SlideShare a Scribd company logo
Computer Misuse Act ICT GCSE
The Computer Misuse Act Originally introduced in 1990 Prior to 1990, there was no legislation in place to tackle the problems caused by hacking.  Although everyone knew that it was wrong and should be against the law, there was nothing that anyone could do about it.
Offence 1 Unauthorised access to computer material Lowest level of offence Have you ever logged into someone else's account without their permission? If so you are guilty of this offence, even if you didn't make any changes This offence carries the risk of a six month jail sentence
Offence 2 Unauthorised access with intent to commit or facilitate a crime The difference between this and the first offence is that the person gaining access to someone else’s system is doing so with the sole purpose of doing something illegal. This might mean that they had to guess or steal the password in order to get into someone's user area or their bank account. They might want to steal some company secrets or they might want to transfer some money out of your bank account into their own. Anyone caught doing this risks up to a five year prison sentence and/or a hefty fine.
Offence 3 Unauthorised modification of computer material This offence relates to the deletion or changes made to files with the intent to cause damage to an individual or company. The difference is 'the intent to cause damage'. This offence also covers purposely introducing viruses to other peoples' systems. Writing a virus technically isn't a crime; but if you knowingly transmit a virus to others, you are guilty under this section of the Computer Misuse Act. This offence carries a penalty of up to  five years in prison and/or a fine.

More Related Content

PPT
Computer misuse
PPT
Computer Misuse Act
PPT
Computer Miss-use and Criminal Law
PPT
Computer misuse act new 13 12-11
PPTX
Computer misuse and criminal law
PPTX
Cybercrime law legality report
PPT
computer misuse n criminal law
PPTX
Cybercrime law in the philippines
Computer misuse
Computer Misuse Act
Computer Miss-use and Criminal Law
Computer misuse act new 13 12-11
Computer misuse and criminal law
Cybercrime law legality report
computer misuse n criminal law
Cybercrime law in the philippines

What's hot (20)

PPS
State of Cyber Law in India
PPT
Introduction to Cyber Law
PDF
Law of-cybercrime
PPTX
Cyber fraud
PPTX
Cyber Security
PPTX
Computer And The Law
PPTX
Information Technology Act, 2000
PDF
Cybercrime Prevention Act
PPT
Cyber defamation
PDF
Furio lerma cybercrime-final
PPTX
HSC IT - Cyber Law and Ethics part 2
PPT
Overview of Computer & Internet Crimes in India
PPT
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
DOCX
Cybercrime act of Pakistan 2015 Report
PDF
Cyber Laws
PPT
Need And Importance Of Cyber Law
PPSX
Cyber crime 4th may,2018
PPTX
Cyber Law And Ethics
DOCX
Shilpa
PDF
Cyber Law & Forensics
State of Cyber Law in India
Introduction to Cyber Law
Law of-cybercrime
Cyber fraud
Cyber Security
Computer And The Law
Information Technology Act, 2000
Cybercrime Prevention Act
Cyber defamation
Furio lerma cybercrime-final
HSC IT - Cyber Law and Ethics part 2
Overview of Computer & Internet Crimes in India
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
Cybercrime act of Pakistan 2015 Report
Cyber Laws
Need And Importance Of Cyber Law
Cyber crime 4th may,2018
Cyber Law And Ethics
Shilpa
Cyber Law & Forensics
Ad

Viewers also liked (6)

PDF
Cybercrime And Computer Misuse Cases
DOC
Computer misuse act 1990
PPT
Companies Act 2006 - Key points
PPT
Computer Ethics and Legal Issues
PPTX
Qualifications reform - guide for parents
PPTX
BTEC National in ICT: Unit 3 - Legal Constraints
Cybercrime And Computer Misuse Cases
Computer misuse act 1990
Companies Act 2006 - Key points
Computer Ethics and Legal Issues
Qualifications reform - guide for parents
BTEC National in ICT: Unit 3 - Legal Constraints
Ad

Similar to Computer Misuse Act (20)

