Computer Misuse

Total Page:16

File Type:pdf, Size:1020Kb

Computer Misuse The Law Commission Working Paper No. 110 Computer Misuse I HER MAJESTY'S STATIONERY OFFICE I The Law Commission was set up by section 1 of the Law Commissions Act 1965 for the purpose of promoting the reform of the law. The Law Commissioners are: The Honourable Mr. Justice Beldam, Chairman Mr. Trevor M. Aldridge Mr. Brian Davenport, Q.C. Professor Julian Farrand Professor Brenda Hoggett The Secretary of the Law Commission is Mr. Michael Collon and its offices are at Conquest House, 37-38 John Street, Theobalds Road, London, WC1 N 280. Thisworkingpaper,completed on 11 August 1988,iscirculatedforcomment and criticism only. It does not represent the final views of the Law Commission. The Law Commission would be grateful for comments before 28 February 1989. All correspondence should be addressed to: Mr M N Farmer Law Commission Conquest House 37-38 John Street Theobalds Road London WClN 2BQ (Tel: 01-242 0861 Ext. 231 Fax: 01-242 1885) It may be helpful for the Law Commission, either in discussion with others concerned or in any subsequent recommendations,to be able to refer to and attribute comments submitted in response to thisworking paper. Whilst any request to treat all, or part, of a response in confidence will, of course, be respected, if no such request is made the Law Commission will assume that the response is not intended to be confidential. The Law Commission Working Paper No. 1 10 Computer Misuse LONDON HER MAJESTY'S STATIONERY OFFICE 0 Crown copyright 7988 First published 1988 ISBN 0 11 730192 2 THE LAW COMMJSSION WORKING PAPER NO. 110 Paragraphs I!%!? PARTI - JN"ROIX.JCTION 1.1-1.16 1 A. BACKGROUND 1.1-1.4 1 B. "COhWUI'ER CRIME" 1.6 - 1.6 3 C. PREPARATION AND STRUCTURE OF THE PAPER 1.1-1.10 4 D. GUIDELINES FOR THE CREATION OF NEW CRIMINAL OFFENCES 1.11 6 E. TERMINOLOGY 1.12-1.16 7 PARTE -TYJ?ESOFCOMPUI'ER- 2.1-2.19 10 A. COMPWI'ERFRAUD 2.2-2.9 11 1. Input frauds 2.4-2.6 11 2. Output frauds 2.7 13 3. Program frauds 2.8-2.9 13 B. UNAWIWORISED OBTAINING OF INFORMATION FROM A COMPUI'ER 2.10-2.16 14 1. Computer "hacking" 2.11-2.12 14 2. Eavesdropping on a computer 2.13 15 3. Making unauthorised use of computer facilities for personal benefit 2.14-2.16 16 C. UNAUTHORISED ALTERATION OR DESTRUCTION OF INFORMATION STORED ON A COMPUTER 2.16-2.17 17 D. DENYING ACCESS TO AN AWORLSED USER 2.18 18 iii Paragraphs E. UNAUTHORLSED REMOVAL OF INFORMATION STORED ON A COMPUTER 2.19 19 PART III - 'LHE SCOPE OF 'RIE PRESENT LAW 3.1-3.71 20 A. COMPUI'ERFRAUD 3.2-3.11 20 1. Theft 3.3-3.4 21 2. Obtaining property by deception, and other deception offences 3.6-3.7 21 3. False accounting 3.8-3.9 23 4. Conspiracy to defraud 3.10-3.11 26 B. OBTAINING UNAUI'HORLSED ACCESS TO A COMPUI'ER 3.12-3.34 26 1. Hacking 3.13-3.29 27 (a) Forgery 3.14-3.22 27 (b) Abstraction of electricity 3.23-3.26 32 (c) Criminal damage 3.26-3.27 33 (d) Interception of communications 3.28 34 (e) Improper use of a public telecommunication system 3.29 36 2. Eavesdropping on a computer 3.30-3.32 36 3. Using a computer for unauthorised private purposes 3.33-3.34 37 C. UNAUTHORISED ALTERATION OR ERASURE OF DATA OR SOFTWARE 3.36-3.40 38 D. UNAUI'HORISED COPYING OF DATA OR SOFTWARE 3.41-3.48 42 1. Temporary physical removal 3.42-3.44 43 2. Electronic copying 3.46-3.48 46 (a) Unauthorised copying under the Theft Act 1968 3.46-3.47 46 (b) Unauthorised copying under the