179:
640:
publications. Time-locking is the practice of disabling functionality or whole programs in order to ensure that software, potentially delivered on condition of further payment, will "expire" and thus no longer function. In one featured case, a "developer of bespoke systems in the
Midlands" activated a time lock on a piece of software over a dispute with a client about an unpaid bill. The client reported this to the police who charged the programmer under Section 3 of the Act, with the outcome being a conviction by a magistrates court, with a conditional discharge given by the magistrate meaning that no punishment was applied on condition that the programmer did not re-offend.
446:
attempt to force these facts into the language of an Act not designed to fit them produced grave difficulties for both judge and jury which we would not wish to see repeated. The appellants' conduct amounted in essence, as already stated, to dishonestly gaining access to the relevant
Prestel data bank by a trick. That is not a criminal offence. If it is thought desirable to make it so, that is a matter for the legislature rather than the courts.
881:
the law when researching vulnerabilities or investigating cyber threat actors. Furthermore, 91 per cent of businesses that responded to the report’s survey suggested they had been put at a competitive disadvantage by the Act, and that reform would allow their organisation to reap significant productivity improvements, growth and resilience benefits. The report recommended that the government consider implementing the two above amendments.
67:
559:, web or other services, constitute the offence. Even if the initial access is authorised, subsequent exploration, if there is a hierarchy of privileges in the system, may lead to entry to parts of the system for which the requisite privileges are lacking and the offence will be committed. Looking over a user's shoulder or using sophisticated electronic equipment to monitor the
627:
cause a complete system malfunction, are all criminal "modifications". In 2004, John
Thornley pleaded guilty to four offences under §3, having mounted an attack on a rival site, and introduced a Trojan horse to bring it down on several occasions, but it was recognized that the wording of the offence needed to be clarified to confirm that all forms of
407:, had observed the password of a Prestel engineer. The engineer's username was 22222222 and the password used was 1234. This later gave rise to accusations that British Telecom (BT) had not taken security seriously. Armed with this information, the pair explored the system, even gaining access to the personal message box of
655:
In 2004, the All-Party
Internet Group published its review of the law and highlighted areas for development. Their recommendations led to the drafting of the Computer Misuse Act 1990 (Amendment) Bill which sought to amend the CMA to comply with the European Convention on Cyber Crime. Under its terms,
537:
who program their computers to search through password permutations are therefore liable, even if their attempts to log on are rejected by the target computer. The only precondition to liability is that the hacker should be aware that the access attempted is unauthorised. Thus, using another person's
686:
in 2011, there were discussions about amending the law to define "smart" phones (i.e. those with
Internet browsers and other connectivity features) as computers under the Act. Such an amendment might also introduce a new offence of "making information available with intent", i.e. publicly disclosing
532:
The sections 2 and 3 offences are intended to deter the more serious criminals from using a computer to assist in the commission of a criminal offence or from impairing or hindering access to data stored in a computer. The basic section 1 offence is to attempt or achieve access to a computer or the
880:
In
November 2020, the CyberUp Campaign and TechUK published a new report on the Computer Misuse Act, which was the first piece of work to quantify and analyse the views of the wider UK security community. The report found that 80 per cent of cyber security professionals have worried about breaking
788:
In May 2021, UK Home
Secretary Priti Patel announced the formal review of the Computer Misuse Act. She also launched a Call for Information on the Act that seeks views on whether there is activity causing harm in the area covered by the Act that is not adequately covered by the offences, including
626:
to obtain identity data or to acquire any other data from an unauthorised source, or modifying the operating system files or some aspect of the computer's functions to interfere with its operation or prevent access to any data, including the destruction of files, or deliberately generating code to
678:
Section 37 ("Making, supplying or obtaining articles for use in computer misuse offences") inserts a new section 3A into the 1990 Act and has drawn considerable criticism from IT professionals, as many of their tools can be used by criminals in addition to their legitimate purposes, and thus fall
639:
Although the Act ostensibly targets those who wish to gain unauthorised access to computer systems for various purposes, its implications on previously relatively widespread or well-known industry practices such as the "time-locking" of software have been described in various computing industry
445:
We have accordingly come to the conclusion that the language of the Act was not intended to apply to the situation which was shown to exist in this case. The submissions at the close of the prosecution case should have succeeded. It is a conclusion which we reach without regret. The
Procrustean
835:
The coalition was formed based on the shared view that an update of the UK's cyber crime legislation is necessary to protect national security and to increase economic growth for the UK cyber security industry. The
Campaign refers to Section 1 of the Act, "prohibiting unauthorised access to
433:. Their counsel cited the lack of evidence showing the two had attempted to obtain material gain from their exploits, and claimed that the Forgery and Counterfeiting Act had been misapplied to their conduct. They were acquitted by the Lord Justice Lane, but the prosecution appealed to the
850:
On 29 June 2020, to celebrate the Act's 30th birthday, the CyberUp
Campaign wrote an open letter to the prime minister on behalf of a number of cyber security industry figures to highlight the Act's outdatedness in a time of rapid digital advancement. This was published in
803:(NCA), warned that "the Computer Misuse Act went through Parliament at a time when cyber wasn't the tool that it is now is to enable all sorts of crimes like fraud" and talked about plans to introduce reforms to make sure the law was "fit for purpose in the modern age".
