COMPUTER MISUSE ACT 1990 Computing Legislation COMPUTER MISUSE

  • Slides: 8
Download presentation
COMPUTER MISUSE ACT 1990 Computing Legislation

COMPUTER MISUSE ACT 1990 Computing Legislation

COMPUTER MISUSE ACT 1990 Rule 1: Unauthorised access to computer material.

COMPUTER MISUSE ACT 1990 Rule 1: Unauthorised access to computer material.

COMPUTER MISUSE ACT 1990 Rule 1: Unauthorised access to computer material. A person is

COMPUTER MISUSE ACT 1990 Rule 1: Unauthorised access to computer material. A person is guilty of an offence if: - he causes a computer to perform any function with intent to secure access to any program or data held in a computer; - the access he intends to secure is unauthorized; - And he knows at the time when he causes the computer to perform the function that this is the case

COMPUTER MISUSE ACT 1990 Rule 2: Unauthorised access with intent to commit or facilitate

COMPUTER MISUSE ACT 1990 Rule 2: Unauthorised access with intent to commit or facilitate commission of further offences

COMPUTER MISUSE ACT 1990 Rule 2: Unauthorised access with intent to commit or facilitate

COMPUTER MISUSE ACT 1990 Rule 2: Unauthorised access with intent to commit or facilitate commission of further offences A person is guilty of an offence under this section if he commits an offence under section 1 above ("the unauthorized access offence") - With intent to commit an offence to which this section applies; or - to facilitate the commission of such an offence (whether by himself or by any other person) and the offence he intends to commit or facilitate is referred to below in this section as the further offence.

COMPUTER MISUSE ACT 1990 Rule 3: Unauthorised modification of computer material.

COMPUTER MISUSE ACT 1990 Rule 3: Unauthorised modification of computer material.

COMPUTER MISUSE - ACT 1990 Rule 3: Unauthorised modification of computer material. A person

COMPUTER MISUSE - ACT 1990 Rule 3: Unauthorised modification of computer material. A person is guilty of an offence if - he does any act which causes the unauthorized modification of the contents of any computer; - and at the time when he does the act he has the requisite intent and the requisite knowledge.

COMPUTER MISUSE - ACT 1990 Rule 3: Unauthorised modification of computer material. For the

COMPUTER MISUSE - ACT 1990 Rule 3: Unauthorised modification of computer material. For the purposes of the subsection above, the requisite intent is an intent to cause a modification of the contents of any computer and by so doing: - to impair the operation of any computer; - to prevent or hinder access to any program or data held in any computer; or - to impair the operation of any such program or the reliability of any such data.