2. Topics to be discussed......<br /><ul><li> What are computer Crimes?
3. Examples of some Computer Crimes
4. What is the Computer Misuse Act (1990) and why was it created?
5. What are the three principles of the Computer Misuse Act?
6. The Copyright, Designs and Patents Act (1989)</li></li></ul><li>What are Computer Crimes?<br />Computer crime can broadly be defined as criminal activity involving an information technology infrastructure, including:<br />Illegal access (unauthorized access)<br />Illegal interception (by technical means of non-public transmissions of computer data to, from or within a computer system)<br />Data interference (unauthorized damaging, deletion, deterioration, alteration or suppression of computer data) <br />Systems interference (interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data)<br />Misuse of devices<br />Forgery (ID theft), and <br />Electronic fraud etc.<br />
7. Hacking <br />Hacker, is an unauthorized user who attempts to or gains access to an information system. <br />Hacking is an act of gaining an illegal access on someone’s computer or data.<br />
8. Spreading Viruses<br />A virus is a program written to cause mischief or damage to a computer system.<br />Deliberately planting viruses into a computer system to cause damage to program files and data is also considered as a crime. <br />
9. Electronic Fraud<br />It is the use of computers or communication systems to commit fraud for financial gain. Such as :<br /><ul><li>Copying Software;
10. Copying or Downloading music;
11. Copying images or photographs from the Web;
12. Copying text from web pages.
13. Setting up false suppliers, who send invoices to the real companies.</li></li></ul><li>Phantom withdrawals <br />Money which has been debited (taken out) mysteriously using an ATM without the person who owns the card.<br />
14. Computer Misuse Act (1990)<br />What is it and why was it created?<br />The Computer Misuse Act (1990) was developed to cope with the problems of computer hackers and viruses.<br />
15. Computer Misuse Act (1990)<br />What are the three principles of the Act? <br /> It is illegal to access unauthorised data e.g. Hacking.<br /> It is illegal to access unauthorised data and intend to do it again e.g. Blackmail and fraud purposes.<br /> It is illegal to access unauthorised data and amend it e.g. Planting Viruses and deletingfiles.<br />
16. Copyright, Design and Patents Act (1988)<br />The Act protects a wide range of work… written and computer based. Includes:<br /><ul><li>Copying Software;
17. Copying or Downloading music;
18. Copying images or photographs from the Web;
19. Copying text from web pages.</li></li></ul><li>Copyright, Design and Patents Act (1988)<br />Introduced to protect people who have created original pieces of worksuch as:Books, Music, Films, Games, Applications.<br />2 main purposes of the Act are:<br /><ul><li>To ensure people are rewarded for their endeavours.
20. To give protection to the copyright holder if someone tries to steal their work.</li></li></ul><li>Thank you<br />