Computer Misuse Act

Read Complete Research Material

COMPUTER MISUSE ACT

Computer Misuse Act

Computer Misuse Act

Introduction

Computer is one of the most important inventions of 21st century. This invention makes easy all the tasks which are necessary for an organization. The misuse of this device makes the environment polluted and unbearable for the people of the world. IT technology makes the intercommunication in an organization possible but on the other hand it has many other disadvantages. Automation in an organization makes the process of working or producing goods easy and stress free. Most of the organizations utilize maximum advantage of this innovation. It is necessary for the people, to use this technology in positive manner. Social networking sites destroy the privacy of people. Misuse or excess of use of this technology may cause many diseases like obesity, eye problems, posture problems etc.

Act of 1990

Unauthorised Access (1) An individual is liable of an offence if (a) he makes a workstation perform any capacity with goal to secure access to any project or information held in any workstation, or to empower any such access to be secured (b) the right to gain entrance he plans to secure, or to empower to be secured, is unauthorised and (c) he knows when he makes the Pc perform the capacity that is the situation. (2) The expectation an individual needs to need to confer an offence under this segment need not be administered at (an) any specific project or information; (b) a system or information of any specific kind; or (c) a system or information held in any specific workstation. (3) An individual blameworthy of an offence under this area should be at risk (an) on outline conviction in England and Wales, to detainment for a term not surpassing 12 months or to a fine not surpassing the statutory most extreme or to both. (b) on summation conviction in Scotland, to detainment for a term not surpassing six months or to a fine not surpassing the statutory greatest or to both; (c) on conviction on arraignment, to detainment for a term not surpassing two years or to a fine or to both.

Unauthorised Access with goal to bind

An individual is liable of an offence under this segment provided that he binds an offence under area 1 above (“the unauthorised access offence”) with plan (a) to submit an offence to which this segment applies; or (b) to expedite the requisition of this offence (if without anyone else's input or by an additional person); and the offence he means to dedicate or expedite is implied underneath in this sectionals the further offence. This area has an association with offences (a) for which the sentence is altered by law; or (b) for which an individual who has achieved the age of twenty-one years (eighteen in connection to England and Wales) and has no past feelings may be sentenced to detainment for a term of five years or, in England and Wales, may be so sentenced yet for the confinements encroached by area 33 of ...
Related Ads
  • Computer Ethics
    www.researchomatic.com...

    Computer Ethics Pioneer Makes A World Of Diff ...

  • Data Security In Accounti...
    www.researchomatic.com...

    According to the Computer Misuse Act , the fol ...

  • Assignment 1
    www.researchomatic.com...

    Free research that covers introduction gun misuse ...

  • Cyberlaw
    www.researchomatic.com...

    Therefore, Helen will not be charged with a technica ...

  • Cyber Crimes Emergence
    www.researchomatic.com...

    This category of cyber crime is reserved for conduct ...