Elements Of:
Accessing Computer System for Dishonest Purpose - Section 249(1)
7yrs
Elements Of:
Accessing Computer System for Dishonest Purpose - Section 249(2)
5yrs
Elements Of:
Damaging or Interfering with a Computer System - Section 250(1)
10yrs
Elements Of:
Damaging or Interfering with a Computer System - Section 250(2)
7yrs
Elements Of:
Accessing Computer System without Authorisation - Section 252(1)
2yrs
Question
What is the difference between Sections 249(1) and 249(2)?
249(1) - Accesses the PC, obtains the offending material or causes loss.
249(2) - Accesses the PC with the intent to obtain the offending material or cause loss regardless of the outcome.
Definition
Loss (Computer Crime)
The person who suffers the loss does not have to be aware at the time.
Question
What are the distinctions between 250(1), (2) and (2)(b)?
Essentially Wilful Damage with:
250(1) - Destroy, damage or alter the PC which would cause danger to life.
250(2) - Damage any PC without the authority of the owner
250(2)(b) - Defendant arranges that the PC is damaged by the Victim operating it or a third party.
Definition
Offending carried out from remote PC
A person is not required to be physically present in order to access a computer system i.e. virus using the internet.
Definition
Access
Instruct, communicate, store or receive data or otherwise use.
Question
For a charge of 249(2) accessing for dishonest purpose, what intent must be proved?
The suspect obtain BPPPSVC OR Caused loss to any person.