SlideShare a Scribd company logo
COMPUTER MISUSE AND CRIMINAL
LAW
SOHAIL DANISH 12024119-120
DEFINITION
The Computer Misuse Act 1990 (CMA) is an act of the UK Parliament
passed in 1990. CMA is designed to frame legislation and controls over
computer crime and Internet fraud.The legislation was created to:
 Criminalize unauthorized access to computer systems.
 Deter serious criminals from using a computer in the commission of a
criminal offence or seek to hinder or impair access to data stored in a
computer
http://searchsecurity.techtarget.co.uk/sDefinition/0,,sid180_gci1293174,00.html
COMPUTER MISUSE ACT 1990
 Introduced 3 criminal offences:
 Accessing computer material without permission, eg looking at someone
else's files.
 Accessing computer material without permission with intent to commit
further criminal offences, eg hacking into the bank's computer and wanting
to increase the amount in your account.
 Altering computer data without permission, eg writing a virus to destroy
someone else's data, or actually changing the money in an account.
http://www.bbc.co.uk/schools/gcsebitesize/ict/legal/1dataandcomputermisuserev2.shtml
PUNISHMENT
 The offences are punishable as follows:
 Offence 1. Up to 6 months' prison and up to £5,000 in fines.
 Offences 2 and 3. Up to 5 years in prison and any size of fine (there is no limit).
http://impact.freethcartwright.com/2006/08/computer_misuse.html
TYPES OF COMPUTER MISUSE
 Hacking
 Data misuse and unauthorised transfer or copying
 Copying and distributing copyrighted software, music and film
 Email and chat room abuses
 Pornography
 Extreme material
 Identity and financial abuses
 Fraud and theft
 Viruses
http://www.bbc.co.uk/schools/gcsebitesize/ict/legal/1dataandcomputermisuserev1.shtml
HACKING
 Hacking is where an unauthorised person uses a network, Internet or modem
connection to gain access past security passwords or other security to see data
stored on another computer. Hackers sometimes use software hacking tools and
often target, for example, particular sites on the Internet.
DATA MISUSE AND UNAUTHORISED
TRANSFER OR COPYING
Copying and illegal transfer of data is very quick and easy
using online computers and large storage devices such as
hard disks, memory sticks and DVDs. Personal data,
company research and written work, such as novels and
textbooks, cannot be copied without the copyright holder's
permission.
COPYING AND DISTRIBUTING COPYRIGHTED
SOFTWARE, MUSIC AND FILM
 This includes copying music and movies with computer equipment and distributing
it on the Internet without the copyright holder's permission.This is a widespread
misuse of both computers and the Internet that breaks copyright regulations.
EMAIL AND CHAT ROOM ABUSES
 Internet services such as chat rooms and email have been the subject of
many well-publicised cases of impersonation and deception where
people who are online pretend to have a different identity. Chat rooms
have been used to spread rumours about well known personalities.A
growing area of abuse of the Internet is email spam, where millions of
emails are sent to advertise both legal and illegal products and services.
PORNOGRAPHY
 A lot of indecent material and pornography is available through the
Internet and can be stored in electronic form.There have been several
cases of material, which is classified as illegal, or which shows illegal acts,
being found stored on computers followed by prosecutions for
possession of the material.
IDENTITY AND FINANCIAL ABUSES
 This topic includes misuse of stolen or fictional credit card numbers to
obtain goods or services on the Internet, and use of computers in financial
frauds.These can range from complex well thought out deceptions to
simple uses such as printing counterfeit money with colour printers.
VIRUSES
 Viruses are relatively simple programs written by people and designed to cause
nuisance or damage to computers or their files.
PREVENTING MISUSE
 The Data Protection Act
 This was introduced to regulate personal data.This helps to provide protection
against the abuse of personal information. Find out more about the Data
Protection Act.
 Copyright law
 This provides protection to the owners of the copyright and covers the copying of
written, musical, or film works using computers. FAST is the industry body which is
against software theft.You can find out more about it in the Copyright section.
 There have been cases where laws such as Copyright have been used to crack
down on file sharing websites or individuals who store and illegally distribute
copyrighted material, eg music.There is a massive problem with many people
around the world obtaining copyrighted material illegally.
Close down chat rooms
Some chat rooms have been closed down due to abuses, especially where
children are vulnerable. Some have moderators who help to prevent abuses.
Advice about sensible use is important; especially to never give personal
contact details or arrange meetings without extreme caution.
Reduce email spamming
This may be reduced by:
never replying to anonymous emails
setting filters on email accounts
reporting spammers to ISPs, who are beginning to get together to blacklist email
abusers
governments passing laws to punish persistent spammers with heavy fines
Regular backups and security
Just making something illegal or setting up regulations does not stop it
happening. Responsible computer users need to take reasonable steps to keep
their data safe. This includes regular backups and sufficient security with
passwords.
!!THE END!!
Any questions?

