textfiles/law/anti-hac.txt

185 lines
8.1 KiB
Plaintext
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

ANTI-HACKING
A BILL
To create offences of unauthorised access to
electronically stored data and its transmission;
to confer powers of monitoring, search, seizure
and destruction of such data; and for related
purposes
Presented by Emma Nicholson
Offences
1.(1) (a) A person who effects unauthorised access to a computer or
computer system either
(i) to his own or another's advantage; or
(ii)to another's prejudice;
or
(b) being reckless as to whether his action would result in
(i) his own or another's advantage; or
(ii) another's perjudice;
shall be guilty of an offence.
(2) A person who without lawful authority or reasonable excuse has
in his custody or under his control anything with the intention
of effecting unauthorised access to a computer or computer
system to enable some act or acts to his own or another's
advantage or to another's prejudice, shall be guilty of an
offence.
(3) A person who, without lawful authority or reasonable excuse,
transmits, receives, or causes to be transmitted or received
by means of wire, radio or television communications including
electro-magnetic waves, any writing, signals, signs, pictures
or sound
(a) with the intention of committing an act
(i) to his own or another's advantage; or
(ii)to another's prejudice;
or
(b) being reckless as to whether his action would result in
(i) his own or another's advantage; or
(ii) another's perjudice;
shall be guilty of an offence.
(4) A person commits and offence if he effects unauthorised access
to the computer of another for an unauthorised purpose.
Penalties
2.(1) A person guilty under section 1(1) above shall be liable-
(a) on conviction on indictment, to a fine, or to imprisonment
for a term not exceeding ten years or to both; or
(b) on summary conviction, to a fine not exceeding level 5 on
the standard scale.
(2) A person guilty of an offence under subsection (2) or (3) of
section 1 above shall be liable -
(a) on conviction on indictment, to a fine, or to imprisonment
for a term not exceeding five years or to both; or
(b) on summary conviction, to a fine not exceeding level 5 on
the standard scale.
(3) A person guilty of an offence under section 1(4) above shall
be liable on summsry conviction to a fine not exceeding level
5 on the standard scale.
Powers of search
and seizure
3.(1) If it appears to a Justice of Peace, from information given
on oath, that there is reasonable cause to believe that a
person has in his custody or under his control -
(a) anything which he or another has used, whether before or
after the coming into force of this act, or intends to
use, for the making of anything in contravention of
section 1(2) above or
(b) any unauthorised documentation obtained by the unauthorised
accessing of a computer of another, whether before or after
the coming into force of this act or
(c) anything, custody or control of which, an offence under
section 1(2) above; he may issue a warrant authorising a
constable to enter and search the premises.
(2) If it appears to a Judge of the Crown Court from information
given to him on oath that there is reasonable cause to believe
an electronic device is being used to unlawfully access the
computer of another, he may authorise the monitoring of such
a device, by the police, by electronic means, in order to
intercept the transmitted data and to produce evidence of
unauthorised access
(3) A constable may at any time after the seizure of anything
suspected of falling within paragraph (a) or (b) of subsection
(1) of this section (whether the seizure was effected by virtue
of a warrant under that section or otherwise) apply to a
magistrates court for an order under this subsection with
respect to the object; and the court, if it is satisfied both
that the object falls within any of those paragraphs and that
it is conducive to the public interest to do so, may make
such an order as it thinks fit for the forfeiture of the object
and its subsequent destruction or disposal.
(4) Subject to subsection (5) below the court by, or before, which
a person is convicted of an offence under this Act may order
anything shown to the satisfaction of the court to relate to
the offence to be forfeited and either destroyed or dealt with
in such other manner as the court may order.
(5) The court shall not order anything to be forfeited under
subsection (4) above where a person claiming to be the owner
of, or otherwise interested in it, applies to be heard by the
court unless an opportunity has been given to him to show cause
why the order should not be made.
Interpretation
4.(1) In this Act -
"computer" includes any device for storing and processing
information or communications facility directly relating to,
or operating in conjunction with, such device.
"wire" includes any wire, cable, printed circuit, or any means
by which communications can be transmitted.
"unauthorised access" includes access by a person who is
authorised to have access to a computer, but who exceeds the
terms of such authorisation.
"another" includes any person, body corporate, institution,
firm, association, trust, or any other body of persons.
"prejudice" is caused if, and only if, an action leads to -
(i) The temporary or permanent loss of property or
information; or
(ii) The deprivation of an opportunity to earn remuneration
or greater remuneration; or
(iii) The deprivation of an opportunity to gain financial
advantage otherwise than by way of remuneration.
(2) In this section "loss" includes not getting what one might get
as well as parting with what one has.
Jurisdiction
5. A court within England and Wales shall have jurisdiction for
an offence under this Act if at the time the offence was
committed -
(a) the accused was within England and Wales; or
(b) the computer or computer system in relation to the offence
was within England and Wales; or
(c) the communiction links through which such an offence was
committed are within England and Wales; or
(d) the proceeds of the said offences are, or deposited,
processed or transferred from within England and Wales.
6.(1) This Act may be cited as the Anti-Hacking Act 1989.
(2) This act does not extend to Scotland or Northern Ireland.