CYBER LAWS OF UK
COUNTRIES IN UK - ENGLAND, WALES, SCOTLAND AND
NORTHEN IRELAND
HACKING
• Computer misuse Act 1990
1. Unauthorised access to computer material (section 35)
2. Unauthorised acts with intent to impair operation of
computer, etc (section 36)
3. Making, supplying or obtaining articles for use in
computer misuse offences(section 37)
However this act has been amended twice, by the Police and
Justice Act 2006 and by the Serious Crime Act 2015
1. Unauthorized access to computer material
A person is guilty of an offense if-
(a) he causes a computer to perform any function with the intent to
secure access to any program or data held in any computer, or to
enable any such access to be secured
(b) the access he intends to secure, or to enable to be secured, is
unauthorized, and
(c) he knows at the time when he causes the computer to perform the
function that is the case.
A Person guilty of an offence under this
section shall be liable
(a) on summary conviction in England and Wales, to imprisonment for a
term not exceeding 12 months or to a fine not exceeding the statutory
maximum or to both;
(b) on summary conviction in Scotland, to imprisonment for a term not
exceeding six months or to a fine not exceeding the statutory maximum
or to both;
2.Unauthorized access with intent to commit
or facilitate commission for further offences
A person is guilty of an offense under this section if he commits an
offense under section 1 above (" the unauthorized access offense")
with intent
(a) to commit an offense to which this section applies; or
(b) to facilitate the commission of such an offense ( whether by himself
or by any other person); and the offense he intends to commit or
facilitate is referred to below in this section as the further offense.
A person guilty of an offense under this section
shall be liable
(a) on conviction on indictment, to imprisonment for a term not
exceeding five years or to a fine or to both.
3. Unauthorised acts with intent to impair, or with
recklessness as to impairing, operation of
computer, etc.
(1) A person is guilty of an offence if-
(a) he does any unauthorised act in relation to a computer;
(b) at the time when he does the act he knows that it is
unauthorised;
A person guilty of an offence under this section
shall be liable
(a) on summary conviction in England and Wales, to imprisonment for a
term not exceeding 12 months or to a fine not exceeding the statutory
maximum or to both;
(b) on summary conviction in Scotland, to imprisonment for a term not
exceeding six months or to a fine not exceeding the statutory maximum or
to both;
(c) on conviction on indictment, to imprisonment for a term not exceeding
ten years or to a fine or to both.
3A Making, supplying or obtaining articles for use
in offence under section 1 or 3
• (1) A person is guilty of an offence if he makes, adapts, supplies or offers
to supply any article intending it to be used to commit, or to assist in the
commission of, an offence under section 1 or 3.
(2) A person is guilty of an offence if he supplies or offers to supply any
article believing that it is likely to be used to commit, or to assist in the
commission of, an offence under section 1 or 3.
(3) A person is guilty of an offence if he obtains any article with a view to
its being supplied for use to commit, or to assist in the commission of, an
offence under section 1 or 3.
(4) In this section "article" includes any program or data held in electronic
form.
A person guilty of an offence under this section
shall be liable
(a) on summary conviction in England and Wales, to imprisonment
for a term not exceeding 12 months or to a fine not exceeding the
statutory maximum or to both;
(b) on summary conviction in Scotland, to imprisonment for a term
not exceeding six months or to a fine not exceeding the statutory
maximum or to both;
(c) on conviction on indictment, to imprisonment for a term not
exceeding two years or to a fine or to both.
Terrorism Act 2000
(1)In this Act “terrorism” means the use or threat of action where—
(a)the action falls within subsection (2),
(b)the use or threat is designed to influence the government [or
an international governmental organisation] or to intimidate
the public or a section of the public, and
(c)the use or threat is made for the purpose of advancing a
political, religious or ideological cause.
Terrorism Act 2000
(2)Action falls within this subsection if it—
(a)involves serious violence against a person,
(b)involves serious damage to property,
(c)endangers a person’s life, other than that of the person committing
the action,
(d)creates a serious risk to the health or safety of the public or a
section of the public, or
(e)is designed seriously to interfere with or seriously to disrupt an
electronic system.
Interception
• Regulation of Investigatory Powers Act 2000
The principles are:-
• Personal data shall be processed fairly and lawfully
• Personal data shall be obtained only for one or more specified and
lawful purposes, and shall not be further processed in any manner
incompatible with that purpose or those purposes.
• Personal data shall be adequate, relevant and not excessive in relation
to the purpose or purposes for which they are processed.
• Personal data shall be accurate and, where necessary, kept up to date.
• Personal data processed for any purpose or purposes shall not be
kept for longer than is necessary for that purpose or those purposes.
• Personal data shall be processed in accordance with the rights of data
subjects under this Act.
• Appropriate technical and organisational measures shall be taken
against unauthorised or unlawful processing of personal data and
against accidental loss or destruction of, or damage to, personal data.
