• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Computer Crime and the Law.

Extracts from this document...


Computer Crime and the Law (Covers Chapters 10-11 Heathcote) Crimes and abuse New technologies = new opportunities for crime The Internet is used by: > Fraudulent traders > Paedophiles > Software pirates > terrorists Task: For each of the above give an example of how the Internet is used > Fraudulent traders-The trader uses the internet to take money off customers. The buyer pays money and expects a product or a download, but instead get a persistant fault, which means the software arrives scrambled or it is not transmitted at all. > Paedophiles-Use chat rooms, or other ways of sending messages, (e.g. hotmail), to talk to young children, and pretend they are their age. > Software pirates-People can download priate copy software, games, music and new films off the intenet. > Terrorists-Terrorists use the internet to email one another, or to make websites about their terrorists acts, to attract more terrorists. There are other crimes that can be committed in the IT world: > Hacking > Planting viruses > Theft of money > Theft of data > Software piracy Task: use the internet to research into the meanings of each of the above crimes and for each, give a description and an example. ...read more.


The requisite intent is intent to cause a modification and by so doing: 1. To impair the operation of any computer 2. To prevent or hinder access to any program or data 3. To impair the operation of any program or reliability of any data The maximum sentence for the offence under this section of the Act is 5 years imprisonment Activity: Doyle page 59 Case Your decision and reason 1 Miss Kendrick is inocent and should not be prosecuted under the act, because she is not intending to cause damage to data, as she does not know what she is doing, and is a beginner 2 John Jackson will be guilty under section two of the Act, as he is getting someone else to do the offence, and will be imprisoned a maximum of 5 years. 3 Susan Hughes is guilty under the section three of the act and may be sacked, and get up to 6years improsonment. She is guilty as she has knowingly accessed the system, and made changes to data and files, making them false and unreliable. 4 Rachel Smith is guilty under section three of the act, as she has caused the unauthorised modification to the contents of the computer. ...read more.


Two of the disks will be at the main computer centre, so that in the event of one disk drive failing, the data is safe on the other drive until the problem is fixed. > Periodic Backups-This is making daily backups of all data files. Data is transferred, sometimes overnight, to a backup tape or disk and the backup copy is stored in a fireproof safe. An example of a company that provides backup, is America's biggest backup provide, @Backup > Backing up laptop data-The NetStore Group provides a backup service called PCRefresh, which for a monthly fee backs up any changed files on a laptop automatically every day. 2. What are the different types of configuration options that are typically available with anti virus software Issues surrounding the Internet Some problems can be: > External hackers > Employees making inappropriate use of email > Pupils being exposed to inappropriate materials Suggest some of the measures or procedures that can be adopted to ensure to some extent that the internet is used appropriately. These can include businesses and schools. Organisations and business, schools and colleges set up their own-wide internet. This provides the same facilities as the internet like browsing software and e-mailing facilinties. Firewalls are used to control security and control the access to the internet. This is used in schools to stop pupils downloading unsuitable material. Kam Bains ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Marked by a teacher

    Ict and the law

    4 star(s)

    The information must be kept secure and confidential, for instance it cannot be stored on the notice board and cannot be shown to anyone who doesn't need to see it, and it cannot be sold to anyone. The data must be accurate and correct, such as it cannot say I live next door to my real house.

  2. The Data Protection Act 1998 - questions and answers

    You should ensure that your organisation's systems ensure that any notices from the Data Protection Commissioner are received by you and not some other part of the organisation. My organisation does not use databases but I keep copies of all my correspondence on my computer.

  1. Critically evaluate the extent to which it can be said that copyright law gives ...

    The judges should focus more on the general application of the legislative provisions and ignore the De minimis principle and idea/expression traps. It does seem that as case law develops and the law itself more criteria is being created in order to determine copyright, thus inhibiting acceptable contemporary art from gaining protection.

  2. 3E-The legislation that protects individuals and groups from the misuse of ICT

    Consequently, the law has a drawback upon the protection of Maria's personal data. The money that she has kept in her bank account can be extorted by a clever PC worker from her credit car details without living a trace or proof for Maria to identify how and when this specific event has occurred.

  1. Data Protection Act

    The Code is a non-statutory scheme that requires Governments and authorities to make certain information available to the public and to release information specific requests. The Freedom of Information covers a wider range of public authorities and allows the publish copies of documents as well as to the information in them.

  2. Is the UK copyright act of 1988 still an adequate means of protecting intellectual ...

    Similarly the system would again raise grey areas of what data should be encrypted and what should be available to the general public. * Electronic Copyright Management Systems (ECMS) One proposed method is employing electronic copyright management system (4). Such a system is seen as being more preferable to encryption

  1. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    The database retains all this information until it is somehow deleted. A librarian can easily access people's phone numbers, address and other details. But more-so than that, librarians can also access people's accounts and can add impending fines, renew or return their books even if they already haven't done so

  2. The legislation that protects individuals and groups from the misuse of ICT

    This particular piece of legislation covers and protects the rights of individuals or groups who produce new material, this means that before somebody else's materials can be used, prior permission must be obtained, in some instances the rights of the material may be given up by making it freely available to the public.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work