Skip to main content Accessibility help
×
Hostname: page-component-5c6d5d7d68-wtssw Total loading time: 0 Render date: 2024-08-11T03:20:12.555Z Has data issue: false hasContentIssue false

4 - Modification or impairment of data

from Part II - Computer as target

Published online by Cambridge University Press:  05 October 2015

Jonathan Clough
Affiliation:
Monash University, Victoria
Get access

Summary

Introduction

The previous chapter was concerned with those offences which punish access to data. In this chapter, we look at those situations where the defendant interferes with the data in some way. In the past, such conduct was prosecuted, with some success, as criminal damage. However, criminal damage does not fully encompass the range of conduct which may arise in this context, and is based on notions of property, the application of which to data was often ‘more ingenious than practical’. Accordingly, each jurisdiction has specific offences concerned with the modification or impairment of data.

Such offences are encompassed by Articles 4 and 5 of the Cybercrime Convention, relating to data and system interference respectively. ‘Data interference’ offences are those which relate to the intentional and without right ‘damaging, deletion, deterioration, alteration or suppression of computer data’. These offences are intended to protect computer data from intentional damage, protecting the ‘integrity and the proper functioning or use of stored computer data or computer programs’. Of course, simply executing a program will cause an alteration of data. Accordingly, the Convention allows parties to reserve the right to require that the conduct resulted in serious harm before such conduct is criminalised.

While Art. 4 is concerned with intentional damage to the data itself, Art. 5 relates to ‘system interference’ where there is the intentional and without right ‘serious hindering … of the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data’. Although hindering the functioning of a computer system will commonly occur due to modification of data, it may also occur where there is no modification of data but access to the computer is prevented or its functioning restricted; for example, a DoS attack. Hence, these offences apply to intentionally hindering the use of a computer system (which includes telecommunications facilities) by ‘using or influencing’ computer data.

Although similar in rationale to offences of criminal damage, it is important that a distinction be maintained between physical damage to a computer and damage caused by the operation of a computer. Further, there is a strong argument for parity between penalties for physical damage and those for impairment of data.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2015

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×