Solved

Punishment for hacking computer in the UK

Posted on 2011-02-22
3
766 Views
Last Modified: 2012-05-11
could some advise where I can find more about penalty for computer hacking in uk or if you know something please post it up
0
Comment
Question by:mc87
3 Comments
 
LVL 37

Expert Comment

by:Neil Russell
ID: 34950918
This is covered by the misuse of computers act 1990.

http://www.legislation.gov.uk/ukpga/1990/18/contents
0
 
LVL 35

Expert Comment

by:torimar
ID: 34950928
Please check this list of legal hacking cases:
http://www.computerevidence.co.uk/Cases/CMA.htm

In the fourth column you will see what people were being charged for and what penalty they got.
0
 
LVL 62

Accepted Solution

by:
btan earned 500 total points
ID: 34985841
More commonly classified as computer misuse act, in particular for UK is known as "The Computer Misuse Act of 1990". It is a law in the UK that makes illegal certain activities, such as hacking into other people’s systems, misusing software, or helping a person to gain access to protected files of someone else's computer. It was derived from a case "R v. Gold" that ultimately lead to the Computer Misuse Act. The accused appealed for the case that there is no damage to the intruded machine and hence acquitted, but this precedence set a premise to persist in forbidding this type of behavior in future.

This link will be a quick summary @ http://www.wisegeek.com/what-is-the-computer-misuse-act-of-1990.htm

The act was updated to increase the penalty as mentioned in @ http://www.v3.co.uk/vnunet/news/2227212/computer-misuse-updates-force

0

Featured Post

VMware Disaster Recovery and Data Protection

In this expert guide, you’ll learn about the components of a Modern Data Center. You will use cases for the value-added capabilities of Veeam®, including combining backup and replication for VMware disaster recovery and using replication for data center migration.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
copying evtx files while system is running 2 58
Creating a Vendor Admin user 23 53
Palo Alto Networks - find the sec zone 3 47
application access evidence windows 7 5 30
Enterprise Password Manager Suites as well as Local Password managers are covered in this article.
As technology users and professionals, we’re always learning. Our universal interest in advancing our knowledge of the trade is unmatched by most industries. It’s a curiosity that makes sense, given the climate of change. Within that, there lies a…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question