Computer Misuse Act

Only available on StudyMode
  • Download(s) : 165
  • Published : May 6, 2013
Open Document
Text Preview
Computer Misuse Act – Jake Barrell
Computer misuse act came to force in 1990.
The Act Covers
This act covers hacking which is when someone illegally gains access to a computer with someone else's username or password which you do not have permission to use being unauthorised access, modify files or data without the consent of the creator, or commit illegal acts such as fraud while using the stolen username or password.

Examples of unauthorised access
An employee uses a company computer to send personal emails or someone gaining access to a banking computer and performing an unauthorized transfers.

People involved in the Act
The people involved in this act would be the police as they are informed Main principles of the Act
Gaining access to a computer with someone else's username or password which you do not have permission to use, modify files or data without the authorization of the creator, or commit illegal acts such as fraud while using the stolen username or password.

Consequences of the Act if broken (perhaps look for a real life example) An example of computer misuse is the when a group of hackers hacked Apple taking peoples usernames and passwords taking control of their accounts. This group is called Anonymous can be able to hack into any site or company to promote the companies flaws. But this can be fatal to taking people’s money if they use Apples costumer’s usernames and passwords to corrupt and take money out of their accounts causing money loss to Apple and their customers.

What consumers need to know - eg what are their rights

http://www.guardian.co.uk/technology/2008/jul/31/hacking.hitechcrime
tracking img