Solved

Punishment for hacking computer in the UK

Posted on 2011-02-22
3
750 Views
Last Modified: 2012-05-11
could some advise where I can find more about penalty for computer hacking in uk or if you know something please post it up
0
Comment
Question by:mc87
3 Comments
 
LVL 37

Expert Comment

by:Neil Russell
Comment Utility
This is covered by the misuse of computers act 1990.

http://www.legislation.gov.uk/ukpga/1990/18/contents
0
 
LVL 35

Expert Comment

by:torimar
Comment Utility
Please check this list of legal hacking cases:
http://www.computerevidence.co.uk/Cases/CMA.htm

In the fourth column you will see what people were being charged for and what penalty they got.
0
 
LVL 61

Accepted Solution

by:
btan earned 500 total points
Comment Utility
More commonly classified as computer misuse act, in particular for UK is known as "The Computer Misuse Act of 1990". It is a law in the UK that makes illegal certain activities, such as hacking into other people’s systems, misusing software, or helping a person to gain access to protected files of someone else's computer. It was derived from a case "R v. Gold" that ultimately lead to the Computer Misuse Act. The accused appealed for the case that there is no damage to the intruded machine and hence acquitted, but this precedence set a premise to persist in forbidding this type of behavior in future.

This link will be a quick summary @ http://www.wisegeek.com/what-is-the-computer-misuse-act-of-1990.htm

The act was updated to increase the penalty as mentioned in @ http://www.v3.co.uk/vnunet/news/2227212/computer-misuse-updates-force

0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Article by: btan
Provide an easy one stop to quickly get the relevant information on common asked question on Ransomware in Expert Exchange.
Nothing in an HTTP request can be trusted, including HTTP headers and form data.  A form token is a tool that can be used to guard against request forgeries (CSRF).  This article shows an improved approach to form tokens, making it more difficult to…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now