Act 2
Computer Misuse Act
(a) views, alters or erases the program or data;
2011
(b) copies or moves it to any storage medium other than that in
which it is held or to a different location in the storage
medium in which it is held;
(c) uses or destroys it; or
(d) causes it to be output from the computer in which it is held
whether by having it displayed or in any other manner.
4. Using a program.
A person uses a program if the function he or she causes the computer
to perform—
(a) causes the program to be executed; or
(b) is itself a function of the program.
5. Authorised access.
Access by a person to any program or data held in a computer is
authorised if—
(a) the person is entitled to control access to the program or
data in question; or
6.
(b) the person has consent to access that program or data from
any person who is charged with giving that consent.
References.
(1) A reference to a program or data held in a computer includes
a reference to any program or data held in any removable storage
medium and a computer may be regarded as containing any program
or data held in any such medium.
(2) A reference to a program includes a reference to part of a
program.
7