Computer Crime Flashcards

1
Q

Access

A

Instruct, communicate with, store data in, receive data from, or otherwise make use to any of the resources of the computer system

Short: Interactions with a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authorisation

A

Authorisation conferred on a person by or under an enactment or a rule of law, or by an order of a court or judicial process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Computer system

A

(1) A computer
(2) 2 or more interconnected computers
(3) Any communication links between computers or to remote terminals or another device
(4) 2 or more interconnected computers combined with any communication links between computers or to remote terminals or any other device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Section 249, Crimes Act 1961

Accessing a computer system for a dishonest purpose - 7yrs (1)
Accessing a computer system for a dishonest purpose - 5yrs (2)

A

(1)

  • Directly or indirectly
  • Accesses any computer system, and thereby
  • Dishonestly or by deception
  • Without claim of right
    (a) obtains any property, privilege, service etc
    (b) causes loss to any other person

(2)

  • Directly or indirectly
  • Access any computer system with intent
  • Dishonestly or by deception
  • Without claim of right
    (a) to obtain any property, privilege, service etc
    (b) to cause loss to any other person
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the difference between s249 subsection (1) and (2)?

A

(1) Where a person has actually accessed a computer system and obtains the material or causes loss to a person
(2) Where a person actually accesses the computer system with intent, regardless of the outcome

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Section 250, Crimes Act 1961

Damaging or interfering with a computer system - 10yrs (1)
Damaging or interfering with a computer system - 7yrs (2)

A

(1)

  • Intentionally or recklessly
  • Destroys, damages or alters
  • Any computer system
  • If he or she knows or ought to know that danger to life is likely to result

(2)

  • Intentionally or recklessly
  • Without authorisation
  • Knowing that he or she is not authorised or being reckless as to whether he or she is authorised -
    (a) Damages, deletes, modifies or otherwise interferes with or impairs any data or software on any computer system
    (b) Causes any data or software in any computer system to be damaged, deleted, modified or otherwise interfered with or impaired
    (c) Causes any computer system to
  • Fail
  • Deny service to authorised users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the distinction between 250(1) and 250(2)?

A

(1) Reflects more serious from or arson, wilful damage, endangering transport etc which have the element of endangering life
(2) Makes it an offence to damage etc any computer system and adds the requirement that the defendant must act without authorisation and knowledge/recklessness that they are not authorised
(2b) Includes instances of his/her own actions, or third party actions, will cause damage to computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Section 252, Crimes Act 1961

Accessing Computer System Without Authorisation (2yrs)

A
  • Intentionally accesses
  • Directly or indirectly
  • Any computer system without authorisation
  • Knowing that he or she is not authorised to access that comp system or being reckless as to whether or not he or she is authorised to access that comp system

Does not apply to person who has authorisation to use computer system but accesses that computer system for a purpose other than the one for which the person was given access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly