Knowledge (XXG)

Computer Misuse Act 1990

Source 📝

179: 640:
publications. Time-locking is the practice of disabling functionality or whole programs in order to ensure that software, potentially delivered on condition of further payment, will "expire" and thus no longer function. In one featured case, a "developer of bespoke systems in the Midlands" activated a time lock on a piece of software over a dispute with a client about an unpaid bill. The client reported this to the police who charged the programmer under Section 3 of the Act, with the outcome being a conviction by a magistrates court, with a conditional discharge given by the magistrate meaning that no punishment was applied on condition that the programmer did not re-offend.
446:
attempt to force these facts into the language of an Act not designed to fit them produced grave difficulties for both judge and jury which we would not wish to see repeated. The appellants' conduct amounted in essence, as already stated, to dishonestly gaining access to the relevant Prestel data bank by a trick. That is not a criminal offence. If it is thought desirable to make it so, that is a matter for the legislature rather than the courts.
881:
the law when researching vulnerabilities or investigating cyber threat actors. Furthermore, 91 per cent of businesses that responded to the report’s survey suggested they had been put at a competitive disadvantage by the Act, and that reform would allow their organisation to reap significant productivity improvements, growth and resilience benefits. The report recommended that the government consider implementing the two above amendments.
67: 559:, web or other services, constitute the offence. Even if the initial access is authorised, subsequent exploration, if there is a hierarchy of privileges in the system, may lead to entry to parts of the system for which the requisite privileges are lacking and the offence will be committed. Looking over a user's shoulder or using sophisticated electronic equipment to monitor the 627:
cause a complete system malfunction, are all criminal "modifications". In 2004, John Thornley pleaded guilty to four offences under §3, having mounted an attack on a rival site, and introduced a Trojan horse to bring it down on several occasions, but it was recognized that the wording of the offence needed to be clarified to confirm that all forms of
407:, had observed the password of a Prestel engineer. The engineer's username was 22222222 and the password used was 1234. This later gave rise to accusations that British Telecom (BT) had not taken security seriously. Armed with this information, the pair explored the system, even gaining access to the personal message box of 655:
In 2004, the All-Party Internet Group published its review of the law and highlighted areas for development. Their recommendations led to the drafting of the Computer Misuse Act 1990 (Amendment) Bill which sought to amend the CMA to comply with the European Convention on Cyber Crime. Under its terms,
537:
who program their computers to search through password permutations are therefore liable, even if their attempts to log on are rejected by the target computer. The only precondition to liability is that the hacker should be aware that the access attempted is unauthorised. Thus, using another person's
686:
in 2011, there were discussions about amending the law to define "smart" phones (i.e. those with Internet browsers and other connectivity features) as computers under the Act. Such an amendment might also introduce a new offence of "making information available with intent", i.e. publicly disclosing
532:
The sections 2 and 3 offences are intended to deter the more serious criminals from using a computer to assist in the commission of a criminal offence or from impairing or hindering access to data stored in a computer. The basic section 1 offence is to attempt or achieve access to a computer or the
880:
In November 2020, the CyberUp Campaign and TechUK published a new report on the Computer Misuse Act, which was the first piece of work to quantify and analyse the views of the wider UK security community. The report found that 80 per cent of cyber security professionals have worried about breaking
788:
In May 2021, UK Home Secretary Priti Patel announced the formal review of the Computer Misuse Act. She also launched a Call for Information on the Act that seeks views on whether there is activity causing harm in the area covered by the Act that is not adequately covered by the offences, including
626:
to obtain identity data or to acquire any other data from an unauthorised source, or modifying the operating system files or some aspect of the computer's functions to interfere with its operation or prevent access to any data, including the destruction of files, or deliberately generating code to
678:
Section 37 ("Making, supplying or obtaining articles for use in computer misuse offences") inserts a new section 3A into the 1990 Act and has drawn considerable criticism from IT professionals, as many of their tools can be used by criminals in addition to their legitimate purposes, and thus fall
639:
Although the Act ostensibly targets those who wish to gain unauthorised access to computer systems for various purposes, its implications on previously relatively widespread or well-known industry practices such as the "time-locking" of software have been described in various computing industry
445:
We have accordingly come to the conclusion that the language of the Act was not intended to apply to the situation which was shown to exist in this case. The submissions at the close of the prosecution case should have succeeded. It is a conclusion which we reach without regret. The Procrustean
835:
The coalition was formed based on the shared view that an update of the UK's cyber crime legislation is necessary to protect national security and to increase economic growth for the UK cyber security industry. The Campaign refers to Section 1 of the Act, "prohibiting unauthorised access to
