Cyber Law & Islamic Ethics CICT3523 COMPUTER CRIMES.

Slides:



Advertisements
Similar presentations
By Andy Scott, Michael Murray and Adam Kanopa
Advertisements

Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
Rohas Nagpal, Asian School of Cyber Laws.  Information Technology Act, 2000  Imprisonment upto 10 years  Compensation upto Rs 1 crore  Indian Penal.
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
COMPUTER CRIMES - THE LAW ENFORCMENT PERSPECTIVE By: Wilfred A Nathan Computer Forensic Branch Criminal Investigation Department Singapore Police Force.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Lecture 1: Overview modified from slides of Lawrie Brown.
Nigel, Lochie, Anika and Martin. As the internet is becoming the most popular area of crime, countries around the world are struggling to update the law.
John MacKenzie Hacking and the Law John MacKenzie
Hazards of Hacking. Hacking Originally, hacking was used to describe a programmer who was very skilled at his/her profession Often, this person knew programming.
Security, Privacy, and Ethics Online Computer Crimes.
Legislation Who governs e-commerce?. E-commerce is regulated by laws and guidelines. These aim to ensure that sites operate effectively and that online.
Threats and Attacks Principles of Information Security, 2nd Edition
The Legal Framework Can you work out which slide each bullet point should go on?!
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Computer Misuse Act (1990). What is Computer Misuse Act (1990)? The Computer Misuse Act of 1990 is a law in the UK that makes illegal certain activities,
Legal Aspects of Computer System Security “Security - Protecting Our Resources”
Computer Crime and CyberCrime Why we need Computer Forensics.
PART THREE E-commerce in Action Norton University E-commerce in Action.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Civil Law Security Services. Copyright © Texas Education Agency, All rights reserved. Images and other multimedia content used with permission.
Quick! What is a crime?. So, just how much has to be proven in court to find someone guilty of a crime? Burden of Proof The prosecution has the burden.
Law Additional Exercise ANSWERS. Question #1 (a) Any one of: gain unauthorised access (1st) to computer material (1) gain (unauthorised) access to computer.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Ethical and Legal Issues v Ethical and legal issues are relevant to any project involving systems development. – privacy – professionalism – ownership.
IS Lecture 10 Legal Control of Computer Crime Information Management and Computer Security, 3, 2, 13-19, 1995.
U.S. Copyright Enforcement Benjamin Hardman Attorney / Advisor Office of Intellectual Property Policy & Enforcement, USPTO.
Crime & Malpractice AS Module Heathcote Ch. 10.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Data Protection Act AS Module Heathcote Ch. 12.
Data Protection Corporate training Data Protection Act 1998 Replaces DPA 1994 EC directive 94/46/EC The Information Commissioner The courts.
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
CYBER LAW Question 1 (a)What is meant by the term ‘cyber law’? Why do we have to study cyber law? (b)Define the term ‘computer crime’ and state how it.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Topic 5: Basic Security.
Copyright 2000, Marchany Computer Law Threats and Issues VA Computer Crime Act Randy Marchany VA Tech Computing Center ©Marchany,2001.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer Misuse By: Alex Meadows Michael Read. How can you misuse a computer? Accessing data stored electronically Copying software without permission.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
Elements of a Crime. Criminal Act The first necessary element of any crime is that a person's action be in violation of a law. Generally, a person must.
ANS(Prepared by: Mazhar Javed )1 Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
Security Debate Why cracking should be criminalized.
Computer Systems D Stainton. Computer Misuse What is computer misuse? Criminal offences which can be committed using a computer.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
DATA PROTECTION 2003 THEORY AND PRACTICE OF HANDLING WITH THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA Belgrad.
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Business Ethics and Social Responsibility GCSE Business and Communication Systems Business and Communication Systems.
Computer Misuse Act INTRODUCTION The Computer Misuse Act became law in August Under the Act hacking and the introduction of viruses are criminal.
Denial of Service Attack Pornography Phising Spoofing Salami Attack Forgery Hackers: enjoy intellectual challenges of overcoming software limitations.
Unit 3: Substantive and Procedural Law in the Four Legal Traditions CJ106 Foundations of International and Comparative Criminal Justice.
Information Security and Privacy in HRIS
Add video notes to lecture
1st Workshop On Transposition Of SADC Cybersecurity Model Laws In National Laws For Namibia Windhoek, Namibia - 30 April 2013 Transposition of SADC.
Regulation of Investigatory Powers Act 2000
Data Protection Legislation
Cyber Crime Today we will look at: Different types of cyber-crime
Computer Systems D Stainton.
Computer Misuse Act 1990.
Faculty of Science IT Department By Raz Dara MA.
Computer Misuse Act 1990 GCSE ICT.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
End User Support By Dominique Stainton.
Laws Against Computer Hacking
Presentation transcript:

Cyber Law & Islamic Ethics CICT3523 COMPUTER CRIMES

DEFINITION of HACKER 1. A person who enjoys exploring the details programmable systems and how to stretch their capabilities as opposed to most users, who prefer to learn only the minimum necessary. 2. One who enjoys the intellectual challenge of overcoming or circumventing limitations. 3. A malicious meddler who tries to discover sensitive information by poking around.

