Anti-hacking legislation

Slides:



Advertisements
Similar presentations
HOLT, RINEHART AND WINSTON A MERICAN GOVERNMENT HOLT 1 The U.S. Legal System Section 1: U.S. Law Section 2: The Criminal Justice System Section 3: Corrections.
Advertisements

Cyber Law & Islamic Ethics CICT3523 COMPUTER CRIMES.
Chapter 13: Chapter 13 Packet #1.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
The Scottish Court System
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
Topic 12 Attempts Topic 12 Attempts. Topic 12 Attempts Introduction If a defendant fully intends to commit a crime but for some reason fails to complete.
The criminal courts; procedure and sentencing
The Criminal Justice System
U.S. Government Chapter 15 Section 3
The Data Protection Act The Data Protection Act controls how your personal information is used by organisations, businesses or the government. Everyone.
Criminal and Civil Law. Procedure in Felony Criminal Cases 1. Accused person may be arrested if police have probable cause. 2. The accused may be put.
Chapter 16 Lesson 2 Civil and Criminal Law. Crime and Punishment crime  A crime is any act that harms people or society and that breaks a criminal law.
Computer Misuse Act (1990). What is Computer Misuse Act (1990)? The Computer Misuse Act of 1990 is a law in the UK that makes illegal certain activities,
Data Protection and Computer Misuse Act material Modified by Eric from Mary’s slides.
IS Lecture 10 Legal Control of Computer Crime Information Management and Computer Security, 3, 2, 13-19, 1995.
{ Criminal Trial Procedure What happens when the police arrest a criminal suspect?
Process of a Bill Parliamentary Law Making – Legislative Process © The Law Bank Parliamentary Law Making Process of a bill 1.
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
START OF COURT PROCEEDINGS. CRIMINAL PROCEEDINGS, OFFENCES AND BAIL  Criminal proceedings start because of an arrest, summons, charge or warrant – the.
Computer Misuse By: Alex Meadows Michael Read. How can you misuse a computer? Accessing data stored electronically Copying software without permission.
LEGISLATION. DATA PROTECTION ACT (1998) The aim of this act give people the right to know what information is held about them. It also sets out rules.
The Criminal Justice System
Computer Systems D Stainton. Computer Misuse What is computer misuse? Criminal offences which can be committed using a computer.
Legal issues. Computer Misuse Act 1990 Deals with misuses of ICT systems.
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
Trial Procedures.  Trials may be held in either a family court or a youth justice court  Trial follow the same rules of evidence and are equally formal.
Computer Misuse Act INTRODUCTION The Computer Misuse Act became law in August Under the Act hacking and the introduction of viruses are criminal.
Computer Misuse Act 1990 Anti-hacking legislation.
 Hierarchy of courts of England and Wales  Civil courts  Civil procedure.
Bell Ringer Criminal Law: Stages of a Criminal Case  Criminal prosecution develops in a series of stages.  Try to place the following stages in the correct.
Classification of Offences
Legal and ethical issues
COMP3357 Managing Cyber Risk
The Computer Misuse.
Criminal Law ESSENTIAL QUESTIONS Why does conflict develop? How can governments ensure citizens are treated fairly?
Criminal Procedure You have the right to:
1 So, the prisoner has been charged, the CPS has decided there is
The Computer Misuse Act 1990
Chapter 3: Defining & Measuring Crime
Criminal Sanctions.
SENTENCING.
Regulation of Investigatory Powers Act 2000
What punishment should be given?
Understanding the issues related to the use of information
Uppingham Community College
U.S. Government Chapter 15 Section 3
The work of the law courts
The Criminal Justice Process
Data Protection Act and Computer Misuse Act ANSWERS.
The difference between civil and criminal cases
DIVERSION PROGRAMS.
Computer Systems D Stainton.
Computer Misuse Act 1990.
COMP3357 Managing Cyber Risk
The Federal Court System & the Judicial Branch
Computer Misuse Act 1990 GCSE ICT.
Introduction to Criminal Law
Drugs the law & government responses
Texas Judicial System Consists of : Courts Judges
The Structure of Canada’s Courts
End User Support By Dominique Stainton.
Bail. What is bail? Bail is being given liberty until the next stage in the case. Bail is being given liberty until the next stage in the case. Remand.
Differences and similarities
Presentation transcript:

Anti-hacking legislation Computer Misuse Act 1990 Anti-hacking legislation

Background No laws specifically to deal with computer crime prior to 1990 Other laws tried instead Examples. Cox v Riley 1986 (Criminal Damage Act 1971) R. v Whitely 1990 (Criminal Damage Act 1971) R. v Gold and Another (Forgery and Counterfeiting Act 1981)

Background 2 The case of R. v Gold and Another was highly publicised Defendant released on appeal Lead to Law Commission produced report Report No.186, Computer Misuse Michael Colvin’s (MP) Private Member’s Bill This became the Computer Misuse Act 1990

Problems Original bill specifically aimed at hackers Many amendments during passage through parliament Eventual legislation very broad based, lost much of the original intent

Offences The Act specifies 3 offences In summary these are:- Unauthorised Access Unauthorised access with intent to commit another offence Unauthorised modification of data

Penalties 1 Unauthorised Access is called a summary offence and penalties are limited to 6 months imprisonment and/or a maximum fine of £5000

Penalties 2 The other two offences Unauthorised access with intent… Unauthorised modification … Are more serious and carry jail terms of up to 5 years and unlimited fines

Examples 1 Scenario 1 A student hacks into a college database to impress his friends - unauthorised access Later he decide to go in again, to alter his grades, but cannot find the correct file - unauthorised access with intent... A week later he succeeds and alters his grades - unauthorised modification of data

Examples 2 Scenario 2 An employee who is about to made redundant finds the Managing Director’s password; logs into the computer system using this and looks at some confidential files- unauthorised access Having received his redundancy notice he goes back in to try and cause some damage but fails to do so - unauthorised access with intent... After asking a friend, he finds out how to delete files and wipes the main customer database - unauthorised modification

Problems While there has been a rise in hacking more computers/Internet gives greater access Prosecution are rare and punishments small Examples Defendant causes firm to lose £36,000 - Fined £1,650; conditional discharge Defendant destroys £30,000 worth of data - Fined £3000; 140 hours community service

Reasons Very complex Offences difficult to prove Evidence difficult to collect - firms do not co-operate with police Firms embarrassed by hacking - particularly banks Employees often simply sacked/demoted Police lack expertise; time; money Offence perceived as ‘soft crime’ no one injured/hurt

The Bedworth case This case in 1991 caused great concern and it was suggested that further prosecutions under the act would be unlikely to succeed Defendant (and others) hacked into a variety of systems and caused damage Defence stated that defendant ‘addicted to computers’ so could not help hacking Not guilty verdict returned by jury

Current situation Hacking has increased both at hobby and professional levels A few high profile cases Offenders often in other countries with no equivalent legislation Some ‘international task forces’ set up but no real progress Current estimated costs of hacking - £5 billion per year world-wide

The End