The Computer Misuse Act was enacted in the wake of the high
profile hack of a mailbox belonging to The Duke of Edinburgh by Robert
Schifreen and Stephen Gold. When they gained access to the login details of
50,000 Prestel customers they were unable to be properly prosecuted as no
relevant legislation existed. Prior to 1990, there was no legislation in place
to tackle the problems caused by hacking. Although everyone knew that it was
wrong and should be against the law, there was nothing that anyone could do
about it. The act was designed to protect computer users against willful attacks
and theft of information.
Offences under the act include:
- Unauthorised access to computer material
- Unauthorised access with intent to commit or facilitate commission of further offences
- Unauthorised modification of computer material
The act makes it an offence to access or even attempt to
access a computer system without permission meaning if a hacker tries to get
into a system but is unsuccessful they can be prosecuted using this law. The
penalties of breaking the Computer Misuse Act range from fines to imprisonment.
Example of CMA cases
Adam Penny September 2016 - Accessed a gold bullion firm’s website to obtain names, addresses and tracking numbers of customers to enable associates to intercept the gold deliveries.
David Buchanan August 2016 - A 17 year-old hacked into his school intranet and developed scripts to help harvest Mums-net usernames and passwords.
Those are examples of people breaking the Computer Misuse Act.
Example of CMA cases
Adam Penny September 2016 - Accessed a gold bullion firm’s website to obtain names, addresses and tracking numbers of customers to enable associates to intercept the gold deliveries.
David Buchanan August 2016 - A 17 year-old hacked into his school intranet and developed scripts to help harvest Mums-net usernames and passwords.
Those are examples of people breaking the Computer Misuse Act.
Bibliography:
Sqa.org.uk. (2016). What is Computer Misuse?. [online]
Available at: http://www.sqa.org.uk/e-learning/ITLaw01CD/page_03.htm
[Accessed 10 Oct. 2016]
Sqa.org.uk. (2016). Computer Misuse Act. [online] Available
at: http://www.sqa.org.uk/e-learning/ProfIssues02CD/page_07.htm
[Accessed 10 Oct. 2016]
Teach-ict.com. (2016). Teach-ICT AS Level ICT OCR exam board
- data protection act. [online] Available at: http://www.teach-ict.com/as_a2_ict_new/ocr/AS_G061/317_role_impact_ict/computer_misuse_act/miniweb/
[Accessed 10 Oct. 2016]
Google.co.uk. (2016). computer misuse act 1990 – Image.
[online] Available at: https://www.google.co.uk/search?q=computer+misuse+act+1990&espv=2&biw=1046&bih=946&source=lnms&tbm=isch&sa=X&ved=0ahUKEwib6KCFldHPAhUrK8AKHaSSCTUQ_AUIBigB&dpr=1#imgrc=U6Zd8nVx1BuuPM%3A
[Accessed 10 Oct. 2016]
Computerevidence.co.uk. (2016). Computer Evidence - Computer Misuse Act 1990 cases. [online] Available at: http://www.computerevidence.co.uk/Cases/CMA.htm [Accessed 11 Oct. 2016].
Computerevidence.co.uk. (2016). Computer Evidence - Computer Misuse Act 1990 cases. [online] Available at: http://www.computerevidence.co.uk/Cases/CMA.htm [Accessed 11 Oct. 2016].
This is a good post Logan but a bit on the short side. some up to date examples of when the law was broken would help
ReplyDelete