1,230
14
Analysis Paper, 2 pages (300 words)

Computer misuse act analysis

The computer misuse act of 1990 is a law in the UK that makes certain activities illegal, such as hacking into other people’s systems, misusing software, or helping a person gain access to protected files of someone else’s computer. The main goal of the Act was to discourage this kind of behaviour in the future. The act identifies three specific offences:

1. Unauthorised access to computer material.

2. Unauthorised access to a computer system with intent to break, change or copy files.

3. Unauthorised modification of computer material.

The act targets people who misuse computers and communication systems, this could come in several forms: •Hacking -When an unauthorised person uses a network, internet or modem connection to gain access past security password or other security to see data stored in another computer. •Data misuse & unauthorised transfer or copying

Copying and illegally transferring data using online computers and large storage devices (hard disks, memory sticks, DVDs) personal data, company research and written work ( novels, textbooks) •Copying and distributing copyrighted software, music and film -When someone copies music and movies with computer equipment and distributing it on the internet without the copyright holder’s permission.

•Email and chat rooms

-when someone uses fake identification and pretends to be someone else to try and lure someone else into giving them their information. The computer misuse act protects the owners of the copyright and covers the copying of written, musical or film works using computers. The copyright law has been used to crack down on file sharing websites or indivisuals who store and illegally distribute copyrighted material, eg music. The computer misuse act is highly useful in ensuring that peoples work and personal information is kept safe. It prevents viruses, copyright infringements, hacking, using computer data for blackmail or fraud, and illegal deleting ot altering of computer data.

Thank's for Your Vote!
Computer misuse act analysis. Page 1
Computer misuse act analysis. Page 2
Computer misuse act analysis. Page 3

This work, titled "Computer misuse act analysis" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Analysis Paper

References

AssignBuster. (2022) 'Computer misuse act analysis'. 10 October.

Reference

AssignBuster. (2022, October 10). Computer misuse act analysis. Retrieved from https://assignbuster.com/computer-misuse-act-analysis/

References

AssignBuster. 2022. "Computer misuse act analysis." October 10, 2022. https://assignbuster.com/computer-misuse-act-analysis/.

1. AssignBuster. "Computer misuse act analysis." October 10, 2022. https://assignbuster.com/computer-misuse-act-analysis/.


Bibliography


AssignBuster. "Computer misuse act analysis." October 10, 2022. https://assignbuster.com/computer-misuse-act-analysis/.

Work Cited

"Computer misuse act analysis." AssignBuster, 10 Oct. 2022, assignbuster.com/computer-misuse-act-analysis/.

Get in Touch

Please, let us know if you have any ideas on improving Computer misuse act analysis, or our service. We will be happy to hear what you think: [email protected]