I have a better analogy for your question.
If we were in a position where we had to search a house and we had to get a search warrant, we could guard the house physically, and then go get the search warrant, and then come back with the warrant and search the house. Cyber-information could disappear.