SlideShare a Scribd company logo
1 of 20
Download to read offline
NATIONAL LAW SCHOOL OF INDIA UNIVERSITY
BANGALORE

PROJECT ON

“ELECTRONIC EVIDENCE”
SUBJECT: E-commerce & IT law
TRIMESTER-IV
2013-14

UNDER THE SUPERVISION OF

Prof. S.B.N. Prakash
National Law School of India University, Bangalore

SUBMITTED BY:-Ronak Karanpuria
LL.M. (Business Law)
Student ID No.: 534

1
Acknowledgement

I express my deep sense of obligation and gratitude to Prof. S.B.N.Prakash, National Law
School of India University, Bangalore, for his invaluable guidance and persistent
encouragement in the preparation of this project work.
I am deeply indebted to all the Indian and foreign writers and judges whose writings and
decisions have been duly cited in this work and have given me inspiration and light during
preparation of this work.

2
RESEARCH METHODOLOGY
 Aim and Objective
The Aim of the research paper is to determine the scope of “Electronic Evidence” w.r.t.
modern digital environment.
 Research Question
The researcher will address electronic evidence in context with its relevance,
authenticity, hearsay, originality or duplicate documentation, and unfair
prejudice about its admissibility in normal court procedure.

 Research Methodology
In this paper the researcher has primarily used descriptive and analytical methodology
of research. The researcher mainly relied upon the secondary sources which include
books, Reports, Journal, magazines, online articles and legal databases.
 Scope
The scope of this paper is to find out the legal aspects of electronic evidence
 Limitation.
The field study would have been desirable but due to paucity of time this paper is
limited only to the theoretical aspect of electronic evidence which have been gathered
from various sources including books, articles, and journals.
 Sources
In this paper various secondary source have used by the research student in the form of
books, article from various journals and also internet sources have been used.
 Mode of Citation
A Uniform mode of citation is followed throughout this paper.

3
TABLE OF CONTENT

S.NO.

PARTICULARS

PAGE NO.

1

INTRODUCTION

5

2

TYPES OF ELECTRONIC EVIDENCE

6

3

ASSESSING ELECTRONIC EVIDENCE

7

4

9

4

TECHNO-LEGAL
PREREQUISITES
FOR
ELECTRONIC
EVIDENCE
A. Recognition Of Electronic Record
B. Recognition Of Digital Signature
C. Retention Of Electronic Record
ELECTRONIC EVIDENCE : ADMISSIBILITY

12

5

CLOUD COMPUTING

17

6

CONCLUSION

19

7

BIBLIOGRAPHY

20

4
Introduction
The court proceedings and the judicial system is based on the facts and the evidence
as produced before courts. Even in the era of kings and rulers, when any matter laid
before them each party were insisted to have proceed with facts and evidence they
have to prove their allegations or strategy. Same analogy has been adopted by
Panchayats & courts although with care and caution due to high technological
advancement, with this aspects one has to see the rights of individual, rights of victim,
admissibility of evidence and to support & strengthen the coordination and
cooperation between investigating and prosecution and to prevent miscarriage of
justice. However, with the advent of new technologies, regulatory agencies are
increasingly harnessing the power of digital technologies to meet the informational
demands of rulemaking and to expand public involvement in policymaking.
Governments are increasingly adopting technological means, shifting from walls to
webs.1
With the advancement, evidence although primarily of two types: oral &
documentary with a new form annexed i.e. electronic evidence, court & lawyers has
to adhere caution while dealing with electronic evidence2 due to the intricacy &
technicality involved, which needed a experts to determine the correctness of data.
While the admissibility of electronic evidence is big issue before courts.
With globalisation & internet age, people are sharing resources, google, facebook, to
kindle and different business gadgets etc. knowledge and data are the key business
assets, to be developed and protected and transaction in seconds from one place to
another where everything on paper is not possible, with technology data security is a
crucial issue, electronic data flows from one part of the world to another i.e. cross
borders, passing different law jurisdiction involving different internet and privacy

1

Thomas Friedman, The Lexus & The Olive Tree: Understanding Globalization 39-58 (1999)
As a general rule, "electronic evidence" can be any information created or stored in digital form
whenever a computer is used to accomplish a task. As this broad definition suggests, electronic
evidence may exist whenever a person enters information into a computer, a computer generates
information in response to a request by an operator, or a computer uses or processes information.
Electronic evidence, therefore, may include information databases, operating systems, applications
programs, "computer-generated models", electronic and voice mail messages and records, and other
information or "instructions residing in computer memory.
2

5
issues, it is necessary to have proper inquiry and understanding of technology and
also proper law to keep in check of the crimes committed by this technology.

Type of Electronic evidence
As a general rule, "electronic evidence" can be any information created or stored in
digital form whenever a computer is used to accomplish a task Forms of electronic
evidence3. Email, Word processor, Electronic Spreadsheet files, Relational database
(record) file, Software source code, Various image files (.tiff, .jpeg), Web browser
bookmarks / cookies / cache Memory, Calendar; to-do-list, contact list, Voice mail.
Electronic evidence is a burning issue mainly due to the high-value fraud, industrial
espionage, defamation, theft of intellectual property, software counterfeiting and
piracy, disputes over software ownership, regulatory disputes, solicitors’ disciplinary
proceedings, and global computer misuse, and phishing, theft of trade secrets,
defamation and state corruption. Then in case, whether an electronic transaction has
taken place or an event within cyberspace has occurred is to be known or alternatively,
can you prove that they cannot have happened? A critical feature of the vast majority
of computer systems is the ability to produce evidence. Computer or electronic
devices has been common place of court battle for electronic evidence.4 People
routinely use computers, particularly e-mail, to send draft, informal, or "uncensored"
messages they would never "put in writing." As a result, computerized records often
contain insights into "corporate knowledge and behavior" and "off-the-cuff' remarks
that people would never record on paper. Such remarks are often damaging in
litigation.5
Where litigation or criminal prosecution is in prospect there is a further requirement
on those who run or own computers: the need to identify and preserve digital material

3

See, e.g., Susan E. Davis, Elementary Discovery, My Dear Watson, CAL. LAW., Mar. 1996, at 53, 53
(discussing different forms of electronic evidence);
4 Bills v. Kennecott Corp., 108 F.R.D. 459, 462 (D. Utah 1985).
5 See, e.g., Anthony J. Dreyer, Note, When The Postman Beeps Twice: The Admissibility of Electronic
Mail Under The Business Records Exception of The Federal Rules of Evidence, 64 FORDHAM L. REV.
2285, 2289 (1996)

6
which the legal system says should be disclosed to opponents in civil litigation and to
defendants accused of crimes.
An important question raised is why evidence required at all, mainly due to wide
range of commercial activities going on around the world, for example in disputed
transactions, in allegations of employee misbehaviour, to show compliance with legal
and regulatory rules, to avoid charges of negligence or breach of contract, to assist law
enforcement in criminal and anti-terrorist investigations, to meet disclosure
requirements in civil claims, to support insurance claims after a loss.
Due to the fact that electronic evidence or mainly digital evidence is highly volatile
and easily compromised by poor handling, chances of success in litigation heavily
depends on the weight of the evidence supported by relevant facts.
Effective combating of cybercrimes requires prompt discovery, safe custody and
present in acceptable form in a court, as the number of criminals uses computers,
laptops, network servers and cellular phones in commission of their crimes is
increasing alarmingly.

Assessing Electronic Evidence
Electronic evidence is mainly information or data of investigative value that is stored
on or transmitted by an electronic device6.
According to Black's law dictionary, evidence is "any species of proof, or probative matter,
legally presented at the trial of an issue, by the act of parties and through the medium of
witnesses, records, documents, exhibits, concrete objects, etc. for the purpose of inducing belief
in the minds of the court or jury as their contention."
As a general rule, "electronic evidence" can be any information created or stored in digital
form that is relevant to a case. This includes, but is not limited to, emails, text documents,
spreadsheets, images and graphics, database files, deleted files, and data back-ups. Electronic
evidence may be located on floppy disks, zip disks, hard drives, tape drives, CD-ROMs or
DVDs, as well as portable electronic devices such as PDAs and cellular phones.7

6
7

http://www.nij.gov/topics/forensics/evidence/digital/digital-glossary.htm
http://www.setecinvestigations.com/resources/faqs.php

7
Electronic evidence in criminal and civil proceedings is problematic, any contract
which is concluded by affixing electronic signatures is electronic agreement8 and
admissible9 in court but presumption10 regarding person cannot be setout. Mindful of
emerging new technologies, it is essential to consider the nature and some of the
special characteristics of electronic evidence that raise legitimate concerns about its
accuracy and authenticity. Now that formal conditions to the admissibility of
electronic evidence have been removed11, the increasing complexity and
sophistication of rapidly-developing technology necessitates a shift from concerns
about exclusion and admissibility subject to overly-technical requirements towards a
more precise focus on issues relevant to establishing authenticity and suitable weight
for the evidence which it generates.
The main characteristic of electronic record12 it about its intangibility and which raise
concerns about the accuracy and authenticity, where transient nature of data, difficult
to store, copy, create and easy to manipulate and easy to be modified and tampered
raise several issues in court about its veracity and even slightest distortion can create
problem in investigation and extremely vulnerable to claims, errors and fabrication.

