1In cases of proceedings against crimes concerning information technology, the court upon request of the prosecutor, shall order the sequestration of computer data or systems. With the same decision, the court shall establish the right to access, search and take computer data from the computer system as well as the prohibition to perform further actions or the securing of the computer data or system.
2If there are reasonable grounds to believe that the computer data have been stored in another computer system or in any parts of it, and such data may be legally obtained by, or in the availability of, the initial computer system being controlled, the court upon request of the prosecutor shall immediately order the search or access to such computer system.
3In executing the court decision, the prosecutor or the judicial police officer authorized by the prosecutor shall adopt measures:
ato prevent any further action being taken or to secure the computer system or part of it or of another data storage device;
bto take out and obtain copies of computer data;
cto prevent the access to computer data, or to remove such data from accessible computer systems;
çto ensure the inviolability of the relevant stored data.
4For the executions of such actions, the prosecutor may order the summoning of an expert who is competent in the field of computer system functioning or the measures applied for the protection of the computer data. The summoned expert may not refuse to conduct the tasks assigned to him without reasonable grounds.