775:
information systems until the end of 2020 for the purposes of the Act to support and maintain the security of any network and information system which supports, directly or indirectly, the provision of NHS services or public health services intended to address
723:
Section 41 (new Section 3ZA of the Computer Misuse Act 1990). Unauthorised acts causing, or creating risk of, serious damage – punishable by up to 14 years in prison or a fine or both, possible life imprisonment where human welfare or national security were
868:
and recommended that "the Computer Misuse Act should be updated to reflect modern use of personal electronic devices". While the government response to the report said that the Act was regularly reviewed to determine the benefits of legislative change, the
602:. Thus, the §1 offence is committed as soon as the unauthorised access is attempted, and the §2 offence overtakes liability as soon as specific access is made for the criminal purpose. The §3 offence is specifically aimed at those who write and circulate a
730:
Section 43. Territorial scope of computer misuse - amendments to Sections 4, 5 and 10 making the primary territorial scope the United Kingdom but can be worldwide especially if the perpetrator (or conspirators) is British and broke local
1830:
550:
without proper authority to access data or a program, or to alter, delete, copy or move a program or data, or simply to output a program or data to a screen or printer, or to impersonate that other person using
815:
in an article that echoed the call for "urgent reform". The CyberUp Campaign is made up of a wide coalition of supportive bodies from within the cyber security industry, including the large cyber consultancies
836:
computers", stating that it inadvertently criminalises a large amount of cyber security and threat intelligence research and investigation which is frequently conducted by UK cyber security professionals.
789:
whether the legislation is fit for use following the technological advances since the CMA was introduced, and any other suggestions on how the legislative response to cyber crime could be strengthened.
843:
Amend the law to allow cyber security and threat intelligence researchers acting in the public interest to explain and justify their actions and to allow the detection or prevention of crime.
846:
Create a set of clear legal definitions to ensure that cyber security and threat intelligence researchers who reasonably believe they have authorisation to act can legitimately do so.
806:
In January 2020, the Criminal Law Reform Now Network (CLRNN) published a comprehensive report highlighting the Act's shortcomings and making detailed recommendations for reform.
649:
284:
809:
In the same month, the CyberUp Campaign was established with the intention of lobbying the UK government to "update and upgrade" the Act. The Campaign's launch was covered by
519:
unauthorised modification of computer material, punishable by twelve months/maximum fine (or six months in Scotland) on summary conviction and/or ten years/fine on indictment;
652:('Conspiracy') amended Section 8 (relevance of external law), Section 9(2)(b) (British citizenship immaterial: conspiracy) and Section 16 (application to Northern Ireland).
1696:
1826:
865:
861:
366:
laws, as it is seen "as a robust and flexible piece of legislation in terms of dealing with cybercrime". Several amendments have been passed to keep the Act up to date.
418:
with defrauding BT by manufacturing a "false instrument", namely the internal condition of BT's equipment after it had processed Gold's eavesdropped password. Tried at
1898:
1726:
1908:
508:
unauthorised access with intent to commit or facilitate commission of further offences, punishable by twelve months/maximum fine (or six months in Scotland) on
792:
The review of the Act follows growing calls, in recent year, for a complete government review of the Computer Misuse Act, in order to bring about new reforms.
501:
unauthorised access to computer material, punishable by twelve months' imprisonment (or six months in Scotland) and/or a fine "not exceeding level 5 on the
279:
969:
IISS Global Perspectives – Power in Cyberspace. Q&A with Nigel Inkster, Director, Transnational Threats and Political Risk, IISS. 18 January 2011.
84:
1520:
1580:
683:
570:
The §§2–3 offences are aggravated offences, requiring a specific intent to commit another offence (for these purposes, the other offences are to be
438:
434:
414:
Prestel installed monitors on the suspect accounts and passed information thus obtained to the police. The pair were charged under section 1 of the
1490:
712:
Section 37. Making, supplying or obtaining articles for use in computer misuse offences, punishable by up to two years in prison or a fine or both.
