b. downloads, copies or extracts any data. c. introduces any computer contaminant/virus d. damages any computer (S/N, data, database, programmes) e. disrupts any computer (S/N) f. DoS Denial of access g. provides assistance to facilitate access to a computer (S/N) h. charges the services of another person by tampering or manipulating i. -destroys, deletes or alters any information - diminishes its value or utility - affects it injuriously by any means;
43. Penalty & compensation for damage to computer (system/network/resource);
If any person without permission of the owner or any other person who is in charge, (a) accessing computer (b) downloads, copies or extracts any data. (c) introduces any computer contaminant/virus (d) damages any computer or system, network, data, database, programmes. (e) disrupts any computer (system/network) (f) DoS- Denial of access to any person authorised to access any computer (system/network); (g) provides any assistance to any person to facilitate access to a computer (system/network) (h) charges the services of another person by tampering or manipulating any computer (system/network) (i) destroys, deletes or alters any information in a computer resource or diminishes its value or utility or affects it injuriously by any means; (j) steal, conceal, destroys or alters any computer source code with an intention to cause damage.
(Green College Thematic Lecture Series) Kevin Haggerty, Richard Ericson - The New Politics of Surveillance and Visibility-University of Toronto Press (2005)