IS3532 - Lecture 10 Legal Control of Computer Crime Information Management and Computer Security, 3, 2, 13-19, 1995.

Slides:



Advertisements
Similar presentations
By Andy Scott, Michael Murray and Adam Kanopa
Advertisements

Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
Unit 4- Assignment 3 P5, P6, M2 BTEC Business Level 3.
BT2103 Developing Small Systems for Business Lecture 2 Databases, Data Management, And The Legal Framework.
Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
Cyber Law & Islamic Ethics CICT3523 COMPUTER CRIMES.
Burglary. Lesson Objectives I will be able to state the definition of burglary I will be able to explain the actus reus and mens rea of burglary under.
GCSE ICT Computers and the Law. Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
Legislation in ICT.
Mens Rea (Cont.) November 13,2007. What you need to know about mens rea: Understand hierarchy of states of subjective mens rea Statutory interpretation.
1.9 The Legal Framework In this section you must be able to:
University of Sunderland Professionalism and Personal Skills Unit 11 Professionalism and Personal Skills Computer Legislation.
Legislation Who governs e-commerce?. E-commerce is regulated by laws and guidelines. These aim to ensure that sites operate effectively and that online.
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
The Legal Framework Can you work out which slide each bullet point should go on?!
Computer Misuse Act (1990). What is Computer Misuse Act (1990)? The Computer Misuse Act of 1990 is a law in the UK that makes illegal certain activities,
Legal Aspects of Computer System Security “Security - Protecting Our Resources”
EthicsEthics, Rules, and LawsRulesLaws Using the computer appropriat ely.
General Purpose Packages
Legislation For e-commerce to operate correctly, it needs to adhere to the relevant legislation. These laws protect both the business and the consumer.
+ The Elements of a Crime. + Conviction In order to convict a criminal, the Crown normally needs to prove that two elements existed at the time of the.
Law Additional Exercise ANSWERS. Question #1 (a) Any one of: gain unauthorised access (1st) to computer material (1) gain (unauthorised) access to computer.
Data Protection and Computer Misuse Act material Modified by Eric from Mary’s slides.
3.4 Legal Implications. Overview Demonstrate knowledge and understanding of the Computer Misuse Act. Describe the roles of the BBFC (British Board of.
Ethical and Legal Issues v Ethical and legal issues are relevant to any project involving systems development. – privacy – professionalism – ownership.
3.3 Digital Communication Security. Overview Demonstrate knowledge and understanding of basic network security measures, e.g. passwords, access levels,
Crime & Malpractice AS Module Heathcote Ch. 10.
Legal issues. Computer Misuse Act 1990 Deals with misuse of ICT systems.
University of Sunderland Professionalism and Personal Skills Unit 7 Professionalism and Personal Skills Lecture 7: Computer Crime.
Ways in which Information can be Misused Misuses Of Information THE Misuse of information By: Antoinette Harris, Nickietha Phinn, Ashley Williams and.
The Data Protection Act By Ian Hughes Data should not be kept longer than is necessary for the specified purpose. Data processing should meet the.
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
HOUSING FRAUD AND THE LAW ROBERT DARBYSHIRE RICHARD PRICE 9 ST JOHN STREET.
BTEC ICT Legal Issues Data Protection Act (1998) Computer Misuse Act (1990) Freedom of Information Act (2000)
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
The Computer Misuse Act of1990 The Copyright, Designs & Patents Act of
Computing and Information Science 1 Databases START.
Workshop 4 Tutor: William Yeoh School of Computer and Information Science Secure and High Integrity System (INFT 3002)
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
Computer Systems D Stainton. Computer Misuse What is computer misuse? Criminal offences which can be committed using a computer.
Legal issues. Computer Misuse Act 1990 Deals with misuses of ICT systems.
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
Computing, Ethics and The Law
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
ICT and the Law You need to know about 3 laws covering the use and misuse of ICT.
Business Ethics and Social Responsibility GCSE Business and Communication Systems Business and Communication Systems.
2.6 CRIMES AGAINST PROPERTY AND RELATED DEFENCES.
Crown Office and Procurator Fiscal Service Working Together to be the Best Tackling New Psychoactive Substances in Scotland Paul Miele – Procurator Fiscal.
Computer Misuse Act 1990 Anti-hacking legislation.
Learning Objectives Can I discuss the copyright law Can I identify why organisations must protect data Can I describe how legislation affect computer use.
Learning Intention Legislations impact on security of information
Legal and ethical issues
Misuses of ICT Malpractice and crime © Folens 2008.
Legislation in ICT.
The Elements of a Crime.
Anti-hacking legislation
Cyber Crime Today we will look at: Different types of cyber-crime
Data Protection Act and Computer Misuse Act ANSWERS.
Computer Systems D Stainton.
Theft Mens Rea.
Legislation in ICT.
Computer Misuse Act 1990 GCSE ICT.
Data Protection.
HOUSING FRAUD AND THE LAW
End User Support By Dominique Stainton.
Presentation transcript:

IS Lecture 10 Legal Control of Computer Crime Information Management and Computer Security, 3, 2, 13-19, 1995

F Introduction F Hacking and computer viruses - 2 of the more fashionable activities under the computer crime umbrella. F In some countries they may not be criminal acts due to the lack of legislation outlawing such activities. F This is particularly true in the Asia Pacific region.

F Definitions F No precise definition of computer crime, but includes both criminal and antisocial activities, for example computer fraud, computer abuse and software piracy. F Computer Fraud - Kwilful misrepresentation with intent to gain unlawfully or to cause others to lose. KFraud - a means to another end

F Computer Abuse - Kcertain types of abusive misuse of computer resources, viz. hacking (unauthorised use and access of computer resources), unauthorised modification of data, propagation of computer viruses,… F Abuse - an end in its own right F Piracy - u unauthorised copying and distribution of proprietary software. - cf. Intellectual property law.

F HK Govt Computer Crimes Ordinance established in April F New criminal offences involving use of computers

Unauthorised access/hacking ($20,000) F even just trying to log on.  must be through telecommunications (i.e. cannot be voice or retina activated)  must be knowingly unauthorised, i.e. not innocent/accidental F if the accused does not “know” or “believe” that the access is unauthorised, guilt is hard to prove

Tampering with Computers, Programs, Data (10 years)  causing a computer not to function normally  altering or deleting any program or data held in any form/medium  adding any program/data to a computer or other storage medium.  Irrelevant whether or not the computer functions better or worse as a result.  Intention is a necessary condition here for prosecution, i.e. not inadvertent or accidental modification

Defence? F Defence possible if accused believes s/he either had already been given permission to do the activities, or would have been given that permission if s/he asked for it and if the authorising person knew all the circumstances of the activities. F A genuine belief is enough, even if the belief seems unreasonable.

Other Aspects F Threatening to do an activity is illegal F Possessing something with which to do an illegal activity, e.g. possessing a virus-infected disk with the intent to copy data from the disk (even if the accused had no knowledge of the virus’ existence as this equates to recklessness).

 Accessing a computer with the intent to commit further or subsequent crimes. F Even if the access is authorised, the intent to commit crimes is illegal. (5 years) F Trespassing with the intent to commit a crime with computers (14 years) F But trespass must be in a fixed and permanent structure, i.e. not a tent or portable toilet

F A key problem in the IS security area is that crimes are often not reported by management which fears losing its credibility with its customers and exposing internal IS security weaknesses. F Reporting and prosecution of such cases is essential if legal deterrents are to work. Such reporting should be incorporated into company policies, even if there is no legal obligation to make such reports.