메뉴 건너뛰기




Volumn , Issue 12, 2008, Pages 955-967

The Computer Misuse Act 1990: Lessons from its past and predictions for its future

Author keywords

[No Author keywords available]

Indexed keywords


EID: 58049152718     PISSN: 0011135X     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Review
Times cited : (18)

References (136)
  • 1
    • 58049186541 scopus 로고    scopus 로고
    • May 1, 2002, April 5, 2005 and July 12, 2005.
    • May 1, 2002, April 5, 2005 and July 12, 2005.
  • 2
    • 58049136760 scopus 로고    scopus 로고
    • Via ss.35-38 of the Police and Justice Act 2006. Although the PJA 2006 received Royal Assent on November 8, 2006, ss.35-38 did not come into force until October 1, 2008 (via The Police and Justice Act 2006 (commencement No.9) Order 2008). Note also that the Serious Crime Act (SCA) 2007 has amended PJA 2006 ss.35 and 36 by removing from them the offences of enabling unauthorised access to computer material, and enabling acts with intent to impair the operation of a computer etc.-see SCA 2007s.61(l), (2) and (3), respectively. Also, having abolished the common law offence of incitement (see s.59), the SCA 2007 has removed all references to offences of incitement from the CMA 1990-see SCA 2007 ss.6(3), 7(4), 8(3) and 9(2)(d).
    • Via ss.35-38 of the Police and Justice Act 2006. Although the PJA 2006 received Royal Assent on November 8, 2006, ss.35-38 did not come into force until October 1, 2008 (via The Police and Justice Act 2006 (commencement No.9) Order 2008). Note also that the Serious Crime Act (SCA) 2007 has amended PJA 2006 ss.35 and 36 by removing from them the offences of enabling unauthorised access to computer material, and enabling acts with intent to impair the operation of a computer etc.-see SCA 2007s.61(l), (2) and (3), respectively. Also, having abolished the common law offence of incitement (see s.59), the SCA 2007 has removed all references to offences of incitement from the CMA 1990-see SCA 2007 ss.6(3), 7(4), 8(3) and 9(2)(d).
  • 3
    • 58049158574 scopus 로고    scopus 로고
    • The basic hacking offence in s. 1
    • The basic hacking offence in s. 1.
  • 4
    • 58049151293 scopus 로고    scopus 로고
    • Ins.3
    • Ins.3.
  • 5
    • 58049159768 scopus 로고
    • Cr. App. R. 25
    • Whiteley (1991) 93 Cr. App. R. 25.
    • (1991) Whiteley , pp. 93
  • 6
    • 58049160695 scopus 로고    scopus 로고
    • See Confederation of British Industry, Submission to the Law Commission on Working Paper No. 110 on Computer Misuse-The CBI Submission Pan II (1990) 6(2) Computer Law and Security Report 23, 24.
    • See Confederation of British Industry, "Submission to the Law Commission on Working Paper No. 110 on Computer Misuse-The CBI Submission Pan II" (1990) 6(2) Computer Law and Security Report 23, 24.
  • 7
    • 58049175850 scopus 로고    scopus 로고
    • See also Law Commission Working Paper No. l10, Computer Misuse (1988), para.3.62.
    • See also Law Commission Working Paper No. l10, Computer Misuse (1988), para.3.62.
  • 8
    • 58049169766 scopus 로고
    • Computer-related Crime Under Commonwealth Law, and the Draft Federal Criminal Code
    • See
    • See R. Brown, "Computer-related Crime Under Commonwealth Law, and the Draft Federal Criminal Code" (1986) 10 Criminal Law Journal 377;
    • (1986) Criminal Law Journal , vol.10 , pp. 377
    • Brown, R.1
  • 9
    • 58049177491 scopus 로고    scopus 로고
    • C. Tapper, 'Computer Crime': Scotch Mist? [1987] Crim. L.R. 4; Law Commission Working Paper No.l 10, Computer Misuse (1988), para. 1.4; H. Cornwall, Hacking away at computer law reform (1988) 138 N.L.J. 702;
    • C. Tapper, '"Computer Crime': Scotch Mist?" [1987] Crim. L.R. 4; Law Commission Working Paper No.l 10, Computer Misuse (1988), para. 1.4; H. Cornwall, "Hacking away at computer law reform" (1988) 138 N.L.J. 702;
  • 10
    • 58049135191 scopus 로고    scopus 로고
    • D. Bainbridge, Computer Misuse: What should the law do? (1989) 133 S.J. 466.
