A guide to UK cybercrime legislation + helpful links

Cyber Security Concept  Man Hand Protection Network With Lock Icon

Cybercrime is everywhere online. As well as this, cyber-risks are increasingly harder to identify as cyber-crime becomes more sophisticated. With threats posed by everything from social media through to cyber-fraud, organisations need to be more vigilant about rising risks online.

Over the past two decades, both commercial and private computing has become more normal in the UK, but so has cybercrime leading to more urgency for tighter, more vigilant, cybercrime legislation and punishment. So, as cybersecurity awareness is on the rise, it would benefit many businesses to understand cybercrime legislation.

Computer Misuse Act 1990, UK

The primary cybercrime legislation in the UK is known as the Computer Misuse Act 1990 (or “CMA”), which handles many of the malicious attacks or offences against computer solutions, including hacking and ransoming, this is the act under which all cybercriminals are prosecuted for cybercrime attacks. According to the CPS (Crown Prosecution Services), “computer” could mean further devices, which store, process or retrieve information. That means that cybercrime legislation covers smartphones, tablets, and a host of other technological devices beyond the traditional desktop computer.

The Computer Misuse Act defines the following as illegal and will prosecute:

  • Unauthorised, or malicious, access to material stored on a computer.
  • Intentional harm, or crime, using computer systems.
  • Modifying, removing, or ransoming data.
  • Aiding in computer misuses, such as supplying information.

The penalties vary in severity, from costly fines to prison sentences.

Offence / Crime Penalty for the cyber-criminal
Unauthorised, or malicious, tampering with material stored on a computer.A six-month sentence in prison with a possible fine of £5,000
Intention to commit a cybercrime.A five-year prison sentence or unlimited fine.
Modifying, removing, or ransoming data.A five-year prison sentence or unlimited fine.
Aiding in computer misuses.A ten-year sentence or unlimited fine.

Protection Acts for Businesses

Data Protection Act (1998)

This legislation in the UK is key in safeguarding all types of private, confidential, or business information. It ensures that data is handled in a safe, fair, and lawful manner. It works by protecting a data subject, such as a person’s medical information, by regulating and controlling how their information gets stored, which is normally through an “Information Commissioner”. This act works to protect businesses and users against misuse of information within the business or externally.

Data Protection Act (2018)

In the new digital age, data protection has become even more important. The new Data Protection Act (2018) continues the goals from the previous legislation, controlling how “information is used by organisations, businesses, or the government”. This is part of the UK’s General Data Protection Regulation (or GDPR), which is a tough privacy and security law regulating how information is used, handled, and stored to protect users and businesses.

How to Report Cybercrime & Fraud

The severity of cybercrime or fraud shouldn’t be overlooked, whether it’s a petty offence or something more malicious. Instead, it can be conveniently addressed by getting in contact with the police and reporting it.

Action Fraud, the national cybercrime reporting centre, monitors cyber-attacks, fraudulence online, or further cybersecurity incidents. It also contains guidance on the types of cybercrime in the UK and, critically, prevention tips). According to Action Fraud, the areas of a business most likely to be jeopardised, include:

  • Computing systems
  • Internal employees
  • External Suppliers
  • Assets

The National Fraud Intelligence Bureau (or NFIB), which acts in correspondence with Action Fraud, and rests within the City of London Police, is the leading investigator for economic crime. Specifically, this partnership is strategic. The NFIB combs through cybercrime reports to notice any emerging patterns, such as new types of online crime, or serial and repeat offences, or even organised crime that indicates a group.

If you need to report and/or get advice about fraud or cyber crime, you can call the NFIB on 0300 123 2040, they are available to phone 24/7. Alternatively, if you are deaf you can contact them via text on 0300 123 2050 or use their live chat function on their website.

The National Cyber Security Centre

As cybercrime is typically unexpected, it not easy to know how to react. From response to recovery, organisations will focus on the to return to work, minimising the effect of the breach and mitigating future risks. The NCSC (National Cyber Security Centre) supports SME’s to larger businesses (including governmental agencies and public departments), by providing guidance on incident response and recovery.

Find out more about how your business can be protected from cyberattacks within the organisation by checking out our cybersecurity services.

Related Posts

  • Understanding the dangers of ‘Permission Creep’

    Understanding the dangers of ‘Permission Creep’

    Cybersecurity

    This blog post explains what permission creep is, how it can expose sensitive data to unauthorised users, and what steps an organisation can take to prevent permission creep. [...]

    Read article

  • Using cybersecurity training to reduce an organisation’s risk of a cyberattack.

    Using cybersecurity training to reduce an organisation’s risk of a cyberattack.

    Cybersecurity

    Cybersecurity training is an important tool for organisations to prevent and mitigate cyberattacks, we explore the types of training available to organisations. [...]

    Read article

  • The risks of ChatGPT, and the Rise of AI.

    The risks of ChatGPT, and the Rise of AI.

    Cybersecurity

    Artificial intelligence (AI) is a game-changing technology in this blog we explore the risks and benefits of using AI-powered language models such as ChatGPT [...]

    Read article

  • How secure is MFA based on SMS and Voice calls?

    How secure is MFA based on SMS and Voice calls?

    Cybersecurity

    In this blog ramsac's cybersecurity expert Voke Augoye explores how secure Multi-factor authentication is when using SMS and voice calls. [...]

    Read article

  • Microsoft Office – High Severity Vulnerability

    Microsoft Office – High Severity Vulnerability

    Cybersecurity

    Earlier this month Microsoft announced there was a High Severity vulnerability affecting Microsoft Office products. In this blog we explain what the vulnerability is and how to protect against it. [...]

    Read article

  • EDR, MDR, XDR, SIEM, SOC – understanding the jargon in cybersecurity monitoring

    EDR, MDR, XDR, SIEM, SOC – understanding the jargon in cybersecurity monitoring

    Cybersecurity

    The cybersecurity product market is full of acronyms which can make it hard to determine what security monitoring services you need, and what benefits you get from them, this [...]

    Read article