SlideShare une entreprise Scribd logo
1  sur  15
COMPUTER MISUSE AND CRIMINAL
LAW
SOHAIL DANISH 12024119-120
DEFINITION
The Computer Misuse Act 1990 (CMA) is an act of the UK Parliament
passed in 1990. CMA is designed to frame legislation and controls over
computer crime and Internet fraud.The legislation was created to:
 Criminalize unauthorized access to computer systems.
 Deter serious criminals from using a computer in the commission of a
criminal offence or seek to hinder or impair access to data stored in a
computer
http://searchsecurity.techtarget.co.uk/sDefinition/0,,sid180_gci1293174,00.html
COMPUTER MISUSE ACT 1990
 Introduced 3 criminal offences:
 Accessing computer material without permission, eg looking at someone
else's files.
 Accessing computer material without permission with intent to commit
further criminal offences, eg hacking into the bank's computer and wanting
to increase the amount in your account.
 Altering computer data without permission, eg writing a virus to destroy
someone else's data, or actually changing the money in an account.
http://www.bbc.co.uk/schools/gcsebitesize/ict/legal/1dataandcomputermisuserev2.shtml
PUNISHMENT
 The offences are punishable as follows:
 Offence 1. Up to 6 months' prison and up to £5,000 in fines.
 Offences 2 and 3. Up to 5 years in prison and any size of fine (there is no limit).
http://impact.freethcartwright.com/2006/08/computer_misuse.html
TYPES OF COMPUTER MISUSE
 Hacking
 Data misuse and unauthorised transfer or copying
 Copying and distributing copyrighted software, music and film
 Email and chat room abuses
 Pornography
 Extreme material
 Identity and financial abuses
 Fraud and theft
 Viruses
http://www.bbc.co.uk/schools/gcsebitesize/ict/legal/1dataandcomputermisuserev1.shtml
HACKING
 Hacking is where an unauthorised person uses a network, Internet or modem
connection to gain access past security passwords or other security to see data
stored on another computer. Hackers sometimes use software hacking tools and
often target, for example, particular sites on the Internet.
DATA MISUSE AND UNAUTHORISED
TRANSFER OR COPYING
Copying and illegal transfer of data is very quick and easy
using online computers and large storage devices such as
hard disks, memory sticks and DVDs. Personal data,
company research and written work, such as novels and
textbooks, cannot be copied without the copyright holder's
permission.
COPYING AND DISTRIBUTING COPYRIGHTED
SOFTWARE, MUSIC AND FILM
 This includes copying music and movies with computer equipment and distributing
it on the Internet without the copyright holder's permission.This is a widespread
misuse of both computers and the Internet that breaks copyright regulations.
EMAIL AND CHAT ROOM ABUSES
 Internet services such as chat rooms and email have been the subject of
many well-publicised cases of impersonation and deception where
people who are online pretend to have a different identity. Chat rooms
have been used to spread rumours about well known personalities.A
growing area of abuse of the Internet is email spam, where millions of
emails are sent to advertise both legal and illegal products and services.
PORNOGRAPHY
 A lot of indecent material and pornography is available through the
Internet and can be stored in electronic form.There have been several
cases of material, which is classified as illegal, or which shows illegal acts,
being found stored on computers followed by prosecutions for
possession of the material.
IDENTITY AND FINANCIAL ABUSES
 This topic includes misuse of stolen or fictional credit card numbers to
obtain goods or services on the Internet, and use of computers in financial
frauds.These can range from complex well thought out deceptions to
simple uses such as printing counterfeit money with colour printers.
VIRUSES
 Viruses are relatively simple programs written by people and designed to cause
nuisance or damage to computers or their files.
PREVENTING MISUSE
 The Data Protection Act
 This was introduced to regulate personal data.This helps to provide protection
against the abuse of personal information. Find out more about the Data
Protection Act.
 Copyright law
 This provides protection to the owners of the copyright and covers the copying of
written, musical, or film works using computers. FAST is the industry body which is
against software theft.You can find out more about it in the Copyright section.
 There have been cases where laws such as Copyright have been used to crack
down on file sharing websites or individuals who store and illegally distribute
copyrighted material, eg music.There is a massive problem with many people
around the world obtaining copyrighted material illegally.
Close down chat rooms
Some chat rooms have been closed down due to abuses, especially where
children are vulnerable. Some have moderators who help to prevent abuses.
Advice about sensible use is important; especially to never give personal
contact details or arrange meetings without extreme caution.
Reduce email spamming
This may be reduced by:
never replying to anonymous emails
setting filters on email accounts
reporting spammers to ISPs, who are beginning to get together to blacklist email
abusers
governments passing laws to punish persistent spammers with heavy fines
Regular backups and security
Just making something illegal or setting up regulations does not stop it
happening. Responsible computer users need to take reasonable steps to keep
their data safe. This includes regular backups and sufficient security with
passwords.
!!THE END!!
Any questions?