    • D. Bainbridge, "Computer Misuse: What should the law do?" (1989) 133 S.J. 466.
  • 11
    • 58049147331 scopus 로고    scopus 로고
    • In 1994/95
    • In 1994/95.
  • 12
    • 58049136400 scopus 로고    scopus 로고
    • This term has several meanings, but in this context is used to connote activities done in pursuit of unauthorised access to computer programs or data
    • This term has several meanings, but in this context is used to connote activities done in pursuit of unauthorised access to computer programs or data.
  • 14
    • 58049168062 scopus 로고    scopus 로고
    • M. Wasik, Law Reform Proposals on Computer Misuse [1989] Crim. L.R. 257, 260.
    • M. Wasik, "Law Reform Proposals on Computer Misuse" [1989] Crim. L.R. 257, 260.
  • 15
    • 58049141019 scopus 로고    scopus 로고
    • Tapper, 'Computer Crime': Scotch Mist? [1987] Crim. L.R. 4, 19.
    • Tapper, '"Computer Crime': Scotch Mist?" [1987] Crim. L.R. 4, 19.
  • 16
    • 58049184010 scopus 로고    scopus 로고
    • Malone v Commissioner of Police of the Metropolis [1979] Ch. 344 and Oxford v Moss (1978) 68 Cr. App. R. 183, respectively.
    • Malone v Commissioner of Police of the Metropolis [1979] Ch. 344 and Oxford v Moss (1978) 68 Cr. App. R. 183, respectively.
  • 17
    • 58049184631 scopus 로고    scopus 로고
    • O. Bowcott, New hacking law 'too hard to enforce', Guardian, August 29, 1990, p.2; Wasik, Law Reform Proposals on Computer Misuse [1989] Crim. L.R. 257, 260.
    • O. Bowcott, "New hacking law 'too hard to enforce'", Guardian, August 29, 1990, p.2; Wasik, "Law Reform Proposals on Computer Misuse" [1989] Crim. L.R. 257, 260.
  • 18
    • 77950480583 scopus 로고    scopus 로고
    • Should the Law of Theft extend to Information? (2005) 69
    • A. Christie, "Should the Law of Theft extend to Information?" (2005) 69(4) J. Crim. L. 349;
    • J. Crim , vol.50 , pp. 349
    • Christie, A.1
  • 19
    • 58049144372 scopus 로고    scopus 로고
    • E. Wilding, Hacked Off' (2006) 156 N.L.J. 753.
    • E. Wilding, "Hacked Off' (2006) 156 N.L.J. 753.
  • 20
    • 58049134576 scopus 로고    scopus 로고
    • Cornwall, Hacking away at computer law reform (1988) 138 N.L.J. 702, 703.
    • Cornwall, "Hacking away at computer law reform" (1988) 138 N.L.J. 702, 703.
  • 21
    • 58049141007 scopus 로고    scopus 로고
    • Bowcott, New hacking law 'too hard to enforce', Guardian, August 29, 1990, p.2; B. Napier, An end to hacking? (1989) 133 S.J. 1554.
    • Bowcott, "New hacking law 'too hard to enforce'", Guardian, August 29, 1990, p.2; B. Napier, "An end to hacking?" (1989) 133 S.J. 1554.
  • 22
    • 58049180695 scopus 로고    scopus 로고
    • Law Com. No.186, Computer Misuse. Cm.819 (1989), para.2.13.
    • Law Com. No.186, Computer Misuse. Cm.819 (1989), para.2.13.
  • 23
    • 58049162961 scopus 로고    scopus 로고
    • Law Com. No.186, Computer Misuse. Cm.819 (1989), para.2.28.
    • Law Com. No.186, Computer Misuse. Cm.819 (1989), para.2.28.
  • 24
    • 34447156990 scopus 로고    scopus 로고
    • D. Bainbridge, Hacking-The Unauthorised Access of Computer Systems: The Legal Implications (1989) 52 M.L.R. 236;
    • D. Bainbridge, "Hacking-The Unauthorised Access of Computer Systems: The Legal Implications" (1989) 52 M.L.R. 236;
  • 25
    • 58049172866 scopus 로고
    • New hacking law 'too hard to enforce'
    • August
    • Bowcott, "New hacking law 'too hard to enforce'", Guardian, August 29, 1990, p.2.
    • (1990) Guardian , vol.29 , pp. 2
    • Bowcott1
  • 26
    • 58049176924 scopus 로고    scopus 로고
    • The original CMA s.3 offence of unauthorised modification has now made way for the new s.3 offence of unauthorised impairment, inserted via PJA 2006 s.36.
    • The original CMA s.3 offence of "unauthorised modification" has now made way for the new s.3 offence of "unauthorised impairment", inserted via PJA 2006 s.36.
  • 27
    • 58049141856 scopus 로고    scopus 로고
    • l(l)(b),2(l) and 3(l)a
    • CMAss.l(l)(b),2(l) and 3(l)(a).
    • CMAss1
  • 28
    • 58049142454 scopus 로고    scopus 로고
    • CMA ss.l7(5)(a) and (b), and 17(8)(a) and (b).
    • CMA ss.l7(5)(a) and (b), and 17(8)(a) and (b).
  • 29
    • 58049158564 scopus 로고    scopus 로고
    • Law Com. No.186, Computer Misuse. Cm.819 (1989), para.3.35.
    • Law Com. No.186, Computer Misuse. Cm.819 (1989), para.3.35.
  • 30
    • 58049163558 scopus 로고    scopus 로고
    • Cr. App. R. 1
    • DPP v Bignell [1998] 1 Cr. App. R. 1.
    • (1998) DPP v Bignell , pp. 1
  • 31
    • 58049155703 scopus 로고    scopus 로고
    • At the very least, because it was stipulated in a manual which had been issued to them
    • At the very least, because it was stipulated in a manual which had been issued to them.
  • 32
    • 58049180075 scopus 로고    scopus 로고
    • Crim. L.R. 54
    • [1998] Crim. L.R. 54.
  • 33
    • 58049178425 scopus 로고    scopus 로고
    • R. v Bow Street Magistrates' Court Ex p. Allison [2000] 2 A.C. 216.
    • R. v Bow Street Magistrates' Court Ex p. Allison [2000] 2 A.C. 216.
  • 34
    • 58049139846 scopus 로고    scopus 로고
    • Hacking, Viruses and Fraud
    • Y. Akdeniz, C. Walker and D. Wall eds
    • M. Wasik, "Hacking, Viruses and Fraud" in Y. Akdeniz, C. Walker and D. Wall (eds), The Internet, Law and Society (2000), p.277.
    • (2000) The Internet, Law and Society , pp. 277
    • Wasik, M.1
  • 36
    • 58049141580 scopus 로고    scopus 로고
    • D. Ormerod ed, 11th edn
    • D. Ormerod (ed.), Smith and Hogan: Criminal Law, 11th edn (2005), p. 167.
    • (2005) Smith and Hogan: Criminal Law , pp. 167
  • 37
    • 58049151587 scopus 로고
    • November 3, Newcastle under Lyme Magistrates' Court
    • Bonnett, unreported, November 3, 1995, Newcastle under Lyme Magistrates' Court.
    • (1995) Bonnett, unreported
  • 38
    • 58049152812 scopus 로고    scopus 로고
    • Farquarson, unreported, December 9, 1993, Croydon Magistrates' Court.
    • Farquarson, unreported, December 9, 1993, Croydon Magistrates' Court.
  • 39
    • 58049175252 scopus 로고    scopus 로고
    • Cropp, unreported, case note at (1991) 7 C.L.S.R. 168.
    • Cropp, unreported, case note at (1991) 7 C.L.S.R. 168.
  • 40
    • 58049185104 scopus 로고    scopus 로고
    • Attorney-General's Reference (No. 1 of 1991) [1993] Q.B. 94.
    • Attorney-General's Reference (No. 1 of 1991) [1993] Q.B. 94.
  • 41
    • 58049139359 scopus 로고
    • unreported, May 21, Southwark Crown Court
    • Bedworth, unreported, May 21, 1993, Southwark Crown Court.
    • (1993) Bedworth
  • 42
    • 58049142748 scopus 로고    scopus 로고
    • C. Christian, Down and Out in Cyberspace (1993) 90 L.S. Gaz. 2.
    • C. Christian, "Down and Out in Cyberspace" (1993) 90 L.S. Gaz. 2.
  • 43
    • 58049188197 scopus 로고    scopus 로고
    • Gold, Schifreen [1987] Q.B. 1116.
    • Gold, Schifreen [1987] Q.B. 1116.
  • 44
    • 58049173911 scopus 로고    scopus 로고
    • Y. Akdeniz, Encyclopedia of E-Commerce Law (2005), para.15.007.
    • Y. Akdeniz, Encyclopedia of E-Commerce Law (2005), para.15.007.
  • 45
    • 58049149424 scopus 로고    scopus 로고
    • See, e.g. Canadian Teen Charged in Web site attack released, CNN.com, April 19, 2000, http://edition.cnn.com/2000/TECH/computing/ 04/19/dos.investtgation/index.html [Accessed September 21, 2008].
    • See, e.g. "Canadian Teen Charged in Web site attack released", CNN.com, April 19, 2000, http://edition.cnn.com/2000/TECH/computing/ 04/19/dos.investtgation/index.html [Accessed September 21, 2008].
  • 46
    • 58049187907 scopus 로고    scopus 로고
    • By malware which has been delivered either by spam email or via drive-by downloads
    • By malware which has been delivered either by spam email or via "drive-by downloads".
  • 47
    • 58049162106 scopus 로고    scopus 로고
    • See the biannual Symantec Threat Report 2006, cited in Denial-of-service hacking soars, BBC News, March 9, 2006, http://news.bbc.co.uk/go/pr/fr/-/1/hi/technology/4787474.stm [Accessed September 21, 2008].
    • See the biannual Symantec Threat Report 2006, cited in "Denial-of-service hacking soars", BBC News, March 9, 2006, http://news.bbc.co.uk/go/pr/fr/-/1/hi/technology/4787474.stm [Accessed September 21, 2008].
  • 48
    • 58049160983 scopus 로고    scopus 로고
    • e.g. threatened attacks against online betting websites in the lead-up to the Grand National race (http://www.timesonline.co.uk/tol/news/ articlel027674.ece [Accessed October 13, 2008]) and the Cheltenham Festival (http://www.theregister.co.uk/2004/03/17/online-extortionists-target- cheltenham [Accessed September 21, 2008]) in February and March 2004, respectively.
    • e.g. threatened attacks against online betting websites in the lead-up to the Grand National race (http://www.timesonline.co.uk/tol/news/ articlel027674.ece [Accessed October 13, 2008]) and the Cheltenham Festival (http://www.theregister.co.uk/2004/03/17/online-extortionists-target- cheltenham [Accessed September 21, 2008]) in February and March 2004, respectively.
  • 49
    • 58049175836 scopus 로고    scopus 로고
    • See, e.g. Hacktivists' attempt to disrupt ECHELON (the international electronic communications surveillance network) on Jam Echelon Day October 21
    • See, e.g. Hacktivists' attempt to disrupt ECHELON (the international electronic communications surveillance network) on Jam Echelon Day (October 21, 1999)-
    • (1999)
  • 50
    • 58049159754 scopus 로고    scopus 로고
    • see, at, Accessed September 21, 2008
    • see C. Oakes, "Monitor This, Echelon", at http://www.wired. com/politics/law/news/1999/10/32039 [Accessed September 21, 2008].
    • Monitor This, Echelon
    • Oakes, C.1
  • 51
    • 58049186985 scopus 로고    scopus 로고
    • See, e.g. the recent allegations of the Estonian Government that Russian authorities were responsible for a wave of attacks upon their websites, designed to make the Baltic State's systems crash and paralyse its infrastructure-see http://www.timesonline.co.uk/tol/news/world/article1803847.ece [Accessed September 21, 2008].
    • See, e.g. the recent allegations of the Estonian Government that Russian authorities were responsible for a wave of attacks upon their websites, designed to make the Baltic State's systems crash and paralyse its infrastructure-see http://www.timesonline.co.uk/tol/news/world/article1803847.ece [Accessed September 21, 2008].
  • 52
    • 58049170658 scopus 로고    scopus 로고
    • All Party Internet Group, June
    • All Party Internet Group Report, Revision of the Computer Misuse Act (June 2004), p. 10 (http://www. apcomms. org. uk).
    • (2004) Report, Revision of the Computer Misuse Act , pp. 10
  • 53
    • 58049178092 scopus 로고    scopus 로고
    • Lennon, unreported, November 2, 2005, Wimbledon Magistrates' Court.
    • Lennon, unreported, November 2, 2005, Wimbledon Magistrates' Court.
  • 54
    • 58049165763 scopus 로고    scopus 로고
    • An example of a DoS attack
    • An example of a DoS attack.
  • 55
    • 58049155389 scopus 로고    scopus 로고
    • Using a mail-bombing program named Avalanche, which he had downloaded from the internet
    • Using a mail-bombing program named Avalanche, which he had downloaded from the internet.
  • 56
    • 58049172234 scopus 로고    scopus 로고
    • T. Espinger, Teenager cleared of email attack charge, ZDNet News, November 2, 2005 (http://news.zdnet.co.uk/security/0, 1000000189,39235359,00.htm [Accessed October 13, 2008]).
    • T. Espinger, "Teenager cleared of email attack charge", ZDNet News, November 2, 2005 (http://news.zdnet.co.uk/security/0, 1000000189,39235359,00.htm [Accessed October 13, 2008]).
  • 57
    • 58049173168 scopus 로고    scopus 로고
    • T. Espinger, Denial of Service attacks are a legal 'grey area', ZDNet News, November 2, 2005 (hap://news.zdnet.co.uk/ security/0,1000000189,39235148,00.htm [Accessed October 13, 2008]);
    • T. Espinger, "Denial of Service attacks are a legal 'grey area'", ZDNet News, November 2, 2005 (hap://news.zdnet.co.uk/ security/0,1000000189,39235148,00.htm [Accessed October 13, 2008]);
  • 58
    • 58049179470 scopus 로고    scopus 로고
    • Computer Misuse Act crumbles as DoS attacker walks free
    • See also, November 3, Accessed September 21, 2008
    • See also M. Whipp, "Computer Misuse Act crumbles as DoS attacker walks free", PC PRO News, November 3, 2005 (http:llwww.pcpro.co. uk/newsl79505/computer-misuse-act-crumbles-as-dos-attacker-walks-free.html [Accessed September 21, 2008].
    • (2005) PC PRO News
    • Whipp, M.1
  • 59
    • 58049187906 scopus 로고    scopus 로고
    • EWHC 1201
    • DPP v Lennon [2006] EWHC 1201.
    • (2006) DPP v Lennon
  • 62
    • 58049165470 scopus 로고    scopus 로고
    • National Hi-Tech Crime Unit 2005 Survey at http://www.nhtcu.org; CSI/FBI 2004 Survey at http://i.cmpnet.com/gocsi/dbarea/pdfs/fbi/FBI2004. pdf [Accessed October 13, 2008].
    • National Hi-Tech Crime Unit 2005 Survey at http://www.nhtcu.org; CSI/FBI 2004 Survey at http://i.cmpnet.com/gocsi/dbarea/pdfs/fbi/FBI2004. pdf [Accessed October 13, 2008].
  • 64
    • 58049161268 scopus 로고    scopus 로고
    • See Cornwall, Hacking away at computer law reform (1988) 138 N.L.J. 702;
    • See Cornwall, "Hacking away at computer law reform" (1988) 138 N.L.J. 702;
  • 65
    • 58049156600 scopus 로고    scopus 로고
    • M. May, How Hacking Law Could Weaken Security, The Times, April 20, 1989, p.32; Department of Trade and Industry Report, Dealing with Computer Misuse (2002).
    • M. May, "How Hacking Law Could Weaken Security", The Times, April 20, 1989, p.32; Department of Trade and Industry Report, Dealing with Computer Misuse (2002).
  • 66
    • 58049168638 scopus 로고    scopus 로고
    • Y. Akdeniz, Section 3 of the Computer Misuse Act 1990: An Antidote for Computer Viruses! (1996) 3 Web J.C.L.I. 7, http://webjcli.ncl.ac. uk/1996/issue3/akdeniz3.html [Accessed September 21, 2008].
    • Y. Akdeniz, "Section 3 of the Computer Misuse Act 1990: An Antidote for Computer Viruses!" (1996) 3 Web J.C.L.I. 7, http://webjcli.ncl.ac. uk/1996/issue3/akdeniz3.html [Accessed September 21, 2008].
  • 67
    • 58049172867 scopus 로고    scopus 로고
    • Cornwall, Hacking away at computer law reform (1988) 138 N.L.J. 702.
    • Cornwall, "Hacking away at computer law reform" (1988) 138 N.L.J. 702.
  • 68
    • 58049178703 scopus 로고    scopus 로고
    • Cornwall, Hacking away at computer law reform (1988) 138 N.L.J. 702.
    • Cornwall, "Hacking away at computer law reform" (1988) 138 N.L.J. 702.
  • 69
    • 58049156911 scopus 로고    scopus 로고
    • Akdeniz, Section 3 of the Computer Misuse Act 1990 (1996) 3 Web J.C.L.I. 6.
    • Akdeniz, "Section 3 of the Computer Misuse Act 1990" (1996) 3 Web J.C.L.I. 6.
  • 70
    • 50849147505 scopus 로고    scopus 로고
    • M. Wasik, Conference Review: CBI Conference on Combating Computer Crime-Increasing Computer Security (1989) 4(5) C.L.S.R. 4.
    • M. Wasik, "Conference Review: CBI Conference on Combating Computer Crime-Increasing Computer Security" (1989) 4(5) C.L.S.R. 4.
  • 71
    • 58049177776 scopus 로고    scopus 로고
    • See B. Napier, An end to hacking? (1989) 133 S.J. 1554, 1556;
    • See B. Napier, "An end to hacking?" (1989) 133 S.J. 1554, 1556;
  • 73
    • 85044806333 scopus 로고
    • Call to arms against the computer virus
    • See, October 12
    • See M. May, "Call to arms against the computer virus", The Times, October 12, 1989, p.34;
    • (1989) The Times , pp. 34
    • May, M.1
  • 74
    • 58049168909 scopus 로고    scopus 로고
    • M. Wasik, Law Reform Proposals on Computer Misuse [1989] Crim. L.R. 257; E. Wilding, Hacked Off' (2006) 156 N.L.J. 753.
    • M. Wasik, "Law Reform Proposals on Computer Misuse" [1989] Crim. L.R. 257; E. Wilding, "Hacked Off' (2006) 156 N.L.J. 753.
  • 75
    • 58049145844 scopus 로고    scopus 로고
    • e.g. s.12 of the Regulation of Investigatory Powers Act 2000, and the Regulation of Investigatory Powers (Maintenance of Interception Capability) Order 2002 (SI 2002/1931).
    • e.g. s.12 of the Regulation of Investigatory Powers Act 2000, and the Regulation of Investigatory Powers (Maintenance of Interception Capability) Order 2002 (SI 2002/1931).
  • 76
    • 58049152228 scopus 로고    scopus 로고
    • See, e.g. Cornwall, Hacking away at computer law reform (1988) 138 N.L.J. 702; A. Charlesworth, Addiction and hacking (1993) 143 N.L.J. 540; APIG Report, Revision of the Computer Misuse Act (June 2004), p.10.
    • See, e.g. Cornwall, "Hacking away at computer law reform" (1988) 138 N.L.J. 702; A. Charlesworth, "Addiction and hacking" (1993) 143 N.L.J. 540; APIG Report, Revision of the Computer Misuse Act (June 2004), p.10.
  • 77
    • 58049180397 scopus 로고    scopus 로고
    • Now subsumed within the Serious Organised Crime Agency SOCA
    • Now subsumed within the Serious Organised Crime Agency (SOCA).
  • 79
    • 58049174822 scopus 로고    scopus 로고
    • Note that these data are on the principal offence basis-see, Accessed September 21, 2008
    • Note that these data are on the principal offence basis-see http://www.apcomms.org.uk/apig/archive/activities-2004/computer-misuse- inquiry/computer-misuse-inquiry-written-evidence/Home-Office---CMA-regional- stats.xls [Accessed September 21, 2008];
  • 80
    • 58049137022 scopus 로고    scopus 로고
    • see also, Accessed September 21, 2008
    • see also http://www.mams.salford.ac.uklmamslpl?s=17&pid=69 [Accessed September 21, 2008].
  • 81
    • 58049187293 scopus 로고    scopus 로고
    • In all courts
    • In all courts.
  • 84
    • 58049179322 scopus 로고    scopus 로고
    • Law Com. No.186, Computer Misuse. Cm.819 (1989), para.2.23.
    • Law Com. No.186, Computer Misuse. Cm.819 (1989), para.2.23.
  • 85
    • 58049149719 scopus 로고    scopus 로고
    • Law Com. No.186, Computer Misuse. Cm.819 (1989), paras 2.24-2.25.
    • Law Com. No.186, Computer Misuse. Cm.819 (1989), paras 2.24-2.25.
  • 86
    • 58049155702 scopus 로고
    • Update
    • on the, J.B.L
    • B. Napier, "Update on the CMA 1990" [1994] J.B.L. 522, 527.
    • (1990) CMA , vol.522 , pp. 527
    • Napier, B.1
  • 87
    • 24144457779 scopus 로고    scopus 로고
    • See, e.g. A. Flanagan, The Law and Computer Crime: Reading the Script of Reform (2005) 13 I.J.L. &I.T. 98.
    • See, e.g. A. Flanagan, "The Law and Computer Crime: Reading the Script of Reform" (2005) 13 I.J.L. &I.T. 98.
