85. Definition
86. Unauthorised access to, interception of or interference with data
87. Computer-related extortion, fraud and forgery
88. Attempt, and aiding and abetting
89. Penalties