Offences, Jurisdiction & Evidence: The UK experience Dr Ian Walden Director, Computer Related Crime Research Centre Queen Mary & Westfield College.

Slides:



Advertisements
Similar presentations
Proceeds of Crime and Asset Recovery 21 February 2007.
Advertisements

Wedding Picture 8/21/1941. The War Years
1 -The Second in a Special Series- A Brief History of National and Community Service Originally Developed by: Fred Sanguiliano, Executive Director, Florida.
Prevalence of Obesity* among U.S. Adults BRFSS, 1992 Source: Mokdad AH, et al. J Am Med Assoc 1999;282:16. 15% no data.
Presenter Name(s) Issue date National Student.
Through the years… JUNIATA COLLEGE FIELD HOCKEY. SeasonCoachRecord 1973Unknown Jo Reilly Alexa Fultz Alexa Fultz Nancy Harden-Latimore4-4-1.
By Andy Scott, Michael Murray and Adam Kanopa
Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
Law and the legal system
EEvidence Dr Ian Walden Institute of Computer and Communications Law, Centre for Commercial Law Studies, Queen Mary, University of London Baker & McKenzie.
From Delft into Almere Prof.dr.ir.Taeke M. de Jong.
Complete Discography – The Soundhouse Tapes.
E-commerce Law Crime and e-commerce. There are various ways that crime and e-commerce overlap. Some are peculiar to e-commerce – fraud, others are relevant.
Landings by Species Group and Year. Revenue by Species Group.
Idstedt 1993 Schubert 1988 Heinz Cremer.
Cyber Law & Islamic Ethics CICT3523 COMPUTER CRIMES.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
Unit 4 1) Criminal Law Offences against the Property. 2) Concepts of Law Course Evaluation On the piece of paper write down www/ebi on the delivery of.
GCSE ICT Computers and the Law. Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Jurisdictional issues and international co-operation in combating cybercrime Anne Flanagan Institute for Computer and Communications Law Centre for Commercial.
Not only was there offences for different crimes like murder and harassment etc. There were punishments for weird things back in 1850 down in San Diego,
CYBERCRIME – WEEK 1 (Lectures 1, 2) DAVID THAW University of Connecticut School of Law.
Nigel, Lochie, Anika and Martin. As the internet is becoming the most popular area of crime, countries around the world are struggling to update the law.
It’s a Computer, M’Lud! Neil Barrett. Introduction The law and computers The law and computers The nature of computer evidence The nature of computer.
The Legal Framework Can you work out which slide each bullet point should go on?!
Computer Misuse Act (1990). What is Computer Misuse Act (1990)? The Computer Misuse Act of 1990 is a law in the UK that makes illegal certain activities,
General Purpose Packages
EXTERNAL RELATIONS.  Requirement 1: Agreement must be valid  Requirement 2: Representative must be authorised  Requirement 3:  Agreement concluded.
Mischief:  Definition – to willfully destroy or damage property or data; interfering with the lawful use of property or data; interfering with any person.
Data Protection and Computer Misuse Act material Modified by Eric from Mary’s slides.
Ethical and Legal Issues v Ethical and legal issues are relevant to any project involving systems development. – privacy – professionalism – ownership.
Computing Legislation Case Studies COMPUTER MISUSE ACT 1990.
IS Lecture 10 Legal Control of Computer Crime Information Management and Computer Security, 3, 2, 13-19, 1995.
Unit 1_9 The Legal Framework. Introduction This lesson will cover the following areas of computer law –The Data Protection Acts 1984 & 1998 –The Computer.
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
The Computer Misuse Act of1990 The Copyright, Designs & Patents Act of
Dr. Hilton CHAN Technology Crime Division Commercial Crime Bureau
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
LEGISLATION. DATA PROTECTION ACT (1998) The aim of this act give people the right to know what information is held about them. It also sets out rules.
Information Systems Unit 3.
Workshop 4 Tutor: William Yeoh School of Computer and Information Science Secure and High Integrity System (INFT 3002)
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
Computer Systems D Stainton. Computer Misuse What is computer misuse? Criminal offences which can be committed using a computer.
Legal issues. Computer Misuse Act 1990 Deals with misuses of ICT systems.
Criminal courts Topic 7 The courts system test: criminal courts.
Business Ethics and Social Responsibility GCSE Business and Communication Systems Business and Communication Systems.
BTEC Level 3 Unit 3: Information Systems Mr Satari Lesson 7 & 8.
CATEGORY OF OFFENCE PLACE OF TRIAL EXAMPLES OF OFFENCE Summary Magistrates’ court Driving without insurance; Criminal damage £5,000 Common assault Triable.
Computer Misuse Act INTRODUCTION The Computer Misuse Act became law in August Under the Act hacking and the introduction of viruses are criminal.
Computer Misuse Act 1990 Anti-hacking legislation.
CROSS BORDER GATHERING EVIDENCE “BEST PRACTICES” IN MUTUAL LEGAL ASSISTANCE EUROPEAN JUDICIAL TRAINING NETWORK BRUSSELS, 15 – 16 March 2016 David J Dickson.
PROFESSIONAL COMPUTING Lecture 2: Legal Perspectives Dr. Mark Lee | School of Computer Science, University of Birmingham Autumn 2013.
Legal and ethical issues
Cyber enabled crime The challenge for national and local police.
Data Protection Act and Other Laws
The Computer Misuse Act 1990
Computer Crime CJ 520 / CJ October 27, 2010.
Anti-hacking legislation
Cyber Crime Today we will look at: Different types of cyber-crime
Data Protection Act and Computer Misuse Act ANSWERS.
Computer Systems D Stainton.
Societal Issues in Computing (COMP466)
Amended Section 41 of Criminal Procedure Code
Computer Misuse Act 1990.
Unit 7 – Organisational Systems Security
Legal and Ethical Issues
Computer Misuse Act 1990 GCSE ICT.
Understand mechanisms to control organisational IT security
The Mary Surratt Story - Article Questions
End User Support By Dominique Stainton.
Presentation transcript:

