Disclaimer: This essay has been written by a law student and not by our expert law writers. View examples of our professional work here.

Any opinions, findings, conclusions, or recommendations expressed in this material are those of the authors and do not reflect the views of LawTeacher.net. You should not treat any information in this essay as being authoritative.

Computer Misuse Act of British Parliament

Info: 3753 words (15 pages) Essay
Published: 2nd Jul 2019

Reference this

Jurisdiction / Tag(s): UK Law

Summary

The computer misuse act 1990 (chapter.18) of UK Parliament has different sections. According to the computer misuse act, hacking into the computer system and releasing of computer viruses are serious criminal offences. For the offences the convicted person may sentenced to the jail or charged with the huge penalty amount. The goal of this research paper is to ensure that the computer professionals and computer users should take note of the seriousness of the offence and to the greater degree of established practice in the treatment of purpose who promote, execute these standard measures.

Under The Computer Misuse Act 1990

There are four main sections are placed they are, computer misuse offence, jurisdiction, miscellaneous and general rules. The sections of the act are detailed briefly in an upcoming research topic. The upcoming topics detail the advantages and disadvantages of the act, and the investigation and procedures to produce the collected evidence to the court of law. This also discuss on the difficulties faced by the digital forensic investigators who were examining the acquired machines under criminal activity. The paper also gives the view on the unfortunate victims of the law who are deliberately caught by the law firms.

1. Introduction

The computer misuse act of British parliament was established in august 1990.led in part because of the decision in Robert Schifreen and Stephen Gold’s conviction. They were convicted due to unauthorised access to the British telecommunication network and gained the password of a prestel engineer. The opponents of the act reported that it was poorly thought out. The intent, they said, was repeatedly difficult to prove, and that the act inadequately released “Rodeo” crackers such as Stephen and Robert.[3]

The act is still the template and inspired by many other countries like the Republic of Ireland and Canada which has made amendment in their own acts on data security. The evolution of computer misuse act has made the actual platform for the computer security. The computer misuse act got the Royal assent by the Queen’s most Excellent Majesty[3], by and met with the guidance and blessings of the spiritual and temporal lords and generals in the Parliament.

What Is Computer Misuse?

The term “ computer misuse “ is defined as if a person using his personal computer or laptop or any computer material to commit offence to gain unauthorised access to the restricted computers of the corporate companies or someone s computer deliberately making harm to their system[2] , and writing malicious programming code which crashes the another computer system. With use of internet surfing restricted sites like pornography sites especially child pornography sites using computers is comes under the computer offence and misuse. There are various kinds of computer misuse they are as follows.

Misuse of computers and communication comes in various forms:

  1. Hacking

Hacking is when someone from a network, Internet or modem access to passwords or other security measures used to ensure that the data on another computer. Hackers sometimes use tools and software piracy is often directed at certain sites on the Internet, for example.

  1. Reproduction and distribution of copyrighted software, music and cinema

These include the copying of music and videos with computers and distribute them over the Internet without the permission of the copyright owner. There is a widespread misuse of computers and the Internet that breaks copyright rules.

3. Misuse of data and transfer or unauthorized copying

Copying and illegal transfer of data is very fast and easy to use online computer and storage devices such as larger hard drives, USB sticks and DVDs. Personal data, corporate research and written work, such as novels and textbooks, to be copied without permission of the copyright owner.

4. Identity and financial abuse

This category includes misuse of card numbers stolen or fictitious credit to obtain goods or services over the Internet and computer use in financial fraud. It can be very complex thinking disappointments just use as counterfeit currency printing with colour printers.

5. E-mail and chat-room abuse

Internet services such as chat rooms and e-mail have been subjected to many known cases of identity theft and fraud, where people who are online, pretend to have a different identity. Chat rooms were used to spread rumors about public figures too. A development area of abuse of Internet e-mail is spam, where millions of e-mails are sent to the advertising of legal and illegal.

6. Pornography

Many of indecent material and pornography on the Internet and can be stored in electronic form.There have been several cases of material, as an illegal or unauthorized acts shows that stored on a computer monitor prosecution for possession of such material.

7. Computer virus

Viruses are relatively simple programs written by humans and to cause nuisance or damage to computers or their files.

  1. Sections Of The Computer Misuse Act 1990 (Ch 18).

The computer misuse act has many parts of the sections; the main and basic sections are divided into computer misuse offence, jurisdiction, miscellaneous and general.

