• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Computer Crime and the Law.

Extracts from this document...


Computer Crime and the Law (Covers Chapters 10-11 Heathcote) Crimes and abuse New technologies = new opportunities for crime The Internet is used by: > Fraudulent traders > Paedophiles > Software pirates > terrorists Task: For each of the above give an example of how the Internet is used > Fraudulent traders-The trader uses the internet to take money off customers. The buyer pays money and expects a product or a download, but instead get a persistant fault, which means the software arrives scrambled or it is not transmitted at all. > Paedophiles-Use chat rooms, or other ways of sending messages, (e.g. hotmail), to talk to young children, and pretend they are their age. > Software pirates-People can download priate copy software, games, music and new films off the intenet. > Terrorists-Terrorists use the internet to email one another, or to make websites about their terrorists acts, to attract more terrorists. There are other crimes that can be committed in the IT world: > Hacking > Planting viruses > Theft of money > Theft of data > Software piracy Task: use the internet to research into the meanings of each of the above crimes and for each, give a description and an example. ...read more.


The requisite intent is intent to cause a modification and by so doing: 1. To impair the operation of any computer 2. To prevent or hinder access to any program or data 3. To impair the operation of any program or reliability of any data The maximum sentence for the offence under this section of the Act is 5 years imprisonment Activity: Doyle page 59 Case Your decision and reason 1 Miss Kendrick is inocent and should not be prosecuted under the act, because she is not intending to cause damage to data, as she does not know what she is doing, and is a beginner 2 John Jackson will be guilty under section two of the Act, as he is getting someone else to do the offence, and will be imprisoned a maximum of 5 years. 3 Susan Hughes is guilty under the section three of the act and may be sacked, and get up to 6years improsonment. She is guilty as she has knowingly accessed the system, and made changes to data and files, making them false and unreliable. 4 Rachel Smith is guilty under section three of the act, as she has caused the unauthorised modification to the contents of the computer. ...read more.


Two of the disks will be at the main computer centre, so that in the event of one disk drive failing, the data is safe on the other drive until the problem is fixed. > Periodic Backups-This is making daily backups of all data files. Data is transferred, sometimes overnight, to a backup tape or disk and the backup copy is stored in a fireproof safe. An example of a company that provides backup, is America's biggest backup provide, @Backup > Backing up laptop data-The NetStore Group provides a backup service called PCRefresh, which for a monthly fee backs up any changed files on a laptop automatically every day. 2. What are the different types of configuration options that are typically available with anti virus software Issues surrounding the Internet Some problems can be: > External hackers > Employees making inappropriate use of email > Pupils being exposed to inappropriate materials Suggest some of the measures or procedures that can be adopted to ensure to some extent that the internet is used appropriately. These can include businesses and schools. Organisations and business, schools and colleges set up their own-wide internet. This provides the same facilities as the internet like browsing software and e-mailing facilinties. Firewalls are used to control security and control the access to the internet. This is used in schools to stop pupils downloading unsuitable material. Kam Bains ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Marked by a teacher

    Ict and the law

    4 star(s)

    The information must be kept secure and confidential, for instance it cannot be stored on the notice board and cannot be shown to anyone who doesn't need to see it, and it cannot be sold to anyone. The data must be accurate and correct, such as it cannot say I live next door to my real house.

  2. Data Protection Act

    The purpose is to ensure that the public authorities make a significant amount of information available, proactively without the need for a specific request. The Information Commissioners must first approve all publications. An independent body set to oversee and enforce both the Freedom of Information and the Data Protection Act.

  1. The Data Protection Act 1998 - questions and answers

    You should ensure that your organisation's systems ensure that any notices from the Data Protection Commissioner are received by you and not some other part of the organisation. My organisation does not use databases but I keep copies of all my correspondence on my computer.

  2. 3E-The legislation that protects individuals and groups from the misuse of ICT

    receive the data are well protected from hackers and cannot extort any money than the initial fee that is to be paid by the customer. The data protection act protects Maria's personal data from the access or misuse of hackers. The Act ultimately, enables her data to be kept confidential.

  1. Privacy and Data Protection: IT Law

    6 (1))Online traffic and location data may only be held in the consumers' name for the duration of the billing period of the length of the contract. For further processing, or for further use in marketing, the data may only be used anonymously (Art.

  2. Legal Aspects of Using Information Technology

    Employers are responsible for providing further eye tests at regular intervals * provide health and safety training, so employees can able to use all aspects of their workstation equipment, safely, and know hw to make best use of it to prevent health problems, e.g.

  1. Computers and the Law.

    This may not be particularly sensitive but it could allow companies to use it to mass mail people about products. Incorrect or out dated data could cause problems. It may mean that you are mixed up with someone else and may be refused credit or wrongfully arrested.

  2. Data Protection Issues – Compliance Within Computing Organisations, The Causes, Effects and Consequences.

    Regard is to be had for the method by which data is obtained, including in particular whether any person from whom it is obtained from is deceived or misled as to the purpose for which the details are to be processed.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work