• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The computer misuse act

Extracts from this document...

Introduction

The Computer Misuse Act (1990) The 1990 Computer Misuse Act was introduced by Parliament to prevent misuse of computers. It was introduced due to a number of reasons. Hackers were able to gain access past security and see data stored on other computers using an Internet connection. Copying can also be quick and easy using online computers and large storage devices such as hard disks. Personal data and written work, such as textbooks, can all be copied without permission. Copies of music tracks from music CDs could be distributed on the Internet using computer equipment. This misuse of computers and the Internet breaks copyright regulations. Spam is another abuse with millions of e-mails being sent to advertise both legal and illegal products. Viruses are also being made which are designed to cause damage to other computers. The Act introduced three new offences: 1. ...read more.

Middle

Most of all, this Act is highly valuable for people in the community. How the Computer Misuse Act affects the community This Act has most affect on the community, in that the local Idea Store has many public computers which are use by local people. The Idea Store needs to be protected by this Act in order to ensure that people will not misuse the computers. It prevents local people from hacking into the system and altering data without permission, meaning that the Idea Store is able to run efficiently without intrusions. It is helped by the Idea Store's own policy which states that if they are going to use the computers, then they are not allowed to abuse them. How the Computer Misuse Act affects me The Computer Misuse Act affects me because in order to use the ICT facilities in school, I must agree to comply with the school policies which are stated, which includes the Computer Misuse Act. ...read more.

Conclusion

Evaluation The Computer Misuse Act is highly useful in ensuring that peoples work and personal information is kept safe. However it can be difficult in finding a person to prosecute if the Act is breached due to the enormity of the Internet. For example, if someone hacked into someone else's computer and looked at or altered information, then they would be charged with unauthorised access or modification. However it can be hard to trace the hacker as they may not use their own IP address. Also if someone was attempting to access data without authorisation, then it would be difficult to prove this as the crime has not yet been committed. I hope that in future, the government will implement new plans which will be able to reduce the activity of these happenings. Much money is lost by businesses by this law, and can be prevented by simple measures. It will serve as a further warning not to disobey this law. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    If the Employer does not take care of all these laws and decides not to follow them he could be in serious trouble. How legislation affects Croydon Community Laws and acts affect the Croydon Community in many ways such as Croydon Community has a library which is also protected by

  2. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    or even take out a book on their account without having their library card. This is where the Data Protection Act comes in. If an employee were to do any of these things, they would be in immediate violation of the act. They can be charged and taken to court.

  1. 3E-The legislation that protects individuals and groups from the misuse of ICT

    Obrien's because his personal information/data is stored by the organisation he works at, which is the Lammas secondary school and is an area where this specific law is enforced. The data protection law protects Mr. Obrien's because it ensures that his personal details is safely secured and restricted for the

  2. Leaflet design for Finding Nemo.

    longer, cannot be mass produces easily, the manufacture may not be a great artist, it may not look smarter, and mainly it doesn't look as professional. I have looked at my information and came to these concluded points; I will use publisher for my leaflet, as it had no disadvantages

  1. The Legislation that protects individuals and groups from the misuse of ICT

    A computer technician set some traps on the system, and Schifreen and Gold were soon caught and arrested. Because of hacking incidents such as the one above, security measures had to be brought in to protect the individuals and organizations that use the internet.

  2. You have to explain how you have looked after the equipment and ensured its ...

    Fireproof doors help contain fires. Smoke detectors should be used to detect fires at an early stage. Gas flooding systems are used in large computer installations and are preferred to water ones because the damage done by water is often greater than that by fire.

  1. Legal Aspects of Using Information Technology

    organisation which aim to promote the legal use of software * The Business Software Alliance (BSA)- this organisation exists to make organisations and their employers aware of the law and encourage its carrying out Health and Safety at Work Act 1974 The Health and Safety at Work Act 1974 (the

  2. The Data Protection Act 1998 - questions and answers

    Personal data must be accurate and where necessary kept up to date. Personal data processed for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes. Personal data must be processed in accordance with the rights of data subjects under the 1998 Act.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work