Index

AuthorMatthew Richardson
Pages267-287

Index

References are to page numbers

Access to computer
disclosure notice see Disclosure notice unauthorised see Unauthorised access to computer

Anti-terrorism hotline hoax calls to 12

Bank account
accessing details 15, 17 Bank credit
theft 73

Botnet
meaning 32n60 use of 32

Child
indecent images of, making, possessing, distributing, etc see Indecent image (child, of)

Child abuse
images of, in e-format see Indecent image (electronic format, possession in)

Cloud storage system accessing 49

Communications offences
closed network, use of 103
existing law, fitness for purpose 93 generally 93
grossly offensive, indecent, menacing, etc messages
actus reus, failure to establish 99 assessing offensiveness 98
case law 97–101

criminal liability, attracting 100 culpable state of mind 98 freedom of expression, and 100 generally 97–101
indecent: meaning 101
intent, question of 97–8 menacing message, whether 98–9 mens rea, judicial guidance 99–

100
MP, sent to 97
obscene: meaning 101 sentencing guidelines 94–5 telephone calls 95, 97
Twitter, use of 99
types 95
whether only offensive 97 improper use of public electronic communications network
actus reus 96
annoyance, anxiety, etc, to create

95
elements of offence 96–7
emails, use of 95
Facebook, threats via 96
false message, sending 95 grossly offensive, etc messages see grossly offensive, indecent, menacing, etc messages above legislation 93–4
mens rea 96–7
offence 93–4
penalties 94
procedure and sentencing 94–6 sentencing guidelines 94–5

268 Cyber Crime: Law and Practice

Communications offences (continued) improper use of public electronic communications network (continued) summary nature of offence 94 types of communication 96
see also public electronic communications network, use of below

malicious communication see

Malicious communication public electronic communications network, use of
case law 102–3
content service: meaning 101 conveyance of signals: meaning

102
criminal liability arising, where

101
electronic communications network: meaning 101
electronic communications service: meaning 101
generally 101–3
internet as 103
meaning 102
public electronic communications service: meaning 102
signal: meaning 102
Twitter 102–3
see also improper use of public electronic communications network above
Social Media Guidelines see under

Social Media Guidelines unlawful Interception see Unlawful interception of communication Community Impact Statement
use of 264
Computer
access to
disclosure notice see Disclosure notice
unauthorised see Unauthorised access to computer
defining characteristics 48 fundamental function 48 meaning 47, 48

shop till as 48–9
Computer data
meaning 47
Computer misuse
alteration or deletion of data 31 articles for use in, making, supplying or obtaining
actus reus 44, 45, 46, 47
adapting article 45
article: meaning 47
belief, nature of 45
criminal standard, proof to necessary

46
Crown Prosecution Service guidance

43
elements of offences 44–7 fraudulent acts 43
generally 42
hacking tool, types of 47 indecent photographs, possession of

46
knowledge of likely use 45–6 legislation 42
mens rea 45, 46
nature of article 47
obtaining: meaning 46
penalties 43
procedure and sentencing 43–4 supply: meaning 44–5
with a view to being supplied for use

46
blended threats 36
bogus emails 26–7
Cloud storage systems 49 Computer Misuse Act 1990 see

Computer Misuse Act 1990 1–2

Denial of Service attack see Denial of

Service attack
hacking tool, types of 47 impairment, whether recklessly or with intent
actus reus 26
bogus emails 26–7
burglary and identity theft, offence akin to 24
computer worms and virus, use of

20, 34

conspiracy 26
criminal damage see Criminal damage
Denial of Service attack see Denial of Service attack
elements of offence 26–8
EU obligations 19
generally 17–19
habeas corpus, defendants seeking

26
legislation 18, 19 mail-bombing program, use of 27 mens rea 26
modification of computer 20–1,

27, 28
offending behaviour see Criminal damage
generally 28–31
see also Criminal damage penalties
generally 20
see also sentencing below procedure 20–5
requirements for commission of offence 20
sentencing
case law 20–5
Sentencing Council, lack of guidelines from 20
virus, release of 20
industrial espionage 75 jurisdictional issues see Jurisdiction Law Commission’s investigation and report 1–2, 9
malware see Malware
memory stick, theft and misuse 49 modification of computer material: meaning 26–7
offences
articles for use in see articles for use in, making, supplying or obtaining above
case law 11–13
further offences, commission of generally 11
see also under Unauthorised access to computer

generally 11–13
impairment, whether recklessly or with intent see impairment, whether recklessly or with intent above
jurisdiction see Jurisdiction territorial scope see Jurisdiction unauthorised access see under

Unauthorised access to computer pharming see Pharming
phishing see Phishing
securing access to computer: meaning

