Your SlideShare is downloading. ×
0
Computer And The Law
Computer And The Law
Computer And The Law
Computer And The Law
Computer And The Law
Computer And The Law
Computer And The Law
Computer And The Law
Computer And The Law
Computer And The Law
Computer And The Law
Computer And The Law
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Computer And The Law

803

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
803
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Computer and the law<br />
  • 2. Topics to be discussed......<br /><ul><li> What are computer Crimes?
  • 3. Examples of some Computer Crimes
  • 4. What is the Computer Misuse Act (1990) and why was it created?
  • 5. What are the three principles of the Computer Misuse Act?
  • 6. The Copyright, Designs and Patents Act (1989)</li></li></ul><li>What are Computer Crimes?<br />Computer crime can broadly be defined as criminal activity involving an information technology infrastructure, including:<br />Illegal access (unauthorized access)<br />Illegal interception (by technical means of non-public transmissions of computer data to, from or within a computer system)<br />Data interference (unauthorized damaging, deletion, deterioration, alteration or suppression of computer data) <br />Systems interference (interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data)<br />Misuse of devices<br />Forgery (ID theft), and <br />Electronic fraud etc.<br />
  • 7. Hacking <br />Hacker, is an unauthorized user who attempts to or gains access to an information system. <br />Hacking is an act of gaining an illegal access on someone’s computer or data.<br />
  • 8. Spreading Viruses<br />A virus is a program written to cause mischief or damage to a computer system.<br />Deliberately planting viruses into a computer system to cause damage to program files and data is also considered as a crime. <br />
  • 9. Electronic Fraud<br />It is the use of computers or communication systems to commit fraud for financial gain. Such as :<br /><ul><li>Copying Software;
  • 10. Copying or Downloading music;
  • 11. Copying images or photographs from the Web;
  • 12. Copying text from web pages.
  • 13. Setting up false suppliers, who send invoices to the real companies.</li></li></ul><li>Phantom withdrawals <br />Money which has been debited (taken out) mysteriously using an ATM without the person who owns the card.<br />
  • 14. Computer Misuse Act (1990)<br />What is it and why was it created?<br />The Computer Misuse Act (1990) was developed to cope with the problems of computer hackers and viruses.<br />
  • 15. Computer Misuse Act (1990)<br />What are the three principles of the Act? <br /> It is illegal to access unauthorised data e.g. Hacking.<br /> It is illegal to access unauthorised data and intend to do it again e.g. Blackmail and fraud purposes.<br /> It is illegal to access unauthorised data and amend it e.g. Planting Viruses and deletingfiles.<br />
  • 16. Copyright, Design and Patents Act (1988)<br />The Act protects a wide range of work… written and computer based. Includes:<br /><ul><li>Copying Software;
  • 17. Copying or Downloading music;
  • 18. Copying images or photographs from the Web;
  • 19. Copying text from web pages.</li></li></ul><li>Copyright, Design and Patents Act (1988)<br />Introduced to protect people who have created original pieces of worksuch as:Books, Music, Films, Games, Applications.<br />2 main purposes of the Act are:<br /><ul><li>To ensure people are rewarded for their endeavours.
  • 20. To give protection to the copyright holder if someone tries to steal their work.</li></li></ul><li>Thank you<br />

×