More Related Content

What's hot

Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
Dr. Prashant Vats
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
guest65a1c4
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
Soreingam Ragui
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
Hem Pokhrel
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Komal003
 
Software piracy
Software piracySoftware piracy
Software piracy
Akhil Tiwari
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Md. Atiqur Rahman
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
nitss007
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptx
ANIKETKUMARSHARMA3
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Ramesh Upadhaya
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Akash Dhiman
 
anatomy of a sw house
anatomy of a sw houseanatomy of a sw house
anatomy of a sw house
Hamza Cheema
 
Cyber Crime
Cyber CrimeCyber Crime
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
amani kadope
 
cyber crime
cyber crimecyber crime
cyber crime
Mosuud jilani lipon
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
Noushad Hasan
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
Adeel Rasheed
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
PraphullaShrestha1
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mazhar Nazik
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
lorensr12
 

What's hot (20)

Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
anatomy of a sw house
anatomy of a sw houseanatomy of a sw house
anatomy of a sw house
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
 

Viewers also liked

Agenda projeto marias
Agenda projeto mariasAgenda projeto marias
Agenda projeto marias
FUNDAÇÃO EDP
 
Programa nossa sopa japomirim e itagibã-
Programa nossa sopa   japomirim e itagibã-Programa nossa sopa   japomirim e itagibã-
Programa nossa sopa japomirim e itagibã-
Weslley Santos
 
Revista Edição Especial
Revista Edição EspecialRevista Edição Especial
Revista Edição EspecialNicolleFolheto
 
Cartaz sis computer
Cartaz sis computerCartaz sis computer
Cartaz sis computer
cpdakiles
 
úNica praça da rua do cano continua abandonada pelo poder público
úNica praça da rua do cano continua abandonada pelo poder públicoúNica praça da rua do cano continua abandonada pelo poder público
úNica praça da rua do cano continua abandonada pelo poder público
Roberto Rabat Chame
 
certificadoPRO_PE_Jan_Peter Pungs
certificadoPRO_PE_Jan_Peter PungscertificadoPRO_PE_Jan_Peter Pungs
certificadoPRO_PE_Jan_Peter Pungs
Jan Peter Pungs
 
Lista af1 - 4º bimestre - 9º ano - 2015(1)
Lista   af1 - 4º bimestre - 9º ano - 2015(1)Lista   af1 - 4º bimestre - 9º ano - 2015(1)
Lista af1 - 4º bimestre - 9º ano - 2015(1)
proffelipemat
 
Los barrios
Los barriosLos barrios
Los barrios
alecsis2012
 
TEC65
TEC65TEC65
[Creategies] Descubra os estímulos certos para conduzir mais clientes ao seu ...
[Creategies] Descubra os estímulos certos para conduzir mais clientes ao seu ...[Creategies] Descubra os estímulos certos para conduzir mais clientes ao seu ...
[Creategies] Descubra os estímulos certos para conduzir mais clientes ao seu ...
creategies
 
resumo_4421
resumo_4421resumo_4421
resumo_4421
Priscila Santa Rosa
 
Comércio prevê desaceleração nas vendas para o Dia das Mães 2014
Comércio prevê desaceleração nas vendas para o Dia das Mães 2014Comércio prevê desaceleração nas vendas para o Dia das Mães 2014
Comércio prevê desaceleração nas vendas para o Dia das Mães 2014
SPC Brasil
 
