Computer Misuse Act 2000

The Computer Misuse Bill, 2000 was introduced in the Senate in October 2000 in the House of Representatives. It was passed in both the House of Representatives and the Senate in October 2000.

The main purpose of the Computer Misuse Bill 2000 is to prohibit the unauthorised access, use of or interference to any program or data held in a computer and to a computer itself.

The Bill therefore seeks to enhance computer security by giving protection to the integrity of computer systems and by providing stringent penalties for specified computer related offences.

The Computer Misuse Bill also provides enhanced penalties in case where the offence results in damage, which includes financial loss, injury, or harm.

Some of the points/issues raised by the TTCS :

  • How does one ensure that computer data presented as evidence in court was the same evidence that was originally collected? Computer logs are text files and can be easily modified.
  • Re: Clause 16, Police or authorised persons can contaiminate data while conducting their investigations. What is to prevent or protect against such problems?
  • It is possible for someone to easily frame another person for a computer crime.
  • The proposed Bill defines various computer-related offences as criminal acts. This means that the case will be tried before a jury. Would such a jury understand the technical aspects of the case?
  • What happens to minors (persons under 18) under this law?
  • Re: Clause 12,13, If a Trinbagoian runs a e-commerce site hosted in the U.S and a offence is committed against the site, causing momentary loss to the Trinbagoian. Under what jurisdiction is the crime prosecuted? Trinidad and Tobago The U.S?
  • Email viruses such as the Love Bug can be spread by unwitting users to other computers including protected computers as defined in clause 9. Would such a person be liable under clause 9?
  • Re: Access code in Clause 8, Computer hardware and software are sold with a default password that should be changed by the owners when they install it. If they don’t change the password, and an outside person notices this and notifies the owner of the hardware/software, would the someone be committing an offence under clause 8?
  • Re: Clause 17, Arrest by police officer (without warrant) is controversial. This clause was removed from the final act.

Internet Security v2.1

Internet Security v2.1 (October 24th, 2000)

The previous edition of the Online Security document, Version 1.2 (released June 2000) was concerned with informing the home and small business user about how to secure their Internet access against intrusion by such malicious software (aka “malware”) as trojan horses, viruses and hostile scripts. Research has shown that many Internet “technologies” are both a security and privacy threat to the home and small business user, as a result several additions have been made to the information contained in this document.

The present threat to Internet users is a combination of the old (e.g. trojans, viruses, hostile scripts) and the new (e.g. web bugs, confidential data being stored in plain-text cookies, unique identification numbers, ad-ware, spyware and unauthorised transmission of the user’s personal data). Most of the problems orginate in the methods by which online advertising companies track and store data about Net surfers in order to compile statistics for more “effective” advertising. They claim it is to make the World Wide Web a better place for everyone but so far they have only caused un-necessary worries for all Net users.

This document will seek to explain some of these problems and where possible, provide solutions. It is important to note that this document is about informing users about potential Internet threats. Everyone who uses the Internet is subject to their influence in one form or the other; the chances of being victimised by these “technologies” and “malware” are directly related to user awareness of their existance.

You can view the security.pdf (228K) or you can download security.zip  (205K) for offline use.

To view PDF files, you need Adobe’s free Acrobat reader

 

 

Digital Signatures Bill 1999

The Digital Signatures Bill seeks to regulate the use of digital signatures and the legal framework to make them work such as the regulation of certification authorities who issue certificates to persons.

The Bill was withdrawn from Parliament. Some possible complaints :

  • The bill is long, divided into 7 parts and has about 90 clauses in all which makes for very tough reading and understanding.
  • The bill focused in detail on only using asymmetric encryption (using public and private keys) for authenticating signatures. What if other technologies could be used (e.g biometric recognition)?
  • Clause 79 “Search and seizure (of police) without warrant” is controversial.

Summary of TTCS Meetings held in 1999

Summary of TTCS Meetings held in 1999

Meetings were held at the Brass Institute #117A Henry Street, Port of Spain (next to Spectakula Forum), courtesy of Francis Pau.
Meetings were held at the Frank Stockdale building at the University of the West Indies, St. Augustine, courtesy of Curtis Mike.
The computers used for the meetings were provided by Pcw and/or Dave while refreshments were provided by Francis Pau.
Continue reading Summary of TTCS Meetings held in 1999

Summary of TTCS meetings held in 1998

Meetings were held at the Brass Institute #117A Henry Street, Port of Spain (next to Spectakula Forum), courtesy of Francis Pau.

Meetings were held at the Frank Stockdale building at the University of the West Indies, St. Augustine, courtesy of Curtis Mike.

The computers used for the meetings were provided by Pcw and/or Dave while refreshments were provided by Francis Pau.

 

Saturday 7th February 1998 – Word processing tips

Pcw demonstrated several word processing tips on how to create better looking documents using Microsoft Word 97.

Saturday 6th June 1998 – Spreadsheet tips

Pcw talked about how to create better spreadsheets with Microsoft Excel 97.


Saturday 29th August 1998 – Alternative web browsers

Dev talked about several web browsers that can be used as alternatives to Netscape Communicatorand Microsoft Internet Explorer e.g.


Saturday 26th September 1998 – The Year 2000 problem

Pcw and Dave discussed the Year 2000 problem as it relates to personal computers; they looked at the hardware and the software aspects (the latter includes both operating system software and application software).

Various ways of testing your PC as well as solutions to various Y2K situations were also presented.

The results of our research for this topic are on our Year 2000 page.


Sunday 25th October 1998 – Windows 95 Troubleshooting

Razor discussed various Windows 95/98 error messages that users may (would ? 🙂 ) encounter and how to resolve them.

The meeting was held at the Brass Institute on Henry Street, Port of Spain (next to Spektakula Forum).


Saturday 28th November 1998 – End of Year “Lime”

No formal presentation was made during this final get-together for 1998.