Computer Misuse Act 1990.

Slides:



Advertisements
Similar presentations
The Nature Of Crime Chapter 6.
Advertisements

By Andy Scott, Michael Murray and Adam Kanopa
Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
E-commerce Law Crime and e-commerce. There are various ways that crime and e-commerce overlap. Some are peculiar to e-commerce – fraud, others are relevant.
Unit 4- Assignment 3 P5, P6, M2 BTEC Business Level 3.
Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
Cyber Law & Islamic Ethics CICT3523 COMPUTER CRIMES.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
By Nikki Barolsky and Ienash Rasheed BREAK AND ENTER OFFENCES.
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
Nigel, Lochie, Anika and Martin. As the internet is becoming the most popular area of crime, countries around the world are struggling to update the law.
Topic 12 Attempts Topic 12 Attempts. Topic 12 Attempts Introduction If a defendant fully intends to commit a crime but for some reason fails to complete.
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Legislation in ICT.
Legislation Who governs e-commerce?. E-commerce is regulated by laws and guidelines. These aim to ensure that sites operate effectively and that online.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
The Data Protection Act The Data Protection Act controls how your personal information is used by organisations, businesses or the government. Everyone.
a) The power of arrest for a citizen or police b) The rights of the accused c) How the trial will proceed (in which court) and d) What penalty will.
The Legal Framework Can you work out which slide each bullet point should go on?!
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Computer Misuse Act (1990). What is Computer Misuse Act (1990)? The Computer Misuse Act of 1990 is a law in the UK that makes illegal certain activities,
General Purpose Packages
I.C.T laws By Luke Honeyfield 12. Laws relating to I.C.T  Copyright, Design, Patents  Data protection ACT  Computer misuse ACT  Health and safety.
Computer Law University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet Insurance and Information.
Ethical and Legal Issues v Ethical and legal issues are relevant to any project involving systems development. – privacy – professionalism – ownership.
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
a) The power of arrest for a citizen or police b) The rights of the accused c) How the trial will proceed (in which court) and d) What penalty will.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
The Computer Misuse Act of1990 The Copyright, Designs & Patents Act of
Break and Entering Moni and Kevin. Breaking and Entering  The crime of entering a building or compound by force so as to commit indictable (serious)
Computer Misuse By: Alex Meadows Michael Read. How can you misuse a computer? Accessing data stored electronically Copying software without permission.
LEGISLATION. DATA PROTECTION ACT (1998) The aim of this act give people the right to know what information is held about them. It also sets out rules.
Information Systems Unit 3.
Computer crimes.
Computer Systems D Stainton. Computer Misuse What is computer misuse? Criminal offences which can be committed using a computer.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
ICT and the Law You need to know about 3 laws covering the use and misuse of ICT.
BTEC Level 3 Unit 3: Information Systems Mr Satari Lesson 7 & 8.
Cyber-crime: The Law and You Group F: ! Authors: Stephen Burrett, Murray Colpman, Thomas Dubosc, Dorota Filipczuk, Toby Finch, Sandeep Vyas Tutor: Dr Enrico.
Computer Misuse Act INTRODUCTION The Computer Misuse Act became law in August Under the Act hacking and the introduction of viruses are criminal.
Computer Misuse Act 1990 Anti-hacking legislation.
The criminalization of hacking tools as a reasonable measure of protection regarding attacks against information systems and computer data By Chatziioannou.
Learning Objectives Can I discuss the copyright law Can I identify why organisations must protect data Can I describe how legislation affect computer use.
PRINCIPLES OF CRIMINAL LIABILITIES
GCSE ICT SECURITY THREATS.
The Computer Misuse Act 1990
Legislation in ICT.
The Elements of a Crime.
Anti-hacking legislation
Understand mechanisms to control organisational IT security
Answer the questions to reveal the blocks and guess the picture.
Regulation of Investigatory Powers Act 2000
Year 10 ICT ECDL/ICDL IT Security.
Understanding the issues related to the use of information
Cyber Crime Today we will look at: Different types of cyber-crime
Data Protection Act and Computer Misuse Act ANSWERS.
Computer Systems D Stainton.
Societal Issues in Computing (COMP466)
Unit 7 – Organisational Systems Security
Legal and Ethical Issues
Chapter 4.
Legislation in ICT.
Computer Misuse Act 1990 GCSE ICT.
THE CODE OF CRIMINAL PROCEDURE, 1973
Understand mechanisms to control organisational IT security
Chapter 4 Review before the TEST!!!
End User Support By Dominique Stainton.
Presentation transcript:

