Computer Misuse Act

Topics: Computer, Copyright, Anti-copyright Pages: 1 (311 words) Published: January 30, 2011
Computer Misuse Act 1990
The computer misuse act of 1990 is a law in the UK that makes certain activities illegal, such as hacking into other people’s systems, misusing software, or helping a person gain access to protected files of someone else’s computer. The main goal of the Act was to discourage this kind of behaviour in the future. The act identifies three specific offences: 1.Unauthorised access to computer material.

2.Unauthorised access to a computer system with intent to break, change or copy files. 3.Unauthorised modification of computer material.
The act targets people who misuse computers and communication systems, this could come in several forms: •Hacking
-When an unauthorised person uses a network, internet or modem connection to gain access past security password or other security to see data stored in another computer. •Data misuse & unauthorised transfer or copying

-Copying and illegally transferring data using online computers and large storage devices (hard disks, memory sticks, DVDs) personal data, company research and written work ( novels, textbooks) •Copying and distributing copyrighted software, music and film -When someone copies music and movies with computer equipment and distributing it on the internet without the copyright holder’s permission. •Email and chat rooms

-when someone uses fake identification and pretends to be someone else to try and lure someone else into giving them their information. The computer misuse act protects the owners of the copyright and covers the copying of written, musical or film works using computers. The copyright law has been used to crack down on file sharing websites or indivisuals who store and illegally distribute copyrighted material, eg music. The computer misuse act is highly useful in ensuring that peoples work and personal information is kept safe. It prevents viruses, copyright infringements, hacking, using computer data for blackmail or fraud, and illegal deleting ot...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Data Protection Act and Computer Misuse Act Essay
  • Ict Health and Safety Act Essay
  • Computer missuse act Essay
  • Unit 25: Maintaining Computer Systems P1, M1 Essay
  • Computer Misuse Act Essay
  • Computer Misuse Act Essay
  • Computer Misuse Act Research Paper
  • ICT Data Protection Computer Misuse A Essay

Become a StudyMode Member

Sign Up - It's Free