Cyber Law Academy
Part 14.9

Practical Tools and Resources

"व्यावहारिक साधने आणि संसाधने - Cyber Law Practice Toolkit"

Essential online resources, government portals, forensic tools, legal databases, checklists, and templates for cyber law practice in Maharashtra.

9.1

Government Portals

Essential Government Websites
PortalURLPurpose
National Cyber Crime Portalcybercrime.gov.inReport cyber crimes; track complaints
Maharashtra Policemahapolice.gov.inState police info; FIR status
Maharashtra Cybercitizen.mahapolice.gov.inCyber crime reporting
MCA Portalmca.gov.inCompany information; director search
CERT-Incert-in.org.inAdvisories; incident reporting
Bombay High Courtbombayhighcourt.nic.inCase status; judgments
E-Courtsecourts.gov.inCNR search; case status nationwide
India Codeindiacode.nic.inCentral and state laws
Helplines
ServiceNumberAvailability
Cyber Crime Helpline193024x7
Police Emergency10024x7
Women Helpline18124x7
Child Helpline109824x7
Maharashtra Cyber022-22630829Office hours
RBI Ombudsman14448Banking fraud
9.2

Legal Research Resources

Supreme Court of India

Official SC portal with judgments

main.sci.gov.in

Indian Kanoon

Free case law search engine

indiankanoon.org

SCC Online

Comprehensive legal database (paid)

scconline.com

Manupatra

Legal research platform (paid)

manupatra.com

Legitquest

AI-powered legal research

legitquest.com

Bar and Bench

Legal news and analysis

barandbench.com
OSINT Tools for Lawyers

Domain/IP Investigation:

- whois.domaintools.com - Domain ownership

- who.is - WHOIS lookup

- dnschecker.org - DNS records

- mxtoolbox.com - Email server lookup

Social Media:

- namechk.com - Username availability check

- web.archive.org - Wayback Machine (deleted content)

- socialsearcher.com - Social media search

Company Information:

- zaubacorp.com - Company data

- tofler.in - Financial data

- companycheck.in - Director search

Note: OSINT tools for legitimate legal research only

9.3

Evidence Preservation Tools

Screenshot and Web Archiving
ToolPurposeLegal Value
Web Archiveweb.archive.orgHistorical snapshots; evidence of past content
Archive.todayarchive.phSnapshot preservation
HunchlyWeb capture toolAutomatic timestamping; hash values
ScreenpressoScreenshot with metadataIncludes timestamp
Browser PrintPrint to PDFShows URL and date

Best Practice:

1. Take screenshot showing full URL and timestamp

2. Save page as PDF or print

3. Archive on archive.org or archive.ph

4. Note hash value if possible

5. Document in a contemporaneous note

Hash Value Verification

What is Hash:

- Digital fingerprint of file

- Any change = different hash

- Proves file integrity

Common Algorithms:

- MD5 (weaker, still common)

- SHA-1 (deprecated)

- SHA-256 (recommended)

Tools:

- certutil (Windows built-in)

- md5sum/sha256sum (Linux)

- HashCalc, HashMyFiles (GUI tools)

Command (Windows):

certutil -hashfile filename.pdf SHA256

9.4

Practice Checklists

New Cyber Crime Case Checklist

Initial Client Meeting:

[ ] Complete KYC of client

[ ] Detailed incident description

[ ] Timeline of events

[ ] Financial loss quantification

[ ] Collect all evidence (screenshots, emails, messages)

[ ] List potential witnesses

[ ] Check limitation period

Case Analysis:

[ ] Identify applicable sections (IT Act, BNS, Special Laws)

[ ] Determine jurisdiction

[ ] Check if cognizable/non-cognizable

[ ] Assess strength of evidence

[ ] Identify technical requirements

Action Plan:

[ ] Draft FIR/complaint

[ ] Preserve evidence (hash values, archives)

[ ] File complaint (NCRP/Police Station)

[ ] Follow up for FIR copy

[ ] Track investigation progress

Defense Case Checklist

Initial Steps:

[ ] Obtain FIR copy

[ ] Study charges and evidence

[ ] Verify arrest is legal

[ ] Apply for bail immediately if arrested

[ ] Get copies of seized device list

Case Building:

[ ] Analyze technical evidence

[ ] Check chain of custody

[ ] Identify forensic examination gaps

[ ] Gather alibi evidence

[ ] Identify defense witnesses

Court Proceedings:

[ ] File vakalatnama

[ ] Apply for regular bail if on police custody

[ ] Object to chargesheet deficiencies

[ ] Challenge electronic evidence admissibility

[ ] Cross-examine technical witnesses effectively

9.5

Template Documents

Engagement Letter Template - Key Clauses

1. Parties: Full names and addresses

2. Scope:

"This engagement covers legal representation in [matter description] before [forum]. Specifically included: [list]. Specifically excluded: [list]."

3. Fees:

"Professional fees: Rs. [amount] for [scope]. Payment terms: [advance/milestones]. Additional charges: [specify]. GST: 18% additional."

4. Expenses:

"Client shall reimburse: court fees, travel, accommodation, courier, forensic expert fees at actuals with prior approval for amounts exceeding Rs. [limit]."

5. Confidentiality:

"All information shared shall be confidential. Exceptions: court disclosure, statutory requirements, client consent."

6. Termination:

"Either party may terminate with [30 days] written notice. Outstanding fees payable within [15 days]. Client files returned within [30 days]."

Section 65B Certificate Template

Certificate under Section 65B Indian Evidence Act

(For computer output admissibility)

I, [Name], [Designation], hereby certify that:

1. The electronic record produced herewith is the output of computer system described below:

[Computer/Device details]

2. The electronic record was produced by the computer during the period over which the computer was used regularly to store/process information for purposes of activities regularly carried on.

3. During the said period, information of the kind contained in the electronic record was regularly fed into the computer in the ordinary course of said activities.

4. Throughout the material part of said period, the computer was operating properly. [If not, state nature of defect and how it did not affect accuracy.]

5. The information contained in the electronic record reproduces/is derived from information supplied to the computer in the ordinary course of said activities.

Date: [Date]

Place: [Place]

Signature: ___________

Name and Designation: [Details]

9.6

Professional Development

Continuing Education Resources
ResourceTypeFocus
NALSAR, HyderabadCertificate courseCyber law programs
NLSIU, BangaloreCertificate/DiplomaIT and cyber law
Asian School of Cyber LawsCertificate programsCyber law specialization
DSCICertificationsData protection
ISACAInternational certsCISA, CISM
EC-CouncilTechnical certsCEH, CHFI
Professional Associations

Maharashtra:

- Bombay Bar Association

- Advocates Association of Western India

- Pune District Bar Association

- Maharashtra and Goa Bar Council

National/Specialization:

- Cyber Law Association

- Indian Legal Tech Association

- NASSCOM (for industry connects)

- DSCI (Data Security Council of India)

Benefits:

- Networking opportunities

- CLE credits

- Referral network

- Updates on law changes

- Conference participation

9.7

Quick Reference

Important Timelines
ItemTimelineReference
FIR CopyImmediatelyBNSS 173
Production after arrest24 hoursArticle 22
Police custody max15 daysBNSS 187
Chargesheet (normal)60/90 daysBNSS 193
CERT-In incident report6 hoursCERT-In 2022
Data breach notification72 hours (DPDPA)DPDPA 2023
Anticipatory bailBefore arrestBNSS 482
Regular bail applicationAfter arrestBNSS 480
Common IT Act Penalties
SectionOffencePunishment
66Computer related offences3 years + Rs. 5 lakh
66CIdentity theft3 years + Rs. 1 lakh
66DCheating by personation3 years + Rs. 1 lakh
66EPrivacy violation3 years + Rs. 2 lakh
66FCyber terrorismLife imprisonment
67Obscene material3/5 years + Rs. 5/10 lakh
67ASexually explicit5/7 years + Rs. 10 lakh
67BChild pornography5/7 years + Rs. 10 lakh

Key Points - Part 14.9