Computer Misuse Act 1990 Altering computer material without permission Accessing computer material without permission with intent to commit further criminal.

Slides:



Advertisements
Similar presentations
By Andy Scott, Michael Murray and Adam Kanopa
Advertisements

Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Woodland Hills School District Computer Network Acceptable Use Policy.
Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
GCSE ICT Computers and the Law. Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
. Introduction to Welcome to . This module will give you the skills you need to send and receive . Also to send and receive attachments.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
The Data Protection Act The Data Protection Act controls how your personal information is used by organisations, businesses or the government. Everyone.
The Legal Framework Can you work out which slide each bullet point should go on?!
Issues Raised by ICT.
Administrative Practices Outcome 1
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Security (Computer crime and dangers associated with computer use). Legislation (Data Protection, Computer Misuse and Copyright Acts). 4 th module
General Purpose Packages
Section 6 Theory Software Copyright, Viruses and Hacking.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Legal issues. Computer Misuse Act 1990 Deals with misuse of ICT systems.
Enterprise Network Risks Attachments -- Workers opening an attachment could unleash a worm or virus onto the corporate network, and a new evolution.
A virus is a piece of software tht is designed to copy itself onto other programs causing them to function differently. In the 80’s, when the viruses.
EAST HARDIN MIDDLE SCHOOL MR. ERVIN Internet Safety Policy and Acceptable Use Procedures.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Digital Citizenship. Scenario #1 – A student sends an annoying to another student. The receiving student gets even with a “flaming .” Is.
Code of Conduct 344 Code of Conduct 344. Code of Conduct 344 Introduction; Do you agree with the following statements? Employers need their employees.
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
Online registration Presented by: Ymer LEKSI. Learning objectives By the end of this session you will be able to: Login to the web post messages to forums.
The Computer Misuse Act of1990 The Copyright, Designs & Patents Act of
Internet Safety Internet Safety LPM
Teacher Rooming Equipment Rules / Expectations Login / Passwords Technical Issues Homework Printing.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
COMPUTER VIRUSES Class: Year 8 ‘A’ Date : 2 nd February 2009.
Computer Misuse By: Alex Meadows Michael Read. How can you misuse a computer? Accessing data stored electronically Copying software without permission.
Jan 11 Encryption and Hacking Encryption turns normal text into nonsense, and changes it back with a key. To someone who is not authorised to view it,
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs. They don’t affect hardware,
COPYRIGHT ensure you source all image files and author/s of text used.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
Computer Systems D Stainton. Computer Misuse What is computer misuse? Criminal offences which can be committed using a computer.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Legal issues. Computer Misuse Act 1990 Deals with misuses of ICT systems.
Woodland Hills School District Computer Network Acceptable Use Policy.
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
Cybersecurity Test Review Introduction to Digital Technology.
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
1 AQA ICT AS Level © Nelson Thornes Safety and security Chip and Pin.
Computer Misuse Act INTRODUCTION The Computer Misuse Act became law in August Under the Act hacking and the introduction of viruses are criminal.
Learning Objectives Can I discuss the copyright law Can I identify why organisations must protect data Can I describe how legislation affect computer use.
Learning Intention Legislations impact on security of information
Legal and ethical issues
Misuses of ICT Malpractice and crime © Folens 2008.
GCSE ICT SECURITY THREATS.
Administrative Practices Outcome 1
The Computer Misuse Act 1990
Answer the questions to reveal the blocks and guess the picture.
Data Protection Act and Computer Misuse Act ANSWERS.
Computer Systems D Stainton.
Lesson 2: Epic Security Considerations
Computer Misuse Act 1990 GCSE ICT.
G061 - Network Security.
Woodland Hills School District
End User Support By Dominique Stainton.
Presentation transcript:

Computer Misuse Act 1990 Altering computer material without permission Accessing computer material without permission with intent to commit further criminal offences Accessing computer material without permission

Is THIS an offence under the Computer Misuse Act?? Darren received a virus in his . His anti-virus software identified the virus and placed it in quarantine. Later he sent his teacher an and placed the virus as an attachment. Darren Glover Yes, Section 3 – Altering computer material without permission

Is THIS an offence under the Computer Misuse Act?? Sophie has scanned in music and placed it on her personal website so she can share the music her friends need for their band practise. No. This relates to copyright law. Sophie Walker

Is THIS an offence under the Computer Misuse Act?? Gordon working in marketing in his company, he has authorised access to the computer network. He uses a colleague’s login to get some information from the accounts department. Yes, Section 1 – Unauthorised access to computer material. Gordon Fox

Is THIS an offence under the Computer Misuse Act?? Susan is temping at her local council offices, she does not have access to the computer network. During lunchtime a colleague leaves herself logged on, Susan uses the internet on that account Probably Not. She did not intend to access restricted data or programs. Susan Harper

Is THIS an offence under the Computer Misuse Act?? Trevor had his login account locked by an administrator because he was seen playing a computer game during lesson time. Trevor did not know that his account was locked. He is confused that his username and password does not work, so he attempts different variations of his password in order to gain access to his account. No. He was not aware that his entry was unauthorised Trevor Watkins

Is THIS an offence under the Computer Misuse Act?? Graham was browsing on the internet and he gained access to a site which had minimal security. He came across some name and address data which he passed onto his friend who works for a company which does ‘mail shots’ i.e sending adverts to addresses. The company did not use the information. Yes. Section 2 – Unauthorised access with intent to commit further offences. (Transferring personal data is an offence under DPA) Graham Smith

Guess the sentence! Altering computer material without permission Accessing computer material without permission with intent to commit further criminal offences Accessing computer material without permission Up to£5000 fine, 6 months in prison, or both Up to£5000 fine, 5 years in prison, or both Up to £5000 fine, 10 years in prison, or both

Guess the sentence! £400 Fine Daniel Cuthbert IT Contractor Daniel Cuthbert, attempted (but failed) to hack into a web site for donations to the tsunami relief fund. The prosecution agreed that he did not intend to be fraudulent or make money by hacking.

Guess the sentence! £600 fine & 200 hours community service Oliver Cookson Oliver Cookson, 22, sold digital circuitboards - known as cable cubes - which fit into television sets. These allow the user to gain access to subscription satellite television.

Guess the sentence! 2 years in prison! Simon Vallor Computer Programmer Simon Vallor (aged 19) wrote at least three different virus programs and ed them to 30,000 businesses in 42 countries

Get to work!