Digital Evidence and Law
Digital Evidence and Law
I hereby declare that the work on producing this report is original and entirely
by me and have not taken any assistance direct or indirect, from anyone else. I
confirm that I neither borrowed from other’s work nor have I presented this
partly or fully to any other institution/college/university. I have complied with
all the formalities in this regard.
Date: 24/05/2019
Place: Bangalore
4.2 Amendments to Indian Evidence Act, 1872 Regarding Digital Evidence: ................. 36
8. BIBILOGRAPHY ........................................................................................................ 60
Digital evidence forms to be an important evidence today heavily relied on in various cases-
of both civil and criminal in nature. Further collection of digital evidence forms to be an
important part of investigation of a cyber-crime. However as this evidence is technical in
nature, it is important to understand the technology that functions behind this and the
technical procedure through which such evidence can be identified, searched for and
collected. Further it is also important to store this evidence in tact till it is presented as well as
appreciated by the court. On the other hand, the legal procedure as insisted by applicable laws
including criminal or civil procedure laws, rules of evidence also needs to be complied with.
Digital evidence can be found like digital photographs, ATM computer Logs, sms or mms, or
messages, emails, text documents, spreadsheets, excel documents, images and graphics,
database files, deleted files, data back-ups, etc in any of the following sources floppy disks,
zip disks, hard drives, CD-ROMs or DVDs, as well as portable electronic devices such as
cellular phones, IOT devices etc..
Person collecting digital evidence needs to know about digital forensics which includes
computer and mobile forensics. Forensics according to dictionaries means “Relating to or
denoting the application of scientific methods and techniques to the investigation of crime”.
According to the Digital Forensic Research Workshop(DFRWS), digital forensics can be
defined as “the use of scientifically derived and proven methods towards the preservation ,
collection validation, identification, analysis, interpretation, documentation and preservation
of digital evidence derived from digital sources for the purpose of facilitating or furthering
Electronic evidence has lately become the most important evidence. Information Technology
has caused a paradigm shift in the way individuals and organizations communicate, create,
collect, share and store data and information. With the help of mobile phones, people are
daily documenting their lives which results in an expansive collection of records that may
become ‘evidence’ in the forthcoming cases. Electronic documents include photographs,
video, audio, comments, emails, and different other social media records. This has enhanced
the way things proceed in the court and with this, the traditional way of eyewitness testimony
is highly corroborated with this digital/electronic evidence.
The law about digital evidence varies from country to country as no consensus about Cyber
law is there in the world on a global level, so is the situation of the digital evidence law.
Primarily, in India the legislation that introduced the Cyber space technology to law was the
IT Act, 2000 (amend. 2008). The Section 65A and 65B of Indian Evidence Act have defined
the Electronic Evidence and were added to the Indian Evidence Act in the year 2000 with the
advent of the Information and Technology Act.
The Section 65A and 65B have been added to the Indian Evidence Act, 1872 by the
Information Technology Act, 2000. The Government of India enacted its Information
Technology Act 2000 with the objectives stating officially as: “to provide legal recognition
for transactions carried out by means of electronic data interchange and other means of
electronic communication, commonly referred to as ‘electronic commerce’, which involve the
use of alternatives to paper-based methods of communication and storage of information, to
facilitate electronic filing of documents with the Government agencies and further to amend
the Indian Penal Code, the Indian Evidence Act, 1872, the Bankers’ Books Evidence Act,
Justice P.N Bhagwati held in the case of National Textile Workers’ Union v P.R.
Ramakrishnan (1983) 1 SCC 228, held that “law cannot stand still and it must change with
the changing social concepts and values. If the law fails to respond to the needs of changing
society, then it will stifle the growth of the society and choke its progress or if the society is
vigorous enough, it will cast away the law which stands in the way of its growth.” Therefore,
the changing circumstances today where virtually every crime has an electronic component
has had a considerable effect in the law of the land and to respond to the current needs the
laws have been amended to cater or facilitate its larger goals i.e. dispensation of justice.
The trend of changing laws relating to evidence can be seen, for example in the case, State v
S.J. Choudhary (1996) 4 SCC 567, It was held that the Evidence Act was an ongoing Act and
the word “handwriting” in Section 45 of that Act was construed to include “typewriting” and
on the same principle, courts have interpreted, over a period of time, various terms and
phrases. For example, “telegraph” to include “telephone”; “banker’s books” to include
“microfilm”; “to take note” to include “use of tape recorder”; “documents” to include
“computer databases”.
Section 65-A provides that the contents of electronic records may be proved in accordance
with the provisions of Section 65-B. Section 65-B provides that notwithstanding anything
contained in the Evidence Act, any information contained in an electronic, is deemed to be a
document and is admissible in evidence without further proof of the original's production,
provided that the conditions set out in Section 65-B are satisfied.
I have applied Doctrinaire and Analytical method for this dissertation. Research will be based
on applicable international and regional law, ‘soft law’, such as recommendations and
declarations, legal doctrines, various websites.
The present dissertation attempts to look at the Digital Evidence and associated Laws from all
the angles and aims to present the technical, legal and social perspective, respective
Digital evidence forms to be an important evidence today heavily relied on in Various cases-
of both civil and criminal in nature. Further collection of digital evidence forms to be an
important part of investigation of a cyber-crime. However as this evidence is technical in
nature, it is important to understand the technology that functions behind this and the
technical procedure through which such evidence can be identified, searched for and
collected. Further it is also important to store this evidence intact till it is presented as well as
appreciated by the court. On the other hand, the legal procedure as insisted by applicable laws
including criminal or civil procedure laws, rules of evidence also needs to be complied with.
Digital evidence includes "any information that is created or stored in digital form and is
relevant to a case”. Digital Evidence includes evidences from sms or mms, or messages,
emails, text documents, spreadsheets, excel documents, images and graphics, database files,
deleted files, data back-ups, photographs, video, audio, comments, and different other social
media records. Etc
Digital photography is one of several forms of digital imaging. Digital images are also
created by non-photographic equipment such as computer tomography scanners and radio
telescopes. Digital images can also be made by scanning photographic images. Digital
Photographs are important pieces of evidence.
3. ATM Transaction Logs: ATMs (Automatic Teller Machines) are merely computers in a
large secure enclosure that handle normal banking transactions. The sole purpose is to
provide customer services 24 X7 X365 at many locations dispensing money. These basic
facts make ATMs targets for theft and violent crimes. With the use of CCTV and ATM
interfaces most problems with ATMs can be solved. An ATM interface is an electronic
device that monitors transactions made on an ATM machine and superimposes or overlays
this data on the video picture of the customer making the transaction. The Time and Date
is also recorded to verify when the event occurred. This video overlay along with the
transaction data is recorded on a DVR later review when a question arises.
4. Word Processing Documents: Word Processing Documents are end result of using a
computer to create, edit and print documents. Of all computer applications, word processing
is the most common. To perform word processing, you need a computer special program
called a word processor and a printer. A word processor enables you to create a document,
store it electronically on a disk, display it on a screen, modify it by entering commands and
characters from the keyboard and print it on a printer. They support macros which are
nothing but a software program (simple to complex in size and functions/actions carried
Mobile phone smart devices comprises of both non-volatile and volatile memory. Some
of the important digital evidence that is extracted include call history, sms, other chat
messengers data, browsing history, media files, including deleted and extracted files
along with type of extraction like manual or logical or physical level extraction with the
details of the mobile forensic tools used. Cellular network service providers often
maintain logs of their customer activities such as calling history, messaging details,
records of their location/CELL ID which could be very useful during investigation and
trial.
The scientifically derived and proven methods toward the preservation, collection,
validation, identification, analysis, interpretation, documentation and presentation of
digital evidence derived from digital sources, for the purpose of facilitating or
furthering the reconstruction of events found to be criminal, or helping to anticipate
unauthorized actions shown to be disruptive to planned operations is covered under
digital forensics.
1. Identification: Identification of the relevant Evidences forms the base on which the
investigation would take place. Hence it becomes extremely important for the
investigator to ensure that no evidences relevant for the investigation are left
unidentified. The investigator would be required to identify the possible locations
where relevant data could be residing. It would range from desktop systems, laptops
to servers, smart watches, notebooks to smart phones, storage devices present in the
premises like, CDs, DVDs, a removable media like USB drives, external hard disks
and toy-shaped pen drives which can turnout extremely difficult to identify. The
investigator at the premises should attempt to identify the operating system running
on the identified systems, storage location of data (whether locally stored on the
device hard disk or on data server or on cloud etc.), if any kind on encryption present
on the disks etc. He must be able to assess the scope of the investigation, kind of data
that would be required and the volume of the data that would be collected from the
premise. These details would help the examiner prepare better and choose appropriate
resources and tools for the next step, where the data needs to be collected.
2. Collection: Collection of identified evidences is the next step that the investigator has
to take. Typically there are two processes involved while forensically collecting the
digital evidences, namely, seizure and acquisition. Before we get into the details of
➢ Efficient : Easy to compute the hash value for any given message
➢ Deterministic: The same message always results in the same hash, i.e. if we
provide a certain message/data as input to a hashing algorithm say MD5, we
would always get the same hash value, always, every time
➢ Pre-image resistance: The hash function or hashing algorithm must be a one way
function that is, given a hash value, it must be infeasible to generate the message.
➢ Second pre-image resistance : It must be infeasible to modify a message without
changing the hash
➢ Collision resistance : It must be infeasible to identify two messages, such that for
the given hash function, they both generate the same hash
A hash value plays a crucial role in the entire process of digital forensics. A hash
value is used to validate the media acquired from the scene of crime. This ensures that
the data collected from the premises was not tampered with. During the analysis of
the collected data, the concept of hashing helps the examiner identify duplicate files
from the large collection of data. It is often employed to segregate benign or known
set of files, like files generated by the operating system, thereby reducing the size of
the data set to be analyzed.
The Information Technology Act, 2000, also accepts the use of hash values to
authenticate the electronic evidences and states under Section 3 of IT Act.
Acquisition (also referred as Disk Imaging) is the process of creating a bit-stream disk
image of the evidence seized in the previous step.
"Term given to creating physical sector copy of a disk and compressing this image in
the form of a file. This image file can then be stored on dissimilar media for archiving
or later restoration."
In simple words, disk imaging can be defined as to make a secure forensically sound
copy to media that can retain the data for extended period. So in short disk acquisition
is the process of making a bit stream image of the digital evidence being captured. To
ensure that the investigator or the operating system doesn't tamper the data, the
process of disk imaging is always carried out in a trusted write blocked environment.
Write blockers are either hardware devices or software applications that allow
applications to read data from a storage device, seized evidence in this case, and not
blocks the write commands, essentially making the devices read-only. There are
multiple freeware and commercial tools available that have the capability to seize and
acquire the digital evidence like dcfldd, FTK Imager, EnCase Imager and TruBack.
EnCase Forensic Imager is a freeware, comes with software write blocking module
FastBloc.
The pre-acquisition hash that was computed would be used to prove the authenticity
and integrity of the evidence, i.e. the hash value of disk image provided for forensic
examination or analysis is compared with the hash value of the evidence that was
generated at the scene of crime to ensure that the data was not tampered between the
scene of crime and the forensic lab, where the examination would occur.
No action taken by the examiner should change data which may subsequently be relied
upon in court.
In circumstances where a person finds it necessary to access original data, that person
must be competent to do so and be able to give evidence explaining the relevance and
the implications of their actions.
An audit trail or other record of all processes applied to digital evidence should be
created and preserved. An independent third party should be able to examine those
processes and achieve the same result.
The person in charge of the investigation has overall responsibility for ensuring that the
law and these principles are adhered to.
1. Never mishandle the Evidence - The evidence should not to be tampered with or
contaminated, maintaining the evidential value.
2. Never work on the Original Evidence : Digital evidence are highly fragile,
hence ensure that the original evidences are not used and all the analysis is
performed on the disk image created
3. Never trust the suspect's Operating System: Never work on the suspect's OS, a
single keystroke can tamper the digital evidence.
4. Document everything: Maintain a proper trail of evidence.
5. The results should be repeatable: Forensic analysis should not be analyst or
application depended. Any other examiner using any other standard forensic
should be able to retrieve the same results.
So, careful note should be made of when the evidence was collected, from where, and
by whom. For example, if digital evidence is copied onto a floppy diskette, the label
should include the current date and time, the initials of the person who made the copy,
how the copy was made, and the information believed to be contained on the diskette.
Additionally, MD5 values of the original files should be noted before copying. If
evidence is poorly documented, an attorney can more easily shed doubt on the
abilities of those involved and convince the court not to accept the evidence.
➢ Basic information about the case - Case number, Details of the Suspect and/or
Victim, Officer in-charge, location, Date etc
➢ Description of Evidence - Device Model number, Serial number, Size, Condition,
Any other notes.
➢ Details of transfer/ Chain of Custody Date/Time when the device was released by
whom and was received by whom. Other notes and Location.
The chain of custody report must be able to verify several critical pieces of information:
➢ Identify the item precisely, listing type of evidence, make, model, and serial number
(if relevant), and make a photograph of the item (if possible).
➢ Specify when was the item taken into possession.
➢ Identify where or from whom the item was seized.
Note: Potentially valuable digital evidence including dates, times, and system
configuration settings may be lost due to prolonged storage if the batteries or
power source that preserve this information fails. Where applicable, inform the
evidence custodian and the forensic examiner that electronic devices are battery
powered and require prompt attention to preserve the data stored in them.
If more than one computer is seized as evidence, all computers, cables, and
devices connected to them should be properly labeled to facilitate reassembly if
necessary. In this example, the computer is designated as computer A. All
connections and cables are marked with an "A" and a unique number.
The traditional signatures are hand written and are uniquely representative of one’s
identity. The use of signature is mandatory in law in certain cases and holds an
important legal position in the document as it signify two things, the identity of the
person and its intent to it. The Signature is one’s identity on a document and is used in
day to day transaction and in case of illiterate persons its fingerprint is considered as
his signature. The handwritten signature is prone to forgery and tampering hence
insufficient for online transaction and contracts. The online transaction requires
unique and strong protection which is served by electronic signature.
