- Latest available (Revised)
- Original (As enacted)
This is the original version (as it was originally enacted).
(1)The following provisions of this section apply for the interpretation of this Act.
(2)A person secures access to any program or data held in a computer if by causing a computer to perform any function he—
(a)alters or erases the program or data;
(b)copies or moves it to any storage medium other than that in which it is held or to a different location in the storage medium in which it is held;
(c)uses it; or
(d)has it output from the computer in which it is held (whether by having it displayed or in any other manner);
and references to access to a program or data (and to an intent to secure such access) shall be read accordingly.
(3)For the purposes of subsection (2)(c) above a person uses a program if the function he causes the computer to perform—
(a)causes the program to be executed; or
(b)is itself a function of the program.
(4)For the purposes of subsection (2)(d) above—
(a)a program is output if the instructions of which it consists are output; and
(b)the form in which any such instructions or any other data is output (and in particular whether or not it represents a form in which, in the case of instructions, they are capable of being executed or, in the case of data, it is capable of being processed by a computer) is immaterial.
(5)Access of any kind by any person to any program or data held in a computer is unauthorised if—
(a)he is not himself entitled to control access of the kind in question to the program or data; and
(b)he does not have consent to access by him of the kind in question to the program or data from any person who is so entitled.
(6)References to any program or data held in a computer include references to any program or data held in any removable storage medium which is for the time being in the computer; and a computer is to be regarded as containing any program or data held in any such medium.
(7)A modification of the contents of any computer takes place if, by the operation of any function of the computer concerned or any other computer—
(a)any program or data held in the computer concerned is altered or erased; or
(b)any program or data is added to its contents;
and any act which contributes towards causing such a modification shall be regarded as causing it.
(8)Such a modification is unauthorised if—
(a)the person whose act causes it is not himself entitled to determine whether the modification should be made; and
(b)he does not have consent to the modification from any person who is so entitled.
(9)References to the home country concerned shall be read in accordance with section 4(6) above.
(10)References to a program include references to part of a program.
Latest Available (revised):The latest available updated version of the legislation incorporating changes made by subsequent legislation and applied by our editorial team. Changes we have not yet applied to the text, can be found in the ‘Changes to Legislation’ area.
Original (As Enacted or Made): The original version of the legislation as it stood when it was enacted or made. No changes have been applied to the text.
Access essential accompanying documents and information for this legislation item from this tab. Dependent on the legislation item being viewed this may include:
Use this menu to access essential accompanying documents and information for this legislation item. Dependent on the legislation item being viewed this may include:
Click 'View More' or select 'More Resources' tab for additional information including: