StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

What Is Meant and Understood by the Term Computer Misuse - Article Example

Cite this document
Summary
The focus of this analysis is to consider the definition of the term “computer misuse” within the context of UK criminal law. It is submitted at the outset that closely linked to the consideration of computer misuse is the growth of online use…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.1% of users find it useful
What Is Meant and Understood by the Term Computer Misuse
Read Text Preview

Extract of sample "What Is Meant and Understood by the Term Computer Misuse"

The focus of this analysis is to consider the definition of the term “computer misuse” within the context of UK criminal law. It is submitted at the outset that closely linked to the consideration of computer misuse is the growth of online use. The proliferation of the Internet has led to increasing business opportunities with the growth of e-commerce (2004). However, linked to the Internet technology is the low cost, ease of use and anonymity, which has also made the Internet a breeding ground for criminal activity, leading to unforeseeable consequences with malicious activity such as hacking and viruses, which have been difficult to police due to jurisdictional difficulties and difficulties with identity tracking of offenders (Finch, 2001). This analysis particularly focuses three different aspects of potential computer misuse; namely identity theft, online harassment (otherwise referred to as “cyberstalking) and denial of service attacks (DDOS). Numerous press reports demonstrate how top financial institutions have fallen prey to cybercrime (Lloyd, 2004). The most common example is when an identity thief uses sensitive personal information to open a credit card account in a customer’s name through phishing (Thomas & Loader, 2000). Phishing is a high tech scam and uses spam to deceive customers into disclosing credit card numbers, bank account information, passwords and other sensitive information, with banks such as Abbey National and Natwest having fallen prey to phishing attack (Thomas & Loader, 2000). In phishing cases, offenders rely on the consumer trust in the familiar brand often by using the corporate branding style and logo to manipulate the consumer into a false conception of a pre-existing commercial relationship. This not only infringes the Electronic Commerce Regulations 2002 and The Privacy and Electronic Communications (EC Directive) Regulations 2003 (“the Regulations”), which prohibit unsolicited marketing communications; the use of brand name, style and logo also infringes the business’ intellectual property rights, which devalues the goodwill in the business incurring significant financial losses. The main legislative provisions dealing with computer misuse is the Computer Misuse Act 1990 (“the Act”), which was drafted without foresight of the practical implications of Internet growth. In its previous form, the Act covered two types of computer related offences; firstly the unauthorised access to computer material and unauthorised modification of computer material. However, these offences were created before the Internet boom and did not foresee the full impact of online misuse such as hacking, viruses and spamming. This falls into a grey area legally which has caused jurisdictional issues (Wall, 1999; Lloyd, 2004). Moreover, the All Party Internet Group report highlighted the fact that the Act does not define data or computer and welcomed the fact that UK courts’ have adopted a wide approach necessary to reach a just result in hacking cases (www.apig.org.uk). A further problem under UK law is that financial and lending institutions are seen as the only victims, because they are the ones defrauded. However, this fails to adequately address the damage inflicted on individual victims and victims often do not have the resources to trace the sender and or remedy the damage to their credit rating and reputation (www.cifas.org.uk). In the UK, any such compensation must be done through the civil courts, which is difficult in light of the cost of litigation and the difficulty in tracing and identifying the offender. An attempt to address the problems in the Act has been implemented in controversial amendments to the UK Act, which came into force in October 2008. Firstly, the penalties for the Section 1 unauthorised computer access offences are increased from 6 months to 2 years, with extradition eligibility from other jurisdictions. The incitement offences have been removed and inserted into the inchoate offences section of the Serious Crime Act 2007. There is also an attempt at defining denial of service attacks, with worldwide scope and penalties of up to 10 years in prison. Moreover, the term “misuse” has been extended to criminalize computer security research and defence software tools, making it illegal to download, write, amend or modify anything which could be used to commit a computer hacking or denial of service attack. However, this provision has been attacked on grounds that there is no requirement for proof of malicious intent and therefore it could result in criminal liability for exclusive private use on a home computer system (open rights group forum at www.openrightsgroup.org). It is further posited that these measures will be ineffective to deter criminal users and impose liability on law abiding computer researchers (www.openrightsgroup.org). There is no actual universal definition of cyberstalking, however in general terms it involves the use of the Internet, e-mail or other electronic communications devices to stalk another person (Addison & Lawson, 1998). Online harassment can take many forms, however cyberstalking is common to offline harassment in that stalkers are motivated often by a desire to control their victims (Addison & Lawson, 1998). Furthermore, despite the similar behavioural tendencies, the Internet provides new avenues for stalkers. The technology is more sophisticated and enables stalkers to hide their identity and use programs to send messages at regular or random intervals without even being present at the computer terminal. This again sits uneasily with the definition of “misuse” under the Act (Addison & Lawson, 1998). Additionally, online stalkers can engage third parties by using Internet chat rooms and message boards under an anonymous name. This makes if difficult for law enforcement officers to identify, locate or arrest the offender. The anonymity of the Internet provides opportunities for would be cyber stalkers and they can conceal their identity by using different ISPs and/or adopting different screen names (Smith, 2001; Lloyd, 2004). In the UK there are various legislative provisions dealing with cyberstalking. Firstly, Section 1 of the Malicious Communications Act 1998 (“MCA”) renders it an offence to send an indecent, offensive or threatening letter, electronic communication or other article to another person. However, the penalty makes it questionable whether this acts as any effective deterrent against cybercrime. In most cases of cyberstalking, there will be more than one offensive or threatening letter or telephone call and the police will opt to charge under the Harassment Act 1997, where the