Preview

Computer Misuse Act 1990 Essay

Good Essays
Open Document
Open Document
1178 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Misuse Act 1990 Essay
Computer Misuse Act 1990
Another legal issue linked with information issues within an organisation is the Computer Misuse Act 1990. This states that it is against the law to commit a crime using a computer and that anything that is against the law in the ‘real’ world is equally illegal in the ‘virtual’ one. This basically means that it is illegal to physically break a computer but if you use a virus it is equally illegal as it is still breaking the computer but using a ‘virtual’ method. Before 1990, there was no legislation in place to punish anyone committing such crimes. However, they then introduced this new legislation called the Computer Misuse Act 1990 and since then they have been able to punish any form of hacker.
There are three main offences under this act, they are; unauthorised
…show more content…
which must all have the appropriate protection from external sources. However, internal sources can gain access to this much easier. If an employee was to gain access to this information without authorisation and look through it, they could be punished by the law under this act for unauthorised access to computer material. If that employee was to take a step further and use information such as bank details to make a purchase or transfer money, they can be punished for the second degree punishment which is unauthorised access with intent to commit further offences. However, if they take it further and actually modify this information in any way, the most severe punishment is actioned which unauthorised modification of computer material is. For this, Tesda could have major legal issues so by using contracts they can eliminate themselves as the company from the proceedings and only the employee will be punished. Obviously, Tesda as a company will want to keep this internal as much as possible due to the reputational damage it can have on them and the after effects it can have on

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Cross 9e TBB U05

    • 464 Words
    • 3 Pages

    the ethical and legal implications of breaching company policy on the use of electronic data…

    • 464 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Information that is stored in an organisation has to follow the security and confidentiality procedures. For example finances, customer’s and employee’s details should be secured and only certain members of staff should be able to access physical and electronic data unless you have been given authorisation. If information gets into the wrong hands it could have serious consequences and might lead to legal action.…

    • 777 Words
    • 3 Pages
    Good Essays
  • Good Essays

    * Computer Misuse Act 1990 - identifies a range of offences relating to unauthorised access to, or unauthorised modification of, computer records. This act may apply where an unauthorised third party accesses information being transferred. Enforcement is difficult, prosecutions uncommon but may be relevant where systems are used other than by authorised staff for approved purposes.…

    • 1008 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Unit 13 P4

    • 979 Words
    • 4 Pages

    This act was passed in 1990 and made three offences in relation to hacking. An offence under the computer misuse act would be to access someone else’s computer without any permission or authorisation (for example, looking through someone’s private files without them giving you permission). Another offence under the act was being able to access someone’s computer with the intent of causing another crime on top of that. An example of this would be to hack into someone’s banking account and transferring their money over to yourself, hacking without permission was the initial crime and theft of their money is the intended crime. The last offence to be added to the Computer Misuse Act was to edit the computer in any way. For example, you hack into a computer and leave a virus that will in time destroy the computer. McLinsoft computing staff must know that they cannot commit any of these actions. Doing so can lead to a prison sentence of up to 12 months (or 6 months in Scotland) [3]. Examples of computer misuse in the workplace can be obtaining colleague’s log-on details and accessing their private data, releasing a virus throughout the company network, or even hacking into other company networks and obtaining any…

    • 979 Words
    • 4 Pages
    Good Essays
  • Good Essays

    In my job this means only using the information needed to complete accounts or change information with HMRC, it is possible for me to have access to a lot of personal information about the clients we act for. It is essential under the computer misuse act that I only access what I need to carry out my job and further more ensure that none of the information is left lying around or on show. To help myself to follow this act I can ensure I only use my own computer and don’t accidently find myself accessing information I didn’t mean to which other people might see and be able to use. I could also only use the computer when I am working or studying to completely avoid accusations of misusing my computer. Last ensure that when I do leave my computer unattended make sure that it is locked or that it is not possible for someone else to access private…

    • 638 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Steinbeck uses many techniques to present the characters of Lennie and George in ‘Of Mice and Men’. This in turn then reveals many insights into what may happen to the two characters as the novel progresses. The reader can tell lots about Lennie through the description of his character’s physical looks and actions ‘opposite, a huge man, shapeless of face.’…

    • 498 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Data protection Act 1999- this act covers all information about the individuals by an employer. This means it controls all personal information used by an organisation, government or business and anyone who is in charge of keeping data's must abide by the data protection principle (Anon., n.d.). This principle covers but computerised and manual records.…

    • 1270 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Anyone who knowingly hacks into a computer with intent to steal information is going against this act. Anyone who misuses the computer in this way is going against the law as they are using it for criminal acts.…

    • 1633 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Any information will need to be kept in accordance with the Data Protection Act and steps taken to…

    • 679 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Let’s look at confidentiality which is one of the most important measures to maintain safety and security. Not following procedures according to Data Protection Act 1998, which objectives aim at secure data processing and storage, may result in legal action against employers. These procedures may vary depend on the nature of the business. Nowadays vast majority of the business relay on computerised filling system, therefore, employers must take every necessary measure to protect that system from for example, hackers. Employees, on the other hand must follow all procedures to ensure they use system correctly and legally. Consequently, not following health, safety and security procedures may also lead to economic crises of an organisation, for example, court may order to pay very high fine or close down the business and loss of the customers. Moreover, an employer who failed to follow health, safety and security procedures where as a result employees are getting harmed at work is highly likely to be exposed to organisational grievance or disciplinary procedures. For example, in a care home failure to provide moving and handling training to induction staff would have catastrophic consequences such as: spine injuries acquired by using incorrectly equipment or by not using it at all when necessary or even a death of a care taker if handled inappropriately using unsecured hoist. This scenario would not…

    • 335 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Activity 2 Your Work Role

    • 527 Words
    • 2 Pages

    Data that the company hold is protected under the "Data Protection Act 1998" this ensures that details held about employees is protected.…

    • 527 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The two Acts discussed in this paper are the Video Privacy Protection Act (1988), and the Controlling the Assault of Non-solicited Pornography and Marketing (CAN-SPAM) Act, (2003). These two acts were both enacted because along with the development of technology new issues arose in which no legal precedence had yet been established. These Acts were also both created nearly immediately after it was realized that there was a need for them.…

    • 554 Words
    • 3 Pages
    Good Essays
  • Good Essays

    cwl paper 1

    • 744 Words
    • 2 Pages

    Women always have kept the most important part in any societies. Naturally, women have been responsible for the perpetuation of the society, and they also can be seen as the focal point of worship in some ancient religions. However, societies of ancient Rome viewed women differently from some societies of past eras. By examining how men see women, and women see themselves in “Haunted house” by Plautus, we can see that women was only considered as the secondary gender in ancient Rome societies.…

    • 744 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The advances in information technology have resulted in new ethical issues necessitating the creation of many important acts. Two in particular acts are Health Insurance Portability and Accountability Act (HIPAA) and Children’s Internet Protection Act (2000). Both of these acts were implemented to protect humans from harmful content and healthcare information.…

    • 461 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Nowadays companies operating internationally do not only face increasing competition in their markets, but also heavy macroeconomic driving forces the so-called global economic trends. These trends deeply transform markets and have a considerable impact on corporations. The question arises: what factors provoke the emergence of these economic tendencies?…

    • 1107 Words
    • 5 Pages
    Better Essays