Preview

Comparison Between Computer Crime and Computer Misuse Actct and

Good Essays
Open Document
Open Document
1103 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Comparison Between Computer Crime and Computer Misuse Actct and
COMPARISON BETWEEN COMPUTER CRIME ACT 1997 AND COMPUTER MISUSE ACT 1990 (UK)

As the Malaysian society becomes more and more technology-savvy and Internet savvy due to the encouragement by the government and the country’s vision to be a world leading country in computer technology with the Multimedia Super Corridor, the number of computer-related crimes is on the rise. Therefore, in order to combat this new type of crime, the government of Malaysia had introduced a new legal framework to facilitate the development of ICT systems called Cyber Laws of Malaysia which include the Computer Crime Act 1997. Generally, Computer Crime Act 1997 (CCA 97) was formed for the purpose of safeguarding consumer and service providers besides on-line businesses and owners of intellectual property. It is designed to prevent offences due to the misuse of computers and complement the existing criminal legislation. The act was given its Royal Assent on June 18, 1997 but was only enforced on June 1, 2000. This Act is based on Computer Misuse Act 1990 (CMA 1990) which was passed by the Parliament of the United Kingdom and came in to force on 1 February 1991. It must be noted that Computer Crime Act 1997 has a lot of similarity with the UK Computer Misuse Act 1990 in terms of the offences but differs in several ways. The first three key crimes or offences which has been introduced in the Computer Misuse Act 1990 which are; unauthorized access to computer material, unauthorized access with intent to commit or facilitate commission of further offences and unauthorized modification of the contents of any computer are also possessed by the Computer Crimes Act 1997 but has evolved to further additional types of offences which are wrongful communication, abetments and attempts punishable as offences and presumption. Hence, the CCA 97 covers a wider range of offences compared to CMA 1990 which only covers 3 aspects of computer misuse. Furthermore, it is different in that

You May Also Find These Documents Helpful

  • Good Essays

    * Computer Misuse Act 1990 - identifies a range of offences relating to unauthorised access to, or unauthorised modification of, computer records. This act may apply where an unauthorised third party accesses information being transferred. Enforcement is difficult, prosecutions uncommon but may be relevant where systems are used other than by authorised staff for approved purposes.…

    • 1008 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Unit 13 P4

    • 979 Words
    • 4 Pages

    This act was passed in 1990 and made three offences in relation to hacking. An offence under the computer misuse act would be to access someone else’s computer without any permission or authorisation (for example, looking through someone’s private files without them giving you permission). Another offence under the act was being able to access someone’s computer with the intent of causing another crime on top of that. An example of this would be to hack into someone’s banking account and transferring their money over to yourself, hacking without permission was the initial crime and theft of their money is the intended crime. The last offence to be added to the Computer Misuse Act was to edit the computer in any way. For example, you hack into a computer and leave a virus that will in time destroy the computer. McLinsoft computing staff must know that they cannot commit any of these actions. Doing so can lead to a prison sentence of up to 12 months (or 6 months in Scotland) [3]. Examples of computer misuse in the workplace can be obtaining colleague’s log-on details and accessing their private data, releasing a virus throughout the company network, or even hacking into other company networks and obtaining any…

    • 979 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The author traces the CFAA history to the 1984 Comprehensive Crime Control Act (CCCA) which was narrow in scope, with the purpose to address unauthorized access computer crimes. As computers in households…

    • 1035 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Computers have become a big part of our lives. They are being used more and more and the Internet has brought with it a big amount of computer criminals. In 1988, Victoria created the first Australian computer crime laws.…

    • 1206 Words
    • 5 Pages
    Good Essays
  • Good Essays

    The Computer Misuse Act 1990 was designed to enclose legislation and controls over computer crime and Internet fraud. The legislation was created to:…

    • 1135 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Carter, David. (1995, July). Types of computer crimes. The FBI Magazine, Retrieved from http://www.lectlaw.com/files/cri14.htm, doi: The Lectric Law Library…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Powerful Essays

    Computer Fraud Act Of 1984

    • 2247 Words
    • 9 Pages

    The Computer Fraud and Abuse Act (CFAA) of 1984 protect certain types of information that the government maintains as sensitive. The Act defines the term “classified computer,” and imposes punishment for unauthorized or misused access into one of these protected computers or systems. The Act also mandates fines and jail time for those who commit specific computer – related actions, such as trafficking in passwords or extortion by threatening a computer. In 1992, Congress amended the CFAA to include malicious code, which was not included in the original Act.…

    • 2247 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Computer Misuse Act

    • 277 Words
    • 2 Pages

    This act covers hacking which is when someone illegally gains access to a computer with someone else's username or password which you do not have permission to use being unauthorised access, modify files or data without the consent of the creator, or commit illegal acts such as fraud while using the stolen username or password.…

    • 277 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Information Acts Paper

    • 418 Words
    • 2 Pages

    The United States Computer Fraud and Abuse Act of 1986 (referred to in this article as the "Act") was an amendment to the Counterfeit Access Device and Computer Fraud and Abuse Act of 1984 (the "1984 Act"). It was the first comprehensive legislation in the United States to identify and provide for the prosecution of crimes committed through and against computer systems (Zegarelli, 2002). The initial 1984 Act addressed crimes in a very limited circle involving the government computers, but also consumer credit and government data, but did not cover any areas outside the afore mentioned scopes.…

    • 418 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cyber Crime

    • 395 Words
    • 2 Pages

    Cybercrime, also called computer crime because the use of a computer is used as tool to help people meet their illegal ends. Some cybercrime examples are committing fraud, trafficking in child pornography and intellectual property, stealing other peoples identity, or violating privacy of others.…

    • 395 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Computer Fraud and Abuse Act was initially crafted in the 1980s to prevent remote computer hacking as away to protect government interest computers. Computer use has extended in the years since it was put into effect. Computer Fraud and abuse Act has equally extended to cover several other computer-related actions. The definition of a computer protected under the Act dramatically expanded to include any computer used in interstate commerce or communication, i.e., any computer connected to the Internet (Pollaro, 2010).…

    • 527 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Personal Data Breach

    • 889 Words
    • 4 Pages

    As this became more of an issue, what with the growing use of information systems, in 1990 the Computer Misuse Act was passed. The act recognised the following offences:…

    • 889 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Real World

    • 5094 Words
    • 21 Pages

    This document is an extract from the book Cyber Crime & Digital Evidence – Indian Perspective authored by Rohas Nagpal. This book is available as courseware for the Diploma in Cyber Law and PG Program in Cyber Law conducted by Asian School of Cyber Laws…

    • 5094 Words
    • 21 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Provide suggestions as to what we should do (Malaysian government and individual Malaysians) to curb or reduce cyber crimes in Malaysia.…

    • 330 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    over long periods of time, or when a computer operator uses a computer to steal…

    • 1442 Words
    • 6 Pages
    Powerful Essays