Preview

Computer Misuse Act

Satisfactory Essays
Open Document
Open Document
311 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Misuse Act
Computer Misuse Act 1990
The computer misuse act of 1990 is a law in the UK that makes certain activities illegal, such as hacking into other people’s systems, misusing software, or helping a person gain access to protected files of someone else’s computer. The main goal of the Act was to discourage this kind of behaviour in the future. The act identifies three specific offences:
1. Unauthorised access to computer material.
2. Unauthorised access to a computer system with intent to break, change or copy files.
3. Unauthorised modification of computer material.
The act targets people who misuse computers and communication systems, this could come in several forms:
• Hacking
- When an unauthorised person uses a network, internet or modem connection to gain access past security password or other security to see data stored in another computer.
• Data misuse & unauthorised transfer or copying
- Copying and illegally transferring data using online computers and large storage devices (hard disks, memory sticks, DVDs) personal data, company research and written work ( novels, textbooks)
• Copying and distributing copyrighted software, music and film
- When someone copies music and movies with computer equipment and distributing it on the internet without the copyright holder’s permission.
• Email and chat rooms
- when someone uses fake identification and pretends to be someone else to try and lure someone else into giving them their information.
The computer misuse act protects the owners of the copyright and covers the copying of written, musical or film works using computers. The copyright law has been used to crack down on file sharing websites or indivisuals who store and illegally distribute copyrighted material, eg music.
The computer misuse act is highly useful in ensuring that peoples work and personal information is kept safe. It prevents viruses, copyright infringements, hacking, using computer data for blackmail or fraud, and illegal deleting

You May Also Find These Documents Helpful

  • Good Essays

    Stealing or hacking of personal devices, malware or virus, eavesdropping, sniffing through endpoints, web Session Hijacking…

    • 1000 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Answer: Computer Hacking it is the act of bypassing ones account or database and hacking involves stealing of identity and use it in his/her own interest.…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    * Computer Misuse Act 1990 - identifies a range of offences relating to unauthorised access to, or unauthorised modification of, computer records. This act may apply where an unauthorised third party accesses information being transferred. Enforcement is difficult, prosecutions uncommon but may be relevant where systems are used other than by authorised staff for approved purposes.…

    • 1008 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Unit 13 P4

    • 979 Words
    • 4 Pages

    This act was passed in 1990 and made three offences in relation to hacking. An offence under the computer misuse act would be to access someone else’s computer without any permission or authorisation (for example, looking through someone’s private files without them giving you permission). Another offence under the act was being able to access someone’s computer with the intent of causing another crime on top of that. An example of this would be to hack into someone’s banking account and transferring their money over to yourself, hacking without permission was the initial crime and theft of their money is the intended crime. The last offence to be added to the Computer Misuse Act was to edit the computer in any way. For example, you hack into a computer and leave a virus that will in time destroy the computer. McLinsoft computing staff must know that they cannot commit any of these actions. Doing so can lead to a prison sentence of up to 12 months (or 6 months in Scotland) [3]. Examples of computer misuse in the workplace can be obtaining colleague’s log-on details and accessing their private data, releasing a virus throughout the company network, or even hacking into other company networks and obtaining any…

    • 979 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Software piracy and illegal file shares is becoming a bigger issue in modern day society, more likely with the youth of society. All computers now come with burn-ware technologies in which the user can take a product and create copies of that software. Originally, this process was created in order to provide methods of backing up a person’s computer files, in case of hardware crashing and system reboots. However, the situation has changed. People are now able to copy any type of media file (DVDs, CDs, operation systems, etc) and give out these products, free of charge. Do you like that CD that your friend bought the other day? Ask him to burn you a copy, then you can have it too. Did your latest version of Microsoft Windows crash…

    • 2160 Words
    • 9 Pages
    Good Essays
  • Good Essays

    Hacking is when a highly technical skilled individual or a group pass their way into a computer network or program without permission. This ends up in important data being stolen by the hacker which is illegal.…

    • 769 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Anyone who knowingly hacks into a computer with intent to steal information is going against this act. Anyone who misuses the computer in this way is going against the law as they are using it for criminal acts.…

    • 1633 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Diploma Level 3 Hsc 38

    • 299 Words
    • 2 Pages

    Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental lost or destruction of, or damage to personal data.…

    • 299 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    7. Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss, destruction or damage to person data.…

    • 1186 Words
    • 5 Pages
    Better Essays
  • Good Essays

    The two Acts discussed in this paper are the Video Privacy Protection Act (1988), and the Controlling the Assault of Non-solicited Pornography and Marketing (CAN-SPAM) Act, (2003). These two acts were both enacted because along with the development of technology new issues arose in which no legal precedence had yet been established. These Acts were also both created nearly immediately after it was realized that there was a need for them.…

    • 554 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The No Electronic Theft (NET) Act was enacted by Congress in 1997 to help prosecute of copyright violations on the internet. It makes it a federal crime to copy, distribute, and share copies of electronic works that are copyrighted, such as movies, games, and music. Also applicable in means of making copyrighted material available over networks. Before this Act was passed people who purposely distributed copied software over the internet did not face criminal penalties if they didn’t make profit off of it. Violation of the electronic copyrighting will carry out a maximum penalty of three years in prison and a fine of $250,000 ("University Information Technology Services",…

    • 277 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Copyright laws were established in the Constitution to "promote science and the useful arts" (Copyright). In the age of digital formats for music, copyright law makes it illegal for bootleggers to commit audio piracy by copying works of music without paying the artist. However, the invention of digital sampling, which allows a musical artist to take sound from a previously recorded work and incorporate it into a new work, has challenged the existing copyright laws. The search for balance between the need to protect artists from audio piracy and the goal of fostering the ability of new artists to draw on previous media has made a good deal of legal controversy within the music business. Laws and court decisions have not established what balance…

    • 2321 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    What Really Is a Hacker?

    • 424 Words
    • 2 Pages

    meant to be a invasion of privacy issue, but rather free use of all computers…

    • 424 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Unauthorized access

    • 279 Words
    • 2 Pages

    Unauthorized access is defined as gaining access to a computer, network, file or other resource without permission. This act can be committed by an inside or outside source. Unauthorized access and use is considered a form of cybercrime. Nicola Baird wrote an article, Cybercrime: 'I felt I was reading my own obituary', pertaining to email hacking. Baird calls it a “smash-and-grab raid” as the hackers merely want to access the data, valuable information or programs in the computer. It was said that cybercrime has caused Britain $27 billion. The article contains an incident where Nicola, the writer, was targeted by a hacker. She discovered that over 2500 of her contacts we emailed asking for financial aid. To protect against online theft, fraud and other unauthorized access and use, ethical decision has to be kept in mind. Not giving out personal information such as an individual's social security number or their mother's maiden name; never giving out sensitive information via text message or email because it can be easily forwarded or hacked into; shredding information containing credit card numbers and sensitive data would eliminate any possibility that a person going through the trash finds that information; keeping an eye on bills and credit report to detect identity theft early. Hackers try using the default passwords such as no password, root, or admin. Changing passwords often that include letters numbers and other characters to make it a stronger password.Installing a software firewall will help protect from unauthorized incoming and outgoing information. Running system scan to check for vulnerabilities to threats or issues that a person's computer might have that will allow unauthorized access to their computer by users.…

    • 279 Words
    • 2 Pages
    Satisfactory Essays