Copyright, Designs and Patents Bill 1988 3.48 47 E. USE OF INFORMATION HELD UNDER ?HE DATA PROTECTION ACT 1984 3.49-3.60 47 iv Paiagraptis 1. The structure of the Act 3.60-3.63 48 2. Enforcement of the Act 3.64-3.67 61 3. The Data Protection Act 1984 and hacking 3.68-3.60 66 F. CML LIABlLITY FOR COMPUl'ER MISIKSE 3.61-3.63 66 C. THE SCOPE OF THE PRESENT LAW RELATING TO COMPVTER MIEXBE: CONCLWIONS 3.64-3.71 69 1. Computer fraud 3.64 69 2. Obtaining unauthorised access to a computer 3.66-3.67' 60 (a) Hacking 3.66 60 (b) Eavesdropping on a computer 3.66 60 (c) Using a computer for unauthorised private purposes 3.67 60 3. Unauthorised alteration or erasure of data or software 3.68 61 4. Unauthorised copying of data or software 3.69 61 5. Use of information held under the Data Protection Act 1984 3.70 62 6. Civil liability for computer misuse 3.71 62 PART Iv - REFORMING THE PRESENT LAW (1): OUR GENERAL APPROACH 4.1-4.7 63 A. POSSIBLE GENERAL APPROACHES TO REFORM 4.2-4.7 63 1. A computer crime statute 4.3 64 2. Limited reform of the general law 4.4 64 3. A "half-way'' approach 4.6-4.7 66 PART V - REFQRMING THE PRESENl' LAW (2): COMF'UER FRAUD 6.1-5.7 67 A. "DECEIVING" A MACHINE 6.1-6.6 67 B. OBTAlNING (COMPUl'ER) SERVICES BY DECEPTION 6.6 70 C. CONSPIRACY TO DEFRAUD 6.7 71 V 73 A. COULD THE CML LAW PROVIDE AN EFFECTIVE REMEDY AGAINST UNAUTHORISED ACCESS TO A COMPUTER? 6.4-6.6 74 B. SHOUI+D THE OBTAINING OF UNAWIl-iORISED ACCESS TO A COMPUTER BY HACKING BE A CRIMINAL OFFENCE? 6.7-6.19 76 1. The arguments for an offence 6.8-6.14 17 2. The arguments against an offence 6.16-6.16 81 3. The extent of the problem 6.17-6.18 82 4. Conclusions 6.19 86 C. OPTIONS FOR REFORM - GENERAL 6.20-6.24 86 1. "Obtaining access to a computer" 6.22-6.23 86 2. "Unauthorised" 6.24 88 D. PARTICULAR OPTIONS 6.26-6.37 90 1. Option A 6.26-6.28 . 90 (a) Arguments for 6.26 90 (b) Arguments against 6.27-6.28 90 2. Option B 6.29-6.31 91 (a) Arguments for 6.30 91 (b) Arguments against 6.31 91 3. Option C 6.32-6.34 92 (a) Arguments for 6.33 92 (b) Arguments against 6.34 92 3. Option D 6.36-6.37 93 (a) Arguments for 6.36 93 (b) Arguments against 6.37 . 94.. ' E. MODE OF TRIAL AND PENALTIES 6.38 94 F. A'ITEMPTS 6.39 96 PART W - REF'ClRMlNG THE PRE!SEW LAW (4): JuRlsDpcTION 7.1-7.14 96 vi Paragraphs A. COMMON-LAW RULES OF JURISDICTION 7.2-7.3 96 B. PARTICULAR FEATURES OF COMPUlER MISUSE 7.4-7.14 97 1. Computer fraud 7.6-7.9 98 2. Hacking 7.10-7.12 101 3. Unauthorised alteration or erasure of data or software 7.13-7.14 103 PART Vm - PROVISIONAL CONCLXE30W AND SUMMARY OF POINIS FOR COPSLILTATION 8.1-8.10 104 A. FRAUD 8.3 104 B. HACKING 8.4-8.8 106 C. USING A COMPUT'ER FOR UNAUI'HORLSED PRIVATE PURPOSES 8.10 107 D. UNAVT'HORISED ALTERATION OR ERASURE OF DATA OR SOFTWARE 8.11 108 . APPENDIX A - C0MF"ER MISUSE: ?HE LAW JN OTHER JURISDICTION5 1-58 109 A. INTRODUCTION 1-14 109 1. The "evolutionary" approach 6-9 111 2. Enacting computer-specific offences to "fit" into existing statutes 10-11 112 3. Enacting computer-specific statutes 12-14 112 B. CATEGORIES OF MISUSE 16-60 113 1. Unauthorised access 15-26 113 2. Other categories of misuse 27-37 119 3. Defences 38-43 123 4. Penalties 44-60 125 C. DEFINITIONS OF "COMPUTER" 51-58 126 APPENDM B - m To DISCLOSE INcIDENls OF COMPUIER MlSE4E 129 vii THE LAW COMMISSION WORKING PAPER NO. 110 COMPUTER MISUSE SUWMARY In this Working Paper, the Law Commission examines a range of activities which might be said