Computer Misuse Act 1990 GCSE ICT.

Slides:



Advertisements
Similar presentations
By Andy Scott, Michael Murray and Adam Kanopa
Advertisements

Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
Cyber Law & Islamic Ethics CICT3523 COMPUTER CRIMES.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
Computer Threats I can understand computer threats and how to protect myself from these threats.
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
GCSE ICT Computers and the Law. Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Legislation in ICT.
INFORMATION TECHNOLOGY
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
Computer Viruses. Where the name came from This is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
The Legal Framework Can you work out which slide each bullet point should go on?!
Issues Raised by ICT.
Computer Misuse Act (1990). What is Computer Misuse Act (1990)? The Computer Misuse Act of 1990 is a law in the UK that makes illegal certain activities,
General Purpose Packages
I.C.T laws By Luke Honeyfield 12. Laws relating to I.C.T  Copyright, Design, Patents  Data protection ACT  Computer misuse ACT  Health and safety.
Computer Security By Charlotte Foster 8P Computer viruses are small software programs that are designed to spread from one computer to another and to.
Section 6 Theory Software Copyright, Viruses and Hacking.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
What is a virus? A virus is a software program that is capable of causing great harm to files and other programs on the same computer. It can replicate.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
By Alexander smart. What is a viruses ? A Computer Virus is a software program that is designed to copy itself over and over again. Viruses do NOT damage.
Files are at risk from loss if your computer breaks or if you get a virus. Files can also become corrupted. Solutions: Make regular back ups of files Use.
Legal issues. Computer Misuse Act 1990 Deals with misuse of ICT systems.
A virus is a piece of software tht is designed to copy itself onto other programs causing them to function differently. In the 80’s, when the viruses.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
Everyone has a duty to comply with the Act, including employers, employees, trainees, self-employed, manufacturers, suppliers, designers, importers of.
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
Ethics. Ethics are the principles and standards we use to decide how to act.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
Viruses For… What is a virus? A virus, affects your computer and damages its software. It can affect your computer, and some viruses can damage your.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Internet Safety Internet Safety LPM
Computer Misuse By: Alex Meadows Michael Read. How can you misuse a computer? Accessing data stored electronically Copying software without permission.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
M ORAL AND ETHICAL ISSUES. Use and Abuse of Personal and Private Data All the information stored on Computer is governed by law or legislation. The main.
Computer Systems D Stainton. Computer Misuse What is computer misuse? Criminal offences which can be committed using a computer.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
In your pairs What is your law? Why is it important to have the law? How was law broken? Give examples of how to avoid being prosecuted under the law or.
DoS Attacks Phishing Keylogging Computer Laws/Acts.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
1 AQA ICT AS Level © Nelson Thornes Safety and security Chip and Pin.
Computer Misuse Act INTRODUCTION The Computer Misuse Act became law in August Under the Act hacking and the introduction of viruses are criminal.
NEVER USE YOUR REAL NAME ALAWYS USE A NICKNAME IS SOMEONE SENDS SOME NASTY OR RUDE DON’T DELET IT SHOW IT TO SOMEONE DON’T GIVE ANYONE YOU DON’T KNOW A.
Computer Misuse Act 1990 Anti-hacking legislation.
Denial of Service Attack Pornography Phising Spoofing Salami Attack Forgery Hackers: enjoy intellectual challenges of overcoming software limitations.
Learning Objectives Can I discuss the copyright law Can I identify why organisations must protect data Can I describe how legislation affect computer use.
Security Risks Todays Lesson Security Risks Security Precautions
To Know what Cyber crime is
Misuses of ICT Malpractice and crime © Folens 2008.
The Computer Misuse Act 1990
Legislation in ICT.
Anti-hacking legislation
Understanding the issues related to the use of information
Data Protection Act and Computer Misuse Act ANSWERS.
Computer Systems D Stainton.
Computer Misuse Act 1990.
Legal and Ethical Issues
Legislation in ICT.
End User Support By Dominique Stainton.
Presentation transcript:

Computer Misuse Act 1990 GCSE ICT

Introduction Hacking has been around almost as long as the Internet; some people just love to try and break into a computer system. Prior to 1990, there was no legislation in place to tackle the problems caused by hacking. Although everyone knew that it was wrong and should be against the law, there was nothing that anyone could do about it. As the problem grew, it became apparent that specific legislation was needed to enable hackers to be prosecuted under the law. So, in 1990, the Computer Misuse Act was passed. The Computer Misuse Act (1990) recognised three new offences: Unauthorised access to computer material Unauthorised access with intent to commit or facilitate a crime Unauthorised modification of computer material.

Offence 1 Unauthorised access to computer material This is the lowest level of offence and is one that many of us might be guilty of at some stage in our school or working lives. Have you ever found, guessed or used someone elses' password to log onto their user area? If you do this and then look at their files, even if you don't change, delete or damage anything, you are still guilty of accessing materials without authorisation - and this is illegal.

Offence 2 Unauthorised access with intent to commit or facilitate a crime The difference between this and the first offence is that the person gaining access to someone elses' system is doing so with the sole purpose of doing something illegal. This might mean that they had to guess or steal the password in order to get into someone's user area or their bank account. They could do this by trial and error or by using special programs such as spyware or keylogging software, or they could use a relatively new technique called 'phishing'.

Offence 3 Unauthorised modification of computer material Everyone deletes files from their own system, maybe they no longer need them or maybe they delete them by mistake. This is fine - there was no intent to cause any damage. This offence relates to the deletion or changes made to files with the intent to cause damage to an individual or company. The difference is 'the intent to cause damage'. This offence also covers purposely introducing viruses to other peoples' systems. All offences carry penalties of fines or imprisonment