SlideShare a Scribd company logo
7
Most read
10
Most read
11
Most read
Anti-hacking legislation
To identify and understand the offences covered by the computer misuse act.
A quality set of notes covering the computer misuse act. A poster for this classroom, aimed at an audience of students in your school.
Introduced as a result of concerns about people misusing the data and programs held on a computer. Other laws tried instead Examples. Cox v Riley 1986 (Criminal Damage Act 1971) R. v Gold and Another (Forgery and Counterfeiting Act 1981)
The case of  R. v Gold and Schifreen  was highly publicised  Gained unauthorized access to British Telecom's Interactive viewdata service Lead to Law Commission produced report Report No.186, Computer Misuse This became the Computer Misuse Act 1990 http://bit.ly/kBSHIi
Original bill specifically aimed at hackers Many amendments during passage through parliament  Eventual legislation very broad based, lost much of the original intent
The Act specifies 3 offences In summary these are:-  Unauthorised Access Unauthorised access with intent to commit another offence Unauthorised modification of data
Unauthorised Access  is called a  summary offence  and penalties are limited to: 6 months imprisonment and/or a maximum fine of £5000 You are committing an offence if you try to access any program or data held in any computer without permission and you know at the time that this is the case. E.G. A student gaining access to a fellow students area, or breaking in to the college administrative system, is breaking this category of act.
The other two offences Unauthorised access with intent … Covers offenders who carry out unauthorised access with a more serious criminal intent Unauthorised modification  … Concerns the alteration of data or programs within a computer system Are more serious and carry jail terms of up to 5 years and unlimited fines
Scenario 1 A student hacks into a college database to impress his friends unauthorised access Later he decide to go in again, to alter his grades, but cannot find the correct file – unauthorised access  with intent A week later he succeeds and alters his grades – unauthorised modification of data
Scenario 2 An employee who is about to made redundant finds the Managing Director’s password; logs into the computer system using this and looks at some confidential files- unauthorised access Having received his redundancy notice he goes back in to try and cause some damage but fails to do so –  unauthorised access  with intent After asking a friend, he finds out how to delete files and wipes the main customer database – unauthorised modification of data
Prosecution are rare and punishments small Examples Defendant causes firm to lose £36,000 -  Fined £1,650; conditional discharge Defendant destroys £30,000 worth of data -  Fined £3000; 140 hours community service /14
Very complex Offences difficult to prove Evidence difficult to collect - firms do not co-operate with police Firms embarrassed by hacking - particularly banks Employees often simply sacked/demoted Police lack expertise; time; money Offence perceived as ‘soft crime’ no one injured/hurt
This case in 1991 caused great concern and it was suggested that further prosecutions under the act  would be unlikely to succeed Defendant (and others) hacked into a variety of systems and caused damage Defence stated that defendant ‘addicted to computers’ so could not help hacking Not guilty verdict returned by jury
Hacking has increased both at hobby and professional levels A few high profile cases Offenders often in other countries with no equivalent legislation Some ‘international task forces’ set up but no real progress Current estimated costs of hacking - £5 billion per year world-wide
Page 247 Mott and Leeming Look at the cases described 1a – 1e, explain which category of the Computer Misuse Act has been broken. /14
Create a poster for this classroom, aimed at an  audience   of students  in your school. Purpose – inform, educate Your poster should  make clear to them which of the activities a student might carry out are illegal under the Computer Misuse Act .

More Related Content

PPTX
Cyber crime ppt
PPTX
Cyber crime in india
PPT
It act ppt ( 1111)
PPTX
Cyber Crime
PPTX
Cyber crime
PPTX
Cyber crime
PPTX
CYBER SECURITY
PPTX
Introduction to cybercrime
Cyber crime ppt
Cyber crime in india
It act ppt ( 1111)
Cyber Crime
Cyber crime
Cyber crime
CYBER SECURITY
Introduction to cybercrime

What's hot (20)

