2/ Without prejudice to the provisions of this Part, the General Part provisions of the
Criminal Code and the Criminal Procedure Code shall be applicable to computer
Crimes.
29. Order for Preservation of Computer Data
1/ Where there are reasonable grounds to believe that a computer data required for
computer crime investigation is vulnerable to loss or
modification, the investigatory organ may order, in writing, a person to preserve the
specified data under his control or possession.
2/ The person ordered under sub-article (1) of this Article shall immediately take
necessary measures to secure the specified computer data and preserve it for three
months and keep such order confidential.
3/ The investigatory organ may order only a one-time extension for another three
months up on the expiry of the period stipulated under sub-article (2) of this Article.
30. Order for Obtaining of Computer Data
1/ Where a computer data under any person’s possession or control is reasonably
required for purposes of a computer crime investigation, the investigatory organ may
apply to the court to obtain or gain access to that computer data.
2/ If the court is satisfied, it may, without requiring the appearance of the person
concerned, order the person who is in possession or control of the specified computer
data, to produce it to the investigatory organ or give access to same.
31. Access, Search and Seizure
1/ Where it is necessary for computer crime investigation, the investigatory organ
may, upon getting court warrant, search or access physically or virtually any
computer system, network or computer data.
2/ Where the investigatory organ reasonably believes that the computer data sought is
stored in another computer system and can be obtained by same computer system, the
search or access may be extended to that other computer system without requesting
separate search warrant.
3/ In the execution of search under sub-article (1) or (2) of this Article, the
investigatory organ may:
a) seize any computer system or computer data;
b) make and retain a copy or photograph data obtained through search;
c) maintain the integrity of the relevant stored data by using any technology;

Select target paragraph3