 ‘Hack’ is unauthorised access and unauthorised use (breaking) into a computer system  Hacking is the act of obtaining unauthorised access to programs or data held on a computer system.  The initial act is often followed by attempts to modify or delete the contents of a computer system.  Hacking can be harmless; can be damaging phenomenon.

THE ADVANTAGES OF HACKING  Pure hacking is harmless; indeed socially desirable.  It points up security weaknesses in computer system which can be remedied before being exploited by less well intentioned individual. A lot of information about gaps in security of the computer system.

WHY CRIMINALIZING HACKING?  Hacking should be made a specific offence 1. Given the great and increasing important of computers in the society. 2. To protect public interest that those who use and rely upon computers should not fear that others may gain unauthorised access to material held on the computers especially confidential or sensitive information. 3. Hackers posed great danger to disrupting operation of computers in defense, nuclear power, air traffic or health services.

COMPUTER CRIMES ACT 1997  A quick glance at the content of the Act will reveal obvious similarities with the U.K Computer Misuse Act  The objective of the Act is to provide for offences relating to the misuse of computer.

FOUR SUBSTANTIVE OFFENCES 1. The unauthorised Access offence. 2. The ‘ulterior Intent’ offence. 3. The unauthorised Modification offence. 4. Wrongful communication.

1. The Unauthorised Access Offence  Section 3(1) “A person shall be guilty of an offence if; a) He causes a computer to perform any function with intent to secure access to any program or data held in any computer; b) the access he intends to secure is unauthorised; and c) he knows at the time he causes the computer to perform the function that is the case.

 It requires the accused to cause a computer to perform any function.  The reading of computer printout, the reading of data displayed on the monitor are outside the scope of the offence.  If a person breaks into a computer system but he does not do anything, he does not commit this offence.

 Under section 2(2), a person is said to secure access to any program or data held in a computer, if, by causing a computer to perform any function, he a) alters or erases the program or data b) copies or moves it to any storage medium c) uses it; or d) causes it to be output from the computer in which it is held whether by having it displayed or in any other manner.

 The accused must have intention to secure access to any program or data held in any computer.  The accused must know that the access is unauthorised.

2. The ‘Ulterior Intent’ Offence  Unauthorized access with intent to commit or facilitate commission of further offence.  The scope of further offence envisaged is narrowed to offence involving fraud and dishonesty.  It is also an offence where the unauthorised access is committed to facilitate the commission of such offence by a third party.

3. The Unauthorized Modification Offence  Section 5 (1) provides that a person shall be guilty of an act which he knows will cause unauthorized modification of the contents of any computer.  The spectrum ranges from the unauthorized deletion of data to the denial of access to authorized users.  E.g the introduction of computer virus, worms, logic bomb and such other disabling programs into a computer.

 It be considered as unauthorised if a) the person whose act caused it is not himself entitled to determine whether the modification should be made and b) he does not have consent to the modification from any person who is so entitled.  It is immaterial whether an unauthorized modification is intended to be permanent or temporary.

4. Wrongful Communication  Section 6 provides that a person shall be guilty of an offence if he communicates directly or indirectly a number, password or other means of access to computer to any person other than a person to whom he is duly authorised to communicate.  It is strict liability offence – the person still liable even though he does not has intention to commit the offence.

THE PROBLEMS  Problems of detection and prosecution may prove to be a major obstacle against the effective implementation of the Act.  Acts of computer misuse are difficult to trace. Electronic trails can be manipulated to escape detection of computer misuse.  Additionally, victim of the offences created may be unwilling to report. This is because, if they are bank and financial institutions, they do not want to publicize the fact that their computer systems have been access for fear that customers may feel insecure in utilizing the services offered.

THE PROBLEMS  Another problem is that our enforcement body lack of knowledge on the technology.  Special training should be given to the officers involved in the investigation of computer crimes.  E.g in US, the Federal Bureau of Investigation has offered specialized training for investigators of computer misuse at their training academy.

ISLAMIC CRIMINAL LAW  Criminal acts are divided into three categories: a) Hudud offences are crimes against God whose punishment is specified and required in the Qur’an. b) Qisas – are crimes of physical assault and murder, which are punishable by retaliation. c) Ta’azir - includes offences are those whose penalties are not fixed by the Qur’an or the sunnah but are within the discretion of the qadi.

 Mistake is a complete defense to an offence against the right of God, but not to an offence against the right of person.  Cyber crime: Hudud or ta’zir