πŸ“§ admissions@cyberlawacademy.com | πŸ“ž +91-XXXXXXXXXX
🌐 Part 4 of 5

Jurisdiction & Territorial Reach

Master the complexities of cyber jurisdiction β€” from Section 75's extraterritorial application to strategic forum selection, Zero FIR tactics, and international cooperation through MLAT. Where you file can determine whether you win.

⏱️ ~90 minutes πŸ“– 5 Sections 🌍 Cross-Border Focus πŸ“ 10 Quiz Questions

4.1 The Jurisdiction Challenge in Cyberspace

Cyberspace defies traditional territorial boundaries. An attacker in Romania can target a victim in Mumbai through servers in Singapore, with money routed via Dubai. Which court has jurisdiction? Which police station files the FIR? These questions can make or break your case.

"In cyberspace, the traditional concept of territorial sovereignty is fundamentally challenged. The law must evolve to address crimes that transcend physical boundaries while respecting the principles of comity and due process." Adapted from international cyber law jurisprudence

🌐 The Multi-Jurisdictional Reality

πŸ‘€
Victim's Location
Where harm was suffered; often where FIR is filed
πŸ–₯️
Server Location
Where data is stored; may involve foreign jurisdiction
🎭
Accused's Location
Where perpetrator operates; extradition may be needed

A single cyber offence can involve multiple jurisdictions simultaneously

Key Jurisdictional Concepts

Principle Description Application in Cyber Cases
Territorial Principle Jurisdiction where the offence occurs Where the computer system is accessed or harm suffered
Nationality Principle Jurisdiction over nationals regardless of location Indian citizen committing cybercrime abroad
Effects Doctrine Jurisdiction where effects are felt ⭐ Primary basis for Section 75 IT Act
Protective Principle Jurisdiction to protect state interests Cyber terrorism, critical infrastructure attacks
Universal Principle Jurisdiction for crimes against humanity CSAM (child sexual abuse material)

4.2 Section 75: Extraterritorial Application

Section 75 of the IT Act is your primary tool for asserting Indian jurisdiction over cyber offences committed outside India. It extends India's cyber law arm across borders β€” but with important conditions.

πŸ“œSection 75 IT Act β€” Text

"Subject to the provisions of sub-section (2), the provisions of this Act shall apply also to any offence or contravention committed outside India by any person irrespective of his nationality, if the act or conduct constituting the offence or contravention involves a computer, computer system or computer network located in India."

Breaking Down Section 75

  1. "Outside India": The physical location of the accused when committing the offence is irrelevant β€” jurisdiction attaches regardless
  2. "Irrespective of nationality": Applies to foreigners β€” a Nigerian, Russian, or American hacker targeting Indian systems falls under Indian jurisdiction
  3. "Computer located in India": The nexus requirement β€” there must be a computer, system, or network in India that is involved in the offence
Section 75 Jurisdiction Analysis
β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚                SECTION 75 EXTRATERRITORIAL JURISDICTION             β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
                                β”‚
                                β–Ό
              β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
              β”‚ Was the offence committed OUTSIDE   β”‚
              β”‚ India (physically)?                 β”‚
              β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
                     β”‚                    β”‚
                    YES                   NO
                     β”‚                    β”‚
                     β–Ό                    β–Ό
        β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”    β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
        β”‚ Does the offence   β”‚    β”‚ Normal territorial β”‚
        β”‚ INVOLVE a computer β”‚    β”‚ jurisdiction under β”‚
        β”‚ located IN INDIA?  β”‚    β”‚ BNS/BNSS applies   β”‚
        β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜    β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
              β”‚           β”‚
             YES         NO
              β”‚           β”‚
              β–Ό           β–Ό
    β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
    β”‚ SECTION 75   β”‚  β”‚ NO INDIAN           β”‚
    β”‚ APPLIES      β”‚  β”‚ JURISDICTION        β”‚
    β”‚              β”‚  β”‚ (unless victim is    β”‚
    β”‚ IT Act       β”‚  β”‚ Indian national β€”    β”‚
    β”‚ jurisdiction β”‚  β”‚ use BNS nationality  β”‚
    β”‚ extends to   β”‚  β”‚ principle)           β”‚
    β”‚ offence      β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
    β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

"Computer located in India" includes:
β€’ Victim's device in India
β€’ Indian company's server (even if hosted abroad)
β€’ Indian intermediary's infrastructure
β€’ Cloud services with Indian data center nodes
                    

Key Case: Section 75 in Action

πŸ‘¨β€βš–οΈPractical Application

Scenario: A hacker in Eastern Europe targets an Indian bank's server, which is physically located in Mumbai. The hacker extracts customer data.

Analysis: Section 75 applies because: (1) Offence committed outside India; (2) Bank's server (computer system) is located in India; (3) Nationality of hacker irrelevant. Indian police can register FIR and investigate. Extradition may be sought if bilateral treaty exists.

