{"id":1233,"date":"2012-07-10T10:18:38","date_gmt":"2012-07-10T09:18:38","guid":{"rendered":"http:\/\/www.dpscomputing.com\/wordpress\/?p=1233"},"modified":"2012-07-10T11:26:59","modified_gmt":"2012-07-10T10:26:59","slug":"the-morality-of-hacking-your-partners-accounts","status":"publish","type":"post","link":"https:\/\/www.dpscomputing.com\/blog\/2012\/07\/10\/the-morality-of-hacking-your-partners-accounts\/","title":{"rendered":"The Morality of Hacking Your Partner&#8217;s Accounts"},"content":{"rendered":"<p><a href=\"http:\/\/www.dpscomputing.com\/blog\/wp-content\/uploads\/2012\/07\/bbcbreakfast.jpeg\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"1234\" data-permalink=\"https:\/\/www.dpscomputing.com\/blog\/2012\/07\/10\/the-morality-of-hacking-your-partners-accounts\/bbcbreakfast\/\" data-orig-file=\"https:\/\/www.dpscomputing.com\/blog\/wp-content\/uploads\/2012\/07\/bbcbreakfast-e1341911556312.jpeg\" data-orig-size=\"500,281\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"bbcbreakfast\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/www.dpscomputing.com\/blog\/wp-content\/uploads\/2012\/07\/bbcbreakfast-300x168.jpeg\" data-large-file=\"https:\/\/www.dpscomputing.com\/blog\/wp-content\/uploads\/2012\/07\/bbcbreakfast-e1341911556312.jpeg\" tabindex=\"0\" role=\"button\" class=\"alignright  wp-image-1234\" title=\"bbcbreakfast\" src=\"http:\/\/www.dpscomputing.com\/blog\/wp-content\/uploads\/2012\/07\/bbcbreakfast-e1341911556312.jpeg\" alt=\"BBC Breakfast logo\" width=\"400\" height=\"225\" \/><\/a><a href=\"http:\/\/www.bbc.co.uk\/programmes\/b006v5tb\" target=\"_blank\">BBC Breakfast<\/a>, this morning, invited guests on to discuss the morality of hacking into your partner&#8217;s Facebook, e-mail or other online accounts. \u00a0Which, seemed quite strange for the BBC to be discussing whether something that is completely illegal is moral? \u00a0Surely by default it is immoral?<\/p>\n<p>By &#8216;hacking&#8217; into a partner&#8217;s account, or anyones account for that matter the person is breaking the law. \u00a0Just how much you are breaking the law depends on the circumstances of the &#8216;hacking&#8217; &#8211; and I use the term in the loosest possible sense. \u00a0Even if a partner has at one time given you their password, you are still breaking the law logging into their account(s) if you didn&#8217;t seek permission for subsequent access.<\/p>\n<p>Under the Computer Misuse Act 1990, Section 1, it covers &#8216;gaining unauthorised access to a computer&#8217;. \u00a0Don&#8217;t forget, servers are just computers, so logging into someone\u00a0else&#8217;s\u00a0account is by the definition in the act, &#8216;gaining unauthorised access to a computer&#8217;.<\/p>\n<p>Well, you&#8217;re not going to get in much trouble if you get caught are you? \u00a0Just a slap on the wrist? \u00a0It&#8217;s a commonly held misconception but this is actually false. \u00a0Should a person be charged and found guilty of this offence you could face 6 months in prison and \/ or a \u00a35000 fine.<\/p>\n<p>Say your partner has annoyed you and not only do you &#8216;hack&#8217; their account, but you go in there intending to do something else in there. \u00a0Maybe another criminal offence? \u00a0Fraud maybe? \u00a0A little bit of spending on a partner&#8217;s credit card is OK isn&#8217;t it?<\/p>\n<p>Well, now the person would be in even bigger trouble. \u00a0In addition to Section 1, you could now also be charged under Section 2 as you have logged into their account to &#8216;gain unauthorised access to commit or facilitate commission of further offences&#8217;. \u00a0This ones also a 6 months in prison and \/ or \u00a35000 fine.<\/p>\n<p>Say you were really mad, and you deleted some e-mails and changed the password to lock your partner out of their account? \u00a0Well now things have got even worse &#8211; in addition to Section 1 and Section 2 offences, you&#8217;ve now collected an entire set by adding a Section 3 offence as you&#8217;ve made &#8216;unauthorised modification to computer material&#8217;. \u00a0Another offence punishable with 6 months in prison and \/ or a \u00a35000 fine.<\/p>\n<p>Things are looking dire now aren&#8217;t they? \u00a0Well, let&#8217;s just say your partner didn&#8217;t give you their password, you obtained it by &#8216;other means&#8217;. \u00a0Well this isn&#8217;t good news for the person concerned. \u00a0They can now also be charged under the Forgery and Counterfeiting Act 1981\u00a0for &#8216;the making of a false instrument&#8217;.<\/p>\n<p>Traditionally &#8216;making of a false instrument&#8217; consisted of, for example, cloning someones key to gain access to their house. \u00a0But, since the digital age, this has been successfully used to charge people obtaining others passwords and using them as it was decided that legally, cloning a key and &#8216;cloning&#8217; a password, we&#8217;re exactly the same thing.<\/p>\n<p>Computing law is not widely understood and this could make people fall foul of the law unexpectedly, especially as the importance of computers increases and more stringent laws are put in place. \u00a0When doing something on a computer, just stop and think, &#8216;would this be legal in real life&#8217; or &#8216;would a real life\u00a0equivalent situation be illegal&#8217;? \u00a0If so, you will in 99.999% of cases still be breaking the law. \u00a0The fact that it is done on a computer makes no difference to the courts.<\/p>\n<p>So next time your curiosity gets the better of you, it would be advisable to remember just quite how much trouble you might end up in!!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>BBC Breakfast, this morning, invited guests on to discuss the morality of hacking into your partner&#8217;s Facebook, e-mail or other online accounts. \u00a0Which, seemed quite strange for the BBC to be discussing whether something&#46;&#46;&#46;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[55],"tags":[307,657,660,669,659,658,661,671,670,672,673,665,666,667,134,54,668,656,663,662,664],"class_list":["post-1233","post","type-post","status-publish","format-standard","hentry","category-articles","tag-bbc","tag-bbc-breakfast","tag-computer-hacking","tag-computer-law","tag-computer-misuse","tag-computer-misuse-act","tag-computer-misuse-act-1990","tag-counterfeiting","tag-forgery","tag-forgery-and-conterfeiting-act","tag-forgery-and-counterfeiting-act-1981","tag-frape","tag-hack-email","tag-hack-facebook","tag-hacking","tag-law","tag-legal","tag-morality","tag-theft","tag-theft-act","tag-theft-act-1968"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p3nsfA-jT","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/posts\/1233","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/comments?post=1233"}],"version-history":[{"count":4,"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/posts\/1233\/revisions"}],"predecessor-version":[{"id":1237,"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/posts\/1233\/revisions\/1237"}],"wp:attachment":[{"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/media?parent=1233"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/categories?post=1233"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/tags?post=1233"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}