SlideShare une entreprise Scribd logo
1  sur  23
April 17, 2018
Computer Misuse &
Criminal Law
ZAHEER IRSHAD 14-UGLC-847
Muqaddas Ali 14-UGLC-842
Muhammad Awais 14-UGLC-803
Presented to:
Miss. Sana Saeed
Presented by:
BS Software Engineering (2014-2018)
Department of Computer Science & Information Technology
University of Sargodha, Lyallpur Campus, Faisalabad.
Introduction
The media and popular computing press abound with tales of multi-million
pound computer frauds and of the dangers to commercial companies,
governmental data banks, financial institutions and national security from the
activities of computer hackers.
1) Accessing computer material without permission, eg looking at someone
else's files.
2) Accessing computer material without permission with intent to commit
further criminal offences, eg hacking into the bank's computer and wanting
to increase the amount in your account.
3) Altering computer data without permission, eg writing a virus to destroy
someone else's data, or actually changing the money in an account.
The offences are punishable as follows:
 Offence 1. Up to 6 months' prison and up to £5,000 in fines.
 Offences 2 and 3. Up to 5 years in prison and any size of fine (there is
no limit).
Punishment
Categories of Misuse
The Computer Misuse Act 1990 (CMA) is an act of the UK Parliament
passed in 1990. CMA is designed to frame legislation and controls over
computer crime and Internet fraud.
 Computer Fraud
 Eavesdropping on a computer
 Unauthorized alteration or destruction of information stored on a
computer
 Denying access to an authorized user
 The unauthorized removal of information stored on a computer
Categories of Misuse
 Hacking
 Copying and distributing copyrighted software, music and film
 Email and chat room abuses
 Pornography
 Extreme material
 Identity and financial abuses
 Fraud and theft
 Viruses
Computer Fraud:
 The Law Commission defined computer fraud as conduct which involves the
manipulation of a computer or internet, by whatever method, in order dishonestly to
obtain money, property, or some other advantage of value, or to cause loss
 Computer fraud is further divided into three categories:
 Input frauds
e.g. intentionally entering false data or amending data into the computer
 Output frauds
Output fraud involves stealing or misusing system output
 Program frauds
Program fraud involves the dishonest alteration of a computer program
Unauthorized obtaining of information from a computer:
 Copying and illegal transfer of data is very quick and easy using online
computers and large storage devices such as hard disks, memory sticks
and DVDs. Personal data, company research and written work, such as
novels and textbooks, cannot be copied without the copyright holder's
permission.
Eavesdropping:
 Literal meaning listening or spying secretly
Hacking:
 Hacking is where an unauthorized person uses a network, Internet or modem
connection to gain access past security passwords or other security to see data
stored on another computer. Hackers sometimes use software hacking tools and
often target, for example, particular sites on the Internet.
Copying and distributing copyrighted software, music and film:
This includes copying music and movies with computer equipment and
distributing it on the Internet without the copyright holder's permission. This is a
widespread misuse of both computers and the Internet that breaks copyright
regulations.
Email and chat room abuses:
 Internet services such as chat rooms and
email have been the subject of many
well-publicised cases of impersonation and
deception where people who are online
pretend to have a different identity.
Chat rooms have been used to spread
rumors about well known personalities. A growing area of abuse of the Internet is
email spam, where millions of emails are sent to advertise both legal and illegal
products and services.
Internet Resources
1. Surface Web
2. Deep Web
3. Dark Web
PORNOGRAPHY:
 A lot of indecent material and pornography is available through the Internet and
can be stored in electronic form. There have been several cases of material, which
is classified as illegal, or which shows illegal acts, being found stored on computers
followed by prosecutions for possession of the material.
IDENTITY AND FINANCIAL ABUSES:
 This topic includes misuse of stolen or fictional credit card numbers to obtain goods
or services on the Internet, and use of computers in financial frauds. These can range
from complex well thought out deceptions to simple uses such as printing counterfeit
money with colour printers.
VIRUSES:
 Viruses are relatively simple programs written by people and designed to cause
nuisance or damage to computers or their files.
Criminal Law
 In the past, the Criminal Law in relation to computers was unreliable.
1980's saw an increase in the use of computer systems and networks. It
soon became apparent that the existing laws such as the Theft Act and
the Criminal Damage Act were inadequate as a deterrent or suitable
remedy.
 From the industry, businesses and lobbying by some MP's to curtail
such problems resulted in the Computer Misuse Act (1990), a vital
piece of legislation that provided new offences of unauthorized
modification of computer material.
Criminal Law
At present, computer-enabled crimes, involving the use of computers to commit forgery, fraud,
obscenity and hate speech, criminal damage or copyright violation, are all covered by the
following UK laws:
 The Theft Act 1968 (on fraud)
 The Telecommunications Act 1984 (section 42 relating to deception and section 43 relating to
obscene material)
 The Forgery and Counterfeiting Act 1981
 The Protection of Children Act 1978, the Criminal Justice Act 1988 and the Criminal Justice
and Public Order Act 1994 (all on child pornography)
 The Public Order Act 1986 (on racist material)
 The Criminal Damage Act 1977 (to cover physical damage to computer systems)
 The Copyright, Designs and Patents Act 1988
PREVENTING MISUSE
The Data Protection Act:
 This was introduced to regulate personal data. This helps to provide protection
against the abuse of personal information. Find out more about the DataProtection
Act.
Copyright law:
 This provides protection to the owners of the copyright and covers the copying of
written, musical, or film works using computers. FAST is the industry body which is
against software theft. You can find out more about it in the Copyright section.
 There have been cases where laws such as Copyright have been used to crack down
on file sharing websites or individuals who store and illegally distribute copyrighted
material, eg music. There is a massive problem with many people around the world
obtaining copyrighted material illegally.
Close down chat rooms:
 Some chat rooms have been closed down due to abuses, especially where children
are vulnerable. Some have moderators who help to prevent abuses. Advice about
sensible use is important; especially to never give personal contact details or arrange
meetings without extreme caution.
Reduce email spamming:
 This may be reduced by:
never replying to anonymous emails setting filters on email accounts reporting
spammers to ISPs, who are beginning to get together to blacklist email Abusers
governments passing laws to punish persistent spammers with heavy fines
Regular backups and security:
 Just making something illegal or setting up regulations does not stop it happening.
Responsible computer users need to take reasonable steps to keep their data safe.
This includes regular backups and sufficient security with passwords.
Any Question?
Computer misuse and criminal law

