This document outlines various powers granted to the controller or authorized persons under the Information Technology Act:
1. The controller has the power to search and seize items if they believe infringement has occurred. This includes placing identification marks, entering and searching premises, searching people, and breaking locks.
2. The controller can call for any information from individuals or organizations that may be useful to determine if the IT Act was contravened.
3. The controller can inspect and make copies of books and have access to computer systems and equipment to search for information.