Contenu connexe

Tendances

Hacking vs cracking
Hacking vs crackingHacking vs cracking
Hacking vs crackingNaren Naren
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Ambar Deo
 
intellectual property rights
 intellectual property rights intellectual property rights
intellectual property rightsHamza Cheema
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethicsiallen
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
Computer Vandalism
Computer VandalismComputer Vandalism
Computer VandalismAditya Singh
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An OverviewTalwant Singh
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitysanjana mun
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimesatuljaybhaye
 
Computer security privacy and ethics
Computer security privacy and ethicsComputer security privacy and ethics
Computer security privacy and ethicsgeneveve_
 
10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet Fraud10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet FraudGoose & Gander
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Karnika Seth
 
Accountability And Auditing In Professional Practice
Accountability And Auditing In Professional PracticeAccountability And Auditing In Professional Practice
Accountability And Auditing In Professional PracticeSyed Hassan Ali
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 

Tendances (20)

Cyber law
Cyber lawCyber law
Cyber law
 
Hacking vs cracking
Hacking vs crackingHacking vs cracking
Hacking vs cracking
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 
intellectual property rights
 intellectual property rights intellectual property rights
intellectual property rights
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
cyber crime
cyber crimecyber crime
cyber crime
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Computer Vandalism
Computer VandalismComputer Vandalism
Computer Vandalism
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
 
Computer security privacy and ethics
Computer security privacy and ethicsComputer security privacy and ethics
Computer security privacy and ethics
 
10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet Fraud10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet Fraud
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000
 
Accountability And Auditing In Professional Practice
Accountability And Auditing In Professional PracticeAccountability And Auditing In Professional Practice
Accountability And Auditing In Professional Practice
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 

En vedette

Programa nossa sopa japomirim e itagibã-
Programa nossa sopa   japomirim e itagibã-Programa nossa sopa   japomirim e itagibã-
Programa nossa sopa japomirim e itagibã-Weslley Santos
 
Revista Edição Especial
Revista Edição EspecialRevista Edição Especial
Revista Edição EspecialNicolleFolheto
 
Cartaz sis computer
Cartaz sis computerCartaz sis computer
Cartaz sis computercpdakiles
 
úNica praça da rua do cano continua abandonada pelo poder público
úNica praça da rua do cano continua abandonada pelo poder públicoúNica praça da rua do cano continua abandonada pelo poder público
úNica praça da rua do cano continua abandonada pelo poder públicoRoberto Rabat Chame
 
certificadoPRO_PE_Jan_Peter Pungs
certificadoPRO_PE_Jan_Peter PungscertificadoPRO_PE_Jan_Peter Pungs
certificadoPRO_PE_Jan_Peter PungsJan Peter Pungs
 
Lista af1 - 4º bimestre - 9º ano - 2015(1)
Lista   af1 - 4º bimestre - 9º ano - 2015(1)Lista   af1 - 4º bimestre - 9º ano - 2015(1)
Lista af1 - 4º bimestre - 9º ano - 2015(1)proffelipemat
 