433:. Their counsel cited the lack of evidence showing the two had attempted to obtain material gain from their exploits, and claimed that the Forgery and Counterfeiting Act had been misapplied to their conduct. They were acquitted by the Lord Justice Lane, but the prosecution appealed to the 850:
On 29 June 2020, to celebrate the Act's 30th birthday, the CyberUp Campaign wrote an open letter to the prime minister on behalf of a number of cyber security industry figures to highlight the Act's outdatedness in a time of rapid digital advancement. This was published in
803:(NCA), warned that "the Computer Misuse Act went through Parliament at a time when cyber wasn't the tool that it is now is to enable all sorts of crimes like fraud" and talked about plans to introduce reforms to make sure the law was "fit for purpose in the modern age". 775:
information systems until the end of 2020 for the purposes of the Act to support and maintain the security of any network and information system which supports, directly or indirectly, the provision of NHS services or public health services intended to address
723:
Section 41 (new Section 3ZA of the Computer Misuse Act 1990). Unauthorised acts causing, or creating risk of, serious damage – punishable by up to 14 years in prison or a fine or both, possible life imprisonment where human welfare or national security were
868:
and recommended that "the Computer Misuse Act should be updated to reflect modern use of personal electronic devices". While the government response to the report said that the Act was regularly reviewed to determine the benefits of legislative change, the
602:. Thus, the §1 offence is committed as soon as the unauthorised access is attempted, and the §2 offence overtakes liability as soon as specific access is made for the criminal purpose. The §3 offence is specifically aimed at those who write and circulate a 730:
Section 43. Territorial scope of computer misuse - amendments to Sections 4, 5 and 10 making the primary territorial scope the United Kingdom but can be worldwide especially if the perpetrator (or conspirators) is British and broke local
1830: 550:
without proper authority to access data or a program, or to alter, delete, copy or move a program or data, or simply to output a program or data to a screen or printer, or to impersonate that other person using
815:
in an article that echoed the call for "urgent reform". The CyberUp Campaign is made up of a wide coalition of supportive bodies from within the cyber security industry, including the large cyber consultancies
836:
computers", stating that it inadvertently criminalises a large amount of cyber security and threat intelligence research and investigation which is frequently conducted by UK cyber security professionals.
789:
whether the legislation is fit for use following the technological advances since the CMA was introduced, and any other suggestions on how the legislative response to cyber crime could be strengthened.
843:
Amend the law to allow cyber security and threat intelligence researchers acting in the public interest to explain and justify their actions and to allow the detection or prevention of crime.
846:
Create a set of clear legal definitions to ensure that cyber security and threat intelligence researchers who reasonably believe they have authorisation to act can legitimately do so.
806:
In January 2020, the Criminal Law Reform Now Network (CLRNN) published a comprehensive report highlighting the Act's shortcomings and making detailed recommendations for reform.
649: 284: 809:
In the same month, the CyberUp Campaign was established with the intention of lobbying the UK government to "update and upgrade" the Act. The Campaign's launch was covered by
519:
unauthorised modification of computer material, punishable by twelve months/maximum fine (or six months in Scotland) on summary conviction and/or ten years/fine on indictment;
652:('Conspiracy') amended Section 8 (relevance of external law), Section 9(2)(b) (British citizenship immaterial: conspiracy) and Section 16 (application to Northern Ireland). 1696: 1826: 865: 861: 366:
laws, as it is seen "as a robust and flexible piece of legislation in terms of dealing with cybercrime". Several amendments have been passed to keep the Act up to date.
418:
with defrauding BT by manufacturing a "false instrument", namely the internal condition of BT's equipment after it had processed Gold's eavesdropped password. Tried at
1898: 1726: 1908: 508:
unauthorised access with intent to commit or facilitate commission of further offences, punishable by twelve months/maximum fine (or six months in Scotland) on
792:
The review of the Act follows growing calls, in recent year, for a complete government review of the Computer Misuse Act, in order to bring about new reforms.
501:
unauthorised access to computer material, punishable by twelve months' imprisonment (or six months in Scotland) and/or a fine "not exceeding level 5 on the
279: 969:
IISS Global Perspectives – Power in Cyberspace. Q&A with Nigel Inkster, Director, Transnational Threats and Political Risk, IISS. 18 January 2011.
84: 1520: 1580: 683: 570:
The §§2–3 offences are aggravated offences, requiring a specific intent to commit another offence (for these purposes, the other offences are to be
438: 434: 414:
Prestel installed monitors on the suspect accounts and passed information thus obtained to the police. The pair were charged under section 1 of the
1490: 712:
Section 37. Making, supplying or obtaining articles for use in computer misuse offences, punishable by up to two years in prison or a fine or both.
1775: 1663: 944: 201: 1801: 1024: 1903: 404: 709:
Section 36. Unauthorised acts with intent to impair operation of computer, etc. punishable by up to ten years in prison or a fine or both.