1775:
1663:
944:
201:
1801:
1024:
1903:
404:
709:
Section 36. Unauthorised acts with intent to impair operation of computer, etc. punishable by up to ten years in prison or a fine or both.
656:
the maximum sentence of imprisonment for breaching the Act changed from six months to two years. It also sought to explicitly criminalise
430:
415:
1389:
1359:
1329:
131:
1640:
1610:
1460:
1430:
1172:
1142:
451:
1802:"Cyber security experts say they are being prevented from stopping computer fraud because criminals have to let them access machines"
1299:
103:
951:
829:
150:
1550:
737:
Section 47. Serious Crime Prevention Orders: meaning of "Serious Offence" - adds Computer Misuse to list of serious crimes in the
1688:
408:
331:
465:
Since the case, both defendants have written extensively about IT matters. Gold, who detailed the entire case at some length in
196:
An Act to make provision for securing computer material against unauthorised access or modification; and for connected purposes.
110:
497:. The bill, supported by the government, came into effect in 1990. Sections 1-3 of the Act introduced three criminal offences:
1893:
744:
Section 86. Transition and savings provisions – requires Sections 42 and 43 to be brought into force before they can be used.
88:
1718:
1752:
450:
The Law Lords' ruling led many legal scholars to believe that hacking was not unlawful as the law then stood. The English
117:
38:
672:
354:
from serious computer criminals. The Act has nonetheless become a model from which several other countries, including
289:
99:
534:
338:(1988) 1 AC 1063. Critics of the bill complained that it was introduced hastily, was poorly thought out, and that
77:
1249:
560:
183:
1869:
706:
Section 35. Unauthorised access to computer material, punishable by up to two years in prison or a fine or both.
987:
900:
870:
777:
657:
623:
339:
486:
467:
1061:, who would stretch his victims (or cut off their legs) in order to fit a bed for which they were ill suited.
1864:
1016:
772:
691:
490:
455:
294:
738:
1266:
857:, with the headline "Cyber security experts say they are being prevented from stopping computer fraud".
800:
751:
419:
191:
590:). So a hacker who obtains access to a system intending to transfer money or shares, intends to commit
1827:"4 out of 5 cyber security professionals worry about breaking the law when defending UK, report finds"
1250:"House of Commons - Privilege: Hacking of Members' mobile phones - Standards and Privileges Committee"
877:, highlighted in January 2021 that no progress had been made towards implementing the recommendation.
124:
363:
1859:
853:
727:
Section 42. Obtaining articles for purposes relating to computer misuse – amendments to Section 3A.
665:
564:
359:
1047:
611:
509:
702:
The amendments to the Computer Misuse Act 1990 by Part 5 of the Police and Justice Act 2006 are
1096:
980:
429:
Although the fines imposed were modest, they elected to appeal to the Criminal Division of the
1873:
1020:
1010:
747:
Schedule 1. Amendments to Serious Crimes Act 2007: Scotland – similar changes to Scottish law.
628:
258:
1235:
940:
including reference to the case of Christopher Pile (aka 'the Black Baron') in November 1995.
533:
data it stores, by inducing a computer to perform any function with intent to secure access.
1072:
719:
The amendments to the Computer Misuse Act 1990 by Part 2 of the Serious Crime Act 2015. are
615:
423:
376:
351:
750:
Schedule 4. Minor and consequential amendments – changes Computer Misuse Act 1990 and the
1410:
1381:
1351:
1321:
1209:
1632:
1602:
1572:
1542:
1512:
1482:
1452:
1422:
1164:
1134:
1109:
913:
1291:
895:
890:
603:
502:
494:
462:
related to deception, but the English Law Commission believed a new law was necessary.
214:
690:
In 2015, the Act was further amended by Part 2 sections 41 to 44 (plus others) of the
311:
1887:
938:
607:
384:
343:
342:
was often difficult to prove, with the bill inadequately differentiating "joyriding"
914:"The Computer Misuse Act 1990: lessons from its past and predictions for its future"
734:
Section 44. Savings – covers seizure and enactment amendments to Sections 10 and 16.
426:(five against Schifreen, four against Gold) and fined, respectively, £750 and £600.
811:
764:
687:
a password for someone's phone or computer so that others can access it illegally.
661:
475:
392:
380:
347:
248:
17:
1878:
403:
service. While at a trade show, Schifreen, by doing what latterly became known as
796:
556:
66:
1748:
1058:
874:
587:
575:
543:
513:
318:
471:, has presented at conferences alongside the arresting officers in the case.
935:
Section 3 of the Computer Misuse Act 1990: an Antidote for Computer Viruses!
