Digital Evidence and Section 65B: Admissibility Framework

Supreme Court of India Constitutional Law Section 65B Section 65 Indian Evidence Act, 1872 Indian Evidence Act custody
Veritect
Veritect AI
Deep Research Agent
12 min read

Executive Summary

Section 65B of the Indian Evidence Act, 1872 governs the admissibility of electronic records as evidence in legal proceedings, establishing strict procedural requirements:

  • Certificate requirement: Electronic records need Section 65B(4) certificate for admissibility
  • Computer output: Any information stored/processed in computer form
  • Certificate contents: Four mandatory conditions under Section 65B(4)
  • Supreme Court precedent: Arjun Panditrao (2019) - certificate mandatory, no exceptions
  • Exceptions: Anwar P.V. (2020) - certificate not required if original device produced
  • Practical challenges: Voluminous data, cloud storage, encryption
  • Emerging issues: IoT, AI-generated evidence, blockchain records

This guide examines the Section 65B framework and admissibility requirements for digital evidence.

1. Statutory Framework

Section 65B - Admissibility of Electronic Records

Element Requirement
Applicability Any information in electronic form
Presumption Electronic record deemed document
Admissibility Subject to Section 65B conditions
Certificate Section 65B(4) certificate required
Proof Satisfies conditions = deemed authentic

What Constitutes "Electronic Record"

Type Examples
Emails Correspondence, attachments
Text messages SMS, WhatsApp, Telegram
Social media Posts, comments, messages
Documents PDFs, Word files, spreadsheets
Audio/Video Recordings, CCTV footage
Images Photographs, screenshots
Logs Server logs, access logs, transaction logs
Databases Structured data records
Websites Web pages, online content

2. Section 65B(2) Conditions

Four Mandatory Conditions

Condition Requirement
65B(2)(a) Computer regularly used to store/process information
65B(2)(b) Information regularly fed during relevant period
65B(2)(c) Computer operating properly (or malfunctions not affecting output)
65B(2)(d) Information derived from computer in ordinary course

Purpose of Conditions

Condition Purpose
Regular use Establishes reliability of computer system
Regular feeding Confirms systematic data entry
Proper operation Ensures accuracy of output
Ordinary course Shows standard business practice

3. Section 65B(4) Certificate

Mandatory Certificate Contents

Requirement Description
1. Identify electronic record Describe the document/data produced
2. Describe computer Computer used to produce the record
3. State conditions met All four Section 65B(2) conditions satisfied
4. Provide particulars Device details, storage, retrieval method

Who Can Issue Certificate

Person Qualification
In-charge of computer Responsible person (Section 65B(4))
Lawful control Person having lawful control over use of computer
Examples IT manager, system administrator, business owner
Not required Formal title - functional control sufficient

Sample Certificate Format

CERTIFICATE UNDER SECTION 65B(4) OF INDIAN EVIDENCE ACT, 1872

I, [Name], [Designation], aged [X] years, working at [Organization], do hereby certify that:

1. The electronic record containing [description of document/data] is produced from computer system regularly used by [organization] for [purpose].

2. The computer system comprises [hardware details, servers, storage devices].

3. During the material period, the computer was used regularly to store and process information of the kind contained in the electronic record.

4. During the material period, information of the kind contained in the electronic record was regularly fed into the computer in the ordinary course of its activities.

5. Throughout the material period, the computer was operating properly, or if not, any malfunctions did not affect the accuracy of the electronic record or the information contained therein.

6. The electronic record was produced by the computer during the ordinary course of its activities.

Date: [Date]
Place: [Place]

[Signature]
[Name and Designation]

4. Supreme Court Precedents

Arjun Panditrao v. State of Maharashtra (2019)

3-Judge Bench Decision

Aspect Ruling
Certificate mandatory Yes, without exception
No oral evidence Cannot substitute for certificate
Overruled precedents Shafhi Mohammad, State of Delhi cases
Strict interpretation No judicial discretion to waive

Anwar P.V. v. P.K. Basheer (2020)

3-Judge Bench Clarification

Aspect Ruling
Original device exception Certificate not needed if device itself produced in court
Examples Mobile phone, laptop, hard drive
Rationale Section 65B is for copies/printouts, not originals
Practical limitation Difficult for cloud-stored data

Key Differences

Scenario Certificate Required?
Printout of email Yes (Arjun Panditrao)
Screenshot of WhatsApp Yes
Mobile phone produced No (Anwar P.V. - original device)
Hard drive produced No (original device)
Cloud data printout Yes (cannot produce "original")

5. Practical Challenges

Challenge 1: Voluminous Data

Issue Solution
Thousands of pages Summary certificate for entire dataset
Multiple systems Separate certificates per system
Consolidated data Certificate for integrated system

Challenge 2: Cloud Storage

Issue Solution
No physical device Certificate from cloud service provider
Third-party servers Formal request to service provider
Foreign servers International legal assistance
Encrypted data Certificate for decrypted output

Challenge 3: Social Media Evidence

Issue Solution
Platform ownership Certificate from Facebook, Twitter, etc.
Practical unavailability Court summons to platform
Screenshots Certificate from user's device
Archived pages Notarized web archiving services

Challenge 4: Law Enforcement Evidence

Issue Solution
Seized devices Forensic examiner's certificate
Hash values Certificate for forensic image
Chain of custody Multiple certificates tracking transfer

6. Types of Digital Evidence

Email Evidence

Element Requirement
Printout Section 65B certificate
Email server Certificate from IT admin
Headers Full headers for authentication
Attachments Separate certificate if different system

WhatsApp/Text Messages

Element Requirement
Screenshots Certificate from phone owner
Chat export Certificate for export file
Phone produced No certificate (Anwar P.V. exception)
Verification Sender/receiver phone numbers

CCTV Footage

Element Requirement
DVR/NVR Certificate from security officer
Timestamp Verification of system time accuracy
Unaltered Certificate of no tampering
Chain of custody Storage and transfer records

Website Evidence

Element Requirement
Screenshots Certificate from user's computer
Archived page Certificate from archiving service
Web scraping Certificate from scraping tool system
Metadata URL, timestamp, IP address

7. Forensic Evidence

Digital Forensic Process

Stage Section 65B Requirement
1. Seizure Document device details
2. Imaging Certificate for forensic image (hash verified)
3. Analysis Certificate for analysis tools/workstation
4. Extraction Certificate for extracted data
5. Reporting Certificate for final report data

Hash Values and Integrity

Tool Purpose
MD5 Generate unique fingerprint
SHA-256 More secure hash algorithm
Write blockers Prevent alteration during imaging
FTK Imager Industry-standard imaging tool

Forensic Certificate Requirements

Information Details
Device details Make, model, serial number
Imaging method Software used, hash algorithm
Hash values Pre- and post-imaging hashes
Chain of custody Who handled device when
Analysis tools Software versions used
Examiner qualifications Certification, experience

8. Exceptions and Alternatives

When Certificate Not Required

Scenario Basis
Original device produced Anwar P.V. exception
Admission by parties Evidence admitted under Order X CPC
Secondary evidence admitted Court's discretion under Section 65

Alternative Proof Methods

Method Application
Examination of witnesses Corroborate electronic evidence
Cross-examination Challenge authenticity
Expert testimony Forensic examiner explains evidence
Judicial notice Of well-known facts

9. Special Categories of Evidence

IoT and Smart Devices

Device Evidence Type
Smart home Activity logs, voice recordings
Wearables Health data, location tracking
Connected cars Telemetry, GPS, diagnostics
Smart meters Energy consumption data

Challenge: Who issues certificate for manufacturer's cloud systems?

AI-Generated Evidence

Type Consideration
Automated reports Certificate for AI system
Predictive analytics Explain algorithm
Machine learning output Training data, model version
Chatbot logs Conversation records

Challenge: Transparency of AI decision-making process.

Blockchain Records

Element Requirement
Distributed ledger Certificate for node/wallet
Smart contracts Code execution logs
Cryptocurrency transactions Blockchain explorer evidence
NFTs Token metadata

Challenge: Decentralized nature - no single "in-charge" person.