to constitute computer misuse, and considers the application of the criminal law in England and Wales to them. The paper concludes that, in general, the present scheme of criminal offences is sufficient to deal with the forms of computer misuse identified. The Commission‘s provisional view is that a comprehensive computer crime statute is neither necessary nor appropriate here. Only one form of computer misuse might be said to require the creation of a “computer crime”: the obtaining of unauthorised access to a computer by “hacking“. The paper sets out the arguments for and against the criminalization of such conduct, and considers a range of options for a new offence. The Commission asks whether hacking should be criminalized and, if so, whether it should be an offence along the lines of one of the four options suggested. The purpose of this paper is to obtain the views of the public on the matters considered in it. viii THE LAW COMMISSION WORKING PAPER NO. 110 COMPUTER MISUSE PART I INTRODUCTION BACKGROUND 1.1 Computers now play an important part in our everyday lives. This technological development , upon which society is becoming ever more dependent in hundreds of different ways , has without doubt produced substantial benefits for us all. However, alongside these benefits lies I the disadvantage that computers and computer systems are vulnerable to all manner of misuse.
Recommended publications
  • LAW-112 Criminal Law II Department: Law Host Institution: University of Nicosia, Nicosia, Cyprus
    Global Learning Semesters Course Syllabus Course: LAW-112 Criminal Law II Department: Law Host Institution: University of Nicosia, Nicosia, Cyprus Course Summary Course Code Course Title Recommended Credit Hours LAW-112 Criminal Law II 3 Semester Offered Contact Hours Prerequisites Please contact us 42-45 LAW-111 Department Level of Course Language of Instruction Law Lower Division English Course Description The course offers a comprehensive introduction and invaluable foundation to the subject of Criminal Law, focusing primarily on the relevant salient principles fundamental to criminal liability and the current state of the law in the specific areas of study as laid down in the syllabus topics set forth hereunder. Within this context, the key aim of the course is to develop a sound understanding of legal method with particular emphasis on the ability to adopt an effective analytical approach with a view to identifying specific criminal conduct/issues, and applying the general principles of Criminal Law to given hypothetical situations and scenarios with reference to relevant case authority, applicable legislation and/or the opinions of recognised legal commentators and academics. Prerequisites LAW-111 Topic Areas 1. Inchoate/Anticipatory Offences: Incitement, Conspiracy, Attempt. 2. Homicide. Murder, Manslaughter (Voluntary and Involuntary). 3. Non-Fatal Offences Against the Person. Assault and Battery, Aggravated Assaults: (Assault with intent to resist arrest (assault on, resistance to, or obstruction of constables), Assault occasioning actual badily harm, Wounding and grievous bodily harm, Administering Poison, False Imprisonment, Kidnapping, Harassment. 4. Theft and Related Offences: Theft, Abstracting Electricity, Robbery, Offences involving deception, Making off without payment, Temporary deprivation, Blackmail, Burglary and aggravated burglary, Going equipped, Handling stolen goods.
