Part 4 of 5

Electronic Evidence Presentation

Master BSA Section 63 compliance, certificate requirements, forensic report presentation, and effectively handling objections to electronic evidence in court proceedings.

BSA Section 63: The Cornerstone

Section 63 of the Bharatiya Sakshya Adhiniyam (BSA) is the successor to Section 65B of the Indian Evidence Act. It governs the admissibility of electronic records as evidence and is crucial for any litigation involving digital evidence.

Section 63(1): Basic Admissibility

Electronic records are admissible as evidence of their contents if the conditions in sub-section (2) are satisfied regarding the computer output containing the information.

Section 63(2): Conditions for Admissibility

The computer output containing the information must satisfy these conditions:

  • (a) The information was produced by the computer during the period it was used regularly for similar activities
  • (b) During that period, information of the kind contained was regularly supplied to the computer in the ordinary course
  • (c) The computer was operating properly during that period, or if not, the malfunction did not affect the accuracy of the information
  • (d) The information reproduces or is derived from information supplied to the computer in the ordinary course

Landmark: Anvar P.V. v. P.K. Basheer (2014)

The Supreme Court held that Section 65B(4) certificate is mandatory for electronic evidence. Without it, secondary electronic evidence is inadmissible. This overruled earlier decisions that allowed flexibility.

Key Holding: "The evidence relating to electronic record...can be proved only in accordance with the procedure prescribed under Section 65B."

The Section 63(4) Certificate

The Section 63(4) Certificate (formerly 65B(4)) is mandatory for electronic evidence that is a computer output (printout, copy, etc.) rather than the original device itself.

Who Can Sign the Certificate?

  • Person occupying a responsible official position in relation to the operation of the device
  • Person occupying a responsible official position in relation to the management of the relevant activities
  • Not necessarily the creator of the record, but someone with knowledge of the system

Contents of the Certificate

Mandatory Certificate Elements

1. Identification of the electronic record and manner of production

2. Statement of the device used to produce the output

3. Description of the relevant activities conducted using the computer

4. Statement regarding computer functioning and accuracy

5. Details of the person giving the certificate and their position

6. Signature and date

Arjun Panditrao v. Kailash Bandhu (2020)

The Supreme Court clarified that:

- Certificate can be produced at any stage before judgment

- Courts can allow deficient certificates to be rectified

- Person signing need not be the creator of the record

- Original device production can substitute for certificate

Types of Electronic Evidence

Evidence Categories and Requirements

Evidence Type S.63 Certificate Additional Requirements
Email printouts Required Server logs, header analysis
Social media screenshots Required Platform records, metadata
CCTV footage (copy) Required DVR certificate, chain of custody
WhatsApp chats Required Device certificate, backup data
Bank statements (electronic) Required Banker's certificate under BSA
Original phone/computer Not required Seizure memo, forensic report

Forensic Reports

Digital forensic reports are crucial for authenticating electronic evidence and establishing its integrity.

Components of Forensic Report

  • Device Information: Make, model, serial number, IMEI
  • Acquisition Details: Date, time, method used, tools employed
  • Hash Values: MD5/SHA-256 hash before and after analysis
  • Chain of Custody: Complete handling record from seizure
  • Findings: Extracted data, deleted files recovery, metadata analysis
  • Expert Opinion: Conclusions and interpretations

Hash Values: Integrity Verification

Hash values (MD5, SHA-1, SHA-256) are digital fingerprints that prove evidence has not been tampered with. Key points:

  • Hash calculated at time of acquisition
  • Same hash must match throughout chain of custody
  • Any modification changes the hash completely
  • Defense can verify by re-hashing the evidence

Hash Verification Example

Original Hash (at seizure): a7f3e2b1c9d8e0f4...

Hash at Lab Receipt: a7f3e2b1c9d8e0f4...

Hash at Court Production: a7f3e2b1c9d8e0f4...

Matching hashes prove integrity throughout the chain.

Presenting Electronic Evidence

Step-by-Step Presentation

  1. Foundation: Establish the source and nature of electronic evidence
  2. Authentication: Produce Section 63 certificate or original device
  3. Chain of Custody: Demonstrate unbroken custody chain
  4. Integrity: Present hash verification and forensic report
  5. Relevance: Connect evidence to facts in issue
  6. Examination: Have witness explain technical aspects if needed

Using Technology in Court

  • Screen Sharing: Display electronic evidence on court screen
  • Metadata Demonstration: Show file properties, timestamps
  • Video Playback: CCTV footage with timestamp overlay
  • Document Comparison: Side-by-side original and printout

Handling Objections

Common objections to electronic evidence and how to counter them:

Common Objections

1. "No Section 63 Certificate" - Request time to file certificate (Arjun Panditrao allows this)

2. "Certificate deficient" - Seek opportunity to rectify deficiencies

3. "Evidence tampered" - Produce matching hash values and forensic report

4. "No proper chain of custody" - Present seizure memo and custody records

5. "Hearsay" - Electronic record is not hearsay if properly certified

Defense Strategies

When opposing electronic evidence:

  • Scrutinize certificate - is signatory competent and properly identified?
  • Challenge chain of custody - any gaps or unauthorized access?
  • Request hash verification - were hashes calculated at every transfer?
  • Question forensic methodology - was proper procedure followed?
  • Examine metadata - are timestamps consistent with claims?
  • Challenge authenticity - could the evidence have been fabricated?

Special Evidence Types

Social Media Evidence

  • Screenshot alone is insufficient - need platform records
  • Account authentication - prove ownership of account
  • URL preservation - record actual URLs, not shortened links
  • Archive services (archive.org) may support claims

WhatsApp/Messaging Evidence

  • Device from which messages extracted needed, or
  • Backup data with proper certificate
  • End-to-end encryption affects prosecution access
  • Recipient's device can corroborate sender's messages

Website Content

  • Wayback Machine (archive.org) can show historical content
  • Domain WHOIS records for ownership
  • Web hosting records through proper legal process
  • Certified printout with timestamp and URL

Key Takeaways

1. Section 63(4) certificate is mandatory for secondary electronic evidence

2. Certificate can be filed at any stage before judgment (Arjun Panditrao)

3. Hash values are the gold standard for proving evidence integrity

4. Original device production can substitute for certificate requirement

5. Always maintain and document complete chain of custody