The Computer Misuse Act 1990

Slides:



Advertisements
Similar presentations
By Andy Scott, Michael Murray and Adam Kanopa
Advertisements

FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
Unit 4- Assignment 3 P5, P6, M2 BTEC Business Level 3.
Rohas Nagpal, Asian School of Cyber Laws.  Information Technology Act, 2000  Imprisonment upto 10 years  Compensation upto Rs 1 crore  Indian Penal.
Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
GCSE ICT Computers and the Law. Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Legislation Who governs e-commerce?. E-commerce is regulated by laws and guidelines. These aim to ensure that sites operate effectively and that online.
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
Computer Viruses. Where the name came from This is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
The Legal Framework Can you work out which slide each bullet point should go on?!
CENTRAL SCOTLAND POLICE Data Protection & Information Security Stuart Macfarlane Information Governance Unit Police Service of Scotland.
Computer Misuse Act (1990). What is Computer Misuse Act (1990)? The Computer Misuse Act of 1990 is a law in the UK that makes illegal certain activities,
WHAT Exam Practice WHY All MUST Most SHOULD Some COULD Be able to understand the requirements of the exam to achieve a grade D Be able to understand the.
General Purpose Packages
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Legislation For e-commerce to operate correctly, it needs to adhere to the relevant legislation. These laws protect both the business and the consumer.
I.C.T laws By Luke Honeyfield 12. Laws relating to I.C.T  Copyright, Design, Patents  Data protection ACT  Computer misuse ACT  Health and safety.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Elma Graham. To understand what data protection is To reflect on how data protection affects you To consider how you would safeguard the data of others.
IS Lecture 10 Legal Control of Computer Crime Information Management and Computer Security, 3, 2, 13-19, 1995.
What is a virus? A virus is a software program that is capable of causing great harm to files and other programs on the same computer. It can replicate.
Computer Misuse Act 1990 Altering computer material without permission Accessing computer material without permission with intent to commit further criminal.
By Alexander smart. What is a viruses ? A Computer Virus is a software program that is designed to copy itself over and over again. Viruses do NOT damage.
Legal issues. Computer Misuse Act 1990 Deals with misuse of ICT systems.
Data Protection Act 171 Computers and privacy There are problems as more computers are used There are problems as more computers are used More and more.
A virus is a piece of software tht is designed to copy itself onto other programs causing them to function differently. In the 80’s, when the viruses.
Code of Conduct 344 Code of Conduct 344. Code of Conduct 344 Introduction; Do you agree with the following statements? Employers need their employees.
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
BTEC ICT Legal Issues Data Protection Act (1998) Computer Misuse Act (1990) Freedom of Information Act (2000)
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
The Computer Misuse Act of1990 The Copyright, Designs & Patents Act of
Computer Misuse By: Alex Meadows Michael Read. How can you misuse a computer? Accessing data stored electronically Copying software without permission.
LEGISLATION. DATA PROTECTION ACT (1998) The aim of this act give people the right to know what information is held about them. It also sets out rules.
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
Computer Systems D Stainton. Computer Misuse What is computer misuse? Criminal offences which can be committed using a computer.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Legal issues. Computer Misuse Act 1990 Deals with misuses of ICT systems.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
BTEC Level 3 Unit 3: Information Systems Mr Satari Lesson 7 & 8.
1 AQA ICT AS Level © Nelson Thornes Safety and security Chip and Pin.
Computer Misuse Act INTRODUCTION The Computer Misuse Act became law in August Under the Act hacking and the introduction of viruses are criminal.
Computer Misuse Act 1990 Anti-hacking legislation.
By: Taysha Johnson. What is an insider threat? 1.A current or former employee, contractor, or other business partner who has or had authorized access.
There are two types of law: civil law criminal law.
Security Risks Todays Lesson Security Risks Security Precautions
Learning Intention Legislations impact on security of information
Legal and ethical issues
Misuses of ICT Malpractice and crime © Folens 2008.
COMP3357 Managing Cyber Risk
The Computer Misuse.
Handling Personal Data
Rights and Responsibilities
Anti-hacking legislation
Uppingham Community College
Data Protection Act and Computer Misuse Act ANSWERS.
Computer Systems D Stainton.
Computer Misuse Act 1990.
Legal and Ethical Issues
Harmful Digital Communications Act 2015 URLs
COMP3357 Managing Cyber Risk
Computer Misuse Act 1990 GCSE ICT.
End User Support By Dominique Stainton.
Presentation transcript:

The Computer Misuse Act 1990

Computer Misuse Act 1990 4 key points you need to learn/understand/revise

Computer Misuse Act - Reasons No laws specifically to deal with computer crime prior to 1990 The Misuse Act is often labeled “anti-hacking legislation” It was enacted to respond to the growing threat of hacking to computer systems and data Previously hacking was not illegal in the UK. Act now covers much more.

Levels of Offence The Act specifies 3 levels of offence In summary these are:- Unauthorised Access Unauthorised access with intent to commit another offence Unauthorised modification of data (writing viruses comes under this level)

Penalties Unauthorised Access (level 1) is called a summary offence and penalties are limited to 6 months imprisonment and/or a maximum fine of £5000 The other two offences (levels 2 and 3) are more serious and carry jail terms of up to 5 years and unlimited fines

Example 1 A student hacks into a college database to impress his friends unauthorised access Later he decides to go in again, to alter his grades, but cannot find the correct file unauthorised access with intent A week later he succeeds and alters his grades unauthorised modification of data

Example 2 An employee who is about to made redundant finds the Managing Director’s password; logs into the computer system using this and looks at some confidential files unauthorised access After asking a friend, he finds out how to delete files and wipes the main customer database unauthorised modification Having received his redundancy notice he goes back in to try and cause some damage but fails to do so unauthorised access with intent...

Prosecutions A disgruntled IT supplier hacked estate agency website and replaced pictures of houses with pornography. £1250 fine. A WPC used police national computer to access electoral rolls and car registration records in attempts to track down woman who had an affair with her boyfriend. 3 months imprisonment Defendant aka The Black Baron authored Pathogen and Queeg viruses. 18 months imprisonment Ex-employee stole 1,700 customer records on backup tape before setting up competitive PC networking company. Conditional discharge and £15 fine Ex-employee made unauthorised use of his former employer's Mercury telephone account to make "free" calls. £900 fine

Problems However, prosecutions under the Computer Misuse Act are rare for a number of reasons Offences difficult to prove Evidence difficult to collect - firms do not co-operate with police Firms embarrassed by hacking - particularly banks Employees often simply sacked/demoted Police lack expertise; time; money Offence perceived as ‘soft crime’ no one injured/hurt

Extension Computer Misuse Act Cases 1. Use this website: to find 2 examples each of level 1, 2 and 3 offences 2. Use your textbook and/or Internet sources to make notes on the Computer Misuse Act