Computer Misuse Act 1990 Anti-hacking legislation.

Slides:



Advertisements
Similar presentations
By Andy Scott, Michael Murray and Adam Kanopa
Advertisements

HOLT, RINEHART AND WINSTON A MERICAN GOVERNMENT HOLT 1 The U.S. Legal System Section 1: U.S. Law Section 2: The Criminal Justice System Section 3: Corrections.
Prosecuting Stalking Fiona Gray Trial Advocate Office of the
Cyber Law & Islamic Ethics CICT3523 COMPUTER CRIMES.
Chapter 13: Chapter 13 Packet #1.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
 The judge gave him a sentence of three years in prison.  The other inmates made Lisa’s life hell when she was in prison.  I caught my nephew shoplifting.
The Scottish Court System
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
The Criminal Courts: Procedure and Sentencing
Criminal procedure Anna Krpcová Simona Růžičková Jan Macl.
Criminal Courts by Lisa Incledon. Key Feature of Criminal Trials Criminal offences are offences against the state or society as a whole. Therefore the.
Sentencing. Purpose: To contribute, along with crime prevention initiatives, to respect for the law and the maintenance of a just, peaceful and safe society.
The Criminal Justice System
U.S. Government Chapter 15 Section 3
The Data Protection Act The Data Protection Act controls how your personal information is used by organisations, businesses or the government. Everyone.
Criminal and Civil Law. Procedure in Felony Criminal Cases 1. Accused person may be arrested if police have probable cause. 2. The accused may be put.
Bail.
COURT CASES. There are two types of court cases: 1. Criminal: A case where someone is accused of breaking the law 2. Civil: A disagreement between two.
Chapter 16 Lesson 2 Civil and Criminal Law. Crime and Punishment crime  A crime is any act that harms people or society and that breaks a criminal law.
X C Different types of punishment. You will have 5 minutes to continue/complete the final task from last week. In your group, discuss and write down the.
Computer Misuse Act (1990). What is Computer Misuse Act (1990)? The Computer Misuse Act of 1990 is a law in the UK that makes illegal certain activities,
Categories of law Civil-private wrong Criminal-public wrong.
Courts at Work. Criminal cases An adult criminal case has many steps It usually is not completed in one day, especially felony cases The first step is.
IS Lecture 10 Legal Control of Computer Crime Information Management and Computer Security, 3, 2, 13-19, 1995.
{ Criminal Trial Procedure What happens when the police arrest a criminal suspect?
Chapter 28-2: Texas Judicial Branch and Courts Systems
Bringing the Accused to Trial Awaiting the Trial.
Process of a Bill Parliamentary Law Making – Legislative Process © The Law Bank Parliamentary Law Making Process of a bill 1.
LAW SOURCES OF LAW LAW CRIMINAL LAW-TYPES OF CRIME THE AMERICAN LEGAL SYSTEM CIVIL CASES CRIMINAL CASES JUVENILE CASES.
Canada’s Legal System The Judicial Branch. Who is in the Judiciary Branch? Executive and Legislative branches = _________________ Police = _________________.
Differences Between Criminal Cases and Civil Disputes
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
START OF COURT PROCEEDINGS. CRIMINAL PROCEEDINGS, OFFENCES AND BAIL  Criminal proceedings start because of an arrest, summons, charge or warrant – the.
Computer Misuse By: Alex Meadows Michael Read. How can you misuse a computer? Accessing data stored electronically Copying software without permission.
LEGISLATION. DATA PROTECTION ACT (1998) The aim of this act give people the right to know what information is held about them. It also sets out rules.
The Criminal Justice System
Sentencing This will be fun! I promise?. Purpose: To contribute, along with crime prevention initiatives, to respect for the law and the maintenance of.
Constitutional Criminal Procedure
Computer Systems D Stainton. Computer Misuse What is computer misuse? Criminal offences which can be committed using a computer.
Legal issues. Computer Misuse Act 1990 Deals with misuses of ICT systems.
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
Chapter 28-2: Texas Courts Systems Guided Notes. Texas Judicial System A. Consists of : 1)Courts 2)Judges 3)Law enforcement agencies B. Serves the purposes.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
Trial Procedures.  Trials may be held in either a family court or a youth justice court  Trial follow the same rules of evidence and are equally formal.
BTEC Level 3 Unit 3: Information Systems Mr Satari Lesson 7 & 8.
Computer Misuse Act INTRODUCTION The Computer Misuse Act became law in August Under the Act hacking and the introduction of viruses are criminal.
By: Gracie Guenther, Zach Eckels, Bethany Cobb, Hannah Cobb, and Makensie Cobb.
 Hierarchy of courts of England and Wales  Civil courts  Civil procedure.
Legal and ethical issues
COMP3357 Managing Cyber Risk
The Computer Misuse.
The Computer Misuse Act 1990
Chapter 3: Defining & Measuring Crime
Anti-hacking legislation
SENTENCING.
What punishment should be given?
Uppingham Community College
Data Protection Act and Computer Misuse Act ANSWERS.
Computer Systems D Stainton.
Computer Misuse Act 1990.
COMP3357 Managing Cyber Risk
Computer Misuse Act 1990 GCSE ICT.
The Structure of Canada’s Courts
End User Support By Dominique Stainton.
Differences and similarities
Presentation transcript:

