Suspect’s Computer- All computer hardware, used by, owned by or accessed by the suspect; consisting of all equipment that can collect, analyze, create, display, convert, conceal, or transmit electronic, magnetic, optical or similar computer impulse or data.
Suspect’s Computer Hardware- Hardware including (but not limited to) any data-processing devices such as central processing units, memory typewriters, and self-contained "laptop" or "notebook" computers; internal and peripheral storage devices, transistor-like binary devices and other memory storage devices; peripheral input/output devices such as keyboards, printers, scanners, plotters, video display monitors, and optical readers; and related communications devices such as modems, cables and connections, recording equipment, RAM or ROM units, acoustic couplers, automatic dialers, speed dialers, programmable telephones dialing or signaling devices, and electronic tone-generating devices; as well as any devices, mechanisms or parts that can be used to restrict access to computer hardware such as physical keys and locks.
Suspect’s Computer Software- Software including (but not limited to) computer software stored by electronic, magnetic, optical or in other digital forms and operating systems, applications like word processing, graphics or spreadsheet programs, utilities, compilers, interpreters and communications programs. Computer-related documentation consisting of written, recorded, printed or electronically stored material that explains or illustrates how to configure or use the computer hardware, software or other related items. Computer-related documents consisting of envelopes, letters, correspondences, telexes, memoranda, facsimiles, documents, and notes reflecting computer related activity or child pornography. Computer passwords and other data security devices designed to restrict access to or hide computer software, documentation or data.