Solved

Punishment for hacking computer in the UK

Posted on 2011-02-22
3
787 Views
Last Modified: 2012-05-11
could some advise where I can find more about penalty for computer hacking in uk or if you know something please post it up
0
Comment
Question by:mc87
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 37

Expert Comment

by:Neil Russell
ID: 34950918
This is covered by the misuse of computers act 1990.

http://www.legislation.gov.uk/ukpga/1990/18/contents
0
 
LVL 35

Expert Comment

by:torimar
ID: 34950928
Please check this list of legal hacking cases:
http://www.computerevidence.co.uk/Cases/CMA.htm

In the fourth column you will see what people were being charged for and what penalty they got.
0
 
LVL 64

Accepted Solution

by:
btan earned 500 total points
ID: 34985841
More commonly classified as computer misuse act, in particular for UK is known as "The Computer Misuse Act of 1990". It is a law in the UK that makes illegal certain activities, such as hacking into other people’s systems, misusing software, or helping a person to gain access to protected files of someone else's computer. It was derived from a case "R v. Gold" that ultimately lead to the Computer Misuse Act. The accused appealed for the case that there is no damage to the intruded machine and hence acquitted, but this precedence set a premise to persist in forbidding this type of behavior in future.

This link will be a quick summary @ http://www.wisegeek.com/what-is-the-computer-misuse-act-of-1990.htm

The act was updated to increase the penalty as mentioned in @ http://www.v3.co.uk/vnunet/news/2227212/computer-misuse-updates-force

0

Featured Post

Free NetCrunch network monitor licenses!

Only on Experts-Exchange: Sign-up for a free-trial and we'll send you your permanent license!

Here is what you get: 30 Nodes | Unlimited Sensors | No Time Restrictions | Absolutely FREE!

Act now. This offer ends July 14, 2017.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Active Directory security has been a hot topic of late, and for good reason. With 90% of the world’s organization using this system to manage access to all parts of their IT infrastructure, knowing how to protect against threats and keep vulnerabil…
In this blog we highlight approaches to managed security as a service.  We also look into ConnectWise’s value in aiding MSPs’ security management and indicate why critical alerting is a necessary integration.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question