The three basic Sections under computer misuse offence are:

SECTION1. Unauthorised access to computer material

(1) A person is guilty of a crime if —

(a) he makes a computer with a function with intent to access any programs or data on a computer to meet safety;

(b) the access he seeks is not allowed, and

(c) he knows when to carry out, he uses the computer to function, that is the case.

(2) The intention to require a person to commit an offense under this section must be directed not against –

(a) a particular program or data;

(b) a program or data from a particular species or

(c) a program or data contained in a particular computer.

(3) A person is guilty of a crime in this section on summary conviction is liable to imprisonment for a term not exceeding six months or a fine not exceeding level 5 on the standard, or both.

SECTION2. Unauthorised access with the intent to commit or facilitate the commission of other crimes

(1) A person is guilty of a misdemeanor in this section if he commits an offense under § 1 (above the unauthorized access offense) with the intention —

(a) to commit a criminal offense to which this section applies, or

(b) the commission of such offense (whether by himself or by another person) and the offense he intended to commit or facilitate is referred to hereafter in this section that the other offenses.

(2) This section applies to criminal offenses —

(a), for which the sentence is fixed by law, or

(b) for which a person twenty-one years or more (not convicted) If sentenced to imprisonment for a term of five years (or, in England and Wales could be sentenced, but restrictions imposed by Article 33 of [43 C. 1980 .] Magistrates’ Courts Act 1980.

(3) It is for the purposes of this article, even if the new offense was committed on the occasion as the offense of unauthorized access or any other occasion irrelevant.

(4) A person may be guilty of a crime, in this section even if the facts are such that the commission of the offense also is impossible.

(5) A person guilty of a crime is liable in this section

(a) on summary conviction to imprisonment not exceeding six months or a fine not exceeding the statutory maximum, or both, and

(b) conviction on indictment to imprisonment not exceeding five years or a fine or both.

SECTION3. Unauthorised modification of computer material

(1) A person is guilty of a crime if —

(a) is any action that has an unauthorized modification of the contents of any computer, causes and

(b) if he has the requisite intent and the fact he know.

(2) For the purposes of paragraph (1) (b) above the requisite intent is an intent to alter the substance from any computer and thereby cause to prevent.

  • (a)Working with a computer;
  • (b) prevent or hinder access to any program or data on a computer or
  • (c) impact on the operation of such a program or the reliability of these data.

(3) The intention should not be directed at —

  • (a) specific computer;
  • (b) any programs or data or programs or data for a particular type or
  • (c) A specific change or a change in a particular genre.

(4) For the purposes of paragraph (1) (b) the requisite knowledge is knowledge that any changes he wants to cause is not allowed.

(5) It is immaterial for the purposes of this section, if unauthorized modification or any intended effect of this one mentioned in paragraph (2) is or ought to be permanent or temporary.

(6) For the purposes of the [1971 c. 48th] Criminal Damage Act 1971 a modification of the contents of a computer should not be regarded as affecting any computer or computer storage medium unless its effect on the compromised computer or computer storage medium of their physical condition.

(7) A person guilty of a crime is liable in this section

(a) on summary conviction to imprisonment not exceeding six months or a fine not exceeding the statutory maximum, or both, and

(b) conviction on indictment to imprisonment not exceeding five years or a fine or both.

3. IN 2006 THE ACT WAS AMENDED BY SECTIONS 35-38 OF THE POLICE AND JUSTICE ACT 2006.

Section 1 CMA – Unauthorised Access As amended by section 35 Police and Justice Act 2006 and Schedule 15 of the Serious Crime Act 2007. (Archbold 23-87)

Seriously, in accordance with § 35 of the Police and Justice Act 2006 and Schedule 15 of the Crimes Act 2007e (Archbold 23-87) last [6]

A person is guilty of a crime shall be in accordance with § 1 of the CMA punishment after the short version in England and Wales to a term of imprisonment not exceeding 12 months or a fine of not more than statutory maximum, or both. On conviction on indictment to imprisonment not exceeding two years or with fine or both.

The intention is not governed by § 1 of the CMA to:

  • A particular program or data;
  • A program or data from a particular species or
  • A program or data on a specific computer

The words “all computers” in section 1 (1) (a) of the CMA does not limit the offense to use the situation in which the perpetrator a computer for unauthorized access to certain others. The problem is that if the person causes a computer with the intent to make unauthorized access to any program or date of completion on the same machine function is safe – Attorney-General

The crime of unauthorized access requires proof of mens rea elements of both:

The person must know that access has been provided and approved

They must be saved for information about a computer programmer of data in a computer – Article 1 (page 2) for the CMA.

