{"id":810,"date":"2018-02-02T08:40:48","date_gmt":"2018-02-02T08:40:48","guid":{"rendered":""},"modified":"2019-07-03T12:37:12","modified_gmt":"2019-07-03T12:37:12","slug":"computer-misuse-act-2","status":"publish","type":"post","link":"https:\/\/www.lawteacher.net\/free-law-essays\/technology-law\/computer-misuse-act-2.php","title":{"rendered":"Computer Misuse Act"},"content":{"rendered":"<p><!--Content starts here!--><\/p>\n<h3>Introduction<\/h3>\n<p>The growth of computer use over recent years has resulted in many operations becoming computerised, both in the work place and in everyday life. This reliance has resulted in the need for an effective legislation over them, to control crime and misuse, leading to the creation of the Computer misuse act 1990.<\/p>\n<h3>Overview Of The Legislation<\/h3>\n<p>The Computer Misuse Act 1990 protects and secures computer material against unauthorised access and any harmful type of modification. It has three offences, unauthorised access which can hold a sentence of imprisonment for six months, unauthorised access with intent to commit of facilitate commission of further offences which holds sentences of up to five years along with, unauthorised modification.<\/p>\n<p>Its main purpose is to prevent copyright infringements, hacking, using computer data for fraud or blackmail, the creation of viruses and the illegal deleting or altering of computer data. The act makes the offences which can be made on computers clear making sure the ever growing amount of people using them, both victims and criminals are aware of the offences they could be subject to, in both committing and being a part of them.<\/p>\n<h3>Cases Related To The Legislation<\/h3>\n<p>R v Pile- the defendant created Pathogen and Queeg viruses, using a Polymorphic encryption engine, to conceal viruses within computer programs, and was convicted for unauthorised modification.<\/p>\n<p>DPP v Bignall- Police officers obtained details relating to two motor cars from the police national computer, as this was a non police purpose it was classed as unauthorised use. However they did not commit an offence under section1therefore were acquitted.<\/p>\n<p>DPP v Ellis- The defendant had used non open access computers at a university, despite warnings so the appeal was dismissed, for committing unauthorised access.<\/p>\n<p>R v Feltis- Video surveillance showed a computer operator, disconnecting cables on IBM AS\/400 at Thorn UK, causing a cost of damage of \u00a3500,000 to the company, and was sentenced for unauthorised modification.<\/p>\n<h3>Examples Of The Legislation&#8217;s Importance<\/h3>\n<p>Preventing computer misuse in the work establishment is very important as it&#8217;s very easy to become a victim. The main ways to lower your chances of being effected is to continually change passwords and make sure they are strong to lower chances of receiving viruses and Trojan horses via emails. Make sure all computers have up-to-date virus protection software. Implement restrictions on the internet to sites which can be accessed by employees and monitor what they are using them for. And finally educate employees making them aware of computer crimes they can become subject to without knowing.<\/p>\n<h3>Summary<\/h3>\n<p>Currently the computer misuse act is the only way of preventing and dealing with computer misuse in the UK so is very important legislation, in keeping the 13.9 million people in the UK who own computers, safe from unauthorised access and modification, especially when dealing with businesses where it can result in huge losses of finance.<\/p>\n<h3>Table Of Cases<\/h3>\n<p>R v Pile [1995] Plymouth Crown Court<\/p>\n<p>DPP v Bignall [1998] 1 Cr. App. R. 1<\/p>\n<p>DPP v Ellis [2001] EWHC Admin 362 (QBD)<\/p>\n<p>R v Feltis [1996] EWCA Crim 776<\/p>\n<h3>Bibliography<\/h3>\n<p>Computer misuse act 1990<\/p>\n<p>Westlaw<\/p>\n<p>http:\/\/www.statistics.gov.uk\/pdfdir\/inta0806.pdf<\/p>\n<p>http:\/\/www.computerevidence.co.uk\/Cases\/CMA.htm<\/p>\n<p>Lloyd, J. (2008) Information technology law, Oxford: Oxford University Press<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The growth of computer use over recent years has resulted in many operations becoming computerised, both in the work place and in everyday life.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[85],"class_list":["post-810","post","type-post","status-publish","format-standard","hentry","category-free-law-essaystechnology-law","tag-uk-law"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v26.