817:
660:
and other crimes facilitated by denial-of-service. The Bill did not receive
599:
595:
579:
459:
864:, responsible for oversight of the UK intelligence services, published the
1110:"Computer Misuse Act 1990; 1990 c. 18 Computer misuse offences Section 1"
821:
619:
547:
539:
400:
1854:
396:
458:
concluded that intrusion was adequately covered in Scotland under the
825:
571:
552:
355:
567:("electronic eavesdropping") is outside the scope of this offence.
1879:
A list of Computer Misuse Act cases compiled by Michael J L Turner
591:
583:
388:
1210:"Criminal Justice (Terrorism and Conspiracy) Act 1998 Schedule 1"
768:
454:
and its counterpart in Scotland both considered the matter. The
1776:"Cybercrime laws need urgent reform to protect UK, says report"
741:
including being grounds for compulsory winding up of a company.
362:, have drawn inspiration when subsequently drafting their own
60:
1073:"'80s hacker turned journo, IT crime ace Steve Gold logs off"
828:. In November 2020, the campaign gained the backing of the
391:
in late 1984 and early 1985, gained unauthorised access to
1689:"Home Secretary Priti Patel speech to CyberUK Conference"
42:
986:. School of Computer Science. Professional Computing.
675:
contain amendments to the Computer Misuse Act 1990.
650:
Criminal Justice (Terrorism and Conspiracy) Act 1998
285:
Criminal Justice (Terrorism and Conspiracy) Act 1998
1057:Here Lord Brandon alludes to the classical myth of
334:, introduced partly in response to the decision in
317:
310:
303:
272:
267:
257:
247:
242:
220:
210:
200:
190:
91:. Unsourced material may be challenged and removed.
928:Computer Misuse: Response, Regulation and the Law
866:Intelligence and Security Committee Russia report
862:Intelligence and Security Committee of Parliament
1719:"Computer Misuse Act 1990: call for information"
1664:"Hancock grants GCHQ powers over NHS IT systems"
839:The Campaign has called for two key amendments:
1261:
1259:
1012:Information Technology Law: The Law and Society
443:
715:Section 38. Transitional and saving provision.
8:
594:, or to obtain confidential information for
166:
437:. In 1988, the Lords upheld the acquittal.
26:
1870:Amendments to the Computer Misuse Act 1990
280:Criminal Justice and Public Order Act 1994
165:
1865:Wording of the failed 2004 amendment bill
1382:"Police and Justice Act 2006, section 37"
1352:"Police and Justice Act 2006, section 36"
1322:"Police and Justice Act 2006, section 35"
151:Learn how and when to remove this message
1749:"Reforming the Computer Misuse Act 1990"
1194:Naylor, Chris (July 1994). "Locked up".
684:News International phone hacking scandal
32:This is an accepted version of this page
1899:Computer security in the United Kingdom
1411:Police and Justice Act 2006, section 38
962:
28:
1909:United Kingdom Acts of Parliament 1990
1613:from the original on 11 September 2016
1302:from the original on 26 September 2010
1175:from the original on 26 September 2010
1145:from the original on 26 September 2010
1046:HL 21 April 1988, AC 1063 summary at
946:Computer Misuse Act (amendment) speech
485:Based on the ELC's recommendations, a
1833:from the original on 19 November 2020
1165:"Computer Misuse Act 1990, section 3"
1135:"Computer Misuse Act 1990, section 2"
312:Text of statute as originally enacted
7:
1755:from the original on 18 January 2021
1603:"Serious Crime Act 2015, schedule 1"
1573:"Serious Crime Act 2015, section 86"
1543:"Serious Crime Act 2015, section 47"
1513:"Serious Crime Act 2015, section 44"
1483:"Serious Crime Act 2015, section 43"
1463:from the original on 5 February 2016
1453:"Serious Crime Act 2015, section 42"
1423:"Serious Crime Act 2015, section 41"
1392:from the original on 29 October 2010
1362:from the original on 31 October 2010
1332:from the original on 29 October 2010
89:adding citations to reliable sources
1633:"Serious Crime Act 2015, section 4"
1583:from the original on 6 January 2016
635:Implications for industry practices
525:
416:Forgery and Counterfeiting Act 1981
1553:from the original on 28 March 2016
824:and the cyber industry trade body
319:Revised text of statute as amended
57:
1774:Bowcott, Owen (22 January 2020).
1523:from the original on 21 June 2016
1493:from the original on 10 July 2016
1433:from the original on 13 July 2015
830:Confederation of British Industry
1729:from the original on 11 May 2021
1699:from the original on 11 May 2021
1071:Leyden, John (13 January 2015).
332:Parliament of the United Kingdom
177:
65:
1662:Carding, Nick (29 April 2020).
1643:from the original on 4 May 2015
981:"Lecture 2: Legal Perspectives"
574:, and so include all the major
76:needs additional citations for
1800:Bowcott, Owen (29 June 2020).
1:
1292:"Police and Justice Act 2006"
1904:Hacking (computer security)
1267:"Serious Crime Act of 2015"
673:Police and Justice Act 2006
290:Police and Justice Act 2006
1925:
1860:EURIM – IPPR E-Crime Study
930:(Cullomption, Willan 2009)
799:, Director General of the
648:Schedule 1 Part II of the
512:and/or five years/fine on
505:" (since 2015, unlimited);
473:
163:United Kingdom legislation
100:"Computer Misuse Act 1990"
979:Lee, Mark (Autumn 2014).
767:issued directions giving
671:Sections 35 to 38 of the
658:denial-of-service attacks
561:electromagnetic radiation
422:, they were convicted on
330:(c. 18) is an act of the
184:United Kingdom Parliament
176:
171:
1855:The Internet Crime Forum
1097:Computer Misuse Act 1990
988:University of Birmingham
901:Data Protection Act 1998
871:Shadow Foreign Secretary
523:(For other offences see
371:R v Gold & Schifreen
336:R v Gold & Schifreen
328:Computer Misuse Act 1990
222:Territorial extent
167:Computer Misuse Act 1990
39:latest accepted revision
1216:. The National Archives
1196:Personal Computer World
1017:Oxford University Press
1009:Murray, Andrew (2016).
773:National Health Service
664:because Parliament was
481:The Computer Misuse Act
456:Scottish Law Commission
1668:Health Service Journal
1637:www.legislation.gov.uk
1607:www.legislation.gov.uk
1577:www.legislation.gov.uk
1547:www.legislation.gov.uk
1517:www.legislation.gov.uk
1487:www.legislation.gov.uk
1457:www.legislation.gov.uk
1427:www.legislation.gov.uk
1386:www.legislation.gov.uk
1356:www.legislation.gov.uk
1326:www.legislation.gov.uk
1296:www.legislation.gov.uk
1169:www.legislation.gov.uk
1139:www.legislation.gov.uk
771:temporary powers over
759:Application to the NHS
739:Serious Crime Act 2007
692:Serious Crime Act 2015
448:
295:Serious Crime Act 2015
1894:Computing legislation
952:The Law Lords' ruling
801:National Crime Agency
752:Armed Forces Act 2006
631:attack are included.
487:private member's bill
474:Further information:
468:The Hacker's Handbook
420:Southwark Crown Court
383:, using conventional
1829:. CyberUp Campaign.
439:Lord Justice Brandon
364:information security
85:improve this article
1806:The Daily Telegraph
1198:. pp. 470–471.
918:Criminal Law Review
854:The Daily Telegraph
618:. Similarly, using
360:Republic of Ireland
168:
29:Page version status
18:Computer Misuse Act
1214:legislation.gov.uk
1114:legislation.gov.uk
937:(1996) 3 Web JCLI
860:In July 2020, the
795:In November 2019,
679:under section 3A.
510:summary conviction
489:was introduced by
35:
1874:Open Rights Group
1026:978-0-19-873246-4
926:Stefan Fafinski,
629:denial of service
324:
323:
268:Other legislation
229:England and Wales
172:Act of Parliament
161:
160:
153:
135:
16:(Redirected from
1916:
1843:
1842:
1840:
1838:
1823:
1817:
1816:
1814:
1812:
1797:
1791:
1790:
1788:
1786:
1771:
1765:
1764:
1762:
1760:
1745:
1739:
1738:
1736:
1734:
1715:
1709:
1708:
1706:
1704:
1685:
1679:
1678:
1676:
1674:
1659:
1653:
1652:
1650:
1648:
1629:
1623:
1622:
1620:
1618:
1599:
1593:
1592:
1590:
1588:
1569:
1563:
1562:
1560:
1558:
1539:
1533:
1532:
1530:
1528:
1509:
1503:
1502:
1500:
1498:
1479:
1473:
1472:
1470:
1468:
1449:
1443:
1442:
1440:
1438:
1419:
1413:
1408:
1402:
1401:
1399:
1397:
1378:
1372:
1371:
1369:
1367:
1348:
1342:
1341:
1339:
1337:
1318:
1312:
1311:
1309:
1307:
1288:
1282:
1281:
1279:
1277:
1271:
1263:
1254:
1253:
1246:
1240:
1239:
1232:
1226:
1225:
1223:
1221:
1206:
1200:
1199:
1191:
1185:
1184:
1182:
1180:
1161:
1155:
1154:
1152:
1150:
1131:
1125:
1124:
1122:
1120:
1106:
1100:
1094:
1088:
1087:
1085:
1083:
1068:
1062:
1055:
1049:
1044:
1038:
1037:
1035:
1033:
1015:(3rd ed.).