    [Show full text]
  • Imagereal Capture
    Some Aspects of Theft of Computer Software by M. Dunning I. INTRODUCTION The purpose of this paper is to test the capability of New Zealand law to adequately deal with the impact that computers have on current notions of crimes relating to property. Has the criminal law kept pace with technology and continued to protect property interests or is our law flexible enough to be applied to new situations anyway? The increase of the moneyless society may mean a decrease in money motivated crimes of violence such as robbery, and an increase in white collar crime. Every aspect of life is being computerised-even our per­ sonality is on character files, with the attendant )ossibility of criminal breach of privacy. The problems confronted in this area are mostly definitional. While it may be easy to recognise morally opprobrious conduct, the object of such conduct may not be so easily categorised as criminal. A factor of this is a general lack of understanding of the computer process, so this would seem an appropriate place to begin the inquiry. II. THE COMPUTER Whiteside I identifies five key elements in a computer system. (1) Translation of data into a form readable by the computer, called input; and subject to manipulation by the introduction of false data. Remote terminals can be situated anywhere outside the cen­ tral processing unit (CPU), connected by (usually) telephone wires over which data may be transmitted, e.g. New Zealand banks on­ line to Databank. Outside users are given a site code number (identifying them) and an access code number (enabling entry to the CPU) which "plug" their remote terminal in.
    [Show full text]
  • The Larceny Act
    LARCENY THE LARCENY ACT ARRANGEMENT OF SECTIONS 1. Short title. PART I. Inferprefafion 2. Interpretation. 3. Definitions. 4. Offensive weapons. PART 11. Indictable Ofences 5. Simple larceny. 6. Larceny of cattle. 7. Killing animals with intent to steal. S. Larceny, etc., of dogs. 9. Larceny of wills. 10. Larceny of documents of title to land, etc. 11. Taking, destroying, etc., documents for a fraudulent purpose. 12. Damaging fixtures with intent to steal. 13. Praedial larceny. 14. Larceny of goods in process of manufxture. 15. Abstracting electricity. 16. Larceny, etc., of ore from mines, etc. 17. Larceny of postal articles. 18. Larceny in dwelling-houses. 19. Larceny from the person. 20. Larceny from ships, docks, etc. 2 1. Larceny by tenants or lodgers. 22. Larceny and embezzlement by clerks or servants. 23. Stealing or embezzlement by officer of Post Office. 24. Conversion. 25. Conversion by trustee. [The inclusion of this page Is authorized by L.N. 180At20061 LARCENY Factors obtaining advances on the property of their principals. Frauds by director. etc. Fraudulently inducing persons to invest money. Falsification of accounts. Falsification of account books of a bank. etc. Clerks. etc.. making out false dividend warrants. Personating the owner of stock. Personation with intent to obtain land. etc. Falsely acknowledging bail. etc. False pretences. Obtaining credit by fraud. Robbery. Sacrilege. Burglary. House-breaking and committing felony. House-breaking with intent to commit felony. Being found by night armed or in possession of house-breaking implements. Extortion. [Repealed by Act 29 of 200.5.] [Repealed by Act 29 of 2005.1 [Repealed byAct 29 of 2OO5.] Receiving.
    [Show full text]
  • Further Breakdowns of Cautions
    Statistical Notice Further breakdowns of cautions 30 September 2013 Background This ad-hoc statistical notice presents additional analysis on the use of adult cautions, and has been produced as supporting evidence for the Adult Simple Cautions Review. It provides further breakdowns of already published information on cautions in the format of: Indictable only offences: these offences are the most serious breaches of the criminal law such as violent and sexual offences and robbery, which are ordinarily tried at the Crown Court before a judge and jury. Triable either way offences: these offences include criminal damage where the value is £5,000 or greater, theft, burglary and drink driving and may be heard either at a magistrates’ court or tried at the Crown Court. Summary offences: These offences include common assault and criminal damage up to £5,000 and are usually heard only by a magistrates’ court. A simple caution can be administered when there is sufficient evidence to provide a realistic prospect of a conviction but it is not considered to be in the public interest to institute criminal proceedings. It aims to divert offenders away from court, and to reduce the likelihood that they will offend again. Cautions are intended for low level, often first time, offending. Additionally, the offender must admit guilt and consent to a caution in order for one to be given. The offender will be officially warned about the unacceptability of their behaviour, that the simple caution forms part of their criminal record and may be disclosed, and the likely consequences of committing further crimes will be explained.
