The Computer and Cybercrimes Bill, 2016
particulars of the investigation or proceeding commenced
in respect of the offence, and be accompanied by a copy
of any relevant restraining or confiscation order;
(e) give details of any procedure that the requesting State
wishes to be followed by the requested State in giving
effect to the request, particularly in the case of a request
to take evidence;
(f) include a statement setting out any wishes of the
requesting State concerning any confidentiality relating to
the request and the reasons for those wishes;
(g) give details of the period within which the requesting
State wishes the request to be complied with;
(h) where applicable, give details of the property, computer,
computer system or electronic device to be traced,
restrained, seized or confiscated, and of the grounds for
believing that the property is believed to be in the
requested State;
(i) give details of the stored computer data, data or program
to be seized and its relationship to the offence;
(j) give any available information identifying the custodian
of the stored computer data or the location of the
computer, computer system or electronic device;
(k) include an agreement on the question of the payment of
the damages or costs of fulfilling the request; and
(l) give any other information that may assist in giving effect
to the request.
(3) Upon receiving the request under this section, the Central
Authority shall take all appropriate measures to obtain necessary
authorisation including any warrants to execute upon the request in
accordance with the procedures and powers provided under this Act and
any other relevant law.
(4) Where the Central Authority obtains the necessary
authorisation in accordance with subsection (3), including any warrants
to execute the request, the Central Authority may seek the support and
cooperation of the requesting State during such search and seizure.
33