PPTX
11. cs sr p - computer misuse act 1990
PDF
International Cybercrime (Part 2)
PPTX
upload a required Computer Misuse.pptx
PPTX
Cybercrime law
PPTX
cyber crime in india and law related to cyber crime
PPT
Cybercrime
PDF
Existing Sri Lankan Legal Framework on Cyber Crimes
PPT
cyber-laws.ppt
PDF
Chapter-3-Ethics-in-Information-Technology.pdf
PPTX
2ndnov_txicybersec& SAFETY.pptx
PPTX
cyber crime and laws
PPTX
Cyber Law.pptx
PDF
[CB20] Keynote1:Reforming cybercrime legislations to support vulnerability re...
DOC
Computer crime
PDF
Chapter 3 legal framework of cybercrime and law enforcement tools
PPT
Cyber Laws In Pakistan
PPTX
PED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptx
PPT
REPUBLIC ACT NO. 10175 CYBERCRIME PREVENTION ACT OF 2012 (1).ppt
PPTX
Cyber crime lecture one definition and nature
DOCX
SITA LAB REPORT (XYBER CRIME)
11. cs sr p - computer misuse act 1990
International Cybercrime (Part 2)
upload a required Computer Misuse.pptx
Cybercrime law
cyber crime in india and law related to cyber crime
Cybercrime
Existing Sri Lankan Legal Framework on Cyber Crimes
cyber-laws.ppt
Chapter-3-Ethics-in-Information-Technology.pdf
2ndnov_txicybersec& SAFETY.pptx
cyber crime and laws
Cyber Law.pptx
[CB20] Keynote1:Reforming cybercrime legislations to support vulnerability re...
Computer crime
Chapter 3 legal framework of cybercrime and law enforcement tools
Cyber Laws In Pakistan
PED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptx
REPUBLIC ACT NO. 10175 CYBERCRIME PREVENTION ACT OF 2012 (1).ppt
Cyber crime lecture one definition and nature
SITA LAB REPORT (XYBER CRIME)

More from mrbennett2009 (19)

DOC
Creating A Website Using Dreamweaver
PPT
Web Intro
PPT
The Internet
PPT
Systems Life Cycle
PPT
Storage
PPT
Software
PPT
Security
PPT
Public Information Systems
PPT
Operating Systems
PPT
Networking
PPT
Ict And Society
PPT
Databases
PPT
Input And Output Devices
PPT
Data Protection Act
PPT
Backup And File Management
PPT
Computer Systems
PPT
Control Intro
PPT
Data Logging And Control
PPT
Application Types
Creating A Website Using Dreamweaver
Web Intro
The Internet
Systems Life Cycle
Storage
Software
Security
Public Information Systems
Operating Systems
Networking
Ict And Society
Databases
Input And Output Devices
Data Protection Act
Backup And File Management
Computer Systems
Control Intro
Data Logging And Control
Application Types

Recently uploaded (20)

PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
Cell Structure & Organelles in detailed.
PDF
Computing-Curriculum for Schools in Ghana
PDF
Pre independence Education in Inndia.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
GDM (1) (1).pptx small presentation for students
PDF
Classroom Observation Tools for Teachers
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
RMMM.pdf make it easy to upload and study
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
STATICS OF THE RIGID BODIES Hibbelers.pdf
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
human mycosis Human fungal infections are called human mycosis..pptx
Cell Structure & Organelles in detailed.
Computing-Curriculum for Schools in Ghana
Pre independence Education in Inndia.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
GDM (1) (1).pptx small presentation for students
Classroom Observation Tools for Teachers
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Anesthesia in Laparoscopic Surgery in India
RMMM.pdf make it easy to upload and study
FourierSeries-QuestionsWithAnswers(Part-A).pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
VCE English Exam - Section C Student Revision Booklet
O5-L3 Freight Transport Ops (International) V1.pdf
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPH.pptx obstetrics and gynecology in nursing
Module 4: Burden of Disease Tutorial Slides S2 2025

Computer Misuse Act

  • 2. The Computer Misuse Act Originally introduced in 1990 Prior to 1990, there was no legislation in place to tackle the problems caused by hacking. Although everyone knew that it was wrong and should be against the law, there was nothing that anyone could do about it.
  • 3. Offence 1 Unauthorised access to computer material Lowest level of offence Have you ever logged into someone else's account without their permission? If so you are guilty of this offence, even if you didn't make any changes This offence carries the risk of a six month jail sentence
  • 4. Offence 2 Unauthorised access with intent to commit or facilitate a crime The difference between this and the first offence is that the person gaining access to someone else’s system is doing so with the sole purpose of doing something illegal. This might mean that they had to guess or steal the password in order to get into someone's user area or their bank account. They might want to steal some company secrets or they might want to transfer some money out of your bank account into their own. Anyone caught doing this risks up to a five year prison sentence and/or a hefty fine.
  • 5. Offence 3 Unauthorised modification of computer material This offence relates to the deletion or changes made to files with the intent to cause damage to an individual or company. The difference is 'the intent to cause damage'. This offence also covers purposely introducing viruses to other peoples' systems. Writing a virus technically isn't a crime; but if you knowingly transmit a virus to others, you are guilty under this section of the Computer Misuse Act. This offence carries a penalty of up to five years in prison and/or a fine.