Offences, Jurisdiction & Evidence: The UK experience Dr Ian Walden Director, Computer Related Crime Research Centre Queen Mary & Westfield College

Computer fraud input, processing or output – R v Thompson (1984) Theft Act 1968, s.15 – deception (eg. R v Moritz (1981)) Law Commission Consultation Paper No. 155 (1999) – property Oxford v Moss (1979) R v Preddy (1996) & Theft Act 1968, s.15A

Computer forgery Forgery & Counterfeiting Act 1981, s.1: "A person is guilty of forgery if he makes a false instrument with the intention that he or another shall use it to induce somebody to accept it as genuine..." –R v Gold (1988)

Criminal Damage tangible (Criminal Damage Act 1971, s.10) –R v Whiteley (1991) intangible (Computer Misuse Act 1990, s.3) –unauthorised modification: to impair the operation, prevent or hinder access or reliability R v Goulden (1992) R v Pile (1995) R v Whitaker (1993)

Unauthorised Access I Computer Misuse Act 1990, s. 1: hacking..causes a computer to perform any function with intent to secure access to any program or data held in any computer; –R v Sean Cropp (1991) –R v Bedworth (1993) –R v Farquharson (1993) –R v Pryce (1997)

Unauthorised Access II authorisation –DPP v Bignell (1998) –R v Bow Street Magistrates Court, ex parte Allison (1999) employment law –Denco v Joinson (1990) –BT plc v Rodrigues (1995) incohate offences: `incitement or conspiracy with others to commit an offence' –Hackers Handbook

Transnational Crime determining the locus delicti –eg. Computer Misuse Act 1990, s.4, 5: significant link jurisdictional conflicts –eg. ex parte Osman [1989] –eg. ex parte Levin [1996] extradition –eg. R v Bow Street Magistrates Court, ex parte Allison [1998]

Admissibility Police and Criminal Evidence Act 1984 –s.69: …at all material times the computer was operating properly… R v Shephard [1993] R v Cochrane [1993] DPP v McKeown [1997] –Law Commission Report No. 245 (June 1997)

Concluding remarks