Zezev and Yarimaka v Governor of HM Prison Brixton and another: CACD 2002

Wright J said: ‘But if an individual, by misusing or bypassing any relevant password, places in the files of the computer a bogus e-mail by pretending that the password holder is the author when he is not, then such an addition to such data is plainly unauthorised, as defined in section 17(8); intent to modify the contents of the computer as defined in section 3(2) is self-evident and, by so doing, the reliability of the data in the computer is impaired within the meaning of section 3(2)(c).’

Judges:

Lord Chief Justice Lord Woolf, Wright J

Citations:

[2002] 2 Cr App R 33

Statutes:

Computer Misuse Act 1990 3(2)

Cited by:

CitedDirector of Public Prosecutions v Lennon Admn 11-May-2006
The DPP appealed against dismissal of a charge under the 1990 Act. The defendant had been involved in a campaign of mail-bombing the complainant’s computer systems with over a half million mails, causing a denial of service. The question was whether . .
Lists of cited by and citing cases may be incomplete.

Crime

Updated: 01 May 2022; Ref: scu.242426