To Analyze Legal, Ethical and Operational issues in relation to the use of business information.
The two companies that I have used for this task is
Legal issues are the laws raised by different companies so that users or customers will be aware of them.
The Data Protection Act 1998
The Data Protection Act 1998 was put in place to protect information held about people from being misused. Information being stored by businesses should be obtained lawfully and fairly, used for stated purpose and relevant to the intended use. It should also be up to date and kept no longer than stated time. Example:
As per the Data Protection Act 1998, Facebook still couldn't control hackers from getting into people's accounts and stealing their details and sometimes even their photos. Obviously this shows Facebook broke the Data Protection Act 1998 law as they didn't keep peoples personal information safe. Although hackers are difficult to control it still stands to question whether or not Facebook did all the security tests they could before starting up. http://www.dailymail.co.uk/news/article-2927847/Facebook-Instagram-worldwide-hack.html The Computer Misuse Act 1990
The Computer Misuse Act 1990 was a law set up in the UK to stops certain activities from happening on a computer, such as hacking, misuse of software or helping another to gain access to protected files and accounts. Examples of Computer Misuse Act 1990
Facebook broke this when they found they had had some of their users accounts hacked by clicking on a link on the Internet. To this the hackers also told other people about it on a hacking website where it was found that 1.32 million accounts were at risk of being hacked without the need of a password or e-mail. Again in one sense this is not exactly Facebook's fault.
R v Piotr Smirnow and Patryk Surmacki
Manchester Crown Court 18 December 2013
Computer Misuse Act 1990. Blackmail
Backmailers threatened a £30M online casino with DDoS denial of service attacks. The Register
Guilty plea. Both sentenced to five years and four months in prison.
R v Stephen Burrell
Northampton Magistrates Court 28 November 2013
Computer Misuse Act 1990, s 2 Unauthorised access with intent, s 3 : Unauthorised modification Burrell unlawfully accessed the accounts of 3,872 players of online game Runescape with intent to steal gaming resources and actually modified 105 player accounts Daily Mail
Guilty plea. Sentenced on 28 November 2013 to 12 month community order with supervision and 150 hours of unpaid work, Costs of £100 and surcharge of £60
R v Lewys Stephen Martin
Maidstone Crown Court 16 May 2013 T20130081
Computer Misuse Act 1990, s 1 : Unauthorised accesss, s 3 : Unauthorised modification; s 3A : Making, supplying or obtaining articles for use in offence under section 1 or 3 NullCrew hacktivist Lewys Martin aka sl1nk launched Denial of Service (DOS) attacks on the websites of Kent Police (site temporarily unavailable to the public) and universities of Oxford and Cambridge; both universities estimated that around two man weeks were spent dealing with the attacks. BBC News
Guilty plea to five counts of Unauthorised modification, two counts of Unauthorised access and two counts of Making, supplying or obtaining articles. Sentenced to two years imprisonment.
R v Martin
Court of Appeal (Criminal Division) 31st July 2013
Appeal on sentencing. Planning of the attacks was sophisticated and they were intended to cause harm and did so. The offences found to be of the highest level of culpability. Custodial sentences measured in years rather than months should now be expected. Sentence of two years' imprisonment was "amply justified". Judgement
 EWCA Crim 1420
Please join StudyMode to read the full document