📧 admissions@cyberlawacademy.com | 📞 +91-XXXXXXXXXX
🔗 Part 3 of 5

The Statutory Interplay Engine

Navigate the complex web of IT Act, BNS, BNSS, and BSA. Learn which law applies first, when provisions overlap, and how to choose the optimal statutory path for your client.

⏱️ ~100 minutes 📖 5 Sections 📊 4 Flowcharts 📝 10 Quiz Questions
Module 1 Progress 60% Complete
Part 1
Part 2
Part 3
Part 4
Part 5

3.1 The Four Pillars of Cyber Criminal Law

Post July 1, 2024, cyber criminal law in India rests on four interconnected statutes. Understanding their distinct domains — and crucial overlaps — is essential for effective practice.

💻
IT Act 2000
Information Technology Act
Ss. 43, 65-67B, 69-79
⚖️
BNS 2023
Bharatiya Nyaya Sanhita
358 Sections
📋
BNSS 2023
Bharatiya Nagarik Suraksha Sanhita
531 Sections
📁
BSA 2023
Bharatiya Sakshya Adhiniyam
170 Sections
15+
IT Act Cyber Offences
50+
BNS Computer-Related Sections
20+
BNSS Digital Procedures
8
BSA Electronic Evidence Sections
💡The Interplay Principle

These four statutes are not alternatives — they work together. A single cyber incident typically invokes: IT Act (specific offence), BNS (general offence elements), BNSS (procedure), and BSA (evidence). Mastering their interplay is the mark of a skilled cyber lawyer.

3.2 IT Act vs BNS: Which Law Applies?

The fundamental question: when a cyber offence could fall under both IT Act and BNS, which takes precedence? The answer lies in the principle of generalia specialibus non derogant — special law prevails over general law.

The Precedence Rule

⚖️Special vs General Law

IT Act is special law for computer-related offences. Where IT Act specifically covers conduct, it takes precedence over BNS general provisions. However, where IT Act is silent or the conduct has additional non-cyber elements, BNS applies.

Comparative Offence Mapping

OffenceIT Act ProvisionBNS ProvisionWhich Applies?
Hacking / Unauthorized Access Section 66 No direct equivalent IT Act S.66
Identity Theft (Cheating by Personation) Section 66C Section 319 (Cheating by personation) IT Act S.66C (specific to electronic identity)
Cyber Fraud / Phishing Section 66D Section 318 (Cheating), 319 IT Act S.66D + BNS for enhanced punishment
Online Defamation Section 356 (Defamation) BNS S.356 (IT Act silent)
Cyber Stalking Section 67 (if obscene) Section 78 (Stalking) Both may apply — BNS S.78 for stalking, IT Act if obscene content
Obscene Content Section 67 Section 294 (Obscene acts) IT Act S.67 (electronic medium specific)
Child Sexual Abuse Material Section 67B POCSO Act Both — IT Act S.67B + POCSO
Cyber Terrorism Section 66F Section 113 (Terrorist act) IT Act S.66F (specific) — can add BNS S.113
Data Theft (by Employee) Section 43, 66 Section 316 (Criminal breach of trust) IT Act for access + BNS for breach of trust element
Online Extortion / Ransomware Section 66 (damage) Section 308 (Extortion) Both — IT Act for cyber element, BNS S.308 for extortion
🔀 IT Act vs BNS Decision Flowchart
                    ┌─────────────────────────────────────┐
                    │   CYBER OFFENCE COMMITTED           │
                    └──────────────┬──────────────────────┘
                                   │
                                   ▼
                    ┌─────────────────────────────────────┐
                    │ Is there a SPECIFIC IT Act section  │
                    │ covering this exact conduct?        │
                    └──────────────┬──────────────────────┘
                           │               │
                          YES             NO
                           │               │
                           ▼               ▼
              ┌────────────────────┐  ┌────────────────────┐
              │ IT ACT APPLIES     │  │ BNS APPLIES        │
              │ (Special Law)      │  │ (General Law)      │
              └─────────┬──────────┘  └────────────────────┘
                        │
                        ▼
              ┌─────────────────────────────────────┐
              │ Does the conduct have ADDITIONAL    │
              │ non-cyber criminal elements?        │
              │ (e.g., extortion, breach of trust)  │
              └──────────────┬──────────────────────┘
                     │               │
                    YES             NO
                     │               │
                     ▼               ▼
        ┌────────────────────┐  ┌────────────────────┐
        │ BOTH APPLY         │  │ IT ACT ALONE       │
        │ IT Act + BNS       │  │ SUFFICIENT         │
        │ (Multiple charges) │  │                    │
        └────────────────────┘  └────────────────────┘
                    
⚖️Strategic Prosecution Tip

For prosecution: Charge under both IT Act and BNS where possible. If one charge fails, the other may succeed. For defence: Argue specificity — if IT Act covers the conduct, additional BNS charges may constitute multiplicity.

3.3 BNSS: The New Procedural Framework

BNSS 2023 (Bharatiya Nagarik Suraksha Sanhita) replaces the Code of Criminal Procedure, 1973. It introduces significant digital-era procedures that every cyber lawyer must master.

Key Section Mapping: CrPC → BNSS

CrPC S.154 BNSS S.173
First Information Report (FIR)
Now includes Zero FIR (mandatory) + electronic FIR permitted
CrPC S.157 BNSS S.176
Investigation Procedure
Mandatory forensics for 7+ year offences; videography required
CrPC S.167 BNSS S.187
Remand
15 days police custody; 60/90 days judicial custody limits
CrPC S.173 BNSS S.193
Chargesheet / Police Report
90-day timeline (extendable to 180 days)
CrPC S.41 BNSS S.35
Arrest Procedure
Enhanced documentation; reasons must be recorded
CrPC S.482 BNSS S.528
Inherent Powers of High Court
Quashing FIR; preventing abuse of process

BNSS Digital Provisions

ProvisionBNSS SectionKey FeaturePractice Implication
Zero FIR S.173 FIR at any station; transfer within 15 days File where convenient; jurisdiction determined later
Electronic FIR S.173(1) FIR via electronic means permitted Online complaint portals now legally valid
Mandatory Forensics S.176(3) Forensic team mandatory for 7+ year offences Defence: Challenge if forensics not done
Video Recording S.176 Search & seizure must be videographed No video = challenge seizure admissibility
Electronic Summons S.64 Summons via electronic means valid Email/SMS summons legally enforceable
Virtual Hearings S.532 Video conferencing for trials permitted Accused can appear virtually in some cases
⚠️Defence Strategy: Forensic Non-Compliance

Section 176(3) BNSS mandates forensic evidence collection for offences punishable with 7+ years imprisonment. Most serious cyber offences qualify. If prosecution fails to follow forensic protocols, argue: (1) Violation of mandatory procedure, (2) Adverse inference against prosecution, (3) Exclusion of evidence collected improperly.

3.4 BSA Section 63: Electronic Evidence Admissibility

BSA 2023 (Bharatiya Sakshya Adhiniyam) replaces the Indian Evidence Act, 1872. Section 63 (successor to S.65B) governs electronic evidence admissibility — the most litigated provision in cyber cases.

Section Transition: Evidence Act → BSA

Evidence Act S.65B BSA S.63
Electronic Records Admissibility
Certificate requirement continues; conditions refined
Evidence Act S.3 BSA S.2(1)(b)
Definition of "Document"
Includes electronic records explicitly
Evidence Act S.22A BSA S.23
Oral Admissions re: Electronic Records
Relevancy of electronic record admissions

BSA Section 63: Four Conditions

For electronic evidence to be admissible under Section 63 BSA, all four conditions must be satisfied:

  1. Regular Use: The computer output must be produced during regular use of the device/system
  2. Regular Data Input: Information was regularly fed into the computer in the ordinary course
  3. Proper Operation: The computer was operating properly during the material period (or if not, the malfunction didn't affect accuracy)
  4. Accurate Reproduction: The output reproduces or is derived from information fed into the computer

The Certificate Requirement

📜Section 63(4) Certificate

A certificate identifying the electronic record and describing the manner of its production, signed by a person occupying a responsible position in relation to the operation of the device or management of the relevant activities, shall be evidence of the matters stated therein. This certificate is mandatory for admissibility.

Key Case Law on Electronic Evidence

CaseCitationPrinciple
Anvar P.V. v. P.K. Basheer (2014) 10 SCC 473 S.65B certificate mandatory; no waiver; overruled relaxation in Navjot Sandhu
Arjun Panditrao Khotkar (2020) 7 SCC 1 Certificate can be produced at trial stage; procedural non-compliance at FIR stage curable
Shafhi Mohammad v. State of HP (2018) 2 SCC 801 If original device produced, certificate not required (later doubted)
Tomaso Bruno v. State of UP (2015) 7 SCC 178 Electronic evidence without certificate has no probative value
📁 Electronic Evidence Admissibility Flowchart (BSA S.63)
                    ┌─────────────────────────────────────┐
                    │   ELECTRONIC EVIDENCE TENDERED     │
                    └──────────────┬──────────────────────┘
                                   │
                                   ▼
                    ┌─────────────────────────────────────┐
                    │ Is the ORIGINAL DEVICE produced     │
                    │ in court?                           │
                    └──────────────┬──────────────────────┘
                           │               │
                          YES             NO
                           │               │
                           ▼               ▼
              ┌────────────────────┐  ┌────────────────────┐
              │ PRIMARY EVIDENCE   │  │ SECONDARY EVIDENCE │
              │ (S.57 BSA)         │  │ S.63 BSA applies   │
              │ Directly           │  │                    │
              │ admissible         │  └─────────┬──────────┘
              └────────────────────┘            │
                                               ▼
                                  ┌─────────────────────────────┐
                                  │ Is S.63(4) CERTIFICATE      │
                                  │ produced?                   │
                                  └──────────────┬──────────────┘
                                         │               │
                                        YES             NO
                                         │               │
                                         ▼               ▼
                            ┌────────────────────┐  ┌────────────────────┐
                            │ Are ALL 4          │  │ INADMISSIBLE       │
                            │ conditions met?    │  │ (Anvar P.V.)       │
                            └─────────┬──────────┘  └────────────────────┘
                                  │         │
                                 YES       NO
                                  │         │
                                  ▼         ▼
                        ┌──────────────┐  ┌────────────────────┐
                        │ ADMISSIBLE   │  │ CHALLENGE          │
                        │              │  │ specific condition │
                        └──────────────┘  └────────────────────┘
                    
⚖️Practitioner's Checklist

For Prosecution: (1) Obtain S.63(4) certificate immediately; (2) Identify certificate signatory before charge sheet; (3) Ensure signatory available for cross-examination.

For Defence: (1) Always challenge certificate absence at first opportunity; (2) Cross-examine signatory on four conditions; (3) Object to chain of custody gaps; (4) Challenge if device handling compromised integrity.

3.5 Practical Statute Selection

Let's apply the interplay principles to real scenarios. These examples demonstrate how to select the optimal statutory combination for different cyber incidents.

Scenario Analysis

📊 Scenario 1: Corporate Data Theft by Employee

Facts

IT Manager downloads company trade secrets to personal drive, resigns, joins competitor. Company discovers through forensic audit.

Statutory Selection

IT Act: S.43 (unauthorized access to computer) + S.66 (computer-related offence) + S.72A (disclosure in breach of lawful contract)
BNS: S.316 (Criminal breach of trust) + S.318/319 (Cheating, if misrepresentation involved)
BNSS: S.173 (FIR), S.176(3) (mandatory forensics — serious offences)
BSA: S.63 (certificate for forensic audit report)

📊 Scenario 2: Phishing Attack on Bank Customers

Facts

Accused sends fake bank emails, victims enter credentials on spoof site, ₹50 lakhs siphoned from multiple accounts.

Statutory Selection

IT Act: S.66 (computer-related offence) + S.66C (identity theft) + S.66D (cheating by personation using computer)
BNS: S.318 (Cheating) + S.319 (Cheating by personation) + S.61(2) (Criminal conspiracy)
BNSS: S.173 (Zero FIR at any station), S.176(3) (forensics mandatory), S.193 (chargesheet timeline)
BSA: S.63 (for email headers, IP logs, transaction records)

📊 Scenario 3: Ransomware Attack on Hospital

Facts

Hospital systems encrypted, ransom demanded in cryptocurrency, patient records inaccessible, one patient dies due to delayed treatment.

Statutory Selection

IT Act: S.66 (hacking) + S.43 (damage to computer system) + S.66F (cyber terrorism — if critical infrastructure)
BNS: S.308 (Extortion) + S.105 (Culpable homicide not amounting to murder — if death linked)
DPDPA: Breach notification under Rules (if personal data compromised)
Constitutional: Article 21 (patients' right to life)
BNSS: S.176(3) (mandatory forensics), video recording of seizure
BSA: S.63 (malware samples, ransom notes, blockchain traces)

The Mesh Approach in Practice

Notice how each scenario invokes all four pillars plus potentially DPDPA and constitutional provisions. This is the "Mesh Theory" from Part 1 in action. A single cyber incident is never one-dimensional — analyze every angle.