  • 88
    • 58049190119 scopus 로고    scopus 로고
    • APIG Report, Revision of the Computer Misuse Act (June 2004), para.89.
    • APIG Report, Revision of the Computer Misuse Act (June 2004), para.89.
  • 89
    • 58049133663 scopus 로고    scopus 로고
    • Examples include the Melissa Virus (1999), the Sobig F Virus (2003) and the Sasser Worm (2004).
    • Examples include the Melissa Virus (1999), the Sobig F Virus (2003) and the Sasser Worm (2004).
  • 90
    • 58049148310 scopus 로고    scopus 로고
    • See, e.g. APIG Report, Revision of the Computer Misuse Act (June 2004), para.91.
    • See, e.g. APIG Report, Revision of the Computer Misuse Act (June 2004), para.91.
  • 95
    • 58049139358 scopus 로고    scopus 로고
    • Wilding, Hacked Off (2006) 156 N.L.J. 753.
    • Wilding, "Hacked Off" (2006) 156 N.L.J. 753.
  • 96
    • 58049152227 scopus 로고    scopus 로고
    • Wilding, Hacked Off' (2006) 156 N.L.J. 753.
    • Wilding, "Hacked Off' (2006) 156 N.L.J. 753.
  • 99
    • 58049177775 scopus 로고    scopus 로고
    • Through its Convention on Cybercrime-see, Accessed September 21, 2008
    • Through its Convention on Cybercrime-see http://www.conventions.coe. int/Treaty/en/ Treaties/Html/185.htm [Accessed September 21, 2008].
  • 101
    • 58049135794 scopus 로고    scopus 로고
    • The maximum term of imprisonment on summary conviction has been raised to 12 months, and been set at 2 years on indictment-see the new s.1(3) of the CMA 1990, as amended by s.35 of the PJA 2006. However, at the time of writing (October 2008), s. 154(1) of the Criminal Justice Act 2003 has not yet come into force. This renders later, statutory references to 12 months' maximum sentences in the magistrates' courts (such as this one in the amended CMA) ineffective. Consequently, for now, the maximum term of imprisonment on summary conviction for ss.1, 2, 3 and 3A CMA offences remains at six months-see s.38(6) of the PJA 2006.
    • The maximum term of imprisonment on summary conviction has been raised to 12 months, and been set at 2 years on indictment-see the new s.1(3) of the CMA 1990, as amended by s.35 of the PJA 2006. However, at the time of writing (October 2008), s. 154(1) of the Criminal Justice Act 2003 has not yet come into force. This renders later, statutory references to 12 months' maximum sentences in the magistrates' courts (such as this one in the amended CMA) ineffective. Consequently, for now, the maximum term of imprisonment on summary conviction for ss.1, 2, 3 and 3A CMA offences remains at six months-see s.38(6) of the PJA 2006.
  • 102
    • 58049134263 scopus 로고    scopus 로고
    • Art.6
    • Art.6.
  • 103
    • 58049178424 scopus 로고    scopus 로고
    • See, Accessed September 21, 2008
    • See http://www.conventions.coe.int/Treaty/en/Treaties/Html/185.htm [Accessed September 21, 2008]
  • 104
    • 58049143779 scopus 로고    scopus 로고
    • See, Accessed September 21, 2008
    • See http://eur-lex. europa. eu/LexUriServ/LexUriServ. do?uri=CELEX:32005F0222:EN:HTML [Accessed September 21, 2008].
  • 105
    • 58049144055 scopus 로고    scopus 로고
    • Which can be temporary-s.3(3)c
    • Which can be temporary-s.3(3)(c).
  • 107
    • 58049148309 scopus 로고    scopus 로고
    • See Art.5
    • See Art.5.
  • 108
    • 58049147719 scopus 로고    scopus 로고
    • See Art.3
    • See Art.3.
  • 109
    • 58049149119 scopus 로고    scopus 로고
    • See the new CMA s.3(3), as inserted by PJA 2006 s.36.
    • See the new CMA s.3(3), as inserted by PJA 2006 s.36.
  • 110
    • 58049176336 scopus 로고    scopus 로고
    • As inserted by PJA 2006 s.37.
    • As inserted by PJA 2006 s.37.
  • 113
    • 58049161776 scopus 로고    scopus 로고
    • S. Fafmski, Hacked Off' (2006) 150 S.J. 560, 561.
    • S. Fafmski, "Hacked Off' (2006) 150 S.J. 560, 561.
