Computer Misuse Offences

Authors Avatar

Computer Misuse Offences

The Computer Misuse Act created three new offences in response to the Law Commission Working Paper No. 186, on Criminal Law: Computer Misuse (Cm 819), published in October 1989.

Even before the Act, dishonest computer activities were quite well-covered by the criminal law, and in particular by theft, and related offences.

A common type of computer fraud involves gaining unauthorized access in order to transfer funds to one's own account, or that of a friend. Another common variety is to use a forged bank card to obtain money from a cash dispenser. Because only the computer is deceived, it is probable that neither of these activities amounts to obtaining property by deception, since there is authority that that offence requires deception of a human mind. Nevertheless, it is clear that this type of fraud has always constituted theft.

Computers can also be used to commit the offence of blackmail, for example where a computer virus is introduced to a system (for example a time bomb, whose purpose is to corrupt or delete stored information after the lapse of a period of time), accompanied later by threats that some or all the files on the system will be corrupted unless a sum of money is paid into a particular account. Such a virus may be introduced directly by a hacker, or simply distributed as part of a software package. If the system is in fact corrupted by a virus, or directly by an unauthorized user, the offence of criminal damage may also be committed. In Cox v Riley (1986) 83 Crim App Rep 54, a disgruntled employee who erased programs on a printed circuit card belonging to his employer was held to have damaged the card, even though no physical damage had occurred.

Join now!

There is also a range of other offences under the general criminal law, which may be committed by unauthorized computer users. Examples are theft of electricity, false accounting and suppression of documents. A hacker who obtains unauthorized access to and copies information from a computer storage system may also infringe the law of copyright (but confidential information is not property, and so cannot be the subject matter of theft).

Nevertheless, perhaps because computer misuse was estimated to cost UK industry over £400 million annually, it was felt that the pre-existing law was inadequate in a number of respects. In ...

This is a preview of the whole essay