10. International Evidence

Cross-Border Challenges

Issue Solution
Foreign servers Mutual Legal Assistance Treaty (MLAT)
Service provider abroad Letters rogatory
Data localization Local copy with certificate
Conflicting laws International cooperation frameworks

Cloud Service Providers

Provider Jurisdiction Process
Google USA Legal process via Google
Microsoft USA Microsoft law enforcement portal
Amazon AWS USA AWS legal team
Domestic clouds India Direct certificate request

11. Defenses Against Electronic Evidence

Challenging Admissibility

Ground Argument
No certificate Non-compliance with Section 65B(4)
Improper certificate Issuer not "in-charge"
Incomplete certificate Missing mandatory particulars
Tampered evidence No hash values, broken chain of custody

Challenging Authenticity

Ground Argument
Fabrication Screenshots can be faked
Alteration Metadata inconsistencies
Misattribution IP address doesn't prove identity
Hearsay Cannot cross-examine computer

12. Best Practices for Organizations

Preserving Evidence

Practice Purpose
Document retention policy Systematic evidence preservation
Backup systems Prevent data loss
Access logs Who accessed what when
Audit trails Track all changes
Write-once media Prevent alteration

Certificate Preparedness

Step Action
Identify person Designate "person in-charge"
System documentation Maintain computer system records
Regular operations log Prove conditions 65B(2)(a)-(d)
Template certificates Pre-draft for common evidence types
Training Educate IT staff on requirements

13. Litigation Strategy

For Prosecution/Plaintiff

Step Action
Early identification List all electronic evidence
Certificate procurement Obtain before trial
Backup authentication Witness testimony + expert
Anticipate challenges Prepare for admissibility objections

For Defense

Step Action
Scrutinize certificate Check compliance with Section 65B(4)
Challenge authenticity Metadata analysis, tampering allegations
Cross-examination Question certificate issuer
Alternative explanations Contest interpretation of evidence

14. Compliance Checklist

For Admitting Electronic Evidence

  • Identify all electronic records to be used
  • Determine if original device can be produced (Anwar P.V. exception)
  • If not, identify person "in-charge" of computer
  • Prepare Section 65B(4) certificate with all mandatory contents
  • Ensure certificate describes four 65B(2) conditions
  • Include particulars of computer system
  • Have certificate signed by authorized person
  • File certificate with evidence at appropriate stage
  • Prepare witness (certificate issuer) for testimony
  • Maintain chain of custody documentation

For Challenging Electronic Evidence

  • Review certificate for compliance with Section 65B(4)
  • Verify issuer is "person in-charge"
  • Check all four conditions of Section 65B(2) addressed
  • Examine for tampering or alteration
  • Analyze metadata for inconsistencies
  • Prepare cross-examination of certificate issuer
  • Consider expert testimony on forensic issues
  • File admissibility objections timely

15. Key Takeaways for Practitioners

  1. Certificate Mandatory: Section 65B(4) certificate required for electronic records (Arjun Panditrao).

  2. Four Conditions: Certificate must state all four Section 65B(2) conditions satisfied.

  3. Original Device Exception: No certificate needed if original device produced in court (Anwar P.V.).

  4. Person In-Charge: Certificate must be from person lawfully in-charge of computer.

  5. No Oral Substitute: Witness testimony cannot replace certificate requirement.

  6. Cloud Challenge: Cloud-stored data requires certificate from service provider.

  7. Forensic Evidence: Separate certificates for imaging, analysis, and extraction.

  8. Early Preparation: Obtain certificates before trial - cannot be procured after objection raised.

Conclusion

Section 65B of the Indian Evidence Act establishes strict requirements for admissibility of electronic records, mandating a certificate that verifies the reliability of the computer system producing the evidence. The Supreme Court's rulings in Arjun Panditrao and Anwar P.V. clarify that while certificates are generally mandatory, they are not required when the original device itself is produced. Practitioners must carefully comply with Section 65B(4) requirements, including identifying the person in-charge and ensuring all four conditions are addressed. As digital evidence becomes ubiquitous, proper understanding and application of Section 65B is essential for successful litigation.

Written by
Veritect. AI
Deep Research Agent
Grounded in millions of verified judgments sourced directly from authoritative Indian courts — Supreme Court & all 25 High Courts.
About Veritect

AI research & drafting, purpose-built for Indian litigation.

Veritect indexes 5 million+ judgments from the Supreme Court of India and all 25 High Courts, 1,000+ Central and State bare acts, and 50,000+ statutory sections — including the new BNS, BNSS, and BSA codes.

Built for Indian courts. Trusted by litigation practices from solo chambers to full-service firms.

Try Veritect free