• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Computer Crime and the Law.

Extracts from this document...

Introduction

Computer Crime and the Law (Covers Chapters 10-11 Heathcote) Crimes and abuse New technologies = new opportunities for crime The Internet is used by: > Fraudulent traders > Paedophiles > Software pirates > terrorists Task: For each of the above give an example of how the Internet is used > Fraudulent traders-The trader uses the internet to take money off customers. The buyer pays money and expects a product or a download, but instead get a persistant fault, which means the software arrives scrambled or it is not transmitted at all. > Paedophiles-Use chat rooms, or other ways of sending messages, (e.g. hotmail), to talk to young children, and pretend they are their age. > Software pirates-People can download priate copy software, games, music and new films off the intenet. > Terrorists-Terrorists use the internet to email one another, or to make websites about their terrorists acts, to attract more terrorists. There are other crimes that can be committed in the IT world: > Hacking > Planting viruses > Theft of money > Theft of data > Software piracy Task: use the internet to research into the meanings of each of the above crimes and for each, give a description and an example. ...read more.

Middle

The requisite intent is intent to cause a modification and by so doing: 1. To impair the operation of any computer 2. To prevent or hinder access to any program or data 3. To impair the operation of any program or reliability of any data The maximum sentence for the offence under this section of the Act is 5 years imprisonment Activity: Doyle page 59 Case Your decision and reason 1 Miss Kendrick is inocent and should not be prosecuted under the act, because she is not intending to cause damage to data, as she does not know what she is doing, and is a beginner 2 John Jackson will be guilty under section two of the Act, as he is getting someone else to do the offence, and will be imprisoned a maximum of 5 years. 3 Susan Hughes is guilty under the section three of the act and may be sacked, and get up to 6years improsonment. She is guilty as she has knowingly accessed the system, and made changes to data and files, making them false and unreliable. 4 Rachel Smith is guilty under section three of the act, as she has caused the unauthorised modification to the contents of the computer. ...read more.

Conclusion

Two of the disks will be at the main computer centre, so that in the event of one disk drive failing, the data is safe on the other drive until the problem is fixed. > Periodic Backups-This is making daily backups of all data files. Data is transferred, sometimes overnight, to a backup tape or disk and the backup copy is stored in a fireproof safe. An example of a company that provides backup, is America's biggest backup provide, @Backup > Backing up laptop data-The NetStore Group provides a backup service called PCRefresh, which for a monthly fee backs up any changed files on a laptop automatically every day. 2. What are the different types of configuration options that are typically available with anti virus software Issues surrounding the Internet Some problems can be: > External hackers > Employees making inappropriate use of email > Pupils being exposed to inappropriate materials Suggest some of the measures or procedures that can be adopted to ensure to some extent that the internet is used appropriately. These can include businesses and schools. Organisations and business, schools and colleges set up their own-wide internet. This provides the same facilities as the internet like browsing software and e-mailing facilinties. Firewalls are used to control security and control the access to the internet. This is used in schools to stop pupils downloading unsuitable material. Kam Bains ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Marked by a teacher

    Ict and the law

    4 star(s)

    The information must be kept secure and confidential, for instance it cannot be stored on the notice board and cannot be shown to anyone who doesn't need to see it, and it cannot be sold to anyone. The data must be accurate and correct, such as it cannot say I live next door to my real house.

  2. The Data Protection Act 1998 - questions and answers

    You should ensure that your organisation's systems ensure that any notices from the Data Protection Commissioner are received by you and not some other part of the organisation. My organisation does not use databases but I keep copies of all my correspondence on my computer.

  1. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    If I am affected, I can charge him myself. This acts as a deterrent to a lot of virus spreaders but it's extremely hard to trace back skilled hackers. They can use proxies and other such devices to hide their ISP, making it really hard to trace back to the original culprit.

  2. 3E-The legislation that protects individuals and groups from the misuse of ICT

    This condition is that the data will be secured and will restrict a number of hackers from gaining access or affecting the file. The Anti-virus software shall also be used in accordance to the law and as an individual, Maria will need to comply fully with the condition stated by

  1. Data Protection Act

    It provides that a level of protection is one which is adequate in all the circumstances of the case having regard in particular to: - the nature of the personal data, law in force in the country or territory if final destination of that information.

  2. Critically evaluate the extent to which it can be said that copyright law gives ...

    In Ladbrooke (Football) Ltd v. William Hill (Football) Ltd Lord Pierce stated that the word 'original' requires. ".. only that the work should not be copied but should originate from the author"5 So here the courts did not require that the work be innovative or new, like its literal meaning

  1. Is the UK copyright act of 1988 still an adequate means of protecting intellectual ...

    * Jurisdiction Issues Perhaps the greatest shortcoming of the UK copyright Act of 1988 is that it only implies to the United Kingdom and thus what maybe considered against the law and breaking copyright agreements in the UK may be perfectly legal in the United States.

  2. Right of privacy under Hong Kong's current laws

    Apart from the minority black-sheep that the proposal targets, the proposal will victimize all other journalists, making it much harder for them to produce good stories, inform the public and scrutinize government and business. The two main aspects suggested in the proposal are (i)

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work