computer, or to enable any such access to
be secured;
(b)

the access he intends to secure, or to
enable to be secured, is unauthorised;
and

(c)

he knows at the time when he causes the
computer to perform the function that
that is the case.

(2) The intent a person has to have to commit an
offence under this section need not be directed
at—
(a)

any particular program or data;

(b)

a program or data of any particular kind;
or

(c)

a program or data held in any particular
computer.

. . .”
ii)

S.3 reads as follows:
“3. Unauthorised acts with intent to impair, or with
recklessness as to impairing, operation of computer,
etc.
(1) A person is guilty of an offence if (a)

he does any unauthorised act in relation
to a computer;

(b)

at the time when he does the act he knows
that it is unauthorised; and

(c)

either subsection (2) or subsection (3)
below applies.

(2) This subsection applies if the person intends by
doing the act (a)

to impair the operation of any computer;

(b)

to prevent or hinder access to any
program or data held in any computer;
or

Select target paragraph3