Студопедия
Новини освіти і науки:
МАРК РЕГНЕРУС ДОСЛІДЖЕННЯ: Наскільки відрізняються діти, які виросли в одностатевих союзах


РЕЗОЛЮЦІЯ: Громадського обговорення навчальної програми статевого виховання


ЧОМУ ФОНД ОЛЕНИ ПІНЧУК І МОЗ УКРАЇНИ ПРОПАГУЮТЬ "СЕКСУАЛЬНІ УРОКИ"


ЕКЗИСТЕНЦІЙНО-ПСИХОЛОГІЧНІ ОСНОВИ ПОРУШЕННЯ СТАТЕВОЇ ІДЕНТИЧНОСТІ ПІДЛІТКІВ


Батьківський, громадянський рух в Україні закликає МОН зупинити тотальну сексуалізацію дітей і підлітків


Відкрите звернення Міністру освіти й науки України - Гриневич Лілії Михайлівні


Представництво українського жіноцтва в ООН: низький рівень культури спілкування в соціальних мережах


Гендерна антидискримінаційна експертиза може зробити нас моральними рабами


ЛІВИЙ МАРКСИЗМ У НОВИХ ПІДРУЧНИКАХ ДЛЯ ШКОЛЯРІВ


ВІДКРИТА ЗАЯВА на підтримку позиції Ганни Турчинової та права кожної людини на свободу думки, світогляду та вираження поглядів



To be read after Text 2

Computer crime

Computers can be used to commit all kinds of crimes. It is sug­gested that one could commit murder by computer if one hacked


into an air-traffic controller's computer system and caused aero­planes to crash, with the intent1 to kill the passengers. Not surpris­ingly crimes that specifically relate to computers are relatively recent creations of statute.

Some specific computer crimes are set out in the Computer Misuse Act 1990. It is designed to protect information kept on computers. There are three particular reasons why such informa­tion needs protection by the criminal law. Firstly it is said to be very hard to safeguard information stored on a computer, particu­larly as often the information is intended to be accessed by a num­ber of authorized people. By contrast information on paper can be kept in a safe or other secure2 place. Secondly the ease of destroy­ing or corrupting data on a computer means it deserves3 special protection, particularly as it is not always possible for the owner of the computer to realize that the data have been looked at. Thirdly the highly confidential4 nature of the kind of information kept on computers (often concerning many members of the public) is such that it needs particular protection.

The act prohibits5 «hacking», i.e., gaining6 unauthorized access to computer material. The offence is committed if a defendant is en­tering the computer just to see what he can find. The Act also con­tains a more serious offence of doing this with the intent to commit another offence. The most common example is likely to be a decep­tion (обман) offence or theft. A defendant who obtained data which he intended to use in the future to commit an offence of obtaining property by deception will still be guilty of the more serious offence.

There is also an offence of modifying computer material in an unauthorized way. This section is clearly aimed at people who alter7 computer data with intent to corrupt a program. The intent does not need to be directed towards any particular computer or data. Modification is defined as including removal of any program or data on a computer and includes adding to the contents or erasing8 them.

It also includes temporary9 modification. It would appear to cover sending someone a disc with a virus on it that was intended to damage the working of the computer.

It is possible to be guilty of criminal damage of computers if there has been a physical change to some components of the com­puter.


Читайте також:

  1. A practice what they learn day after day
  2. Adverbs the hereafter
  3. C. After you have been introduced to someone, it is polite to ask a few general questions to get acquainted.
  4. E. A host (H) and a guest (G) are sitting in the airport lounge after a successful business meeting. Role-play the dialogue according to the model given below.
  5. How is your day different to Lisa’s? Using sequencers (after that, finally, first, then, next) in the correct order report to the group about your daily routine.
  6. LINGUISTIC RESEARCH AFTER CHOMSKY: CONSTRAINTS
  7. Read the text and do the tasks after it
  8. Renewed fears of nuclear weapons after Washington threatens to retaliate for Russian development of new cruise missile
  9. Setzen Sie die folgenden Dialoge fort und machen Sie sie durch die Partikeln lebhafter.
  10. The Almaty State University named after Abai
  11. To be read after Lesson 1
  12. To be read after Lesson 10




Переглядів: 352

<== попередня сторінка | наступна сторінка ==>
Hear / treat | Notes to the Text

Не знайшли потрібну інформацію? Скористайтесь пошуком google:

  

© studopedia.com.ua При використанні або копіюванні матеріалів пряме посилання на сайт обов'язкове.


Генерація сторінки за: 0.017 сек.