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Computer Misuse Act | LawTeacher.net<\/title>\n<meta name=\"description\" content=\"The growth of computer use over recent years has resulted in many operations becoming computerised, both in the work place and in everyday life.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.lawteacher.net\/free-law-essays\/technology-law\/computer-misuse-act-2.php\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Computer Misuse Act\" \/>\n<meta property=\"og:description\" content=\"The growth of computer use over recent years has resulted in many operations becoming computerised, both in the work place and in everyday life.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.lawteacher.net\/free-law-essays\/technology-law\/computer-misuse-act-2.php\" \/>\n<meta property=\"og:site_name\" content=\"LawTeacher.net\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/LawTeacherNet\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/LawTeacherNet\" \/>\n<meta property=\"article:published_time\" content=\"-0001-11-30T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.lawteacher.net\/wp-content\/uploads\/2025\/07\/LT-large-logo.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"LawTeacher\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@LawTeacherNet\" \/>\n<meta name=\"twitter:site\" content=\"@LawTeacherNet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"LawTeacher\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"ScholarlyArticle\",\"@id\":\"http:\/\/64.226.118.242:8001\/free-law-essays\/technology-law\/computer-misuse-act-2.php#article\",\"isPartOf\":{\"@id\":\"http:\/\/64.226.118.242:8001\/free-law-essays\/technology-law\/computer-misuse-act-2.php\"},\"author\":{\"name\":\"LawTeacher\",\"@id\":\"https:\/\/wp.lawteacher.net\/#\/schema\/person\/b99962c073c877c4ab8ee3d2486cd56e\"},\"headline\":\"Computer Misuse Act\",\"datePublished\":\"-0001-11-30T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"http:\/\/64.226.118.242:8001\/free-law-essays\/technology-law\/computer-misuse-act-2.php\"},\"wordCount\":538,\"publisher\":{\"@id\":\"https:\/\/wp.lawteacher.net\/#organization\"},\"keywords\":[\"UK Law\"],\"articleSection\":[\"Technology Law\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"http:\/\/64.226.118.242:8001\/free-law-essays\/technology-law\/computer-misuse-act-2.php\",\"url\":\"http:\/\/64.226.118.242:8001\/free-law-essays\/technology-law\/computer-misuse-act-2.php\",\"name\":\"Computer Misuse Act | LawTeacher.net\",\"isPartOf\":{\"@id\":\"https:\/\/wp.lawteacher.net\/#website\"},\"datePublished\":\"-0001-11-30T00:00:00+00:00\",\"description\":\"The growth of computer use over recent years has resulted in many operations becoming computerised, both in the work place and in everyday life.\",\"breadcrumb\":{\"@id\":\"http:\/\/64.226.118.242:8001\/free-law-essays\/technology-law\/computer-misuse-act-2.php#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/64.226.118.242:8001\/free-law-essays\/technology-law\/computer-misuse-act-2.php\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/64.226.118.242:8001\/free-law-essays\/technology-law\/computer-misuse-act-2.php#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/wp.lawteacher.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Computer Misuse Act\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/wp.lawteacher.net\/#website\",\"url\":\"https:\/\/wp.lawteacher.net\/\",\"name\":\"Law Teacher\",\"description\":\"The Law Essay Professionals\",\"publisher\":{\"@id\":\"https:\/\/wp.lawteacher.net\/#organization\"},\"alternateName\":\"LawTeacher.net\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/wp.lawteacher.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/wp.lawteacher.net\/#organization\",\"name\":\"Law Teacher\",\"alternateName\":\"LawTeacher.net\",\"url\":\"https:\/\/wp.lawteacher.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/wp.lawteacher.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.lawteacher.net\/wp-content\/uploads\/2025\/07\/LT-logo.jpg\",\"contentUrl\":\"https:\/\/www.lawteacher.net\/wp-content\/uploads\/2025\/07\/LT-logo.jpg\",\"width\":250,\"height\":250,\"caption\":\"Law Teacher\"},\"image\":{\"@id\":\"https:\/\/wp.lawteacher.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/LawTeacherNet\/\",\"https:\/\/x.com\/LawTeacherNet\",\"https:\/\/api.whatsapp.com\/send\/?phone=447723491966&text&type=phone_number&app_absent=0\"],\"description\":\"Law Teacher provides academic writing services for law students throughout the world.