Computer Misuse Act

Only available on StudyMode
  • Download(s) : 330
  • Published : January 30, 2011
Open Document
Text Preview
Computer Misuse Act 1990
The computer misuse act of 1990 is a law in the UK that makes certain activities illegal, such as hacking into other people’s systems, misusing software, or helping a person gain access to protected files of someone else’s computer. The main goal of the Act was to discourage this kind of behaviour in the future. The act identifies three specific offences: 1.Unauthorised access to computer material.

2.Unauthorised access to a computer system with intent to break, change or copy files. 3.Unauthorised modification of computer material.
The act targets people who misuse computers and communication systems, this could come in several forms: •Hacking
-When an unauthorised person uses a network, internet or modem connection to gain access past security password or other security to see data stored in another computer. •Data misuse & unauthorised transfer or copying

-Copying and illegally transferring data using online computers and large storage devices (hard disks, memory sticks, DVDs) personal data, company research and written work ( novels, textbooks) •Copying and distributing copyrighted software, music and film -When someone copies music and movies with computer equipment and distributing it on the internet without the copyright holder’s permission. •Email and chat rooms

-when someone uses fake identification and pretends to be someone else to try and lure someone else into giving them their information. The computer misuse act protects the owners of the copyright and covers the copying of written, musical or film works using computers. The copyright law has been used to crack down on file sharing websites or indivisuals who store and illegally distribute copyrighted material, eg music. The computer misuse act is highly useful in ensuring that peoples work and personal information is kept safe. It prevents viruses, copyright infringements, hacking, using computer data for blackmail or fraud, and illegal deleting ot...
tracking img