17-11-03-SC rule on cybercrime warrants
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
TABLE OF CONTENTS
Page
Resolution - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - iii
Section 1. Preliminary Provisions - - - - - - - - - - - - - - - - - - - - - l
Section 2. General Provisions 5
Section 3. Preservation of Computer Data - - - - - - - - - - - - - - - - 8
Section 4. Disclosure of Computer Data - - - - - - - - - - - - - - - - - 8
Section 5. Interception of Computer Data - - - - - - - - - - - - - - - l 0
Section 6. Search, Seizure, and Examination of Computer
Data - - - - - - - - - - - - - - - - - - - - - - - - - - -- - - - - - 11
Section 7. Custody of Computer Data - - - - - - - - - - - - - - - - 14
Section 8. Destruction of Computer Data - - - - - - - - - - - - - 16
Forms
Annex A. Warrant to Disclose Computer Data - - - - - - - - - - - - - 18
Annex B. Warrant to Intercept Computer Data - - - - - - - - - - - - - 20
Annex C. Warrant to Search, Seize, and Examine
Computer Data - - - - - - - - - - - - - - - - - - - - - - - 22
Annex D. Warrant to Examine Computer Data - - - - - - - - - - - - 24