AC

CMK article 134 Computer Search: Victim Rights and Defense Limits

TL;DR

CMK m.134: Bilgisayar, ağ, mobil cihaz arama; Cumhuriyet savcısı talebiyle hâkim kararı şart. Hash zinciri + iki suret kopya zorunlu.

16 Şubat 2026 Criminal law 3 dk okuma 7 görüntülenme Son güncelleme: 10 Mayıs 2026

CMK art.134 computer, network and mobile device search authority. A request from the public prosecutor + a judge's decision is required. Hash chain and two duplicate copies are required; Otherwise evidence is considered unlawful.

Procedure

  • Written request from the public prosecutor.
  • Judge's decision (peace penalty, if there is no harm in delay).
  • Device seizure; minutes.
  • Hash calculation (SHA-256 / MD5 + SHA-1).
  • Two copies: one delivered to the prosecutor's office file, one delivered to the owner.
  • Review; If an expert is appointed, a report is prepared.
  • Illegality of evidence

    The following situations lead to the rejection of evidence:

    • Search without a judge's order (if there is no harm in delaying).
    • Hash chain is not registered; integrity is questionable.
    • Two copies were not provided.
    • The device was kept unsealed for a long time after receipt.
    • Third party data was examined during the review (scope exceeded).

    Limits of decision scope

    The judge's decision usually says "the suspect's computer, USB memory, smartphone." In defense as a lawyer:

    • Reservation rejecting out-of-scope device inspection.
    • Refuse to include irrelevant files in the review.
    • Separate request for confidential third party data (lawyer-client correspondence, therapy records).

    Is it legal for the police to force me to hand over my computer?

    Yes, if there is a judge's decision. Otherwise, a search without consent is against the law; However, if there is a risk of delay, the prosecutor submits the seizure authority for 24 hours to the approval of the judge.

    When will the device be returned?

    At the end of the investigation; average 6-18 months. To speed things up, a device return may be requested after a backup has been taken.

    Do I need to give my password?

    There is no direct coercion in Türkiye at the moment; However, there is indirect pressure (through Supreme Court comments). A password sharing strategy should be discussed with your lawyer.

    Cloud storage (Google Drive etc.) review?

    Cloud storage review is possible within the scope of the judge's decision; However, direct data requests from the service provider are subject to the MLAT procedure (for foreign providers).

    How to refute a forensic report?

    Prepare a report with a counter expert (CHFI, EnCE certified); hash chain break, file date stamp inconsistency, log integrity issues defense argument.

    Relevant legislation

    • TCK art.243 — Entering the information system (1-3 years + criminal money).
    • TCK Article 244 — Preventing/disrupting system operation (1-5 years).
    • TCK art.245 — Bank/credit card fraud (3-6 years).
    • TCK art.158/1-f — Qualified fraud when the information system/bank/credit institution is the tool (3-10 years).
    • CMK article 134 — Computer search, copying, seizure.
    Legal notice: This article is for general information purposes; A meeting with a lawyer is required for a concrete case. Durations, rates and practice are shaped by jurisprudence; Check the current legislation before applying.

    Kaynaklar ve referanslar

    Kaynaklar

    CMK m.134 Bilgisayar Arama: Mağdur Hak ve Savunma Sınırları içeriği hazırlanırken resmi mevzuat ve yüksek yargı kaynakları esas alınmıştır.

    Telif bildirimi This content and all related Q&A texts are protected under Turkish Copyright Law No. 5846. Unauthorized copying, reproduction, publication, adaptation, bulk extraction, or commercial use is prohibited; legal and criminal remedies are reserved in case of infringement.

    Hukuki destek arıyorsanız

    Bu konuda profesyonel hukuki destek için Aycan Ceylan Avukatlık Bürosu olarak yanınızdayız.

    Görüşme Planla