Talk:Criminal Code Act 1995 (Australia, unsourced)/Chapter 10/10.7

The Explanatory Memorandum that inserted Part 10.7 appears to indicate that an offence will only be committed against section 478.1 where the alleged offender "hacks" into the relevant computer system. That is, if I lawfully bypass the access system by entering my username and password, and subsequently leave my computer unattended, and then you come along and access or modify data in that computer, an offence against section 478.1 will not have been committed, because the data is not "restricted data" in the sense that is envisaged by the definition.

I would be interested in any comments, or authorities that confirm or dispel this view.