656:
the maximum sentence of imprisonment for breaching the Act changed from six months to two years. It also sought to explicitly criminalise
430: 415: 1389: 1359: 1329: 131: 1640: 1610: 1460: 1430: 1172: 1142: 451: 1802:"Cyber security experts say they are being prevented from stopping computer fraud because criminals have to let them access machines" 1299: 103: 951: 829: 150: 1550: 737:
Section 47. Serious Crime Prevention Orders: meaning of "Serious Offence" - adds Computer Misuse to list of serious crimes in the
1688: 408: 331: 465:
Since the case, both defendants have written extensively about IT matters. Gold, who detailed the entire case at some length in
196:
An Act to make provision for securing computer material against unauthorised access or modification; and for connected purposes.
110: 497:. The bill, supported by the government, came into effect in 1990. Sections 1-3 of the Act introduced three criminal offences: 1893: 744:
Section 86. Transition and savings provisions – requires Sections 42 and 43 to be brought into force before they can be used.
88: 1718: 1752: 450:
The Law Lords' ruling led many legal scholars to believe that hacking was not unlawful as the law then stood. The English
117: 38: 672: 354:
from serious computer criminals. The Act has nonetheless become a model from which several other countries, including
289: 99: 534: 338:(1988) 1 AC 1063. Critics of the bill complained that it was introduced hastily, was poorly thought out, and that 77: 1249: 560: 183: 1869: 706:
Section 35. Unauthorised access to computer material, punishable by up to two years in prison or a fine or both.
987: 900: 870: 777: 657: 623: 339: 486: 467: 1061:, who would stretch his victims (or cut off their legs) in order to fit a bed for which they were ill suited. 1864: 1016: 772: 691: 490: 455: 294: 738: 1266: 857:, with the headline "Cyber security experts say they are being prevented from stopping computer fraud". 800: 751: 419: 191: 590:). So a hacker who obtains access to a system intending to transfer money or shares, intends to commit 1827:"4 out of 5 cyber security professionals worry about breaking the law when defending UK, report finds" 1250:"House of Commons - Privilege: Hacking of Members' mobile phones - Standards and Privileges Committee" 877:, highlighted in January 2021 that no progress had been made towards implementing the recommendation. 124: 363: 1859: 853: 727:
Section 42. Obtaining articles for purposes relating to computer misuse – amendments to Section 3A.
665: 564: 359: 1047: 611: 509: 702:
The amendments to the Computer Misuse Act 1990 by Part 5 of the Police and Justice Act 2006 are
1096: 980: 429:
Although the fines imposed were modest, they elected to appeal to the Criminal Division of the
1873: 1020: 1010: 747:
Schedule 1. Amendments to Serious Crimes Act 2007: Scotland – similar changes to Scottish law.
628: 258: 1235: 940:
including reference to the case of Christopher Pile (aka 'the Black Baron') in November 1995.
533:
data it stores, by inducing a computer to perform any function with intent to secure access.
1072: 719:
The amendments to the Computer Misuse Act 1990 by Part 2 of the Serious Crime Act 2015. are
615: 423: 376: 351: 750:
Schedule 4. Minor and consequential amendments – changes Computer Misuse Act 1990 and the
1410: 1381: 1351: 1321: 1209: 1632: 1602: 1572: 1542: 1512: 1482: 1452: 1422: 1164: 1134: 1109: 913: 1291: 895: 890: 603: 502: 494: 462:
related to deception, but the English Law Commission believed a new law was necessary.
214: 690:
In 2015, the Act was further amended by Part 2 sections 41 to 44 (plus others) of the
311: 1887: 938: 607: 384: 343: 342:
was often difficult to prove, with the bill inadequately differentiating "joyriding"
914:"The Computer Misuse Act 1990: lessons from its past and predictions for its future" 734:
Section 44. Savings – covers seizure and enactment amendments to Sections 10 and 16.
426:(five against Schifreen, four against Gold) and fined, respectively, £750 and £600. 811: 764: 687:
a password for someone's phone or computer so that others can access it illegally.
661: 475: 392: 380: 347: 248: 17: 1878: 403:
service. While at a trade show, Schifreen, by doing what latterly became known as
796: 556: 66: 1748: 1058: 874: 587: 575: 543: 513: 318: 471:, has presented at conferences alongside the arresting officers in the case. 935:
Section 3 of the Computer Misuse Act 1990: an Antidote for Computer Viruses!
