SlideShare ist ein Scribd-Unternehmen logo
1 von 23
April 17, 2018
Computer Misuse &
Criminal Law
ZAHEER IRSHAD 14-UGLC-847
Muqaddas Ali 14-UGLC-842
Muhammad Awais 14-UGLC-803
Presented to:
Miss. Sana Saeed
Presented by:
BS Software Engineering (2014-2018)
Department of Computer Science & Information Technology
University of Sargodha, Lyallpur Campus, Faisalabad.
Introduction
The media and popular computing press abound with tales of multi-million
pound computer frauds and of the dangers to commercial companies,
governmental data banks, financial institutions and national security from the
activities of computer hackers.
1) Accessing computer material without permission, eg looking at someone
else's files.
2) Accessing computer material without permission with intent to commit
further criminal offences, eg hacking into the bank's computer and wanting
to increase the amount in your account.
3) Altering computer data without permission, eg writing a virus to destroy
someone else's data, or actually changing the money in an account.
The offences are punishable as follows:
 Offence 1. Up to 6 months' prison and up to £5,000 in fines.
 Offences 2 and 3. Up to 5 years in prison and any size of fine (there is
no limit).
Punishment
Categories of Misuse
The Computer Misuse Act 1990 (CMA) is an act of the UK Parliament
passed in 1990. CMA is designed to frame legislation and controls over
computer crime and Internet fraud.
 Computer Fraud
 Eavesdropping on a computer
 Unauthorized alteration or destruction of information stored on a
computer
 Denying access to an authorized user
 The unauthorized removal of information stored on a computer
Categories of Misuse
 Hacking
 Copying and distributing copyrighted software, music and film
 Email and chat room abuses
 Pornography
 Extreme material
 Identity and financial abuses
 Fraud and theft
 Viruses
Computer Fraud:
 The Law Commission defined computer fraud as conduct which involves the
manipulation of a computer or internet, by whatever method, in order dishonestly to
obtain money, property, or some other advantage of value, or to cause loss
 Computer fraud is further divided into three categories:
 Input frauds
e.g. intentionally entering false data or amending data into the computer
 Output frauds
Output fraud involves stealing or misusing system output
 Program frauds
Program fraud involves the dishonest alteration of a computer program
Unauthorized obtaining of information from a computer:
 Copying and illegal transfer of data is very quick and easy using online
computers and large storage devices such as hard disks, memory sticks
and DVDs. Personal data, company research and written work, such as
novels and textbooks, cannot be copied without the copyright holder's
permission.
Eavesdropping:
 Literal meaning listening or spying secretly
Hacking:
 Hacking is where an unauthorized person uses a network, Internet or modem
connection to gain access past security passwords or other security to see data
stored on another computer. Hackers sometimes use software hacking tools and
often target, for example, particular sites on the Internet.
Copying and distributing copyrighted software, music and film:
This includes copying music and movies with computer equipment and
distributing it on the Internet without the copyright holder's permission. This is a
widespread misuse of both computers and the Internet that breaks copyright
regulations.
Email and chat room abuses:
 Internet services such as chat rooms and
email have been the subject of many
well-publicised cases of impersonation and
deception where people who are online
pretend to have a different identity.
Chat rooms have been used to spread
rumors about well known personalities. A growing area of abuse of the Internet is
email spam, where millions of emails are sent to advertise both legal and illegal
products and services.
Internet Resources
1. Surface Web
2. Deep Web
3. Dark Web
PORNOGRAPHY:
 A lot of indecent material and pornography is available through the Internet and
can be stored in electronic form. There have been several cases of material, which
is classified as illegal, or which shows illegal acts, being found stored on computers
followed by prosecutions for possession of the material.
IDENTITY AND FINANCIAL ABUSES:
 This topic includes misuse of stolen or fictional credit card numbers to obtain goods
or services on the Internet, and use of computers in financial frauds. These can range
from complex well thought out deceptions to simple uses such as printing counterfeit
money with colour printers.
VIRUSES:
 Viruses are relatively simple programs written by people and designed to cause
nuisance or damage to computers or their files.
Criminal Law
 In the past, the Criminal Law in relation to computers was unreliable.
1980's saw an increase in the use of computer systems and networks. It
soon became apparent that the existing laws such as the Theft Act and
the Criminal Damage Act were inadequate as a deterrent or suitable
remedy.
 From the industry, businesses and lobbying by some MP's to curtail
such problems resulted in the Computer Misuse Act (1990), a vital
piece of legislation that provided new offences of unauthorized
modification of computer material.
Criminal Law
At present, computer-enabled crimes, involving the use of computers to commit forgery, fraud,
obscenity and hate speech, criminal damage or copyright violation, are all covered by the
following UK laws:
 The Theft Act 1968 (on fraud)
 The Telecommunications Act 1984 (section 42 relating to deception and section 43 relating to
obscene material)
 The Forgery and Counterfeiting Act 1981
 The Protection of Children Act 1978, the Criminal Justice Act 1988 and the Criminal Justice
and Public Order Act 1994 (all on child pornography)
 The Public Order Act 1986 (on racist material)
 The Criminal Damage Act 1977 (to cover physical damage to computer systems)
 The Copyright, Designs and Patents Act 1988
PREVENTING MISUSE
The Data Protection Act:
 This was introduced to regulate personal data. This helps to provide protection
against the abuse of personal information. Find out more about the DataProtection
Act.
Copyright law:
 This provides protection to the owners of the copyright and covers the copying of
written, musical, or film works using computers. FAST is the industry body which is
against software theft. You can find out more about it in the Copyright section.
 There have been cases where laws such as Copyright have been used to crack down
on file sharing websites or individuals who store and illegally distribute copyrighted
material, eg music. There is a massive problem with many people around the world
obtaining copyrighted material illegally.
Close down chat rooms:
 Some chat rooms have been closed down due to abuses, especially where children
are vulnerable. Some have moderators who help to prevent abuses. Advice about
sensible use is important; especially to never give personal contact details or arrange
meetings without extreme caution.
Reduce email spamming:
 This may be reduced by:
never replying to anonymous emails setting filters on email accounts reporting
spammers to ISPs, who are beginning to get together to blacklist email Abusers
governments passing laws to punish persistent spammers with heavy fines
Regular backups and security:
 Just making something illegal or setting up regulations does not stop it happening.
Responsible computer users need to take reasonable steps to keep their data safe.
This includes regular backups and sufficient security with passwords.
Any Question?
Computer misuse and criminal law

