26

No.14

Cybercrimes

2015

can not be done without the use of force or due to resistance
from the part holding data or evidential value of data can be
preserved through the order of the court, a law enforcement
officer may apply to court for an order for the disclosure or
preservation.
Use of forensic
tool

37.-(1) Where a law enforcement officer is satisfied
that essential evidence cannot be collected under this Part,
he may apply to the court for an order to authorise the use
of a forensic tool.
(2) The application under subsection (1)
shall contain(a) the name and address of the suspect;
(b) a description of the targeted computer system;
and
(c) a description of the intended measures, purpose,
extent and duration of the utilization.
(3) The law enforcement officer shall ensure that
any modification made to the computer system or computer
data of the suspect are limited to the investigation and that
any changes reversed after the completion of the
investigation is restored into the system.
(4) During investigation, the law enforcement
officer shall log(a) the technical means used and time and date of
the application;
(b) the identification of the computer system and
details of the modification undertaken within the
investigation;
(c) any information obtained;
(5) The information obtained under this section shall
be protected against any modification, unauthorized
deletion and unauthorized access.
(6) The authorization under this section shall be
valid for a period of fourteen days.

Select target paragraph3