\",\"email\":\"contact@lawteacher.net\",\"telephone\":\"+44 115 966 7966\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"51\",\"maxValue\":\"200\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/wp.lawteacher.net\/#\/schema\/person\/b99962c073c877c4ab8ee3d2486cd56e\",\"name\":\"LawTeacher\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/wp.lawteacher.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4fdfab0a9ef25209f111018ecc8a983e19e57c5066a9277217a119582ccbeed3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4fdfab0a9ef25209f111018ecc8a983e19e57c5066a9277217a119582ccbeed3?s=96&d=mm&r=g\",\"caption\":\"LawTeacher\"},\"description\":\"LawTeacher.net is the UK's leading provider of academic legal support, offering both writing services and an extensive collection of law study resources for students in the UK and overseas. Founded in 2003 by Grey's Inn graduate Barclay Littlewood, the Company was built on a commitment to excellence, with unique guarantees and a high standard of service from day one. The team includes over 500 UK legally qualified writing experts, with many practising solicitors and barristers, and several former lecturers.\",\"sameAs\":[\"https:\/\/www.lawteacher.net\",\"https:\/\/www.facebook.com\/LawTeacherNet\",\"https:\/\/x.com\/LawTeacherNet\",\"https:\/\/gravatar.com\/lawteacherprofile\"],\"knowsAbout\":[\"Contract Law\",\"Criminal Law\",\"Constitutional and Administrative Law\",\"EU Law\",\"Tort Law\",\"Property Law\",\"Equity and Trusts\",\"Jurisprudence\",\"Company Law\",\"Commercial Law\",\"Family Law\",\"Human Rights Law\",\"Employment Law\",\"Evidence\",\"Public International Law\",\"Legal Research and Methods\",\"Dispute Resolution\",\"Business Law and Practice\",\"Civil Litigation\",\"Criminal Litigation\",\"Professional Conduct\",\"Taxation\",\"Wills and Administration of Estates\",\"Solicitors\u2019 Accounts\"],\"url\":\"https:\/\/www.lawteacher.net\/author\/lawteacher\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Computer Misuse Act | LawTeacher.net","description":"The growth of computer use over recent years has resulted in many operations becoming computerised, both in the work place and in everyday life.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.lawteacher.net\/free-law-essays\/technology-law\/computer-misuse-act-2.php","og_locale":"en_GB","og_type":"article","og_title":"Computer Misuse Act","og_description":"The growth of computer use over recent years has resulted in many operations becoming computerised, both in the work place and in everyday life.","og_url":"https:\/\/www.lawteacher.net\/free-law-essays\/technology-law\/computer-misuse-act-2.php","og_site_name":"LawTeacher.net","article_publisher":"https:\/\/www.facebook.com\/LawTeacherNet\/","article_author":"https:\/\/www.facebook.com\/LawTeacherNet","article_published_time":"-0001-11-30T00:00:00+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.lawteacher.net\/wp-content\/uploads\/2025\/07\/LT-large-logo.webp","type":"image\/webp"}],"author":"LawTeacher","twitter_card":"summary_large_image","twitter_creator":"@LawTeacherNet","twitter_site":"@LawTeacherNet","twitter_misc":{"Written by":"LawTeacher","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"ScholarlyArticle","@id":"http:\/\/64.226.118.242:8001\/free-law-essays\/technology-law\/computer-misuse-act-2.php#article","isPartOf":{"@id":"http:\/\/64.226.118.242:8001\/free-law-essays\/technology-law\/computer-misuse-act-2.php"},"author":{"name":"LawTeacher","@id":"https:\/\/wp.lawteacher.net\/#\/schema\/person\/b99962c073c877c4ab8ee3d2486cd56e"},"headline":"Computer Misuse Act","datePublished":"-0001-11-30T00:00:00+00:00","mainEntityOfPage":{"@id":"http:\/\/64.226.118.242:8001\/free-law-essays\/technology-law\/computer-misuse-act-2.php"},"wordCount":538,"publisher":{"@id":"https:\/\/wp.lawteacher.net\/#organization"},"keywords":["UK Law"],"articleSection":["Technology Law"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"http:\/\/64.226.118.242:8001\/free-law-essays\/technology-law\/computer-misuse-act-2.php","url":"http:\/\/64.226.118.242:8001\/free-law-essays\/technology-law\/computer-misuse-act-2.php","name":"Computer Misuse Act | LawTeacher.net","isPartOf":{"@id":"https:\/\/wp.lawteacher.net\/#website"},"datePublished":"-0001-11-30T00:00:00+00:00","description":"The growth of computer use over recent years