Previous Document

Computer Misuse Act 1990 (UK) Section 17

17.(1) The following provisions of this section apply for the interpretation
       of this Act.

   (2) A person secures access to any program or data held in a computer if
       by causing a computer to perform any function he -

       (a) alters or erases the program or data;
       (b) copies or moves it to any storage medium other than that in which it
           is held or to a different location in the storage medium in which
           it is held;
       (c) uses it; or
       (d) has it output from the computer in which it is held (whether by
           having it displayed or in any other manner);
       and references to access to a program or data (and to an intent to
       secure such access) shall be read accordingly.

   (3) For the purposes of subsection (2)(c) above a person uses a program
       if the function he causes the computer to perform -

       (a) causes the program to be executed; or
       (b) is itself a function of the program.

   (4) For the purposes of subsection (2)(d) above -

       (a) a program is output if the instructions of which it consists are
           output; and
       (b) the form in which any such instructions or any other data is output
           (and in particular whether or not it represents a form in which, in
           the case of instructions, they are capable of being executed or, in
           the case of data, it is capable of being processed by a computer)
           is immaterial.

   (5) Access of any kind by any person to any program or data held in a
       computer is unauthorised if -

       (a) he is not himself entitled to control access to the kind in
           question to the program or data; and
       (b) he does not have consent to access by him of the kind in question
           to the program or data from any person who is so entitled.

   (6) References to any program or data held in a computer include
       references to any program or data held in any removable storage medium
       which is for the time being in the computer; and a computer is to be
       regarded as containing any program or data held in any such medium.

   (7) A modification of the contents of any computer takes place if, by the
       operation of any function of the computer concerned or any other
       computer -

       (a) any program or data held in the computer concerned is altered or
           erased; or
       (b) any program or data is added to its contents;

       and any act which contributes towards causing such a modification shall
       be regarded as causing it.

   (8) Such a modification is unauthorised if -

      (a) the person whose act causes it is not himself entitled to determine
          whether the modification should be made; and
      (b) he does not have consent to the modification from any person who
          is so entitled.

   (9) References to the home country concerned shall be read in accordance
       with section 4(6) above.

  (10) References to a program include references to part of a program.



                                                            Next Document