It must have the knowledge of the author, is that access is unauthorized, mere negligence is not enough. This covers not only hackers, but also for employees, more than on their authority and access will be officially rejected certain parts of the system.

In the case of R v Bow Street Magistrates Court and Allison (AP) Ex parte Government of the United States of America (Allison) [2002] 2 AC 216, where the House of Lords, whether an employee could get commitan pressing an “unauthorized access “is recorded on a computer contrary to section 1 of the CMA, that the employee was clearly withinthe provisions of Section 1 of the CMA, as she has intentionally caused a computer to access data they knew that she was not authorized to access . The men made it clear that the employee would be guilty of an offense if the employer has clearly defined the limits of authority of workers with access to programs or data.

In the earlier case of DPP v Bignell [1998] 1 Cr App R 8, two policemen, the license information from the Police National Computer (PNC) with the sole objective of the policy, an operator applied for the police computer to obtain information obtained from the PNC, for without the knowledge of the operator, was for personal use. The Divisional Court concluded that the two agents did not commit an offense under § 1 protect unauthorized access. The House of Lords in the decision not to Bignell Allison, as a rule, but said that the conclusion of the Divisional Court in the earlier case was probably correct. The house of the Lord, adding that “it was a vision made possible the role of agents Bignell was simply another request for information to the computer. The computer operator is not exceeded its jurisdiction. The authority allows him to access the data computerfor to applications that respond to him to keep in the right form of the police. not the offense under § 1 of the CMA required.

Solicitors dealing with cases where employees CMA theemployee carefully evaluate information on contract work and to determine which (or in the office for advice exampleoral practices, among other things) if the employer had clearly defined the limits of responsibility of the employee. These cases usually depend on whether the evidence is strong enough that the conduct was unauthorized. These should be evaluated case by case application of the Code of Crown Prosecutors.

Prosecutors that Article 55 of the Data Protection Act of 1998, which is punishable by a fine, in some cases, the renewal of a levy breach of Article 1 of the CMA.

Article 35 of the Police and Justice Act of 2006 increased the penalties for violation of Article 1 of the CMA on summary conviction to a maximum of 12 months in prison and / or a fine, and d ‘a load of up to 2 years imprisonment and / or a fine. All violations of the CMA are in any way and have no time limit. The increased penalty applies only to violations under § 1 of § 35 of the Police Act and the 2006 demands of justice, comes into force. [Note: Article 38 (2) Police andJustice Act 2006].

Section 2 CMA – unauthorized access with the intent

As amended by section 37 Police and Justice Act 2006 and Schedule 15 of the Serious Crime Act 2007. (Archbold 23-87)

A person can be convicted of an offense under § 2 even if the commission of other crimes is impossible (Article 2 (4) CMA). A person who is found not guilty of some of the 2 or 3 CMA offenses by a jury may consist of an offense under § 1 of the CMA will be sentenced (§ 12, CMA).

Section 2 (5) provides that any person who is liable under § 2 guilty of an offense:

Overview of the conviction, to imprisonment not exceeding six months or a fine not exceeding the statutory maximum, or both, and

on conviction on indictment to imprisonment not exceeding five years or a fine or both.

Section 3 CMA – unlawful act with intent to harm

As amended by section 36 Police and Justice Act 2006 and Schedule 15 of the Serious Crime Act 2007. (Archbold 23-87)

Amended by Article 36 of the Police and Justice Act 2006 and Schedule 15 of the Crimes Act 2007 seriously. (Archbold 23-89)

Any action taken by the alleged violation of Article 3 of the CMA must have occurred under § 36 of the Police and Justice Act 2006, prove enters [into force NOTE: § 38 (3) Police and justice Act 2006].

Section 3 CMA should, in cases where Distributed Denial of Service (DDoS – denial of service targeted at specific sites. The attacker floods the web server with messages endlessly repeated. It is the system and prevents access to legitimate users ), (1) The term “act” includes a series of actions, (2) there is no need for changes have occurred, and (3) impairment may be temporary. In the case of R v. Mail-bombing Lennon [2006] EWCH 1201 May 11, 2006, the Divisional Court stated that although the owner of a computer can receive e-mails typically undertakes to receive e-mails, such s not consent does not extend to e-mails were not sent to contact the owners, but to interrupt the operation of the system.

A person who is guilty of a crime fulfilled according to § 3 on summary subject to imprisonment not exceeding 12 months or a fine not exceeding the statutory maximum, or both, or conviction on indictment to imprisonment for not more than ten years or a fine or both.

§ 127 Communications Act 2003, a summary offense is punishable by a maximum of six months imprisonment as and when Article 3 of the CMA is not appropriate.

