| 5. | Unauthorized access to computer data |
| 6. | Access with intent to commit or facilitate commission of offence |
| 7. | Unauthorized access to and interception of computer service |
| 8. | Unauthorized modification of computer material |
| 9. | Damaging, and denying access to computer system |
| 10. | Unauthorized disclosure of password |
| 11. | Unlawful possession of devices and data |
| 12. | Electronic fraud |
| 13. | Offences involving protected computer systems |
| 14. | Indecent photographs of children |
| 15. | Malicious communications |