home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
The Word 6
/
The Word 6.adf
/
FiLeS
/
AntiHackingBill.txt
/
AntiHackingBill.txt
Wrap
Text File
|
2022-11-05
|
7KB
|
153 lines
ANTI-HACKING
A BILL
To create offences of unauthorised access to electronically stored data
and its transmission; to confer powers of monitoring, search, seizure
and destruction of such data; and for related purposes
Presented by Emma Nicholson
Offences
1.(1) (a) A person who effects unauthorised access to a computer or
computer system either (i) to his own or another's advantage; or (ii)to
another's prejudice or (b) being reckless as to whether his action would
result in (i) his own or another's advantage; or (ii) another's
perjudice; shall be guilty of an offence.
(2) A person who without lawful authority or reasonable excuse has in
his custody or under his control anything with the intention of
effecting unauthorised access to a computer or computer system to enable
some act or acts to his own or another's advantage or to another's
prejudice, shall be guilty of an offence.
(3) A person who, without lawful authority or reasonable excuse,
transmits, receives, or causes to be transmitted or received by means of
wire, radio or television communications including electro-magnetic
waves, any writing, signals, signs, pictures or sound (a) with the
intention of committing an act (i) to his own or another's advantage; or
(ii)to another's prejudice; or (b) being reckless as to whether his
action would result in (i) his own or another's advantage; or (ii)
another's perjudice; shall be guilty of an offence.
(4) A person commits and offence if he effects unauthorised access to
the computer of another for an unauthorised purpose.
Penalties 2.(1) A person guilty under section 1(1) above shall be
liable-
(a) on conviction on indictment, to a fine, or to imprisonment for a
term not exceeding ten years or to both; or
(b) on summary conviction, to a fine not exceeding level 5 on the
standard scale.
(2) A person guilty of an offence under subsection (2) or (3) of section
1 above shall be liable -
(a) on conviction on indictment, to a fine, or to imprisonment for a
term not exceeding five years or to both; or
(b) on summary conviction, to a fine not exceeding level 5 on the
standard scale.
(3) A person guilty of an offence under section 1(4) above shall be
liable on summsry conviction to a fine not exceeding level 5 on the
standard scale.
Powers of search and seizure
3.(1) If it appears to a Justice of Peace, from information given on
oath, that there is reasonable cause to believe that a person has in his
custody or under his control -
(a) anything which he or another has used, whether before or after the
coming into force of this act, or intends to use, for the making of
anything in contravention of section 1(2) above or
(b) any unauthorised documentation obtained by the unauthorised
accessing of a computer of another, whether before or after the coming
into force of this act or
(c) anything, custody or control of which, an offence under section 1(2)
above; he may issue a warrant authorising a constable to enter and
search the premises.
(2) If it appears to a Judge of the Crown Court from information given
to him on oath that there is reasonable cause to believe an electronic
device is being used to unlawfully access the computer of another, he
may authorise the monitoring of such a device, by the police, by
electronic means, in order to intercept the transmitted data and to
produce evidence ofunauthorised access
(3) A constable may at any time after the seizure of anything suspected
of falling within paragraph (a) or (b) of subsection (1) of this section
(whether the seizure was effected by virtue of a warrant under that
section or otherwise) apply to amagistrates court for an order under
this subsection withrespect to the object; and the court, if it is
satisfied boththat the object falls within any of those paragraphs and
that it is conducive to the public interest to do so, may make such an
order as it thinks fit for the forfeiture of the object and its
subsequent destruction or disposal.
(4) Subject to subsection (5) below the court by, or before, which a
person is convicted of an offence under this Act may order anything
shown to the satisfaction of the court to relate to the offence to be
forfeited and either destroyed or dealt with in such other manner as the
court may order.
(5) The court shall not order anything to be forfeited under subsection
(4) above where a person claiming to be the owner of, or otherwise
interested in it, applies to be heard by the court unless an opportunity
has been given to him to show cause why the order should not be made.
Interpretation
4.(1) In this Act -
"computer" includes any device for storing and processing information or
communications facility directly relating to, or operating in
conjunction with, such device. "wire" includes any wire, cable, printed
circuit, or any means by which communications
can be transmitted.
"unauthorised access" includes access by a person who is authorised to
have access to a computer, but who exceeds the terms of such
authorisation.
"another" includes any person, body corporate, institution, firm,
association, trust, or any other body of persons"prejudice" is caused
if, and only if, an action leads to -
(i) The temporary or permanent loss of property or information; or (ii)
The deprivation of an opportunity to earn remuneration or greater
remuneration; or (iii) The deprivation of an opportunity to gain
financial advantage otherwise than by way of remuneration.
(2) In this section "loss" includes not getting what one might get as
well as parting with what one has.
Jurisdiction
5. A court within England and Wales shall have jurisdiction for an
offence under this Act if at the time the offence was committed -
(a) the accused was within England and Wales; or
(b) the computer or computer system in relation to the offence was
within England and Wales; or
(c) the communiction links through which such an offence was committed
are within England and Wales; or
(d) the proceeds of the said offences are, or deposited,
processed or transferred from within England and Wales.
6.(1) This Act may be cited as the Anti-Hacking Act 1989.
(2) This act does not extend to Scotland or Northern Ireland.