817: 660:
and other crimes facilitated by denial-of-service. The Bill did not receive
599: 595: 579: 459: 864:, responsible for oversight of the UK intelligence services, published the 1110:"Computer Misuse Act 1990; 1990 c. 18 Computer misuse offences Section 1" 821: 619: 547: 539: 400: 1854: 396: 458:
concluded that intrusion was adequately covered in Scotland under the
825: 571: 552: 355: 567:("electronic eavesdropping") is outside the scope of this offence. 1879:
A list of Computer Misuse Act cases compiled by Michael J L Turner
591: 583: 388: 1210:"Criminal Justice (Terrorism and Conspiracy) Act 1998 Schedule 1" 768: 454:
and its counterpart in Scotland both considered the matter. The
1776:"Cybercrime laws need urgent reform to protect UK, says report" 741:
including being grounds for compulsory winding up of a company.
362:, have drawn inspiration when subsequently drafting their own 60: 1073:"'80s hacker turned journo, IT crime ace Steve Gold logs off" 828:. In November 2020, the campaign gained the backing of the 391:
in late 1984 and early 1985, gained unauthorised access to
1689:"Home Secretary Priti Patel speech to CyberUK Conference" 42: 986:. School of Computer Science. Professional Computing. 675:
contain amendments to the Computer Misuse Act 1990.
650:
Criminal Justice (Terrorism and Conspiracy) Act 1998
285:
Criminal Justice (Terrorism and Conspiracy) Act 1998
1057:Here Lord Brandon alludes to the classical myth of 334:, introduced partly in response to the decision in 317: 310: 303: 272: 267: 257: 247: 242: 220: 210: 200: 190: 91:. Unsourced material may be challenged and removed. 928:Computer Misuse: Response, Regulation and the Law 866:Intelligence and Security Committee Russia report 862:Intelligence and Security Committee of Parliament 1719:"Computer Misuse Act 1990: call for information" 1664:"Hancock grants GCHQ powers over NHS IT systems" 839:The Campaign has called for two key amendments: 1261: 1259: 1012:Information Technology Law: The Law and Society 443: 715:Section 38. Transitional and saving provision. 8: 594:, or to obtain confidential information for 166: 437:. In 1988, the Lords upheld the acquittal. 26: 1870:Amendments to the Computer Misuse Act 1990 280:Criminal Justice and Public Order Act 1994 165: 1865:Wording of the failed 2004 amendment bill 1382:"Police and Justice Act 2006, section 37" 1352:"Police and Justice Act 2006, section 36" 1322:"Police and Justice Act 2006, section 35" 151:Learn how and when to remove this message 1749:"Reforming the Computer Misuse Act 1990" 1194:Naylor, Chris (July 1994). "Locked up". 684:News International phone hacking scandal 32:This is an accepted version of this page 1899:Computer security in the United Kingdom 1411:Police and Justice Act 2006, section 38 962: 28: 1909:United Kingdom Acts of Parliament 1990 1613:from the original on 11 September 2016 1302:from the original on 26 September 2010 1175:from the original on 26 September 2010 1145:from the original on 26 September 2010 1046:HL 21 April 1988, AC 1063 summary at 946:Computer Misuse Act (amendment) speech 485:Based on the ELC's recommendations, a 1833:from the original on 19 November 2020 1165:"Computer Misuse Act 1990, section 3" 1135:"Computer Misuse Act 1990, section 2" 312:Text of statute as originally enacted 7: 1755:from the original on 18 January 2021 1603:"Serious Crime Act 2015, schedule 1" 1573:"Serious Crime Act 2015, section 86" 1543:"Serious Crime Act 2015, section 47" 1513:"Serious Crime Act 2015, section 44" 1483:"Serious Crime Act 2015, section 43" 1463:from the original on 5 February 2016 1453:"Serious