Computer Systems D Stainton. Computer Misuse What is computer misuse? Criminal offences which can be committed using a computer.

Slides:



Advertisements
Similar presentations
Offences, Jurisdiction & Evidence: The UK experience Dr Ian Walden Director, Computer Related Crime Research Centre Queen Mary & Westfield College.
Advertisements

By Andy Scott, Michael Murray and Adam Kanopa
Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
E-commerce Law Crime and e-commerce. There are various ways that crime and e-commerce overlap. Some are peculiar to e-commerce – fraud, others are relevant.
BT2103 Developing Small Systems for Business Lecture 2 Databases, Data Management, And The Legal Framework.
Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
Prosecuting Stalking Fiona Gray Trial Advocate Office of the
Cyber Law & Islamic Ethics CICT3523 COMPUTER CRIMES.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Legislation in ICT.
University of Sunderland Professionalism and Personal Skills Unit 11 Professionalism and Personal Skills Computer Legislation.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
The Legal Framework Can you work out which slide each bullet point should go on?!
Computer Misuse Act (1990). What is Computer Misuse Act (1990)? The Computer Misuse Act of 1990 is a law in the UK that makes illegal certain activities,
General Purpose Packages
Legislation For e-commerce to operate correctly, it needs to adhere to the relevant legislation. These laws protect both the business and the consumer.
I.C.T laws By Luke Honeyfield 12. Laws relating to I.C.T  Copyright, Design, Patents  Data protection ACT  Computer misuse ACT  Health and safety.
Law Additional Exercise ANSWERS. Question #1 (a) Any one of: gain unauthorised access (1st) to computer material (1) gain (unauthorised) access to computer.
Computer crime University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot March 2011 March 2011 ITSS 4201 Internet Insurance and.
IS Lecture 10 Legal Control of Computer Crime Information Management and Computer Security, 3, 2, 13-19, 1995.
Computer Misuse Act 1990 Altering computer material without permission Accessing computer material without permission with intent to commit further criminal.
Crime & Malpractice AS Module Heathcote Ch. 10.
Legal issues. Computer Misuse Act 1990 Deals with misuse of ICT systems.
Chapter 6 International crime. In this chapter, you will study the concept of international crime. You will be introduced to the main categories of international.
University of Sunderland Professionalism and Personal Skills Unit 7 Professionalism and Personal Skills Lecture 7: Computer Crime.
Unit 1_9 The Legal Framework. Introduction This lesson will cover the following areas of computer law –The Data Protection Acts 1984 & 1998 –The Computer.
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
BTEC ICT Legal Issues Data Protection Act (1998) Computer Misuse Act (1990) Freedom of Information Act (2000)
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
The Computer Misuse Act of1990 The Copyright, Designs & Patents Act of
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
LEGISLATION. DATA PROTECTION ACT (1998) The aim of this act give people the right to know what information is held about them. It also sets out rules.
Information Systems Unit 3.
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
Concept Criminalize new types of crime and few of the traditional crimes when committed by computer Criminalize certain acts where : The Computer is the.
University of Sunderland MSc HIM Computer Legislation.
Legal issues. Computer Misuse Act 1990 Deals with misuses of ICT systems.
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
Computer Misuse Act INTRODUCTION The Computer Misuse Act became law in August Under the Act hacking and the introduction of viruses are criminal.
NEVER USE YOUR REAL NAME ALAWYS USE A NICKNAME IS SOMEONE SENDS SOME NASTY OR RUDE DON’T DELET IT SHOW IT TO SOMEONE DON’T GIVE ANYONE YOU DON’T KNOW A.
Computer Misuse Act 1990 Anti-hacking legislation.
The criminalization of hacking tools as a reasonable measure of protection regarding attacks against information systems and computer data By Chatziioannou.
Learning Objectives Can I discuss the copyright law Can I identify why organisations must protect data Can I describe how legislation affect computer use.
Legal and ethical issues
The Computer Misuse Act 1990
Legislation in ICT.
Anti-hacking legislation
Regulation of Investigatory Powers Act 2000
Understanding the issues related to the use of information
Cyber Crime Today we will look at: Different types of cyber-crime
Data Protection Act and Computer Misuse Act ANSWERS.
Computer Systems D Stainton.
Computer Misuse Act 1990.
Chapter 6 International crime
Legislation in ICT.
Computer Misuse Act 1990 GCSE ICT.
Understand mechanisms to control organisational IT security
How it affects policies and procedures
Revision Lesson 10X5.
PRESENTER: MR. KOZHI KATAKA, LLB
End User Support By Dominique Stainton.
Presentation transcript:

Computer Systems D Stainton

Computer Misuse What is computer misuse? Criminal offences which can be committed using a computer

Fraud The term fraud traditionally covers a range of crimes in which some kind of advantage has been obtained by deception. –An example would be where directors falsify accounts in order to obtain a loan or just monies that would not otherwise be available. Computer fraud generally involves interfering with the operation of a computer in some way to obtain financial advantage. However, whilst important, it is not an area that we need to concentrate upon for this unit.

Hacking – a brief history In the late 1980’s there was concern about hacking and the damage which could be done to systems – especially those that were safety-critical –this concern was increased by the appearance of the first computer viruses. There were a number of attempts to prosecute hackers under the then-existing legislation, but the success rate was not very high.

Hacking – a brief history It became clear that the law, as it was at that time, was poorly equipped to address the activities of hackers and virus writers. Studies were carried out into the issue – the English Law Commission wrote a report in The recommendations of the Commission’s report formed the basis of the Computer Misuse Act which was passed in 1990.

The Act The Computer Misuse Act 1990 was designed to protect the integrity of computer systems by deterring the activities of hackers. It created three new offences: 1.Unauthorised access to computer programs or data 2.Unauthorised access with a further criminal intent (known as the ‘ulterior intent’ offence) 3.Unauthorised modification of computer material

The Act Besides addressing computer misuse the Act also contains special provisions in recognition that hackers may operate from other countries, by including special provisions relating to jurisdiction and extradition. You will need to research information on this act.