The concept of digital signature was introduced through Information Technology Act
2000 in India, which is enhanced with hybrid concept of electronic signature which is
based on UNCITRAL Model Law on Electronic Signatures 2001. The electronic
signature is a technologically neutral concept and includes a digital signature. The
object and purpose of electronic signature are similar to that of traditional signature.
In cyber world electronic signature ensures that the electronic records are authentic
and legitimate as electronic signature are safer and cannot be forged and is convenient
as the sender himself does not have to be present personally at the place to contract to
sign the document. For example a person can sign a contract in India and send it to
any part of the world to complete the transaction.
E-signatures must be uniquely linked to the person signing the document. This
condition is often met by issuing a digital-certificate-based digital ID.
At the time of signing, the signer must have total control over the data used to
generate the e-signature. Most online e-signature service providers allow signers to
directly affix their e-signature to the document in order to meet this requirement.
Any alteration to the affixed e-signature or the document to which the signature is
affixed must be detectable. This can be done by encrypting the document with a
tamper-evident seal.
There should be an audit trail that details steps taken during the signing process.
The users then use this app interface to apply e-signatures to any online
document by authenticating their identity using an eKYC service such as OTP
(one time passcode) provided by an e-sign service provider. The online e-
signature service works with an accredited service provider to provide
certificates and authentication services that comply with government
guidelines.
The user might also be issued a USB token containing the digital-certificate-
based ID, along with a personal PIN, to sign a document.
These legal requirements are prescribed in order to ensure authenticity of such evidence.
Digital evidence is generally regarded as that which can be easily manipulated or altered or
even deleted and hence is the need of ensuring its authenticity as well as reliability.
The foundations for digital evidence are based on established principles of authentication
and admissibility that originated with the use of "paper" evidence and the five foundations
are:
1. Relevance: The evidence must be relevant to the claims asserted, i.e. it must have "any
tendency" to prove or disprove a consequential fact in the litigation.
2. Authenticity: A process for establishing that digital data or a document is what it is
represented to be.
3. Hearsay: An out-of-court statement introduced for the truth of the matter asserted; it
applies if the proponent plans to use the record's contents as substantive evidence. The
evidence must not be hearsay, or it must be admissible under a hearsay exception.
4. Best Evidence: This standard applies if the document's terms are at issue; there are no
"originals" of digital evidence.
5. Probative Value Must Outweigh Any Prejudicial Effect: A court may exclude relevant
evidence if its probative value is substantially outweighed by the danger of unfair
prejudice, or by considerations of undue delay, waste of time, or needless presentation of
cumulative evidence.
The Information Technology Act, 2000 and its amendment is based on the United
Nations Commission on International Trade Law (UNCITRAL) model Law on
Electronic Commerce.
(2) Information in the form of a data message shall be given due evidential
weight. In assessing the evidential weight of a data message regard shall be
had to the reliability of the manner in which the data message was generated,
stored or communicated, to the reliability of the manner in which the integrity
of the information was maintained, to the manner in which its originator was
identified, and to any other relevant factor.”
For the purpose of legally assigning evidentiary value to a digital evidence we can
classify digital evidence into 2 types, namely
(b) during the said period, information of the kind contained in the
electronic record or of the kind from which the information so
contained is derived was regularly fed to the computer in the ordinary
course of the said activities;
(c) throughout the material part of the said period, the computer was
operating properly or if not, then in respect of any period it was not
operating properly or was out of operation for that part of the period,
was not such as to affect the electronic record or the accuracy of the
contents; and
(3) Where over any period, the function of storing or processing information
for the purposes of any activities regularly carried on over that period as
mentioned in clause (a) of sub section (2) was regularly performed by
computers, whether -
(d) in any other manner involving the successive operation over that
period, in whatever order, of one or more computers and one or more
combinations of computers, all the computers used for that purpose
during that period shall be treated for the purposes of this section as
constituting a single computer, and references in this section to a
computer shall be construed accordingly.
(c) dealing with any of the matters to which the conditions mentioned
in sub-section (2) relate, and purporting to be signed by a person
occupying a responsible official position in relation to the operation of
the relevant device or the management of the relevant activities
(whichever is appropriate) shall be evidence of any matter stated in the
certificate; and for the purpose of this sub-section it shall be sufficient
for a matter to be stated to the best of the knowledge and belief of the
person stating it.
a. The computer output was produced by a computer which was used regularly to
store or process such information for the purposes of any activities regularly
carried on over that period.
b. That the computer output was taken by a person having lawful control over the
use of the computer.
c. During the said period, the information of the kind was regularly fed into such
computer in the ordinary course of business
d. Throughout such period the computer was operating properly - or - if not then
such non-working [or not operating properly] was not of such a nature that it
affected the electronic record or the accuracy of contents of such electronic
record.
e. In case of use of multiple computers like in a network situation or when
multiple computers are used to store or process information or to perform any
Then all such computers shall be deemed to be a ‘single computer’ for the purpose
of this provision.
Identification of the electronic record along with a statement with details of the
manner in which such output is produced [for example if it's through printout
mode or through a soft copy in a USB etc.].
Details of the device used to take the output so as to show the manner of taking of
such output and compliance of earlier stated conditions in the provision.
The term 'electronic records' has been given the same meaning as that assigned to
it under the IT Act. IT Act provides for "data, record or data generated, image or
sound stored, received or sent in an electronic form or microfilm or computer-
generated microfiche.”
The definition of 'admission' (Section 17 of the Evidence Act) has been changed
to include a statement in oral, documentary or electronic form which suggests an
inference to any fact at issue or of relevance
New Section 22A has been inserted into Evidence Act to provide for the relevancy
of oral evidence regarding the contents of electronic records. It provides that oral
admissions regarding the contents of electronic records are not relevant unless the
genuineness of the electronic records produced is in question.
The Evidence Act in Section 59 provides for proof of facts by oral evidence by me
of such information, as relates distinctly to the fact thereby discovered, may be
proved by oral evidence.
Section 39 of Evidence Act has been amended to provide for how much evidence
to be given when statement forms part of electronic record:
Section 73A of Evidence Act states what proof is required for verification of
digital signature. In order to ascertain whether a digital signature is that of the
person by whom it purports to have been affixed, the court may direct -
There is a presumption as to electronic records five years old. As per Section 90A
of Evidence Act, where any electronic record, purporting or proved to be five
years old, is produced from any custody which the Court in the particular case
considers proper, the Court may presume that the digital signature which purports
to be the digital signature of any particular person was so affixed by him or any
person authorized by him in this behalf.
Case Overview: It is a case of the prosecution that the complainant's wife suffered terrible
physical torture and mental agony due to medical negligence by the respondent. These
Appeals are against a Judgment of the Bombay High Court dated 23rd/24th April 2001.
The question for consideration is whether in a criminal trial, evidence can be recorded by
video conferencing. The High Court has held, on an interpretation of Section
273, Criminal Procedure Code, that it cannot be done.
Salient outcome of the judgment: The Supreme Court observed that video conferencing
is an advancement of science and technology which permits seeing, hearing and talking
with someone who is not physically present with the same facility and ease as if they were
physically present. The legal requirement for the presence of the witness does not mean
actual physical presence and the court allowed the examination of a witness through video
conferencing and concluded that there is no reason why the examination of a witness by
video conferencing should not be an essential part of electronic evidence. Supreme court
also clarified that CRPC - section 273 - recording of evidence by video conferencing -
code provides that evidence be recorded in the presence of accused and in cases where
accused is dispensed off from his personal attendance, evidence would be recorded in
presence of his pleader - presence of pleader is deemed to be the presence of the accused -
evidence includes oral, documentary as well as electronic records which would include
video conferencing - recording of evidence of one of the witness can be done through
video conferencing.
Case Overview: This case relates to appeal against the conviction following the attack on
the parliament house on December 13 2001. This case dealt with the proof and
admissibility of mobile telephone call records. While considering the appeal against the
accused for attacking Parliament, a submission was made on behalf of the accused that no
Salient outcome of the judgment: The Supreme Court concluded that a cross-
examination of the competent witness acquainted with the functioning of the computer
during the relevant time and the manner in which the printouts of the call records were
taken was sufficient to prove the call records. But ‘oral evidence’ about the contents of an
‘electronic document’ had been accepted without see.65B 12 certificate. This decision to
accept the ‘electronic documents’ even though it was not certified under Sec.65B has now
been over-ruled in Anvar P.V. Vs. P.K. Basheer and others, AIR 2015 SC 180, where it
was held that see.65B certificate would be mandatory when the contents of an ‘electronic
document’ are to be admitted in a court of law. However, it may be relevant to note that, if
genuineness of see.65B certified evidence statement is questioned, then it may be
appropriate and necessary for examine oral evidence relevant to the objection.
Case Overview: In case of Amitabh Bagchi Vs Ena Bagchi, wife was in India and
husband remained in USA, When there was an issue of maintenance between the parties,
the husband made application before the Court for examining him through
video conferencing.
Salient outcome of the judgment: The High Court of Calcutta in the judgment Amitabh
Bagchi vs Ena Bagchi: AIR 2005 Cal 11 analyzed sections 65A and 65B of Evidence Act,
1872. The court held that the physical presence of person in Court may not be required for
purpose of adducing evidence and the same can be done through medium like video
conferencing. Sections 65A and 65B provide provisions for evidences relating to
electronic records and admissibility of electronic records, and that definition of electronic
records includes video conferencing. The court also provided a list of 14 safeguards to be
employed for conducting video conferencing, which are:
Salient outcome of the judgment: When hearing the matter, the Supreme Court
considered the appreciation of digital evidence in the form of interview transcripts from
the Zee News television channel, the Aaj Tak television channel and the Haryana News of
Punjab Today television channel. The supreme court and determined that the electronic
evidence placed on record was admissible and upheld the reliance placed by the speaker on
the recorded interview when reaching the conclusion that the voices recorded on the CD
were those of the persons taking action. The comments in this case indicate a trend
emerging in Indian courts: judges are beginning to recognize and appreciate the
importance of digital evidence in legal proceedings.
5. Badola Murali Krishna Vs Smt. Bodala Prathima (2007 (2) ALD 72):
Case Overview: The petitioner is the husband of the respondent. Their marriage had taken
place in the year 1977 and were blessed with a child. The respondent filed H.M.O.P.No.
136 of 2004 in the Court of Additional Senior Civil Judge, Narsaraopet, against the
petitioner, for divorce under Section 13 of the Hindu Marriage Act, 1955. The trial of the
O.P. commenced. The petitioner is a resident of U.S.A. He filed I.A.No. 340 of 2006
seeking permission of the trial Court for recording his evidence through the video
conferencing. The respondent opposed the application. Through its order, dated 15-6-
2006, the trial Court dismissed the I.A.
Case Overview: The petitioners herein this case are accused of Criminal Conspiracy
under Section 120B of IPC and are also charged under Section 7-12 read with Section 13
of Prevention of Corruption Act, 1988. During the investigation, telephonic conversations
were recorded and stored in 4 Hard Disks which are kept at the Special Unit, CBI in New
Delhi. The four computer systems containing the recordings were sent to Andhra Pradesh
Forensic Science Laboratory. CDs were made for the four cases and they were sent to the
Special Judge along with the charge sheets. A Delhi High Court Case in which several
accused were prosecuted on the basis of intercepted telephone conversations. The case
concerns the admissibility and reliability of digital evidence. These intercepted
communications were stored on hard disks out of which CD’s were made subsequently.
These CD’s contained relevant conversations out of the entire conversations contained on
the hard disks. The prosecution sought to rely upon these CD’s as evidence against the
accused.
Salient outcome of the judgment: The court opined that the amended Evidence Act
widely defines ‘document’ and ‘evidence’ in Section 3 read with Section 2(t) & 2(o) of
the IT Act. In this case, the hard disk itself is a document which was used for recording the
telephonic conversation. Hence, they are electronic records for both their latent and patent
characteristics. The judgment is quite a watershed as it is the first Indian judgment which
elaborately discusses the admissibility of electronic records and the evidentiary
requirements under the Indian Evidence Act.
The court arrived at the conclusion that when Section 65B talks of an electronic
record produced by a computer referred to as the computer output. It would also
include a hard disc in which information was stored or was earlier stored or
continues to be stored. It distinguished as there being two levels of an electronic
record. One is the hard disk which once used itself becomes an electronic record
in relation to the information regarding the changes the hard disc has been subject
to and which information is retrievable from the hard disc by using a software
program. The other level of electronic record is the active accessible information
recorded in the hard disc in the form of a text file or sound file or a video file etc.
Such information that is accessible can be converted or copied as such to another
magnetic or electronic device CD, Pen drive etc. Even a blank hard disc which
contains no information but was once used for recording information can also be
copied by producing a cloned had or a mirror image.
Case Overview: This petition involves a techno-legal questions resulting in the growth of
technically speedy procedure. The issue Involved in the case on hand is with regard to
examination of witnesses in USA either by way of Commissioner or by way of Audio-
Video Link.
Salient outcome of the judgment: As part of the judgment certain safeguard conditions
have been laid down for video-recording of evidence by the court:
Case Overview: This election petition challenges the declaration of the respondent as
the elected candidate from 69, Sinnar constituency at the election held on 13.10.2004. It
has been filed by a candidate of the NCP-Congress and R.P.I. alliance who
unsuccessfully contested the elections. The petitioner has alleged that the respondent has
indulged in corrupt practices thereby materially affecting the result of the election for the
Sinnar constituency. The petitioner has alleged that the returned candidate had flagrantly
violated the provisions of the Act and the election rules framed there under. He has also
alleged that the returned candidate had violated several orders of the election
commission issued under the provisions of the Act. The petitioner produced several
documents along with an affidavit of documents on record as also a Compact Disk
(hereinafter referred to as CD) which according to the petitioner was a reproduction of
the speeches delivered by the respondent and his supporters during the election period
when the code of conduct was in force.
Salient outcome of the judgment: Holding that "standard of proof" in the form of
electronic evidence should be "more accurate and stringent" compared to other
documentary evidence, the Supreme Court has upheld the election of a Shiv Sena Lok
Sabha candidate accused of making inflammatory speeches
"If a stringent test of proof is not applied a serious prejudice is likely to be caused
to the successful candidate whose election would not only be set aside, he may
also incur disqualification to contest an election for a certain period, adversely
affecting his political career."
Thus a heavy onus lies on the election petitioner to prove the charge of corrupt
practice in the same way as a criminal charge is proved," the apex court ruled.
A bench of Justice DK Jain and justice P Sathasivam passed the judgment while
upholding the election of Manikrao Shivaji Kokate from Maharashtra's Sinnar seat
in the 2004 parliamentary polls which was challenged by Tukaram Dighoie, the
defeated candidate of the NCP-Cong-RPI combine
"Though it was neither feasible nor advisable to lay down any exhaustive set of
rules by which the admissibility of such evidence may be judged but it needs to be
In other words, the tribunal was of the view that Dighole could not prove that
cassette copy was obtained from the Election Commission office as claimed by
him since he could not support his claim with any proof.
It was the case of the defeated candidate that Kokate had made certain whipping
up pro- Maratha sentiments thus adversely affecting his (Dighole's) electoral
prospects.
Upholding the tribunal's order, the SC citing its earlier rulings said the success of
candidate who has won at an election should not be lightly interfered with.
“No relevant material was brought to our notice which would impel us to hold
that the finding by the tribunal is perverse, warranting out interference," the
apex court said in a judgment in Feb. 2010.
Case Overview: In the general election to the Kerala Legislative Assembly held on
13.04.2011, the first respondent was 1 REPORTABLE Page 2 declared elected to 034
Eranad Legislative Assembly Constituency. He was a candidate supported by United
Democratic Front. The appellant contested the election as an independent candidate,
a. electronic records,
b. documentary evidence other than electronic records, and
c. oral evidence.
Salient outcome of the judgment: Supreme Court overruled the statement of law on
admissibility of secondary evidence pertaining to electronic record, as held by the court in
case of State (NCT of Delhi) v Navjot Sandhu alias Afsal Guru (2005) 11 SCC 600 .
Supreme court in case of Anvar P.K vs. P.K Basheer & ors., further explained the position
by saying that “an electronic record by way of secondary evidence shall not be admitted in
evidence unless the requirement under section 65 B are satisfied. Thus in case of CD, VCD
and chip etc., the same shall be accompanied by the certificate in term of section 65B
obtained at the time of taking the document, without which the secondary evidence
pertaining to that electronic record is inadmissible.”
Following the principle of that generalia specialibus non derogant, which means special
law will always prevail over general law, court in case of Anvar P.K vs. P.K. Basheer &
ors has overruled the holding of Afzal Guru’s case and held inadmissibility of the CD’s as
these electronic evidence produced without the compliance of the requirement of the
section 65B. Here the special provision of the law is the section 65B of the Indian
Evidence Act 1872.
The judgment in Anvar’s case signifies the concern of our judiciary on reliability of the
electronic evidences. The new approach set up by the court is that the general law relating
to secondary evidence is not applicable in electronic evidence. Electronic records being
more susceptible to tampering and alteration so if the electronic records, which is not
complying with the special provision of the Indian evidence act that is section 65B, may
led to the travesty of justice.
Judgment also referred to Section 45A according to which the opinion of Digital Evidence
Examiner (under Section 79A-When appointed) is relevant only when the genuineness of
an already admitted electronic evidence is in question.
After this case, for the presentation and admissibility of any electronic evidence like
computer data, CD, VCD, chip any other digital record, there is mandatory necessity to
comply with section 65B of the Act.
Case Overview: In this case, a woman complained to the police about a man who was
sending her obscene, defamatory and annoying messages in a Yahoo message group.
The accused also forwarded emails received in a fake account opened by him in the
victim's name. The victim also received phone calls by people who believed she was
soliciting for sex work. After the victim made the complaint in February 2004, the police
traced the accused who was the victim's friend, to Mumbai and arrested him. The police
found the accused was interested in marrying the victim but she turned him down and
married someone else instead. The marriage, however, ended in divorce, which is when
the accused started contacting the victim again but she rejected him again. The accused
then started harassing the victim online.
Salient outcome of the judgment: This was the first case in India where a conviction
was handed down in connection with the posting of obscene messages on the internet
under the controversial section 67 of the Information Technology Act, 2000. The case is
also significant for having introduced electronic evidence under Section 65B of the
Indian Evidence Act for the first time in a Court, where a certified copy of the electronic
document present on Yahoo server was produced by a private techno legal consultant,
not being part of a Government forensic lab, and was accepted as the prime evidence of
crime. The role of a private person as an "Expert" and the "Validity of Section 65B of
Indian Evidence Act" were examined and validated in the trial.
The impact of the case was far reaching and set a benchmark for the courts and inspired
people to lodge cases related to harassment on the internet.
The Case also brought out the responsibilities of an intermediary like a Cyber Cafe in
maintaining a visitor's register and its importance as evidence.
The case validated the concept of production of electronic evidence through Section 65B
certification without the production of the original hard disk containing the document.
Case Overview: In this case the key issue that was considered was whether a video
recording of the scene of crime during investigation should be necessary to inspire
confidence in the evidence collected and in the given context, what would be the scope
of applicability of the procedural requirements under Section 65(B)(4) of the Act for
furnishing a certificate in case of electronic evidence produced by a person not in
custody of the device generating such evidence.
Salient outcome of the judgment: After hearing submissions of the parties and
clarifying the legal position on the subject on the admissibility of the electronic evidence
(especially by a party who is not in possession of device from which the document is
produced) the Apex Court made the following observations:
➢ Electronic evidence is admissible under the Act. Section 65A and 65B are
clarificatory and procedural in nature and cannot be held to be a complete
code on the subject.
➢ If the electronic evidence so produced is authentic and relevant, then it can
certainly be admitted subject to the court being satisfied of its authenticity.
The procedure for its admissibility may depend on the facts such as whether
the person producing the said evidence is in a position to furnish a certificate
under Section 65B(h).
➢ The applicability of the procedural requirement under Section 65B(4) of the
Act of furnishing a certificate is to be applied only when such electronic
Case Overview: In 2010 at U.S.A District Court for the Western District of New York,
Paul Ceglia, a wood pellet salesman from Wellsville, New York, sued both Facebook and
CEO Mark Zuckerberg, alleging that a 2003 contract he wrote to hire Zuckerberg to do
computer programming for his company, Street Fax, entitled him to 50% of Facebook.
Zuckerberg, a student at Harvard at the time, had responded to an ad on Craigslist
published by Ceglia. Zuckerberg was paid $1000 for his work. The copy of the contract
filed by Ceglia in his lawsuit showed that he made also a $1000 investment in “The Page
Book,” and Ceglia’s suit claimed that that seed investment entitled him to a 50% share of
the company. Ceglia’s team produced a series of emails between the two that appeared to
show the agreement to the 50/50 share.
Salient outcome of the judgment: Digital Forensics and Digital Evidence played a key
role in the judgment of this case. The court then ordered that a computer forensic
examination of Paul Ceglia’s computer was carried out, contrary to Paul Cegla’s requests.
During the examination Facebook identified the document that contained the original
contract dating from 2004 and, whilst his case was becoming believed by many, it
showed that Paul Ceglia’s contract made no reference to “The Page Book” or Facebook
and only mentioned his own company, Street Fax.
Facebook alleged that the contract that had been produced had been forged to support
Paul Ceglia’s claim and forensic experts also examined Mark Zuckerberg’s email account
from the time and found no evidence of the email chain that Paul Celgia had also
produced that contained the agreement of 50% share in Facebook.
The case against Facebook was then dismissed by the court and Paul Ceglia was then
arrested on charges of attempting to defraud Facebook of 1 billion US Dollars.
The area of Digital Evidence is very vast and going through continuous evolution thanks to
new digital devices and communication methods that keep getting into the market. This is
also closely linked to the technological developments in computing (both hardware and
software), telecommunications, and consumer usage patterns. Thanks to Internet Of Things
(IOT), machine learning, increased state monitoring with common ID like Aadhar and
CCTV’s across the cities and by private individuals, the amount of digital evidence that is
going to be available for any crime will only increase. Nowadays every crime will have some
or other digital evidence tagged as primary/secondary evidence due to increased usage of
technology which leaves lot of digital footprint, so legal regime needs to move faster by
appreciating and accommodating the newer set of digital evidences that will keep on getting
added as a secondary/primary evidence to help victim get due justice.
Based on various reading on the challenges faced while collecting, maintaining and
presenting digital evidence, I suggest that more awareness and training sessions need to be
conducted for all the associated parties regarding new technological advances in digital
devices and communication methods and create SOP’s for gathering, maintaining and
presenting evidences such that the evidence value is not destroyed and appreciated by the
law. Similarly student suggests that legal fraternity must also embrace newer technological
advancements to provide justice to the victims in a timely manner.
I have restricted this dissertation thesis mainly to Indian legal framework on digital evidence,
and suggests as a scope for future work that a study can be taken up on how digital evidence
is collected, documentation and legal framework works in other countries.
B. Journals:
➢ International Journal of Advanced Research in Computer Science and
Software Engineering By Matthew N. O. Sadiku, Mahamadou Tembely, and
Sarhan M. Musa