Computer Misuse Act, 2011
Contents
Part I – Preliminary ............................................................................................................................................................................................ 1
1. Commencement ........................................................................................................................................................................................ 1
2. Interpretation ............................................................................................................................................................................................. 1
Part II – General provisions ............................................................................................................................................................................. 2
3. Securing access ......................................................................................................................................................................................... 2
4. Using a program ....................................................................................................................................................................................... 3
5. Authorised access ..................................................................................................................................................................................... 3
6. References ................................................................................................................................................................................................... 3
7. Modification of contents ........................................................................................................................................................................ 3
8. Unauthorised modification ................................................................................................................................................................... 3
Part III – Investigations and procedures .................................................................................................................................................... 4
9. Preservation order .................................................................................................................................................................................... 4
10. Disclosure of preservation order ..................................................................................................................................................... 4
11. Production order .................................................................................................................................................................................... 4
Part III – Computer misuse offences ............................................................................................................................................................ 4
12. Unauthorised access ............................................................................................................................................................................. 4
13. Access with intent to commit or facilitate the commission of a further offence ........................................................... 5
14. Unauthorised modification of computer material ..................................................................................................................... 5
15. Unauthorised use or interception of computer service ........................................................................................................... 6
16. Unauthorised obstruction of use of computer ............................................................................................................................ 6
17. Unauthorised disclosure of access code ........................................................................................................................................ 7
18. Unauthorised disclosure of information ....................................................................................................................................... 7
19. Electronic fraud ...................................................................................................................................................................................... 7
20. Enhanced punishment for offences involving protected computers ................................................................................... 7
21. Abetment and attempts ...................................................................................................................................................................... 8
22. Attempt defined ..................................................................................................................................................................................... 8
23. Child pornography ................................................................................................................................................................................. 8
24. Cyber harassment .................................................................................................................................................................................. 9
25. Offensive communication ................................................................................................................................................................... 9
26. Cyber stalking ......................................................................................................................................................................................... 9
27. Compensation .......................................................................................................................................................................................... 9
Part V – Miscellaneous ...................................................................................................................................................................................... 9
28. Searches and seizure ........................................................................................................................................................................... 9
29. Admissibility and evidential weight of a data message or an electronic record ......................................................... 10
ii