Section 3A CMA – manufacturing, supplying or obtaining articles

Inserted by § 37 of the Police and Justice Act 2006 (Archbold 23-89a)

Section 3A CMA includes the design, delivery or receipt of articles for use in crime, in violation of § § 1 or 3 CMA. Section 3A with those who produce, for example, malicious scripts or software designed to enable you to change the TV set-top boxes. It is not to criminalize the possession per se, if the intention to use, you can order them to commit other violations of section 1 or 3 CMA will be established. Any action to prove the alleged violation of Section 3A CMA has come under § 37 of the Police and Justice Act has occurred 2006, in force

A person who is guilty of a crime in this section is responsible for summary conviction in England and Wales, to imprisonment not exceeding 12 months or a fine or both, on conviction on indictment to imprisonment not exceeding two years or fine or both.

Prosecutors should be aware that there is a legitimate security industry that “creates articles” (a program or data held in electronic form) to test and / or test equipment and software. Some items are, therefore, a [dual-use Note: The dual-use products are those that can be used for lawful or unlawful purpose.] And prosecutors must ensure that the suspect has a criminal intent.

If the item in the course or part of a fraud prosecutors should then check if their cause, whether a violation of Article 7 and / or Article 6 of the Fraud Act 2006. A violation of the production or supply of articles for use in their fraud contrary to § 7 is likely to have a maximum penalty of 10 years imprisonment and a number of articles for use in fraud, breach of Article 6 is threatened with imprisonment for not more than 5 years. Each case must be examined on its own facts.Please note our forecasts for Fraud Act 2006

  1. Difficulties Faced By The Forensic Investigators.

Computer forensics has emerged to be one of the fastest growing areas in recent years due to the increase in computer crime. These crimes are in fact criminal activities through computer systems and the Internet are being committed.

The widespread use of personal computers in businesses and homes have greatly facilitated the fraud and computer crime. There are growing challenges posed by forensic investigators computer experts confronted when dealing with computers for legal purposes.

Let some of the major challenges that are facing these experts[8]:

  • It is indeed a difficult but important task for analysts to retrieve data from the computer, while preserving the integrity of evidence. Expert requires knowledge, expertise and experience to recover data from hard disks, the content was completely removed.
  • It is the task of these specialists is to securely store and manage all data retrieved
  • The staff must be well with all kinds of skills to be ready for them to find relevant information in a large amount of data. You need large amounts of e-mails and instant messaging, and evaluate its contents, followed by search for evidence
      • It is indeed a difficult task for these professionals to provide information and evidence to the court. Since criminals are now changing so smart and damage the evidence, making it inadmissible in court

The work of forensic computer experts will be increasingly difficult as technology evolves. On the other hand, criminals always adapt to change and keep up to date with the latest law enforcement. You are so brilliant and they are always one step ahead of all the protections that we entreprenons.re use computers for legal purposes.

Let’s see some of the major challenges facing these particular experts:

      • It is indeed restore an important but difficult task for the analyst to data from computers while maintaining evidence integrity. The expert requires knowledge, expertise and experience to retrieve data from hard drives, whose contents have been completely deleted.
    • It is the task of these specialists is to securely store and process all the recovered data
    • The staff must be well with all types of skills to prepare for them to find the important information in a large amount of data. They have great quantities of e-mails and instant messaging, and evaluate its content length looking for evidence
    • It is indeed a difficult task for these professionals to present the information and evidence to the court. This is because the criminals are now so smart, modify and damage the evidence, so that it inadmissible in court

the task of computer forensics experts is becoming increasingly difficult as technology evolves. On the other hand, criminals always adapt to the changes and keep updated with the latest law enforcement authorities. They are so brilliant and they are always one step ahead of any protection that we undertake.

Conclusion

In conclusion the CMA 1990 of UK parliament is the baseline for computer act which helps to restrict the computer offences countrywide not only in England, it also inspired by countries like Canada, Republic of Northern Ireland.

Cite This Work

To export a reference to this article please select a referencing stye below:

Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.

Related Services

View all

Related Content

Jurisdictions / Tags

Content relating to: "UK Law"

UK law covers the laws and legislation of England, Wales, Northern Ireland and Scotland. Essays, case summaries, problem questions and dissertations here are relevant to law students from the United Kingdom and Great Britain, as well as students wishing to learn more about the UK legal system from overseas.

Related Articles

DMCA / Removal Request

If you are the original writer of this essay and no longer wish to have your work published on LawTeacher.net then please: