The intermediary or the person in-charge of the computer resource so directed under Rule (3), shall provide technical assistance and the equipment including hardware, software, firmware, storage, interface and access to the equipment wherever requested by the agency authorised under Rule (4) for performing interception or monitoring or decryption including for the purposes of–
(i) the installation of equipment of the agency authorised under Rule (4) for the purposes of interception or monitoring or decryption or accessing stored information in accordance with directions by the nodal officer; or
(ii) the maintenance, testing or use of such equipment; or
(iii) the removal of such equipment; or
(iv) the performance of any action required for accessing of stored information under the direction issued by the competent authority under Rule (3).
Leave a Reply