86
No. 5

Computer Misuse and Cybercrimes

Authority which is the subject matter of the offence or is
used in connection with the commission of the offence.
68. Whenever there is a conflict between this Act and
any other law regarding cybercrimes, the provisions of this
Act shall supersede any such other law.
69. The laws specified in the first column of the
Schedule are amended, in the provisions specified in the
second column thereof, in the manner respectively
specified in the third column.
PART VII—PROVISIONS ON DELEGATED
POWERS
70. (1) The Cabinet Secretary may make regulations
generally for the better carrying into effect of any
provisions under this Act.
(2) Without prejudice to the foregoing, regulations
made under this section may provide for —
(a) designation of computer systems, networks,
programs, data as national critical information
infrastructure;
(b) protection, preservation and management of
critical information infrastructure;
(c) access to, transfer and control of data in any
critical information infrastructure;
(d) storage and archiving
of critical data or
information;
(e) audit
and
inspection of
national critical
information infrastructure
(f) recovery plans in the event of disaster, breach
or loss of national critical information
infrastructure or any part of it;
(g) standard operating procedures for the conduct,
search, seizure and collection of electronic
evidence; and
(h) mutual legal assistance.
(3) For the purposes of Article 94 (6) of the
Constitution—
(a) the purpose and objective of delegation under this
section is to enable the Cabinet Secretary to make

2018

Prevailing Clause.

Consequential
Amendments.
Cap 411A.

Regulations.

Cap 2,
No. 23 of 2013

Select target paragraph3