Electronic
Communications
and Transactions
[ N o . 21 of 2 0 0 9
285
(d) in respect of a critical database administrator, perform an
audit as provided for in section fifty-four.
(2) In performing any functions under this Act, a cyber inspector
may work with a law enforcement officer.
9 5 . (1)
A cyber inspector may, in t h e p e r f o r m a n c e of
functions, at any reasonable time, without prior notice, and on t h e
authority of a warrant, enter any premises or access an information
system a n d —
(a) search the premises or that information system;
(b) search any person on the premises if there are reasonable
grounds to believe that the person has possession of an
article, d o c u m e n t or record that has a bearing on an
investigation:
Provided that a person shall only be searched by a
person of the same sex;
(c) take extracts from, or make copies of any book, document
or r e c o r d t h a t is on or in t h e p r e m i s e s or in t h e
i n f o r m a t i o n s y s t e m a n d that h a s a b e a r i n g o n an
investigation;
(d) demand the production of, and inspect, relevant licences
and registration certificates;
(e) inspect any facilities on the premises which are linked or
associated with the information system;
(f) a c c e s s and inspect t h e o p e r a t i o n o f any c o m p u t e r or
equipment forming part o f an information system and
any associated apparatus or material which the cyber
inspector has reasonable cause to believe is, or has been
used in, connection with any offence;
(g) use or cause to be used any information system or part
thereof to search any data contained in or available to
such information system;
(h) require the person by w h o m , or on w h o s e behalf, the
cyber inspector has reasonable cause to suspect t h e
computer or information system is or has been used, or
require any person in control of, or otherwise involved
with the operation of the computer or information system,
to provide the cyber inspector with such reasonable
technical and other assistance as the cyber inspector
may require for the purposes o f this Part; or
Powers of
cyber
inspectors