Legal Safeguards against Computer Misuse

The UK Computer Misuse Act 1990 comprises three sections which define various criminal offences.

Section 1 of the act concerns unauthorised access to computer systems which covers anything from harmless exploration, to hacking for access to specific data.

Section 2 deals with unauthorised access to computer systems with the intent of using the information accessed for a further offence, e.g. extortion.

Section 3 offences are those of unauthorised access to computer systems with the intent of modifying the contents of the computer.

Under the provisions of the Act, anyone convicted of any of these offences can be fined, imprisoned or both.

To view the related Policy click      

  • Persons who store, copy or distribute illegal or offensive material are committing an offence under the Computer Misuse Act.

There are 2 Key Actions providing safeguards against this Information Security Issue. These are available in the registered version of RUSecure™.

  • Authority to access the organisation's systems may be assumed, because unauthorised access is not expressly prohibited.

There are multiple Key Actions providing safeguards against this Information Security Issue. These are available in the registered version of RUSecure™.

  • System software messages, displayed prior to authenticated logon, can be construed as an invitation to use the computer system, and potentially encourage unauthorised access.

There are 2 Key Actions providing safeguards against this Information Security Issue. These are available in the registered version of RUSecure™.

  • Pre-login information screen messages which describe the services or options available to users once they have logged in, can increase the risk of further attempts to access your information systems.

There is 1 Key Action providing safeguards against this Information Security Issue. These are available in the registered version of RUSecure™.

  • System capacity and performance can deteriorate when unauthorised programs are run, possibly resulting in delays to critical business processing.

There are 2 Key Actions providing safeguards against this Information Security Issue. These are available in the registered version of RUSecure™.

  • Staff using the organisation's computer systems to process private data (e.g. mailing lists, creating a Web site, etc.) may not only be wasting time and resources, but additionally be committing offences under the Computer Misuse and Data Protection Acts.

There are multiple Key Actions providing safeguards against this Information Security Issue. These are available in the registered version of RUSecure™.

  • Where the terms and conditions of third party access to your organisations' systems are not covered by the associated contractual agreements between the respective organisations, your organisation is exposed to possible prosecution in the event of computer misuse.

There are 2 Key Actions providing safeguards against this Information Security Issue. These are available in the registered version of RUSecure™.

Previous PageTop of this pageNext Page


Information Security Policies from US$595

 From
 US$595

Use of the guidance contained within RUSecure™ is subject to the End User Licence Agreement
This site created with EasyHTMLHelp(tm) for MS Word

 

Next PageUpPrevious Page