Computer Misuse Act 1990 Anti-hacking legislation

2/14 Background No laws specifically to deal with computer crime prior to 1990 Other laws tried instead Examples. Cox v Riley 1986 (Criminal Damage Act 1971) R. v Whitely 1990 (Criminal Damage Act 1971) R. v Gold and Another (Forgery and Counterfeiting Act 1981)

3/14 Background 2 The case of R. v Gold and Another was highly publicised Defendant released on appeal Lead to Law Commission produced report Report No.186, Computer Misuse Michael Colvin’s (MP) Private Member’s Bill This became the Computer Misuse Act 1990

4/14 Problems Original bill specifically aimed at hackers Many amendments during passage through parliament Eventual legislation very broad based, lost much of the original intent

5/14 Offences The Act specifies 3 offences In summary these are:- –Unauthorised Access –Unauthorised access with intent to commit another offence –Unauthorised modification of data

6/14 Penalties 1 Unauthorised Access is called a summary offence and penalties are limited to –6 months imprisonment and/or –a maximum fine of £5000

7/14 Penalties 2 The other two offences –Unauthorised access with intent… –Unauthorised modification … Are more serious and carry jail terms of up to 5 years and unlimited fines

8/14 Examples 1 Scenario 1 –A student hacks into a college database to impress his friends - unauthorised access –Later he decide to go in again, to alter his grades, but cannot find the correct file - unauthorised access with intent... –A week later he succeeds and alters his grades - unauthorised modification of data

9/14 Examples 2 Scenario 2 –An employee who is about to made redundant finds the Managing Director’s password; logs into the computer system using this and looks at some confidential files- unauthorised access –Having received his redundancy notice he goes back in to try and cause some damage but fails to do so - unauthorised access with intent... –After asking a friend, he finds out how to delete files and wipes the main customer database - unauthorised modification

10/14 Problems While there has been a rise in hacking –more computers/Internet gives greater access Prosecution are rare and punishments small –Examples Defendant causes firm to lose £36,000 - Fined £1,650; conditional discharge Defendant destroys £30,000 worth of data - Fined £3000; 140 hours community service

11/14 Reasons Very complex –Offences difficult to prove –Evidence difficult to collect - firms do not co-operate with police –Firms embarrassed by hacking - particularly banks –Employees often simply sacked/demoted –Police lack expertise; time; money –Offence perceived as ‘soft crime’ no one injured/hurt

12/14 The Bedworth case This case in 1991 caused great concern and it was suggested that further prosecutions under the act would be unlikely to succeed –Defendant (and others) hacked into a variety of systems and caused damage –Defence stated that defendant ‘addicted to computers’ so could not help hacking –Not guilty verdict returned by jury

13/14 Current situation Hacking has increased both at hobby and professional levels A few high profile cases Offenders often in other countries with no equivalent legislation Some ‘international task forces’ set up but no real progress Current estimated costs of hacking - £5 billion per year world-wide

The End