Malicious Communications Act 1988

Last updated

Malicious Communications Act
Royal Coat of Arms of the United Kingdom (variant 1, 1952-2022).svg
Long title An Act to make provision for the punishment of persons who send or deliver letters or other articles for the purpose of causing distress or anxiety.
Citation 1988 c. 37
Territorial extent England, Wales, Northern Ireland (section 2 only)
Dates
Royal assent 29 July 1988
Status: Current legislation
Text of statute as originally enacted
Revised text of statute as amended

The Malicious Communications Act 1988 (MCA) is a British Act of Parliament that makes it illegal in England and Wales to "send or deliver letters or other articles for the purpose of causing distress or anxiety". It also applies to electronic communications.

Contents

Scope of application

The original purpose of the MCA was to prevent the sending of printed matter, but the scope of the act has been extended to cover electronic communications. The MCA can be used to charge people for comments made via social networking sites that are “racially motivated” or "religiously motivated." [1]

Criticisms

The MCA has been criticised for its aim as a means to censor free speech, a core civil liberty. In 2012 an individual was falsely arrested under the Act for saying that Olympic diver Tom Daley let his late father down by not winning a medal at the London Olympics. [2]

Highlighted cases

The MCA was successfully used against Internet troll Sean Duffy who harassed the family of Natasha MacBryde after her death.[ citation needed ] In the case of DPP v Connolly, the MCA was used to prosecute an anti-abortion campaigner who sent obscene images of foetuses to pharmacists who sold the contraceptive pill. [3] [4]

See also

Related Research Articles

<span class="mw-page-title-main">Spamming</span> Unsolicited electronic messages, especially advertisements

Spamming is the use of messaging systems to send multiple unsolicited messages (spam) to large numbers of recipients for the purpose of commercial advertising, non-commercial proselytizing, or any prohibited purpose, or simply repeatedly sending the same message to the same user. While the most widely recognized form of spam is email spam, the term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, wiki spam, online classified ads spam, mobile phone messaging spam, Internet forum spam, junk fax transmissions, social spam, spam mobile apps, television advertising and file sharing spam. It is named after Spam, a luncheon meat, by way of a Monty Python sketch about a restaurant that has Spam in almost every dish in which Vikings annoyingly sing "Spam" repeatedly.

<span class="mw-page-title-main">Regulation of Investigatory Powers Act 2000</span> United Kingdom legislation

The Regulation of Investigatory Powers Act 2000 is an Act of the Parliament of the United Kingdom, regulating the powers of public bodies to carry out surveillance and investigation, and covering the interception of communications. It was introduced by the Tony Blair Labour government ostensibly to take account of technological change such as the growth of the Internet and strong encryption.

A chain letter is a message that attempts to convince the recipient to make a number of copies and pass them on to a certain number of recipients. The "chain" is an exponentially growing pyramid that cannot be sustained indefinitely.

<span class="mw-page-title-main">Instant messaging</span> Form of computer communication over the internet or locally

Instant messaging (IM) technology is a type of synchronous computer-mediated communication involving the immediate (real-time) transmission of messages between two or more parties over the Internet or another computer network. Originally involving simple text message exchanges, modern IM applications and services tend to also feature the exchange of multimedia, emojis, file transfer, VoIP, and video chat capabilities.

<span class="mw-page-title-main">Cybercrime</span> Type of crime based in computer networks

Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or networks. These crimes involve the use of technology to commit fraud, identity theft, data breaches, computer viruses, scams, and expanded upon in other malicious acts. Cybercriminals exploit vulnerabilities in computer systems and networks to gain unauthorized access, steal sensitive information, disrupt services, and cause financial or reputational harm to individuals, organizations, and governments.

<span class="mw-page-title-main">CAN-SPAM Act of 2003</span> American law to regulate bulk e-mail

The Controlling the Assault of Non-Solicited Pornography And Marketing (CAN-SPAM) Act of 2003 is a law passed in 2003 establishing the United States' first national standards for the sending of commercial e-mail. The law requires the Federal Trade Commission (FTC) to enforce its provisions. Introduced by Republican Conrad Burns, the act passed both the House and Senate during the 108th United States Congress and was signed into law by President George W. Bush in December 2003 and was enacted on January 1, 2004.

In the United Kingdom censorship has been applied to various forms of expression such as the media, cinema, entertainment venues, literature, theatre and criticism of the monarchy. While there is no general right to free speech in the UK, British citizens have a negative right to freedom of expression under the common law, and since 1998, freedom of expression is guaranteed according to Article 10 of the European Convention on Human Rights, as applied in British law through the Human Rights Act.

