Here’s a high‑readability, SEO‑optimized, long‑form legal blog in English on “Electronic Evidence | Legal Knowledge | By Expert Vakil”, tailored for a legal‑journalism audience in India, along with SEO metadata and alt text.


Suggested SEO metadata

SEO Key Phrase:
Electronic Evidence in India

Slug:
electronic-evidence-legal-knowledge-india

Meta Keywords:
Electronic evidence India, Section 65B Indian Evidence Act, digital evidence, admissibility of electronic records, IT Act 2000, electronic evidence certificate, Indian courts electronic evidence

Meta Small Keywords:
electronic evidence, digital evidence, Section 65B, evidence law India

Meta Description (under 150 characters):
What is electronic evidence in India? How is it admitted in court? A practical guide to Section 65B, certificates, and landmark judgments.

Alt text:
Illustration of electronic evidence on a computer screen with legal gavel and document icons

OG Title Rewrite:
Electronic Evidence in India: Section 65B, Admissibility & Practical Guide for Lawyers


In the age of smartphones, surveillance footage, emails, WhatsApp chats, and cloud‑stored files, the courtroom is no longer a place of paper alone. Today, electronic evidence shapes outcomes in criminal trials, matrimonial disputes, commercial litigation, and white‑collar crime cases. For a trial‑lawyer, a journalist, or a curious citizen, understanding how an email or a CCTV clip becomes legally “evidence” is no longer optional—it is essential.

This article breaks down electronic evidence in India in plain, practice‑oriented English, grounded in the Indian Evidence Act, 1872, the Information Technology Act, 2000, and key Supreme Court rulings.


What is electronic evidence under Indian law?

Under the Indian Evidence Act, 1872, “evidence” includes all documents, and, after the 2000 amendment, also electronic records.

  • An electronic record is any information generated, sent, received, stored, or recorded in an electronic, optical, or magnetic form—such as emails, WhatsApp messages, call‑logs, CCTV footage, GPS data, data from servers, or even cloud‑stored files.
  • The Information Technology Act, 2000 treats electronic records as equivalent to paper documents when they are “secure electronic records” and meet basic standards of reliability and authenticity.

In simple terms: if a piece of information exists in digital form and is relevant to a fact in issue, it qualifies as electronic evidence, provided it satisfies legal conditions for admissibility.


Key provisions: Section 65A and Section 65B

The admissibility of electronic evidence in India hinges mainly on Section 65A and Section 65B of the Indian Evidence Act.

  • Section 65A states that the contents of electronic records can be proved under the provisions of Section 65B. In effect, this makes electronic records a special category of documentary evidence.
  • Section 65B creates a self‑contained code for when electronic records (printed on paper or stored on optical/magnetic media) can be admitted as evidence without producing the original file or device.

This means that, for most secondary‑form electronic evidence (printouts, CDs, pen‑drives, etc.), courts now look first at Section 65B, not at the older documentary‑evidence rules under Sections 63–65.


Section 65B: Conditions for admissibility

Section 65B lists specific conditions that must be met before an electronic record is treated as admissible.

Broadly, for a printed‑out or copied electronic record to be admissible:

  1. The computer from which the record was produced must have been used regularly for the kind of work for which the record was created.
  2. Information must have been regularly fed into the computer in the ordinary course of that activity.
  3. The computer must have been functioning properly during the relevant period, so that improper functioning would not affect the accuracy of the record.
  4. The content of the record must have been derived from information fed into the computer in the ordinary course of that activity.

If these conditions are met, the printed‑out or copied record (e.g., a print‑out from a server log, a CCTV still, or a PDF of a digital file) can be admitted as evidence of its contents, even without bringing the original machine or file to court.


The mandatory 65B certificate

The most practical hurdle for lawyers and litigants is the Section 65B(4) certificate.

  • When a party wants to rely on an electronic record in secondary form (CD, pen‑drive, print‑out, etc.), it must produce a written certificate along with the record.
  • The certificate must:
    • Identify the electronic record and describe how it was produced.
    • Provide particulars of the device by which it was produced.
    • Confirm that the record was produced by a computer that was used regularly for that kind of work.
  • The certificate must be signed by a person who occupies a responsible official position in relation to the operation of the relevant device or the management of the relevant activities (for instance, a senior IT official, system administrator, or custodian of the server).

Landmark judgments such as Anvar P.V. v. P.K. Basheer have clarified that Section 65B is a complete code for electronic evidence: if secondary‑form electronic evidence is relied upon, the certificate under Section 65B(4) is mandatory, not optional.


Primary vs secondary electronic evidence

Not all electronic evidence is equal in the eyes of the law. Courts distinguish between primary and secondary electronic evidence.

  • Primary electronic evidence means the original electronic record as it exists in its native form (for example, the original file on a phone, server, or cloud storage).
  • Secondary electronic evidence is a copy, print‑out, or reproduction (CD, pen‑drive, paper print‑out, JPEG, etc.).

The Supreme Court has held that if the original electronic record is produced as such, it can be admitted as primary evidence under Section 62, and Section 65B certificate is not required for that original record.

However, in practice, because original devices are bulky, part of a network, or technically complex, courts usually deal with secondary electronic evidence—which is why the 65B certificate is so frequently contested at trial.


Practical challenges in real‑world trials

For lawyers and investigators, electronic evidence is both powerful and fragile.

  • Chain of custody and preservation matter: if a phone or hard‑drive is seized from a suspect, the seizure memo, labels, and handling log must clearly show how the device was kept secure and uncoupled from unauthorized access.
  • Authentication is often hotly contested: the accused may argue that the WhatsApp chat or CCTV clip is fabricatededited, or lacked proper chain of custody. Courts then look at metadata, timestamps, digital signatures, and corroborating evidence (for example, call‑logs, tower data, or witness testimony).
  • Incomplete or missing 65B certificate can lead to electronic evidence being rejected altogether, even if the accused clearly used the device in question.

In many criminal‑appeal decisions, appellate courts have overturned convictions where the prosecution failed to produce a compliant Section 65B certificate for CDs or pen‑drives containing vital evidence.

Electronic Evidence in India

IT Act and electronic governance

The Information Technology Act, 2000 underpins the status of electronic records in India.

  • The Act treats electronic records as capable of legal recognition, including for contracts, powers‑of‑attorney, and government records, provided they meet specified standards (such as secure electronic records and use of digital signatures).
  • For evidence purposes, the IT Act and the Evidence Act work together: the IT Act accepts electronic records as legally valid, while the Evidence Act (via Sections 65A and 65B) sets the conditions for their admissibility in court.

This dual‑framework explains why a scanned contract may be binding in business, but its print‑out can still be challenged in court if the proponent does not satisfy Section 65B requirements.


Landmark judgments shaping electronic evidence

Over the last two decades, several Supreme Court decisions have crystallized how electronic evidence is treated.

  • Anvar P.V. v. P.K. Basheer (2014): The Court held that Sections 65A and 65B form a complete code for electronic evidence. If secondary‑form electronic evidence (like a CD or pen‑drive) is used, a Section 65B(4) certificate is mandatory and cannot be bypassed through general documentary‑evidence rules.
  • Subsequent rulings have reaffirmed that oral evidence cannot substitute for the 65B certificate and that courts must be strict about compliance, especially where the accused’s liberty is at stake.

These decisions have forced investigators, police, and litigants to treat electronic‑evidence collection as a technical‑legal process, not as a mere “copy‑paste” exercise.


Dos and don’ts for lawyers and journalists

For lawyersinvestigators, and media professionals covering electronic‑evidence‑based cases, clarity about procedure is key.

Dos:

  • At the investigation stage, ensure that every seized device is properly labelled, sealed, and logged with a clear chain‑of‑custody record.
  • When producing electronic evidence in court, decide in advance whether you are relying on the original record (Section 62) or secondary forms (Sections 65A–65B), and secure the 65B certificate accordingly.
  • For journalists, explain in simple language what the evidence is (for example, “WhatsApp chat screenshots”), how it was obtained, and whether a 65B certificate was produced, rather than merely quoting “digital evidence was admitted.”

Don’ts:

  • Do not assume that a print‑out or CD is automatically admissible just because it shows a confession or transaction; the certificate requirement can still trip you.
  • Do not treat all electronic evidence as irrefutable; courts still scrutinize credibility, authenticity, and context, especially when metadata is absent or tampering is alleged.

Post a comment

Your email address will not be published.

Related Posts