Weitere ähnliche Inhalte

Was ist angesagt?

Threats to information security
Threats to information securityThreats to information security
Threats to information securityswapneel07
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An IntroductionJayaseelan Vejayon
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 
Cyber security for an organization
Cyber security for an organizationCyber security for an organization
Cyber security for an organizationTejas Wasule
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber lawsDr. Prashant Vats
 
computer contracts.pdf
computer contracts.pdfcomputer contracts.pdf
computer contracts.pdfSanaKhan319883
 
Computer security risks
Computer security risksComputer security risks
Computer security risksAasim Mushtaq
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awarenessPhishingBox
 
Cia security model
Cia security modelCia security model
Cia security modelImran Ahmed
 
Uses , misuses and risk of software
Uses , misuses and risk of softwareUses , misuses and risk of software
Uses , misuses and risk of softwareAbdulJabbar459
 
Ethics and computing profession
Ethics and computing professionEthics and computing profession
Ethics and computing professionshahmansoor109
 
cyber security legal perspective
cyber security legal perspectivecyber security legal perspective
cyber security legal perspectiveShoeb Ahmed
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for studentsKandarp Shah
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber securityKeshab Nath
 

Was ist angesagt? (20)

Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
Cyber security for an organization
Cyber security for an organizationCyber security for an organization
Cyber security for an organization
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
computer contracts.pdf
computer contracts.pdfcomputer contracts.pdf
computer contracts.pdf
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Web security
Web securityWeb security
Web security
 
cyber crime
cyber crimecyber crime
cyber crime
 
Unit 1
Unit 1Unit 1
Unit 1
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awareness
 
