Act 2

Computer Misuse Act

(a) views, alters or erases the program or data;

2011

(b) copies or moves it to any storage medium other than that in
which it is held or to a different location in the storage
medium in which it is held;
(c) uses or destroys it; or

(d) causes it to be output from the computer in which it is held
whether by having it displayed or in any other manner.

4. Using a program.
A person uses a program if the function he or she causes the computer
to perform—
(a) causes the program to be executed; or
(b) is itself a function of the program.

5. Authorised access.
Access by a person to any program or data held in a computer is
authorised if—

(a) the person is entitled to control access to the program or
data in question; or

6.

(b) the person has consent to access that program or data from
any person who is charged with giving that consent.

References.
(1) A reference to a program or data held in a computer includes
a reference to any program or data held in any removable storage
medium and a computer may be regarded as containing any program
or data held in any such medium.
(2) A reference to a program includes a reference to part of a
program.
7

Select target paragraph3