Executive Summary
Section 65B of the Indian Evidence Act, 1872 governs the admissibility of electronic records as evidence in legal proceedings, establishing strict procedural requirements:
- Certificate requirement: Electronic records need Section 65B(4) certificate for admissibility
- Computer output: Any information stored/processed in computer form
- Certificate contents: Four mandatory conditions under Section 65B(4)
- Supreme Court precedent: Arjun Panditrao (2019) - certificate mandatory, no exceptions
- Exceptions: Anwar P.V. (2020) - certificate not required if original device produced
- Practical challenges: Voluminous data, cloud storage, encryption
- Emerging issues: IoT, AI-generated evidence, blockchain records
This guide examines the Section 65B framework and admissibility requirements for digital evidence.
1. Statutory Framework
Section 65B - Admissibility of Electronic Records
| Element |
Requirement |
| Applicability |
Any information in electronic form |
| Presumption |
Electronic record deemed document |
| Admissibility |
Subject to Section 65B conditions |
| Certificate |
Section 65B(4) certificate required |
| Proof |
Satisfies conditions = deemed authentic |
What Constitutes "Electronic Record"
| Type |
Examples |
| Emails |
Correspondence, attachments |
| Text messages |
SMS, WhatsApp, Telegram |
| Social media |
Posts, comments, messages |
| Documents |
PDFs, Word files, spreadsheets |
| Audio/Video |
Recordings, CCTV footage |
| Images |
Photographs, screenshots |
| Logs |
Server logs, access logs, transaction logs |
| Databases |
Structured data records |
| Websites |
Web pages, online content |
2. Section 65B(2) Conditions
Four Mandatory Conditions
| Condition |
Requirement |
| 65B(2)(a) |
Computer regularly used to store/process information |
| 65B(2)(b) |
Information regularly fed during relevant period |
| 65B(2)(c) |
Computer operating properly (or malfunctions not affecting output) |
| 65B(2)(d) |
Information derived from computer in ordinary course |
Purpose of Conditions
| Condition |
Purpose |
| Regular use |
Establishes reliability of computer system |
| Regular feeding |
Confirms systematic data entry |
| Proper operation |
Ensures accuracy of output |
| Ordinary course |
Shows standard business practice |
3. Section 65B(4) Certificate
Mandatory Certificate Contents
| Requirement |
Description |
| 1. Identify electronic record |
Describe the document/data produced |
| 2. Describe computer |
Computer used to produce the record |
| 3. State conditions met |
All four Section 65B(2) conditions satisfied |
| 4. Provide particulars |
Device details, storage, retrieval method |
Who Can Issue Certificate
| Person |
Qualification |
| In-charge of computer |
Responsible person (Section 65B(4)) |
| Lawful control |
Person having lawful control over use of computer |
| Examples |
IT manager, system administrator, business owner |
| Not required |
Formal title - functional control sufficient |
CERTIFICATE UNDER SECTION 65B(4) OF INDIAN EVIDENCE ACT, 1872
I, [Name], [Designation], aged [X] years, working at [Organization], do hereby certify that:
1. The electronic record containing [description of document/data] is produced from computer system regularly used by [organization] for [purpose].
2. The computer system comprises [hardware details, servers, storage devices].
3. During the material period, the computer was used regularly to store and process information of the kind contained in the electronic record.
4. During the material period, information of the kind contained in the electronic record was regularly fed into the computer in the ordinary course of its activities.
5. Throughout the material period, the computer was operating properly, or if not, any malfunctions did not affect the accuracy of the electronic record or the information contained therein.
