Preview

Comparison Between Computer Crime and Computer Misuse Actct and

Good Essays
Open Document
Open Document
1103 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Comparison Between Computer Crime and Computer Misuse Actct and
COMPARISON BETWEEN COMPUTER CRIME ACT 1997 AND COMPUTER MISUSE ACT 1990 (UK)

As the Malaysian society becomes more and more technology-savvy and Internet savvy due to the encouragement by the government and the country’s vision to be a world leading country in computer technology with the Multimedia Super Corridor, the number of computer-related crimes is on the rise. Therefore, in order to combat this new type of crime, the government of Malaysia had introduced a new legal framework to facilitate the development of ICT systems called Cyber Laws of Malaysia which include the Computer Crime Act 1997. Generally, Computer Crime Act 1997 (CCA 97) was formed for the purpose of safeguarding consumer and service providers besides on-line businesses and owners of intellectual property. It is designed to prevent offences due to the misuse of computers and complement the existing criminal legislation. The act was given its Royal Assent on June 18, 1997 but was only enforced on June 1, 2000. This Act is based on Computer Misuse Act 1990 (CMA 1990) which was passed by the Parliament of the United Kingdom and came in to force on 1 February 1991. It must be noted that Computer Crime Act 1997 has a lot of similarity with the UK Computer Misuse Act 1990 in terms of the offences but differs in several ways. The first three key crimes or offences which has been introduced in the Computer Misuse Act 1990 which are; unauthorized access to computer material, unauthorized access with intent to commit or facilitate commission of further offences and unauthorized modification of the contents of any computer are also possessed by the Computer Crimes Act 1997 but has evolved to further additional types of offences which are wrongful communication, abetments and attempts punishable as offences and presumption. Hence, the CCA 97 covers a wider range of offences compared to CMA 1990 which only covers 3 aspects of computer misuse. Furthermore, it is different in that

You May Also Find These Documents Helpful

  • Good Essays

    Cyber Crime

    • 395 Words
    • 2 Pages

    Cybercrime, also called computer crime because the use of a computer is used as tool to help people meet their illegal ends. Some cybercrime examples are committing fraud, trafficking in child pornography and intellectual property, stealing other peoples identity, or violating privacy of others.…

    • 395 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The author traces the CFAA history to the 1984 Comprehensive Crime Control Act (CCCA) which was narrow in scope, with the purpose to address unauthorized access computer crimes. As computers in households…

    • 1035 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Computer crimes are criminal activities that involve using a computer and a network to gain unauthorized access with the intent of deleting, altering, or damaging computer data. Due to them being extremely versatile, establishing criminal and noncriminal behavior when in use can be very difficult at times. “According to the U.S. Uniform Crime Reporting Statistics, by 2000 more than 300 million users around the globe accessed the World Wide Web. Of those, at least 1 million were engaged in illegal Internet activities (computer crime or "cyber-crime"). Cyber-crimes include Internet-related forgery, embezzlement, fraud, vandalism, and the disposal of stolen goods. The potential threat to the overall development of e-commerce was serious—so much that online security expenditures were expected to double to $30 billion in 2004” (Computer Crime – Definitions). The four most common categories of computer crimes are infrastructure attacks, technological facilitation, information attacks, and promotion.…

    • 733 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The Computer Misuse Act 1990 was designed to enclose legislation and controls over computer crime and Internet fraud. The legislation was created to:…

    • 1135 Words
    • 5 Pages
    Good Essays
  • Better Essays

    When an intruder hijacks your computer and denies you entry into your files or your network this is considered targeting your computer. Viruses and Malware also can be introduced to your computer to damage your operating system, your files or just give you a headache.…

    • 870 Words
    • 4 Pages
    Better Essays
  • Good Essays

    computer crime

    • 732 Words
    • 3 Pages

    Computer crime, or Cybercrime, refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Netcrime is criminal exploitation of the Internet. Dr. Debarati Halder and Dr. K. Jaishankar (2011) define Cybercrimes as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS).” Some examples of computer crimes are as follows:…

    • 732 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    over long periods of time, or when a computer operator uses a computer to steal…

    • 1442 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Real World

    • 5094 Words
    • 21 Pages

    This document is an extract from the book Cyber Crime & Digital Evidence – Indian Perspective authored by Rohas Nagpal. This book is available as courseware for the Diploma in Cyber Law and PG Program in Cyber Law conducted by Asian School of Cyber Laws…

    • 5094 Words
    • 21 Pages
    Satisfactory Essays
  • Good Essays

    4 February 2011, Makati City - With the theme, "Cybercrime: Impact on Law Enforcement, Industry and Society," the Department of Justice (DOJ) together with Microsoft and other private industry partners, today held the 2nd International Conference on Cybercrime to increase awareness of the emerging threat of cybercrime. The forum began with an assessment of the global and country situation and lead towards a discussion of initiatives. The need for a comprehensive cybercrime law compliant with the Convention on Cybercrime was deemed a priority. The Convention is the first international treaty to address computer and internet crimes through the passage of national legislation, improving investigative techniques and increasing international cooperation. The cybercrime bill will prevent and combat information theft, computer system hacking and even online human trafficking. It will protect individuals and companies from illegal or…

    • 2413 Words
    • 10 Pages
    Good Essays
  • Good Essays

    Catergories of Computers

    • 531 Words
    • 3 Pages

    ‘’Computer crimes are on the rise and cause financial and personal damage to victims they affect. The easy accessibility of computers and the anonymous nature of the Internet have created new ways to perform illegal actions. Security measures are always being created to prevent problems is the key to prevent us from becoming a victim.’’ (Shelia Robinson)…

    • 531 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nn Fir Nn

    • 3883 Words
    • 16 Pages

    References: Audit Commission (1994), Opportunity Makes a Thief – an Analysis of Computer Abuse, HMSO Publications Centre, London. Collier, P.A. and Spaul, B.J. (1992), “The Woolwich Centre for Computer Crime Research: addressing the need for UK information,” Computer Fraud & Security Bulletin, August, pp. 8-12. Culf, A. (1996), “BBC acts to thwart political hackers,” The Guardian, February 9, p. 1. Evans, D. (1994), “BA in dock over hacking,” Computer Weekly, April 28, p. 6.…

    • 3883 Words
    • 16 Pages
    Powerful Essays
  • Good Essays

    SECTION 1. Title. — This Act shall be known as the “Cybercrime Prevention Act of 2012″.…

    • 978 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Provide suggestions as to what we should do (Malaysian government and individual Malaysians) to curb or reduce cyber crimes in Malaysia.…

    • 330 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Cybercrime or electronic crime generally refers to criminal activity where a computer or network is the source, tool, target, or place of a crime. These categories are not exclusive and many activities can be characterized as falling in one or more category. Additionally, although the terms computer crime and cybercrime are more properly restricted to describing criminal activity in which the computer or network is a necessary part of the crime, these terms are also sometimes used to include traditional crimes, such as fraud, theft, blackmail, forgery, and embezzlement, in which computers or networks are used to facilitate the illicit activity. So basically it is a criminal activity committed on the internet. This is a broad term that describes everything from electronic cracking to denial of service attacks that cause electronic commerce sites to lose money. (Babu, Parishat,2004)…

    • 1643 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Outline Cyber Crime

    • 786 Words
    • 4 Pages

    The approaches for solving cyber-crime and helping the victims which should come from the government's controlling , Communities' and individuals' regulation and the development of Internet industry.…

    • 786 Words
    • 4 Pages
    Satisfactory Essays