Malicious Communications Act 1988

Last updated

Malicious Communications Act
Royal Coat of Arms of the United Kingdom (variant 1, 1952-2022).svg
Long title An Act to make provision for the punishment of persons who send or deliver letters or other articles for the purpose of causing distress or anxiety.
Citation 1988 c. 37
Territorial extent England, Wales, Northern Ireland (section 2 only)
Dates
Royal assent 29 July 1988
Status: Current legislation
Text of statute as originally enacted
Revised text of statute as amended

The Malicious Communications Act 1988 (MCA) is a British Act of Parliament that makes it illegal in England and Wales to "send or deliver letters or other articles for the purpose of causing distress or anxiety". It also applies to electronic communications.

Contents

Scope of application

The original purpose of the MCA was to prevent the sending of printed matter, but the scope of the act has been extended to cover electronic communications. The MCA can be used to charge people for comments made via social networking sites that are “racially motivated” or "religiously motivated." [1]

Criticisms

The MCA has been criticised for its aim as a means to censor free speech, a core civil liberty. In 2012 an individual was falsely arrested under the Act for saying that Olympic diver Tom Daley let his late father down by not winning a medal at the London Olympics. [2]

Highlighted cases

The MCA was successfully used against Internet troll Sean Duffy who harassed the family of Natasha MacBryde after her death.[ citation needed ] In the case of DPP v Connolly, the MCA was used to prosecute an anti-abortion campaigner who sent obscene images of foetuses to pharmacists who sold the contraceptive pill. [3] [4]

See also

Related Research Articles

<span class="mw-page-title-main">Spamming</span> Unsolicited electronic messages, especially advertisements

Spamming is the use of messaging systems to send multiple unsolicited messages (spam) to large numbers of recipients for the purpose of commercial advertising, non-commercial proselytizing, or any prohibited purpose, or simply repeatedly sending the same message to the same user. While the most widely recognized form of spam is email spam, the term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, wiki spam, online classified ads spam, mobile phone messaging spam, Internet forum spam, junk fax transmissions, social spam, spam mobile apps, television advertising and file sharing spam. It is named after Spam, a luncheon meat, by way of a Monty Python sketch about a restaurant that has Spam in almost every dish in which Vikings annoyingly sing "Spam" repeatedly.

<span class="mw-page-title-main">Instant messaging</span> Form of communication over the internet

Instant messaging (IM) technology is a type of online chat allowing immediate transmission of messages over the Internet or another computer network. Messages are typically transmitted between two or more parties, when each user inputs text and triggers a transmission to the recipient(s), who are all connected on a common network. It differs from email in that conversations over instant messaging happen in real-time. Most modern IM applications use push technology and also add other features such as emojis, file transfer, chatbots, voice over IP, or video chat capabilities.

<span class="mw-page-title-main">Cybercrime</span> Type of crime based in computer networks

Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or networks. These crimes involve the use of technology to commit fraud, identity theft, data breaches, computer viruses, scams, and expanded upon in other malicious acts. Cybercriminals exploit vulnerabilities in computer systems and networks to gain unauthorized access, steal sensitive information, disrupt services, and cause financial or reputational harm to individuals, organizations, and governments.

<span class="mw-page-title-main">CAN-SPAM Act of 2003</span> American law to regulate bulk e-mail

The Controlling the Assault of Non-Solicited Pornography And Marketing (CAN-SPAM) Act of 2003 is a law passed in 2003 establishing the United States' first national standards for the sending of commercial e-mail. The law requires the Federal Trade Commission (FTC) to enforce its provisions. Introduced by Republican Conrad Burns, the act passed both the House and Senate during the 108th United States Congress and was signed into law by President George W. Bush in December 2003 and was enacted on January 1, 2004.

<span class="mw-page-title-main">Email spam</span> Unsolicited electronic advertising by email

Email spam, also referred to as junk email, spam mail, or simply spam, is unsolicited messages sent in bulk by email (spamming). The name comes from a Monty Python sketch in which the name of the canned pork product Spam is ubiquitous, unavoidable, and repetitive. Email spam has steadily grown since the early 1990s, and by 2014 was estimated to account for around 90% of total email traffic.

Censorship in the United Kingdom was at different times more or less widely applied to various forms of expression such as the press, cinema, entertainment venues, literature, theatre and criticism of the monarchy. While there is no general right to free speech in the UK, British citizens have a negative right to freedom of expression under the common law, and since 1998, freedom of expression is guaranteed according to Article 10 of the European Convention on Human Rights, as applied in British law through the Human Rights Act.

Cyberterrorism is the use of the Internet to conduct violent acts that result in, or threaten, the loss of life or significant bodily harm, in order to achieve political or ideological gains through threat or intimidation. Acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet by means of tools such as computer viruses, computer worms, phishing, malicious software, hardware methods, and programming scripts can all be forms of internet terrorism. Cyberterrorism is a controversial term. Some authors opt for a very narrow definition, relating to deployment by known terrorist organizations of disruption attacks against information systems for the primary purpose of creating alarm, panic, or physical disruption. Other authors prefer a broader definition, which includes cybercrime. Participating in a cyberattack affects the terror threat perception, even if it isn't done with a violent approach. By some definitions, it might be difficult to distinguish which instances of online activities are cyberterrorism or cybercrime.

