• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Computer Crime and the Law.

Extracts from this document...

Introduction

Computer Crime and the Law (Covers Chapters 10-11 Heathcote) Crimes and abuse New technologies = new opportunities for crime The Internet is used by: > Fraudulent traders > Paedophiles > Software pirates > terrorists Task: For each of the above give an example of how the Internet is used > Fraudulent traders-The trader uses the internet to take money off customers. The buyer pays money and expects a product or a download, but instead get a persistant fault, which means the software arrives scrambled or it is not transmitted at all. > Paedophiles-Use chat rooms, or other ways of sending messages, (e.g. hotmail), to talk to young children, and pretend they are their age. > Software pirates-People can download priate copy software, games, music and new films off the intenet. > Terrorists-Terrorists use the internet to email one another, or to make websites about their terrorists acts, to attract more terrorists. There are other crimes that can be committed in the IT world: > Hacking > Planting viruses > Theft of money > Theft of data > Software piracy Task: use the internet to research into the meanings of each of the above crimes and for each, give a description and an example. ...read more.

Middle

The requisite intent is intent to cause a modification and by so doing: 1. To impair the operation of any computer 2. To prevent or hinder access to any program or data 3. To impair the operation of any program or reliability of any data The maximum sentence for the offence under this section of the Act is 5 years imprisonment Activity: Doyle page 59 Case Your decision and reason 1 Miss Kendrick is inocent and should not be prosecuted under the act, because she is not intending to cause damage to data, as she does not know what she is doing, and is a beginner 2 John Jackson will be guilty under section two of the Act, as he is getting someone else to do the offence, and will be imprisoned a maximum of 5 years. 3 Susan Hughes is guilty under the section three of the act and may be sacked, and get up to 6years improsonment. She is guilty as she has knowingly accessed the system, and made changes to data and files, making them false and unreliable. 4 Rachel Smith is guilty under section three of the act, as she has caused the unauthorised modification to the contents of the computer. ...read more.

Conclusion

Two of the disks will be at the main computer centre, so that in the event of one disk drive failing, the data is safe on the other drive until the problem is fixed. > Periodic Backups-This is making daily backups of all data files. Data is transferred, sometimes overnight, to a backup tape or disk and the backup copy is stored in a fireproof safe. An example of a company that provides backup, is America's biggest backup provide, @Backup > Backing up laptop data-The NetStore Group provides a backup service called PCRefresh, which for a monthly fee backs up any changed files on a laptop automatically every day. 2. What are the different types of configuration options that are typically available with anti virus software Issues surrounding the Internet Some problems can be: > External hackers > Employees making inappropriate use of email > Pupils being exposed to inappropriate materials Suggest some of the measures or procedures that can be adopted to ensure to some extent that the internet is used appropriately. These can include businesses and schools. Organisations and business, schools and colleges set up their own-wide internet. This provides the same facilities as the internet like browsing software and e-mailing facilinties. Firewalls are used to control security and control the access to the internet. This is used in schools to stop pupils downloading unsuitable material. Kam Bains ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Marked by a teacher

    Ict and the law

    4 star(s)

    The information must be kept secure and confidential, for instance it cannot be stored on the notice board and cannot be shown to anyone who doesn't need to see it, and it cannot be sold to anyone. The data must be accurate and correct, such as it cannot say I live next door to my real house.

  2. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    Mr Ajaib can thus easily be tricked. Facebook contains a lot of bots. These are computerised programs coded to do a certain task. These bots are typically fake profiles, often disguised as attractive women, which send messages to people in hopes of passing viruses, no euphemism intended.

  1. 3E-The legislation that protects individuals and groups from the misuse of ICT

    Consequently, the law has a drawback upon the protection of Maria's personal data. The money that she has kept in her bank account can be extorted by a clever PC worker from her credit car details without living a trace or proof for Maria to identify how and when this specific event has occurred.

  2. The Data Protection Act 1998 - questions and answers

    Where, however, the data were held by a newsagent or milk roundsman and indicated when his customers were to be on holiday, a greater degree of security might be necessary. In any event, the shopkeeper would require to ensure that such of his staff as had access to the data understood the necessity of retaining its confidentiality.

  1. Critically evaluate the extent to which it can be said that copyright law gives ...

    Another very negative test that must be fulfilled in order to gain copyright protection is the De minimis Principle. It is this principle that seems to prevent every little artistic work from acquiring protection. The idea behind it relates to drawing separation between works that are subject matter of real copyright and from those that are not.

  2. Is the UK copyright act of 1988 still an adequate means of protecting intellectual ...

    Similarly the system would again raise grey areas of what data should be encrypted and what should be available to the general public. * Electronic Copyright Management Systems (ECMS) One proposed method is employing electronic copyright management system (4). Such a system is seen as being more preferable to encryption

  1. Right of privacy under Hong Kong's current laws

    News always appears instantaneously in public areas, sad to say, such tightening of legislation necessitates the journalists to contemplate, or sometimes inquire, every single information subjects (e.g. all the people in a photo taken outside the high court) as to whether or not they have expectation of privacy.

  2. You have to explain how you have looked after the equipment and ensured its ...

    * If you hold a lot of data, which would be very expensive to recreate, invest in a fire proof safe to protect against theft and fire. Copyright and Confidentiality Copyright is a kind of law. It says that if you make something, then it belongs to you.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work