1006:
1000:
999:
997:
995:
985:
976:
970:
967:
797:Dame Lynne Owens
644:Latest situation
622:techniques or a
526:§ The amendments
424:specimen charges
405:shoulder surfing
377:Robert Schifreen
235:Northern Ireland
223:
181:
180:
169:
156:
149:
145:
142:
136:
134:
93:
69:
61:
21:
1924:
1923:
1919:
1918:
1917:
1915:
1914:
1913:
1884:
1883:
1872:covered by the
1851:
1846:
1836:
1834:
1825:
1824:
1820:
1810:
1808:
1799:
1798:
1794:
1784:
1782:
1773:
1772:
1768:
1758:
1756:
1747:
1746:
1742:
1732:
1730:
1725:. 11 May 2021.
1717:
1716:
1712:
1702:
1700:
1695:. 11 May 2021.
1687:
1686:
1682:
1672:
1670:
1661:
1660:
1656:
1646:
1644:
1631:
1630:
1626:
1616:
1614:
1601:
1600:
1596:
1586:
1584:
1571:
1570:
1566:
1556:
1554:
1541:
1540:
1536:
1526:
1524:
1511:
1510:
1506:
1496:
1494:
1481:
1480:
1476:
1466:
1464:
1451:
1450:
1446:
1436:
1434:
1421:
1420:
1416:
1409:
1405:
1395:
1393:
1380:
1379:
1375:
1365:
1363:
1350:
1349:
1345:
1335:
1333:
1320:
1319:
1315:
1305:
1303:
1290:
1289:
1285:
1275:
1273:
1272:. UK Government
1269:
1265:
1264:
1257:
1248:
1247:
1243:
1234:
1233:
1229:
1219:
1217:
1208:
1207:
1203:
1193:
1192:
1188:
1178:
1176:
1163:
1162:
1158:
1148:
1146:
1133:
1132:
1128:
1118:
1116:
1108:
1107:
1103:
1095:
1091:
1081:
1079:
1070:
1069:
1065:
1056:
1052:
1045:
1041:
1031:
1029:
1027:
1019:. p. 358.
1008:
1007:
1003:
993:
991:
983:
978:
977:
973:
968:
964:
960:
933:Yaman Akdeniz,
909:
887:
786:
763:In April 2020,
761:
700:
646:
637:
610:, whether on a
483:
478:
431:Court of Appeal
393:British Telecom
374:
306:
305:Status: Amended
299:
238:
221:
186:
178:
164:
157:
146:
140:
137:
94:
92:
82:
70:
55:
54:
53:
52:
51:
50:
34:
22:
15:
12:
11:
5:
1922:
1920:
1912:
1911:
1906:
1901:
1896:
1886:
1885:
1882:
1881:
1876:
1867:
1862:
1857:
1850:
1849:External links
1847:
1845:
1844:
1818:
1792:
1766:
1740:
1710:
1680:
1654:
1624:
1594:
1564:
1534:
1504:
1474:
1444:
1414:
1403:
1373:
1343:
1313:
1283:
1255:
1241:
1227:
1201:
1186:
1156:
1126:
1101:
1089:
1063:
1050:
1039:
1025:
1001:
971:
961:
959:
956:
955:
954:
949:
941:
931:
924:
912:Neil MacEwan,
908:
905:
904:
903:
898:
896:Internet fraud
893:
891:Computer crime
886:
883:
848:
847:
844:
785:
782:
760:
757:
756:
755:
748:
745:
742:
735:
732:
728:
725:
717:
716:
713:
710:
707:
699:
698:The amendments
696:
645:
642:
636:
633:
604:computer virus
521:
520:
517:
506:
503:standard scale
495:Michael Colvin
482:
479:
452:Law Commission
435:House of Lords
385:home computers
373:
368:
322:
321:
315:
314:
308:
307:
304:
301:
300:
298:
297:
292:
287:
282:
276:
274:
270:
269:
265:
264:
263:29 August 1990
261:
255:
254:
251:
245:
244:
240:
239:
237:
236:
233:
230:
226:
224:
218:
217:
215:Michael Colvin
212:
208:
207:
204:
198:
197:
194:
188:
187:
182:
174:
173:
162:
159:
158:
73:
71:
64:
56:
36:
30:
27:
25:
24:
23:
14:
13:
10:
9:
6:
4:
3:
2:
1921:
1910:
1907:
1905:
1902:
1900:
1897:
1895:
1892:
1891:
1889:
1880:
1877:
1875:
1871:
1868:
1866:
1863:
1861:
1858:
1856:
1853:
1852:
1848:
1832:
1828:
1822:
1819:
1807:
1803:
1796:
1793:
1781:
1777:
1770:
1767:
1754:
1750:
1744:
1741:
1728:
1724:
1720:
1714:
1711:
1698:
1694:
1690:
1684:
1681:
1669:
1665:
1658:
1655:
1642:
1638:
1634:
1628:
1625:
1612:
1608:
1604:
1598:
1595:
1582:
1578:
1574:
1568:
1565:
1552:
1548:
1544:
1538:
1535:
1522:
1518:
1514:
1508:
1505:
