Act 2

Computer Misuse Act

2011

10. Disclosure of preservation Order.
The investigative officer may, for the purpose of a criminal
investigation or the prosecution of an offence, apply to court for an
order for the disclosure of—

(a) all preserved data, irrespective of whether one or more
service providers were involved in the transmission of such
data; or

(b) sufficient data to identify the service providers and the path
through which the data was transmitted; or electronic key
enabling access to or the interpretation of data.

11. Production Order.
(1) Where the disclosure of data is required for the purposes of
a criminal investigation or the prosecution of an offence, an
investigative officer may apply to court for an order compelling—
(a) any person to submit specified data in that person's possession
or control, which is stored in a computer system; and

(b) any service provider offering its services to submit
subscriber information in relation to such services in that
service provider's possession or control.

(2) Where any material to which an investigation relates consists
of data stored in a computer, computer system or preserved by any
mechanical or electronic device, the request shall be deemed to
require the person to produce or give access to it in a form in which
it can be taken away and in which it is visible and legible.
PART III—COMPUTER MISUSE OFFENCES.

12. Unauthorised access.
(1) A person who intentionally accesses or intercepts any program
or data without authority or permission to do so commits an offence.
9

Select target paragraph3