Page
  1. 1
    1
  2. 2
    2
  • Level: GCSE
  • Subject: ICT
  • Essay length: 823 words

The computer misuse act

Extracts from this essay...

Introduction

The Computer Misuse Act (1990) The 1990 Computer Misuse Act was introduced by Parliament to prevent misuse of computers. It was introduced due to a number of reasons. Hackers were able to gain access past security and see data stored on other computers using an Internet connection. Copying can also be quick and easy using online computers and large storage devices such as hard disks. Personal data and written work, such as textbooks, can all be copied without permission. Copies of music tracks from music CDs could be distributed on the Internet using computer equipment. This misuse of computers and the Internet breaks copyright regulations. Spam is another abuse with millions of e-mails being sent to advertise both legal and illegal products. Viruses are also being made which are designed to cause damage to other computers. The Act introduced three new offences: 1.

Middle

Most of all, this Act is highly valuable for people in the community. How the Computer Misuse Act affects the community This Act has most affect on the community, in that the local Idea Store has many public computers which are use by local people. The Idea Store needs to be protected by this Act in order to ensure that people will not misuse the computers. It prevents local people from hacking into the system and altering data without permission, meaning that the Idea Store is able to run efficiently without intrusions. It is helped by the Idea Store's own policy which states that if they are going to use the computers, then they are not allowed to abuse them. How the Computer Misuse Act affects me The Computer Misuse Act affects me because in order to use the ICT facilities in school, I must agree to comply with the school policies which are stated, which includes the Computer Misuse Act.

Conclusion

Evaluation The Computer Misuse Act is highly useful in ensuring that peoples work and personal information is kept safe. However it can be difficult in finding a person to prosecute if the Act is breached due to the enormity of the Internet. For example, if someone hacked into someone else's computer and looked at or altered information, then they would be charged with unauthorised access or modification. However it can be hard to trace the hacker as they may not use their own IP address. Also if someone was attempting to access data without authorisation, then it would be difficult to prove this as the crime has not yet been committed. I hope that in future, the government will implement new plans which will be able to reduce the activity of these happenings. Much money is lost by businesses by this law, and can be prevented by simple measures. It will serve as a further warning not to disobey this law.

The above preview is unformatted text

Found what you're looking for?

  • Start learning 29% faster today
  • Over 150,000 essays available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Over 180,000 student essays
  • Every subject and level covered
  • Thousands of essays marked by teachers
  • Over 180,000 essays
    written by students
  • Annotated by
    experienced teachers
  • Ideas and feedback to write
    your own great essays

Marked by a teacher

This essay has been marked by one of our great teachers. You can read the full teachers notes when you download the essay.

Peer reviewed

This essay has been reviewed by one of our specialist student essay reviewing squad. Read the full review on the essay page.

Peer reviewed

This essay has been reviewed by one of our specialist student essay reviewing squad. Read the full review under the essay preview on this page.