Crime Act 2015, section 42" 1423:"Serious Crime Act 2015, section 41" 1392:from the original on 29 October 2010 1362:from the original on 31 October 2010 1332:from the original on 29 October 2010 89:adding citations to reliable sources 1633:"Serious Crime Act 2015, section 4" 1583:from the original on 6 January 2016 635:Implications for industry practices 525: 416:Forgery and Counterfeiting Act 1981 1553:from the original on 28 March 2016 824:and the cyber industry trade body 319:Revised text of statute as amended 57: 1774:Bowcott, Owen (22 January 2020). 1523:from the original on 21 June 2016 1493:from the original on 10 July 2016 1433:from the original on 13 July 2015 830:Confederation of British Industry 1729:from the original on 11 May 2021 1699:from the original on 11 May 2021 1071:Leyden, John (13 January 2015). 332:Parliament of the United Kingdom 177: 65: 1662:Carding, Nick (29 April 2020). 1643:from the original on 4 May 2015 981:"Lecture 2: Legal Perspectives" 574:, and so include all the major 76:needs additional citations for 1800:Bowcott, Owen (29 June 2020). 1: 1292:"Police and Justice Act 2006" 1904:Hacking (computer security) 1267:"Serious Crime Act of 2015" 673:Police and Justice Act 2006 290:Police and Justice Act 2006 1925: 1860:EURIM – IPPR E-Crime Study 930:(Cullomption, Willan 2009) 799:, Director General of the 648:Schedule 1 Part II of the 512:and/or five years/fine on 505:" (since 2015, unlimited); 473: 163:United Kingdom legislation 100:"Computer Misuse Act 1990" 979:Lee, Mark (Autumn 2014). 767:issued directions giving 671:Sections 35 to 38 of the 658:denial-of-service attacks 561:electromagnetic radiation 422:, they were convicted on 330:(c. 18) is an act of the 184:United Kingdom Parliament 176: 171: 1855:The Internet Crime Forum 1097:Computer Misuse Act 1990 988:University of Birmingham 901:Data Protection Act 1998 871:Shadow Foreign Secretary 523:(For other offences see 371:R v Gold & Schifreen 336:R v Gold & Schifreen 328:Computer Misuse Act 1990 222:Territorial extent  167:Computer Misuse Act 1990 39:latest accepted revision 1216:. The National Archives 1196:Personal Computer World 1017:Oxford University Press 1009:Murray, Andrew (2016). 773:National Health Service 664:because Parliament was 481:The Computer Misuse Act 456:Scottish Law Commission 1668:Health Service Journal 1637:www.legislation.gov.uk 1607:www.legislation.gov.uk 1577:www.legislation.gov.uk 1547:www.legislation.gov.uk 1517:www.legislation.gov.uk 1487:www.legislation.gov.uk 1457:www.legislation.gov.uk 1427:www.legislation.gov.uk 1386:www.legislation.gov.uk 1356:www.legislation.gov.uk 1326:www.legislation.gov.uk 1296:www.legislation.gov.uk 1169:www.legislation.gov.uk 1139:www.legislation.gov.uk 771:temporary powers over 759:Application to the NHS 739:Serious Crime Act 2007 692:Serious Crime Act 2015 448: 295:Serious Crime Act 2015 1894:Computing legislation 952:The Law Lords' ruling 801:National Crime Agency 752:Armed Forces Act 2006 631:attack are included. 487:private member's bill 474:Further information: 468:The Hacker's Handbook 420:Southwark Crown Court 383:, using conventional 1829:. CyberUp Campaign. 439:Lord Justice Brandon 364:information security 85:improve this article 1806:The Daily Telegraph 1198:. pp. 470–471. 