Mens Rea (Guilty Mind): To be convicted under the CMA, the prosecution must prove that the individual acted intentionally. Accidental access—such as mistyping a URL and landing on a private page—is generally not considered a crime under this act.
The Principle of Authorization: Legality is determined by whether the owner of the system has granted permission. This permission can be explicit (a username and password) or implied (a public website), but it is limited to the intended use of the system.
Jurisdiction: The CMA allows for the prosecution of individuals even if they are not physically located in the UK, provided there is a 'significant link' to the UK, such as the target server being located within British borders.
| Feature | Section 1 | Section 2 | Section 3 |
|---|---|---|---|
| Primary Action | Gaining access | Gaining access | Changing/Deleting data |
| Requirement | Intent to access | Intent to commit a further crime | Intent to modify or impair |
| Example | Viewing a private file | Accessing a file to commit fraud | Deleting the file |
| Severity | Lowest | Moderate | Highest |
Access vs. Modification: Section 1 and 2 focus on the 'entry' into the system, whereas Section 3 focuses on the 'damage' or 'change' done once inside. You can be guilty of Section 1 without ever reaching the stage of Section 3.
Intent vs. Outcome: Under Section 2, the intent to commit a further crime is enough for prosecution; the criminal does not actually have to succeed in the further crime (e.g., the theft of money) to be guilty of the unauthorized access with intent.
Identify the 'Final' Action: When presented with a scenario, look for the most severe action taken. If a person hacks a system AND changes data, they should be primarily identified with a Section 3 offence.
Check for Intent: Always look for keywords like 'wanted to', 'planned to', or 'with the goal of'. If a person accesses a system but the scenario doesn't mention a further goal, it is likely a Section 1 offence.
Distinguish from Other Acts: Do not confuse the CMA with the Data Protection Act (DPA). The CMA focuses on the act of hacking/misuse, while the DPA focuses on how organizations handle and protect personal data.
Consequences: Remember that the penalties increase with the section number. Section 1 might result in a fine or short prison sentence, while Section 3 can lead to significant multi-year prison terms.
'No Harm, No Foul': A common misconception is that if you don't change or steal anything, you haven't broken the law. Under Section 1, the mere act of unauthorized entry is a criminal offence, regardless of whether damage occurred.
The 'White Hat' Defense: Students often think that hacking into a system to 'show the owner their security flaws' is legal. Unless you have prior explicit permission (e.g., a bug bounty program), this is still a breach of the CMA.
Shared Passwords: Using a password that was voluntarily given to you in the past does not grant permanent authorization. If the permission has been withdrawn or the context of use has changed, accessing the account can be considered unauthorized.