[Creategies] Descubra os estímulos certos para conduzir mais clientes ao seu ...
[Creategies] Descubra os estímulos certos para conduzir mais clientes ao seu ...[Creategies] Descubra os estímulos certos para conduzir mais clientes ao seu ...
[Creategies] Descubra os estímulos certos para conduzir mais clientes ao seu ...creategies
 
Comércio prevê desaceleração nas vendas para o Dia das Mães 2014
Comércio prevê desaceleração nas vendas para o Dia das Mães 2014Comércio prevê desaceleração nas vendas para o Dia das Mães 2014
Comércio prevê desaceleração nas vendas para o Dia das Mães 2014SPC Brasil
 
Bcci’s googly bowl in legal battle
Bcci’s googly bowl in legal battleBcci’s googly bowl in legal battle
Bcci’s googly bowl in legal battleCS (Dr)Rajeev Babel
 
Business Model Canvas
Business Model CanvasBusiness Model Canvas
Business Model CanvasThe Qube
 
Curando sua vida eft 06_dono de mim
Curando sua vida eft 06_dono de mimCurando sua vida eft 06_dono de mim
Curando sua vida eft 06_dono de mimmateus98
 
CARREIRA PERXEBRIÑA 2015
CARREIRA PERXEBRIÑA 2015CARREIRA PERXEBRIÑA 2015
CARREIRA PERXEBRIÑA 2015educ-arte
 

En vedette (20)

Agenda projeto marias
Agenda projeto mariasAgenda projeto marias
Agenda projeto marias
 
Programa nossa sopa japomirim e itagibã-
Programa nossa sopa   japomirim e itagibã-Programa nossa sopa   japomirim e itagibã-
Programa nossa sopa japomirim e itagibã-
 
Revista Edição Especial
Revista Edição EspecialRevista Edição Especial
Revista Edição Especial
 
Cartaz sis computer
Cartaz sis computerCartaz sis computer
Cartaz sis computer
 
úNica praça da rua do cano continua abandonada pelo poder público
úNica praça da rua do cano continua abandonada pelo poder públicoúNica praça da rua do cano continua abandonada pelo poder público
úNica praça da rua do cano continua abandonada pelo poder público
 
certificadoPRO_PE_Jan_Peter Pungs
certificadoPRO_PE_Jan_Peter PungscertificadoPRO_PE_Jan_Peter Pungs
certificadoPRO_PE_Jan_Peter Pungs
 
Lista af1 - 4º bimestre - 9º ano - 2015(1)
Lista   af1 - 4º bimestre - 9º ano - 2015(1)Lista   af1 - 4º bimestre - 9º ano - 2015(1)
Lista af1 - 4º bimestre - 9º ano - 2015(1)
 
Los barrios
Los barriosLos barrios
Los barrios
 
TEC65
TEC65TEC65
TEC65
 
CDCMP
CDCMPCDCMP
CDCMP
 
[Creategies] Descubra os estímulos certos para conduzir mais clientes ao seu ...
[Creategies] Descubra os estímulos certos para conduzir mais clientes ao seu ...[Creategies] Descubra os estímulos certos para conduzir mais clientes ao seu ...
[Creategies] Descubra os estímulos certos para conduzir mais clientes ao seu ...
 
resumo_4421
resumo_4421resumo_4421
resumo_4421
 
Comércio prevê desaceleração nas vendas para o Dia das Mães 2014
Comércio prevê desaceleração nas vendas para o Dia das Mães 2014Comércio prevê desaceleração nas vendas para o Dia das Mães 2014
Comércio prevê desaceleração nas vendas para o Dia das Mães 2014
 
História
HistóriaHistória
História
 
Q89
Q89Q89
Q89
 
Bcci’s googly bowl in legal battle
Bcci’s googly bowl in legal battleBcci’s googly bowl in legal battle
Bcci’s googly bowl in legal battle
 
Business Model Canvas
Business Model CanvasBusiness Model Canvas
Business Model Canvas
 
Curando sua vida eft 06_dono de mim
Curando sua vida eft 06_dono de mimCurando sua vida eft 06_dono de mim
Curando sua vida eft 06_dono de mim
 