🎯 Key Takeaways

  • Four Pillars: IT Act (special cyber offences) + BNS (general criminal law) + BNSS (procedure) + BSA (evidence)
  • Special > General: IT Act prevails where it specifically covers conduct; BNS fills gaps
  • BNSS S.176(3): Mandatory forensics for 7+ year offences — challenge if not done
  • BSA S.63: Certificate requirement continues from S.65B — no certificate = inadmissible
  • Zero FIR: Now statutory under BNSS S.173 — file anywhere, transferred within 15 days
  • Electronic FIR: Valid under BNSS — online complaint portals legally recognized
  • Mesh Analysis: Every cyber incident should be analyzed through all four pillars + DPDPA + Constitution

📝 Part 3 Assessment Quiz

Test your understanding of statutory interplay in cyber law.

Question 1 of 10
When both IT Act and BNS can apply to a cyber offence, which principle determines precedence?
Explanation

The principle generalia specialibus non derogant means special law prevails over general law. IT Act is special law for computer offences; where it specifically covers conduct, it takes precedence over BNS general provisions.

Question 2 of 10
Under BNSS, what is the maximum time for transferring a Zero FIR to the jurisdictional police station?
Explanation

Under BNSS Section 173, Zero FIR can be registered at any police station regardless of jurisdiction. It must be transferred to the police station having jurisdiction within 15 days.

Question 3 of 10
BSA Section 63 (electronic evidence) is the successor to which provision?
Explanation

BSA Section 63 replaces Indian Evidence Act Section 65B, continuing the certificate requirement for electronic records admissibility with refined conditions.

Question 4 of 10
Scenario
An accused is charged under IT Act Section 66 for hacking. The offence is punishable with 3 years imprisonment. Forensic evidence was collected but no forensic team was involved.
Can the defence challenge on grounds of BNSS S.176(3) violation?
Explanation

BNSS Section 176(3) mandates forensic evidence collection only for offences punishable with 7 years or more imprisonment. IT Act S.66 carries maximum 3 years — mandatory forensics doesn't apply, though best practice would still involve forensic examination.

Question 5 of 10
For electronic evidence admissibility under BSA S.63, which of the following is TRUE?
Explanation

Under BSA S.63(4), the certificate must be signed by a person occupying a responsible position in relation to the operation of the relevant device or management of relevant activities. This continues the Anvar P.V. requirement.

Question 6 of 10
Scenario
Accused sends fake bank emails, obtains customer credentials, and transfers ₹10 lakhs from victim's account.
Which IT Act section specifically applies to this conduct?
Explanation

Phishing involves S.66C (fraudulently using electronic signature, password, or unique identification — identity theft) and S.66D (cheating by personation using computer resource). Note: S.66A is unconstitutional (Shreya Singhal).

Question 7 of 10
The CrPC Section 482 (inherent powers of High Court) corresponds to which BNSS section?
Explanation

CrPC Section 482 → BNSS Section 528. This provision preserves the High Court's inherent powers to make orders to prevent abuse of process or secure ends of justice, including quashing FIRs.

Question 8 of 10
Which of the following is NOT one of the four conditions under BSA S.63 for electronic evidence admissibility?
Explanation

BSA S.63 requires: (1) Regular use, (2) Regular data input, (3) Proper operation, (4) Accurate reproduction. Hash value verification by CERT-In is not a statutory condition — though it's best forensic practice, it's not mandated by S.63.

Question 9 of 10
Scenario
Ransomware attack on hospital encrypts patient records. One patient dies due to delayed treatment as doctors couldn't access medical history.
What is the most serious BNS charge that could apply?
Explanation

If death results from the ransomware attack and prosecution can establish causal link between the encryption and death (delayed treatment), BNS Section 105 (Culpable homicide) could apply — the most serious charge given the death. S.308 (Extortion) and IT Act S.66F (cyber terrorism) would also apply.

Question 10 of 10
Under BNSS, electronic FIR (FIR via electronic means) is:
Explanation

BNSS Section 173(1) expressly permits electronic FIR — information can be given by electronic means. This legitimizes online complaint portals and gives legal validity to electronically filed FIRs for all offences, not just cyber crimes.

out of 10 correct