5
serious damage, causing, etc
actus reus 41
damage of a material kind: meaning

40, 41
elements of offences 41
generally 39–41
human welfare, damage to 40, 41 legislation 39–41
mens rea 41
national security, damage to 40, 41 offences 40–1
procedure and sentencing 41 storage media 49
types 31–9
unauthorised act causing damage or risk of damage see serious damage, causing, etc above
unauthorised modification 26–7 university facilities, use of 6 unlawful interception, and
overlap with offence of 136
see also Unlawful interception of communication
use of program: meaning 5 Computer Misuse Act 1990 amendments to 2
background to 1–2
entitlement to control, judicial interpretation of 9
hacking
criminalisation of 8
extent of offence 9–10
offences under
generally 11–13

270 Cyber Crime: Law and Practice

Computer Misuse Act 1990 (continued) offences under (continued) unauthorised access see

Unauthorised access to computer unauthorised access to computers see

Unauthorised access to computer Computer system
meaning 47
Confidential information
industrial espionage, gathered through

75
national security, relating to 75 property, not constituting 74
theft of
civil remedy only 75
computer misuse, as 75
data held legally, where 75
no prosecution for 74–5 Contempt of court
actus reus 202
Administrative Division, by reference to 202
categories 201
common characteristic 201 common law offence 201, 203 Crown Court’s jurisdiction 202 Divisional Court, reference to 201 generally 201–2
indictment, no longer tried on 202,

210
juries, misuse of internet by contacting defendants and witnesses

210–12
discussing evidence 212 Facebook, use of 209, 210, 211, 212 generally 208–14
human rights, and 213
penalty for 210, 212
previous convictions, discovery of

209
research by juror 203, 208–10,

213–14
showing prejudice against defendant

212, 213
Twitter, use of 209
warning signs, advice, etc to jurors, use of 213

jurisdiction to deal with 202 legislation 202
magistrates’ court, trial in 202 offence, elements of 202
open justice
court reporting, and see reporting of case below
generally 204
judicial guidance 204
procedure for dealing with 202 proof of, to criminal standard 202,

203, 210
publication, by 202
reporting of case
breach of limitations, effect 204 electronic communication, use of

207–8
freedom to report 205 limitations on 204
live text-based communications, use of 205–6, 208
Practice Direction, guidance in

205–6
restrictions
appeal against imposition 208 power to impose 208
sound recording 207–8
Twitter, use of 205
sentencing
example 210
generally 203–4
guidelines, lack of 203
juror, of 210
legislation as to 203–4
strict liability rule
legislation as to 202, 203–4 whether applicable 202–3 summary trial of 201, 202 Copyright
act restricted by: meaning 77 infringement see Copyright infringement
rights resulting from ownership

76
statutory basis for property right

76
works subsisting in 76

Copyright infringement
act restricted by copyright: meaning

77
actus reus 80
communication to the public: meaning

81
criminal liability for 77–9
file sharing over the internet
civil wrong, as 83
criminal sanctions 84, 85
data streaming see Data streaming direct downloading, criminal liability

85
downloading from host website 84 films playing in cinema, from recordings of 84
games 84
generally 82–3
methods 83
peer-to peer see Peer-to-peer file sharing
platforms 82
streaming see Data streaming
types 82
uploading from host website 84 generally 75–6
infringing copy: meaning 79–80 legislation 76–7
meaning 76–7
mens rea
generally 80, 81, 82
reason to believe, confusing use of phrase 82
offences
elements 79–82
list of 77–8, 80–1
penalty 79
triable other way, where 79 procedure and sentencing 79
Credit card
account information, accessing 8–9 cloned cards 8
conspiracy to commit offence 9 Criminal attempt
computer misuse, and 16–17 gathering information, and 17 legislation governing 16

where offence technically impossible

16
Criminal contempt of court see Contempt of court
Criminal damage
case law 29–30
erasure of computer program 29 generally 2831
impairment of computer 30 magnetic particles, alteration of 30, 31 physical condition of computer, to

30–1
printed circuit card as tangible property

29
Criminal evidence
admissibility
default position 215–16 fundamental test 215
improper or unfair evidence 216 judicial guidance 215, 216 unlawfully obtained evidence 216 disclosure obligations, prosecution’s failure to comply with 220 exclusion
after previous inclusion 224 application to exclude 224
bad faith, obtained in 222
breach of statute, where obtained in

224
breath specimen 222–3
burden of proof, etc 227 categories for 220
common law, at
case law 221–3
generally 220–3
jury cases, in 221
limited scope of discretion 221 magistrates’ court, in 221 reasons for excluding 221 types of evidence covered by

222
court’s discretion, at
common law, at see common law, at above
generally 220
dispute over provenance of evidence, where 226

272 Cyber Crime: Law and Practice

Criminal evidence (continued) exclusion (continued)
...

To continue reading

Request your trial

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT