End User Support By Dominique Stainton.

Slides:



Advertisements
Similar presentations
Offences, Jurisdiction & Evidence: The UK experience Dr Ian Walden Director, Computer Related Crime Research Centre Queen Mary & Westfield College.
Advertisements

By Andy Scott, Michael Murray and Adam Kanopa
Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
E-commerce Law Crime and e-commerce. There are various ways that crime and e-commerce overlap. Some are peculiar to e-commerce – fraud, others are relevant.
Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
Cyber Law & Islamic Ethics CICT3523 COMPUTER CRIMES.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Legislation in ICT.
University of Sunderland Professionalism and Personal Skills Unit 11 Professionalism and Personal Skills Computer Legislation.
OVERVIEW OF COMPUTER CRIME LEGISLATION IN HAWAII
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
The Legal Framework Can you work out which slide each bullet point should go on?!
Computer Misuse Act (1990). What is Computer Misuse Act (1990)? The Computer Misuse Act of 1990 is a law in the UK that makes illegal certain activities,
General Purpose Packages
I.C.T laws By Luke Honeyfield 12. Laws relating to I.C.T  Copyright, Design, Patents  Data protection ACT  Computer misuse ACT  Health and safety.
Law Additional Exercise ANSWERS. Question #1 (a) Any one of: gain unauthorised access (1st) to computer material (1) gain (unauthorised) access to computer.
Computer Legislation The need for computer laws Go to Contents.
Computer Misuse Act 1990 Altering computer material without permission Accessing computer material without permission with intent to commit further criminal.
Legal issues. Computer Misuse Act 1990 Deals with misuse of ICT systems.
Chapter 6 International crime. In this chapter, you will study the concept of international crime. You will be introduced to the main categories of international.
University of Sunderland Professionalism and Personal Skills Unit 7 Professionalism and Personal Skills Lecture 7: Computer Crime.
Unit 1_9 The Legal Framework. Introduction This lesson will cover the following areas of computer law –The Data Protection Acts 1984 & 1998 –The Computer.
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
BTEC ICT Legal Issues Data Protection Act (1998) Computer Misuse Act (1990) Freedom of Information Act (2000)
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
The Computer Misuse Act of1990 The Copyright, Designs & Patents Act of
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
LEGISLATION. DATA PROTECTION ACT (1998) The aim of this act give people the right to know what information is held about them. It also sets out rules.
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
Computer Systems D Stainton. Computer Misuse What is computer misuse? Criminal offences which can be committed using a computer.
University of Sunderland MSc HIM Computer Legislation.
Legal issues. Computer Misuse Act 1990 Deals with misuses of ICT systems.
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
Computer Misuse Act INTRODUCTION The Computer Misuse Act became law in August Under the Act hacking and the introduction of viruses are criminal.
NEVER USE YOUR REAL NAME ALAWYS USE A NICKNAME IS SOMEONE SENDS SOME NASTY OR RUDE DON’T DELET IT SHOW IT TO SOMEONE DON’T GIVE ANYONE YOU DON’T KNOW A.
Computer Misuse Act 1990 Anti-hacking legislation.
Learning Objectives Can I discuss the copyright law Can I identify why organisations must protect data Can I describe how legislation affect computer use.
Legal and ethical issues
Chapter 19.1 Cyberlaw and Cybercrime
Handout 2: Data Protection and Copyright
The Computer Misuse Act 1990
Legislation in ICT.
Anti-hacking legislation
Understand mechanisms to control organisational IT security
Regulation of Investigatory Powers Act 2000
Understanding the issues related to the use of information
Cyber Crime Today we will look at: Different types of cyber-crime
Data Protection Act and Computer Misuse Act ANSWERS.
Computer Systems D Stainton.
Societal Issues in Computing (COMP466)
Computer Misuse Act 1990.
Chapter 6 International crime
Legal and Ethical Issues
Preventing Information Technology Crimes
Legislation in ICT.
Computer Misuse Act 1990 GCSE ICT.
Understand mechanisms to control organisational IT security
How it affects policies and procedures
LO1 - Know about aspects of cyber security
Revision Lesson 10X5.
PRESENTER: MR. KOZHI KATAKA, LLB
Presentation transcript:

End User Support By Dominique Stainton

Computer Misuse What is computer misuse? Criminal offences which can be committed using a computer

Fraud The term fraud traditionally covers a range of crimes in which some kind of advantage has been obtained by deception. An example would be where directors falsify accounts in order to obtain a loan or just monies that would not otherwise be available. Computer fraud generally involves interfering with the operation of a computer in some way to obtain financial advantage. However, whilst important, it is not an area that we need to concentrate upon for this unit.

Hacking – a brief history In the late 1980’s there was concern about hacking and the damage which could be done to systems – especially those that were safety-critical –this concern was increased by the appearance of the first computer viruses. There were a number of attempts to prosecute hackers under the then-existing legislation, but the success rate was not very high.

Hacking – a brief history It became clear that the law, as it was at that time, was poorly equipped to address the activities of hackers and virus writers. Studies were carried out into the issue – the English Law Commission wrote a report in 1989. The recommendations of the Commission’s report formed the basis of the Computer Misuse Act which was passed in 1990.

The Act The Computer Misuse Act 1990 was designed to protect the integrity of computer systems by deterring the activities of hackers. It created three new offences: Unauthorised access to computer programs or data Unauthorised access with a further criminal intent (known as the ‘ulterior intent’ offence) Unauthorised modification of computer material

The Act Besides addressing computer misuse the Act also contains special provisions in recognition that hackers may operate from other countries, by including special provisions relating to jurisdiction and extradition. You will need to research information on this act.