Preview

Computer Misuse Act

Satisfactory Essays
Open Document
Open Document
277 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Misuse Act
Computer Misuse Act – Jake Barrell
Computer misuse act came to force in 1990.
The Act Covers
This act covers hacking which is when someone illegally gains access to a computer with someone else's username or password which you do not have permission to use being unauthorised access, modify files or data without the consent of the creator, or commit illegal acts such as fraud while using the stolen username or password.

Examples of unauthorised access
An employee uses a company computer to send personal emails or someone gaining access to a banking computer and performing an unauthorized transfers.

People involved in the Act
The people involved in this act would be the police as they are informed
Main principles of the Act
Gaining access to a computer with someone else's username or password which you do not have permission to use, modify files or data without the authorization of the creator, or commit illegal acts such as fraud while using the stolen username or password.

Consequences of the Act if broken (perhaps look for a real life example)
An example of computer misuse is the when a group of hackers hacked Apple taking peoples usernames and passwords taking control of their accounts. This group is called Anonymous can be able to hack into any site or company to promote the companies flaws. But this can be fatal to taking people’s money if they use Apples costumer’s usernames and passwords to corrupt and take money out of their accounts causing money loss to Apple and their customers.

What consumers need to know - eg what are their rights

You May Also Find These Documents Helpful

  • Good Essays

    Stealing or hacking of personal devices, malware or virus, eavesdropping, sniffing through endpoints, web Session Hijacking…

    • 1000 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Answer: Computer Hacking it is the act of bypassing ones account or database and hacking involves stealing of identity and use it in his/her own interest.…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    * Computer Misuse Act 1990 - identifies a range of offences relating to unauthorised access to, or unauthorised modification of, computer records. This act may apply where an unauthorised third party accesses information being transferred. Enforcement is difficult, prosecutions uncommon but may be relevant where systems are used other than by authorised staff for approved purposes.…

    • 1008 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Week 5 Quiz

    • 531 Words
    • 3 Pages

    Spamming coworkers Accessing prohibited websites Purposely circumventing security policies Sending files with sensitive data outside the organization.…

    • 531 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    1. A user made unauthorized use of network resources by attacking network entities. You are potentially sabotaged by an employee or employer.…

    • 564 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The Computer Misuse Act 1990 it is a law that does not allow certain activities when using computers, this include: hacking into other people's systems, misusing software or helping a person to gain access to protected files on someone's else's computer.…

    • 605 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Computer Memory Hacking

    • 820 Words
    • 2 Pages

    unauthorized access) has shown that the security of the computer system can be penetrated. This…

    • 820 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Today, there are many laws that address different acts of computer crimes. It is very important to understand what laws are applicable in a given situation. The law I have selected is the “no electronic theft act of 1997.” The no electronic theft act is also known as the net act, it came into law under presidents Clinton in 1997. This was used to protect against copyright violations on the Internet. The law makes it a federal crime to reproduce, distribute, or share copies of electronic copyrighted work. As such it is a crime to distribute copyrighted material even if it is done without financial gain. The law also requires that the commission of the crime be willful and that the total value of the copyrighted material exceeds $1000. There also is a five-year statute of limitations, meaning that the crime must be charged and prosecuted within five years of his commission. The net act also makes it a federal crime to record live performances without permission and further distribute the recordings.…

    • 1030 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Provide three specific examples of how the Internet has aided criminal activity. One of the examples could be considered as identity theft. Identity theft is the use of one person 's personal information by another to commit fraud or other crimes. The most common forms of identity theft occur when someone obtains another person 's social security number, driver 's license number, date of birth, and the like and uses it to open a fraudulent bank, credit card, cellular telephone, or other account, or to obtain false…

    • 1217 Words
    • 5 Pages
    Better Essays
  • Good Essays

    There are several advances in information technology that resulted in new ethical issues necessitating the creation of certain acts. The two acts which will be discussed in this paper are the Children’s Internet Protection Act of 2000, and the Family Educational Rights and Privacy Act of 1974.…

    • 666 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unauthorized access

    • 279 Words
    • 2 Pages

    Unauthorized access is defined as gaining access to a computer, network, file or other resource without permission. This act can be committed by an inside or outside source. Unauthorized access and use is considered a form of cybercrime. Nicola Baird wrote an article, Cybercrime: 'I felt I was reading my own obituary', pertaining to email hacking. Baird calls it a “smash-and-grab raid” as the hackers merely want to access the data, valuable information or programs in the computer. It was said that cybercrime has caused Britain $27 billion. The article contains an incident where Nicola, the writer, was targeted by a hacker. She discovered that over 2500 of her contacts we emailed asking for financial aid. To protect against online theft, fraud and other unauthorized access and use, ethical decision has to be kept in mind. Not giving out personal information such as an individual's social security number or their mother's maiden name; never giving out sensitive information via text message or email because it can be easily forwarded or hacked into; shredding information containing credit card numbers and sensitive data would eliminate any possibility that a person going through the trash finds that information; keeping an eye on bills and credit report to detect identity theft early. Hackers try using the default passwords such as no password, root, or admin. Changing passwords often that include letters numbers and other characters to make it a stronger password.Installing a software firewall will help protect from unauthorized incoming and outgoing information. Running system scan to check for vulnerabilities to threats or issues that a person's computer might have that will allow unauthorized access to their computer by users.…

    • 279 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cybercrime Law

    • 815 Words
    • 4 Pages

    Cyber Theft: It means using a computer to steal .This includes activities related to breaking and entering DNS cache poisoning, embezzlement and unlawful appropriation, espionage, identity theft fraud, malicious hacking, plagiarism and piracy .Examples include advertising or soliciting prostitution through the internet.It is against the law to access prostitution through the internet because the process of accessing the Internet crosses state and sometimes national borders. Drug sales, both illegal and prescribed, through the internet are illegal except as a customer through a state licensed pharmacy. Computer based fraud is different from theft because the victim voluntarily gives the money or property to the criminals.…

    • 815 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Imagine yourself going into the bank to get money out of your account for your rent or other important bill, and the account is dry and you just got paid the day before..or going to pay a bill with your credit card and card after card is maxed out then you find out that someone has stolen all your information and used all of your resources to live and pay bills. If this happened to me my heart would be beating so fast in panic id probably pass out considering I have so many kids to provide for. Well it happens everyday to people everywhere all over the world. One of the major problems causing this is called hacking which is defined by the company who created the website the free dictonary dot com, Houghton mifflin company, as to gain access to a computer file or network illegally or without authorization. It is a big problem not just here but in other countries as well.One incident id like to mention is the playstation store being hacked into…

    • 521 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Computer Misuse Act

    • 1651 Words
    • 7 Pages

    Pragmatic failure is the inability to understand what is meant by what is said. It refers to the errors in our speech communication because of failing to accomplish a perfect communicative effect. In 1983, a British linguist Thomas came up with the pragmatic failure. In his opinion, pragmatic failure is not simply the wrong use of language, namely, grammatical mistakes, occurred in common usage, using words or making sentences but it refers to inappropriate speaking, improper manner of speaking and expressions not conforming to the custom, which results in not being able to achieve the expected effect. This is a profound analysis of the essence of pragmatic failure. Although the speaker uses sentences which are grammatically correct, the unconsciously violate the norms of interpersonal relationships and social norms in speech, or take no notice of time, hearer and context.…

    • 1651 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    Cyber Crime Act

    • 830 Words
    • 4 Pages

    The Constitution of Jamaica is an important tool for the protection and promotion of human rights.…

    • 830 Words
    • 4 Pages
    Powerful Essays