Академический Документы
Профессиональный Документы
Культура Документы
Contents
Acknowledgement ........................................................................................................................................ 2
1.
Introduction .......................................................................................................................................... 3
2.
3.
4.
4.2.
4.3.
5.
6.
Acknowledgement
I would like to extend my heartfelt gratitude to everyone who has been a part of this project. Dr. Mamta
Rana, without whose suggestions and guidance this project would never have reached completion. She
is also my mentor for this project. My friends, whose new inputs and skill sets always got me something
new to research about. My parents and grandparents whose views I took at regular times about how
things were in the past to relate them with the present scenario. All in all, without all these people this
project would not have been successful.
The biggest part of my gratitude extends to the law enforcement agencies of Dharamshala, Himachal
Pradesh, Gurgaon, Haryana and Saharanpur, Uttar Pradesh, interactions with whom have paved way for
the findings of this project.
1. Introduction
Cyber Crime- One of the most unexplored dimensions both procedurally and substantially in the Indian
Law is a growing menace these days. Research and Reports have shown that Cyber Crime is growing
tremendously and without any precedents on a lot of issues. This paper although about procedure also
looks at some part of substantive law. This is not a regular paper with sources limited to books and
journals, with this attempt I have taken to writing with my experience on the ground and with
interactions with Police Officials from different states in India. I have also tried to incorporate problems
as shared by them and a readiness estimation for a big boom of Cyber Crime in the coming years.
This paper limits itself to solving Cyber Crime and the role of intermediary data in it. Although there
have been strict and fairly good guidelines issued to the intermediaries under the IT Act, still the country
seems to lag behind in solving cases and getting convictions. So this becomes the next important
question to be discussed in the paper- What is the reason for a low conviction rate in Cyber Crime?
investigation. It only mentions in Section 78 of the Act that a police above the rank of Inspector may
investigate offences under IT Act.
Again, for the rest of it, Cyber Crime is reliant on the CrPC expect for another Section 80 for arrest and
search and Section 76 to confiscate any hardware in question.
Cognizable
Bailable
YES
NO
YES
NO
NO
YES
Cognizable
Bailable
YES
YES
YES
NO
68, 71,72
NO
YES
Note: Important Details have been wiped out as per the request of the Agency.
Also Login and Logout IPs of the user are given which help in establishing as to who really the criminal is.
For
this
purpose
the
reply
looks
like
this-
After obtaining the IP Addresses, it needs to be established as to who the IP address belongs. For this
the intermediary now shifts to being the service provider that allocated this IP address. Another notice
u/s 91 is sent to this intermediary seeking information about this user and his address etc. which takes it
further towards fixing liability.
a. Sec 65-A is purely about how electronic records may be proved, It is to be in accordance with Sec 65-B
and the conditions as laid out in it.
b. Sec 65 B(1) is a little confusing in the language but it simply means that any information (from the
computer or device in question) which is printed on a paper, stored, recorded or copied in optical or
magnetic media shall be also called a document. And this is admissible in any proceeding when a proof
of the original or any fact stated of which direct evidence would be admissible, meaning that such a
document can also act as an admissible evidence when it satisfies all the requisites under Sec. 65B. That
is why for investigators, evidence retention and preservation important.
c. Sec 65 B(2) talks about the prerequisites that need to be satisfied for a piece of evidence to be
admissible:
1. Firstly, the computer output containing the information should have been produced by the computer
during the period over which the computer was used regularly to store or process information for the
purpose of any activities regularly carried on over that period by the person having lawful control over
the use of the computer.
2. The second requirement is that it must be shown that during the said period, the information of the
kind contained in electronic record or of the kind from which the information contained is derived was
regularly fed into the computer in the ordinary course of the said activity.
3. A third requirement is that during the material part of the said period, the computer should have been
operating properly and that even if it was not operating properly for some time that break should not aff
ect either the record or the accuracy of its contents.
4. The fourth requirement is that the information contained in the record should be a reproduction or
derived from the information fed into the computer in the ordinary course of the said activity.
Under Section 65 B(4), a certificate to identify the electronic record is issued and it describes the manner
in which it was produced giving the particulars of the device involved in the production of that record
and deals with the conditions mentioned in Section 65 B(2) and is signed by a person occupying a
responsible official position in relation to the operation of the relevant device shall be evidence of any
matter stated in the certificate.
Earlier,
Electronically stored information was treated as a document and secondary evidence of these
electronic documents was adduced through printed reproductions or transcripts, the
authenticity of which was certified by a competent signatory. The signatory would identify her
9
signature in court and be open to cross examination. This simple procedure met the conditions
of both sections 63 and 65 of the Evidence Act.
To bridge this gap the IT Act amended section 59 of the Evidence Act to exclude electronic
records from the probative force of oral evidence in the same manner as it excluded documents.
This is the re-application of the documentary hearsay rule to electronic records. But, instead of
submitting electronic records to the test of secondary evidence which, for documents, is
contained in sections 63 and 65, it inserted two new evidentiary rules for electronic records in
the Evidence Act: section 65A and section 65B.
However, the special law and procedure created by sections 65A and 65B of the Evidence Act for
electronic evidence were not used. Disappointingly, the cause of this non-use does not involve
the law at all. Indias lower judiciary the third tier of courts, where trials are undertaken is
vastly inept and technologically unsound. With exceptions, trial judges simply do not know the
technology the IT Act comprehends. It was easier to carry on treating electronically stored
information as documentary evidence.
This situation continued and was held high in the Parliament attacks case(State v Navjot
Sandhu)by the Supreme Court where copies of Call detail records were admitted without
following procedures of Sections 65A and 65B.
Here, generalia specialibus non derogant (the general does not detract from the specific),
lex specialis derogat legi generali(special law repeals general law) were reiterated.
The Supreme Court held that Sec 65A and 65B create some special provisions that override the
general law of documentary evidence. So now, all the conditions as listen under Sec 65B must
be satisfied and a certificate be taken to make an evidence admissible.
This disqualifies oral evidence to attest secondary documentary evidence. It is only restricted for
later when oral evidence under Sec. 22A speaks about genuineness of the evidence and not
content by an expert witness under Sec. 45A of the Act.
Now the thumb rule to expect is verification of evidence by means of the specific laws of the
Evidence Act, not the general ones.
This precedent by the Apex court in 2014 has made it mandatory to obtain a certificate first before
furnishing any digital evidence.
10
11
response from Facebook and thousands of cases go unnoticed. There is a Cyber Crime every hour in
India it is said, even then NCRBs data shows only a handful of 5400 crimes committed in the last year.
This leads to the next problem of low conviction rate. Often due to lack of evidence, sometimes due to
improper provision of the law as discussed in the first sections about bailability, offenders walk free.
Insertion of a provision in the IT Act to seek data expressly from Social Media Websites and
Other intermediaries with a waiting time of less than a week.
This could ensure quick takedown and damage control of the victim.
Intermediaries Legal representatives workgroup to be created which does away with requiring a
notice to gain data.
Access can be monitored and given to select group of personnel within the law enforcement.
CrPC should be followed for bailability of offences.
Power should be given to law enforcement to request to take down data immediately.
12