[Webinar] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

Punishment for hacking computer in the UK

Posted on 2011-02-22
3
Medium Priority
?
824 Views
Last Modified: 2012-05-11
could some advise where I can find more about penalty for computer hacking in uk or if you know something please post it up
0
Comment
Question by:mc87
3 Comments
 
LVL 37

Expert Comment

by:Neil Russell
ID: 34950918
This is covered by the misuse of computers act 1990.

http://www.legislation.gov.uk/ukpga/1990/18/contents
0
 
LVL 35

Expert Comment

by:torimar
ID: 34950928
Please check this list of legal hacking cases:
http://www.computerevidence.co.uk/Cases/CMA.htm

In the fourth column you will see what people were being charged for and what penalty they got.
0
 
LVL 65

Accepted Solution

by:
btan earned 2000 total points
ID: 34985841
More commonly classified as computer misuse act, in particular for UK is known as "The Computer Misuse Act of 1990". It is a law in the UK that makes illegal certain activities, such as hacking into other people’s systems, misusing software, or helping a person to gain access to protected files of someone else's computer. It was derived from a case "R v. Gold" that ultimately lead to the Computer Misuse Act. The accused appealed for the case that there is no damage to the intruded machine and hence acquitted, but this precedence set a premise to persist in forbidding this type of behavior in future.

This link will be a quick summary @ http://www.wisegeek.com/what-is-the-computer-misuse-act-of-1990.htm

The act was updated to increase the penalty as mentioned in @ http://www.v3.co.uk/vnunet/news/2227212/computer-misuse-updates-force

0

Featured Post

When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot has fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

With the evolution of technology, we have finally reached a point where it is possible to have home automation features like having your thermostat turn up and door lock itself when you leave, as well as a complete home security system. This is a st…
It’s time for spooky stories and consuming way too much sugar, including the many treats we’ve whipped for you in the world of tech. Check it out!
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

868 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question