Digital evidence no longer plays
a supporting role in Indian investigations - it defines outcomes. From
mobile phones and CCTV footage to emails, cloud logs, and social media content,
courts today rely heavily on electronic records. But reliance alone is not
enough. What matters is how that evidence is collected, preserved, examined,
and certified.
With the Bharatiya Sakshya
Adhiniyam (BSA) replacing the Indian Evidence Act, the spotlight has
shifted firmly onto Section 63(4)(c) - the provision that governs certification
of electronic evidence. For investigators, enterprises, and litigators,
this section is not a procedural formality. It is the difference between evidence
that convinces and evidence that collapses under cross-examination.
This blog unpacks Section 63(4)(c) from a forensic examiner’s perspective, explains what courts expect today, and shows why professional digital and multimedia forensic certification has become indispensable.
Under the earlier regime, electronic evidence frequently
failed in court—not because it was irrelevant, but because it was poorly
certified. Screenshots without provenance, pen drives without integrity
checks, videos without authentication—these gaps gave defence teams ample room
to challenge admissibility.
Section 63(4)(c) BSA tightens the framework.
In simple terms, it requires that electronic records
produced as evidence must be accompanied by a proper certificate,
confirming:
From a forensic standpoint, this is not paperwork. It is a technical declaration backed by methodology.
Many assume certification is about signing a document. In
reality, courts examine the process behind the certificate.
Here’s what judges and opposing counsel typically probe:
Source authenticity
Chain of custody
Integrity validation
Examiner competence
Unlike physical evidence, digital and multimedia artefacts
are easily altered - often unintentionally.
Consider common scenarios seen in investigations:
From a forensic lens, these actions change artefact
behaviour, metadata, or encoding structure—making certification under
Section 63(4)(c) vulnerable.
Professional multimedia forensics addresses this by:
Courts value this honesty far more than over-confident claims.
(c)+BSA/63(4)(c)+BSA+Certificate+for+forensic+evidence.webp)
This is where many cases stumble.
The law allows certification by a person occupying a
responsible official position related to the operation of the device or
system. But in contested matters, courts increasingly favour certificates
issued by independent forensic experts.
Why?
Because a forensic examiner can:
For enterprises, banks, law firms, and government agencies, relying on internal IT teams alone is a growing risk - especially in high-value or criminal litigation.
Forensic workflow aligned with Section 63(4)(c)
From a practitioner’s standpoint, compliant certification
follows a disciplined workflow:
This is the foundation of court-ready digital evidence.
Digital evidence must now meet forensic standards, not convenience
standards.
This has direct implications for:
In all these cases, uncertified or poorly certified
electronic records are no longer “conditionally acceptable.” They are actively
questioned.
If you are responsible for evidence, compliance, or
litigation readiness, these are the questions you should be asking (and
searching):
These are not future concerns. They are current legal risks.
Where Proaxis Solutions fits in
At Proaxis Solutions, digital and multimedia forensics is not treated as a technical service—it is treated as legal enablement.
Our forensic teams work with:
If the answer is not a confident yes, the process is re-examined.
Certified electronic evidence under Section 63(4)(c) of the
Bharatiya Sakshya Adhiniyam refers to digital records that are accompanied
by a formal certificate confirming their authenticity, source, and integrity.
The certification verifies how the electronic record was produced, the device
or system involved, and confirms that the data has not been altered, making it admissible
in Indian courts.
A Section 63(4)(c) certificate can be issued by a person
in a responsible official position related to the operation or management
of the device or system that produced the electronic record. In contested or
high-risk cases, independent digital forensic experts are preferred, as
they can technically justify the extraction, analysis, and integrity of the
evidence during cross-examination.
Forensic examination is not explicitly mandatory, but in
practice, courts increasingly expect electronic evidence to be supported by
forensic procedures. Digital forensics ensures proper acquisition, hash
verification, chain of custody, and technical documentation—elements that
significantly strengthen the validity of a Section 63(4)(c) certificate and
reduce the risk of evidence being challenged.
The Section 65B certificate under the Indian Evidence Act
has now been substantively replaced by Section 63(4)(c) of the Bharatiya
Sakshya Adhiniyam (BSA). While the legal intent remains the same -establishing
the authenticity and admissibility of electronic evidence - Section 63(4)(c)
expands the focus to include forensic integrity, system reliability, and
accurate reproduction of electronic records. This shift reflects modern digital
forensics practices and places greater emphasis on proper acquisition, hash
validation, and expert-backed certification rather than mere procedural
compliance.
Courts may reject electronic evidence even with a Section
63(4)(c) certificate if there are gaps in chain of custody, missing hash
values, unclear acquisition methods, or lack of forensic documentation.
Certificates unsupported by proper digital or multimedia forensic examination
often fail under cross-examination, especially in cybercrime, fraud, and
commercial litigation cases.
Connect with Proaxis Solutions
If you need clarity on whether your electronic or multimedia
evidence is certified, compliant, and court-ready, connect with Proaxis Solutions to evaluate your evidence before it is tested in court.
© Copyright 2024 Proaxis Scitech Private Limited
Write a public review