Computer Crime Flashcards

(17 cards)

1
Q

What does it mean to ‘access’ in relation to a computer system:

A
  • Instruct
  • communicate with
  • store or receive data
  • or makes use of any of the resources of the computer system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define ‘authorisation’:

A

An authorisation granted to a person under an enactment, rule of law, order of a court or judicial process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define ‘computer system’:

A

Means

  • a computer or
  • 2 or more interconnected computers or
  • 2 or more interconnected computers combined with any communication link or remote terminals
  • any communication links between computers or to remote terminals
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does “access” cover?

A

Covers almost all interactions with a computer system such as using a computer at work and more remote forms of access such as viewing a website or using a virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does “access” require?

Requires that the person…..

A

Access requires that the person instructing or communicating with the computer system has some form of connection with the computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does “computer system” widely include in relation to data?

A

All related input, output, processing, storage, software, or communication facilities, and stored data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Section 249 (1) - Accessing computer system for dishonest purpose

A

_ Dishonestly or by deception
- Without claim of right
- obtains property, privilege, service etc or
- causes loss

  • by directly or indirectly
  • accessing any computer system

7 years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Section 249 (2) - Accessing computer system for dishonest purpose

A
  • Directly or indirectly
  • Accesses any computer system
  • WITH INTENT
  • Dishonestly or by deception
  • Without claim of right

a) to obtain any property, privilege, service, pecuniary advantage, benefit or valuable consideration

b) to cause loss to any other person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the distinction between Section 249 (1) & (2) Accessing computer system for dishonest purpose?

A

Section 249 (1) is directed at the situation where a person has accessed a computer system and obtains the offending material or causes loss

Section 249 (2) is directed at someone who accesses the computer system with that intent regardless of the result

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What were the circumstances in Police v Le Roy regarding ‘benefit not limited to financial pecuniary advantage’?

A

Man was an employee of Telstra Clear and used his position to access the email account of his ex.

A Protection Order was in place and the court held that accessing the email account gave him a meaningful benefit.

Benefit was not limited to financial or pecuniary advantage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What did the court note in R v Billingsley?

A

The person who suffers loss does not have to be aware of the loss at the time of the offence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Section 250 (1) - Damaging or interfering with a computer system

A
  • Intentionally or recklessly
  • Destroys, damages or alters
  • Any computer system
  • If he knows or ought to know that danger to life is likely to result

10 years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Section 250 (2) - Damaging or interfering with a computer system (summary)

A

It is an offence to intentionally or recklessly interfere with data, software, or computer systems without authorisation and they know they do not have authorisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Distinction between Section 250 (1) and (2) Damaging or interfering with a computer system

A

Section 250 (1) includes when defendant ought to know danger to life exists

Section 250 (2) adds the requirement that the defendant must act without authority with the knowledge they are not authorised

Section 250 (2)(b) includes instances where the defendant has arranged that the victims own operation (or third party) of his computer system will cause damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Section 252 (1) Accessing a computer system without authorisation

A
  • Intentionally accesses
  • directly or indirectly
  • any computer system
  • without authorisation
  • knowing that he or she is not
  • authorised or being reckless as to whether or not he is authorised
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Section 252 (2) Accessing a computer system without authorisation

A

This section doesn’t apply if someone is allowed to use a computer system, but uses it for a different purpose than they were given access for.

17
Q

What does R v Walker highlight?

A

Highlights offending carried out from a remote computer.

Teenager developed software which he used to control infected computers through a “bot net” causing significant damage to computers overseas.