accessing computer material without permission with intent to commit further criminal.
CYBER CRIME.
MUHAMAD SYAFIQ BIN BORHANUDIN SR2211M1.
Files are at risk from loss if your computer breaks or if you get a virus. Files can also become corrupted. Solutions: Make regular back ups of files Use.
Name:Neha Madgaonkar Roll no:  What are intruders?  Types  Behavior  Techniques.
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
The Computer Misuse Act of1990 The Copyright, Designs & Patents Act of
Computer Misuse By: Alex Meadows Michael Read. How can you misuse a computer? Accessing data stored electronically Copying software without permission.
LEGISLATION. DATA PROTECTION ACT (1998) The aim of this act give people the right to know what information is held about them. It also sets out rules.
Information Systems Unit 3.
ANS(Prepared by: Mazhar Javed )1 Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Revision Q1: Explain the term HACKING?
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
Computer Systems D Stainton. Computer Misuse What is computer misuse? Criminal offences which can be committed using a computer.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Business Ethics and Social Responsibility GCSE Business and Communication Systems Business and Communication Systems.
BTEC Level 3 Unit 3: Information Systems Mr Satari Lesson 7 & 8.
1 AQA ICT AS Level © Nelson Thornes Safety and security Chip and Pin.
Computer Misuse Act 1990 Anti-hacking legislation.
The criminalization of hacking tools as a reasonable measure of protection regarding attacks against information systems and computer data By Chatziioannou.
Denial of Service Attack Pornography Phising Spoofing Salami Attack Forgery Hackers: enjoy intellectual challenges of overcoming software limitations.
Learning Objectives Can I discuss the copyright law Can I identify why organisations must protect data Can I describe how legislation affect computer use.
Unit 3 INTRODUCTION CRIMINAL LAW. WHAT IS A CRIME? Turn to your neighbour and brainstorm what you think a “crime” is Write your definition down in 3-4.
GCSE ICT SECURITY THREATS.
The Computer Misuse Act 1990
Introduction to Criminal Law
Anti-hacking legislation
Understanding the issues related to the use of information
Cyber Crime Today we will look at: Different types of cyber-crime
Religion, Crime & Punishment
Data Protection Act and Computer Misuse Act ANSWERS.
Computer Systems D Stainton.
Societal Issues in Computing (COMP466)
Computer Misuse Act 1990.
Unit 7 – Organisational Systems Security
Legal and Ethical Issues
Computer Misuse Act 1990 GCSE ICT.
Understand mechanisms to control organisational IT security
Revision Lesson 10X5.
End User Support By Dominique Stainton.
Presentation transcript:

Computer Misuse Act 1990

INTRODUCTION The Computer Misuse Act became law in August Under the Act hacking and the introduction of viruses are criminal offences. The following sections describe the types of offence and suggest a range of internal penalties. DEFINITION The Act identifies three specific offences: Unauthorised access to computer material (that is, a program or data). Unauthorised access to a computer system with intent to commit or facilitate the commission of a serious crime. Unauthorised modification of computer material.

Punishment for committing an offence The offences are punishable as follows: Offence 1. Up to 6 months' prison and up to £5,000 in fines. Offences 2 and 3. Up to 5 years in prison and any size of fine (there is no limit).

Hacker The term used to refer to someone skilled in the use of computer systems, especially if that skill was obtained in an exploratory way. The term evolved to be applied to individuals, with or without skill, who break into security systems. This is someone who enjoys exploring and learning about computer systems. It is often confused with cracker, which is a person who has a mischievous attitude and often attempts to break into computer systems.

Who is Vladimir Levin Vladimir Levin, a biochemistry graduate of St. Petersburg's Tekhnologichesky University in mathematics, led a Russian hacker group in the first publicly revealed international bank robbery over a network. Levin used a laptop computer in London, England, to access the Citibank network, and then obtained a list of customer codes and passwords. Then he logged on 18 times over a period of weeks and transferred $3.7 million through wire transfers to accounts his group controlled in the United States, Finland,the Netherlands, Germany, and Israel. Citibank later retrieved all but about $400,000.