    [Show full text]
  • Theft Offences Response to Consultation 1
    Theft Offences Response to Consultation RESPONSE CONSULTATION October 2015 Theft Offences Response to Consultation 1 Contents Foreword 2 Introduction 3 Approach 5 Culpability 7 Harm 12 Aggravating factors 16 Mitigating factors 18 Sentence levels 19 Next steps 21 Annex A: Consultation questions 22 Annex B: Consultation respondents 25 © Crown copyright 2015 This publication is licensed under the terms of the Open Government Licence v3.0 except where otherwise stated. To view this licence, visit nationalarchives.gov.uk/doc/open-government-licence/version/3 or write to the Information Policy Team, The National Archives, Kew, London TW9 4DU, or email: [email protected]. Where we have identified any third party copyright information you will need to obtain permission from the copyright holders concerned. 2 Theft Offences Response to Consultation Foreword On behalf of the Sentencing Council I would As a result of this work, the general approach like to thank all those who responded to the outlined in the consultation has been consultation on theft offences, and those who maintained, but a number of amendments have attended the consultation events. I would like to been made, principally to the assessment of make particular mention of the members of the harm within certain theft offences. The Council judiciary who gave their time to participate in wished to ensure that any additional harm the considerable research exercise undertaken caused to victims of theft could be taken into to inform the development of these guidelines. account by courts where appropriate, but that the process for assessing this harm should be As with all Sentencing Council consultations, clearer than the one outlined in the consultation.
    [Show full text]
  • Trade Secrets, Confidential Information, and the Criminal Law John
    Trade Secrets, Confidential Information, and the Criminal Law John T. Cross* The author examines the extent to which prop- L'auteur 6value le potentiel qu'a le droit crimi- erty offences in the criminal law can be used to nel de pr6venir l'appropriation malhonnete de police the misappropriation of trade secrets l'information confidentielle et des secrets and confidential information. After assessing commerciaux en ]a qualifiant d'atteinte au the long-standing debate on whether informa- droit de proprit6. L'auteur expose le long tion can be classified as property, he argues drbat sur la question a savoir si l'information that answering the question one way or the peut etre l'objet d'un droit de proprirtd; il con- other involves circular reasoning. When clut que dans un cas comme dans l'autre la judges label information "property," it is to raponse implique un raisonnement circulaire. enable them to grant the desired remedies. L'attribution du terme <<proprirt6 >>par les Courts should instead ask more directly juges depend du rsultat qu'ils veulent obtenir. whether certain information should be pro- Les tribunaux devraient plutrt centrer leur rai- tected under the circumstances. It follows that sonnement sur l'importance de prot~ger ou precedents holding that certain information is non l'information en question dans les circons- property in one area of the law should not be tances, sans se sentir lids par la jurisprudence authoritative in others. The article then ant~rieure qui aurait caractdris6 autrement ce explores efforts made in Great Britain, Canada meme type d'information dans un autre con- and the United States to apply criminal prop- texte juridique.
    [Show full text]
  • Criminal Law: Conspiracy to Defraud
    CRIMINAL LAW: CONSPIRACY TO DEFRAUD LAW COMMISSION LAW COM No 228 The Law Commission (LAW COM. No. 228) CRIMINAL LAW: CONSPIRACY TO DEFRAUD Item 5 of the Fourth Programme of Law Reform: Criminal Law Laid before Parliament bj the Lord High Chancellor pursuant to sc :tion 3(2) of the Law Commissions Act 1965 Ordered by The House of Commons to be printed 6 December 1994 LONDON: 11 HMSO E10.85 net The Law Commission was set up by section 1 of the Law Commissions Act 1965 for the purpose of promoting the reform of the law. The Commissioners are: The Honourable Mr Justice Brooke, Chairman Professor Andrew Burrows Miss Diana Faber Mr Charles Harpum Mr Stephen Silber QC The Secretary of the Law Commission is Mr Michael Sayers and its offices are at Conquest House, 37-38 John Street, Theobalds Road, London, WClN 2BQ. 11 LAW COMMISSION CRIMINAL LAW: CONSPIRACY TO DEFRAUD CONTENTS Paragraph Page PART I: INTRODUCTION 1.1 1 A. Background to the report 1. Our work on conspiracy generally 1.2 1 2. Restrictions on charging conspiracy to defraud following the Criminal Law Act 1977 1.8 3 3. The Roskill Report 1.10 4 4. The statutory reversal of Ayres 1.11 4 5. Law Commission Working Paper No 104 1.12 5 6. Developments in the law after publication of Working Paper No 104 1.13 6 7. Our subsequent work on the project 1.14 6 B. A general review of dishonesty offences 1.16 7 C. Summary of our conclusions 1.20 9 D.