CARREIRA PERXEBRIÑA 2015
CARREIRA PERXEBRIÑA 2015CARREIRA PERXEBRIÑA 2015
CARREIRA PERXEBRIÑA 2015
 
Debenture Trustees
Debenture TrusteesDebenture Trustees
Debenture Trustees
 

Similaire à Computer Miss-use and Criminal Law

It legislation
It legislationIt legislation
It legislationdoogstone
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT actDivesh Mewara
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptxSSPTRGCELL
 
Ethics and legislation in the it industry
Ethics and legislation in the it industryEthics and legislation in the it industry
Ethics and legislation in the it industryjamiehaworth1
 
Cyberspace
CyberspaceCyberspace
CyberspaceUtchi
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their preventionTejasvi Bhatia
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?FarjanaMitu3
 
English in written
English in writtenEnglish in written
English in writtenazhar manap
 
Business And The Law
Business And The LawBusiness And The Law
Business And The LawRobbieA
 

Similaire à Computer Miss-use and Criminal Law (20)

Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
It legislation
It legislationIt legislation
It legislation
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
 
Ethics and legislation in the it industry
Ethics and legislation in the it industryEthics and legislation in the it industry
Ethics and legislation in the it industry
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 
TAMUC LO 7
TAMUC LO 7TAMUC LO 7
TAMUC LO 7
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber Law .pdf
Cyber Law .pdfCyber Law .pdf
Cyber Law .pdf
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
English in written
English in writtenEnglish in written
English in written
 
Business And The Law
Business And The LawBusiness And The Law
Business And The Law
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 

Plus de sohaildanish

Virtual Personal Assistant
Virtual Personal AssistantVirtual Personal Assistant
Virtual Personal Assistantsohaildanish
 
Automated Vehicle (Google Car)
Automated Vehicle (Google Car)Automated Vehicle (Google Car)
Automated Vehicle (Google Car)sohaildanish
 
System protection in Operating System
System protection in Operating SystemSystem protection in Operating System
System protection in Operating Systemsohaildanish
 
Sorce of communication
Sorce of communicationSorce of communication
Sorce of communicationsohaildanish
 

Plus de sohaildanish (6)

Social Media
Social MediaSocial Media
Social Media
 
Virtual Personal Assistant
Virtual Personal AssistantVirtual Personal Assistant
Virtual Personal Assistant
 
Automated Vehicle (Google Car)
Automated Vehicle (Google Car)Automated Vehicle (Google Car)
Automated Vehicle (Google Car)
 
System protection in Operating System
System protection in Operating SystemSystem protection in Operating System
System protection in Operating System
 
Sorce of communication
Sorce of communicationSorce of communication
Sorce of communication
 
Cover letter
Cover letterCover letter
Cover letter
 

Dernier

𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...Neha Pandey
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceDelhi Call girls
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Delhi Call girls
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查ydyuyu
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...SUHANI PANDEY
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...SUHANI PANDEY
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdfMatthew Sinclair
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...SUHANI PANDEY
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLimonikaupta
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls DubaiEscorts Call Girls
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...tanu pandey
 

Dernier (20)

𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
 
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 

Computer Miss-use and Criminal Law

  • 1. COMPUTER MISUSE AND CRIMINAL LAW SOHAIL DANISH 12024119-120
  • 2. DEFINITION The Computer Misuse Act 1990 (CMA) is an act of the UK Parliament passed in 1990. CMA is designed to frame legislation and controls over computer crime and Internet fraud.The legislation was created to:  Criminalize unauthorized access to computer systems.  Deter serious criminals from using a computer in the commission of a criminal offence or seek to hinder or impair access to data stored in a computer http://searchsecurity.techtarget.co.uk/sDefinition/0,,sid180_gci1293174,00.html
  • 3. COMPUTER MISUSE ACT 1990  Introduced 3 criminal offences:  Accessing computer material without permission, eg looking at someone else's files.  Accessing computer material without permission with intent to commit further criminal offences, eg hacking into the bank's computer and wanting to increase the amount in your account.  Altering computer data without permission, eg writing a virus to destroy someone else's data, or actually changing the money in an account. http://www.bbc.co.uk/schools/gcsebitesize/ict/legal/1dataandcomputermisuserev2.shtml
  • 4. PUNISHMENT  The offences are punishable as follows:  Offence 1. Up to 6 months' prison and up to £5,000 in fines.  Offences 2 and 3. Up to 5 years in prison and any size of fine (there is no limit). http://impact.freethcartwright.com/2006/08/computer_misuse.html
  • 5. TYPES OF COMPUTER MISUSE  Hacking  Data misuse and unauthorised transfer or copying  Copying and distributing copyrighted software, music and film  Email and chat room abuses  Pornography  Extreme material  Identity and financial abuses  Fraud and theft  Viruses http://www.bbc.co.uk/schools/gcsebitesize/ict/legal/1dataandcomputermisuserev1.shtml
  • 6. HACKING  Hacking is where an unauthorised person uses a network, Internet or modem connection to gain access past security passwords or other security to see data stored on another computer. Hackers sometimes use software hacking tools and often target, for example, particular sites on the Internet.
  • 7. DATA MISUSE AND UNAUTHORISED TRANSFER OR COPYING Copying and illegal transfer of data is very quick and easy using online computers and large storage devices such as hard disks, memory sticks and DVDs. Personal data, company research and written work, such as novels and textbooks, cannot be copied without the copyright holder's permission.
  • 8. COPYING AND DISTRIBUTING COPYRIGHTED SOFTWARE, MUSIC AND FILM  This includes copying music and movies with computer equipment and distributing it on the Internet without the copyright holder's permission.This is a widespread misuse of both computers and the Internet that breaks copyright regulations.
  • 9. EMAIL AND CHAT ROOM ABUSES  Internet services such as chat rooms and email have been the subject of many well-publicised cases of impersonation and deception where people who are online pretend to have a different identity. Chat rooms have been used to spread rumours about well known personalities.A growing area of abuse of the Internet is email spam, where millions of emails are sent to advertise both legal and illegal products and services.
  • 10. PORNOGRAPHY  A lot of indecent material and pornography is available through the Internet and can be stored in electronic form.There have been several cases of material, which is classified as illegal, or which shows illegal acts, being found stored on computers followed by prosecutions for possession of the material.
  • 11. IDENTITY AND FINANCIAL ABUSES  This topic includes misuse of stolen or fictional credit card numbers to obtain goods or services on the Internet, and use of computers in financial frauds.These can range from complex well thought out deceptions to simple uses such as printing counterfeit money with colour printers.
  • 12. VIRUSES  Viruses are relatively simple programs written by people and designed to cause nuisance or damage to computers or their files.
  • 13. PREVENTING MISUSE  The Data Protection Act  This was introduced to regulate personal data.This helps to provide protection against the abuse of personal information. Find out more about the Data Protection Act.  Copyright law  This provides protection to the owners of the copyright and covers the copying of written, musical, or film works using computers. FAST is the industry body which is against software theft.You can find out more about it in the Copyright section.  There have been cases where laws such as Copyright have been used to crack down on file sharing websites or individuals who store and illegally distribute copyrighted material, eg music.There is a massive problem with many people around the world obtaining copyrighted material illegally.
  • 14. Close down chat rooms Some chat rooms have been closed down due to abuses, especially where children are vulnerable. Some have moderators who help to prevent abuses. Advice about sensible use is important; especially to never give personal contact details or arrange meetings without extreme caution. Reduce email spamming This may be reduced by: never replying to anonymous emails setting filters on email accounts reporting spammers to ISPs, who are beginning to get together to blacklist email abusers governments passing laws to punish persistent spammers with heavy fines Regular backups and security Just making something illegal or setting up regulations does not stop it happening. Responsible computer users need to take reasonable steps to keep their data safe. This includes regular backups and sufficient security with passwords.