figurer Crime & victimize
Computer revilement Act 1990 (CMA1990)
Synopsis
A brood on understanding the upshotiveness of UK computing legislation, how it cause your organisation, and what your organisation can do to complement the legislation.
Author(s)
Nathan House
Issued
04 May 2005
Status
potation v.0.8
Document History
|Release |Date |Description |Author(s) |Cont good turn details |
|0.
8 |3rd December 1998 |Draft |Nathan House |nhouse@stationx.net |
Table of Contents
1Management Summary3
2Introduction4
3The Computer Misuse Act 1990 (CMA1990)5
3.1CMA 1990 Section 1) The self-appointed Access offensive7
3.2CMA 1990 Section 2) The Ulterior intention Offence8
3.3CMA 1990 Section 3) The Unauthorised Modification Offence9
4The Effectiveness of the Computer Misuse Act 199010
4.1The Unauthorised Access Offence10
4.2The Ulterior Intent Offence11
4.3The Unauthorised Modification Offence11
4.4How does all this effect your company?12
5Conclusions13
6References14
6.1Books14
6.2Reports15
6.3Web sites16
Management Summary
This report will be looking at the law that governs computing machine misuse in the United Kingdom, this being the Computer Misuse Act of 1990. I will be discussing the offences under the act and then reflecting on there effectiveness.
I have chosen to look at the law of computer...If you want to get a full essay, order it on our website: Orderessay
If you want to get a full essay, wisit our page: write my essay .
No comments:
Post a Comment