What is Computer Misuse Act 1990 (CMA)? - Definition from WhatIs.com


Computer Misuse Act 1990 (CMA)

Part of the Hardware glossary:

The Computer Misuse Act 1990 (CMA) is an act of the UK Parliament passed in 1990. CMA is designed to frame legislation and controls over computer crime and Internet fraud. The legislation was created to:

  • Criminalize unauthorized access to computer systems.
  • Deter serious criminals from using a computer in the commission of a criminal offence or seek to hinder or impair access to data stored in a computer.
The CMA is broad and sweeping, but has also been broadly and liberally applied in the courts. This has raised concerns among privacy advocates and those who believe in circumscribing government influence on daily life and behavior. Nevertheless, the CMA has served as a model for computer crime legislation in other Commonwealth countries.

This was last updated in February 2008
Contributor(s): John Geary
Posted by: Margaret Rouse

Related Terms


  • Vblock (VCE Vblock)

    - Vblock is VCE’s hyper-converged infrastructure (HCI) product family. Vblock systems are offered in a range of preconfigured rack-based data center machines. (WhatIs.com)

  • Pivot3

    - Pivot3 is a hyperconverged appliance vendor that has deployed over 16,000 infrastructures and all-flash arrays in over 50 countries around the world. (searchConvergedIT.com)

  • Stratoscale

    - Stratoscale is a cloud infrastructure vendor offering software-defined data center (SDDC) technology. (searchConvergedIT.com)


  • Hardware

    - Terms related to computer hardware, including definitions about cables, connectors and power supply units and words and phrases about computing peripheral devices including the keyboard, mouse, au...

  • Internet applications

    - This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...

Ask a Question About Computer Misuse Act 1990 (CMA)Powered by ITKnowledgeExchange.com

Get answers from your peers on your most technical challenges

Tech TalkComment



    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.