  • 114
    • 58049142747 scopus 로고    scopus 로고
    • See s.3A
    • See s.3A.
  • 115
    • 58049150992 scopus 로고    scopus 로고
    • See Art.6
    • See Art.6.
  • 116
    • 58049147023 scopus 로고    scopus 로고
    • Including software-s.3A(3).
    • Including software-s.3A(3).
  • 118
    • 58049180395 scopus 로고    scopus 로고
    • Ethical hackers who seek, and then expose, computer and network security weaknesses
    • Ethical hackers who seek, and then expose, computer and network security weaknesses.
  • 119
    • 58049189802 scopus 로고    scopus 로고
    • Walden, Computer Crimes and Digital Investigations (2007), p. 196.
    • Walden, Computer Crimes and Digital Investigations (2007), p. 196.
  • 120
    • 58049170056 scopus 로고    scopus 로고
    • Hansard, HC Standing Committee D, col.262 (March 28, 2006).
    • Hansard, HC Standing Committee D, col.262 (March 28, 2006).
  • 121
    • 58049150991 scopus 로고    scopus 로고
    • Hansard, HC Standing Committee D, col.267 (March 28, 2006).
    • Hansard, HC Standing Committee D, col.267 (March 28, 2006).
  • 122
    • 58049143778 scopus 로고    scopus 로고
    • Home Office letter by the Earl of Northesk; see Hansard
    • Quoted from a, HL col.612 July 11
    • Quoted from a Home Office letter by the Earl of Northesk; see Hansard, HL Vol.684, col.612 (July 11 2006).
    • (2006) , vol.684
  • 123
    • 58049186238 scopus 로고    scopus 로고
    • HL col.213 October 10
    • Hansard, HL Vol.685, col.213 (October 10, 2006).
    • (2006) Hansard , vol.685
  • 124
    • 58049172865 scopus 로고    scopus 로고
    • HL col.611 July 11
    • Hansard, HL Vol.684, col.611 (July 11, 2006).
    • (2006) Hansard , vol.684
  • 125
    • 58049150684 scopus 로고    scopus 로고
    • See, e.g. the recent hack into a US governmental email system-Cyber attack on Pentagon email, BBC News, June 22, 2007-http://news. bbc.co.uk/1/hi/world/americas/6229188.stm [Accessed September 21, 2008].
    • See, e.g. the recent hack into a US governmental email system-"Cyber attack on Pentagon email", BBC News, June 22, 2007-http://news. bbc.co.uk/1/hi/world/americas/6229188.stm [Accessed September 21, 2008].
  • 127
    • 58049179469 scopus 로고    scopus 로고
    • Potent, malicious software in the form of meta-trojans which contain many layers of viral infection
    • Potent, malicious software in the form of meta-trojans which contain many layers of viral infection.
  • 128
    • 58049135181 scopus 로고    scopus 로고
    • The other three being code, markets and norms
    • The other three being "code", markets and norms.
  • 130
    • 77952992831 scopus 로고    scopus 로고
    • The Law of the Horse: What Cyberlaw Might Teach
    • 501
    • L. Lessig, "The Law of the Horse: What Cyberlaw Might Teach" (1999) 113 Harvard Law Review 501, 546.
    • (1999) Harvard Law Review , vol.113 , pp. 546
    • Lessig, L.1
  • 131
    • 58049136759 scopus 로고    scopus 로고
    • Thinking Locally, Acting Globally
    • See, e.g, List, January 15
    • See, e.g. J.P. Barlow, "Thinking Locally, Acting Globally" Cyber-Rights Electronic List, January 15, 1996;
    • (1996) Cyber-Rights Electronic
    • Barlow, J.P.1
  • 134
    • 58049149718 scopus 로고    scopus 로고
    • Goldsmith and Wu, Who Controls the Internet? (2006), p. 164.
    • Goldsmith and Wu, Who Controls the Internet? (2006), p. 164.
  • 135
    • 58049181925 scopus 로고    scopus 로고
    • Maintaining order and law on the Internet
    • See, generally, D.S. Wall ed
    • See, generally, D.S. Wall, "Maintaining order and law on the Internet" in D.S. Wall (ed.), Crime and the Internet (2001).
    • (2001) Crime and the Internet
    • Wall, D.S.1
  • 136
    • 58049179319 scopus 로고    scopus 로고
    • The new ss.3 and 3A of the CMA.
    • The new ss.3 and 3A of the CMA.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.