Cyber offences are committed when someone is using a computer or other digital technology. There are two main types of cyber offences - cyber-enabled crime and cyber-dependent crime. Cyber-enabled crime is where technology has been used to enhance another crime, like fraud. Cyber Choices deals with cyber-dependent crimes which are offences that can only be committed through the use of technology, where the devices are both the tool for committing the crime and the target of the crime.
The Computer Misuse Act 1990 outlines the law around cyber-dependent crime. Examples of this legislation include:
Section 1
Unauthorised access to computer material.
Adam watches a friend entering their username and password. Adam remembers their login details and without their permission, later logs in and reads all their messages.
Section 2
Unauthorised access with intent to commit or facilitate commission of further offences.
Raj’s teacher leaves their tablet on their desk. Without their permission, Raj accesses their online shopping account and buys items with the attached credit card.
Section 3
Unauthorised acts with intent to impair, or with recklessness as to impairing, operation of a computer.
Sarah is playing an online game with a friend who scores higher than her. Sarah uses a 'Booter' tool knowing it will knock them offline, so she can win the game.
Section 4
Unauthorised acts causing, or creating risk of, serious damage.
Kim hacks a phone company. This hack stops some people phoning the Police when they are in danger. They didn’t mean for this to happen but they were reckless.
Section 5
Making, supplying or obtaining articles for use in offence under IT Act
Robin downloads software so they can bypass login credentials and hack into a friend’s laptop, however they’ve not had a chance to use it yet.