computer, or to enable any such access to
be secured;
(b)
the access he intends to secure, or to
enable to be secured, is unauthorised;
and
(c)
he knows at the time when he causes the
computer to perform the function that
that is the case.
(2) The intent a person has to have to commit an
offence under this section need not be directed
at—
(a)
any particular program or data;
(b)
a program or data of any particular kind;
or
(c)
a program or data held in any particular
computer.
. . .”
ii)
S.3 reads as follows:
“3. Unauthorised acts with intent to impair, or with
recklessness as to impairing, operation of computer,
etc.
(1) A person is guilty of an offence if (a)
he does any unauthorised act in relation
to a computer;
(b)
at the time when he does the act he knows
that it is unauthorised; and
(c)
either subsection (2) or subsection (3)
below applies.
(2) This subsection applies if the person intends by
doing the act (a)
to impair the operation of any computer;
(b)
to prevent or hinder access to any
program or data held in any computer;
or