Contenu connexe

Tendances (20)

Information security management
Information security managementInformation security management
Information security management
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Chapter 1: Professional Issues in Software Engineering
Chapter 1: Professional Issues in Software Engineering  Chapter 1: Professional Issues in Software Engineering
Chapter 1: Professional Issues in Software Engineering
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Computer security
Computer securityComputer security
Computer security
 
Tools and methods used in cyber crime
Tools and methods used in cyber crimeTools and methods used in cyber crime
Tools and methods used in cyber crime
 
System security
System securitySystem security
System security
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and history
 
Computer Misuse Act
Computer Misuse ActComputer Misuse Act
Computer Misuse Act
 
computer contracts.pdf
computer contracts.pdfcomputer contracts.pdf
computer contracts.pdf
 
cyber security notes
cyber security notescyber security notes
cyber security notes
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
 
Network forensic
Network forensicNetwork forensic
Network forensic
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Information Security Policies and Standards
Information Security Policies and StandardsInformation Security Policies and Standards
Information Security Policies and Standards
 
Security policies
Security policiesSecurity policies
Security policies
 

Similaire à Computer misuse and criminal law

Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT actDivesh Mewara
 
It legislation
It legislationIt legislation
It legislationdoogstone
 
Business And The Law
Business And The LawBusiness And The Law
Business And The LawRobbieA
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.muhammad-Sulaiman
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxOlusegun Mosugu
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwkamalbhatt9229
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptxSSPTRGCELL
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.pptMohaiUDin
 
Ethics and legislation in the it industry
Ethics and legislation in the it industryEthics and legislation in the it industry
Ethics and legislation in the it industryjamiehaworth1
 

Similaire à Computer misuse and criminal law (20)

Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
It legislation
It legislationIt legislation
It legislation
 
Business And The Law
Business And The LawBusiness And The Law
Business And The Law
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptx
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.ppt
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
Ethics and legislation in the it industry
Ethics and legislation in the it industryEthics and legislation in the it industry
Ethics and legislation in the it industry
 

Dernier

Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoilmeghakumariji156
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查ydyuyu
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftAanSulistiyo
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdfMatthew Sinclair
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样ayvbos
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptxAsmae Rabhi
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdfMatthew Sinclair
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Roommeghakumariji156
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查ydyuyu
 
Power point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria IuzzolinoPower point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria Iuzzolinonuriaiuzzolino1
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制pxcywzqs
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsMonica Sydney
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtrahman018755
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxgalaxypingy
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样ayvbos
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...gajnagarg
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.krishnachandrapal52
 

Dernier (20)

Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
Power point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria IuzzolinoPower point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria Iuzzolino
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 

