Computer Misuse Act, 2011 Contents Part I – Preliminary ............................................................................................................................................................................................ 1 1. Commencement ........................................................................................................................................................................................ 1 2. Interpretation ............................................................................................................................................................................................. 1 Part II – General provisions ............................................................................................................................................................................. 2 3. Securing access ......................................................................................................................................................................................... 2 4. Using a program ....................................................................................................................................................................................... 3 5. Authorised access ..................................................................................................................................................................................... 3 6. References ................................................................................................................................................................................................... 3 7. Modification of contents ........................................................................................................................................................................ 3 8. Unauthorised modification ................................................................................................................................................................... 3 Part III – Investigations and procedures .................................................................................................................................................... 4 9. Preservation order .................................................................................................................................................................................... 4 10. Disclosure of preservation order ..................................................................................................................................................... 4 11. Production order .................................................................................................................................................................................... 4 Part III – Computer misuse offences ............................................................................................................................................................ 4 12. Unauthorised access ............................................................................................................................................................................. 4 13. Access with intent to commit or facilitate the commission of a further offence ........................................................... 5 14. Unauthorised modification of computer material ..................................................................................................................... 5 15. Unauthorised use or interception of computer service ........................................................................................................... 6 16. Unauthorised obstruction of use of computer ............................................................................................................................ 6 17. Unauthorised disclosure of access code ........................................................................................................................................ 7 18. Unauthorised disclosure of information ....................................................................................................................................... 7 19. Electronic fraud ...................................................................................................................................................................................... 7 20. Enhanced punishment for offences involving protected computers ................................................................................... 7 21. Abetment and attempts ...................................................................................................................................................................... 8 22. Attempt defined ..................................................................................................................................................................................... 8 23. Child pornography ................................................................................................................................................................................. 8 24. Cyber harassment .................................................................................................................................................................................. 9 25. Offensive communication ................................................................................................................................................................... 9 26. Cyber stalking ......................................................................................................................................................................................... 9 27. Compensation .......................................................................................................................................................................................... 9 Part V – Miscellaneous ...................................................................................................................................................................................... 9 28. Searches and seizure ........................................................................................................................................................................... 9 29. Admissibility and evidential weight of a data message or an electronic record ......................................................... 10 ii

Select target paragraph3