918:Criminal Law Review 854:The Daily Telegraph 618:. Similarly, using 360:Republic of Ireland 168: 29:Page version status 18:Computer Misuse Act 1214:legislation.gov.uk 1114:legislation.gov.uk 937:(1996) 3 Web JCLI 860:In July 2020, the 795:In November 2019, 679:under section 3A. 510:summary conviction 489:was introduced by 35: 1874:Open Rights Group 1026:978-0-19-873246-4 926:Stefan Fafinski, 629:denial of service 324: 323: 268:Other legislation 229:England and Wales 172:Act of Parliament 161: 160: 153: 135: 16:(Redirected from 1916: 1843: 1842: 1840: 1838: 1823: 1817: 1816: 1814: 1812: 1797: 1791: 1790: 1788: 1786: 1771: 1765: 1764: 1762: 1760: 1745: 1739: 1738: 1736: 1734: 1715: 1709: 1708: 1706: 1704: 1685: 1679: 1678: 1676: 1674: 1659: 1653: 1652: 1650: 1648: 1629: 1623: 1622: 1620: 1618: 1599: 1593: 1592: 1590: 1588: 1569: 1563: 1562: 1560: 1558: 1539: 1533: 1532: 1530: 1528: 1509: 1503: 1502: 1500: 1498: 1479: 1473: 1472: 1470: 1468: 1449: 1443: 1442: 1440: 1438: 1419: 1413: 1408: 1402: 1401: 1399: 1397: 1378: 1372: 1371: 1369: 1367: 1348: 1342: 1341: 1339: 1337: 1318: 1312: 1311: 1309: 1307: 1288: 1282: 1281: 1279: 1277: 1271: 1263: 1254: 1253: 1246: 1240: 1239: 1232: 1226: 1225: 1223: 1221: 1206: 1200: 1199: 1191: 1185: 1184: 1182: 1180: 1161: 1155: 1154: 1152: 1150: 1131: 1125: 1124: 1122: 1120: 1106: 1100: 1094: 1088: 1087: 1085: 1083: 1068: 1062: 1055: 1049: 1044: 1038: 1037: 1035: 1033: 1015:(3rd ed.). 1006: 1000: 999: 997: 995: 985: 976: 970: 967: 797:Dame Lynne Owens 644:Latest situation 622:techniques or a 526:§ The amendments 424:specimen charges 405:shoulder surfing 377:Robert Schifreen 235:Northern Ireland 223: 181: 180: 169: 156: 149: 145: 142: 136: 134: 93: 69: 61: 21: 1924: 1923: 1919: 1918: 1917: 1915: 1914: 1913: 1884: 1883: 1872:covered by the 1851: 1846: 1836: 1834: 1825: 1824: 1820: 1810: 1808: 1799: 1798: 1794: 1784: 1782: 1773: 1772: 1768: 1758: 1756: 1747: 1746: 1742: 1732: 1730: 1725:. 11 May 2021. 1717: 1716: 1712: 1702: 1700: 1695:. 11 May 2021. 1687: 1686: 1682: 1672: 1670: 1661: 1660: 1656: 1646: 1644: 1631: 1630: 1626: 1616: 1614: 1601: 1600: 1596: 1586: 1584: 1571: 1570: 1566: 1556: 1554: 1541: 1540: 1536: 1526: 1524: 1511: 1510: 1506: 1496: 1494: 1481: 1480: 1476: 1466: 1464: 1451: 1450: 1446: 1436: 1434: 1421: 1420: 1416: 1409: 1405: 1395: 1393: 1380: 1379: 1375: 1365: 1363: 1350: 1349: 1345: 1335: 1333: 1320: 1319: 1315: 1305: 1303: 1290: 1289: 1285: 1275: 1273: 1272:. UK Government 1269: 1265: 1264: 1257: 1248: 1247: 1243: 1234: 1233: 1229: 1219: 1217: 1208: 1207: 1203: 1193: 1192: 1188: 1178: 1176: 1163: 1162: 1158: 1148: 1146: 1133: 1132: 1128: 1118: 1116: 1108: 1107: 1103: 1095: 1091: 1081: 1079: 1070: 1069: 1065: 1056: 1052: 1045: 1041: 1031: 1029: 1027: 1019:. p. 358. 1008: 1007: 1003: 993: 991: 983: 978: 977: 973: 968: 964: 960: 933:Yaman Akdeniz, 909: 887: 786: 763:In April 2020, 761: 700: 646: 637: 610:, whether on a 483: 478: 431:Court of Appeal 393:British Telecom 374: 306: 305:Status: Amended 299: 238: 221: 186: 178: 164: 157: 146: 140: 137: 94: 92: 82: 70: 55: 54: 53: 52: 51: 50: 34: 22: 15: 12: 11: 5: 1922: 1920: 1912: 1911: 1906: 1901: 1896: 1886: 1885: 1882: 1881: 1876: 1867: 1862: 1857: 1850: 1849:External links 1847: 1845: 1844: 1818: 1792: 1766: 1740: 1710: 1680: 1654: 1624: 1594: 1564: 1534: 1504: 1474: 1444: 1414: 1403: 1373: 1343: 1313: 1283: 1255: 1241: 1227: 1201: 1186: 1156: 1126: 1101: 1089: 1063: 1050: 1039: 1025: 1001: 971: 961: 959: 956: 955: 954: 949: 941: 931: 924: 912:Neil MacEwan, 908: 905: 904: 903: 898: 896:Internet fraud 893: 891:Computer crime 886: 883: 848: 847: 844: 785: 782: 760: 757: 756: 755: 748: 745: 742: 735: 732: 728: 725: 717: 716: 713: 710: 707: 699: 698:The amendments 696: 645: 642: 636: 633: 604:computer virus 521: 520: 517: 506: 503:standard scale 495:Michael Colvin 482: 479: 452:Law Commission 435:House of Lords 385:home computers 373: 368: 322: 321: 315: 314: 308: 307: 304: 301: 300: 298: 297: 292: 287: 282: 276: 274: 270: 269: 265: 264: 263:29 August 1990 261: 255: 254: 251: 245: 244: 240: 239: 237: 236: 233: 230: 226: 224: 218: 217: 215:Michael Colvin 212: 208: 207: 204: 198: 197: 194: 188: 187: 182: 174: 173: 162: 159: 158: 73: 71: 64: 56: 36: 30: 27: 25: 24: 23: 14: 13: 10: 9: 6: 4: 3: 2: 1921: 1910: 1907: 1905: 1902: 1900: 1897: 1895: 1892: 1891: 1889: 1880: 1877: 1875: 1871: 1868: 1866: 1863: 1861: 1858: 1856: 1853: 1852: 1848: 1832: 1828: 1822: 1819: 1807: 1803: 1796: 1793: 1781: 1777: 1770: 1767: 1754: 1750: 1744: 1741: 1728: 1724: 1720: 1714: 1711: 1698: 1694: 1690: 1684: 1681: 1669: 1665: 1658: 1655: 1642: 1638: 1634: 1628: 1625: 1612: 1608: 1604: 1598: 1595: 1582: 1578: 1574: 1568: 1565: 1552: 1548: 1544: 1538: 1535: 1522: 1518: 1514: 1508: 1505: 1492: 1488: 1484: 1478: 1475: 1462: 1458: 1454: 1448: 1445: 1432: 1428: 1424: 1418: 1415: 1412: 1407: 1404: 1391: 1387: 1383: 1377: 1374: 1361: 1357: 1353: 1347: 1344: 1331: 1327: 1323: 1317: 1314: 1301: 1297: 1293: 1287: 1284: 1268: 1262: 1260: 1256: 1251: 1245: 1242: 1237: 1231: 1228: 1215: 1211: 1205: 1202: 1197: 1190: 1187: 1174: 1170: 1166: 1160: 1157: 1144: 1140: 1136: 1130: 1127: 1115: 1111: 1105: 1102: 1098: 1093: 1090: 1078: 1074: 1067: 1064: 1060: 1054: 1051: 1048: 1043: 1040: 1028: 1022: 1018: 1014: 1013: 1005: 1002: 989: 982: 975: 972: 966: 963: 957: 953: 950: 948: 947: 943:Derek Wyatt, 942: 939: 936: 932: 929: 925: 922: 919: 915: 911: 910: 906: 902: 899: 897: 894: 892: 889: 888: 884: 882: 878: 876: 872: 867: 863: 858: 856: 855: 845: 842: 841: 840: 837: 833: 831: 827: 823: 819: 814: 813: 807: 804: 802: 798: 793: 790: 783: 781: 779: 774: 770: 766: 758: 753: 749: 746: 743: 740: 736: 733: 729: 726: 722: 721: 720: 714: 711: 708: 705: 704: 703: 697: 695: 693: 688: 685: 680: 676: 674: 669: 667: 663: 659: 653: 651: 643: 641: 634: 632: 630: 625: 621: 617: 613: 609: 605: 601: 597: 593: 589: 585: 581: 577: 573: 568: 566: 562: 558: 554: 549: 545: 541: 536: 530: 528: 527: 518: 515: 511: 507: 504: 500: 499: 498: 496: 492: 488: 480: 477: 472: 470: 469: 463: 461: 457: 453: 447: 442: 440: 436: 432: 427: 425: 421: 417: 412: 410: 409:Prince Philip 406: 402: 398: 394: 390: 386: 382: 378: 372: 369: 367: 365: 361: 357: 353: 349: 345: 341: 337: 333: 329: 320: 316: 313: 309: 302: 296: 293: 291: 288: 286: 283: 281: 278: 277: 275: 271: 266: 262: 260: 256: 252: 250: 246: 241: 234: 231: 228: 227: 225: 219: 216: 213: 211:Introduced by 209: 205: 203: 199: 195: 193: 189: 185: 175: 170: 155: 152: 144: 133: 130: 126: 123: 119: 116: 112: 109: 105: 102: –  101: 97: 96:Find sources: 90: 86: 80: 79: 74:This article 72: 68: 63: 62: 59: 48: 44: 40: 33: 19: 1835:. Retrieved 1821: 1809:. Retrieved 1805: 1795: 1783:. Retrieved 1780:The Guardian 1779: 1769: 1757:. Retrieved 1743: 1731:. Retrieved 1722: 1713: 1701:. Retrieved 1692: 1683: 1671:. Retrieved 1667: 1657: 1645:. Retrieved 1636: 1627: 1615:. Retrieved 1606: 1597: 1585:. Retrieved 1576: 1567: 1555:. Retrieved 1546: 1537: 1525:. Retrieved 1516: 1507: 1495:. Retrieved 1486: 1477: 1465:. Retrieved 1456: 1447: 1435:. Retrieved 1426: 1417: 1406: 1394:. Retrieved 1385: 1376: 1364:. Retrieved 1355: 1346: 1334:. Retrieved 1325: 1316: 1304:. Retrieved 1295: 1286: 1274:. Retrieved 1244: 1230: 1218:. Retrieved 1213: 1204: 1195: 1189: 1177:. Retrieved 1168: 1159: 1147:. Retrieved 1138: 1129: 1117:. Retrieved 1113: 1104: 1092: 1080:. Retrieved 1077:The Register 1076: 1066: 1053: 1042: 1030:. Retrieved 1011: 1004: 992:. Retrieved 990:. p. 13 974: 965: 945: 934: 927: 920: 917: 879: 859: 852: 849: 838: 834: 812:The Guardian 810: 808: 805: 794: 791: 787: 765:Matt Hancock 762: 718: 701: 689: 681: 677: 670: 662:Royal Assent 654: 647: 638: 624:Trojan horse 582:offences of 569: 531: 524: 522: 491:Conservative 484: 476:DPP v Lennon 466: 464: 449: 444: 428: 413: 399:interactive 381:Stephen Gold 375: 370: 335: 327: 325: 259:Commencement 253:29 June 1990 249:Royal assent 147: 141:January 2009 138: 128: 121: 114: 107: 95: 83:Please help 78:verification 75: 58: 46: 37:This is the 31: 1276:30 December 1236:"Full list" 724:endangered. 