A Level Computer Science Paper 1: 1.5.1 Computer Related Legislation
This flashcard set explains the three core offences outlined in the Computer Misuse Act 1990: unauthorized access, unauthorized access with intent to commit further crimes, and unauthorized modification of computer material. It also details what must be proven to be found guilty under each rule.
Computer Misuse Act 1990 3 rules
Rule #1: Unauthorised access to computer material
Rule #2: Unauthorised access with intent to commit or facilitate commission of future offences
Rule #3: Unauthorised modification of computer material
Key Terms
Computer Misuse Act 1990 3 rules
Rule #1: Unauthorised access to computer material
Rule #2: Unauthorised access with intent to commit or facilitate commission of future offences...
Computer Misuse Act how to be guilty of rule #1
Guilty if they cause a computer to perform any function to access any data or program, the access is unauthorised and they knowingly did it
Computer Misuse Act how to be guilty of rule #2
Needs to be proven that the suspect was going to use the data under rule 1 to cause further offence or facilitate further offence by another
Computer Misuse Act how to be guilty of rule #3
Guilty if the suspect commits any act to cause the unauthorized modification of the contents of a computer and has the requisite intent and knowled...
Computer Misuse Act rule 3, what acts are punishable
Impairing the operation of the computer
Preventing or hindering access to program/data
Impairing the operation of a program/ access to data
Personal Data
Data that allows you to identify living people
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
| Term | Definition |
|---|---|
Computer Misuse Act 1990 3 rules | Rule #1: Unauthorised access to computer material |
Computer Misuse Act how to be guilty of rule #1 | Guilty if they cause a computer to perform any function to access any data or program, the access is unauthorised and they knowingly did it |
Computer Misuse Act how to be guilty of rule #2 | Needs to be proven that the suspect was going to use the data under rule 1 to cause further offence or facilitate further offence by another |
Computer Misuse Act how to be guilty of rule #3 | Guilty if the suspect commits any act to cause the unauthorized modification of the contents of a computer and has the requisite intent and knowledge |
Computer Misuse Act rule 3, what acts are punishable | Impairing the operation of the computer |
Personal Data | Data that allows you to identify living people |
Information Commissioner | Ensures the upholding of the data protection act |
Data User | The person who processes the data - restricted use |
Data Subject | The person the data is about |
Data Protection Act 8 principles |
|
RIPA | Regulation of Investigatory Powers Act 2000 |
RIPA uses | Allows certain organisations to monitor the online activity and communication of individuals |
RIPA 6 parts |
|
CDPA | Copyright, Design and Patents Act 1988 |
CDPA uses | Prevents creators of books, music, video, software etc from having their work illegally copied |
What can digital copying be? | Of the same quality as the original |