Cia security model
Cia security modelCia security model
Cia security model
 
Uses , misuses and risk of software
Uses , misuses and risk of softwareUses , misuses and risk of software
Uses , misuses and risk of software
 
Ethics and computing profession
Ethics and computing professionEthics and computing profession
Ethics and computing profession
 
cyber security legal perspective
cyber security legal perspectivecyber security legal perspective
cyber security legal perspective
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Chapter 3_dp-pertemuan 4&5
 Chapter 3_dp-pertemuan 4&5 Chapter 3_dp-pertemuan 4&5
Chapter 3_dp-pertemuan 4&5
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 

Ähnlich wie Computer misuse and criminal law

Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT actDivesh Mewara
 
It legislation
It legislationIt legislation
It legislationdoogstone
 
Business And The Law
Business And The LawBusiness And The Law
Business And The LawRobbieA
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.muhammad-Sulaiman
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxOlusegun Mosugu
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwkamalbhatt9229
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptxSSPTRGCELL
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.pptMohaiUDin
 
Ethics and legislation in the it industry
Ethics and legislation in the it industryEthics and legislation in the it industry
Ethics and legislation in the it industryjamiehaworth1
 

Ähnlich wie Computer misuse and criminal law (20)

Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
It legislation
It legislationIt legislation
It legislation
 
Business And The Law
Business And The LawBusiness And The Law
Business And The Law
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptx
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.ppt
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
Ethics and legislation in the it industry
Ethics and legislation in the it industryEthics and legislation in the it industry
Ethics and legislation in the it industry
 

Kürzlich hochgeladen

定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 

Kürzlich hochgeladen (20)