Q89
Q89Q89
Bcci’s googly bowl in legal battle
Bcci’s googly bowl in legal battleBcci’s googly bowl in legal battle
Bcci’s googly bowl in legal battle
CS (Dr)Rajeev Babel
 
Business Model Canvas
Business Model CanvasBusiness Model Canvas
Business Model Canvas
The Qube
 
Curando sua vida eft 06_dono de mim
Curando sua vida eft 06_dono de mimCurando sua vida eft 06_dono de mim
Curando sua vida eft 06_dono de mim
mateus98
 
CARREIRA PERXEBRIÑA 2015
CARREIRA PERXEBRIÑA 2015CARREIRA PERXEBRIÑA 2015
CARREIRA PERXEBRIÑA 2015
educ-arte
 
Debenture Trustees
Debenture TrusteesDebenture Trustees
Debenture Trustees
Shantanu Basu
 

Viewers also liked (20)

Agenda projeto marias
Agenda projeto mariasAgenda projeto marias
Agenda projeto marias
 
Programa nossa sopa japomirim e itagibã-
Programa nossa sopa   japomirim e itagibã-Programa nossa sopa   japomirim e itagibã-
Programa nossa sopa japomirim e itagibã-
 
Revista Edição Especial
Revista Edição EspecialRevista Edição Especial
Revista Edição Especial
 
Cartaz sis computer
Cartaz sis computerCartaz sis computer
Cartaz sis computer
 
úNica praça da rua do cano continua abandonada pelo poder público
úNica praça da rua do cano continua abandonada pelo poder públicoúNica praça da rua do cano continua abandonada pelo poder público
úNica praça da rua do cano continua abandonada pelo poder público
 
certificadoPRO_PE_Jan_Peter Pungs
certificadoPRO_PE_Jan_Peter PungscertificadoPRO_PE_Jan_Peter Pungs
certificadoPRO_PE_Jan_Peter Pungs
 
Lista af1 - 4º bimestre - 9º ano - 2015(1)
Lista   af1 - 4º bimestre - 9º ano - 2015(1)Lista   af1 - 4º bimestre - 9º ano - 2015(1)
Lista af1 - 4º bimestre - 9º ano - 2015(1)
 
Los barrios
Los barriosLos barrios
Los barrios
 
TEC65
TEC65TEC65
TEC65
 
CDCMP
CDCMPCDCMP
CDCMP
 
[Creategies] Descubra os estímulos certos para conduzir mais clientes ao seu ...
[Creategies] Descubra os estímulos certos para conduzir mais clientes ao seu ...[Creategies] Descubra os estímulos certos para conduzir mais clientes ao seu ...
[Creategies] Descubra os estímulos certos para conduzir mais clientes ao seu ...
 
resumo_4421
resumo_4421resumo_4421
resumo_4421
 
Comércio prevê desaceleração nas vendas para o Dia das Mães 2014
Comércio prevê desaceleração nas vendas para o Dia das Mães 2014Comércio prevê desaceleração nas vendas para o Dia das Mães 2014
Comércio prevê desaceleração nas vendas para o Dia das Mães 2014
 
História
HistóriaHistória
História
 
Q89
Q89Q89
Q89
 
Bcci’s googly bowl in legal battle
Bcci’s googly bowl in legal battleBcci’s googly bowl in legal battle
Bcci’s googly bowl in legal battle
 
Business Model Canvas
Business Model CanvasBusiness Model Canvas
Business Model Canvas
 
Curando sua vida eft 06_dono de mim
Curando sua vida eft 06_dono de mimCurando sua vida eft 06_dono de mim
Curando sua vida eft 06_dono de mim
 
CARREIRA PERXEBRIÑA 2015
CARREIRA PERXEBRIÑA 2015CARREIRA PERXEBRIÑA 2015
CARREIRA PERXEBRIÑA 2015
 
Debenture Trustees
Debenture TrusteesDebenture Trustees
Debenture Trustees
 

Similar to Computer Miss-use and Criminal Law

Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
Muhammad Haroon
 
It legislation
It legislationIt legislation
It legislation
doogstone
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
Divesh Mewara
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
SSPTRGCELL
 