court can make a restraining order preventing them from contacting the victim again and breach of this order is punishable with up to five years imprisonment. However, these provisions do not address the technological changes and Internet usage discussed above, which makes detection and tracing very difficult, further compounded by the gaps in the Computer Misuse Act. Furthermore, there is confusion as to the legal position where the sender is outside the jurisdiction. This raises the legal issue as to whether the Internet is outside the legal control of local authorities. Where the message is sent from outside England, police usually inform foreign counterparts and if the offender has broken law in own jurisdiction then they will be dealt with in the local jurisdiction. If in UK and harassing abroad then police in UK have to prosecute even if the victim is outside the jurisdiction (Lloyd, 2004). This is easier said than done and with cyberstalking cases, ISPs are required to provide copies of the original messages to trace the sender with problems of ISP compliance. The above analysis demonstrates the rapid growth of online crime and how the Internet facilitates criminal activity and panders to the behavioural traits which motivate this particular type of crime. The existing UK legislative provisions are currently inadequate to deal with the practicalities of the Internet and one of the main complications for law enforcement is the presence of services providing anonymity and security on the Internet. Moreover, it is difficult to see how far the provisions to the Computer Misuse Act will go to address the widening categories of behaviour covered within misuse as the efficacy of any legal measure is inherently dependent on enforceability, which remains problematic in the internet era. Part 2 Commentary In undertaking this piece of work I utilised a combination of statute, articles, books and online sources. A primary source for me was Ian Lloyd’s Information Technology Law. Not only is Lloyd’s book a legal sourcebook, Lloyd’s approach is multi-layered and he approaches legal issues in a practical context with numerous examples. This helped me consider the concept of misuse laterally and consider the wider issues covered by the term “computer misuse” in criminal law. Secondly, I found the International Treaty on Cybercrime 2001 and the Protocol of March 2006 vital in highlighting the international jurisdictional. Problems created by policing computer misuse. It further enabled me to plan and structure my assignment in considering the focus points of discussion. The Convention again highlights the various categories of information covered by computer misuse and linked in with the issues raised in the CSI/FBI Computer Crime and Security Survey 2008. The CSI/FBI report was important to my research in considering the practical perspective impacting law enforcement agencies. From reading the report, I got to consider the issue of computer misuse outside of the parameters of legal principles and learned that cybercrime is now one of the fastest growing criminal activities in the world and covers a huge range of illegal activity such as hacking, downloading pornography, use of chat rooms to engage in illegal activity with underage victims, virus and denial of service attacks; stalking by e-mail and creating websites that promote xenophobia (CSI/FBI Computer Crime and Security Survey, 2008 at www.gocsi.com). Finally, the All Party Internet Group report was extremely useful in adding another dynamic to the assignment content by considering the industry perspective on the Computer Misuse Act and legislative provisions. This aided me in preparing for the assignment by considering the Computer Misuse Act provisions from a practical perspective. BIBLIOGRAPHY Addison, N., & Lawson, T (1998). “Harassment Law & Practice”, Blackstone Press Limited Akdeniz, Y. (1997). Governance of Pornography and Child Pornography on the Global Internet: A Multilayered Approach,” in Law and the Internet: Regulating Cyberspace, edited by Lillian Edwards and Charlotte Waelde, Oxford: Hart Publishing. Chandler, A. (1996). The Changing definition and image of hackers in popular discourse. International Journal of the Sociology of Law, 24, (1996): 229-251. Ellison, L., & Akdeniz, Y (1998). Cyberstalking: the Regulation of Harassment on the Internet, Criminal Law Review special issue, Crime, Criminal Justice and the Internet. 29-47 . Grabosky, P. N., & Smith, R. G. (1998). Crime in the Digital Age: Controlling Telecommunication and Cyberspace illegalities, New South Wales: Federation Press. International Review of Law, Computers and Technology. Lloyd, I. (2004). Information Technology Law. Oxford University Press. Mann, D., & Sutton, M (1998). Netcrime, more change in the organisation of thieving,” British Journal of Criminology, 38: 210-229. Smith (2001). Internet Law and Regulation. 3rd Edition Sweet & Maxwell Sterling, B. (1994). The Hacker Crackdown: Law and disorder on the electronic frontier. London Penguin Books. Thomas, D., & Loader, B. (2000). Cybercrime: Law Enforcement, Security and Surveillance in the Information Age. Routledge. Wall, D. S. (1999). Cybercrimes: New wine, no bottles? in Invisible Crimes: Their Victims and their Regulations, edited by Pam Davis, Peter Francis and Victor Jupp, London: Macmillan. Wall, D. S. (1998). Catching Cybercriminals: Policing the Internet. International Review of law Computers and Technology, 12 (1998a): 201. Reports/Convention CSI/FBI Computer Crime and Security Survey 2008 at www.gocsi.com “ID Theft: When Bad Things Happen to Your Good Name,” Federal Trade Commission Facts for Consumers, November 2003 at www.ftc.os “ID Theft: What’s It All About?” FTC, October 2003 at www.ftc.os International Treaty on Cybercrime 2001 available at www.conventions.coe.int/Treaty/EN/Treaties Legislation Computer Misuse Act 1990 Protection from Harassment Act 1997 Malicious Communications Act 1998 Regulation of Investigatory Powers Act 2000 Electronic Commerce Regulations 2002 The Privacy and Electronic Communications (EC Directive) Regulations 2003 Serious Crime Act 2007 US Identity Theft and Assumption Deterrence Act 1998 at www.ftc.gov.os Websites www.harrassment-law.co.uk www.bbc.co.uk www.legalday.co.uk www.apig.org.uk www.cifas.org.uk www.ftc.os www.openrightsgroup.org Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(What Is Meant and Understood by the Term Computer Misuse Article Example | Topics and Well Written Essays - 1500 words, n.d.)
What Is Meant and Understood by the Term Computer Misuse Article Example | Topics and Well Written Essays - 1500 words. https://studentshare.org/law/1551675-what-is-meant-and-understood-by-the-term-computer-misuse
(What Is Meant and Understood by the Term Computer Misuse Article Example | Topics and Well Written Essays - 1500 Words)
What Is Meant and Understood by the Term Computer Misuse Article Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/law/1551675-what-is-meant-and-understood-by-the-term-computer-misuse.
“What Is Meant and Understood by the Term Computer Misuse Article Example | Topics and Well Written Essays - 1500 Words”. https://studentshare.org/law/1551675-what-is-meant-and-understood-by-the-term-computer-misuse.
  • Cited: 0 times

