No. 5

84
Computer Misuse and Cybercrimes

(d) the location at which or nature of the
communication;
(e) the intended purpose for the required
communication;
(f) sufficient
information
to
identify
the
communications;
(g) details of the data of the relevant interception;
(h) the recipient of the communication;
(i) the intended duration for the use of the
communication;
(j) the necessity for use of powers under this section;
and
(k) the terms for the use and disclosure of the
communication to third parties.
(3) Upon receiving the request under this section, the
Central Authority shall, take all appropriate measures to
obtain necessary authorisation including any warrants to
execute upon the request in accordance with the procedures
and powers provided under this Act and any other relevant
law.
(4) Where the Central Authority obtains the necessary
authorisation, including any warrants to execute upon the
request, the Central Authority may seek the support and
cooperation of the requesting State during the search and
seizure.
(5) Upon conducting the measures under this section
the Central Authority shall subject to section 57, provide
the results of such measures as well as real-time collection
or recording of content data of specified communications to
the requesting State.
65. (1) The Central Authority shall ensure that the
investigation agency responsible for investigating
cybercrime, shall designate a point of contact available on a
twenty-four hour, seven-day-a-week basis, in order to
ensure the provision of immediate assistance for the
purpose of investigations or proceedings concerning
criminal offences related to computer systems and data, or
for the collection of evidence in electronic form of a
criminal offence, including carrying out the following
measures —

2018

Point of contact.

Select target paragraph3