• Personal data shall not be transferred to a country or territory outside
the European Economic Area unless that country or territory ensures
an adequate level of protection for the rights and freedoms of data
subjects in relation to the processing of personal data.

Cyber laws uk

  • 1.
    CYBER LAWS OFUK COUNTRIES IN UK - ENGLAND, WALES, SCOTLAND AND NORTHEN IRELAND
  • 2.
    HACKING • Computer misuseAct 1990 1. Unauthorised access to computer material (section 35) 2. Unauthorised acts with intent to impair operation of computer, etc (section 36) 3. Making, supplying or obtaining articles for use in computer misuse offences(section 37) However this act has been amended twice, by the Police and Justice Act 2006 and by the Serious Crime Act 2015
  • 3.
    1. Unauthorized accessto computer material A person is guilty of an offense if- (a) he causes a computer to perform any function with the intent to secure access to any program or data held in any computer, or to enable any such access to be secured (b) the access he intends to secure, or to enable to be secured, is unauthorized, and (c) he knows at the time when he causes the computer to perform the function that is the case.
  • 4.
    A Person guiltyof an offence under this section shall be liable (a) on summary conviction in England and Wales, to imprisonment for a term not exceeding 12 months or to a fine not exceeding the statutory maximum or to both; (b) on summary conviction in Scotland, to imprisonment for a term not exceeding six months or to a fine not exceeding the statutory maximum or to both;
  • 5.
    2.Unauthorized access withintent to commit or facilitate commission for further offences A person is guilty of an offense under this section if he commits an offense under section 1 above (" the unauthorized access offense") with intent (a) to commit an offense to which this section applies; or (b) to facilitate the commission of such an offense ( whether by himself or by any other person); and the offense he intends to commit or facilitate is referred to below in this section as the further offense.
  • 6.
    A person guiltyof an offense under this section shall be liable (a) on conviction on indictment, to imprisonment for a term not exceeding five years or to a fine or to both.
  • 7.
    3. Unauthorised actswith intent to impair, or with recklessness as to impairing, operation of computer, etc. (1) A person is guilty of an offence if- (a) he does any unauthorised act in relation to a computer; (b) at the time when he does the act he knows that it is unauthorised;
  • 8.
    A person guiltyof an offence under this section shall be liable (a) on summary conviction in England and Wales, to imprisonment for a term not exceeding 12 months or to a fine not exceeding the statutory maximum or to both; (b) on summary conviction in Scotland, to imprisonment for a term not exceeding six months or to a fine not exceeding the statutory maximum or to both; (c) on conviction on indictment, to imprisonment for a term not exceeding ten years or to a fine or to both.
  • 9.
    3A Making, supplyingor obtaining articles for use in offence under section 1 or 3 • (1) A person is guilty of an offence if he makes, adapts, supplies or offers to supply any article intending it to be used to commit, or to assist in the commission of, an offence under section 1 or 3. (2) A person is guilty of an offence if he supplies or offers to supply any article believing that it is likely to be used to commit, or to assist in the commission of, an offence under section 1 or 3. (3) A person is guilty of an offence if he obtains any article with a view to its being supplied for use to commit, or to assist in the commission of, an offence under section 1 or 3. (4) In this section "article" includes any program or data held in electronic form.
  • 10.
    A person guiltyof an offence under this section shall be liable (a) on summary conviction in England and Wales, to imprisonment for a term not exceeding 12 months or to a fine not exceeding the statutory maximum or to both; (b) on summary conviction in Scotland, to imprisonment for a term not exceeding six months or to a fine not exceeding the statutory maximum or to both; (c) on conviction on indictment, to imprisonment for a term not exceeding two years or to a fine or to both.
  • 11.
    Terrorism Act 2000 (1)Inthis Act “terrorism” means the use or threat of action where— (a)the action falls within subsection (2), (b)the use or threat is designed to influence the government [or an international governmental organisation] or to intimidate the public or a section of the public, and (c)the use or threat is made for the purpose of advancing a political, religious or ideological cause.
  • 12.
    Terrorism Act 2000 (2)Actionfalls within this subsection if it— (a)involves serious violence against a person, (b)involves serious damage to property, (c)endangers a person’s life, other than that of the person committing the action, (d)creates a serious risk to the health or safety of the public or a section of the public, or (e)is designed seriously to interfere with or seriously to disrupt an electronic system.
  • 13.
    Interception • Regulation ofInvestigatory Powers Act 2000 The principles are:- • Personal data shall be processed fairly and lawfully • Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes. • Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed. • Personal data shall be accurate and, where necessary, kept up to date.
  • 14.
    • Personal dataprocessed for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes. • Personal data shall be processed in accordance with the rights of data subjects under this Act. • Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data. • Personal data shall not be transferred to a country or territory outside the European Economic Area unless that country or territory ensures an adequate level of protection for the rights and freedoms of data subjects in relation to the processing of personal data.