CHECK THESE SAMPLES OF What Is Meant and Understood by the Term Computer Misuse

Heat Density Trends in Data Processing

the term paper "Heat Density Trends in Data Processing" states that the growth of information technology has resulted in a rapid increase in a number of computer-based systems and facilities, which have enhanced the requirements of power and consequently generation of heat.... A White Paper, “Heat Density Trends in data Processing, computer Systems, and Telecommunications Equipment” is the main source of the study....
9 Pages (2250 words) Term Paper

Information Management within an Organization

Information management is an umbrella term, which encompasses people, process, technology, and content.... It is essential for managers at all levels to understand what information can empower them or help them function effectively, at the same time assist in the right form of communication....
4 Pages (1000 words) Term Paper

Electronic Financial Transactions over the Internet

An FBI report released at the beginning of the new millennia has confirmed the nexus between computer hackers and organized crime groups.... nbsp; what has come to be called e-commerce has its origins in the dotcom boom of the late 1990s.... This paper looks into the various types of security threats facing electronic financial transactions, the potential damage they could inflict, the remedial measures to counter these threats....
8 Pages (2000 words) Term Paper

Term paper of Cyberpunk Film class

?? The Matrix tells a story of a computer jockey named Thomas Anderson who works in a leading software company while doing some hacking on the Through the hacking activity, Neo, Anderson's hacking alias makes acquaintance of Morpheus who told him that none of the things he knew is real.... It is a computer-generated dream world, a false reality that is created for humans to hide the truth.... The “big Other” in the movie is the existing Mega-computer which controls the Matrix and that there has to be an existence of the Matrix to illustrate that there are things that seems to be out of place, opportunities that are missed and things go wrong (Zizek 245)....
10 Pages (2500 words) Term Paper

Experience with Market Place Live

The writer of the paper "Experience with Market Place Live" suggests that one of the companies biggest challenges was a new entrant in the market where there were leading competitors more popular and advertised better and aggressively.... Advertising became the biggest challenge for the company.... hellip; Advertising had to be kept within the budget and at the same time be used in the best possible way to endear consumers to the company's products....
12 Pages (3000 words) Term Paper

What Effects Has Social Networking Had on Our Society

Although the concept of social networking is commonly understood by millions we will briefly discuss it as a refresher.... “Social networking is the grouping of individuals into specific groups, like small rural communities or a neighborhood subdivision, if you will This is a very general definition but covers the main idea of this term....
10 Pages (2500 words) Term Paper

E-Commerce and Related Crimes

This paper demonstrates the computer misuse Act which is based on the structural and technical aspects of computer crimes and also what is pre-conditioner for improving the existing rules and regulations in the sphere of computer misuse Act and its applications.... In the case the security methods to prevent computer misuse have trespassed, the law will prevent computer further damage with adequate provisions for defining the crime and subsequent punishment....
14 Pages (3500 words) Term Paper

Cyberspace Policy

the term cyber threat can be defined as an outsider's attempt to hamper the normal operation of any particular system which is designed to help the normal activities of the people in a society.... -what is the harm/causation?... -what is the broader implication of the harm?... what is the major Moral issue on hand?... With the innovation of the internet and another high level of computer programming, each and every organization is now dependent on a computer programs....
11 Pages (2750 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us