Hacking can be appear a fairly harmless, often glamorised on TV and in films with the struggling hero trying to obtain a critical piece of information from a faceless organisation in order to solve a crime or to prevent a disaster.
In reality, hacking can cause tremendous harm; from damaging reputations, causing financial loss, threatening jobs and more. Increasingly and more and more people are becoming victims of hacking they are looking to the law to help protect them and punish hackers for their crimes.
Helps protect individuals and companies from being hacked for the purposes of fraud.
Controls how personal information is used by organisations, businesses and the government. Everyone responsible for holding data about others has to follow certain principals and obligations.
Helps provide protection from others who may try to intercept your communications and what can be sent through a communications network/
This covers accessing material for which the 'hacker' has no permission to access. By definition, if someone accesses material for which they haven't received permission to 'see' then they are breaking the law. All that is required, is for the user to know that they haven't been given permission.
Computer material covers all information and programs on any device capable of storing and processing information. So it covers all phones, tablets, laptops, desktops, internet servers, mini and mainframe computers.
This section covers all those instances where hackers will try to access unauthorised material to gain further information that will help them commit further offences. For example, stealing credit information from a computer so that they obtain money from your bank account, or getting details and placing online orders in your name and getting them delivered elsewhere.
Hackers who do this, not only break the Computer Misuse Act, but can also be charged with:-
This covers those cases where someone has introduced a change to a computer system, that prevents or hinders access to programs or data, or affects it's reliability or introduced a program or data without permission. To be found guilty someone has to:-
This section of the law is specifically aims at those who plant viruses, Trojans or other malware on specific computer systems.
Everyone who uses personal data has to agree to abide by certain principles. First though, there are two important distinctions.
The Data controller has to:-
In short, you can't just keep information on anyone without a reason, to be used for any purpose you like for as along as you like and let anyone else see it just because they want to and not worry about whether its accurate.
As a Data Subject, you have the right to:-
Unsurprisingly, there are a few organisations who are exempt from the Data Protection Act especially when the information is about:-
And to add an element of mystery, the organisation doesn't have to say why they are withholding the information.
While the Computer Misuse Act provides legal protection from people trying to change the way computer devices work or use them as part of another crime and the Data Protection Act provides protection for your personal data, this act provides legal protection for your wireless network channel and the content of messages passed on line. In particular, it provides protection against:-
The last two categories are used to provide protection against Cyber-bullying and trolls.
This is the offence of using someone else's WiFi connection without permission, like your neighbour's. Using free WiFi in coffee shops can assume they've been granted permission by the WiFi owner.
This provides legal protection against receiving threats online, particularly on social media where people mistakenly assume they are free to say anything they like without fear of retribution. As well as a protection against cyber-bullying it also represents an attempt to tackle 'trolling' or the act of posting offensive comments to deliberately cause offense.
Sending offensive and indecent images is now an offence, especially sharing them on social media, perhaps for revenge purposes in order to embarrass or humiliate.
Create a page in your notebook title Legal Protection.. Copy each of the following situations and give your answer.
As before, copy the scenario and answer the questions.
If you don't feel confident in meeting any of these performance criteria, ask your teacher or re-read the information again.