Computer Crime Flashcards
Access - definition
CA61; S248:
Means instruct, communicate with, store data in, receive data from, or otherwise make use of any of the resources of the computer system
Authorization - definition
CA61; S248:
Includes an authorisation conferred on a person by or under an enactment or a rule of law, or by a court order or judicial process.
Computer System - definition
(a) means—
(i) a computer; or
(ii) 2 or more interconnected computers; or
(iii) any communication links between computers or to remote terminals or another device; or
(iv) 2 or more interconnected computers combined with any communication links between computers or to remote terminals or any other device; and
(b) includes any part of the items described in paragraph (a) and all related input, output, processing, storage, software, or communication facilities, and stored data.
Accessing Computer System For Dishonest Purpose
Section and Elements
-
CA61; S249(1)(a)(b):** (7 years imprisonment)
1. directly or indirectly,
2. accesses any computer system *and thereby,
3. dishonestly or by deception,
4. and without claim of right
5. (a) obtains any property, privilege, service, benefit, pecuniary advantage, or valuable consideration; or (b) causes loss to any other person. -
CA61; S249(2)(a)(b):** (5 years imprisonment)
1. directly or indirectly,
2. accesses any computer system *with intent,
3. dishonestly or by deception,
4. and without claim of right
5. (a) to obtain any property, privilege, service, benefit, pecuniary advantage, or valuable consideration; or (b) to cause loss to any other person.
Distinction between 249(1) and 249(2)
‘Thereby’ and ‘Obtains’
249(1) - a person has actually accessed a computer system and obtains the offending material or causes loss
249(2) - is directed at someone who actually accesses the computer system with that intent regardless of the result.
Benefit not limited to financial or pecuniary advantage
Loss
Police v Le Roy - benefit bears its natural meaning of any advantage and is not limited to financial or pecuniary advantage.
Loss - R v Billingsley: the person who suffers loss does not have to be aware of the loss at the time of the offence.
Damaging or Interfering with a Computer System
Danger to life
Section/Elements
CA61; S250(1):
- Intentionally or recklessly
- Destroys, damages, or alters
- Any computer system
- If he or she knows or ought to know that danger to life is likely to result.
Damaging or Interfering with a Computer System
Without authorisation damages, deletes, modifies or interferes with
Section/Elements
CA61; S250(2)(a-c): (7 years imprisonment)
- Intentionally or recklessly
- And without authorisation
- Knowing that he or she is not authorised, or being reckless as to whether or not he or she is authorised
- (a) Damages, deletes, modifies, or otherwise interferes with or impairs any data or software in any computer system; or
(b) causes any data or software in any computer system to be damaged, deleted, modified, or otherwise interfered with or impaired; or
(c) causes any computer system to—
(i) fail; or
(ii) deny service to any authorised users.
Accessing Computer System without Authorisation
Section and Elements
CA61; S252:
- Intentionally accesses
- Directly or indirectly
- Any computer system
- Without authorisation
- Knowing that he or she is not authorised to access that computer system, OR being reckless as to whether or not he or she is authorised to access that computer system.
(2) Does not apply if - a person who is authorised to access a computer system accesses that computer system for a purpose other than the one for which that person was given access.
Without authorisation
The offence requires the defendant to have intentionally gained access, directly or indirectly, to a computer system where access to that computer system has not been authorised.
Offending carried out from remote computers
A person is not required to be physically present in order to access a computer system
Authorised access for dishonest purpose
252 does not apply to a person who has authorisation, but who accesses the computer system for a purpose other than the one for which he or she was given access.
In those circumstances S249 may apply.