write an article on Legal Advice for Macrobox Computing. It needs to be at least 2000 words.

Hello, I am looking for someone to write an article on Legal Advice for Macrobox Computing. It needs to be at least 2000 words. The expediency and convenience offered by IT is similarly subject to abuse if adventurous individuals or entities and malicious intentions are to prosper thus appropriate measures should be undertaken to protect information procured and data harvested against insidious attacks or malevolent acts which could create havoc to the institutions which may lead to financial disaster by interfering with the use or transmission of data and more importantly, introducing or targeting computer servers where data or information are stored (Kapaella, 2003).

In summary, the Macro box alleged that it not only suffered actual damages but also damages its customer goodwill due to several DNS attacks launched by activist groups to compel them to cease and desist from providing software services. According to the Macro box, the actual perpetrators cannot be determined although a blogger has been traced to have provided the online guide to successfully hack the Macro box server not to mention that it has likewise recorded several attempts to invade its system.

Under the foregoing circumstances, the blogger by providing online guidance to direct the computer attack or server intrusion and all those persons who may have conspired and confederated with the blogger may be held liable under the Computer Misuse Act 1990 (CMA) as amended by the Police and Justice Act 2006 (JPA) and Serious Crime Act 2007 (SCA) where the following acts were defined as unlawful or criminal acts—unauthorized access to computer material. unauthorized access with intent to commit a further offense. and unauthorized modification of computer material.

Section 1 of the CMA provides that in cases of unauthorized access to computer material a person may be found guilty when(a) he causes a computer to perform any function with intent to secure access to any program or data held in any computer. (b) the access he intends to secure. and (c) he knows at the time when he causes the computer to perform the function that that is the case.