Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Computer Misuse Act 1990

No description
by

tanesha dhokia

on 3 February 2014

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Computer Misuse Act 1990

Computer Misuse Act 1990
Introduction
Prior to 1990, there was no legislation in place to tackle the problems caused by hacking. Although everyone knew that it was wrong and should be against the law, there was nothing that anyone could do about it.

As the problem grew, it became apparent that specific legislation was needed to enable hackers to be prosecuted under the law.
So, in 1990, the Computer Misuse Act was passed.


4. Making, supplying or obtaining anything which can be used in computer misuse offences.
Recognised the following new offences
1. Unauthorised access to computer material.
2. Unauthorised access with intent to commit or facilitate a crime
3. Unauthorised modification of computer material.
Unauthorised access to computer material
This is the lowest level of offence and is one that many of us might be guilty of at some stage in our school or working lives.

Have you ever found, guessed or used someone elses' password to log onto their user area? If you do this and then look at their files, even if you don't change, delete or damage anything, you are still guilty of accessing materials without authorisation - and this is illegal.

This offence carries the risk of being sentenced to six months in prison and/or a hefty fine.

Unauthorised access with intent to commit or facilitate a crime
The difference between this and the first offence is that the person gaining access to someone elses' system is doing so with the sole purpose of doing something illegal.

This might mean that they had to guess or steal the password in order to get into someone's user area or their bank account. They could do this by trial and error or by using special programs such as spyware or keylogging software, or they could use a relatively new technique called 'phishing'.

They might want to steal some company secrets or they might want to transfer some money out of your bank account into their own.

Anyone caught doing this risks up to a five year prison sentence and/or a hefty fine.

Unauthorised modification of computer material
Everyone deletes files from their own system, maybe they no longer need them or maybe they delete them by mistake. This is fine - there was no intent to cause any damage.

This offence relates to the deletion or changes made to files with the intent to cause damage to an individual or company. The difference is 'the intent to cause damage'.

This offence also covers purposely introducing viruses to other peoples' systems.

If you knowingly transmit a virus to others, you are guilty under this section of the Computer Misuse Act.

This offence carries a penalty of up to five years in prison and/or a fine.
Making, supplying or obtaining material that could be used in computer misuse offences
Making
: This includes the writing or creation of computer viruses, worms, trojans, malware, malicious scripts etc.
Supplying
: This part covers the distribution of any of the above material whether you have created it yourself or obtained it from elsewhere. It is an offense to supply or distribute these files to others.
Obtaining
: If you purposely obtain malicious files such as as computer viruses or scripts that you know could be used to damage computer systems then you have committed an offence under the Computer Misuse Act.

This part of the Act is known as 3A.

Penalties
Even if was meant as a bit of harmless fun and there was no intent to defraud anyone or cause any damage, hackers, if caught, can find themselves in a lot of trouble with the law.

Offence Level Penalty

Offence 1 Up to six months in prison and/or a hefty fine
Offence 2 Up to a five year prison sentence and /or a hefty fine
Offence 3 Up to a five year prison sentence and /or a hefty fine
Offence 3a Up to a five year prison sentence and /or an unlimited fine
Thank You
Full transcript