Preview

Computer Misuse Act

Good Essays
Open Document
Open Document
1000 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Misuse Act
In this article the Computer Misuse Act 1990 was raised. It states that a teenage from Dorset England. Aaron Caffrey aged 19 had apparently sent a virus to another person computer while they were at work at America’s bigger port. The convicted was accused of hacking into the system and sent a virus use cause the either network of computers which caused them all to crash.

The law that he had broken was the Computer Misuse Act 1990 the law states the following:
“The Act contains three main offences which are categorised under the following Sections:
Section 1
1(1) A person is guilty of an offence if
a) He/she causes a computer to perform any function with intent to secure access to any program or data held in a computer
b) The access he intends to secure is unauthorised or c) He/she knows at the time when he/she causes the computer to perform the function that this is the case.
1(2) The intention a person has to commit an offence under this section need not be directed at
a) Any particular program or data
b) A program or data of any particular kind or c) A program or data held in any particular computer.
1(3) A person guilty of an offence under this section shall be liable on summary conviction to imprisonment for a term not exceeding six months or to a fine not exceeding level 5 on the standard scale or both.

In this section it clearly states that if a person uses their computer in the intent to use it to secure access to any program or data then they will be convicted of committing the crime, Aaron targeted a specific program or website where he knew that a person called Bookie would open eventually so when she does the virus will affect her computer and because she accessed it from a work place it affect the entire America’s port, in Houston, Texes.

Section 2
2(1) A person is guilty of an offence under this section if he/she commits an offence under section 1 above ("the unauthorised access offence") with intention
a) To

You May Also Find These Documents Helpful

  • Satisfactory Essays

    This is when the hacker places a back door that could be done by installing a program that can give the hacker unlimited access to the database anytime which could compromise any important data such as customer personal information or even company information.…

    • 255 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The first offence attracted a lengthier sentence than the second offence, in which his liability was accessorial rather than…

    • 2795 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    It depends on the amount and the person’s criminal background, but can be punishable up to 3 years as a felony charge.…

    • 509 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 204 Quiz

    • 2478 Words
    • 10 Pages

    You follow certain step’s to access the supplementary readings for a course when u sing your organizations library management system. These steps that you follow are examples of the _________ components of an information system.…

    • 2478 Words
    • 10 Pages
    Satisfactory Essays
  • Good Essays

    24 or 48 hours in jail, second is 7 days I think, the third is 150 days in jail and any higher is a felony. The fines are very high and you lose your license for 1 year min, also if you took a alcohol test (either blood or breath) and it was higher than .20 then its mandatory 7 days in jail.…

    • 2106 Words
    • 9 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Answer: Computer Hacking it is the act of bypassing ones account or database and hacking involves stealing of identity and use it in his/her own interest.…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Kingpin Ananlytical Essay

    • 377 Words
    • 2 Pages

    Introduction: Below I will present an argument that that shows the computer hacking by Max Butler, the main character, demonstrated in the book Kingpin by Kevin Poulsen, was unethical in nature. Max’s actions illustrate computer crime defined as, “any incident involving an intentional act where a victim suffered or could have suffered a loss, and a perpetrator made or could have made a gain and is associated with computers” (Parker, 1976). Max utilized his hacking skills in a malicious manner to victimize individuals by taking their personal property.…

    • 377 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Legal

    • 661 Words
    • 3 Pages

    Stole more than $32,000, got charged for 34 offences between 2009 and 2011. Got sentenced to 2 and a half years in jail. His court hearing was held in the magistrates court.…

    • 661 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    The mental element of complicity refers to participation in a crime through demonstrating an intention to assist or encourage the commission of an offence by another person. The Crimes Act (NSW) refers to three doctrines of complicity: joint criminal enterprise, extended common purpose and accessorial liability. In these contexts, the mens rea and actus reas of the secondary participant must be established in order to amount to complicity with the primary participant. Since complicity is substantially governed by common law rather than statute, cases that raise issues of Offences Against the Person will be used in order to exemplify characteristics of complicity.…

    • 892 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    I think we would all agree that the primary objective of any business is to make a profit. While this may be true, there is a strong correlation between being financially successful and morally and socially responsible. It would appear that company Q has disregarded the latter. In order to succeed in any given environment, one…

    • 726 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Gary Mckinnon Essay

    • 1506 Words
    • 7 Pages

    Between the years 2001 and 2002 Gary McKinnon was arrested under the Computer Misuse Act in the UK just after the 9/11, and got bail by 2005.…

    • 1506 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Bendelladj Research Paper

    • 614 Words
    • 3 Pages

    Puzzled, I decided to do some research as I knew for a fact that under no circumstances were cyber crimes capital…

    • 614 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    The No Electronic Theft (NET) Act was enacted by Congress in 1997 to help prosecute of copyright violations on the internet. It makes it a federal crime to copy, distribute, and share copies of electronic works that are copyrighted, such as movies, games, and music. Also applicable in means of making copyrighted material available over networks. Before this Act was passed people who purposely distributed copied software over the internet did not face criminal penalties if they didn’t make profit off of it. Violation of the electronic copyrighting will carry out a maximum penalty of three years in prison and a fine of $250,000 ("University Information Technology Services",…

    • 277 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Court Report

    • 1667 Words
    • 7 Pages

    This is a Table 1 indictable offence (The Criminal Procedure Act 1986); which means it can be dealt with summarily before a magistrate in the Local Court (unless the defence or prosecution elects otherwise). This also means that the maximum penalty which can be imposed is 2 years imprisonment.…

    • 1667 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    is liable on conviction to a fine of $30000 and to imprisonment for 3 months.…

    • 1596 Words
    • 7 Pages
    Good Essays