Computer Crime: Computer Misuse Act 1990

Subscribe on YouTube

I help people navigate their law degrees

πŸŽ“ Simple and digestible information on studying law effectively.

🎬 One new video every week (I accept requests and reply to everything!)

πŸ“š FREE courses, content, and other exciting giveaways.

Gareth Evans' personal youtube channel

Introduction

The Computer Misuse Act 1990 is designed to protect information kept on computers.

The term 'computer' is not defined in the Act. No doubt any attempted definition would rapidly become out of date.

Section 1: Unauthorised access to computer material

This offence is designed to punish people who try to gain access to unauthorised data.

1. A person is guilty of an offence ifβ€”

  1. he causes a computer to perform any function with intent to secure access to any program or data held in any computer, or to enable any such access to be secured;
  2. the access he intends to secure, or to enable to be secured, is unauthorised; and
  3. he knows at the time when he causes the computer to perform the function that that is the case.

2. The intent a person has to have to commit an offence under this section need not be directed atβ€”

  1. any particular program or data;
  2. a program or data of any particular kind; or
  3. a program or data held in any particular computer.

The actus reus of the offence is simply causing the computer to 'perform any function'.

  • This could include switching the computer on.
  • It should be emphasised that there is no need to show that the defendant actually reached unathorised material, only that he or she intended to do so.

The mens rea of the offence can be broken down into three elements:

  1. An intention to secure or enable access to any program or data on the computer.
  2. The intended access to the data must be unauthorised.
  3. The defendant knows that he or she is not authorised to access the program or data.

The Art of Getting a First in Law - ONLY Β£4.99

FOOL-PROOF methods of obtaining top grades

SECRETS your professors won't tell you and your peers don't know

INSIDER TIPS and tricks so you can spend less time studying and land the perfect job

We work really hard to provide you with incredible law notes for free...

The proceeds of this eBook helps us to run the site and keep the service FREE!

CONTENT

Section 2: Unauthorised access with intent

The offence in section 2 is more serious than in section 1.

It requires proof that the defendant commited an offence udner section and in addition that he or she intended to commit or facilitate the commission of a serious arrestale offence (e.g. theft).

Section 3: unauthorised acts

The actus reus of this offence, under section 3(1), is 'any unathorised act in relation to a computer'; the mens rea is an intent to do the act and by so doing:

  • to impair the operation of any computer;
  • to prevent or hinder access to any program or data held in any computer;
  • to impair the operation of any such program or the reliability of any such data; or
  • to enable any of the things mentioned in paragraphs (a) to (c) above to be done.

It is also necessary to show that the defendant knew that the act was unauthorised.

Thus, a defendant has a defence if he or she was authorised to modify a program to some extent, but by mistake modified much more than he or she intended.

Law Application Masterclass - ONLY Β£9.99

Learn how to effortlessly land vacation schemes, training contracts, and pupillages by making your law applications awesome. This eBook is constructed by lawyers and recruiters from the world's leading law firms and barristers' chambers.

βœ… 60+ page eBook

βœ… Research Methods, Success Secrets, Tips, Tricks, and more!

βœ… Help keep Digestible Notes FREE

Course on the art of learning effectively, a reading masterclass