6. The electronic record was produced by the computer during the ordinary course of its activities.
Date: [Date]
Place: [Place]
[Signature]
[Name and Designation]
4. Supreme Court Precedents
Arjun Panditrao v. State of Maharashtra (2019)
3-Judge Bench Decision
| Aspect |
Ruling |
| Certificate mandatory |
Yes, without exception |
| No oral evidence |
Cannot substitute for certificate |
| Overruled precedents |
Shafhi Mohammad, State of Delhi cases |
| Strict interpretation |
No judicial discretion to waive |
Anwar P.V. v. P.K. Basheer (2020)
3-Judge Bench Clarification
| Aspect |
Ruling |
| Original device exception |
Certificate not needed if device itself produced in court |
| Examples |
Mobile phone, laptop, hard drive |
| Rationale |
Section 65B is for copies/printouts, not originals |
| Practical limitation |
Difficult for cloud-stored data |
Key Differences
| Scenario |
Certificate Required? |
| Printout of email |
Yes (Arjun Panditrao) |
| Screenshot of WhatsApp |
Yes |
| Mobile phone produced |
No (Anwar P.V. - original device) |
| Hard drive produced |
No (original device) |
| Cloud data printout |
Yes (cannot produce "original") |
5. Practical Challenges
Challenge 1: Voluminous Data
| Issue |
Solution |
| Thousands of pages |
Summary certificate for entire dataset |
| Multiple systems |
Separate certificates per system |
| Consolidated data |
Certificate for integrated system |
Challenge 2: Cloud Storage
| Issue |
Solution |
| No physical device |
Certificate from cloud service provider |
| Third-party servers |
Formal request to service provider |
| Foreign servers |
International legal assistance |
| Encrypted data |
Certificate for decrypted output |
| Issue |
Solution |
| Platform ownership |
Certificate from Facebook, Twitter, etc. |
| Practical unavailability |
Court summons to platform |
| Screenshots |
Certificate from user's device |
| Archived pages |
Notarized web archiving services |
Challenge 4: Law Enforcement Evidence
| Issue |
Solution |
| Seized devices |
Forensic examiner's certificate |
| Hash values |
Certificate for forensic image |
| Chain of custody |
Multiple certificates tracking transfer |
6. Types of Digital Evidence
Email Evidence
| Element |
Requirement |
| Printout |
Section 65B certificate |
| Email server |
Certificate from IT admin |
| Headers |
Full headers for authentication |
| Attachments |
Separate certificate if different system |
WhatsApp/Text Messages
| Element |
Requirement |
| Screenshots |
Certificate from phone owner |
| Chat export |
Certificate for export file |
| Phone produced |
No certificate (Anwar P.V. exception) |
| Verification |
Sender/receiver phone numbers |
| Element |
Requirement |
| DVR/NVR |
Certificate from security officer |
| Timestamp |
Verification of system time accuracy |
| Unaltered |
Certificate of no tampering |
| Chain of custody |
Storage and transfer records |
Website Evidence
| Element |
Requirement |
| Screenshots |
Certificate from user's computer |
| Archived page |
Certificate from archiving service |
| Web scraping |
Certificate from scraping tool system |
| Metadata |
URL, timestamp, IP address |
7. Forensic Evidence
Digital Forensic Process
| Stage |
Section 65B Requirement |
| 1. Seizure |
Document device details |
| 2. Imaging |
Certificate for forensic image (hash verified) |
| 3. Analysis |
Certificate for analysis tools/workstation |
| 4. Extraction |
Certificate for extracted data |
| 5. Reporting |
Certificate for final report data |
Hash Values and Integrity
| Tool |
Purpose |
| MD5 |
Generate unique fingerprint |
| SHA-256 |
More secure hash algorithm |
| Write blockers |
Prevent alteration during imaging |
| FTK Imager |
Industry-standard imaging tool |
Forensic Certificate Requirements
| Information |
Details |
| Device details |
Make, model, serial number |
| Imaging method |
Software used, hash algorithm |
| Hash values |
Pre- and post-imaging hashes |
| Chain of custody |
Who handled device when |
| Analysis tools |
Software versions used |
| Examiner qualifications |
Certification, experience |
8. Exceptions and Alternatives
When Certificate Not Required
| Scenario |
Basis |
| Original device produced |
Anwar P.V. exception |
| Admission by parties |
Evidence admitted under Order X CPC |
| Secondary evidence admitted |
Court's discretion under Section 65 |
Alternative Proof Methods
| Method |
Application |
| Examination of witnesses |
Corroborate electronic evidence |
| Cross-examination |
Challenge authenticity |
| Expert testimony |
Forensic examiner explains evidence |
| Judicial notice |
Of well-known facts |
9. Special Categories of Evidence
IoT and Smart Devices
| Device |
Evidence Type |
| Smart home |
Activity logs, voice recordings |
| Wearables |
Health data, location tracking |
| Connected cars |
Telemetry, GPS, diagnostics |
| Smart meters |
Energy consumption data |
Challenge: Who issues certificate for manufacturer's cloud systems?