1492:
1488:
1484:
1478:
1475:
1462:
1458:
1454:
1448:
1445:
1432:
1428:
1424:
1418:
1415:
1412:
1407:
1404:
1391:
1387:
1383:
1377:
1374:
1361:
1357:
1353:
1347:
1344:
1331:
1327:
1323:
1317:
1314:
1301:
1297:
1293:
1287:
1284:
1268:
1262:
1260:
1256:
1251:
1245:
1242:
1237:
1231:
1228:
1215:
1211:
1205:
1202:
1197:
1190:
1187:
1174:
1170:
1166:
1160:
1157:
1144:
1140:
1136:
1130:
1127:
1115:
1111:
1105:
1102:
1098:
1093:
1090:
1078:
1074:
1067:
1064:
1060:
1054:
1051:
1048:
1043:
1040:
1028:
1022:
1018:
1014:
1013:
1005:
1002:
989:
982:
975:
972:
966:
963:
957:
953:
950:
948:
947:
943:Derek Wyatt,
942:
939:
936:
932:
929:
925:
922:
919:
915:
911:
910:
906:
902:
899:
897:
894:
892:
889:
888:
884:
882:
878:
876:
872:
867:
863:
858:
856:
855:
845:
842:
841:
840:
837:
833:
831:
827:
823:
819:
814:
813:
807:
804:
802:
798:
793:
790:
783:
781:
779:
774:
770:
766:
758:
753:
749:
746:
743:
740:
736:
733:
729:
726:
722:
721:
720:
714:
711:
708:
705:
704:
703:
697:
695:
693:
688:
685:
680:
676:
674:
669:
667:
663:
659:
653:
651:
643:
641:
634:
632:
630:
625:
621:
617:
613:
609:
605:
601:
597:
593:
589:
585:
581:
577:
573:
568:
566:
562:
558:
554:
549:
545:
541:
536:
530:
528:
527:
518:
515:
511:
507:
504:
500:
499:
498:
496:
492:
488:
480:
477:
472:
470:
469:
463:
461:
457:
453:
447:
442:
440:
436:
432:
427:
425:
421:
417:
412:
410:
409:Prince Philip
406:
402:
398:
394:
390:
386:
382:
378:
372:
369:
367:
365:
361:
357:
353:
349:
345:
341:
337:
333:
329:
320:
316:
313:
309:
302:
296:
293:
291:
288:
286:
283:
281:
278:
277:
275:
271:
266:
262:
260:
256:
252:
250:
246:
241:
234:
231:
228:
227:
225:
219:
216:
213:
211:Introduced by
209:
205:
203:
199:
195:
193:
189:
185:
175:
170:
155:
152:
144:
133:
130:
126:
123:
119:
116:
112:
109:
105:
102: –
101:
97:
96:Find sources:
90:
86:
80:
79:
74:This article
72:
68:
63:
62:
59:
48:
44:
40:
33:
19:
1835:. Retrieved
1821:
1809:. Retrieved
1805:
1795:
1783:. Retrieved
1780:The Guardian
1779:
1769:
1757:. Retrieved
1743:
1731:. Retrieved
1722:
1713:
1701:. Retrieved
1692:
1683:
1671:. Retrieved
1667:
1657:
1645:. Retrieved
1636:
1627:
1615:. Retrieved
1606:
1597:
1585:. Retrieved
1576:
1567:
1555:. Retrieved
1546:
1537:
1525:. Retrieved
1516:
1507:
1495:. Retrieved
1486:
1477:
1465:. Retrieved
1456:
1447:
1435:. Retrieved
1426:
1417:
1406:
1394:. Retrieved
1385:
1376:
1364:. Retrieved
1355:
1346:
1334:. Retrieved
1325:
1316:
1304:. Retrieved
1295:
1286:
1274:. Retrieved
1244:
1230:
1218:. Retrieved
1213:
1204:
1195:
1189:
1177:. Retrieved
1168:
1159:
1147:. Retrieved
1138:
1129:
1117:. Retrieved
1113:
1104:
1092:
1080:. Retrieved
1077:The Register
1076:
1066:
1053:
1042:
1030:. Retrieved
1011:
1004:
992:. Retrieved
990:. p. 13
974:
965:
945:
934:
927:
920:
917:
879:
859:
852:
849:
838:
834:
812:The Guardian
810:
808:
805:
794:
791:
787:
765:Matt Hancock
762:
718:
701:
689:
681:
677:
670:
662:Royal Assent
654:
647:
638:
624:Trojan horse
582:offences of
569:
531:
524:
522:
491:Conservative
484:
476:DPP v Lennon
466:
464:
449:
444:
428:
413:
399:interactive
381:Stephen Gold
375:
370:
335:
327:
325:
259:Commencement
253:29 June 1990
249:Royal assent
147:
141:January 2009
138:
128:
121:
114:
107:
95:
83:Please help
78:verification
75:
58:
46:
37:This is the
31:
1276:30 December
1236:"Full list"
724:endangered.
