Criminal law tackles computer fraud and misuse

David Bainbridge*

*Corresponding author for this work

Research output: Contribution to journalArticle

Abstract

The Computer Misuse Act 1990 was intended to deal with perceived weaknesses in the criminal law in relation to computer fraud and misuse. Particular issues concerned unauthorised access to computer material, unauthorised modification of computer programs and data and, in terms of computer fraud, the problem that it did not appear possible at law to deceive a machine and doubts about the applicability of the law of attempts to computer fraud. Since the 1990 Act came into force, there have been relatively few prosecutions under the Act but new forms of abuse have appeared such as the use of spyware and the activity of 'phishing'. Online fraud is now a major worry with fraudsters obtaining personal details with which to carry out their acts of fraud. Apart from the problem with deception, there were other defects in the fraud offences in the Theft Acts 1968 and 1978 and it was decided to replace these with a new Fraud Act. Further legislative changes to the Computer Misuse Act 1990 are in the pipeline. These will strengthen the Act and insert in new offences in relation to making, supplying or obtaining articles to be used to carry out the offences of unauthorised access and modification.

Original languageEnglish
Pages (from-to)276-281
Number of pages6
JournalComputer Law and Security Report
Volume23
Issue number3
DOIs
Publication statusPublished - 22 May 2007

Fingerprint

criminal law
fraud
act
offense
Law
larceny
data processing program
prosecution
Fraud
Criminal law
Computer program listings
Pipelines
abuse
Defects

Cite this

Bainbridge, David. / Criminal law tackles computer fraud and misuse. In: Computer Law and Security Report. 2007 ; Vol. 23, No. 3. pp. 276-281.
@article{38bacca1489045dab13ee91520c59faf,
title = "Criminal law tackles computer fraud and misuse",
abstract = "The Computer Misuse Act 1990 was intended to deal with perceived weaknesses in the criminal law in relation to computer fraud and misuse. Particular issues concerned unauthorised access to computer material, unauthorised modification of computer programs and data and, in terms of computer fraud, the problem that it did not appear possible at law to deceive a machine and doubts about the applicability of the law of attempts to computer fraud. Since the 1990 Act came into force, there have been relatively few prosecutions under the Act but new forms of abuse have appeared such as the use of spyware and the activity of 'phishing'. Online fraud is now a major worry with fraudsters obtaining personal details with which to carry out their acts of fraud. Apart from the problem with deception, there were other defects in the fraud offences in the Theft Acts 1968 and 1978 and it was decided to replace these with a new Fraud Act. Further legislative changes to the Computer Misuse Act 1990 are in the pipeline. These will strengthen the Act and insert in new offences in relation to making, supplying or obtaining articles to be used to carry out the offences of unauthorised access and modification.",
author = "David Bainbridge",
year = "2007",
month = "5",
day = "22",
doi = "10.1016/j.clsr.2007.03.001",
language = "English",
volume = "23",
pages = "276--281",
journal = "Computer Law and Security Report",
issn = "0267-3649",
publisher = "Elsevier",
number = "3",

}

Criminal law tackles computer fraud and misuse. / Bainbridge, David.

In: Computer Law and Security Report, Vol. 23, No. 3, 22.05.2007, p. 276-281.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Criminal law tackles computer fraud and misuse

AU - Bainbridge, David

PY - 2007/5/22

Y1 - 2007/5/22

N2 - The Computer Misuse Act 1990 was intended to deal with perceived weaknesses in the criminal law in relation to computer fraud and misuse. Particular issues concerned unauthorised access to computer material, unauthorised modification of computer programs and data and, in terms of computer fraud, the problem that it did not appear possible at law to deceive a machine and doubts about the applicability of the law of attempts to computer fraud. Since the 1990 Act came into force, there have been relatively few prosecutions under the Act but new forms of abuse have appeared such as the use of spyware and the activity of 'phishing'. Online fraud is now a major worry with fraudsters obtaining personal details with which to carry out their acts of fraud. Apart from the problem with deception, there were other defects in the fraud offences in the Theft Acts 1968 and 1978 and it was decided to replace these with a new Fraud Act. Further legislative changes to the Computer Misuse Act 1990 are in the pipeline. These will strengthen the Act and insert in new offences in relation to making, supplying or obtaining articles to be used to carry out the offences of unauthorised access and modification.

AB - The Computer Misuse Act 1990 was intended to deal with perceived weaknesses in the criminal law in relation to computer fraud and misuse. Particular issues concerned unauthorised access to computer material, unauthorised modification of computer programs and data and, in terms of computer fraud, the problem that it did not appear possible at law to deceive a machine and doubts about the applicability of the law of attempts to computer fraud. Since the 1990 Act came into force, there have been relatively few prosecutions under the Act but new forms of abuse have appeared such as the use of spyware and the activity of 'phishing'. Online fraud is now a major worry with fraudsters obtaining personal details with which to carry out their acts of fraud. Apart from the problem with deception, there were other defects in the fraud offences in the Theft Acts 1968 and 1978 and it was decided to replace these with a new Fraud Act. Further legislative changes to the Computer Misuse Act 1990 are in the pipeline. These will strengthen the Act and insert in new offences in relation to making, supplying or obtaining articles to be used to carry out the offences of unauthorised access and modification.

UR - http://www.scopus.com/inward/record.url?scp=84979819184&partnerID=8YFLogxK

U2 - 10.1016/j.clsr.2007.03.001

DO - 10.1016/j.clsr.2007.03.001

M3 - Article

AN - SCOPUS:84979819184

VL - 23

SP - 276

EP - 281

JO - Computer Law and Security Report

JF - Computer Law and Security Report

SN - 0267-3649

IS - 3

ER -