Act.
(2)
Orders,
rules,
guidelines
or
regulations
made
under
subsection
(1)
of
this
section
may
provide
for
the
-‐
(a)
method
of
custody
of
video
and
other
electronic
recordings
of
suspects
apprehended
under
this
Act;
(b)
method
of
compliance
with
regulations
or
conventions
issued
by
relevant
international
institutions
on
cyber
security
and
cybercrimes;
(c)
procedure
for
freezing,
unfreezing
and
providing
access
to
frozen
funds
or
other
assets;
(d)
procedure
for
attachments,
forfeiture
and
disposal
of
assets,
58.
(e)
mutual
legal
assistance,
(f)
procedure
for
the
prosecution
of
all
cybercrime
cases
in
line
with
national
and
international
human
rights
standards;
(g)
procedure
for
ensuring
prompt
payment
of
any
levy
prescribed
under
this
Bill,
including
penalties
and
prosecution;
and
(h)
any
other
matter
the
Attorney
General
may
consider
necessary
or
expedient
for
the
purpose
of
the
implementation
of
this
Act.
Interpretation.
In
this
Act
–
“access”
means
gaining
entry
into,
instructing
or
communicating
with
the
logical,
arithmetical,
or
memory
function
resources
of
a
computer
system
or
network;
“Access
Device”
means
and
includes:
Electronic
cards
such
as:
(a)
Debit
Cards;
(b)
Credit
Cards;
(c)
Charge
cards;
(d)
Loyalty
Cards;
(e)
Magnetic
Stripe
based
cards;
(f)
Smart
Chip
Based
cards;
(g)
EMV
Cards;
(h)
Passwords;
(i)
Personal
identification
number
(PIN),
(i)
Electronic
plate,
(ii)
Electronic
serial
number,
(iii)
Code
number,
(iv)
Mobile
identification
number,
(v)
Any
account
number
or
other
telecommunications
service,
equipment,
or
instrument
identifier,
or
other
means
of
account
access
including
telephones,
PDAs,