<span class="mw-page-title-main">Communications Act 2003</span> United Kingdom legislation

The Communications Act 2003 is an Act of the Parliament of the United Kingdom. The act, which came into force on 25 July 2003, superseded the Telecommunications Act 1984. The new act was the responsibility of Culture Secretary Tessa Jowell. It consolidated the telecommunication and broadcasting regulators in the UK, introducing the Office of Communications (Ofcom) as the new industry regulator. On 28 December 2003 Ofcom gained its full regulatory powers, inheriting the duties of the Office of Telecommunications (Oftel). Among other measures, the act introduced legal recognition of community radio and paved the way for full-time community radio services in the UK, as well as controversially lifting many restrictions on cross-media ownership. It also made it illegal to use other people's Wi-Fi broadband connections without their permission. In addition, the legislation also allowed for the first time non-European entities to wholly own a British television company.

Email harvesting or scraping is the process of obtaining lists of email addresses using various methods. Typically these are then used for bulk email or spam.

Email privacy is a broad topic dealing with issues of unauthorized access to, and inspection of, electronic mail, or unauthorized tracking when a user reads an email. This unauthorized access can happen while an email is in transit, as well as when it is stored on email servers or on a user's computer, or when the user reads the message. In countries with a constitutional guarantee of the secrecy of correspondence, whether email can be equated with letters—therefore having legal protection from all forms of eavesdropping—is disputed because of the very nature of email.

Data retention defines the policies of persistent data and records management for meeting legal and business data archival requirements. Although sometimes interchangeable, it is not to be confused with the Data Protection Act 1998.

Internet safety, also known as online safety, cyber safety and electronic safety (e-safety), refers to the policies, practices and processes that reduce the harms to people that are enabled by the (mis)use of information technology.

<span class="mw-page-title-main">Make Money Fast</span> Electronic chain letter

Make Money Fast is a title of an electronically forwarded chain letter created in 1988 which became so infamous that the term is often used to describe all sorts of chain letters forwarded over the Internet, by e-mail spam, or in Usenet newsgroups. In anti-spammer slang, the name is often abbreviated "MMF".

Workplace privacy is related with various ways of accessing, controlling, and monitoring employees' information in a working environment. Employees typically must relinquish some of their privacy while in the workplace, but how much they must do can be a contentious issue. The debate rages on as to whether it is moral, ethical and legal for employers to monitor the actions of their employees. Employers believe that monitoring is necessary both to discourage illicit activity and to limit liability. With this problem of monitoring employees, many are experiencing a negative effect on emotional and physical stress including fatigue, lowered employee morale and lack of motivation within the workplace. Employers might choose to monitor employee activities using surveillance cameras, or may wish to record employees activities while using company-owned computers or telephones. Courts are finding that disputes between workplace privacy and freedom are being complicated with the advancement of technology as traditional rules that govern areas of privacy law are debatable and becoming less important.

<span class="mw-page-title-main">Freedom of speech by country</span>

Freedom of speech is the concept of the inherent human right to voice one's opinion publicly without fear of censorship or punishment. "Speech" is not limited to public speaking and is generally taken to include other forms of expression. The right is preserved in the United Nations Universal Declaration of Human Rights and is granted formal recognition by the laws of most nations. Nonetheless, the degree to which the right is upheld in practice varies greatly from one nation to another. In many nations, particularly those with authoritarian forms of government, overt government censorship is enforced. Censorship has also been claimed to occur in other forms and there are different approaches to issues such as hate speech, obscenity, and defamation laws.

Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, group, or organization. It may include false accusations, defamation, slander and libel. It may also include monitoring, identity theft, threats, vandalism, solicitation for sex, doxing, or blackmail. These unwanted behaviors are perpetrated online and cause intrusion into an individual's digital life as well as negatively impact a victim's mental and emotional well-being, as well as their sense of safety and security online.

Cyber crime, or computer crime, refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Netcrime refers, more precisely, to criminal exploitation of the Internet. Issues surrounding this type of crime have become high-profile, particularly those surrounding hacking, copyright infringement, identity theft, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.

Cyberbullying or cyberharassment is a form of bullying or harassment using electronic means. Cyberbullying and cyberharassment are also known as online bullying. It has become increasingly common, especially among teenagers and adolescents, due to the communication technology advancements and young people's increased use of such technologies. Cyberbullying is when someone, typically a teenager, bullies or harasses others on the internet and other digital spaces, particularly on social media sites.

Social spam is unwanted spam content appearing on social networking services, social bookmarking sites, and any website with user-generated content. It can be manifested in many ways, including bulk messages, profanity, insults, hate speech, malicious links, fraudulent reviews, fake friends, and personally identifiable information.

Hate speech is public speech that expresses hate or encourages violence towards a person or group based on something such as race, religion, sex, or sexual orientation. Hate speech is "usually thought to include communications of animosity or disparagement of an individual or a group on account of a group characteristic such as race, colour, national origin, sex, disability, religion, or sexual orientation".

References

  1. Awan, I. (2014). Islamophobia and Twitter: A Typology of Online Hate Against Muslims on Social Media. Policy & Internet, 6(2), 133-150.
  2. Gillespie, A. A. (2012). Twitter, Jokes and the Law. The Journal of Criminal Law, 76(5), 364-369.
  3. Keane, M., & Long, J. (2011). Health and homelessness: the Simon snapshot study. Drugnet Ireland, 9-10.
  4. Heffernan, L. (2011). Police accountability and the Irish law of evidence. Crime, law and social change, 55(2-3), 185-197.