SmartPac Legal Notice
Please read this notice and confirm you have read it by clicking on the ACCEPT
button at the bottom to continue:
You have accessed a computer owned and managed by your Alarm Receiving Centre.
Only authorised access of this computer, the network to which it is connected and all services and data accessed directly or indirectly by or via it is permitted and access by competing organisations is strictly forbidden.
If you do not have authority to access this computer and the associated networks, services and data you are required to disconnect yourself immediately from this computer and its associated networks.
Authorisation is granted to a named individual to access this computer, the network to which it is connected and all services and data accessed directly or indirectly by or via it. Authorisation must be received from the Alarm Receiving Centre in advance.
Any such authorisation will strictly limit your access to specific services and data which must be used for the intentions under which the authorisation was originally given.
If you disclose any information obtained through this computer or the systems and services to which it is connected without the authority of your Alarm Receiving Centre, or use the data for any purpose other than that for which it was originally intended, your Alarm Receiving Centre may take legal action against you.
We remind you that under the Computer Misuse Act 1990 there are three main criminal offences:
|Unauthorised access to computer material
|a. This makes it illegal to access a computing system unless authorised to do so. As such it makes the activity of "hacking" a crime. It does not matter whether the hacker is remote, working from a distance over the remote area networks, or local, where persons such as employees or students who may have limited authorisation to use the computers but they knowingly exceed that authority. The hacking need not be directed at a particular computer, program or data.
|b. For example, it is unlawful, without proper authority:
| i. to use another person's ID and password in order to access a computer, use data or run a program;
| ii. to alter, delete, copy, or move a program or data, or simply to output a program or data; or
| iii. to lay a trap to obtain a password.
|Unauthorised access to a computer system with intent to commit or facilitate the commission of a further offence
|a. This covers the situation where unauthorised access is gained with intent to commit a further offence. For example, a person may gain unauthorised access to a computer via another person's ID in order to transmit offensive material.
|Unauthorised modification of computer material
|a. This offence includes the deliberate deletion or corruption of programs or data. It also includes the introduction of viruses etc., where these result in the modification or destruction of data.