answersLogoWhite

0

A computer misuse act can be reported a couple different ways. You need to be familiar with data and hacking information then take what you know to authorites that can remedy the situation.

User Avatar

Wiki User

10y ago

What else can I help you with?

Related Questions

What are the ICT laws?

The Data protection act Copyright designs and pattens act The computer misuse act and one more... :/


Miss use of computer?

Misuses of a computer include using it for a baseball bat, frisbee, and dinner plate. There are many misuses of a computer. Using one to spread viruses and spam is a major misuse.


What is an abusement?

An abusion is an act of misuse or abuse, of violation of law or improper behaviour, or of catachresis - the improper use of a word in a given context.


Why should you report damage to your computer?

You should report damage to your computer so your computer is safe and if you like droped it or something and I wont work anymore you might want to call some one.


What are the advantages of dumb terminal?

Advantages of dumb terminal no one person can misuse his power because his power is given by a main computer which is server.


When was the computer misuse act introduced and why?

The computer misuse act came into affect in 1990. The United Kingdom's Parliament enacted it after a highly publicized court case, R v Gold and Schriffen in 1988, one of the earliest to deal with early cyber crime. It covers issues regarding unauthorized access to materials on computers, computer-related activities enabling other types of crime, and modifications to the materials or functionality of computers.


What should I do if a check is lost in the mail?

If a check is lost in the mail, you should contact the issuer of the check immediately to report the situation. They can then issue a stop payment on the lost check and reissue a new one to you. It's important to act quickly to prevent any potential fraud or misuse of the lost check.


Computer abuse amendments act of 1994?

The Computer Abuse Amendments Act of 1994 was one of the six amendments made to the Computer Fraud and Abuse Act of 1986. This amendment outlaws transmission of harmful computer codes, such as viruses.


What are the misuse of mobile phone?

One misuse of the mobile phone is when one takes pictures of others who are unaware of this. Spoofing is another misuse. This is where one can change their telephone number to whatever number they want to show up on someone's caller ID.


What is a prefix for the word use?

De is a prefix that can be used with legacy. It spells the word delegacy. It means the act of delegating.


Can any one misuse this number?

Yes.


What is the synonym of misuse?

One would be 'ABUSE'.