The Computer and Cybercrimes Bill, 2016
(e) require any person in possession of decryption
information to grant them access to such decryption
information necessary to decrypt data required for the
purpose of the warrant issued under this section , except
where such decryption may contravene the protection of
such person against self-incrimination under the laws of
Kenya;
(f) require any person possessing appropriate technical
knowledge to provide such reasonable technical and
other assistance as they may require for the purposes of
executing the warrant issued under this section.
(4) Where a police officer or an authorised person is authorised to
search or access a specific computer system or part of it, under
subsection (3), and has grounds to believe that the data sought is stored
in another computer system or part of it in its territory, and such data is
accessible from or available to the initial system, the police officer or
the authorised person may extend the search or access to such other
systems or systems.
(5) The computer data seized pursuant to the provisions of this
section may be used only for the purpose of which it was originally
obtained.
(6) A warrant issued under this section may only be used for the
purpose for which it was originally obtained.
(7) The police officer or authorised person shall—
(a) seize a computer system under subsection (1) only if—
(i) it is not practical to seize or similarly secure the
computer data;
(ii) it is necessary to ensure that data shall not be
destroyed, altered or otherwise interfered with;
and; or
(b) exercise reasonable care, where the computer system or
computer data storage medium is retained.
(8) A person who obstructs the lawful exercise of the powers
18