<span class="mw-page-title-main">Communications Act 2003</span> United Kingdom legislation

The Communications Act 2003 is an Act of the Parliament of the United Kingdom. The act, which came into force on 25 July 2003, superseded the Telecommunications Act 1984. The new act was the responsibility of Culture Secretary Tessa Jowell. It consolidated the telecommunication and broadcasting regulators in the UK, introducing the Office of Communications (Ofcom) as the new industry regulator. On 28 December 2003 Ofcom gained its full regulatory powers, inheriting the duties of the Office of Telecommunications (Oftel). Among other measures, the act introduced legal recognition of community radio and paved the way for full-time community radio services in the UK, as well as controversially lifting many restrictions on cross-media ownership. It also made it illegal to use other people's Wi-Fi broadband connections without their permission. In addition, the legislation also allowed for the first time non-European entities to wholly own a British television company.

Email harvesting or scraping is the process of obtaining lists of email addresses using various methods. Typically these are then used for bulk email or spam.

Data retention defines the policies of persistent data and records management for meeting legal and business data archival requirements. Although sometimes interchangeable, it is not to be confused with the Data Protection Act 1998.

Internet safety, also known as online safety, cyber safety and electronic safety (e-safety), refers to the policies, practices and processes that reduce the harms to people that are enabled by the (mis)use of information technology.

Internet censorship in the United States is the suppression of information published or viewed on the Internet in the United States. The First Amendment of the United States Constitution protects freedom of speech and expression against federal, state, and local government censorship.

<span class="mw-page-title-main">Make Money Fast</span> Electronic chain letter

Make Money Fast is a title of an electronically forwarded chain letter created in 1988 which became so infamous that the term is often used to describe all sorts of chain letters forwarded over the Internet, by e-mail spam, or in Usenet newsgroups. In anti-spammer slang, the name is often abbreviated "MMF".

Workplace privacy is related with various ways of accessing, controlling, and monitoring employees' information in a working environment. Employees typically must relinquish some of their privacy while in the workplace, but how much they must do can be a contentious issue. The debate rages on as to whether it is moral, ethical and legal for employers to monitor the actions of their employees. Employers believe that monitoring is necessary both to discourage illicit activity and to limit liability. With this problem of monitoring employees, many are experiencing a negative effect on emotional and physical stress including fatigue, lowered employee morale and lack of motivation within the workplace. Employers might choose to monitor employee activities using surveillance cameras, or may wish to record employees activities while using company-owned computers or telephones. Courts are finding that disputes between workplace privacy and freedom are being complicated with the advancement of technology as traditional rules that govern areas of privacy law are debatable and becoming less important.

<span class="mw-page-title-main">Freedom of speech by country</span>

Freedom of speech is the concept of the inherent human right to voice one's opinion publicly without fear of censorship or punishment. "Speech" is not limited to public speaking and is generally taken to include other forms of expression. The right is preserved in the United Nations Universal Declaration of Human Rights and is granted formal recognition by the laws of most nations. Nonetheless, the degree to which the right is upheld in practice varies greatly from one nation to another. In many nations, particularly those with authoritarian forms of government, overt government censorship is enforced. Censorship has also been claimed to occur in other forms and there are different approaches to issues such as hate speech, obscenity, and defamation laws.

Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, group, or organization. It may include false accusations, defamation, slander and libel. It may also include monitoring, identity theft, threats, vandalism, solicitation for sex, doxing, or blackmail. These unwanted behaviors are perpetrated online and cause intrusion into an individual's digital life as well as negatively impact a victim's mental and emotional well-being, as well as their sense of safety and security online.

Cyber crime, or computer crime, refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Netcrime refers, more precisely, to criminal exploitation of the Internet. Issues surrounding this type of crime have become high-profile, particularly those surrounding hacking, copyright infringement, identity theft, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.

Cyberbullying is a form of bullying or harassment using electronic means. It has become increasingly common, especially among teenagers and adolescents, due to young people's increased use of social media. Related issues include online harassment and trolling. In 2015, according to cyberbullying statistics from the i–Safe Foundation, over half of adolescents and teens had been bullied online, and about the same number had engaged in cyberbullying. Both the bully and the victim are negatively affected, and the intensity, duration, and frequency of bullying are three aspects that increase the negative effects on both of them.

Social spam is unwanted spam content appearing on social networking services, social bookmarking sites, and any website with user-generated content. It can be manifested in many ways, including bulk messages, profanity, insults, hate speech, malicious links, fraudulent reviews, fake friends, and personally identifiable information.

Hate speech is public speech that expresses hate or encourages violence towards a person or group based on something such as race, religion, sex, or sexual orientation. Hate speech is "usually thought to include communications of animosity or disparagement of an individual or a group on account of a group characteristic such as race, colour, national origin, sex, disability, religion, or sexual orientation".

References

  1. Awan, I. (2014). Islamophobia and Twitter: A Typology of Online Hate Against Muslims on Social Media. Policy & Internet, 6(2), 133-150.
  2. Gillespie, A. A. (2012). Twitter, Jokes and the Law. The Journal of Criminal Law, 76(5), 364-369.
  3. Keane, M., & Long, J. (2011). Health and homelessness: the Simon snapshot study. Drugnet Ireland, 9-10.
  4. Heffernan, L. (2011). Police accountability and the Irish law of evidence. Crime, law and social change, 55(2-3), 185-197.