AI-Generated Evidence
| Type |
Consideration |
| Automated reports |
Certificate for AI system |
| Predictive analytics |
Explain algorithm |
| Machine learning output |
Training data, model version |
| Chatbot logs |
Conversation records |
Challenge: Transparency of AI decision-making process.
Blockchain Records
| Element |
Requirement |
| Distributed ledger |
Certificate for node/wallet |
| Smart contracts |
Code execution logs |
| Cryptocurrency transactions |
Blockchain explorer evidence |
| NFTs |
Token metadata |
Challenge: Decentralized nature - no single "in-charge" person.
10. International Evidence
Cross-Border Challenges
| Issue |
Solution |
| Foreign servers |
Mutual Legal Assistance Treaty (MLAT) |
| Service provider abroad |
Letters rogatory |
| Data localization |
Local copy with certificate |
| Conflicting laws |
International cooperation frameworks |
Cloud Service Providers
| Provider |
Jurisdiction |
Process |
| Google |
USA |
Legal process via Google |
| Microsoft |
USA |
Microsoft law enforcement portal |
| Amazon AWS |
USA |
AWS legal team |
| Domestic clouds |
India |
Direct certificate request |
11. Defenses Against Electronic Evidence
Challenging Admissibility
| Ground |
Argument |
| No certificate |
Non-compliance with Section 65B(4) |
| Improper certificate |
Issuer not "in-charge" |
| Incomplete certificate |
Missing mandatory particulars |
| Tampered evidence |
No hash values, broken chain of custody |
Challenging Authenticity
| Ground |
Argument |
| Fabrication |
Screenshots can be faked |
| Alteration |
Metadata inconsistencies |
| Misattribution |
IP address doesn't prove identity |
| Hearsay |
Cannot cross-examine computer |
12. Best Practices for Organizations
Preserving Evidence
| Practice |
Purpose |
| Document retention policy |
Systematic evidence preservation |
| Backup systems |
Prevent data loss |
| Access logs |
Who accessed what when |
| Audit trails |
Track all changes |
| Write-once media |
Prevent alteration |
Certificate Preparedness
| Step |
Action |
| Identify person |
Designate "person in-charge" |
| System documentation |
Maintain computer system records |
| Regular operations log |
Prove conditions 65B(2)(a)-(d) |
| Template certificates |
Pre-draft for common evidence types |
| Training |
Educate IT staff on requirements |
13. Litigation Strategy
For Prosecution/Plaintiff
| Step |
Action |
| Early identification |
List all electronic evidence |
| Certificate procurement |
Obtain before trial |
| Backup authentication |
Witness testimony + expert |
| Anticipate challenges |
Prepare for admissibility objections |
For Defense
| Step |
Action |
| Scrutinize certificate |
Check compliance with Section 65B(4) |
| Challenge authenticity |
Metadata analysis, tampering allegations |
| Cross-examination |
Question certificate issuer |
| Alternative explanations |
Contest interpretation of evidence |
14. Compliance Checklist
For Admitting Electronic Evidence
For Challenging Electronic Evidence
15. Key Takeaways for Practitioners
Certificate Mandatory: Section 65B(4) certificate required for electronic records (Arjun Panditrao).
Four Conditions: Certificate must state all four Section 65B(2) conditions satisfied.
Original Device Exception: No certificate needed if original device produced in court (Anwar P.V.).
Person In-Charge: Certificate must be from person lawfully in-charge of computer.
No Oral Substitute: Witness testimony cannot replace certificate requirement.
Cloud Challenge: Cloud-stored data requires certificate from service provider.
Forensic Evidence: Separate certificates for imaging, analysis, and extraction.
Early Preparation: Obtain certificates before trial - cannot be procured after objection raised.
Conclusion
Section 65B of the Indian Evidence Act establishes strict requirements for admissibility of electronic records, mandating a certificate that verifies the reliability of the computer system producing the evidence. The Supreme Court's rulings in Arjun Panditrao and Anwar P.V. clarify that while certificates are generally mandatory, they are not required when the original device itself is produced. Practitioners must carefully comply with Section 65B(4) requirements, including identifying the person in-charge and ensuring all four conditions are addressed. As digital evidence becomes ubiquitous, proper understanding and application of Section 65B is essential for successful litigation.