Computing Legislation - PowerPoint Presentation

Computing Legislation
Computing Legislation

Computing Legislation - Description


COMPUTER MISUSE ACT 1990 Rule 1 COMPUTER MISUSE ACT 1990 Unauthorised access to computer material Rule 1 COMPUTER MISUSE ACT 1990 Unauthorised access to computer material A person is guilty of an offence if ID: 512701 Download Presentation

Tags

act computer misuse offence computer act offence misuse 1990 access unauthorised rule intent modification material section commit person facilitate

Embed / Share - Computing Legislation


Presentation on theme: "Computing Legislation"— Presentation transcript


Slide1

Computing Legislation

COMPUTER MISUSE ACT 1990Slide2

Rule 1:

COMPUTER MISUSE ACT 1990

Unauthorised

access to computer material.Slide3

Rule 1:

COMPUTER MISUSE - ACT 1990

Unauthorised

access to computer material.

A person is guilty of an offence if

:

he

causes a computer to perform any function with intent to secure access to any program or data held in a computer

;

the

access he intends to secure is unauthorized;

And he

knows at the time when he causes the computer to perform the function that this is the caseSlide4

Rule 2:

COMPUTER MISUSE ACT 1990

Unauthorised

access with intent to commit or facilitate commission of further offencesSlide5

Rule 2:

COMPUTER MISUSE - ACT 1990

Unauthorised

access with intent to commit or facilitate commission of further offences

A person is guilty of an offence under this section if he commits an offence under section 1 above ("the unauthorized access offence")

- With intent to

commit an offence to which this section applies; or

- to

facilitate the commission of such an offence (whether by himself or by any other person) and the offence he intends to commit or facilitate is referred to below in this section as the further offence.Slide6

Rule 3:

COMPUTER MISUSE ACT 1990

Unauthorised

modification of computer material.Slide7

Rule 3:

COMPUTER MISUSE - -ACT 1990

Unauthorised modification of computer material.

A person is guilty of an offence

if

he

does any act which causes the unauthorized modification of the contents of any computer;

a

nd at

the time when he does the act he has the requisite intent and the requisite knowledge.Slide8

Rule 3:

COMPUTER MISUSE - -ACT 1990

Unauthorised modification of computer material.

For the purposes of the subsection above, the requisite intent is an intent to cause a modification of the contents of any computer and by so doing

:

to

impair the operation of any computer

;

to

prevent or hinder access to any program or data held in any computer;

or

- to

impair the operation of any such program or

the

reliability

of any such data

.

Shom More....
By: sherrill-nordquist
Views: 100
Type: Public

Download Section

Please download the presentation after appearing the download area.


Download Presentation - The PPT/PDF document "Computing Legislation" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

Try DocSlides online tool for compressing your PDF Files Try Now