Professional Documents
Culture Documents
What are computer or cyber crimes? ..a crime committed where the use or knowledge of computers is required. (e.g., denial of service, attacking passwords) Computer-assisted Crime: a crime in which the computer is used to assist in perpetrating the crime. (e.g., fraud, child pornography)
What is a cyber law? The criminal quality of an act cannot be discovered by reference to any standard but one: is the act prohibited with penal consequences. Cyber law encompasses laws relating to: Cyber Crime Electronic and Digital Signatures Intellectual Property Data Protection and Privacy
Acts and laws against cyber crimes In 1985 Canada passed the Criminal Law Amendment Act. This amendment added Section 342.1 to the Criminal Code of Canada as well as adding Subsection (1.1) to Section 430 of the Code. The Criminal Law Improvement Act 1997 added Subsection (d) to Section 342.1(1). Section 342 of the Criminal Code of Canada deals with theft, forgery of credit cards and unauthorized use of computer Section 184 of the Criminal Code of Canada deals with privacy Section 403 of the Criminal Code of Canada deals with personation.
Pre Bill C-17 Unauthorized Use of a Computer 342.1 Mischief to Data 430(1.1) Theft of telecommunication service 326(1) Possession of device to obtain telecommunication facility or service 327(1) Bill c-17
342.1 (1) Unauthorized use of computer Everyone who, fraudulently and without colour of right, (a) obtains, directly or indirectly, any computer service,
Contains computer programs or other data, and Pursuant to computer programs, Performs logic and control, and May perform any other function;
Data - data means representations of information or of concepts that are being prepared or have been prepared in a form suitable for use in a computer system; Electro-magnetic, acoustic, mechanical or other device - electro-magnetic, acoustic, mechanical or other device means any device or apparatus that is used or is capable of being used to intercept any function of a computer system, but does not include a hearing aid used to correct subnormal hearing of the user to not better than normal hearing; Function - function includes logic, control, arithmetic, deletion, storage and retrieval and communication or telecommunication to, from or within a computer system; Intercept - intercept includes listen to or record a function of a computer system, or acquire the substance, meaning or purport thereof. Traffic - traffic means, in respect of a computer password, to sell, export from or import into Canada, distribute or deal with in any other way.
WILLFULLY CAUSING EVENT TO OCCUR - Colour of right - Interest Section 429 (1) Everyone who causes the occurrence of an event by doing an act or by omitting to do an act that is his duty to do, knowing that the act or omission will probably cause the occurrence of the event and being reckless whether the event occurs or not, shall be deemed, for the purpose of this Part, wilfully to have caused the occurrence of the event. (2) No person shall be convicted of an offence under sections 430 to 446 where he proves that he acted with legal justification or excuse and with colour of right. 430. (1) Every one commits mischief who wilfully (a) destroys or damages property; (b) renders property dangerous, useless, inoperative or ineffective; (c) obstructs, interrupts or interferes with the lawful use, enjoyment or operation of property; or (d) obstructs, interrupts or interferes with any person in the lawful use, enjoyment or operation of property. Mischief in relation to data -- s. 430(1.1) (1.1) Every one commits mischief who wilfully
Bill c-17
Introduced more computer specific offences Unauthorized use of a computer system amendment 342.1(1)(d) states: everyone who uses, possesses, traffics in or permits another person to have access to a computer password that would enable a person to commit an offence under paragraph (a), (b) or ( c). Commits an offence. The amended section defines a computer password as: any data by which a computer service or computer system is capable of being obtained or used. Traffic is defined as: In respect of a computer password, to sell, export from or import into Canada, distribute or deal with in any other way. The amended section defines a computer password as: Any data by which a computer service or computer system is capable of being obtained or used. Traffic is defined as: In respect of a computer password, to sell, export from or import into Canada, distribute or deal with in any other way. Theft forgery, etc., of credit card 342. (1) (a) An indictable offence and is liable to imprisonment for a term not exceeding ten years; or
Jesse Hirsh
In September 1995 Jesse Hirsh was charged with unauthorized use of a computer system. He was caught using his stepbrothers University of Toronto computer account, as well as the
Submitted By:
Names :
1. Riddhi patel 2.Usha chaudhri