to keystroke logging or transmission of an IP-address;
“Seize” includes:
(a)
activating any onsite computer system and computer data storage
media;
(b)
making and retaining a copy of computer data, including by using
onsite equipment;
(c)
maintaining the integrity of the relevant stored computer data;
(d)
rendering inaccessible, or removing, computer data in the accessed
computer system;
(e)
taking a printout of output of computer data; or
(f)
seize or similarly secure a computer system or part of it or a
computer-data storage medium.
“Traffic data” means computer data that:
(a)
relates to a communication by means of a computer system; and
(b)
is generated by a computer system that is part of the chain of
communication ; and
(c)
shows the communication’s origin, destination, route, time date,
size, duration or the type of underlying services.
“Thing” includes but is not limited to:
(a)
a computer system or part of a computer system;
(b)
another computer system, if:
(i) computer data from that computer system is available to the
first computer system being searched; and
(ii) there are reasonable grounds for believing that the computer
data sought is stored in the other computer system;
(c)
a computer data storage medium.
“Utilise” shall include
(a)
developing of a remote forensic tool;
(b)
adopting of a remote forensic tool; and
(c)
purchasing of a remote forensic tool.
PART II