GCSE Information and
Communication Technology

.: Home .: ICT and Society .: Hacking and Copyright Law

 

Computer Misuse, Hacking, and Copyright Law

At first a 'computer hacker' was someone who would spend long hours at a computer writing neat, elegant programs that used all the features of a programming language or operating system. The term has now changed to refer to someone who illegally breaks into other people's computers.

Computer Misuse

Data that has been stored on a computer is, potentially, easier to misuse than that stored on paper. Computer-based data can be altered without leaving an obvious trace that it has changed. For example, an exam score written in a mark book can be changed ... but you can usually tell that the mark has changed. A mark stored on a computer can be changed and it will look as if nothing has happened.

Malicious (harmful) programs can be introduced to a computer that can damage the data stored on it; copy the data and send it somewhere else; or simply change the stored data. The programs are named after the way the get onto different computers: viruses, worms and trojan horses.

It is very easy to make copies of computer data without leaving a trace that it has been done. A photocopier will also make copies of paper-based data however, electronic copies of data can be smuggled out easily on floppy disks, memory chips or over a network connection.

Many computers are connected to a network or the internet. If someone is persistent enough it is possible to use this connection to gain access to the computer (and the data on it) from outside. Of course, someone is able to physically break into a room and read data from paper records, however, it is sometimes more difficult to trace someone who has broken into a computer over a network or the internet. The hacker is able to do this from their own room or even from another country entirely.

All these activities are controlled by the Computer Misuse Act of 1990.

a computer virus ... really!

Copyright Law

The Copyright, Designs and Patents Act of 1989 makes it illegal to steal or to create copies of software. You are not allowed to make copies of software; make copies of manuals or allow copies to be made unless you have a licence from the owner of the copyright. It is also an offence to run the software on more than one computer at the same time ... unless that is covered in the licence.

When you buy software for a network of computers (a school network for example) the disks do not cost all that much. The bulk of the money goes on the licences ... that let you put the software onto the network.

Now answer these questions ...

  1. When did the Computer Misuse Act become law ?
  2. Which of these is a piece of software that infects other computers ?
  3. What do you call someone who tries to gain access to other people's computers ?
  4. When did the Copyrights, Designs and Patents Act become law ?
  5. What must you have to make a legal copy of some software ?

You scored out of 5 on that test

© 2003 J Ewart | S Peters