Computer Society and the Law

Computer Society and the Law

This is a professional society whose main target is to advance theory through the practice and processing of information in terms of science and technology.  In the modern society, technology is spreading so fast and this implies that there are risks involved.  The main roles of the computer society in the UK is to sustain the volunteering board in a six-way fold; education, publications, membership activities, conference activities, standards and technical activities (Wood,  2006).

Computer Society and the Law

Order 100% Plagiarism Free Essay Now

Computer Society and the Law

Order 100% Plagiarism Free Essay Now

 

In 2010, the computer society initiated a special program with the main view of empowering the community especially in technical areas that needed the integration of modern technology with an aim to breaking silos and facilitating the growth of a dynamic environment. The main programs highlighted are social networking, operating systems, smart grids, multicore, system engineering, haptics as well as wearable technologies.

Each country has its specific system of addressing their issues through the computer society program (Wyatt, 2009). Owing to the insecurities that surround the information sector especially on the social media, and have come up with strategies to reduce them. This is through the creation of laws that safeguard the computers and data.  There are many ways in which the computer can be misused and there are legal measures that can be taken against the offenders.

Computer Society and the Law

Computer Society and the Law

Computer Society and the Law

Computer Society and the Law

Computer Society and the Law

Computer Society and the Law

Computer Society and the Law

Computer Society and the Law

Computer Society and the Law

Computer Society and the Law

Computer Society and the Law

Computer Society and the Law

Computer Society and the Law

Computer Society and the Law

Computer Society and the Law

Computer Society and the Law

Computer Society and the Law

Computer Society and the Law

Computer Society and the Law

Computer Society and the Law

Computer Crimes

Computer Society and the Law

Order 100% Plagiarism Free Essay Now

Among the worst ways in which a computer can be misused is through computer hacking.  This case has recently raised concerns when it came to be established that some newspapers h ad a tendency to hire private investigators who hack into other people’s phones and computers to search for stories to sell.  In accordance with computer Misuse act it is illegal to hack into someone’s phone or computer or send him a virus that would enable him to access another person’s private information (Mac Ewan, 2008). Any computer owner has the right to keep the data on the computer private; the second party should come in only with his or her consent.
Computer hacking is a criminal offence as it is associated with fraud and theft; it has a lengthy punishment and can lead to imprisonment of the culprits.  Computer hackers normally target the intellectual property of a company or an individual. Another way of misusing the computer is through the cyber attacks where the individual interferes with the entire system of the computer and paralyses it. Among the top reasons are; to bring down the company, to identify what to sell, or terroristic attacks with an aim of paralyzing the official documents.

Computer hacking is extremely illegal and has serious penalties to the offenders. Companies should invest much on their most valuable assets especially their clients and products (Akdeniz, 2006).  He clearly cites that most companies overlook the security of the computer systems in terms of passwords, yet hackers look for such delicate information for their malicious purposes.  Among the famous earliest cases of computer hacking in the UK are traced back in 1985.

When Gold and Shifreen through the use of their home computers and modem secured unauthorized access to Prestel Company which belonged to the British Telecom.  This happened during a trade show and Shifreen maliciously got the password from the Prestel’s engineer without his consent after   which they used to explore the entire system.  They were later tracked down and arraigned in court after which they were fined with specimen charges. In this simple context, it is clear that computer hacking is indeed a serious offense.  Another common serious computer crime in the UK is the misuse of software, it is an offence to access an area that is unauthorized, induces the computer to perform any function with a malicious intention of accessing data and information from another computer.

Computer Society and the Law

Order 100% Plagiarism Free Essay Now

In the UK, computer misuse act 1990 is a law which protects the most common crimes  against the computers, though during its initiation, there were some offenses that could not be prosecuted at that given time and that’s why the police and Justice Act 2006 was made to amend some of the offences (Wyatt, 2009).  According to Section 3 of the amended Act, it is unlawful to access and impair the normal working system of the computer (Akdeniz, 2006). It states;   it’s offensive for anyone to make, and supply any material in electronic form with a malicious intention of assisting in the commission of any offence.   The main objective of these laws is divided into five dimensions. First of all, its to prevent the hacking of computer systems, protection of data, copyright as well as patents,  to censor the internet and finally for the general  health and security measures.
In the UK, the computer Misuse Act is specific with hackers who program the computer to access through unauthorized data in another computer. Altering, copying, deleting, moving or simply putting data on screen, printer and impersonating the person through the web page, online chat or even email is a serious offence and a serious crime.  Offenses which require intent in order to aggravate another offence are arrestable (Mac Ewan 2008). For instance,  a hacker who access the computer system with the aim of transferring shares, steal, get private information or blackmail falls in this category. In this case, three offences are chargeable.

The first one is unauthorized access; the second one is the criminal offences that are carried out while the third one is the circulation of the computer virus through the use of Trojan horse which facilitates the production of identical data. With an aim of reducing these cases, the industries invented the ‘time locking’ program which involves the disabling of the software pro

Get a 20 % discount on an
order above $ 120
Use the following coupon code :
today2015

error: Content is protected !!