Computer Misuse Act 1990

Introduction The Computer Misuse Act was established in 1990 as a result of two computer hackers, Robert Schifreen and Stephen Gold, breaking into British Telecom. Because of this, a law was introduced that encompassed computer hacking, viruses, worms and Trojans. The Computer Misuse Act is an important cornerstone to computer professionalism because it is relevant to every day computer activity.

Section One Section one of the computer misuse act states that a person guilty of an offence if: They cause a computer to perform any function with intent to secure access to any program or data held in a computer; They intend to secure unauthorised access They are fully aware of their actions The intent a person has to commit an offence does not need to be directed at: Any particular program or data A program or data of any particular kind A program or data held in a particular computer The punishment for such an offence is conviction to imprisonment for a term not exceeding six months or to a fine not exceeding level 5, on the standard scale of both.

Section Two Section two of the computer misuse act states that a person guilty of an offence if they commit an offence under section one with intent of facilitating commission of further offences (even if the following offence is not possible). The punishment for such an offence is conviction to imprisonment for a term not exceeding five years or a fine or to both.

Section Three Section three applies to the unauthorised modification of secure data. This includes: Hindering the operation of any computer Impairing the readability of the data Any modification of any kind The punishment for such an offence is conviction to imprisonment for a term not exceeding five years or a fine or to both.

Conclusion This learning resource contains the facts about computer misuse. It is recommended to read around this subject to gain a comprehensive knowledge of act. To test you knowledge, please spend a few minutes on the following quiz.

Multiple Choice Questions

What is the maximum amount of time you can be imprisoned under the Computer Misuse Act? A) Six months B) One year C) Five years D) Life

What is the maximum amount of time you can be imprisoned under the Computer Misuse Act? A) Six months B) One year C) Five years D) Life Sections two and three of the computer misuse act state that if you knowingly commit a serious crime whilst gaining unauthorised access to a computer system or assist the progress of a Trojan or virus, you can be imprisoned for up to five years.

Are you breaking the law if you only attempt to gain unauthorised access, but fail in doing so? Yes No It depends

Are you breaking the law if you only attempt to gain unauthorised access, but fail in doing so? Yes No It depends It is an offence to even attempt to break into a system. Most of the time, the attack will be undetected as it has failed and it is unlikely that legal action will take place. However, if you are found trying to break into a computer system then you can be imprisoned.

Is it an offence in the computer misuse act if you look over someone’s shoulder while they enter their password? Yes No It depends

Is it an offence in the computer misuse act if you look over someone’s shoulder while they enter their password? Yes No It depends This may be covered by a company’s code of conduct or other laws, but it is not within the scope of the computer misuse act. Most password fields are hidden on modern systems anyway.

When was the computer misuse act created? 1985 1990 1995 2000

When was the computer misuse act created? 1985 1990 1995 2000 The computer misuse act was created in 1990 by UK Parliament. However, it was criticised at the time for being implemented too hastily and has undergone several revisions since then.

Robert Schifreen and Stephen Gold committed which crime which was responsible for the creation of the computer misuse act? Hacked into BT Created a virus that compromised NASA Electronically stole bank details Created the first botnet

Robert Schifreen and Stephen Gold committed which crime which was responsible for the creation of the computer misuse act? Hacked into BT Created a virus that compromised NASA Electronically stole bank details Created the first botnet Robert Schifreen and Stephen Gold hacked into BT between 1984 and 1985 using their home PCs. However, BT was accused of not taking security seriously as the username obtained was 22222222 with password 1234.

Credits