    [Show full text]
  • Chapter 8 Criminal Conduct Offences
    Chapter 8 Criminal conduct offences Page Index 1-8-1 Introduction 1-8-2 Chapter structure 1-8-2 Transitional guidance 1-8-2 Criminal conduct - section 42 – Armed Forces Act 2006 1-8-5 Violence offences 1-8-6 Common assault and battery - section 39 Criminal Justice Act 1988 1-8-6 Assault occasioning actual bodily harm - section 47 Offences against the Persons Act 1861 1-8-11 Possession in public place of offensive weapon - section 1 Prevention of Crime Act 1953 1-8-15 Possession in public place of point or blade - section 139 Criminal Justice Act 1988 1-8-17 Dishonesty offences 1-8-20 Theft - section 1 Theft Act 1968 1-8-20 Taking a motor vehicle or other conveyance without authority - section 12 Theft Act 1968 1-8-25 Making off without payment - section 3 Theft Act 1978 1-8-29 Abstraction of electricity - section 13 Theft Act 1968 1-8-31 Dishonestly obtaining electronic communications services – section 125 Communications Act 2003 1-8-32 Possession or supply of apparatus which may be used for obtaining an electronic communications service - section 126 Communications Act 2003 1-8-34 Fraud - section 1 Fraud Act 2006 1-8-37 Dishonestly obtaining services - section 11 Fraud Act 2006 1-8-41 Miscellaneous offences 1-8-44 Unlawful possession of a controlled drug - section 5 Misuse of Drugs Act 1971 1-8-44 Criminal damage - section 1 Criminal Damage Act 1971 1-8-47 Interference with vehicles - section 9 Criminal Attempts Act 1981 1-8-51 Road traffic offences 1-8-53 Careless and inconsiderate driving - section 3 Road Traffic Act 1988 1-8-53 Driving
    [Show full text]
  • Itu Toolkit for Cybercrime Legislation
    International Telecommunication Union Cybercrime Legislation Resources ITU TOOLKIT FOR CYBERCRIME LEGISLATION Developed through the American Bar Association’s Privacy & Computer Crime Committee Section of Science & Technology Law With Global Participation ICT Applications and Cybersecurity Division Policies and Strategies Department ITU Telecommunication Development Sector Draft Rev. February 2010 For further information, please contact the ITU-D ICT Applications and Cybersecurity Division at [email protected] Acknowledgements We are pleased to share with you a revised version of the ITU Toolkit for Cybercrime Legislation. This version reflects the feedback received since the launch of the Toolkit in May 2009. If you still have input and feedback on the Toolkit, please do not hesitate to share this with us in the BDT’s ICT Applications and Cybersecurity Division at: [email protected]. (The deadline for input on this version of the document is 31 July 2010.) This report was commissioned by the ITU Development Sector’s ICT Applications and Cybersecurity Division. The ITU Toolkit for Cybercrime Legislation was developed by the American Bar Association’s Privacy & Computer Crime Committee, with Jody R. Westby as the Project Chair & Editor. All rights reserved. No part of this publication may be reproduced in any form or by any means without written permission from the ITU and the American Bar Association. Denominations and classifications employed in this publication do not imply any opinion concerning the legal or other status of any territory or any endorsement or acceptance of any boundary. Where the designation "country" appears in this publication, it covers countries and territories. The ITU Toolkit for Cybercrime Legislation is available online at: www.itu.int/ITU-D/cyb/cybersecurity/legislation.html This document has been issued without formal editing.
    [Show full text]
  • DIXON V R – PROPERTY in DIGITAL INFORMATION?
    ANUSHA WIJEWICKRAMA DIXON v R – PROPERTY IN DIGITAL INFORMATION? Submitted for the LLB (Honours) Degree Faculty of Law Victoria University of Wellington 2016 2 In 2015, New Zealand’s Supreme Court ruled in Dixon v R that digital files are property for the limited purposes of a computer misuse provision – s 249(1)(a) of the Crimes Act 1961. The Court said it was distinguishing digital files from pure information, thus it was not challenging the long-standing legal position that information cannot be property. This paper analyses the Court’s purposive, conceptual and factual reasoning, ultimately concluding that a distinction between digital files and information is difficult to justify. It argues that the Court’s decision therefore actually erodes the traditional legal position. It concludes that Parliament, which can more fully explore policy considerations, might be better placed to determine whether digital files should be property. Potential ramifications of the Supreme Court’s decision are also briefly outlined. Key words: property; digital files; information; Crimes Act 1961 s 249(1)(a); computer misuse I Introduction New Zealand's Supreme Court ruled in Dixon v R that digital files are not simply information, but are “property” for the purposes of s 249(1)(a) of the Crimes Act 1961.1 In doing so the Court expressly stated that it was not reconsidering the orthodox legal position that there is no property in pure information.2 Instead it used a purposive approach to determine Parliament's intent regarding computer misuse, and deemed digital files to be property for the limited purpose of s 249(1)(a).
    [Show full text]
  • Criminal Law Review
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by University of Salford Institutional Repository Page1 Criminal Law Review 2008 The Computer Misuse Act 1990: lessons from its past and predictions for its future Neil MacEwan Subject: Criminal law. Other related subjects: Information technology Keywords: Computer crime; Computer security Legislation: Computer Misuse Act 1990 s.1 , s.3 Police and Justice Act 2006 s.35 , s.36 *Crim. L.R. 955 Summary: The age of the internet has thrown down some real challenges to the Computer Misuse Act 1990. Recently, the Government made changes to this piece of legislation, in an attempt to meet two of those challenges--the proliferation of “ Denial of Service” (DoS) attacks, and the creation and dissemination of “ Hackers' tools” --and to fulfil international commitments on cybercrime. Yet some of these new measures invite criticisms of policy, form and content, and bring doubts about how easy to interpret, and how enforceable, they will be. Introduction Finally, after three aborted attempts to make changes to it within the last five years,1 the Computer Misuse Act (CMA) 1990 has been amended; specifically, both added to and altered.2 The offence of unauthorised access to computer material, 3 formerly a summary offence, has now become an offence triable either way, and the offence of unauthorised modification of computer material 4 has been replaced by the offence of unauthorised acts with intent to impair, or recklessness as to impairing, the operation of a computer etc. The time is right for a close re-examination of this piece of legislation.
    [Show full text]
  • Annual Report 1988-89
    CENTRE FOR CRIMINAL JUSTICE STUDIES FIRST ANNUAL REPORT 1988-89 Table of Contents Introduction. The Work of the Centre. A Research projects. B Postgraduate study. C Relevant papers and publications by members of the Centre during 1988/9. D Seminars, Conferences and Continuing Education. Appendices Appendix 1 - Constitution of The Centre. Appendix 2 - Membership of The Centre. Appendix 3 - Centre Papers. • Submissions to the Law Commission Law Commission Working Paper No. 103 - Binding Over • Law Commission Working Paper No. 110 - Computer Misuse INTRODUCTION The Centre for Criminal Justice Studies was provisionally established in 1987 and was formally approved by the University in March 1988. Its object, as set out in its Constitution (see Appendix 1), is the pursuit of research and study into all aspects of criminal justice systems. This remit, as undertaken by the Executive Committee (see Appendix 2), has in practice included the encouragement of postgraduate students and research projects, and the arrangement of seminars and conferences. The Centre's 1 members comprise both lawyers and non-lawyers, and its work is generously assisted by an Advisory Committee, which consists of academics and practitioners in relevant fields of experience (Appendix 2). Professor Clive Walker Director Centre for Criminal Justice Studies University of Leeds Leeds LS2 9JT o Tel: +0044 (0)113 233 5033 o Fax: +0044 (0)113 233 5056 o email: [email protected] 10th July 1989 THE WORK OF THE CENTRE A Research projects Two research projects are currently in hand. (a) Reporting of Crown Court proceedings and the Contempt of Court Act 1981. This project is funded by the Leverhulme Trust and is directed by Dr.
    [Show full text]