answersLogoWhite

0


Best Answer

The Computer Misuse Act was voted into law in the United Kingdom, partially based on the outcome of a 1987 case, R V Gold and Schifreen. Stephen Gold and Robert Schifreen were able to gain access British Telecom through its Prestel service by using regular home computers. They had obtained the password by shoulder Surfing at a trade show. Once they gained access to Prestel, they managed to gain access to the personal messages of Prince Philip. The Computer Misuse Act introduced three new criminal codes. They are unauthorized access to a computer, unauthorized access to a computer with the intent of engaging in further offenses, and unauthorized modification of computer information.

User Avatar

Wiki User

9y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

7y ago

You are probably referring to the Computer Misuse Act of 1990. It is an act by the Parliament of the UK. Sections 1 through 3 of the act define 3 specific criminal acts related to computer use (or rather misuse)

  1. unauthorised access to computer material, punishable by 12 months' imprisonment (or 6 months in Scotland) and/or a fine "not exceeding level 5 on the standard scale" (since 2015, unlimited); pretty much this means any kind of hacking to get into a computer or computer system without permission by the owner
  2. unauthorised access with intent to commit or facilitate commission of further offences, punishable by 12 months/maximum fine (or 6 months in Scotland) on summary conviction and/or 5 years/fine on indictment; this includes misusing computers even if your initial access was authorized - if you do something you were not authorized to do once you got on, then it falls under this section.
  3. unauthorised modification of computer material, punishable by 12 months/maximum fine (or 6 months in Scotland) on summary conviction and/or 10 years/fine on indictment. Note that this includes viruses, worms, ransomware, and a lot of other types of malware.

There have been at least 2 sets of amendments to the act since it was passed:

The amendments to the Computer Misuse Act 1990 by Part 5 of the Police and Justice Act 2006 are:

  • Section 35. Unauthorised access to computer material, punishable by up to 2 years in prison or a fine or both.
  • Section 36. Unauthorised acts with intent to impair operation of computer, etc. punishable by up to 10 years in prison or a fine or both.
  • Section 37. Making, supplying or obtaining articles for use in computer misuse offences, punishable by up to 2 years in prison or a fine or both.
  • Section 38. Transitional and saving provision.

The amendments to the Computer Misuse Act 1990 by Part 2 of the Serious Crime Act 2015 are:

  • Section 41. (New Section 3ZA of the Computer Misuse Act 1990). Unauthorised acts causing, or creating risk of, serious damage - punishable by up to 14 years in prison or a fine or both, possible life imprisonment where human welfare or national security were endangered.
  • Section 42. Obtaining articles for purposes relating to computer misuse - amendments to Section 3A.
  • Section 43. Territorial scope of computer misuse - amendments to Sections 4, 5 and 10 making the primary territorial scope the United Kingdom but can be worldwide especially if perpetrator (or conspirators) is British and broke local law.
  • Section 44. Savings - covers seizure and enactment amendments to Sections 10 and 16.
  • Section 47. Serious Crime Prevention Orders: meaning of "Serious Offence" - adds Computer Misuse to list of serious crimes in the Serious Crime Act 2007 including being grounds for compulsory winding up of a company.
  • Section 86. Transition and savings provisions - requires Sections 42 and 43 to be brought into force before they can be used.
  • Schedule 1. Amendments to Serious Crimes Act 2007: Scotland - similar changes to Scottish law.
  • Schedule 4. Minor and consequential amendments - changes Computer Misuse Act 1990 and the Armed Forces Act 2006.
This answer is:
User Avatar

User Avatar

Wiki User

10y ago

The Parliament of the United Kingdom passed the computer Misuse Act 1990. There are 3 criminal acts associated with the act. The first is Unauthorized access to computer material. The second is unauthorized access with intent to commit or facilitate commission of further offences. The 3rd criminal act is unauthorized modification of computer material.

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What criminal offences does the Computer Misuse Act 1990 deal with?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What was the impact of the Computer Misuse Act of 1990?

The computer Misuse Act of 1990 made provision for securing computer material against unauthorized access or modification. Its impact to people is to refrain from any unauthorized use of computer data.


What is the Hack Act?

It is a UK legislation adopted about 1990 for the prevention of computer misuse, which occurred in that country.


What law does hacking break?

Hacking is in violation of the Computer Misuse Act 1990 and the Data Protection Act 1998.


What has the author Kalvinder Kaur written?

Kalvinder Kaur has written: 'Why the Computer Misuse Act 1990 was introduced and its implications'


When is the Computer Misuse Act take place?

The Computer Misuse Act occured in 1990 when the need for protecting computers and their materials was becoming noticible visible. In order to crack down on illegal activity happening with computers EX: hijacking them this act was made to help prevent these acts.


Is it illegal to DdoS a Minecraft server?

Yes, it is. In the UK, it is covered under the Computer Misuse Act, 1990, with an addition in the Police and Justice Act of 2003.


What penalties can someone face if they are found guilty of offences against the computer misuse act?

The 3 main points are:Unauthorised access to computer material: it is unlawful without proper authority to: use anthoer person's ID and password to access a computer, use data or run a program, alter, delete, copy or move a program or data or simplay to output a program data, lay a trap to obtain a password.Unauthorised access to a computer with intent to commit or facilitate the commission or a further offence: this covers the situation where unauthorised access is gained with intent to commit a further offence, eg a person may gain unauthorised access to computer material to commit theft by re-directing funds from someone else's bank accountUnauthoried modification of computer material: this offence includes the deliberate deletion or corruption of programs or data includes the creation of viruses where these results in the modfication or destruction of data.


Explain why the Computer Misuse Act was passed in 1990?

The Computer Misuse Act of 1990 is a law in the UK that makes illegal certain activities, such as hacking into other people's systems, misusing software, or helping a person to gain access to protected files of someone else's computer. The Computer Misuse Act came into being after the 1984-1985 R v. Gold case, which was appealed in 1988. The appeal was successful, inspiring parliament to create a law that would make punishable the behavior committed by Robert Schifreen and Stephen Gold. It obviously could not be applied retroactively, but it's goal was to discourage behavior like theirs in the future.The Computer Misuse Act 1990 was created by the English Government to stop hackers from gaining control of another computer/computer system/computer network and carrying out malicious activities. This meant changing sites, gaining access to prohibited information and other things. All who broke the legislation would be prosecuted and could be jailed.More can be researched at the Link in the Related Links Section.The Computer misuse act protects users and customers through computer systems. This allows individuals to be safe and secure when it comes to using computer softwares.


What kinds of government regulations has effect to e-commerce?

Data Protection Act 1998 Computer Misuse Act 1990 Copyright legislation E-commerce Regulations


Which law made it illegal to try to gain access to a computer system using another user's password?

The Computer Misuse Act (1990) It states that you can not attempt to gain unauthorized access to a computer system. You may use the other user's password if permission is given to access the system.


When was The Pale Criminal created?

The Pale Criminal was created in 1990.


What Three laws that would be broken by hacking?

Computer misuse act (1990) the hacker breaks this. Data Protection act (1998) the person holding information may break this as it is them allowing sensitive data to be leaked