Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Computer Misuse Act

Prior to 1990, when the Computer Misuse Act was enacted, it was difficult to convict anyone of computer hacking. There were two main issues firstly offences regulating the penetration of the computing system and secondly offences which dealt with the alteration or destruction of data by someone who has already gained access. The former had been the subject of greatest controversy. We shall look first at regulation of hacking by traditional offences, then at the 1990 Act. [Pg.267]

The Computer Misuse Act 1990 enshrines proposals made in the Report of the Law Commission, a document produced after extensive consultation with interested bodies on proposals made in the Law Commission s Working Paper. In their Report, the Law Commission recommended the creation of three new offences, two relating to hacking, and a third concerning the unauthorized modification of data. We shall look at the latter when we consider the issue of criminal damage. For the moment we shall concentrate solely on the offences relating to hacking. [Pg.268]

The second offence is more serious. Section 2 of the Computer Misuse Act makes it an offence to commit the basic unauthorized access offence outlined above, but with the intent to commit or facilitate the commission of a serious crime. It does not matter whether the further offence would involve the use of a computer or not nor whether the further offence is in fact committed nor even whether it is possible to commit the further offence (e.g. where the intended victim is already dead). The Law Commission in their Report gave the exam... [Pg.269]

One of the main reasons for the growth in the use of computers is their ability to store, yet make readily accessible, very large amounts of data. However this has given rise to concomitant fears for the security of data, and to calls for appropriate sanctions against those who destroy or alter data without authorization. Two criminal offences cunentiy cover this form of abuse criminal damage and Section 3 of the Computer Misuse Act 1990. [Pg.271]

The Law Commission were not happy with the outcome of Cox v Riley in terms of the protection that that case afforded to computerized data. They therefore reconunended the creation of a new offence, which now forms Section 3 of the Computer Misuse Act 1990. This provides that ... [Pg.272]

This form of abuse may be controlled by the new offences in the Computer Misuse Act 1990, discussed above. They often apply, for in order to remove information stored on a computer it will be necessaiy to access the computer first. This is not the case of course if the information is stored, e.g. on a disc separate from the computer. The Law... [Pg.274]

There has been much debate in receirt years about the extent to which the criminal law adequately controls the misuse of computers and about the need for reform. Some see the computer as such a wholly different entity that it should be regulated by a completely separate set of laws, and argue that there should be a special Computer Crimes Act. This has happened in the United States of America, following the model of Florida s Computer Crimes Act 1978. This is probably not the best approach, however. Firstly,... [Pg.263]


See other pages where Computer Misuse Act is mentioned: [Pg.268]    [Pg.274]    [Pg.274]    [Pg.340]    [Pg.268]    [Pg.274]    [Pg.274]    [Pg.340]    [Pg.263]    [Pg.270]   
See also in sourсe #XX -- [ Pg.268 , Pg.271 , Pg.272 , Pg.275 ]




SEARCH



Computers misuses

Misuse

© 2024 chempedia.info