Ethics and legislation in the it industry
Ethics and legislation in the it industryEthics and legislation in the it industry
Ethics and legislation in the it industry
jamiehaworth1
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
Hajar Len
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
Hajar Len
 
Cyberspace
CyberspaceCyberspace
Cyberspace
Utchi
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
VaishnaviPalkar
 
TAMUC LO 7
TAMUC LO 7TAMUC LO 7
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Accenture
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mehjabin Chowdhury
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
Tejasvi Bhatia
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
Harshita Ved
 
Cyber Law .pdf
Cyber Law .pdfCyber Law .pdf
Cyber Law .pdf
KrishnaVashistha4
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
FarjanaMitu3
 
English in written
English in writtenEnglish in written
English in written
azhar manap
 
Business And The Law
Business And The LawBusiness And The Law
Business And The Law
RobbieA
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Gracy Joseph
 
Online spying tools
Online spying toolsOnline spying tools
Online spying tools
farazmajeed27
 

Similar to Computer Miss-use and Criminal Law (20)

Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
It legislation
It legislationIt legislation
It legislation
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
 
Ethics and legislation in the it industry
Ethics and legislation in the it industryEthics and legislation in the it industry
Ethics and legislation in the it industry
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 
TAMUC LO 7
TAMUC LO 7TAMUC LO 7
TAMUC LO 7
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber Law .pdf
Cyber Law .pdfCyber Law .pdf
Cyber Law .pdf
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
English in written
English in writtenEnglish in written
English in written
 
Business And The Law
Business And The LawBusiness And The Law
Business And The Law
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Online spying tools
Online spying toolsOnline spying tools
Online spying tools
 

More from sohaildanish

Social Media
Social MediaSocial Media
Social Media
sohaildanish
 
Virtual Personal Assistant
Virtual Personal AssistantVirtual Personal Assistant
Virtual Personal Assistant
sohaildanish
 
Automated Vehicle (Google Car)
Automated Vehicle (Google Car)Automated Vehicle (Google Car)
Automated Vehicle (Google Car)
sohaildanish
 
System protection in Operating System
System protection in Operating SystemSystem protection in Operating System
System protection in Operating System
sohaildanish
 
Sorce of communication
Sorce of communicationSorce of communication
Sorce of communication
sohaildanish
 
Cover letter
Cover letterCover letter
Cover letter
sohaildanish
 

More from sohaildanish (6)

Social Media
Social MediaSocial Media
Social Media
 
Virtual Personal Assistant
Virtual Personal AssistantVirtual Personal Assistant
Virtual Personal Assistant
 
Automated Vehicle (Google Car)
Automated Vehicle (Google Car)Automated Vehicle (Google Car)
Automated Vehicle (Google Car)
 
System protection in Operating System
System protection in Operating SystemSystem protection in Operating System
System protection in Operating System
 
Sorce of communication
Sorce of communicationSorce of communication
Sorce of communication
 
Cover letter
Cover letterCover letter
Cover letter
 

Recently uploaded

Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
ukwwuq
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
bseovas
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
zyfovom
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
Trending Blogers
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
saathvikreddy2003
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 

Recently uploaded (20)

Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 

Computer Miss-use and Criminal Law

  • 1. COMPUTER MISUSE AND CRIMINAL LAW SOHAIL DANISH 12024119-120
  • 2. DEFINITION The Computer Misuse Act 1990 (CMA) is an act of the UK Parliament passed in 1990. CMA is designed to frame legislation and controls over computer crime and Internet fraud.The legislation was created to:  Criminalize unauthorized access to computer systems.  Deter serious criminals from using a computer in the commission of a criminal offence or seek to hinder or impair access to data stored in a computer http://searchsecurity.techtarget.co.uk/sDefinition/0,,sid180_gci1293174,00.html
  • 3. COMPUTER MISUSE ACT 1990  Introduced 3 criminal offences:  Accessing computer material without permission, eg looking at someone else's files.  Accessing computer material without permission with intent to commit further criminal offences, eg hacking into the bank's computer and wanting to increase the amount in your account.  Altering computer data without permission, eg writing a virus to destroy someone else's data, or actually changing the money in an account. http://www.bbc.co.uk/schools/gcsebitesize/ict/legal/1dataandcomputermisuserev2.shtml
  • 4. PUNISHMENT  The offences are punishable as follows:  Offence 1. Up to 6 months' prison and up to £5,000 in fines.  Offences 2 and 3. Up to 5 years in prison and any size of fine (there is no limit). http://impact.freethcartwright.com/2006/08/computer_misuse.html
  • 5. TYPES OF COMPUTER MISUSE  Hacking  Data misuse and unauthorised transfer or copying  Copying and distributing copyrighted software, music and film  Email and chat room abuses  Pornography  Extreme material  Identity and financial abuses  Fraud and theft  Viruses http://www.bbc.co.uk/schools/gcsebitesize/ict/legal/1dataandcomputermisuserev1.shtml
  • 6. HACKING  Hacking is where an unauthorised person uses a network, Internet or modem connection to gain access past security passwords or other security to see data stored on another computer. Hackers sometimes use software hacking tools and often target, for example, particular sites on the Internet.
  • 7. DATA MISUSE AND UNAUTHORISED TRANSFER OR COPYING Copying and illegal transfer of data is very quick and easy using online computers and large storage devices such as hard disks, memory sticks and DVDs. Personal data, company research and written work, such as novels and textbooks, cannot be copied without the copyright holder's permission.
  • 8. COPYING AND DISTRIBUTING COPYRIGHTED SOFTWARE, MUSIC AND FILM  This includes copying music and movies with computer equipment and distributing it on the Internet without the copyright holder's permission.This is a widespread misuse of both computers and the Internet that breaks copyright regulations.
  • 9. EMAIL AND CHAT ROOM ABUSES  Internet services such as chat rooms and email have been the subject of many well-publicised cases of impersonation and deception where people who are online pretend to have a different identity. Chat rooms have been used to spread rumours about well known personalities.A growing area of abuse of the Internet is email spam, where millions of emails are sent to advertise both legal and illegal products and services.
  • 10. PORNOGRAPHY  A lot of indecent material and pornography is available through the Internet and can be stored in electronic form.There have been several cases of material, which is classified as illegal, or which shows illegal acts, being found stored on computers followed by prosecutions for possession of the material.
  • 11. IDENTITY AND FINANCIAL ABUSES  This topic includes misuse of stolen or fictional credit card numbers to obtain goods or services on the Internet, and use of computers in financial frauds.These can range from complex well thought out deceptions to simple uses such as printing counterfeit money with colour printers.
  • 12. VIRUSES  Viruses are relatively simple programs written by people and designed to cause nuisance or damage to computers or their files.
  • 13. PREVENTING MISUSE  The Data Protection Act  This was introduced to regulate personal data.This helps to provide protection against the abuse of personal information. Find out more about the Data Protection Act.  Copyright law  This provides protection to the owners of the copyright and covers the copying of written, musical, or film works using computers. FAST is the industry body which is against software theft.You can find out more about it in the Copyright section.  There have been cases where laws such as Copyright have been used to crack down on file sharing websites or individuals who store and illegally distribute copyrighted material, eg music.There is a massive problem with many people around the world obtaining copyrighted material illegally.
  • 14. Close down chat rooms Some chat rooms have been closed down due to abuses, especially where children are vulnerable. Some have moderators who help to prevent abuses. Advice about sensible use is important; especially to never give personal contact details or arrange meetings without extreme caution. Reduce email spamming This may be reduced by: never replying to anonymous emails setting filters on email accounts reporting spammers to ISPs, who are beginning to get together to blacklist email abusers governments passing laws to punish persistent spammers with heavy fines Regular backups and security Just making something illegal or setting up regulations does not stop it happening. Responsible computer users need to take reasonable steps to keep their data safe. This includes regular backups and sufficient security with passwords.