定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 

Computer misuse and criminal law

  • 1.
  • 2. April 17, 2018 Computer Misuse & Criminal Law
  • 3. ZAHEER IRSHAD 14-UGLC-847 Muqaddas Ali 14-UGLC-842 Muhammad Awais 14-UGLC-803 Presented to: Miss. Sana Saeed Presented by: BS Software Engineering (2014-2018) Department of Computer Science & Information Technology University of Sargodha, Lyallpur Campus, Faisalabad.
  • 4. Introduction The media and popular computing press abound with tales of multi-million pound computer frauds and of the dangers to commercial companies, governmental data banks, financial institutions and national security from the activities of computer hackers. 1) Accessing computer material without permission, eg looking at someone else's files. 2) Accessing computer material without permission with intent to commit further criminal offences, eg hacking into the bank's computer and wanting to increase the amount in your account. 3) Altering computer data without permission, eg writing a virus to destroy someone else's data, or actually changing the money in an account.
  • 5. The offences are punishable as follows:  Offence 1. Up to 6 months' prison and up to £5,000 in fines.  Offences 2 and 3. Up to 5 years in prison and any size of fine (there is no limit). Punishment
  • 6. Categories of Misuse The Computer Misuse Act 1990 (CMA) is an act of the UK Parliament passed in 1990. CMA is designed to frame legislation and controls over computer crime and Internet fraud.  Computer Fraud  Eavesdropping on a computer  Unauthorized alteration or destruction of information stored on a computer  Denying access to an authorized user  The unauthorized removal of information stored on a computer
  • 7. Categories of Misuse  Hacking  Copying and distributing copyrighted software, music and film  Email and chat room abuses  Pornography  Extreme material  Identity and financial abuses  Fraud and theft  Viruses
  • 8. Computer Fraud:  The Law Commission defined computer fraud as conduct which involves the manipulation of a computer or internet, by whatever method, in order dishonestly to obtain money, property, or some other advantage of value, or to cause loss  Computer fraud is further divided into three categories:  Input frauds e.g. intentionally entering false data or amending data into the computer  Output frauds Output fraud involves stealing or misusing system output  Program frauds Program fraud involves the dishonest alteration of a computer program
  • 9. Unauthorized obtaining of information from a computer:  Copying and illegal transfer of data is very quick and easy using online computers and large storage devices such as hard disks, memory sticks and DVDs. Personal data, company research and written work, such as novels and textbooks, cannot be copied without the copyright holder's permission. Eavesdropping:  Literal meaning listening or spying secretly
  • 10. Hacking:  Hacking is where an unauthorized person uses a network, Internet or modem connection to gain access past security passwords or other security to see data stored on another computer. Hackers sometimes use software hacking tools and often target, for example, particular sites on the Internet.
  • 11.
  • 12. Copying and distributing copyrighted software, music and film: This includes copying music and movies with computer equipment and distributing it on the Internet without the copyright holder's permission. This is a widespread misuse of both computers and the Internet that breaks copyright regulations. Email and chat room abuses:  Internet services such as chat rooms and email have been the subject of many well-publicised cases of impersonation and deception where people who are online pretend to have a different identity. Chat rooms have been used to spread rumors about well known personalities. A growing area of abuse of the Internet is email spam, where millions of emails are sent to advertise both legal and illegal products and services.
  • 13. Internet Resources 1. Surface Web 2. Deep Web 3. Dark Web
  • 14.
  • 15. PORNOGRAPHY:  A lot of indecent material and pornography is available through the Internet and can be stored in electronic form. There have been several cases of material, which is classified as illegal, or which shows illegal acts, being found stored on computers followed by prosecutions for possession of the material.
  • 16. IDENTITY AND FINANCIAL ABUSES:  This topic includes misuse of stolen or fictional credit card numbers to obtain goods or services on the Internet, and use of computers in financial frauds. These can range from complex well thought out deceptions to simple uses such as printing counterfeit money with colour printers.
  • 17. VIRUSES:  Viruses are relatively simple programs written by people and designed to cause nuisance or damage to computers or their files.
  • 18. Criminal Law  In the past, the Criminal Law in relation to computers was unreliable. 1980's saw an increase in the use of computer systems and networks. It soon became apparent that the existing laws such as the Theft Act and the Criminal Damage Act were inadequate as a deterrent or suitable remedy.  From the industry, businesses and lobbying by some MP's to curtail such problems resulted in the Computer Misuse Act (1990), a vital piece of legislation that provided new offences of unauthorized modification of computer material.
  • 19. Criminal Law At present, computer-enabled crimes, involving the use of computers to commit forgery, fraud, obscenity and hate speech, criminal damage or copyright violation, are all covered by the following UK laws:  The Theft Act 1968 (on fraud)  The Telecommunications Act 1984 (section 42 relating to deception and section 43 relating to obscene material)  The Forgery and Counterfeiting Act 1981  The Protection of Children Act 1978, the Criminal Justice Act 1988 and the Criminal Justice and Public Order Act 1994 (all on child pornography)  The Public Order Act 1986 (on racist material)  The Criminal Damage Act 1977 (to cover physical damage to computer systems)  The Copyright, Designs and Patents Act 1988
  • 20. PREVENTING MISUSE The Data Protection Act:  This was introduced to regulate personal data. This helps to provide protection against the abuse of personal information. Find out more about the DataProtection Act. Copyright law:  This provides protection to the owners of the copyright and covers the copying of written, musical, or film works using computers. FAST is the industry body which is against software theft. You can find out more about it in the Copyright section.  There have been cases where laws such as Copyright have been used to crack down on file sharing websites or individuals who store and illegally distribute copyrighted material, eg music. There is a massive problem with many people around the world obtaining copyrighted material illegally.
  • 21. Close down chat rooms:  Some chat rooms have been closed down due to abuses, especially where children are vulnerable. Some have moderators who help to prevent abuses. Advice about sensible use is important; especially to never give personal contact details or arrange meetings without extreme caution. Reduce email spamming:  This may be reduced by: never replying to anonymous emails setting filters on email accounts reporting spammers to ISPs, who are beginning to get together to blacklist email Abusers governments passing laws to punish persistent spammers with heavy fines Regular backups and security:  Just making something illegal or setting up regulations does not stop it happening. Responsible computer users need to take reasonable steps to keep their data safe. This includes regular backups and sufficient security with passwords.