Singapore Government
Link to Homepage
Home | About Us | Browse | Advanced Search | Results | My Preferences | FAQ | Help | PLUS
Slider
Left Corner
Print   Link to Viewed VersionLink to In-Force Version
 
On 12/12/2017, you requested the version in force on 15/03/1994 incorporating all amendments published on or before 21/03/2017.
Slider
Computer Misuse Act
(CHAPTER 50A)

(Original Enactment: Act 19 of 1993)

REVISED EDITION 1994
(15th March 1994)
An Act to make provision for securing computer material against unauthorised access or modification and for matters related thereto.
[30th August 1993]
PART I
PRELIMINARY
Short title
1.  This Act may be cited as the Computer Misuse Act.
Interpretation
2.
—(1)  In this Act, unless the context otherwise requires —
“computer” means an electronic, magnetic, optical, electrochemical, or other data processing device, or a group of such interconnected or related devices, performing logical, arithmetic, or storage functions, and includes any data storage facility or communications facility directly related to or operating in conjunction with such device or group of such interconnected or related devices, but does not include an automated typewriter or typesetter, a portable hand held calculator or other similar device which is non-programmable or which does not contain any data storage facility;
“computer output” or “output” means a statement or representation (whether in written, printed, pictorial, graphical or other form) purporting to be a statement or representation of fact —
(a)
produced by a computer; or
(b)
accurately translated from a statement or representation so produced;
“computer service” includes computer time, data processing and the storage or retrieval of data;
“data” means representations of information or of concepts that are being prepared or have been prepared in a form suitable for use in a computer;
“electronic, acoustic, mechanical or other device” means any device or apparatus that is used or is capable of being used to intercept any function of a computer;
“function” includes logic, control, arithmetic, deletion, storage and retrieval and communication or telecommunication to, from or within a computer;
“intercept”, in relation to a function of a computer, includes listening to or recording a function of a computer, or acquiring the substance, meaning or purport thereof;
“program or computer program” means data representing instructions or statements that, when executed in a computer, causes the computer to perform a function.
(2)  For the purposes of this Act, a person secures access to any program or data held in a computer if by causing a computer to perform any function he —
(a)
alters or erases the program or data;
(b)
copies or moves it to any storage medium other than that in which it is held or to a different location in the storage medium in which it is held;
(c)
uses it; or
(d)
causes it to be output from the computer in which it is held (whether by having it displayed or in any other manner),
and references to access to a program or data (and to an intent to secure such access) shall be read accordingly.
(3)  For the purposes of subsection (2)(c), a person uses a program if the function he causes the computer to perform —
(a)
causes the program to be executed; or
(b)
is itself a function of the program.
(4)  For the purposes of subsection (2)(d), the form in which any program or data is output (and in particular whether or not it represents a form in which, in the case of a program, it is capable of being executed or, in the case of data, it is capable of being processed by a computer) is immaterial.
(5)  For the purposes of this Act, access of any kind by any person to any program or data held in a computer is unauthorised or done without authority if —
(a)
he is not himself entitled to control access of the kind in question to the program or data; and
(b)
he does not have consent to access by him of the kind in question to the program or data from any person who is so entitled.
(6)  A reference in this Act to any program or data held in a computer includes a reference to any program or data held in any removable storage medium which is for the time being in the computer; and a computer is to be regarded as containing any program or data held in any such medium.
(7)  For the purposes of this Act, a modification of the contents of any computer takes place if, by the operation of any function of the computer concerned or any other computer —
(a)
any program or data held in the computer concerned is altered or erased;
(b)
any program or data is added to its contents; or
(c)
any act occurs which impairs the normal operation of any computer,
[S92/97]
and any act which contributes towards causing such a modification shall be regarded as causing it.
(8)  Any modification referred to in subsection (7) is unauthorised if —
(a)
the person whose act causes it is not himself entitled to determine whether the modification should be made; and
(b)
he does not have consent to the modification from any person who is so entitled.
(9)  A reference in this Act to a program includes a reference to part of a program.