"व्यावहारिक साधने आणि संसाधने - Cyber Law Practice Toolkit"
Essential online resources, government portals, forensic tools, legal databases, checklists, and templates for cyber law practice in Maharashtra.
| Portal | URL | Purpose |
|---|---|---|
| National Cyber Crime Portal | cybercrime.gov.in | Report cyber crimes; track complaints |
| Maharashtra Police | mahapolice.gov.in | State police info; FIR status |
| Maharashtra Cyber | citizen.mahapolice.gov.in | Cyber crime reporting |
| MCA Portal | mca.gov.in | Company information; director search |
| CERT-In | cert-in.org.in | Advisories; incident reporting |
| Bombay High Court | bombayhighcourt.nic.in | Case status; judgments |
| E-Courts | ecourts.gov.in | CNR search; case status nationwide |
| India Code | indiacode.nic.in | Central and state laws |
| Service | Number | Availability |
|---|---|---|
| Cyber Crime Helpline | 1930 | 24x7 |
| Police Emergency | 100 | 24x7 |
| Women Helpline | 181 | 24x7 |
| Child Helpline | 1098 | 24x7 |
| Maharashtra Cyber | 022-22630829 | Office hours |
| RBI Ombudsman | 14448 | Banking fraud |
Domain/IP Investigation:
- whois.domaintools.com - Domain ownership
- who.is - WHOIS lookup
- dnschecker.org - DNS records
- mxtoolbox.com - Email server lookup
Social Media:
- namechk.com - Username availability check
- web.archive.org - Wayback Machine (deleted content)
- socialsearcher.com - Social media search
Company Information:
- zaubacorp.com - Company data
- tofler.in - Financial data
- companycheck.in - Director search
Note: OSINT tools for legitimate legal research only
| Tool | Purpose | Legal Value |
|---|---|---|
| Web Archive | web.archive.org | Historical snapshots; evidence of past content |
| Archive.today | archive.ph | Snapshot preservation |
| Hunchly | Web capture tool | Automatic timestamping; hash values |
| Screenpresso | Screenshot with metadata | Includes timestamp |
| Browser Print | Print to PDF | Shows URL and date |
Best Practice:
1. Take screenshot showing full URL and timestamp
2. Save page as PDF or print
3. Archive on archive.org or archive.ph
4. Note hash value if possible
5. Document in a contemporaneous note
What is Hash:
- Digital fingerprint of file
- Any change = different hash
- Proves file integrity
Common Algorithms:
- MD5 (weaker, still common)
- SHA-1 (deprecated)
- SHA-256 (recommended)
Tools:
- certutil (Windows built-in)
- md5sum/sha256sum (Linux)
- HashCalc, HashMyFiles (GUI tools)
Command (Windows):
certutil -hashfile filename.pdf SHA256
Initial Client Meeting:
[ ] Complete KYC of client
[ ] Detailed incident description
[ ] Timeline of events
[ ] Financial loss quantification
[ ] Collect all evidence (screenshots, emails, messages)
[ ] List potential witnesses
[ ] Check limitation period
Case Analysis:
[ ] Identify applicable sections (IT Act, BNS, Special Laws)
[ ] Determine jurisdiction
[ ] Check if cognizable/non-cognizable
[ ] Assess strength of evidence
[ ] Identify technical requirements
Action Plan:
[ ] Draft FIR/complaint
[ ] Preserve evidence (hash values, archives)
[ ] File complaint (NCRP/Police Station)
[ ] Follow up for FIR copy
[ ] Track investigation progress
Initial Steps:
[ ] Obtain FIR copy
[ ] Study charges and evidence
[ ] Verify arrest is legal
[ ] Apply for bail immediately if arrested
[ ] Get copies of seized device list
Case Building:
[ ] Analyze technical evidence
[ ] Check chain of custody
[ ] Identify forensic examination gaps
[ ] Gather alibi evidence
[ ] Identify defense witnesses
Court Proceedings:
[ ] File vakalatnama
[ ] Apply for regular bail if on police custody
[ ] Object to chargesheet deficiencies
[ ] Challenge electronic evidence admissibility
[ ] Cross-examine technical witnesses effectively
1. Parties: Full names and addresses
2. Scope:
"This engagement covers legal representation in [matter description] before [forum]. Specifically included: [list]. Specifically excluded: [list]."
3. Fees:
"Professional fees: Rs. [amount] for [scope]. Payment terms: [advance/milestones]. Additional charges: [specify]. GST: 18% additional."
4. Expenses:
"Client shall reimburse: court fees, travel, accommodation, courier, forensic expert fees at actuals with prior approval for amounts exceeding Rs. [limit]."
5. Confidentiality:
"All information shared shall be confidential. Exceptions: court disclosure, statutory requirements, client consent."
6. Termination:
"Either party may terminate with [30 days] written notice. Outstanding fees payable within [15 days]. Client files returned within [30 days]."
Certificate under Section 65B Indian Evidence Act
(For computer output admissibility)
I, [Name], [Designation], hereby certify that:
1. The electronic record produced herewith is the output of computer system described below:
[Computer/Device details]
2. The electronic record was produced by the computer during the period over which the computer was used regularly to store/process information for purposes of activities regularly carried on.
3. During the said period, information of the kind contained in the electronic record was regularly fed into the computer in the ordinary course of said activities.
4. Throughout the material part of said period, the computer was operating properly. [If not, state nature of defect and how it did not affect accuracy.]
5. The information contained in the electronic record reproduces/is derived from information supplied to the computer in the ordinary course of said activities.
Date: [Date]
Place: [Place]
Signature: ___________
Name and Designation: [Details]
| Resource | Type | Focus |
|---|---|---|
| NALSAR, Hyderabad | Certificate course | Cyber law programs |
| NLSIU, Bangalore | Certificate/Diploma | IT and cyber law |
| Asian School of Cyber Laws | Certificate programs | Cyber law specialization |
| DSCI | Certifications | Data protection |
| ISACA | International certs | CISA, CISM |
| EC-Council | Technical certs | CEH, CHFI |
Maharashtra:
- Bombay Bar Association
- Advocates Association of Western India
- Pune District Bar Association
- Maharashtra and Goa Bar Council
National/Specialization:
- Cyber Law Association
- Indian Legal Tech Association
- NASSCOM (for industry connects)
- DSCI (Data Security Council of India)
Benefits:
- Networking opportunities
- CLE credits
- Referral network
- Updates on law changes
- Conference participation
| Item | Timeline | Reference |
|---|---|---|
| FIR Copy | Immediately | BNSS 173 |
| Production after arrest | 24 hours | Article 22 |
| Police custody max | 15 days | BNSS 187 |
| Chargesheet (normal) | 60/90 days | BNSS 193 |
| CERT-In incident report | 6 hours | CERT-In 2022 |
| Data breach notification | 72 hours (DPDPA) | DPDPA 2023 |
| Anticipatory bail | Before arrest | BNSS 482 |
| Regular bail application | After arrest | BNSS 480 |
| Section | Offence | Punishment |
|---|---|---|
| 66 | Computer related offences | 3 years + Rs. 5 lakh |
| 66C | Identity theft | 3 years + Rs. 1 lakh |
| 66D | Cheating by personation | 3 years + Rs. 1 lakh |
| 66E | Privacy violation | 3 years + Rs. 2 lakh |
| 66F | Cyber terrorism | Life imprisonment |
| 67 | Obscene material | 3/5 years + Rs. 5/10 lakh |
| 67A | Sexually explicit | 5/7 years + Rs. 10 lakh |
| 67B | Child pornography | 5/7 years + Rs. 10 lakh |