563:emitted by 557:online chat 47:3 July 2024 1888:Categories 1837:23 January 1811:22 January 1785:22 January 1082:14 January 1059:Procrustes 907:References 875:Lisa Nandy 682:After the 614:or across 588:dishonesty 576:common law 572:arrestable 544:identifier 514:indictment 460:common law 273:Amended by 206:1990 c. 18 192:Long title 111:newspapers 1751:. CLRNN. 1099:, s1 - s3 818:NCC Group 666:prorogued 600:extortion 596:blackmail 580:statutory 546:(ID) and 352:Schifreen 340:intention 1831:Archived 1753:Archived 1727:Archived 1697:Archived 1641:Archived 1611:Archived 1581:Archived 1551:Archived 1521:Archived 1491:Archived 1461:Archived 1431:Archived 1390:Archived 1360:Archived 1330:Archived 1300:Archived 1220:24 March 1173:Archived 1143:Archived 916:(2008), 885:See also 822:F-Secure 778:COVID-19 620:phishing 616:networks 548:password 540:username 401:viewdata 358:and the 232:Scotland 202:Citation 43:reviewed 1759:15 June 1733:15 June 1703:15 June 1647:14 June 1617:14 June 1587:14 June 1557:14 June 1527:14 June 1497:14 June 1467:14 June 1437:14 June 1396:14 June 1366:14 June 1336:14 June 1306:14 June 1179:14 June 1149:14 June 535:Hackers 529:below) 397:Prestel 344:hackers 125:scholar 1723:GOV.UK 1693:GOV.UK 1673:8 June 1032:19 May 1023:  994:19 May 826:TechUK 784:Reform 553:e-mail 441:said: 389:modems 356:Canada 127:  120:  113:  106:  98:  1270:(PDF) 1119:2 May 984:(PDF) 958:Notes 592:theft 584:fraud 346:like 243:Dates 132:JSTOR 118:books 1839:2021 1813:2021 1787:2021 1761:2021 1735:2021 1705:2021 1675:2020 1649:2021 1619:2021 1589:2021 1559:2021 1529:2021 1499:2021 1469:2021 1439:2021 1398:2021 1368:2021 1338:2021 1308:2021 1278:2015 1222:2015 1181:2021 1151:2021 1121:2019 1084:2015 1034:2017 1021:ISBN 996:2017 820:and 769:GCHQ 731:law. 608:worm 586:and 578:and 565:VDUs 387:and 379:and 350:and 348:Gold 326:The 104:news 921:955 612:LAN 606:or 598:or 542:or 493:MP 395:'s 87:by 45:on 1890:: 1804:. 1778:. 1721:. 1691:. 1666:. 1639:. 1635:. 1609:. 1605:. 1579:. 1575:. 1549:. 1545:. 1519:. 1515:. 1489:. 1485:. 1459:. 1455:. 1429:. 1425:. 1388:. 1384:. 1358:. 1354:. 1328:. 1324:. 1298:. 1294:. 1258:^ 1212:. 1171:. 1167:. 1141:. 1137:. 1112:. 1075:. 873:, 832:. 780:. 694:. 668:. 555:, 411:. 41:, 1841:. 1815:. 1789:. 1763:. 1737:. 1707:. 1677:. 1651:. 1621:. 1591:. 1561:. 1531:. 1501:. 1471:. 1441:. 1400:. 1370:. 1340:. 1310:. 1280:. 1252:. 1238:. 1224:. 1183:. 1153:. 1123:. 1086:. 1036:. 998:. 923:. 754:. 516:; 154:) 148:( 143:) 139:( 129:· 122:· 115:· 108:· 81:. 49:. 20:)

Index

Computer Misuse Act
latest accepted revision
reviewed

verification
improve this article
adding citations to reliable sources
"Computer Misuse Act 1990"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
United Kingdom Parliament
Long title
Citation
Michael Colvin
Royal assent
Commencement
Criminal Justice and Public Order Act 1994
Criminal Justice (Terrorism and Conspiracy) Act 1998
Police and Justice Act 2006
Serious Crime Act 2015
Text of statute as originally enacted
Revised text of statute as amended
Parliament of the United Kingdom
intention
hackers
Gold

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.