Computer Misuse Act

806 Words2 Pages

In this webpage I will be discussing legislation so as we know that despite having a fair amount of laws related to the security and privacy of information there are still a lot of crimes happening which involves but limited to theft, damage and access to private and confidential information in IT. The two most common laws that I will be discussing today are the Data Protection Act and computer misuse act. Data Protection Act. Data protection Act was developed to give protection and lay down rules and how the data about the people can be used. The 1998 Act covers information or data stored on a computer or an organised paper filing system about living people. However it does not stop companies storing information about people. It just makes …show more content…

• Laying a trap to obtain password. 2. Unauthorised access to a computer system with intent to commit or facilitate the commission of a further offence, for example: • Creating a backdoor or Trojan or allowing a covert user administrator privileges. 3. Unauthorised modification of computer material such as: • The distribution of viruses, as well as the amendment of data to gain personal advantage such as bank account details • This act is one of the most important act when it comes to dealing with criminal offence in relation to a computer system. The computer misuse act is split up in to three parts and each one is different regarding to crime. The first and least criminal part is unauthorized access to a computer system, people in this crime often punished for 6 months in prison and up to £5000 fine. The second part of the act is unauthorized access to computer system with the intension to cause damage to files, however not actually doing so due to either failing to or being caught before the damage was done, this is punishable for 5 years in prison and unlimited fine. The third and final stage of the act is unauthorized access to computer system and successfully causing damage to the system, this is punished for 5 years in prison and unlimited fine. So this act fully covers all methods of hacking, system access and hacking that count as misuse to a computer system. Every possible criminal attack done through or to a computer system is covered by computer misuse

More about Computer Misuse Act

Open Document