Source: https://law.stackexchange.com/questions/13152/how-is-unauthorized-access-determined-under-the-computer-misuse-act/14576