563:emitted by
557:online chat
47:3 July 2024
1888:Categories
1837:23 January
1811:22 January
1785:22 January
1082:14 January
1059:Procrustes
907:References
875:Lisa Nandy
682:After the
614:or across
588:dishonesty
576:common law
572:arrestable
544:identifier
514:indictment
460:common law
273:Amended by
206:1990 c. 18
192:Long title
111:newspapers
1751:. CLRNN.
1099:, s1 - s3
818:NCC Group
666:prorogued
600:extortion
596:blackmail
580:statutory
546:(ID) and
352:Schifreen
340:intention
1831:Archived
1753:Archived
1727:Archived
1697:Archived
1641:Archived
1611:Archived
1581:Archived
1551:Archived
1521:Archived
1491:Archived
1461:Archived
1431:Archived
1390:Archived
1360:Archived
1330:Archived
1300:Archived
1220:24 March
1173:Archived
1143:Archived
916:(2008),
885:See also
822:F-Secure
778:COVID-19
620:phishing
616:networks
548:password
540:username
401:viewdata
358:and the
232:Scotland
202:Citation
43:reviewed
1759:15 June
1733:15 June
1703:15 June
1647:14 June
1617:14 June
1587:14 June
1557:14 June
1527:14 June
1497:14 June
1467:14 June
1437:14 June
1396:14 June
1366:14 June
1336:14 June
1306:14 June
1179:14 June
1149:14 June
535:Hackers
529:below)
397:Prestel
344:hackers
125:scholar
1723:GOV.UK
1693:GOV.UK
1673:8 June
1032:19 May
1023:
994:19 May
826:TechUK
784:Reform
553:e-mail
441:said:
389:modems
356:Canada
127:
120:
113:
106:
98:
1270:(PDF)
1119:2 May
984:(PDF)
958:Notes
592:theft
584:fraud
346:like
243:Dates
132:JSTOR
118:books
1839:2021
1813:2021
1787:2021
1761:2021
1735:2021
1705:2021
1675:2020
1649:2021
1619:2021
1589:2021
1559:2021
1529:2021
1499:2021
1469:2021
1439:2021
1398:2021
1368:2021
1338:2021
1308:2021
1278:2015
1222:2015
1181:2021
1151:2021
1121:2019
1084:2015
1034:2017
1021:ISBN
996:2017
820:and
769:GCHQ
731:law.
608:worm
586:and
578:and
565:VDUs
387:and
379:and
350:and
348:Gold
326:The
104:news
921:955
612:LAN
606:or
598:or
542:or
493:MP
395:'s
87:by
45:on
1890::
1804:.
1778:.
1721:.
1691:.
1666:.
1639:.
1635:.
1609:.
1605:.
1579:.
1575:.
1549:.
1545:.
1519:.
1515:.
1489:.
1485:.
1459:.
1455:.
1429:.
1425:.
1388:.
1384:.
1358:.
1354:.
1328:.
1324:.
1298:.
1294:.
1258:^
1212:.
1171:.
1167:.
1141:.
1137:.
1112:.
1075:.
873:,
832:.
780:.
694:.
668:.
555:,
411:.
41:,
1841:.
1815:.
1789:.
1763:.
1737:.
1707:.
1677:.
1651:.
1621:.
1591:.
1561:.
1531:.
1501:.
1471:.
1441:.
1400:.
1370:.
1340:.
1310:.
1280:.
1252:.
1238:.
1224:.
1183:.
1153:.
1123:.
1086:.
1036:.
998:.
923:.
754:.
516:;
154:)
148:(
143:)
139:(
129:·
122:·
115:·
108:·
81:.
49:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.