has resulted in many operations becoming computerised, both in the work place and in everyday life.","breadcrumb":{"@id":"http:\/\/64.226.118.242:8001\/free-law-essays\/technology-law\/computer-misuse-act-2.php#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["http:\/\/64.226.118.242:8001\/free-law-essays\/technology-law\/computer-misuse-act-2.php"]}]},{"@type":"BreadcrumbList","@id":"http:\/\/64.226.118.242:8001\/free-law-essays\/technology-law\/computer-misuse-act-2.php#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wp.lawteacher.net\/"},{"@type":"ListItem","position":2,"name":"Computer Misuse Act"}]},{"@type":"WebSite","@id":"https:\/\/wp.lawteacher.net\/#website","url":"https:\/\/wp.lawteacher.net\/","name":"Law Teacher","description":"The Law Essay Professionals","publisher":{"@id":"https:\/\/wp.lawteacher.net\/#organization"},"alternateName":"LawTeacher.net","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wp.lawteacher.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/wp.lawteacher.net\/#organization","name":"Law Teacher","alternateName":"LawTeacher.net","url":"https:\/\/wp.lawteacher.net\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/wp.lawteacher.net\/#\/schema\/logo\/image\/","url":"https:\/\/www.lawteacher.net\/wp-content\/uploads\/2025\/07\/LT-logo.jpg","contentUrl":"https:\/\/www.lawteacher.net\/wp-content\/uploads\/2025\/07\/LT-logo.jpg","width":250,"height":250,"caption":"Law Teacher"},"image":{"@id":"https:\/\/wp.lawteacher.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/LawTeacherNet\/","https:\/\/x.com\/LawTeacherNet","https:\/\/api.whatsapp.com\/send\/?phone=447723491966&text&type=phone_number&app_absent=0"],"description":"Law Teacher provides academic writing services for law students throughout the world.","email":"contact@lawteacher.net","telephone":"+44 115 966 7966","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"51","maxValue":"200"}},{"@type":"Person","@id":"https:\/\/wp.lawteacher.net\/#\/schema\/person\/b99962c073c877c4ab8ee3d2486cd56e","name":"LawTeacher","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/wp.lawteacher.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4fdfab0a9ef25209f111018ecc8a983e19e57c5066a9277217a119582ccbeed3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4fdfab0a9ef25209f111018ecc8a983e19e57c5066a9277217a119582ccbeed3?s=96&d=mm&r=g","caption":"LawTeacher"},"description":"LawTeacher.net is the UK's leading provider of academic legal support, offering both writing services and an extensive collection of law study resources for students in the UK and overseas. Founded in 2003 by Grey's Inn graduate Barclay Littlewood, the Company was built on a commitment to excellence, with unique guarantees and a high standard of service from day one. The team includes over 500 UK legally qualified writing experts, with many practising solicitors and barristers, and several former lecturers.","sameAs":["https:\/\/www.lawteacher.net","https:\/\/www.facebook.com\/LawTeacherNet","https:\/\/x.com\/LawTeacherNet","https:\/\/gravatar.com\/lawteacherprofile"],"knowsAbout":["Contract Law","Criminal Law","Constitutional and Administrative Law","EU Law","Tort Law","Property Law","Equity and Trusts","Jurisprudence","Company Law","Commercial Law","Family Law","Human Rights Law","Employment Law","Evidence","Public International Law","Legal Research and Methods","Dispute Resolution","Business Law and Practice","Civil Litigation","Criminal Litigation","Professional Conduct","Taxation","Wills and Administration of Estates","Solicitors\u2019 Accounts"],"url":"https:\/\/www.lawteacher.net\/author\/lawteacher"}]}},"_links":{"self":[{"href":"https:\/\/www.lawteacher.net\/wp-json\/wp\/v2\/posts\/810","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lawteacher.net\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lawteacher.net\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lawteacher.net\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lawteacher.net\/wp-json\/wp\/v2\/comments?post=810"}],"version-history":[{"count":0,"href":"https:\/\/www.lawteacher.net\/wp-json\/wp\/v2\/posts\/810\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.lawteacher.net\/wp-json\/wp\/v2\/media?parent=810"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lawteacher.net\/wp-json\/wp\/v2\/categories?post=810"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lawteacher.net\/wp-json\/wp\/v2\/tags?post=810"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}