PPTX
Cyber crime
PPTX
Cyber Crime
PPTX
Cyber crimes presentation
PPTX
Cyber crime
PPTX
Cyber Crime and laws in Pakistan
PPTX
Cyber crime types
DOCX
E crime thesis Cyber Crime and its several types
PPTX
Cyber Crime
PDF
Computer Security Threats
PPTX
Cyber crime and its types
PPT
Cyber Crime
PPSX
Cyber crime
PPT
Cyber crime
PPTX
Cyber crime and security
PDF
CS6004 Cyber Forensics
PPTX
Cyber security ppt final
DOCX
Cyber laws with case studies
PPTX
Cyber security
PPTX
PPT
Cyber crime and cyber security
Cyber crime
Cyber Crime
Cyber crimes presentation
Cyber crime
Cyber Crime and laws in Pakistan
Cyber crime types
E crime thesis Cyber Crime and its several types
Cyber Crime
Computer Security Threats
Cyber crime and its types
Cyber Crime
Cyber crime
Cyber crime
Cyber crime and security
CS6004 Cyber Forensics
Cyber security ppt final
Cyber laws with case studies
Cyber security
Cyber crime and cyber security
Ad

Similar to Computer Misuse Act (20)

PPT
Computer misuse act new 13 12-11
PPT
Cyber Forensics.ppt
PPTX
upload a required Computer Misuse.pptx
PPTX
Cyber Crime Investigation
PDF
Hhs en12 legalities_and_ethics
DOCX
Assignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docx
PPTX
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
DOCX
286CHAPTER 14CyberlawCHAPTER 15International and.docx
PPTX
Topic 3 Current Legislation.pptx
PPTX
Date Use Rules in Different Business Scenarios: It's All Contextual
PPT
chapter5F.ppt
PPT
5362098
PPT
5362098
PPTX
Data Use Rules in Different Business Scenarios: It's All Contextual
PPTX
Date Use Rules in Different Business Scenarios: It's All Contextual
PPTX
Wipo 2011
PPTX
Date Use Rules in Different Business Scenarios: It's All Contextual
PPTX
Date Use Rules in Different Business Scenarios:It's All Contextual
PPTX
Legal And Ethical Aspects.pptx
PPT
Look Before You Leap: Unauthorized Practice of the Law, Supervision of Non-La...
Computer misuse act new 13 12-11
Cyber Forensics.ppt
upload a required Computer Misuse.pptx
Cyber Crime Investigation
Hhs en12 legalities_and_ethics
Assignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docx
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
286CHAPTER 14CyberlawCHAPTER 15International and.docx
Topic 3 Current Legislation.pptx
Date Use Rules in Different Business Scenarios: It's All Contextual
chapter5F.ppt
5362098
5362098
Data Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
Wipo 2011
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:It's All Contextual
Legal And Ethical Aspects.pptx
Look Before You Leap: Unauthorized Practice of the Law, Supervision of Non-La...
Ad

More from mrmwood (20)

PPTX
3.10 Introducing large ict systems into organisations
PPTX
3.8 development methods
PPTX
3.7 developing ict solutions
PPTX
3.6 legislation and regulations
PPTX
3.11 training and supporting users
PPTX
3.9 techniques and tools for systems development
PPTX
3.12 external and internal resources
PPTX
2.9 The consequences of the use of ict
PPTX
2.8 factors affecting the use of ict
PPTX
2.7 what ict can provide
PPTX
2.6 backup and recovery
PPT
Copyright designs and patents act new 13 12-11
PPT
Data protection act new 13 12-11
PPTX
2.5 safety and security of data in ict systems 13 12-11
PPT
Copyright designs and patents act
PPT
Copyright designs and patents act
PPT
Copyright designs and patents act
PPT
Data Protection Act
PPT
Data Protection Act
PPT
3.5 ICT Policies
3.10 Introducing large ict systems into organisations
3.8 development methods
3.7 developing ict solutions
3.6 legislation and regulations
3.11 training and supporting users
3.9 techniques and tools for systems development
3.12 external and internal resources
2.9 The consequences of the use of ict
2.8 factors affecting the use of ict
2.7 what ict can provide
2.6 backup and recovery
Copyright designs and patents act new 13 12-11
Data protection act new 13 12-11
2.5 safety and security of data in ict systems 13 12-11
Copyright designs and patents act
Copyright designs and patents act
Copyright designs and patents act
Data Protection Act
Data Protection Act
3.5 ICT Policies

Recently uploaded (20)

PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Classroom Observation Tools for Teachers
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
01-Introduction-to-Information-Management.pdf
PDF
Pre independence Education in Inndia.pdf
PPTX
Cell Structure & Organelles in detailed.
PDF
Complications of Minimal Access Surgery at WLH
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PDF
Basic Mud Logging Guide for educational purpose
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
Institutional Correction lecture only . . .
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
master seminar digital applications in india
PDF
Business Ethics Teaching Materials for college
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Classroom Observation Tools for Teachers
O7-L3 Supply Chain Operations - ICLT Program
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
2.FourierTransform-ShortQuestionswithAnswers.pdf
Anesthesia in Laparoscopic Surgery in India
01-Introduction-to-Information-Management.pdf
Pre independence Education in Inndia.pdf
Cell Structure & Organelles in detailed.
Complications of Minimal Access Surgery at WLH
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
Basic Mud Logging Guide for educational purpose
TR - Agricultural Crops Production NC III.pdf
Microbial disease of the cardiovascular and lymphatic systems
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Institutional Correction lecture only . . .
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
master seminar digital applications in india
Business Ethics Teaching Materials for college
STATICS OF THE RIGID BODIES Hibbelers.pdf

Computer Misuse Act

  • 2. To identify and understand the offences covered by the computer misuse act.
  • 3. A quality set of notes covering the computer misuse act. A poster for this classroom, aimed at an audience of students in your school.
  • 4. Introduced as a result of concerns about people misusing the data and programs held on a computer. Other laws tried instead Examples. Cox v Riley 1986 (Criminal Damage Act 1971) R. v Gold and Another (Forgery and Counterfeiting Act 1981)
  • 5. The case of R. v Gold and Schifreen was highly publicised Gained unauthorized access to British Telecom's Interactive viewdata service Lead to Law Commission produced report Report No.186, Computer Misuse This became the Computer Misuse Act 1990 http://bit.ly/kBSHIi
  • 6. Original bill specifically aimed at hackers Many amendments during passage through parliament Eventual legislation very broad based, lost much of the original intent
  • 7. The Act specifies 3 offences In summary these are:- Unauthorised Access Unauthorised access with intent to commit another offence Unauthorised modification of data
  • 8. Unauthorised Access is called a summary offence and penalties are limited to: 6 months imprisonment and/or a maximum fine of £5000 You are committing an offence if you try to access any program or data held in any computer without permission and you know at the time that this is the case. E.G. A student gaining access to a fellow students area, or breaking in to the college administrative system, is breaking this category of act.
  • 9. The other two offences Unauthorised access with intent … Covers offenders who carry out unauthorised access with a more serious criminal intent Unauthorised modification … Concerns the alteration of data or programs within a computer system Are more serious and carry jail terms of up to 5 years and unlimited fines
  • 10. Scenario 1 A student hacks into a college database to impress his friends unauthorised access Later he decide to go in again, to alter his grades, but cannot find the correct file – unauthorised access with intent A week later he succeeds and alters his grades – unauthorised modification of data
  • 11. Scenario 2 An employee who is about to made redundant finds the Managing Director’s password; logs into the computer system using this and looks at some confidential files- unauthorised access Having received his redundancy notice he goes back in to try and cause some damage but fails to do so – unauthorised access with intent After asking a friend, he finds out how to delete files and wipes the main customer database – unauthorised modification of data
  • 12. Prosecution are rare and punishments small Examples Defendant causes firm to lose £36,000 - Fined £1,650; conditional discharge Defendant destroys £30,000 worth of data - Fined £3000; 140 hours community service /14
  • 13. Very complex Offences difficult to prove Evidence difficult to collect - firms do not co-operate with police Firms embarrassed by hacking - particularly banks Employees often simply sacked/demoted Police lack expertise; time; money Offence perceived as ‘soft crime’ no one injured/hurt
  • 14. This case in 1991 caused great concern and it was suggested that further prosecutions under the act would be unlikely to succeed Defendant (and others) hacked into a variety of systems and caused damage Defence stated that defendant ‘addicted to computers’ so could not help hacking Not guilty verdict returned by jury
  • 15. Hacking has increased both at hobby and professional levels A few high profile cases Offenders often in other countries with no equivalent legislation Some ‘international task forces’ set up but no real progress Current estimated costs of hacking - £5 billion per year world-wide
  • 16. Page 247 Mott and Leeming Look at the cases described 1a – 1e, explain which category of the Computer Misuse Act has been broken. /14
  • 17. Create a poster for this classroom, aimed at an audience of students in your school. Purpose – inform, educate Your poster should make clear to them which of the activities a student might carry out are illegal under the Computer Misuse Act .