NZLII [Home] [Databases] [WorldLII] [Search] [Feedback]

New Zealand Law Commission

You are here:  NZLII >> Databases >> New Zealand Law Commission >> Report >> R54 >> Executive Summary

[Database Search] [Name Search] [Previous] [Next] [Download] [Help]


Executive Summary

E1 There is public interest in encouraging the use of computers and appropriate standards for users of computers. Criminal sanctions should be available to enforce those standards. Computers allow information to be processed, recorded and transferred quickly and efficiently. It is necessary both to facilitate the use of computer technology (including the removal of barriers to its use) and to provide strong sanctions against reprehensible conduct which, if unchecked, is likely to inhibit use of computer technology.

E2 The Minister of Justice proposes to introduce a Bill into the House of Representatives concerning computer misuse (see New Zealand InfoTech Weekly, 11 April 1999, 1). Consequently, draft legislation is not included in this report. This report sets out the reasons for the Commission’s view that new legislation is needed and explains the nature of the legislation which is thought to be necessary.

E3 It is preferable to enact a comprehensive law dealing with computer misuse rather than to amend, in a piecemeal fashion, legislation currently in existence.

E4 Legislation dealing with computer misuse must address the following elements:

The report explains the types of conduct which fall within each of the concepts listed in paragraph E4.2

E5 There are peculiar problems arising from computer misuse. Some forms of misuse will cause loss to the person or persons entitled to the data; others may not. Likewise, some forms of misuse may or may not enable the person concerned to gain a pecuniary benefit at the expense of the person entitled to the data. It is therefore necessary to express any new law in such a way as to encompass the whole continuum of misuse and leave a wide range of sentencing options available. The court can then determine an appropriate sentence in the light of the facts proved in the particular case.

E6 The offences of unauthorised access and interception should require proof by the prosecution of intent:

– cause loss or harm to the person entitled to the data or to some third party; or
– gain some form of benefit or advantage either personally or to a third party.

We propose that the terms “loss or harm” and “benefit or advantage” be given a wide meaning and not be limited to pecuniary losses or benefits (see further, para 13). In the case of offences involving use and damage, proof of carelessness should be sufficient to establish an offence.

E7 Our report is presented in the following way:

E8 There are three Appendices to this report. Appendix A sets out the provisions recommended by the Crimes Consultative Committee in 1991 and legislation to be found in other jurisdictions dealing with similar issues. Appendix B contains a glossary of some technical terms mentioned in this report. Appendix C reproduces chapter 4 of our report Electronic Commerce Part One: A Guide for the Legal and Business Community (NZLC R50 1998) which will enable the reader to consider the issues which arise in relation to the law of torts and the criminal law.


NZLII: Copyright Policy | Disclaimers | Privacy Policy | Feedback
URL: http://www.nzlii.org/nz/other/nzlc/report/R54/R54-Executiv.html