Computer Crime Flashcards

(11 cards)

1
Q

Elements Of:

Accessing Computer System for Dishonest Purpose - Section 249(1)

A

7yrs

  • Directly or indirectly accesses any computer system and thereby
  • Dishonestly and Without Claim of Right
    (A) Obtains any BPPPSVC
    (B) Causes Loss to any other person
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Elements Of:

Accessing Computer System for Dishonest Purpose - Section 249(2)

A

5yrs

  • Directly or indirectly accesses any computer system and with intent
  • Dishonestly and Without Claim of Right
    (A) Obtains any BPPPSVC
    (B) Causes Loss to any other person
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Elements Of:

Damaging or Interfering with a Computer System - Section 250(1)

A

10yrs

  • Intentionally OR Recklessly
  • Destroys, Damages or Alters any computer system
  • If he or she knows or ought to know danger to life is likely to result
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Elements Of:

Damaging or Interfering with a Computer System - Section 250(2)

A

7yrs

  • Intentionally OR Recklessly
  • Without Authorisation
  • Knowing they are not authorised or being reckless as to that
    (A) Damages, deletes, modifies or otherwise interferes with any data or software OR
    (B) Causes any data or software in any PC to be damaged or deleted or modified OR
    (c) Causes any PC to fail or deny service to authorised user
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Elements Of:

Accessing Computer System without Authorisation - Section 252(1)

A

2yrs

  • Intentionally accesses Directly or Indirectly
  • Any PC without authorisation
  • Knowing they are not authorised
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Question

What is the difference between Sections 249(1) and 249(2)?

A

249(1) - Accesses the PC, obtains the offending material or causes loss.

249(2) - Accesses the PC with the intent to obtain the offending material or cause loss regardless of the outcome.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Definition

Loss (Computer Crime)

A

The person who suffers the loss does not have to be aware at the time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Question

What are the distinctions between 250(1), (2) and (2)(b)?

A

Essentially Wilful Damage with:

250(1) - Destroy, damage or alter the PC which would cause danger to life.

250(2) - Damage any PC without the authority of the owner

250(2)(b) - Defendant arranges that the PC is damaged by the Victim operating it or a third party.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Definition

Offending carried out from remote PC

A

A person is not required to be physically present in order to access a computer system i.e. virus using the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Definition

Access

A

Instruct, communicate, store or receive data or otherwise use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Question

For a charge of 249(2) accessing for dishonest purpose, what intent must be proved?

A

The suspect obtain BPPPSVC OR Caused loss to any person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly