BSA Section 63: The Cornerstone
Section 63 of the Bharatiya Sakshya Adhiniyam (BSA) is the successor to Section 65B of the Indian Evidence Act. It governs the admissibility of electronic records as evidence and is crucial for any litigation involving digital evidence.
Section 63(1): Basic Admissibility
Electronic records are admissible as evidence of their contents if the conditions in sub-section (2) are satisfied regarding the computer output containing the information.
Section 63(2): Conditions for Admissibility
The computer output containing the information must satisfy these conditions:
- (a) The information was produced by the computer during the period it was used regularly for similar activities
- (b) During that period, information of the kind contained was regularly supplied to the computer in the ordinary course
- (c) The computer was operating properly during that period, or if not, the malfunction did not affect the accuracy of the information
- (d) The information reproduces or is derived from information supplied to the computer in the ordinary course
Landmark: Anvar P.V. v. P.K. Basheer (2014)
The Supreme Court held that Section 65B(4) certificate is mandatory for electronic evidence. Without it, secondary electronic evidence is inadmissible. This overruled earlier decisions that allowed flexibility.
Key Holding: "The evidence relating to electronic record...can be proved only in accordance with the procedure prescribed under Section 65B."
The Section 63(4) Certificate
The Section 63(4) Certificate (formerly 65B(4)) is mandatory for electronic evidence that is a computer output (printout, copy, etc.) rather than the original device itself.
Who Can Sign the Certificate?
- Person occupying a responsible official position in relation to the operation of the device
- Person occupying a responsible official position in relation to the management of the relevant activities
- Not necessarily the creator of the record, but someone with knowledge of the system
Contents of the Certificate
Mandatory Certificate Elements
1. Identification of the electronic record and manner of production
2. Statement of the device used to produce the output
3. Description of the relevant activities conducted using the computer
4. Statement regarding computer functioning and accuracy
5. Details of the person giving the certificate and their position
6. Signature and date
Arjun Panditrao v. Kailash Bandhu (2020)
The Supreme Court clarified that:
- Certificate can be produced at any stage before judgment
- Courts can allow deficient certificates to be rectified
- Person signing need not be the creator of the record
- Original device production can substitute for certificate
Types of Electronic Evidence
Evidence Categories and Requirements
| Evidence Type | S.63 Certificate | Additional Requirements |
|---|---|---|
| Email printouts | Required | Server logs, header analysis |
| Social media screenshots | Required | Platform records, metadata |
| CCTV footage (copy) | Required | DVR certificate, chain of custody |
| WhatsApp chats | Required | Device certificate, backup data |
| Bank statements (electronic) | Required | Banker's certificate under BSA |
| Original phone/computer | Not required | Seizure memo, forensic report |
Forensic Reports
Digital forensic reports are crucial for authenticating electronic evidence and establishing its integrity.
Components of Forensic Report
- Device Information: Make, model, serial number, IMEI
- Acquisition Details: Date, time, method used, tools employed
- Hash Values: MD5/SHA-256 hash before and after analysis
- Chain of Custody: Complete handling record from seizure
- Findings: Extracted data, deleted files recovery, metadata analysis
- Expert Opinion: Conclusions and interpretations
Hash Values: Integrity Verification
Hash values (MD5, SHA-1, SHA-256) are digital fingerprints that prove evidence has not been tampered with. Key points:
- Hash calculated at time of acquisition
- Same hash must match throughout chain of custody
- Any modification changes the hash completely
- Defense can verify by re-hashing the evidence
Hash Verification Example
Original Hash (at seizure): a7f3e2b1c9d8e0f4...
Hash at Lab Receipt: a7f3e2b1c9d8e0f4...
Hash at Court Production: a7f3e2b1c9d8e0f4...
Matching hashes prove integrity throughout the chain.
Presenting Electronic Evidence
Step-by-Step Presentation
- Foundation: Establish the source and nature of electronic evidence
- Authentication: Produce Section 63 certificate or original device
- Chain of Custody: Demonstrate unbroken custody chain
- Integrity: Present hash verification and forensic report
- Relevance: Connect evidence to facts in issue
- Examination: Have witness explain technical aspects if needed
Using Technology in Court
- Screen Sharing: Display electronic evidence on court screen
- Metadata Demonstration: Show file properties, timestamps
- Video Playback: CCTV footage with timestamp overlay
- Document Comparison: Side-by-side original and printout
Handling Objections
Common objections to electronic evidence and how to counter them:
Common Objections
1. "No Section 63 Certificate" - Request time to file certificate (Arjun Panditrao allows this)
2. "Certificate deficient" - Seek opportunity to rectify deficiencies
3. "Evidence tampered" - Produce matching hash values and forensic report
4. "No proper chain of custody" - Present seizure memo and custody records
5. "Hearsay" - Electronic record is not hearsay if properly certified
Defense Strategies
When opposing electronic evidence:
- Scrutinize certificate - is signatory competent and properly identified?
- Challenge chain of custody - any gaps or unauthorized access?
- Request hash verification - were hashes calculated at every transfer?
- Question forensic methodology - was proper procedure followed?
- Examine metadata - are timestamps consistent with claims?
- Challenge authenticity - could the evidence have been fabricated?
Special Evidence Types
Social Media Evidence
- Screenshot alone is insufficient - need platform records
- Account authentication - prove ownership of account
- URL preservation - record actual URLs, not shortened links
- Archive services (archive.org) may support claims
WhatsApp/Messaging Evidence
- Device from which messages extracted needed, or
- Backup data with proper certificate
- End-to-end encryption affects prosecution access
- Recipient's device can corroborate sender's messages
Website Content
- Wayback Machine (archive.org) can show historical content
- Domain WHOIS records for ownership
- Web hosting records through proper legal process
- Certified printout with timestamp and URL
Key Takeaways
1. Section 63(4) certificate is mandatory for secondary electronic evidence
2. Certificate can be filed at any stage before judgment (Arjun Panditrao)
3. Hash values are the gold standard for proving evidence integrity
4. Original device production can substitute for certificate requirement
5. Always maintain and document complete chain of custody