Computer misuse and criminal law

  • 1.
  • 2. April 17, 2018 Computer Misuse & Criminal Law
  • 3. ZAHEER IRSHAD 14-UGLC-847 Muqaddas Ali 14-UGLC-842 Muhammad Awais 14-UGLC-803 Presented to: Miss. Sana Saeed Presented by: BS Software Engineering (2014-2018) Department of Computer Science & Information Technology University of Sargodha, Lyallpur Campus, Faisalabad.
  • 4. Introduction The media and popular computing press abound with tales of multi-million pound computer frauds and of the dangers to commercial companies, governmental data banks, financial institutions and national security from the activities of computer hackers. 1) Accessing computer material without permission, eg looking at someone else's files. 2) Accessing computer material without permission with intent to commit further criminal offences, eg hacking into the bank's computer and wanting to increase the amount in your account. 3) Altering computer data without permission, eg writing a virus to destroy someone else's data, or actually changing the money in an account.
  • 5. The offences are punishable as follows:  Offence 1. Up to 6 months' prison and up to £5,000 in fines.  Offences 2 and 3. Up to 5 years in prison and any size of fine (there is no limit). Punishment
  • 6. Categories of Misuse The Computer Misuse Act 1990 (CMA) is an act of the UK Parliament passed in 1990. CMA is designed to frame legislation and controls over computer crime and Internet fraud.  Computer Fraud  Eavesdropping on a computer  Unauthorized alteration or destruction of information stored on a computer  Denying access to an authorized user  The unauthorized removal of information stored on a computer
  • 7. Categories of Misuse  Hacking  Copying and distributing copyrighted software, music and film  Email and chat room abuses  Pornography  Extreme material  Identity and financial abuses  Fraud and theft  Viruses
  • 8. Computer Fraud:  The Law Commission defined computer fraud as conduct which involves the manipulation of a computer or internet, by whatever method, in order dishonestly to obtain money, property, or some other advantage of value, or to cause loss  Computer fraud is further divided into three categories:  Input frauds e.g. intentionally entering false data or amending data into the computer  Output frauds Output fraud involves stealing or misusing system output  Program frauds Program fraud involves the dishonest alteration of a computer program
  • 9. Unauthorized obtaining of information from a computer:  Copying and illegal transfer of data is very quick and easy using online computers and large storage devices such as hard disks, memory sticks and DVDs. Personal data, company research and written work, such as novels and textbooks, cannot be copied without the copyright holder's permission. Eavesdropping:  Literal meaning listening or spying secretly
  • 10. Hacking:  Hacking is where an unauthorized person uses a network, Internet or modem connection to gain access past security passwords or other security to see data stored on another computer. Hackers sometimes use software hacking tools and often target, for example, particular sites on the Internet.
  • 11.
  • 12. Copying and distributing copyrighted software, music and film: This includes copying music and movies with computer equipment and distributing it on the Internet without the copyright holder's permission. This is a widespread misuse of both computers and the Internet that breaks copyright regulations. Email and chat room abuses:  Internet services such as chat rooms and email have been the subject of many well-publicised cases of impersonation and deception where people who are online pretend to have a different identity. Chat rooms have been used to spread rumors about well known personalities. A growing area of abuse of the Internet is email spam, where millions of emails are sent to advertise both legal and illegal products and services.
  • 13. Internet Resources 1. Surface Web 2. Deep Web 3. Dark Web
  • 14.
  • 15. PORNOGRAPHY:  A lot of indecent material and pornography is available through the Internet and can be stored in electronic form. There have been several cases of material, which is classified as illegal, or which shows illegal acts, being found stored on computers followed by prosecutions for possession of the material.
  • 16. IDENTITY AND FINANCIAL ABUSES:  This topic includes misuse of stolen or fictional credit card numbers to obtain goods or services on the Internet, and use of computers in financial frauds. These can range from complex well thought out deceptions to simple uses such as printing counterfeit money with colour printers.
  • 17. VIRUSES:  Viruses are relatively simple programs written by people and designed to cause nuisance or damage to computers or their files.
  • 18. Criminal Law  In the past, the Criminal Law in relation to computers was unreliable. 1980's saw an increase in the use of computer systems and networks. It soon became apparent that the existing laws such as the Theft Act and the Criminal Damage Act were inadequate as a deterrent or suitable remedy.  From the industry, businesses and lobbying by some MP's to curtail such problems resulted in the Computer Misuse Act (1990), a vital piece of legislation that provided new offences of unauthorized modification of computer material.
  • 19. Criminal Law At present, computer-enabled crimes, involving the use of computers to commit forgery, fraud, obscenity and hate speech, criminal damage or copyright violation, are all covered by the following UK laws:  The Theft Act 1968 (on fraud)  The Telecommunications Act 1984 (section 42 relating to deception and section 43 relating to obscene material)  The Forgery and Counterfeiting Act 1981  The Protection of Children Act 1978, the Criminal Justice Act 1988 and the Criminal Justice and Public Order Act 1994 (all on child pornography)  The Public Order Act 1986 (on racist material)  The Criminal Damage Act 1977 (to cover physical damage to computer systems)  The Copyright, Designs and Patents Act 1988
  • 20. PREVENTING MISUSE The Data Protection Act:  This was introduced to regulate personal data. This helps to provide protection against the abuse of personal information. Find out more about the DataProtection Act. Copyright law:  This provides protection to the owners of the copyright and covers the copying of written, musical, or film works using computers. FAST is the industry body which is against software theft. You can find out more about it in the Copyright section.  There have been cases where laws such as Copyright have been used to crack down on file sharing websites or individuals who store and illegally distribute copyrighted material, eg music. There is a massive problem with many people around the world obtaining copyrighted material illegally.
  • 21. Close down chat rooms:  Some chat rooms have been closed down due to abuses, especially where children are vulnerable. Some have moderators who help to prevent abuses. Advice about sensible use is important; especially to never give personal contact details or arrange meetings without extreme caution. Reduce email spamming:  This may be reduced by: never replying to anonymous emails setting filters on email accounts reporting spammers to ISPs, who are beginning to get together to blacklist email Abusers governments passing laws to punish persistent spammers with heavy fines Regular backups and security:  Just making something illegal or setting up regulations does not stop it happening. Responsible computer users need to take reasonable steps to keep their data safe. This includes regular backups and sufficient security with passwords.