“data” includes any inputs stored or transmitted in computer usable form;
(2) For the purpose of this Act, a person secures access to computer if the person intentionally
causes the computer to perform any function.
(3) For the purpose of this Act, a person secures access to programme or data held in a
computer if by intentionally causing a computer to perform a function the person (a) alters or erases the programme or data;
(b) adds to the contents of the programme or data;
(c) copies or moves the programme or data (i) to a different location in the storage medium which it is held; or
(ii) to any other storage medium;
(d) uses the programme or data;
(e) has the programme or data output from the computer in which it is held, whether
by having it displayed or in any other manner.
(4) For the purpose of this Act, access of a person to a computer programme or data is
unauthorised if (a) the person is not entitled to controlled access of the kind in question to the
computer or programme or data held in a computer; and
(b) the person does not have consent to such access from the person who is entitled to
such access.
(5) For the purposes of this Act a person uses a programme held in a computer, if the function
the person causes the computer to perform causes the programme to be executed or is itself a function
of the programme.
(6) For the purposes of this Act, in relation to securing access to a programme or data, it is
immaterial whether the intent was directed at (a) a particular programme or data;
(b) a programme or data of a particular kind;
(c) a programme or data held in any particular computer.
(7) A reference in this Act to programme held in a computer includes a reference to a
programme or data held in any removable storage medium which is for the time being in the
computer; and a computer is to be regarded as containing a programme or data held in any such
medium.
Unauthorised access to computer
3.

A person who secures unauthorised access to -

Select target paragraph3