Computer Crime Flashcards

1
Q

Access

A

in relation to any computer system means instruct, communicate with, store data in, receive data from or otherwise make use of any of the resources of the computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authorisation

A

includes any authorisation conferred on a person by or under an enactment or a rile of law, or any an order of a court or judicial process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Computer system

A
  • A computer
  • Two or more interconnected computers
  • any communication links between computers or to remote terminals or another device
  • 2 or more computers combined with any communication links between computers or to remote terminals or any other device

and

includes any part of the items described above and all related input, output, processing, storage, software, or communication facilities and stored data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Whats the difference between S249(1) and 249(2)?

A

249(1) is when a person accesses a computer system and then obtains the offending material or causes loss where as 249(2) is when a person accesses the computer system with the intent regardless of the result

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

is a benefit limited to a financial or pecuniary advantage?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Does a person have to be aware of the loss at the tiem of the offence?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does the dishonestly relate to in S249(1)(a)

A

Accessing the computer system not obtaining the benefit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does 252(2) not apply to?

A

A person who has authorisation to access a computer system but does not use it for the purpose for which they have authoristion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Does a person need to be physically present to access a computer system?

A

No accessing a computer system remotely is sufficient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly