Internet
Fact-checked

At EasyTechJunkie, we're committed to delivering accurate, trustworthy information. Our expert-authored content is rigorously fact-checked and sourced from credible authorities. Discover how we uphold the highest standards in providing you with reliable knowledge.

Learn more...

What is the Computer Misuse Act of 1990?

Tricia Christensen
Tricia Christensen
Tricia Christensen
Tricia Christensen

The Computer Misuse Act of 1990 is a law in the United Kingdom that makes certain activities illegal, such as hacking into other people’s systems, misusing software, or helping a person to gain access to protected files of someone else's computer. The act was created after the 1984-1985 R v. Gold case, which was appealed in 1988. The appeal was successful, inspiring parliament to create a law that would make punishable the behavior committed by Robert Schifreen and Stephen Gold. It obviously could not be applied retroactively, but it's goal was to discourage behavior like theirs in the future.

What occurred to prompt the case and ultimately lead to the law was the following: Gold watched an employee of Prestel at a tradeshow enter his username and password into a computer. Gold and Schifreen then used this information from a home computer to access the system of British Telecom Prestel, and specifically to enter the private message box of Prince Philip. Prestel became aware of this access, trapped the two men, and charged them with fraud and forgery. The men were convicted and fined, but they appealed their case.

The three sections of the Computer Misuse Act of 1990 include making it illegal to access computer material without authorization.
The three sections of the Computer Misuse Act of 1990 include making it illegal to access computer material without authorization.

One of the key aspects of the appeal was that the two men were not using the data in anyway for personal or illegal gain. Since no material gain was involved in spying on someone else’s system, they argued that the charges under the specific laws could not apply to them. The House of Lords acquitted the men, but became determined to forbid this type of behavior in future. This led to the Computer Misuse Act being developed and passed into law in 1990, two years after the successful appeal.

The act is split into three sections and makes the following acts illegal:

  • Unauthorized access to computer material
  • Unauthorized access to computer systems with intent to commit another offense
  • Unauthorized modification of computer material
Violating the Computer Misuse Act of 1990 can result in going to jail.
Violating the Computer Misuse Act of 1990 can result in going to jail.

The first section in the act forbids a person to use someone else’s identification to access a computer, run a program, or obtain any data, even if no personal gain is involved in such access. Individuals also cannot change, copy, delete, or move a program. The Computer Misuse Act also outlaws any attempts to obtain someone else’s password. Obviously, if someone gives another person his identification and he may legally use the computer, these laws under unauthorized access do not apply.

The Computer Misuse Act of 1990 outlaws attempts to obtain someone else's password.
The Computer Misuse Act of 1990 outlaws attempts to obtain someone else's password.

The second provision in the law is gaining access to a computer system in order to commit or facilitate a crime. An individual can’t use someone else’s system to send material that might be offensive or to start worms or viruses. He also can’t give someone his identification so that he can use a system for this purpose. This second part means that the individual would be facilitating someone else’s intent or crime.

According to the Computer Misuse Act, accessing a computer to commit a crime is illegal.
According to the Computer Misuse Act, accessing a computer to commit a crime is illegal.

Unauthorized modification in the Computer Misuse Act means that a person can’t delete, change, or corrupt data. Again, if someone puts a virus into someone else’s system, he would be violating the act. Usually, committing unauthorized access only is thought a crime punishable by fine. Access with intent and unauthorized modification are considered more severe and may be punished by heavy fines and/or jail time.

Tricia Christensen
Tricia Christensen

Tricia has a Literature degree from Sonoma State University and has been a frequent EasyTechJunkie contributor for many years. She is especially passionate about reading and writing, although her other interests include medicine, art, film, history, politics, ethics, and religion. Tricia lives in Northern California and is currently working on her first novel.

Learn more...
Tricia Christensen
Tricia Christensen

Tricia has a Literature degree from Sonoma State University and has been a frequent EasyTechJunkie contributor for many years. She is especially passionate about reading and writing, although her other interests include medicine, art, film, history, politics, ethics, and religion. Tricia lives in Northern California and is currently working on her first novel.

Learn more...

Discussion Comments

immortal

What are the limitations on electronic surveillance in South Africa?

anon265505

anon158860: Yes it is.

anon222409

Thanks for writing this article. it helped with my computing homework.

anon158860

Is it illegal for me to check my wife's email? Is it illegal to check her handphone messages without permission?

anon157741

Thanks so much for such an act. I believe the same helps computer users to know what it means to hack into someone's computer. what about the penalties involved? -- frank from uganda

anon129126

As a student, this has really help me to do research on this act.

anon88785

this article has really helped me see clearly about the misuse act of 1990. Thank you!

anon86634

it's just the same in the US.

anon71841

this article has really helped, thanks. how does the law protect students, though?

sinefey

Is there a US equivalent of this Law? I'm sure there must be, but I need the title.

I also wonder how Gold and Schifreen were acquitted. I understand they got through a loop hole about criminal intent/gain but wouldn't there be some charge in regards to the account belonging to PRINCE Philip?

Post your comments
Login:
Forgot password?
Register:
    • The three sections of the Computer Misuse Act of 1990 include making it illegal to access computer material without authorization.
      By: Photo_Ma
      The three sections of the Computer Misuse Act of 1990 include making it illegal to access computer material without authorization.
    • Violating the Computer Misuse Act of 1990 can result in going to jail.
      By: angelo.gi
      Violating the Computer Misuse Act of 1990 can result in going to jail.
    • The Computer Misuse Act of 1990 outlaws attempts to obtain someone else's password.
      By: jamdesign
      The Computer Misuse Act of 1990 outlaws attempts to obtain someone else's password.
    • According to the Computer Misuse Act, accessing a computer to commit a crime is illegal.
      By: Yeko Photo Studio
      According to the Computer Misuse Act, accessing a computer to commit a crime is illegal.
    • Sending a virus to an individual's computer would be considered a violation of the Computer Misuse Act of 1990.
      By: Minerva Studio
      Sending a virus to an individual's computer would be considered a violation of the Computer Misuse Act of 1990.