Example sentences of "[conj] [noun] held [prep] " in BNC.

  Next page
No Sentence
1 You will produce any memoranda or books held by him and , above all , the manuscript he was so fond of studying with its doggerel verses which drew him and others into the blackest treason . ’
2 With primaries or caucuses held in 28 states , the nature of the campaign altered from the close-quarters politics of New Hampshire , to the continental sweep of regional campaigning .
3 S 1(1) provides that ‘ a person is guilty of an offence if — ( a ) he causes a computer to perform any function to secure access to any program or data held in any computer ; ( b ) the access he intends to secure is unauthorised ; and ( c ) he knows at the time when he causes the computer to perform the function that that is the case ’ .
4 The relevant words are ‘ he causes a computer to perform any function with intent to secure access to any program or data held in any computer ’ .
5 Therefore s 1(1) was contravened when , as happened in the present case , a person caused a computer to perform a function with intent to secure unauthorised access to any program or data held in the same computer .
6 BGS receives many requests for site-specific information and for access to reference collections or data held in the archives .
7 Crime — Computer misuse — Unauthorised access — Person using one computer to obtain from it unauthorised benefit — Whether unauthorised use of single computer within statute — ‘ Access to any program or data held in any computer ’ — Computer Misuse Act 1990 ( c. 18 ) , ss. 1(1) , 2(1)
8 Held , that , in the opinion of the court , in section 1(1) ( a ) of the Act of 1990 the words ‘ causes a computer to perform any function with intent to secure access to any program or data held in any computer , ’ in their plain and ordinary meaning , were not confined to the use of one computer with intent to secure access into another computer ; so that section 1(1) was contravened where a person caused a computer to perform a function with intent to secure unauthorised access to any program or data held in the same computer ( post , pp. 437A–B , C–D , 438A , E–F ) .
9 Held , that , in the opinion of the court , in section 1(1) ( a ) of the Act of 1990 the words ‘ causes a computer to perform any function with intent to secure access to any program or data held in any computer , ’ in their plain and ordinary meaning , were not confined to the use of one computer with intent to secure access into another computer ; so that section 1(1) was contravened where a person caused a computer to perform a function with intent to secure unauthorised access to any program or data held in the same computer ( post , pp. 437A–B , C–D , 438A , E–F ) .
10 It seems to me to be straining language to say that only one computer is necessary when one looks to see the actual wording of the subsection : ‘ Causing a computer to perform any function with intent to secure access to any program or data held in any computer . ’ ’
11 ‘ It is submitted : ( i ) the judge erred in law in his ruling on count 1 ; ( ii ) for an offence to be committed under section 1(1) of the Act there does not have to be the use by the offender of one computer with intent to secure unauthorised access into another computer ; ( iii ) there is no ambiguity in the wording of section 1(1) ( a ) of the Act which clearly refers to an intent to secure access to any program or data held in any computer ; ( iv ) section 17(2) and ( 3 ) are applicable to the alleged actions of the respondent in this case ; ( v ) the Act has been drafted so as to deal with the person who misuses a computer to which he has direct ( but unauthorised ) access , as well as a computer into which he is able to secure indirect access by operating another computer . ’
12 ‘ A person is guilty of an offence if — ( a ) he causes a computer to perform any function with intent to secure access to any program or data held in any computer ; ( b ) the access he intends to secure is unauthorised ; and ( c ) he knows at the time when he causes the computer to perform the function that that is the case .
13 ( 2 ) For the purposes of subsection ( 1 ) ( b ) above the requisite intent is an intent to cause a modification of the contents of any computer and by so doing — ( a ) to impair the operation of any computer ; ( b ) to prevent or hinder access to any program or data held in any computer ; or ( c ) to impair the operation of any such program or the reliability of any such data .
14 ‘ ( 2 ) A person secures access to any program or data held in a computer if by causing a computer to perform any function he — ( a ) alters or erases the program or data ; ( b ) copies or moves it to any storage medium other than that in which it is held or to a different location in the storage medium in which it is held ; ( c ) uses it ; or ( d ) has it output from the computer in which it is held ( whether by having it displayed or in any other manner ) ; and references to access to a program or data ( and to an intent to secure such access ) shall be read accordingly .
15 … ( 7 ) A modification of the contents of any computer takes place if , by the operation of any function of the computer concerned or any other computer — ( a ) any program or data held in the computer concerned is altered or erased ; or ( b ) any program or data is added to its contents ; and any act which contributes towards causing such a modification shall be regarded as causing it . …
16 It seems to me to be straining language to say that only one computer is necessary when one looks to see the actual wording of the subsection ; ‘ causing a computer to perform any function with intent to secure access to any program or data held in any computer . ’
17 They are , ‘ he causes a computer to perform any function with intent to secure access to any program or data held in any computer . ’
18 However , if one looks at section 3 it is — we do not need to decide the point — at least doubtful whether it would apply to the circumstances of the present case , because the requisite intent which has to be present before section 3 is breached is the intent under subsection ( 2 ) of section 3 , ‘ ( a ) to impair the operation of any computer ’ — that clearly does not apply to what the respondent did here — ‘ ( b ) to prevent or hinder access to any program or data held in any computer ’ — that again clearly does not apply to what the respondent did here — and ‘ ( c ) to impair the operation of any such program ’ — that does not apply here .
19 the course was not undertaken in consequence of an office or employment held by him . ’
20 Moreover , users had access to files or documents held by social services that concerned them as individuals .
21 Officials are full-time employees , promotion is according to seniority and achievement ; pay scales are prescribed according to the position or office held in the organisation structure ;
22 Include interests of groups of individuals and/or companies if known , even if less than 3% held by individual members of the group . )
23 However , in December the government achieved a breakthrough in its protracted campaign to trace and retrieve the huge sums believed to have been looted from the country by the Marcos family , when the Swiss Supreme Court ruled that funds held by the family in Swiss bank accounts should be returned to the government of the Philippines , but stipulated that this could be done only after a Philippines ' court had ruled against Marcos [ see p. 37961 ] .
24 There was a special problem in the fact that castles held by the Lusignan family and particularly by the Counts of Angoulême could at times hinder land communications between the Duke 's three administrative capitals , the old Roman and episcopal cities of Poitiers , Saintes and Bordeaux .
25 By this is meant young children 's explicit knowledge that they and others have mental states which are only ‘ in the running for truth ’ , that beliefs held by people can be false and yet these false beliefs can determine their thought and behaviour .
26 The museum agreed that sales held within India would help to combat smuggling and the drain on works of art from the country .
27 The action would , he said , make redundant the complaint that certain elements had resorted to violence because of allegations that elections held in March 1987 had been rigged [ see p. 35203 ] .
28 The objective of the Government , as we have said before , is not to penalise property held on discretionary trust — or other settled property — but simply to ensure that property held in this form does not continue to have the capital tax advantages it has in practice enjoyed with estate duty by comparison with property beneficially owned by individuals .
29 Lawyers seeking to interpret the judgment believe that land held under freehold title can not be claimed by aborigines , but that vacant Crown land can be .
30 It permits a takeover offer to be made for a private company if it is an offer for all the shares in , or all the shares comprised in the equity or non-equity share capital of , that company ( other than shares held by the offeror ) and the conditions set out in the article are satisfied .
  Next page