Principal Legislation
Log in

Login to your account

Username *
Password *
Remember Me


COMPUTER MISUSE ACT.

ARRANGEMENT OF SECTIONS.

   Section

PART I
PRELIMINARY.

   1.   Commencement.

   2.   Interpretation.

PART II
GENERAL PROVISIONS.

   3.   Securing access.

   4.   Using a program.

   5.   Authorised access.

   6.   References.

   7.   Modification of contents.

   8.   Unauthorised modification.

PART III
INVESTIGATIONS AND PROCEDURES.

   9.   Preservation Order.

   10.   Disclosure of preservation Order.

   11.   Production Order.

PART IV
COMPUTER MISUSE OFFENCES.

   12.   Unauthorised access.

   13.   Access with intent to commit or facilitate commission of further offence.

   14.   Unauthorised modification of computer material.

   15.   Unauthorised use or interception of computer service.

   16.   Unauthorised obstruction of use of computer.

   17.   Unauthorised disclosure of access code.

   18.   Unauthorised disclosure of information.

   19.   Electronic fraud

   20.   Enhanced punishment for offences involving protected computers.

   21.   Abetment and attempts.

   22.   Attempt defined.

   23.   Child pornography.

   24.   Cyber harassment.

   25.   Offensive communication.

   26.   Cyber stalking.

   27.   Compensation.

PART V
MISCELLANEOUS.

   28.   Search and seizure.

   29.   Administratively and evidential weight of a data message or an electronic record.

   30.   Territorial jurisdiction

   31.   Jurisdiction of courts.

   32.   Power of Minister to amend Schedule to this Act.

      Schedule   Currency point.

COMPUTER MISUSE ACT.

Commencement: 15 April 2011

   An Act to make provision for the safety and security of electronic transactions and information systems; to prevent unlawful access, abuse or misuse of information systems including computers and to make provision for securing the conduct of electronic transactions in a trustworthy electronic environment and to provide for other related matters.

PART I
PRELIMINARY.

1.   Commencement.

   This Act shall come into force on a date appointed by the Minister by statutory instrument.


COMPUTER MISUSE ACT.

ARRANGEMENT OF SECTIONS.

   Section

PART I
PRELIMINARY.

   1.   Commencement.

   2.   Interpretation.

PART II
GENERAL PROVISIONS.

   3.   Securing access.

   4.   Using a program.

   5.   Authorised access.

   6.   References.

   7.   Modification of contents.

   8.   Unauthorised modification.

PART III
INVESTIGATIONS AND PROCEDURES.

   9.   Preservation Order.

   10.   Disclosure of preservation Order.

   11.   Production Order.

PART IV
COMPUTER MISUSE OFFENCES.

   12.   Unauthorised access.

   13.   Access with intent to commit or facilitate commission of further offence.

   14.   Unauthorised modification of computer material.

   15.   Unauthorised use or interception of computer service.

   16.   Unauthorised obstruction of use of computer.

   17.   Unauthorised disclosure of access code.

   18.   Unauthorised disclosure of information.

   19.   Electronic fraud

   20.   Enhanced punishment for offences involving protected computers.

   21.   Abetment and attempts.

   22.   Attempt defined.

   23.   Child pornography.

   24.   Cyber harassment.

   25.   Offensive communication.

   26.   Cyber stalking.

   27.   Compensation.

PART V
MISCELLANEOUS.

   28.   Search and seizure.

   29.   Administratively and evidential weight of a data message or an electronic record.

   30.   Territorial jurisdiction

   31.   Jurisdiction of courts.

   32.   Power of Minister to amend Schedule to this Act.

      Schedule   Currency point.

COMPUTER MISUSE ACT.

Commencement: 15 April 2011

   An Act to make provision for the safety and security of electronic transactions and information systems; to prevent unlawful access, abuse or misuse of information systems including computers and to make provision for securing the conduct of electronic transactions in a trustworthy electronic environment and to provide for other related matters.

PART I
PRELIMINARY.

1.   Commencement.

   This Act shall come into force on a date appointed by the Minister by statutory instrument.*

2.   Interpretation.

   In this Act, unless the context otherwise requires—

   "access" means gaining entry to any electronic system or data held in an electronic system or causing the electronic system to perform any function to achieve that objective;

   "application" means a set of instructions that, when executed in a computer system, causes a computer system to perform a function and includes such a set of instructions held in any removable storage medium which is for the time being in a computer system;

   "authorised officer" has the meaning assigned to it in section 28;

   "child" means a person under the age of 18 years;

   "computer" means an electronic, magnetic, optical, electrochemical or other data processing device or a group of such interconnected or related devices, performing logical, arithmetic or storage functions; and includes any data storage facility or communications facility directly related to or operating in conjunction with such a device or group of such interconnected or related devices;

   "computer output" or "output" means a statement, information or representation, whether in written, printed, pictorial, graphical or other form—

   (a)   produced by a computer; or

   (b)   accurately translated from a statement or representation so produced from a computer;

   "computer service" includes computer time, data processing and the storage retrieval of data;

   "content" includes components of computer hardware and software;

   "currency point" means the value of a currency point specified in the Schedule;

   "damage" means any impairment to a computer or the integrity or availability of data, program, system or information that—

   (a)   causes any loss;

   (b)   modifies or impairs or potentially modifies or impairs the medical examination, diagnosis, treatment or care of one or more persons;

   (c)   causes or threatens physical injury or death to any person; or

   (d)   threatens public health or public safety;

   "data" means electronic representations of information in any form;

   "data message" means data generated, sent, received or stored by computer means; and includes-—

   (a)   voice, where the voice is used in an automated transaction; and

   (b)   a stored record;

   "electronic device", "acoustic device", or "other device" means any device or apparatus that is used or is capable of being used to intercept any function of a computer;

   "electronic record" means data which is recorded or stored on any medium in or by a computer or other similar device, that can be read or perceived by a person or a computer system or other similar device and includes a display, printout or other output of that data;

   "function" includes logic, control, arithmetic, deletion, storage, retrieval and communication or telecommunication to, from or within a computer;

   "information" includes data, text, images, sounds, codes, computer programs, software and databases;

   "information system" means a system for generating, sending, receiving, storing, displaying or otherwise processing data messages; and includes the internet or any other information sharing system;

   "information system services" includes a provision of connections, operation facilities, for information systems, the provision of access to information systems, the transmission or routing of data messages between or among points specified by a user and the processing and storage of data, at the individual request of the recipient of the service;

   "intercept", in relation to a function of a computer, includes listening to or recording a function of a computer or acquiring the substance, meaning or purport of such a function;

   "Minister" means the Minister responsible for information and communications technology;

   "person" includes any company or association or body of persons corporate or unincorporate;

   "program" or "computer program" means data representing instructions or statements that, when executed in a computer, causes the computer to perform a function;

   "traffic data" means any computer data relating to communication by means of a computer system generated by a computer system that formed a part in the chain of communication, indicating the communication's origin, destination, route, time, date, size, duration or type of underlying service.

PART II
GENERAL PROVISIONS.

3.   Securing access.

   A person secures access to any program or data held in a computer if that person—

   (a)   views, alters or erases the program or data;

   (b)   copies or moves it to any storage medium other th

This section of the article is only available for our subscribers. Please click here to subscribe to a subscription plan to view this part of the article.