TY - JOUR
T1 - Criminal law tackles computer fraud and misuse
AU - Bainbridge, David
PY - 2007/5/22
Y1 - 2007/5/22
N2 - The Computer Misuse Act 1990 was intended to deal with perceived weaknesses in the criminal law in relation to computer fraud and misuse. Particular issues concerned unauthorised access to computer material, unauthorised modification of computer programs and data and, in terms of computer fraud, the problem that it did not appear possible at law to deceive a machine and doubts about the applicability of the law of attempts to computer fraud. Since the 1990 Act came into force, there have been relatively few prosecutions under the Act but new forms of abuse have appeared such as the use of spyware and the activity of 'phishing'. Online fraud is now a major worry with fraudsters obtaining personal details with which to carry out their acts of fraud. Apart from the problem with deception, there were other defects in the fraud offences in the Theft Acts 1968 and 1978 and it was decided to replace these with a new Fraud Act. Further legislative changes to the Computer Misuse Act 1990 are in the pipeline. These will strengthen the Act and insert in new offences in relation to making, supplying or obtaining articles to be used to carry out the offences of unauthorised access and modification.
AB - The Computer Misuse Act 1990 was intended to deal with perceived weaknesses in the criminal law in relation to computer fraud and misuse. Particular issues concerned unauthorised access to computer material, unauthorised modification of computer programs and data and, in terms of computer fraud, the problem that it did not appear possible at law to deceive a machine and doubts about the applicability of the law of attempts to computer fraud. Since the 1990 Act came into force, there have been relatively few prosecutions under the Act but new forms of abuse have appeared such as the use of spyware and the activity of 'phishing'. Online fraud is now a major worry with fraudsters obtaining personal details with which to carry out their acts of fraud. Apart from the problem with deception, there were other defects in the fraud offences in the Theft Acts 1968 and 1978 and it was decided to replace these with a new Fraud Act. Further legislative changes to the Computer Misuse Act 1990 are in the pipeline. These will strengthen the Act and insert in new offences in relation to making, supplying or obtaining articles to be used to carry out the offences of unauthorised access and modification.
UR - http://www.scopus.com/inward/record.url?scp=84979819184&partnerID=8YFLogxK
U2 - 10.1016/j.clsr.2007.03.001
DO - 10.1016/j.clsr.2007.03.001
M3 - Article
AN - SCOPUS:84979819184
SN - 0267-3649
VL - 23
SP - 276
EP - 281
JO - Computer Law and Security Report
JF - Computer Law and Security Report
IS - 3
ER -