to keystroke logging or transmission of an IP-address;
“Seize” includes:
(a)
activating any onsite computer system and computer data storage
media;
(b)
making and retaining a copy of computer data, including by using
onsite equipment;
(c)

maintaining the integrity of the relevant stored computer data;

(d)
rendering inaccessible, or removing, computer data in the accessed
computer system;
(e)

taking a printout of output of computer data; or

(f)
seize or similarly secure a computer system or part of it or a
computer-data storage medium.
“Traffic data” means computer data that:
(a)

relates to a communication by means of a computer system; and

(b)
is generated by a computer system that is part of the chain of
communication ; and
(c)
shows the communication’s origin, destination, route, time date,
size, duration or the type of underlying services.
“Thing” includes but is not limited to:
(a)

a computer system or part of a computer system;

(b)

another computer system, if:

(i) computer data from that computer system is available to the
first computer system being searched; and
(ii) there are reasonable grounds for believing that the computer
data sought is stored in the other computer system;
(c)

a computer data storage medium.

“Utilise” shall include
(a)

developing of a remote forensic tool;

(b)

adopting of a remote forensic tool; and

(c)

purchasing of a remote forensic tool.

PART II

Select target paragraph3