Removal of computers etc.
(1) If:
(a) in compliance with a request under section 35AX, the authorised agency adds or connects a computer or device to a computer network; and
(b) at a time when the request is in force, an approved staff member of the authorised agency forms a reasonable belief that the addition or connection of the computer or device is no longer required for the purposes of responding to the cyber security incident to which the relevant Ministerial authorisation relates;
the authorised agency must remove or disconnect the computer or device as soon as practicable after the approved staff member forms that belief.
(2) If:
(a) in compliance with a request under section 35AX, the authorised agency adds or connects a computer or device to a computer network; and
(b) the request ceases to be in force;
the authorised agency must remove or disconnect the computer or device as soon as practicable after the request ceases to be in force.
Return of computers etc.
(3) If:
(a) in compliance with a request under section 35AX, the authorised agency removes a computer or device; and
(b) at a time when the request is in force, an approved staff member of the authorised agency forms a reasonable belief that the removal of the computer or device is no longer required for the purposes of responding to the cyber security incident to which the relevant Ministerial authorisation relates;
the authorised agency must return the computer or device as soon as practicable after the approved staff member forms that belief.
(4) If:
(a) in compliance with a request under section 35AX, the authorised agency removes a computer or device; and
(b) the request ceases to be in force;
the authorised agency must return the computer or device as soon as practicable after the request ceases to be in force.