Section 24(2)(iv) in The Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009
(iv)accessing stored information from computer resource relating to the installation, connection or maintenance of equipment, computer resource or a communication link or code; or