Act 2
Computer Misuse Act
2011
(2) For the purposes of subsection (1), a computer is treated as a
“protected computer” if the person committing the offence knows or
ought reasonably to have known, that the computer or program or
data is used directly in connection with or necessary for—
(a) the security, defence or international relations of Uganda;
(b) the existence or identity of a confidential source of
information relating to the enforcement of a criminal law;
(c) the provision of services directly related to communications
infrastructure, banking and financial services, public
utilities or public key infrastructure; or
(d) the protection of public safety including systems related to
essential emergency services such as police, civil defence
and medical services.
(3) For the purposes of any prosecution under this section, it shall be
presumed, until the contrary is proved, that the accused has the requisite
knowledge referred to in subsection (2).
21. Abetment and attempts.
(1) A person who abets another person in committing an offence
under this Act, commits that offence and is liable on conviction to the
punishment prescribed for the offence.
(2) Any person who attempts to commit any offence under this
Act commits that offence and is liable on conviction to the
punishment prescribed for the offence.
22. Attempt defined.
(1) When a person, intending to commit an offence, begins to put
his or her intention into execution by means adapted to its fulfillment,
and manifests his or her intention by some overt act, but does not
fulfill his or her intention to such an extent as to commit the offence,
he or she is deemed to attempt to commit the offence.
15