8

Section 84A of the Evidence Act provides for the presumption that a contract has been concluded
where the parties' digital signatures are affixed to an electronic record that purports to be an agreement
9 Section 85B of the Evidence Act provides that where a security procedure has been applied to an
electronic record at a specific time, the record is deemed to be a secure electronic record from such
time until the time of verification. Unless the contrary is proved, the court is to presume that a secure
electronic record has not been altered since obtaining secure status. The provisions relating to a secure
digital signature are set out in Section 15 of the IT Act. A secure digital signature is a digital signature
which, by application of a security procedure agreed by the parties at the time that it was affixed, is:
• unique to the subscriber affixing it;
• capable of identifying such subscriber; and
• created by a means under the exclusive control of the subscriber and linked to the electronic record
to which it relates in such a manner that if the electronic record as altered, the digital signature would
be invalidated.
10 Under the provisions of Section 88A, it is presumed that an electronic message forwarded by a sender
through an electronic mail server to an addressee corresponds with the message fed into the sender's
computer for transmission. However, there is no presumption regarding the person who sent the
message. This provision presumes only the authenticity of the electronic message and not the sender
of the message.
11 Section 65-A, 65-B (Admissibility of Electronic Records)
12 "electronic record" means data, record or data generated, image or sound stored, received or sent in
an electronic form or micro film or computer generated micro fiche

8
Techno-Legal Prerequisites for Electronic Evidence
A. Recognition of Electronic Records
The purpose of the various electronic commerce statutes can briefly be stated as
creating legal recognition for electronic records, electronic signatures, and electronic
contracts and ensuring that the medium in which a record, signature, or contract is
created, presented or retained does not affect its legal significance.13 Section 4 sets
forth the fundamental premise of the ITA, namely that the medium in which a record,
signature, or contract is created, presented or retained does not affect its legal
significance because the substantive law governing the underlying transaction may
require non-electronic records or signatures. The section achieves its purposes by
simply overriding the substantive law on these requirements. The aforementioned
section contains two prerequisites before legal recognition may be imparted to
electronic records. These prerequisites are: (a) rendered or made available in an
electronic form, and (b) accessible to be used for a subsequent reference. The first
requirement is fulfilled when the electronic record is within the meaning of section
2(1)(r) of the ITA. The second requirement is satisfied when the record is catalogued
or made available. The rationale behind the second requirement is that electronic data
is intangible and by its very nature transient, thus it is expedient to require it to be
available for future reference. The aforementioned section is in pari materia with a
provision of the Uniform Electronic Transactions Act14. It simply mandates that courts
recognize the legitimacy of electronic signatures when considering whether the
requirement of a signed writing has been met. In the case of Orissa Consumers
Association v. Orissa Electricity Regulatory Commission15, the Orissa High Court
considered the legal recognition of records as per the ITA and stated that the
requirements of publication contained in the Orissa Electricity Regulatory
Commission (Terms and Conditions for Determination of Tariff for Retail Sale of
Electricity) Regulations, The court noted that the publication of the draft Regulations

13

Henry D. Gabriel, The Fear Of The Unknown: The Need To Provide Special Procedural Protections
In International Electronic Commerce, 50 LoY. L. REv. 307, 310 (2004).
14

Uniform Electronic Transactions Act Section 7 (Nat'l Conference of Comm'rs on Unif. State Laws
1999) (U.S.) [hereinafter UETA].
15 AIR 2005 Ori 11

9
by putting the same in the website of the Commission would be a publication of the
draft Regulations within the meaning of Section 23 of the Central General Clauses Act,
1897.

B. Recognition Of Digital Signatures
Section 5 chooses a technology-based approach promoting a highly regulatory and
prescriptive standard, granting functional equivalence only to digital signatures.
Section 5 applies the same principle as adopted by the preceding section, granting
legal recognition to digital signatures where statutes require when any matter or
document requires authentication by affixing a signature. The explanation to the
section couches the term "signature” in a plenary context, including its grammatical
and cognate expressions. The prerequisites which must be satisfied for the application
of the section are: (a) a law should require that information, matter or document shall
be signed or bear the signature of a person, (b) a digital signature is affixed in place of
such signature, and (c) the digital signature is affixed in a manner prescribed by the
central government. Take the illustration of the Bureau of Indian Standards Act,
198616, which provides that the authentication of orders and other instruments
issued by the Bureau shall be authenticated by the signature of such officer or officers
as may be authorised by the Bureau in this behalf Thus if the Bureau decides to affix
a digital signature to its orders the mere factum that the statute from which it derives
its power does not expressly provide for affixing a digital signature will not impart
any defect to its orders. The draft amendments17, with the objective of technological
neutrality, suggest substituting the term "digital" with "electronic". The amendments
also make provisions to ensure that the electronic signature affixed is reliable. There
is a proposition to add another sub-section, which prescribes the minimum standards
of reliability. The proposed standards are: (a) the electronic data in relation to which
the Electronic Signature is affixed is linked to the signatory and to no others, (b) the
Electronic Signature creation code given is unique to the signatory, and (c) any

16

The Bureau of Indian Standards Act, ch. VII, §36 (1986) (India) available at
http://www.bis.org.in/bs/bisact.htm
17 Expert Committee on Review of the IT Act 2000, Report of the Expert Committee: Full Text (Proposed
Aug. 29, 2005), available at http://www.mit.gov.in/itact2OOO/ITAct.doc [hereinafter Proposed
Amendments to IT Act 2000].

10
alteration to the Electronic Signature or to the electronic data in relation to which the
signature is affixed made after the time of signing is detectable. The comments to this
sub-section specify that they are being added to define the reliability of Electronic
Signatures and to allow only those technologies which conform to those conditions
in line with UNICITRAL Model Law of Electronic Commerce.

C. Retention Of Electronic Records
A record is any documentary material, regardless of physical form, that has the
following three characteristics:

(a) it is generated or received by [an entity] in

connection with transacting its business or is related to its legal obligations, (b) it is
retained for any period of time, and (c) necessary to be preserved as legal evidence of
the [entity]'s activities or as historical reference18. Records retention is unconcerned
with the genesis of records, but takes up matters after creation. Records retention
principally concerns the retention period: that is, the duration of a record's life.19
Records retention has various objectives which include: (a) maintaining an
institutional policy memory, (b) enhancing the body of knowledge in a factual and
scientific sense, (c) maintaining official records for possible use as evidence in legal
proceedings, (d) promoting efficiency and effectiveness of agency operations, and (d)
increasing the return on investment from information in government records which
has long-term value.20 Governments and business are increasingly relying upon
electronic records. One of the benefits of electronic records is that archiving them is
much more economical than paper. A minimum standard of records retention is
especially important with respect to electronic data since its being intangible
renders it highly susceptible to a partial or complete loss of accessibility, integrity
or/and identification. For example, if data is stored on a Compact Disk Read Only
Memory (CDROM) the reliability and storage life expectancy of the storage media is
secure for at least three to five years, with some estimates reaching as high as twenty

18

PHYLLIS M. LYBARGER, RECORDS RETENTION SCHEDULING 1 (1980).
Richard J. Peltz, Arkansas's Public Records Retention Program: Finding The FOIA S Absent Partner,
28 U. ARK. LITTLE ROCK L. REV. 175, 180 (2006).
20 Henry H. Perritt, Jr., Electronic Records Management & Archives, 53 U. PITT. L. REv. 963, 965
(1992).
19

11
years. Thus it becomes expedient to have minimum policy standards for the retention
of electronic records. The ITA under section 7 sets forth the basic rules regarding the
retention of electronic records. It applies to the retention of records that originally exist
in electronic form, as well as to the electronic retention of records that originally exist
in paper form or on other tangible media.
The section does not prescribe for any specified period for retention of an electronic
record but provides minimum standards for records retention "when any law
provides that documents, records or information shall be retained for any specific
period". These minimum standards are contained in section 7(1) and relate to:
1. Accessibility - Records retention in archives is ineffective unless the archived
records can be accessed. The technical issues with legal implications relating to
accessibility include ease of alteration and physical deterioration. Thus section 7(1)(a)
provides for making records, "accessible so as to be usable for a subsequent reference".
2.

Format Integrity -The integrity of the format in which the information was

originally generated is important because changes in format can affect the material
characteristics of the record. With several versions of software available for
performing the same task, section 7(1)(b) prescribes that, even if there is a change in
format, the electronic record shall be "in a format which can be demonstrated to
represent accurately the information originally generated, sent or received".
3. Identification - It is imperative that any form of record retention must enable
identification. Thus section 7(1)(c) provides for, "the details which will facilitate the
identification of the origin, destination, date and time of dispatch or receipt of such
electronic record are available in the electronic record."

Electronic Evidence: Admissibility
The issue to be addressed is “Relevance”, “authenticity”, “hearsay”, “original or
“duplicate”, “unfair prejudice” in context with electronic stored information (ESI). In
Lorraine21 has been heralded as "an excellent guide to an important aspect of the care
that may be or become necessary when parties attempt to offer electronic information
21

Lorraine v. Markel, 241 F.R.D. 534, 537-38 (D. Md. 2007)

12
into evidence." The case exposes the less-than-acceptable standard of care that at least
part of the legal community is exercising concerning the admission of electronic
evidence. The question in the case was that the parties wanted the court to answer was
whether the arbitrator exceeded his authority by awarding less than the full amount
of a potentially “all or nothing” arbitration agreement, as the parties had negotiated
by e-mail. The court, however, dismissed each party's motions and refused to answer
this question because both parties failed to authenticate as electronic evidence the email they submitted with their motions. The Lorraine court first delineated the basic
rules for the admissibility of all types of electronic evidence, explaining that the
evidence must be: 1) relevant; (2) authenticated; (3) allowable under the hearsay
rules; (4) allowable under the original writing (best evidence) rule; and (5) the
probative value of such evidence cannot be outweighed by any unfair prejudice. The
admissibility issues are important to be analysed to understand the scope of electronic
evidence as Relevancy refers to when one fact is said to be relevant to another when
one is connected to another in such a way which has a direct bearing on the fact in
issue in terms of proved or disproved facts of the case in any of the way as provided
in sec-5-55 of evidence act. Relevant thing or fact make the tendency of other things
either so probable or less probable, however question whether evidence is sufficient
to prove a point is different. In case of electronic evidence, material are of high
quantity, gathering lot of information & to set the relevancy about existence or nonexistence of other data, either occur in same transaction or other, what the cause or
effect of other data, facts or information which are necessary to explain other data
which are difficult in case of information gathering of electronic data.
For example: Mr X. is a business man owing mobile which is password protect, get an
email during business transaction, which he replied about not performing the contract
but email was hacked or lost due to any error, while other party uninformed believes
and continue with the terms of contract. In this case other party filed a suit for
compensation for performing their part of contract, but in the court Mr X. submit their
documents related to electronic transaction, in further inquiry they come to know that
email was lost, such information may be relevant, however if the email was lost it is
difficult to track and evidence gathering is impossible.
13
Electronic records are extremely susceptible to tampering, hiding, or destruction,
images, soft copies, or other documents can be hidden, people with criminal mentality
or try to conceal, sometimes change the extension of files, power failure of system is
the main cause of loss of data, even in case of malicious attack, virus, malware etc.
multiple copies are created and slow down the process. However, with new
hardware/software application, data operated in different form where they cannot be
read, understood or used with the risk of alteration and manipulation.
What happen in case of someone accidently click some sites or links or popups etc. in
that case also your IP address get tracked and in such case prosecution has evidence
to prove that you tracked or clicked on that website, however in rebut one can always
say that there is no evidence that he was using that computer but that depends on case
to case. However representation of data is also an issue, where software convert set of
data into logical form and constructs them in a format that appears to indicate the file
is a complete entity. The file does not exist as it claims to exist on the screen and, in
the same way, the individual components of the ‘file’ are not guaranteed to be
preserved in the manner that will enable the file to be reconstructed over time.22
However electronic data operating in computer even if misplaced, deleted or
corrupted, at least its information embedded in the text or properties in the form of
metadata which may reveal details like title of documents, date of its creation,
location, any changes in the documents etc. are saved in the computer by which
analyst can found the relevancy of documents. Metadata associated with computer
programs, software’s etc. are an important source for authentication but due to fast
changing technology where such information can be embedded easily, court simply
cannot reply on the metadata for such relevancy and it is necessary on the counsel to
use different means to establish the facts.
Best evidence rule here the expression best is used in relative context, deals with the
nature or character of particular evidence, which is considered for the purpose of
arriving at rational conclusion.
Authentication refers to establishing facts like testimony of witness, expert witness
with specimens report, distinctive characteristic like appearance, content, substance,
22

www.justice.gov.za/salrc/ipapers/ip27_pr126_2010.pdf pg 25

14
pattern, public records, self-authentication where electronic document carrying
electronic or digital signature. In "Spy v. Spy" a woman who lost custody of her
children in part because of some horrifying e-mails she supposedly sent to her
husband. She denied sending the e-mails. A forensics exam of the ex-husband’s
computer revealed the test message he had set up to “spoof" his ex-wife by inserting
her address as the sender in e-mails that he was actually writing and sending to
himself. After receiving evidence of the husband's fraud on the court, the judge
awarded custody to the mother. This shows authentication of email or electronic
evidence is not possible i.e. who has actually send those email, at least identification
of device is possible.
Admissibility refers to any proposed facts which is admissible in the court of law, sec136 evidence act empowers judges to decide as to the admissibility of evidence
produced before them. In US, courts have indicated that computer records generally
be admitted as business records if they were kept pursuant to a routine procedure for
motives that tend to assure their accuracy23. The second rule of evidence of computer
records is based on the assumption that they are hearsay evidence24 that when a
computer record contains assertions of a person, whether or not processed by a
computer and is present before the court to prove the matter of fact, then such a record
is hearsay evidence. There are many log files generate by computer and there are not
mere hearsay but concrete evidence of a process or a situation. 25 It is necessary to
define minimum standard for admitting and authenticating electronic evidence.

23

United states v. Salgado, 250 F.3d 438, 452 (6th Circuit 2001)
24 In R. v. Mapara (2005), 251 D.L.R. (4th) 385 at para. 15, [2005] I S.C.R. 358. 349 W.A.C. I.
2009] , the Supreme Court further discussed the principled approach:
The principled approach to the admission of hearsay evidence which has emerged in this Court over
the past two decades attempts to introduce a measure of flexibility into the hearsay rule to avoid
these negative outcomes. Based on the Starr decision, the following framework emerges for
considering the admissibility of hearsay evidence:
(a) Hearsay evidence is presumptively inadmissible unless it falls under an exception to the hearsay
rule. The traditional exceptions to the hearsay rule remain presumptively in place.
(b) A hearsay exception can be challenged to determine whether it is supported by indicia of necessity
and reliability, required by the principled approach. The exception can be modified as necessary to
bring it into compliance.
(c) In "rare cases", evidence falling within an existing exception may be excluded because the indicia
of necessity and reliability are lacking in the particular circumstances of the case.
(d) If hearsay evidence does not fall under a hearsay exception, it may still be admitted if indicia of
reliability and necessity are established on a voir dire.
25 People v. Holowko, 486 N.E. 2d 877, 878-79

15
Judicial decision is varied and mostly depend on case to case basis. In Daubert v.
Merrell Dow Pharmaceuticals, Inc.26 decision describes a four-pronged test to determine
whether science-derived evidence is admissible in U.S. Federal Court. The Daubert
test applies to any scientific procedure used to prepare or uncover evidence and
comprises the following four factors (Daubert, 1993):
• Testing: Can and has the scientific procedure been independently tested?
• Publication: Has the scientific procedure been published and subject to peer review?
• Error rate: Is there a known error rate, or potential to know the error rate, associated
with the use of this scientific procedure?
• Acceptance: Is the scientific procedure generally accepted by the relevant scientific
community?
In St. Luke’s Cataract & Laser Institute, P.A. v. Sanderson27, where the proponent failed
to authenticate printouts of websites obtained from Internet Archive because affiants
lacked personal knowledge of contents of Internet Archive’s website and process, and
in Sun Protection Factory, Inc. v. Tender Corp.28, where the proponent failed to
authenticate printouts of websites because affiant’s statements were hearsay and
websites are not self-authenticating. In Telewizja Polska USA, Inc. v. EchoStar Satellite
Corp.29, in which the Court admitted a website obtained from an Internet Archive
based on affidavit from administrative director for Internet Archive. In State of
Maharashtra v Dr Praful B Desai30 involved the question of whether a witness can be
examined by means of a video conference. The Supreme Court observed that video
conferencing is an advancement of science and technology which permits seeing,
hearing and talking with someone who is not physically present with the same facility
and ease as if they were physically present. The legal requirement for the presence of
the witness does not mean actual physical presence. The court allowed the
examination of a witness through video conferencing and concluded that there is no
reason why the examination of a witness by video conferencing should not be an
essential part of electronic evidence. Admissibility of intercepted telephone calls is
26

509 U.S. 579 (1993)
2006 WL 1320242, at *2 (M.D. Fla. 2006)
28 2005 WL 2484710, at *6 (M.D. Fla. 2005)
29 2004 WL 2367740 (N.D. Ill. 2004)
30 AIR 2003 SC 2053
27

16
another issue which court held that if witness is acquainted with the technology then
such a fact is a relevant fact & it is admissible.31
Unfair prejudice, another issue a matter of concern, what if the data is the hand of an
advocate or professional in the professional capacity where data extraction is difficult
due to privileges32 or it may subject to data protection where no professional be
obliged at any time be permitted unless with his client's express consent to disclose
any communication made to him in the course and for the purpose of his employment
as such as attorney , by or on behalf of his client, or to state the contents or condition
of any document with which he has become acquainted in the course and for
the purpose of his professional employment or to disclose any advice given
by him to his client in the course and for the purpose of such employment.
Such privilege communication if any taken place in electronic form, such material
many be relevant to the fact in issue but is inadmissible in the court.

Cloud Computing
With the advent of new and advanced technology, it become difficult for legal system
to recognise the legal issues involved in accessing such technology. Cloud computing
as the name suggest any service provided online and operated by a third party" or
"services that are controlled by third-parties and accessed over the Internet." That
means everything from webmail (Hotmail, Gmail etc.) to online data storage to
software as a service (SaaS), e.g. Salesforce.com33. There are several legal issues

31

State (NCT of Delhi) v Navjot Sandhu AIR 2005 SC 3820 was an appeal against conviction following
the attack on Parliament on December 13 2001, in which five heavily armed persons entered the
Parliament House Complex and killed nine people, including eight security personnel and one gardener,
and injured 16 people, including 13 security men. This case dealt with the proof and admissibility of
mobile telephone call records. While considering the appeal against the accused for attacking
Parliament, a submission was made on behalf of the accused that no reliance could be placed on the
mobile telephone call records, because the prosecution had failed to produce the relevant certificate
under Section 65B(4) of the Evidence Act. The Supreme Court concluded that a cross-examination of
the competent witness acquainted with the functioning of the computer during the relevant time and the
manner in which the printouts of the call records were taken was sufficient to prove the call records
32 Sec – 126, 127, 128 Evidence act, 1872 : Professional communication
33 http://www.infolawgroup.com/2010/10/articles/breach-notice/legal-implications-of-cloud-computingpart-five-ethics-or-why-all-lawyers-not-just-technogeek-lawyers-like-me-should-care-about-datasecurity

17
involved in cloud computing service like who owns the data that is collected,
generated & processed by the service, legal requirement for encrypted data,
jurisdictional problem as service may be provided cross border, consumer rights, what
might be the essential disclosure, in relation to admissibility in court how court might
interpret the criteria of standard disclosure, about the integrity & completeness of
documents be proved. As multiple layers of data34 are generated which are managed
by cloud provider & such electronic stored information may not be in possession or
control of litigant. The Williams v. Sprint/United Management Co.35 court held that “the
producing party should produce the electronic documents with their metadata
intact.” A party may move for a protective order when asked to produce metadata if
it is “not reasonably accessible” and will result in “undue burden and cost.”
As common metadata may be readily accessible without undue burden or cost
because it is stored in a common repository, yet its discovery may harm other clients.
However parties has always an opportunity to seek injunction to protect metadata
from disclosure otherwise the discovery will reveal the common metadata disclosing
third parties information which may violate privacy laws.

See “Electronic Discovery in the Cloud” The data layers may include client-specific data, clientspecific metadata, and metadata common to several clients, which may be unique to an application,
generated by multiple clients, or stored in a shared repository. Common metadata may be maintained
in repositories shared between clients, which makes it a “major problem” to “isolate [that] data and
maintain the security.” Therefore, that data may not be in the custody or control of a litigant, and thus
not subject to discovery. Consequently, applying the Rules to a Cloud may create liabilities for clients
of a Cloud and loopholes for litigants possession.
http://scholarship.law.duke.edu/cgi/viewcontent.cgi?article=1222&context=dltr
35 230 F.R.D. 640 (D. Kan. 2005).
34

18
Conclusion
With the rapid growth of computers, influence of information technology & ability to
store information in electronic form, required law to be amended which allows
admissibility of electronic records because of the characteristic of evidence - its
volume, durability, transient nature, and ease of transmission and manipulation by
users-make it a critical source of information. But when you convert an electronic
document to paper, you lose valuable information found within its metadata, the
evidence from its "best evidence" original form into a version that might need
secondary evidence to justify its admission.

Further, the metadata attached to electronic documents, besides being potentially
relevant to the case, is extremely useful for sorting and organizing electronic evidence.
Accompanying this rise is a steadily increasing amount of information in electronic
form. Lawyers should be aware of these changes and be prepared to adjust their
discovery practices, as well as their courtroom procedures for admitting evidence.
Moreover, attorneys should advise their clients of the potential dangers of
electronically stored data so that preventative policies may be enacted.

19
Bibliography
Statue:



The Indian Evidence Act, 1872
The IT Act, 2000

Books:



Law of cyber-crimes and information technology law, S V Joga Rao, First edition, 2004
Legal issues in electronic commerce, T. Ramappa, 2003

Journal:



Susan E. Davis, Elementary Discovery, My Dear Watson, CAL. LAW., Mar. 1996, at 53, 53
Anthony J. Dreyer, Note, When The Postman Beeps Twice: The Admissibility of Electronic
Mail Under The Business Records Exception of The Federal Rules of Evidence, 64
FORDHAM L. REV. 2285, 2289 (1996)

Article:






http://www.infolawgroup.com/2010/10/articles/breach-notice/legal-implications-of-cloudcomputing-part-five-ethics-or-why-all-lawyers-not-just-technogeek-lawyers-like-me-shouldcare-about-data-security
http://scholarship.law.duke.edu/cgi/viewcontent.cgi?article=1222&context=dltr
http://www.nij.gov/topics/forensics/evidence/digital/digital-glossary.htm
http://www.setecinvestigations.com/resources/faqs.php
www.justice.gov.za/salrc/ipapers/ip27_pr126_2010.pdf

Cases:











United states v. Salgado, 250 F.3d 438, 452 (6th Circuit 2001)
Daubert v. Merrell Dow Pharmaceuticals, Inc. 509 U.S. 579 (1993)
People v. Holowko, 486 N.E. 2d 877, 878-79
St. Luke’s Cataract & Laser Institute, P.A. v. Sanderson 2006 WL 1320242, at *2 (M.D. Fla.
2006)
R. v. Mapara (2005), 251 D.L.R. (4th) 385
Sun Protection Factory, Inc. v. Tender Corp 2005 WL 2484710, at *6 (M.D. Fla. 2005)
Telewizja Polska USA, Inc. v. EchoStar Satellite Corp 2004 WL 2367740 (N.D. Ill. 2004)
State of Maharashtra v Dr Praful B Desai AIR 2003 SC 2053
State (NCT of Delhi) v Navjot Sandhu AIR 2005 SC
Williams v. Sprint/United Management Co. 230 F.R.D. 640 (D. Kan. 2005).

20

More Related Content

What's hot

Investigation of a cyber crime
Investigation of a cyber crimeInvestigation of a cyber crime
Investigation of a cyber crimeatuljaybhaye
 
Information technology act
Information technology actInformation technology act
Information technology actAKSHAY KHATRI
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Karnika Seth
 
65 b certificate format
65 b certificate format65 b certificate format
65 b certificate formatMukulThakur36
 
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000Dr. Prashant Vats
 
Bare Act- The Indian Penal Code, 1860
Bare Act- The Indian Penal Code, 1860Bare Act- The Indian Penal Code, 1860
Bare Act- The Indian Penal Code, 1860Abijah Naresh Jumani
 
Charge by suhail sheraz noor sani
Charge by suhail sheraz noor saniCharge by suhail sheraz noor sani
Charge by suhail sheraz noor sanizulfi799
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsFilip Maertens
 
Oral evidence must be direct
Oral evidence must be directOral evidence must be direct
Oral evidence must be directanamika18
 
Summons –as non coercive method to compel appearance
Summons –as non coercive method to compel appearanceSummons –as non coercive method to compel appearance
Summons –as non coercive method to compel appearanceJudicial Intellects Academy
 
Jurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceJurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceatuljaybhaye
 
Pleadings and its essentials
Pleadings and its essentialsPleadings and its essentials
Pleadings and its essentialsWajid Ali Kharal
 
Lecture 2: Preliminary Aspects of the Indian Evidence Act, 1872
Lecture 2: Preliminary Aspects of the Indian Evidence Act, 1872Lecture 2: Preliminary Aspects of the Indian Evidence Act, 1872
Lecture 2: Preliminary Aspects of the Indian Evidence Act, 1872Badrinath Srinivasan
 
Section 34 of the Arbitrationand Conciliation Act. Scope of interference. Po...
 Section 34 of the Arbitrationand Conciliation Act. Scope of interference. Po... Section 34 of the Arbitrationand Conciliation Act. Scope of interference. Po...
Section 34 of the Arbitrationand Conciliation Act. Scope of interference. Po...Legal
 

What's hot (20)

Electronic Evidence with Case Laws for Maharashtra Judicial Academy by Prasha...
Electronic Evidence with Case Laws for Maharashtra Judicial Academy by Prasha...Electronic Evidence with Case Laws for Maharashtra Judicial Academy by Prasha...
Electronic Evidence with Case Laws for Maharashtra Judicial Academy by Prasha...
 
Investigation of a cyber crime
Investigation of a cyber crimeInvestigation of a cyber crime
Investigation of a cyber crime
 
Res gestae
Res gestaeRes gestae
Res gestae
 
Information technology act
Information technology actInformation technology act
Information technology act
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000
 
Doctrin of Renvoi
Doctrin of RenvoiDoctrin of Renvoi
Doctrin of Renvoi
 
65 b certificate format
65 b certificate format65 b certificate format
65 b certificate format
 
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
 
Examination of witness
Examination of witnessExamination of witness
Examination of witness
 
Trial procedures
Trial proceduresTrial procedures
Trial procedures
 
Bare Act- The Indian Penal Code, 1860
Bare Act- The Indian Penal Code, 1860Bare Act- The Indian Penal Code, 1860
Bare Act- The Indian Penal Code, 1860
 
Charge by suhail sheraz noor sani
Charge by suhail sheraz noor saniCharge by suhail sheraz noor sani
Charge by suhail sheraz noor sani
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
 
Oral evidence must be direct
Oral evidence must be directOral evidence must be direct
Oral evidence must be direct
 
Summons –as non coercive method to compel appearance
Summons –as non coercive method to compel appearanceSummons –as non coercive method to compel appearance
Summons –as non coercive method to compel appearance
 
Jurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceJurisdiction issues in cyberspace
Jurisdiction issues in cyberspace
 
Pleadings and its essentials
Pleadings and its essentialsPleadings and its essentials
Pleadings and its essentials
 
Lecture 2: Preliminary Aspects of the Indian Evidence Act, 1872
Lecture 2: Preliminary Aspects of the Indian Evidence Act, 1872Lecture 2: Preliminary Aspects of the Indian Evidence Act, 1872
Lecture 2: Preliminary Aspects of the Indian Evidence Act, 1872
 
Section 34 of the Arbitrationand Conciliation Act. Scope of interference. Po...
 Section 34 of the Arbitrationand Conciliation Act. Scope of interference. Po... Section 34 of the Arbitrationand Conciliation Act. Scope of interference. Po...
Section 34 of the Arbitrationand Conciliation Act. Scope of interference. Po...
 
Judgements
JudgementsJudgements
Judgements
 

Viewers also liked

Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
Informatics in Clinical Practice: Designing and Implementing an Electronic Re...
Informatics in Clinical Practice: Designing and Implementing an Electronic Re...Informatics in Clinical Practice: Designing and Implementing an Electronic Re...
Informatics in Clinical Practice: Designing and Implementing an Electronic Re...Health Informatics New Zealand
 
Electronic files are records too
Electronic files are records tooElectronic files are records too
Electronic files are records tooBob Larrivee
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidencerakesh mishra
 
Collecting and preserving digital evidence
Collecting and preserving digital evidenceCollecting and preserving digital evidence
Collecting and preserving digital evidenceOnline
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in indiaAdv Prashant Mali
 

Viewers also liked (8)

Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Informatics in Clinical Practice: Designing and Implementing an Electronic Re...
Informatics in Clinical Practice: Designing and Implementing an Electronic Re...Informatics in Clinical Practice: Designing and Implementing an Electronic Re...
Informatics in Clinical Practice: Designing and Implementing an Electronic Re...
 
Electronic files are records too
Electronic files are records tooElectronic files are records too
Electronic files are records too
 
Crime statistics
Crime statisticsCrime statistics
Crime statistics
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
 
Collecting and preserving digital evidence
Collecting and preserving digital evidenceCollecting and preserving digital evidence
Collecting and preserving digital evidence
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 

Similar to Electronic evidence

Evidence and data
Evidence and dataEvidence and data
Evidence and dataAtul Rai
 
Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?CallPM
 
Network and computer forensics
Network and computer forensicsNetwork and computer forensics
Network and computer forensicsJohnson Ubah
 
Electronic Document Management And Discovery
Electronic Document Management And DiscoveryElectronic Document Management And Discovery
Electronic Document Management And DiscoveryRonald Coleman
 
Interplay of Digital Forensics in eDiscovery
Interplay of Digital Forensics in eDiscoveryInterplay of Digital Forensics in eDiscovery
Interplay of Digital Forensics in eDiscoveryCSCJournals
 
Total Evidence White Paper
Total Evidence White PaperTotal Evidence White Paper
Total Evidence White PaperKevin Featherly
 
01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20worldAqib Memon
 
identifies several types of devices on which digital evidence could be (2).docx
identifies several types of devices on which digital evidence could be (2).docxidentifies several types of devices on which digital evidence could be (2).docx
identifies several types of devices on which digital evidence could be (2).docxmckerliejonelle
 
Surviving Technology 2009 & The Paralegal
Surviving Technology 2009 & The ParalegalSurviving Technology 2009 & The Paralegal
Surviving Technology 2009 & The ParalegalAubrey Owens
 
Legally Correct But Technologically Off the Mark - The Case of Arie Genger
Legally Correct But Technologically Off the Mark - The Case of Arie GengerLegally Correct But Technologically Off the Mark - The Case of Arie Genger
Legally Correct But Technologically Off the Mark - The Case of Arie GengerMark Hyde
 
Useful article on e evidnce
Useful article on e evidnceUseful article on e evidnce
Useful article on e evidnceArjun Randhir
 
Computer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer CrimeComputer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer CrimeCSCJournals
 
Digital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtDigital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtCell Site Analysis (CSA)
 
Cyber Crime Investigation
Cyber Crime InvestigationCyber Crime Investigation
Cyber Crime InvestigationHarshita Ved
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docxAliAshraf68199
 
LexisNexis CaseMap National Webinar
LexisNexis CaseMap National WebinarLexisNexis CaseMap National Webinar
LexisNexis CaseMap National WebinarDaniel Gold, Esq.
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]Kolluru N Rao
 

Similar to Electronic evidence (20)

Evidence and data
Evidence and dataEvidence and data
Evidence and data
 
Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?
 
Network and computer forensics
Network and computer forensicsNetwork and computer forensics
Network and computer forensics
 
Electronic Document Management And Discovery
Electronic Document Management And DiscoveryElectronic Document Management And Discovery
Electronic Document Management And Discovery
 
Interplay of Digital Forensics in eDiscovery
Interplay of Digital Forensics in eDiscoveryInterplay of Digital Forensics in eDiscovery
Interplay of Digital Forensics in eDiscovery
 
Total Evidence White Paper
Total Evidence White PaperTotal Evidence White Paper
Total Evidence White Paper
 
01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world
 
identifies several types of devices on which digital evidence could be (2).docx
identifies several types of devices on which digital evidence could be (2).docxidentifies several types of devices on which digital evidence could be (2).docx
identifies several types of devices on which digital evidence could be (2).docx
 
Computer Forensics.pptx
Computer Forensics.pptxComputer Forensics.pptx
Computer Forensics.pptx
 
Surviving Technology 2009 & The Paralegal
Surviving Technology 2009 & The ParalegalSurviving Technology 2009 & The Paralegal
Surviving Technology 2009 & The Paralegal
 
Legally Correct But Technologically Off the Mark - The Case of Arie Genger
Legally Correct But Technologically Off the Mark - The Case of Arie GengerLegally Correct But Technologically Off the Mark - The Case of Arie Genger
Legally Correct But Technologically Off the Mark - The Case of Arie Genger
 
Useful article on e evidnce
Useful article on e evidnceUseful article on e evidnce
Useful article on e evidnce
 
Computer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer CrimeComputer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer Crime
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
 
Digital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtDigital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the court
 
Cyber Crime Investigation
Cyber Crime InvestigationCyber Crime Investigation
Cyber Crime Investigation
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
 
Cyber evidence at crime scene
Cyber evidence at crime sceneCyber evidence at crime scene
Cyber evidence at crime scene
 
LexisNexis CaseMap National Webinar
LexisNexis CaseMap National WebinarLexisNexis CaseMap National Webinar
LexisNexis CaseMap National Webinar
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
 

More from Ronak Karanpuria

More from Ronak Karanpuria (20)

Look out circular bail or arrest
Look out circular bail or arrestLook out circular bail or arrest
Look out circular bail or arrest
 
After review petition: curative jurisdiction
After review petition: curative jurisdictionAfter review petition: curative jurisdiction
After review petition: curative jurisdiction
 
Why where and when
Why where and whenWhy where and when
Why where and when
 
Review jurisdiction of supreme court
Review jurisdiction of supreme courtReview jurisdiction of supreme court
Review jurisdiction of supreme court
 
Credit control by_central_bank
Credit control by_central_bankCredit control by_central_bank
Credit control by_central_bank
 
Banking law module_2_2012
Banking law module_2_2012Banking law module_2_2012
Banking law module_2_2012
 
A.loans & advances
A.loans & advancesA.loans & advances
A.loans & advances
 
Fdi in india
Fdi in indiaFdi in india
Fdi in india
 
Proxy voting
Proxy votingProxy voting
Proxy voting
 
Project report critical analysis of sahara judgment
Project report  critical analysis of  sahara judgmentProject report  critical analysis of  sahara judgment
Project report critical analysis of sahara judgment
 
Female foeticide
Female foeticideFemale foeticide
Female foeticide
 
Interpretation of sec 50 ndps act
Interpretation of sec 50 ndps actInterpretation of sec 50 ndps act
Interpretation of sec 50 ndps act
 
Unfair labour practices
Unfair labour practicesUnfair labour practices
Unfair labour practices
 
Expost facto doctrine
Expost facto doctrineExpost facto doctrine
Expost facto doctrine
 
Per incuriam
Per incuriamPer incuriam
Per incuriam
 
crest Parapet definition
crest Parapet definitioncrest Parapet definition
crest Parapet definition
 
Internship diary by ronak
Internship diary by ronakInternship diary by ronak
Internship diary by ronak
 
Internship diary by ronak
Internship diary by ronakInternship diary by ronak
Internship diary by ronak
 
Internet censorship by ronak
Internet censorship by ronakInternet censorship by ronak
Internet censorship by ronak
 
Substantive patent law treaty
Substantive patent law treatySubstantive patent law treaty
Substantive patent law treaty
 

Recently uploaded

General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 

Recently uploaded (20)

General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 

Electronic evidence

  • 1. NATIONAL LAW SCHOOL OF INDIA UNIVERSITY BANGALORE PROJECT ON “ELECTRONIC EVIDENCE” SUBJECT: E-commerce & IT law TRIMESTER-IV 2013-14 UNDER THE SUPERVISION OF Prof. S.B.N. Prakash National Law School of India University, Bangalore SUBMITTED BY:-Ronak Karanpuria LL.M. (Business Law) Student ID No.: 534 1
  • 2. Acknowledgement I express my deep sense of obligation and gratitude to Prof. S.B.N.Prakash, National Law School of India University, Bangalore, for his invaluable guidance and persistent encouragement in the preparation of this project work. I am deeply indebted to all the Indian and foreign writers and judges whose writings and decisions have been duly cited in this work and have given me inspiration and light during preparation of this work. 2
  • 3. RESEARCH METHODOLOGY  Aim and Objective The Aim of the research paper is to determine the scope of “Electronic Evidence” w.r.t. modern digital environment.  Research Question The researcher will address electronic evidence in context with its relevance, authenticity, hearsay, originality or duplicate documentation, and unfair prejudice about its admissibility in normal court procedure.  Research Methodology In this paper the researcher has primarily used descriptive and analytical methodology of research. The researcher mainly relied upon the secondary sources which include books, Reports, Journal, magazines, online articles and legal databases.  Scope The scope of this paper is to find out the legal aspects of electronic evidence  Limitation. The field study would have been desirable but due to paucity of time this paper is limited only to the theoretical aspect of electronic evidence which have been gathered from various sources including books, articles, and journals.  Sources In this paper various secondary source have used by the research student in the form of books, article from various journals and also internet sources have been used.  Mode of Citation A Uniform mode of citation is followed throughout this paper. 3
  • 4. TABLE OF CONTENT S.NO. PARTICULARS PAGE NO. 1 INTRODUCTION 5 2 TYPES OF ELECTRONIC EVIDENCE 6 3 ASSESSING ELECTRONIC EVIDENCE 7 4 9 4 TECHNO-LEGAL PREREQUISITES FOR ELECTRONIC EVIDENCE A. Recognition Of Electronic Record B. Recognition Of Digital Signature C. Retention Of Electronic Record ELECTRONIC EVIDENCE : ADMISSIBILITY 12 5 CLOUD COMPUTING 17 6 CONCLUSION 19 7 BIBLIOGRAPHY 20 4
  • 5. Introduction The court proceedings and the judicial system is based on the facts and the evidence as produced before courts. Even in the era of kings and rulers, when any matter laid before them each party were insisted to have proceed with facts and evidence they have to prove their allegations or strategy. Same analogy has been adopted by Panchayats & courts although with care and caution due to high technological advancement, with this aspects one has to see the rights of individual, rights of victim, admissibility of evidence and to support & strengthen the coordination and cooperation between investigating and prosecution and to prevent miscarriage of justice. However, with the advent of new technologies, regulatory agencies are increasingly harnessing the power of digital technologies to meet the informational demands of rulemaking and to expand public involvement in policymaking. Governments are increasingly adopting technological means, shifting from walls to webs.1 With the advancement, evidence although primarily of two types: oral & documentary with a new form annexed i.e. electronic evidence, court & lawyers has to adhere caution while dealing with electronic evidence2 due to the intricacy & technicality involved, which needed a experts to determine the correctness of data. While the admissibility of electronic evidence is big issue before courts. With globalisation & internet age, people are sharing resources, google, facebook, to kindle and different business gadgets etc. knowledge and data are the key business assets, to be developed and protected and transaction in seconds from one place to another where everything on paper is not possible, with technology data security is a crucial issue, electronic data flows from one part of the world to another i.e. cross borders, passing different law jurisdiction involving different internet and privacy 1 Thomas Friedman, The Lexus & The Olive Tree: Understanding Globalization 39-58 (1999) As a general rule, "electronic evidence" can be any information created or stored in digital form whenever a computer is used to accomplish a task. As this broad definition suggests, electronic evidence may exist whenever a person enters information into a computer, a computer generates information in response to a request by an operator, or a computer uses or processes information. Electronic evidence, therefore, may include information databases, operating systems, applications programs, "computer-generated models", electronic and voice mail messages and records, and other information or "instructions residing in computer memory. 2 5
  • 6. issues, it is necessary to have proper inquiry and understanding of technology and also proper law to keep in check of the crimes committed by this technology. Type of Electronic evidence As a general rule, "electronic evidence" can be any information created or stored in digital form whenever a computer is used to accomplish a task Forms of electronic evidence3. Email, Word processor, Electronic Spreadsheet files, Relational database (record) file, Software source code, Various image files (.tiff, .jpeg), Web browser bookmarks / cookies / cache Memory, Calendar; to-do-list, contact list, Voice mail. Electronic evidence is a burning issue mainly due to the high-value fraud, industrial espionage, defamation, theft of intellectual property, software counterfeiting and piracy, disputes over software ownership, regulatory disputes, solicitors’ disciplinary proceedings, and global computer misuse, and phishing, theft of trade secrets, defamation and state corruption. Then in case, whether an electronic transaction has taken place or an event within cyberspace has occurred is to be known or alternatively, can you prove that they cannot have happened? A critical feature of the vast majority of computer systems is the ability to produce evidence. Computer or electronic devices has been common place of court battle for electronic evidence.4 People routinely use computers, particularly e-mail, to send draft, informal, or "uncensored" messages they would never "put in writing." As a result, computerized records often contain insights into "corporate knowledge and behavior" and "off-the-cuff' remarks that people would never record on paper. Such remarks are often damaging in litigation.5 Where litigation or criminal prosecution is in prospect there is a further requirement on those who run or own computers: the need to identify and preserve digital material 3 See, e.g., Susan E. Davis, Elementary Discovery, My Dear Watson, CAL. LAW., Mar. 1996, at 53, 53 (discussing different forms of electronic evidence); 4 Bills v. Kennecott Corp., 108 F.R.D. 459, 462 (D. Utah 1985). 5 See, e.g., Anthony J. Dreyer, Note, When The Postman Beeps Twice: The Admissibility of Electronic Mail Under The Business Records Exception of The Federal Rules of Evidence, 64 FORDHAM L. REV. 2285, 2289 (1996) 6
  • 7. which the legal system says should be disclosed to opponents in civil litigation and to defendants accused of crimes. An important question raised is why evidence required at all, mainly due to wide range of commercial activities going on around the world, for example in disputed transactions, in allegations of employee misbehaviour, to show compliance with legal and regulatory rules, to avoid charges of negligence or breach of contract, to assist law enforcement in criminal and anti-terrorist investigations, to meet disclosure requirements in civil claims, to support insurance claims after a loss. Due to the fact that electronic evidence or mainly digital evidence is highly volatile and easily compromised by poor handling, chances of success in litigation heavily depends on the weight of the evidence supported by relevant facts. Effective combating of cybercrimes requires prompt discovery, safe custody and present in acceptable form in a court, as the number of criminals uses computers, laptops, network servers and cellular phones in commission of their crimes is increasing alarmingly. Assessing Electronic Evidence Electronic evidence is mainly information or data of investigative value that is stored on or transmitted by an electronic device6. According to Black's law dictionary, evidence is "any species of proof, or probative matter, legally presented at the trial of an issue, by the act of parties and through the medium of witnesses, records, documents, exhibits, concrete objects, etc. for the purpose of inducing belief in the minds of the court or jury as their contention." As a general rule, "electronic evidence" can be any information created or stored in digital form that is relevant to a case. This includes, but is not limited to, emails, text documents, spreadsheets, images and graphics, database files, deleted files, and data back-ups. Electronic evidence may be located on floppy disks, zip disks, hard drives, tape drives, CD-ROMs or DVDs, as well as portable electronic devices such as PDAs and cellular phones.7 6 7 http://www.nij.gov/topics/forensics/evidence/digital/digital-glossary.htm http://www.setecinvestigations.com/resources/faqs.php 7
  • 8. Electronic evidence in criminal and civil proceedings is problematic, any contract which is concluded by affixing electronic signatures is electronic agreement8 and admissible9 in court but presumption10 regarding person cannot be setout. Mindful of emerging new technologies, it is essential to consider the nature and some of the special characteristics of electronic evidence that raise legitimate concerns about its accuracy and authenticity. Now that formal conditions to the admissibility of electronic evidence have been removed11, the increasing complexity and sophistication of rapidly-developing technology necessitates a shift from concerns about exclusion and admissibility subject to overly-technical requirements towards a more precise focus on issues relevant to establishing authenticity and suitable weight for the evidence which it generates. The main characteristic of electronic record12 it about its intangibility and which raise concerns about the accuracy and authenticity, where transient nature of data, difficult to store, copy, create and easy to manipulate and easy to be modified and tampered raise several issues in court about its veracity and even slightest distortion can create problem in investigation and extremely vulnerable to claims, errors and fabrication. 8 Section 84A of the Evidence Act provides for the presumption that a contract has been concluded where the parties' digital signatures are affixed to an electronic record that purports to be an agreement 9 Section 85B of the Evidence Act provides that where a security procedure has been applied to an electronic record at a specific time, the record is deemed to be a secure electronic record from such time until the time of verification. Unless the contrary is proved, the court is to presume that a secure electronic record has not been altered since obtaining secure status. The provisions relating to a secure digital signature are set out in Section 15 of the IT Act. A secure digital signature is a digital signature which, by application of a security procedure agreed by the parties at the time that it was affixed, is: • unique to the subscriber affixing it; • capable of identifying such subscriber; and • created by a means under the exclusive control of the subscriber and linked to the electronic record to which it relates in such a manner that if the electronic record as altered, the digital signature would be invalidated. 10 Under the provisions of Section 88A, it is presumed that an electronic message forwarded by a sender through an electronic mail server to an addressee corresponds with the message fed into the sender's computer for transmission. However, there is no presumption regarding the person who sent the message. This provision presumes only the authenticity of the electronic message and not the sender of the message. 11 Section 65-A, 65-B (Admissibility of Electronic Records) 12 "electronic record" means data, record or data generated, image or sound stored, received or sent in an electronic form or micro film or computer generated micro fiche 8
  • 9. Techno-Legal Prerequisites for Electronic Evidence A. Recognition of Electronic Records The purpose of the various electronic commerce statutes can briefly be stated as creating legal recognition for electronic records, electronic signatures, and electronic contracts and ensuring that the medium in which a record, signature, or contract is created, presented or retained does not affect its legal significance.13 Section 4 sets forth the fundamental premise of the ITA, namely that the medium in which a record, signature, or contract is created, presented or retained does not affect its legal significance because the substantive law governing the underlying transaction may require non-electronic records or signatures. The section achieves its purposes by simply overriding the substantive law on these requirements. The aforementioned section contains two prerequisites before legal recognition may be imparted to electronic records. These prerequisites are: (a) rendered or made available in an electronic form, and (b) accessible to be used for a subsequent reference. The first requirement is fulfilled when the electronic record is within the meaning of section 2(1)(r) of the ITA. The second requirement is satisfied when the record is catalogued or made available. The rationale behind the second requirement is that electronic data is intangible and by its very nature transient, thus it is expedient to require it to be available for future reference. The aforementioned section is in pari materia with a provision of the Uniform Electronic Transactions Act14. It simply mandates that courts recognize the legitimacy of electronic signatures when considering whether the requirement of a signed writing has been met. In the case of Orissa Consumers Association v. Orissa Electricity Regulatory Commission15, the Orissa High Court considered the legal recognition of records as per the ITA and stated that the requirements of publication contained in the Orissa Electricity Regulatory Commission (Terms and Conditions for Determination of Tariff for Retail Sale of Electricity) Regulations, The court noted that the publication of the draft Regulations 13 Henry D. Gabriel, The Fear Of The Unknown: The Need To Provide Special Procedural Protections In International Electronic Commerce, 50 LoY. L. REv. 307, 310 (2004). 14 Uniform Electronic Transactions Act Section 7 (Nat'l Conference of Comm'rs on Unif. State Laws 1999) (U.S.) [hereinafter UETA]. 15 AIR 2005 Ori 11 9
  • 10. by putting the same in the website of the Commission would be a publication of the draft Regulations within the meaning of Section 23 of the Central General Clauses Act, 1897. B. Recognition Of Digital Signatures Section 5 chooses a technology-based approach promoting a highly regulatory and prescriptive standard, granting functional equivalence only to digital signatures. Section 5 applies the same principle as adopted by the preceding section, granting legal recognition to digital signatures where statutes require when any matter or document requires authentication by affixing a signature. The explanation to the section couches the term "signature” in a plenary context, including its grammatical and cognate expressions. The prerequisites which must be satisfied for the application of the section are: (a) a law should require that information, matter or document shall be signed or bear the signature of a person, (b) a digital signature is affixed in place of such signature, and (c) the digital signature is affixed in a manner prescribed by the central government. Take the illustration of the Bureau of Indian Standards Act, 198616, which provides that the authentication of orders and other instruments issued by the Bureau shall be authenticated by the signature of such officer or officers as may be authorised by the Bureau in this behalf Thus if the Bureau decides to affix a digital signature to its orders the mere factum that the statute from which it derives its power does not expressly provide for affixing a digital signature will not impart any defect to its orders. The draft amendments17, with the objective of technological neutrality, suggest substituting the term "digital" with "electronic". The amendments also make provisions to ensure that the electronic signature affixed is reliable. There is a proposition to add another sub-section, which prescribes the minimum standards of reliability. The proposed standards are: (a) the electronic data in relation to which the Electronic Signature is affixed is linked to the signatory and to no others, (b) the Electronic Signature creation code given is unique to the signatory, and (c) any 16 The Bureau of Indian Standards Act, ch. VII, §36 (1986) (India) available at http://www.bis.org.in/bs/bisact.htm 17 Expert Committee on Review of the IT Act 2000, Report of the Expert Committee: Full Text (Proposed Aug. 29, 2005), available at http://www.mit.gov.in/itact2OOO/ITAct.doc [hereinafter Proposed Amendments to IT Act 2000]. 10
  • 11. alteration to the Electronic Signature or to the electronic data in relation to which the signature is affixed made after the time of signing is detectable. The comments to this sub-section specify that they are being added to define the reliability of Electronic Signatures and to allow only those technologies which conform to those conditions in line with UNICITRAL Model Law of Electronic Commerce. C. Retention Of Electronic Records A record is any documentary material, regardless of physical form, that has the following three characteristics: (a) it is generated or received by [an entity] in connection with transacting its business or is related to its legal obligations, (b) it is retained for any period of time, and (c) necessary to be preserved as legal evidence of the [entity]'s activities or as historical reference18. Records retention is unconcerned with the genesis of records, but takes up matters after creation. Records retention principally concerns the retention period: that is, the duration of a record's life.19 Records retention has various objectives which include: (a) maintaining an institutional policy memory, (b) enhancing the body of knowledge in a factual and scientific sense, (c) maintaining official records for possible use as evidence in legal proceedings, (d) promoting efficiency and effectiveness of agency operations, and (d) increasing the return on investment from information in government records which has long-term value.20 Governments and business are increasingly relying upon electronic records. One of the benefits of electronic records is that archiving them is much more economical than paper. A minimum standard of records retention is especially important with respect to electronic data since its being intangible renders it highly susceptible to a partial or complete loss of accessibility, integrity or/and identification. For example, if data is stored on a Compact Disk Read Only Memory (CDROM) the reliability and storage life expectancy of the storage media is secure for at least three to five years, with some estimates reaching as high as twenty 18 PHYLLIS M. LYBARGER, RECORDS RETENTION SCHEDULING 1 (1980). Richard J. Peltz, Arkansas's Public Records Retention Program: Finding The FOIA S Absent Partner, 28 U. ARK. LITTLE ROCK L. REV. 175, 180 (2006). 20 Henry H. Perritt, Jr., Electronic Records Management & Archives, 53 U. PITT. L. REv. 963, 965 (1992). 19 11
  • 12. years. Thus it becomes expedient to have minimum policy standards for the retention of electronic records. The ITA under section 7 sets forth the basic rules regarding the retention of electronic records. It applies to the retention of records that originally exist in electronic form, as well as to the electronic retention of records that originally exist in paper form or on other tangible media. The section does not prescribe for any specified period for retention of an electronic record but provides minimum standards for records retention "when any law provides that documents, records or information shall be retained for any specific period". These minimum standards are contained in section 7(1) and relate to: 1. Accessibility - Records retention in archives is ineffective unless the archived records can be accessed. The technical issues with legal implications relating to accessibility include ease of alteration and physical deterioration. Thus section 7(1)(a) provides for making records, "accessible so as to be usable for a subsequent reference". 2. Format Integrity -The integrity of the format in which the information was originally generated is important because changes in format can affect the material characteristics of the record. With several versions of software available for performing the same task, section 7(1)(b) prescribes that, even if there is a change in format, the electronic record shall be "in a format which can be demonstrated to represent accurately the information originally generated, sent or received". 3. Identification - It is imperative that any form of record retention must enable identification. Thus section 7(1)(c) provides for, "the details which will facilitate the identification of the origin, destination, date and time of dispatch or receipt of such electronic record are available in the electronic record." Electronic Evidence: Admissibility The issue to be addressed is “Relevance”, “authenticity”, “hearsay”, “original or “duplicate”, “unfair prejudice” in context with electronic stored information (ESI). In Lorraine21 has been heralded as "an excellent guide to an important aspect of the care that may be or become necessary when parties attempt to offer electronic information 21 Lorraine v. Markel, 241 F.R.D. 534, 537-38 (D. Md. 2007) 12
  • 13. into evidence." The case exposes the less-than-acceptable standard of care that at least part of the legal community is exercising concerning the admission of electronic evidence. The question in the case was that the parties wanted the court to answer was whether the arbitrator exceeded his authority by awarding less than the full amount of a potentially “all or nothing” arbitration agreement, as the parties had negotiated by e-mail. The court, however, dismissed each party's motions and refused to answer this question because both parties failed to authenticate as electronic evidence the email they submitted with their motions. The Lorraine court first delineated the basic rules for the admissibility of all types of electronic evidence, explaining that the evidence must be: 1) relevant; (2) authenticated; (3) allowable under the hearsay rules; (4) allowable under the original writing (best evidence) rule; and (5) the probative value of such evidence cannot be outweighed by any unfair prejudice. The admissibility issues are important to be analysed to understand the scope of electronic evidence as Relevancy refers to when one fact is said to be relevant to another when one is connected to another in such a way which has a direct bearing on the fact in issue in terms of proved or disproved facts of the case in any of the way as provided in sec-5-55 of evidence act. Relevant thing or fact make the tendency of other things either so probable or less probable, however question whether evidence is sufficient to prove a point is different. In case of electronic evidence, material are of high quantity, gathering lot of information & to set the relevancy about existence or nonexistence of other data, either occur in same transaction or other, what the cause or effect of other data, facts or information which are necessary to explain other data which are difficult in case of information gathering of electronic data. For example: Mr X. is a business man owing mobile which is password protect, get an email during business transaction, which he replied about not performing the contract but email was hacked or lost due to any error, while other party uninformed believes and continue with the terms of contract. In this case other party filed a suit for compensation for performing their part of contract, but in the court Mr X. submit their documents related to electronic transaction, in further inquiry they come to know that email was lost, such information may be relevant, however if the email was lost it is difficult to track and evidence gathering is impossible. 13
  • 14. Electronic records are extremely susceptible to tampering, hiding, or destruction, images, soft copies, or other documents can be hidden, people with criminal mentality or try to conceal, sometimes change the extension of files, power failure of system is the main cause of loss of data, even in case of malicious attack, virus, malware etc. multiple copies are created and slow down the process. However, with new hardware/software application, data operated in different form where they cannot be read, understood or used with the risk of alteration and manipulation. What happen in case of someone accidently click some sites or links or popups etc. in that case also your IP address get tracked and in such case prosecution has evidence to prove that you tracked or clicked on that website, however in rebut one can always say that there is no evidence that he was using that computer but that depends on case to case. However representation of data is also an issue, where software convert set of data into logical form and constructs them in a format that appears to indicate the file is a complete entity. The file does not exist as it claims to exist on the screen and, in the same way, the individual components of the ‘file’ are not guaranteed to be preserved in the manner that will enable the file to be reconstructed over time.22 However electronic data operating in computer even if misplaced, deleted or corrupted, at least its information embedded in the text or properties in the form of metadata which may reveal details like title of documents, date of its creation, location, any changes in the documents etc. are saved in the computer by which analyst can found the relevancy of documents. Metadata associated with computer programs, software’s etc. are an important source for authentication but due to fast changing technology where such information can be embedded easily, court simply cannot reply on the metadata for such relevancy and it is necessary on the counsel to use different means to establish the facts. Best evidence rule here the expression best is used in relative context, deals with the nature or character of particular evidence, which is considered for the purpose of arriving at rational conclusion. Authentication refers to establishing facts like testimony of witness, expert witness with specimens report, distinctive characteristic like appearance, content, substance, 22 www.justice.gov.za/salrc/ipapers/ip27_pr126_2010.pdf pg 25 14
  • 15. pattern, public records, self-authentication where electronic document carrying electronic or digital signature. In "Spy v. Spy" a woman who lost custody of her children in part because of some horrifying e-mails she supposedly sent to her husband. She denied sending the e-mails. A forensics exam of the ex-husband’s computer revealed the test message he had set up to “spoof" his ex-wife by inserting her address as the sender in e-mails that he was actually writing and sending to himself. After receiving evidence of the husband's fraud on the court, the judge awarded custody to the mother. This shows authentication of email or electronic evidence is not possible i.e. who has actually send those email, at least identification of device is possible. Admissibility refers to any proposed facts which is admissible in the court of law, sec136 evidence act empowers judges to decide as to the admissibility of evidence produced before them. In US, courts have indicated that computer records generally be admitted as business records if they were kept pursuant to a routine procedure for motives that tend to assure their accuracy23. The second rule of evidence of computer records is based on the assumption that they are hearsay evidence24 that when a computer record contains assertions of a person, whether or not processed by a computer and is present before the court to prove the matter of fact, then such a record is hearsay evidence. There are many log files generate by computer and there are not mere hearsay but concrete evidence of a process or a situation. 25 It is necessary to define minimum standard for admitting and authenticating electronic evidence. 23 United states v. Salgado, 250 F.3d 438, 452 (6th Circuit 2001) 24 In R. v. Mapara (2005), 251 D.L.R. (4th) 385 at para. 15, [2005] I S.C.R. 358. 349 W.A.C. I. 2009] , the Supreme Court further discussed the principled approach: The principled approach to the admission of hearsay evidence which has emerged in this Court over the past two decades attempts to introduce a measure of flexibility into the hearsay rule to avoid these negative outcomes. Based on the Starr decision, the following framework emerges for considering the admissibility of hearsay evidence: (a) Hearsay evidence is presumptively inadmissible unless it falls under an exception to the hearsay rule. The traditional exceptions to the hearsay rule remain presumptively in place. (b) A hearsay exception can be challenged to determine whether it is supported by indicia of necessity and reliability, required by the principled approach. The exception can be modified as necessary to bring it into compliance. (c) In "rare cases", evidence falling within an existing exception may be excluded because the indicia of necessity and reliability are lacking in the particular circumstances of the case. (d) If hearsay evidence does not fall under a hearsay exception, it may still be admitted if indicia of reliability and necessity are established on a voir dire. 25 People v. Holowko, 486 N.E. 2d 877, 878-79 15
  • 16. Judicial decision is varied and mostly depend on case to case basis. In Daubert v. Merrell Dow Pharmaceuticals, Inc.26 decision describes a four-pronged test to determine whether science-derived evidence is admissible in U.S. Federal Court. The Daubert test applies to any scientific procedure used to prepare or uncover evidence and comprises the following four factors (Daubert, 1993): • Testing: Can and has the scientific procedure been independently tested? • Publication: Has the scientific procedure been published and subject to peer review? • Error rate: Is there a known error rate, or potential to know the error rate, associated with the use of this scientific procedure? • Acceptance: Is the scientific procedure generally accepted by the relevant scientific community? In St. Luke’s Cataract & Laser Institute, P.A. v. Sanderson27, where the proponent failed to authenticate printouts of websites obtained from Internet Archive because affiants lacked personal knowledge of contents of Internet Archive’s website and process, and in Sun Protection Factory, Inc. v. Tender Corp.28, where the proponent failed to authenticate printouts of websites because affiant’s statements were hearsay and websites are not self-authenticating. In Telewizja Polska USA, Inc. v. EchoStar Satellite Corp.29, in which the Court admitted a website obtained from an Internet Archive based on affidavit from administrative director for Internet Archive. In State of Maharashtra v Dr Praful B Desai30 involved the question of whether a witness can be examined by means of a video conference. The Supreme Court observed that video conferencing is an advancement of science and technology which permits seeing, hearing and talking with someone who is not physically present with the same facility and ease as if they were physically present. The legal requirement for the presence of the witness does not mean actual physical presence. The court allowed the examination of a witness through video conferencing and concluded that there is no reason why the examination of a witness by video conferencing should not be an essential part of electronic evidence. Admissibility of intercepted telephone calls is 26 509 U.S. 579 (1993) 2006 WL 1320242, at *2 (M.D. Fla. 2006) 28 2005 WL 2484710, at *6 (M.D. Fla. 2005) 29 2004 WL 2367740 (N.D. Ill. 2004) 30 AIR 2003 SC 2053 27 16
  • 17. another issue which court held that if witness is acquainted with the technology then such a fact is a relevant fact & it is admissible.31 Unfair prejudice, another issue a matter of concern, what if the data is the hand of an advocate or professional in the professional capacity where data extraction is difficult due to privileges32 or it may subject to data protection where no professional be obliged at any time be permitted unless with his client's express consent to disclose any communication made to him in the course and for the purpose of his employment as such as attorney , by or on behalf of his client, or to state the contents or condition of any document with which he has become acquainted in the course and for the purpose of his professional employment or to disclose any advice given by him to his client in the course and for the purpose of such employment. Such privilege communication if any taken place in electronic form, such material many be relevant to the fact in issue but is inadmissible in the court. Cloud Computing With the advent of new and advanced technology, it become difficult for legal system to recognise the legal issues involved in accessing such technology. Cloud computing as the name suggest any service provided online and operated by a third party" or "services that are controlled by third-parties and accessed over the Internet." That means everything from webmail (Hotmail, Gmail etc.) to online data storage to software as a service (SaaS), e.g. Salesforce.com33. There are several legal issues 31 State (NCT of Delhi) v Navjot Sandhu AIR 2005 SC 3820 was an appeal against conviction following the attack on Parliament on December 13 2001, in which five heavily armed persons entered the Parliament House Complex and killed nine people, including eight security personnel and one gardener, and injured 16 people, including 13 security men. This case dealt with the proof and admissibility of mobile telephone call records. While considering the appeal against the accused for attacking Parliament, a submission was made on behalf of the accused that no reliance could be placed on the mobile telephone call records, because the prosecution had failed to produce the relevant certificate under Section 65B(4) of the Evidence Act. The Supreme Court concluded that a cross-examination of the competent witness acquainted with the functioning of the computer during the relevant time and the manner in which the printouts of the call records were taken was sufficient to prove the call records 32 Sec – 126, 127, 128 Evidence act, 1872 : Professional communication 33 http://www.infolawgroup.com/2010/10/articles/breach-notice/legal-implications-of-cloud-computingpart-five-ethics-or-why-all-lawyers-not-just-technogeek-lawyers-like-me-should-care-about-datasecurity 17
  • 18. involved in cloud computing service like who owns the data that is collected, generated & processed by the service, legal requirement for encrypted data, jurisdictional problem as service may be provided cross border, consumer rights, what might be the essential disclosure, in relation to admissibility in court how court might interpret the criteria of standard disclosure, about the integrity & completeness of documents be proved. As multiple layers of data34 are generated which are managed by cloud provider & such electronic stored information may not be in possession or control of litigant. The Williams v. Sprint/United Management Co.35 court held that “the producing party should produce the electronic documents with their metadata intact.” A party may move for a protective order when asked to produce metadata if it is “not reasonably accessible” and will result in “undue burden and cost.” As common metadata may be readily accessible without undue burden or cost because it is stored in a common repository, yet its discovery may harm other clients. However parties has always an opportunity to seek injunction to protect metadata from disclosure otherwise the discovery will reveal the common metadata disclosing third parties information which may violate privacy laws. See “Electronic Discovery in the Cloud” The data layers may include client-specific data, clientspecific metadata, and metadata common to several clients, which may be unique to an application, generated by multiple clients, or stored in a shared repository. Common metadata may be maintained in repositories shared between clients, which makes it a “major problem” to “isolate [that] data and maintain the security.” Therefore, that data may not be in the custody or control of a litigant, and thus not subject to discovery. Consequently, applying the Rules to a Cloud may create liabilities for clients of a Cloud and loopholes for litigants possession. http://scholarship.law.duke.edu/cgi/viewcontent.cgi?article=1222&context=dltr 35 230 F.R.D. 640 (D. Kan. 2005). 34 18
  • 19. Conclusion With the rapid growth of computers, influence of information technology & ability to store information in electronic form, required law to be amended which allows admissibility of electronic records because of the characteristic of evidence - its volume, durability, transient nature, and ease of transmission and manipulation by users-make it a critical source of information. But when you convert an electronic document to paper, you lose valuable information found within its metadata, the evidence from its "best evidence" original form into a version that might need secondary evidence to justify its admission. Further, the metadata attached to electronic documents, besides being potentially relevant to the case, is extremely useful for sorting and organizing electronic evidence. Accompanying this rise is a steadily increasing amount of information in electronic form. Lawyers should be aware of these changes and be prepared to adjust their discovery practices, as well as their courtroom procedures for admitting evidence. Moreover, attorneys should advise their clients of the potential dangers of electronically stored data so that preventative policies may be enacted. 19
  • 20. Bibliography Statue:   The Indian Evidence Act, 1872 The IT Act, 2000 Books:   Law of cyber-crimes and information technology law, S V Joga Rao, First edition, 2004 Legal issues in electronic commerce, T. Ramappa, 2003 Journal:   Susan E. Davis, Elementary Discovery, My Dear Watson, CAL. LAW., Mar. 1996, at 53, 53 Anthony J. Dreyer, Note, When The Postman Beeps Twice: The Admissibility of Electronic Mail Under The Business Records Exception of The Federal Rules of Evidence, 64 FORDHAM L. REV. 2285, 2289 (1996) Article:      http://www.infolawgroup.com/2010/10/articles/breach-notice/legal-implications-of-cloudcomputing-part-five-ethics-or-why-all-lawyers-not-just-technogeek-lawyers-like-me-shouldcare-about-data-security http://scholarship.law.duke.edu/cgi/viewcontent.cgi?article=1222&context=dltr http://www.nij.gov/topics/forensics/evidence/digital/digital-glossary.htm http://www.setecinvestigations.com/resources/faqs.php www.justice.gov.za/salrc/ipapers/ip27_pr126_2010.pdf Cases:           United states v. Salgado, 250 F.3d 438, 452 (6th Circuit 2001) Daubert v. Merrell Dow Pharmaceuticals, Inc. 509 U.S. 579 (1993) People v. Holowko, 486 N.E. 2d 877, 878-79 St. Luke’s Cataract & Laser Institute, P.A. v. Sanderson 2006 WL 1320242, at *2 (M.D. Fla. 2006) R. v. Mapara (2005), 251 D.L.R. (4th) 385 Sun Protection Factory, Inc. v. Tender Corp 2005 WL 2484710, at *6 (M.D. Fla. 2005) Telewizja Polska USA, Inc. v. EchoStar Satellite Corp 2004 WL 2367740 (N.D. Ill. 2004) State of Maharashtra v Dr Praful B Desai AIR 2003 SC 2053 State (NCT of Delhi) v Navjot Sandhu AIR 2005 SC Williams v. Sprint/United Management Co. 230 F.R.D. 640 (D. Kan. 2005). 20