Section 75 Limitations

  • Practical Enforcement: Even with jurisdiction, enforcing against foreign nationals requires international cooperation
  • Evidence Collection: Data may be on foreign servers β€” MLAT process required
  • Extradition: Dependent on bilateral treaties; many countries don't extradite for cyber offences
  • Reciprocity: Other nations may assert similar extraterritorial jurisdiction over Indians
⚠️Defence Point

Challenge Section 75 application if prosecution cannot establish the "computer located in India" nexus. If the victim merely accessed a foreign website from India, the foreign server is NOT "located in India" β€” jurisdiction may not attach for offences against that server.

4.3 Zero FIR & Strategic Forum Selection

Where you file the FIR can determine the trajectory of your case. Zero FIR under BNSS S.173 combined with strategic forum selection is a powerful tool for both victims and counsel. Choose wisely.

Zero FIR: The Complete Framework

πŸ“‹BNSS Section 173 β€” Zero FIR

Any police station must register an FIR regardless of territorial jurisdiction. The FIR must be transferred to the police station having jurisdiction within 15 days. No police station can refuse to register citing "not our jurisdiction."

Zero FIR Strategic Process
β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚                    ZERO FIR STRATEGIC FILING                        β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

   STEP 1: Identify ALL potential jurisdictions
   ─────────────────────────────────────────────
   
   β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
   β”‚  Victim's   β”‚  β”‚  Accused's  β”‚  β”‚  Server     β”‚  β”‚  Where      β”‚
   β”‚  residence  β”‚  β”‚  residence  β”‚  β”‚  location   β”‚  β”‚  money      β”‚
   β”‚             β”‚  β”‚  (if known) β”‚  β”‚             β”‚  β”‚  went       β”‚
   β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
         β”‚                β”‚                β”‚                β”‚
         β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”΄β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”΄β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
                                   β”‚
                                   β–Ό
   STEP 2: Evaluate each jurisdiction
   ───────────────────────────────────
   
   Consider:
   β€’ Cyber cell expertise (Metro cities better equipped)
   β€’ Court efficiency (disposal rates, pendency)
   β€’ Accessibility for victim to attend proceedings
   β€’ Prosecution quality in that district
   
                                   β”‚
                                   β–Ό
   STEP 3: File Zero FIR at PREFERRED jurisdiction
   ────────────────────────────────────────────────
   
   β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
   β”‚ PRO TIP: File at a CEN (Cyber Economic Narcotics) PS     β”‚
   β”‚ or dedicated Cyber Crime PS in a metro city even if      β”‚
   β”‚ your residence is in a smaller town. They have better    β”‚
   β”‚ technical capability and can transfer to appropriate     β”‚
   β”‚ jurisdiction if needed.                                  β”‚
   β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
                    

Forum Selection Strategy Matrix

🎯
Victim's Residence
Most common choice
  • Advantage: Convenient for victim attendance
  • Advantage: "Effects doctrine" β€” harm suffered here
  • Risk: May lack cyber expertise in smaller towns
  • Best for: Individual victims, harassment cases
🏒
Company Registered Office
For corporate victims
  • Advantage: Documentary evidence readily available
  • Advantage: Often in metro with good cyber cells
  • Risk: May be far from where offence occurred
  • Best for: Data breaches, corporate fraud
πŸ’°
Where Money Transferred
Follow the money
  • Advantage: Bank accounts can be frozen quickly
  • Advantage: Easier to trace money trail locally
  • Risk: Multiple accounts = multiple jurisdictions
  • Best for: Financial fraud, UPI scams
πŸ–₯️
Accused's Location
If known
  • Advantage: Easier arrest and custody
  • Advantage: Search and seizure more practical
  • Risk: Often unknown in cyber cases
  • Best for: When accused identity is confirmed

βš”οΈ Prosecution vs Defence: Forum Strategies

🟒 Prosecution Strategy

File in jurisdiction with best-equipped cyber cell (Mumbai, Bangalore, Hyderabad). Argue multiple jurisdictions are proper β€” effects doctrine allows filing where harm occurred. Use Zero FIR to get the case registered immediately, then let transfer happen to favorable jurisdiction.

πŸ”΅ Defence Strategy

Challenge jurisdiction if filed in inconvenient forum. Argue accused's right to fair trial includes accessible forum. File transfer petition to jurisdictionally appropriate court. If FIR filed in multiple places, seek quashing of duplicates citing abuse of process.

βœ…Golden 1930 Portal

For immediate reporting, use the National Cyber Crime Reporting Portal (cybercrime.gov.in) or call 1930. Financial frauds reported within the "golden hour" have higher recovery rates. The portal automatically routes complaints to jurisdictionally appropriate cyber cells.

4.4 MLAT & International Evidence Collection

When evidence or accused persons are located abroad, the Mutual Legal Assistance Treaty (MLAT) framework becomes essential. Understanding this process helps set realistic client expectations and plan investigation strategy.

What is MLAT?

🀝Mutual Legal Assistance Treaty

MLATs are bilateral or multilateral treaties enabling countries to cooperate in criminal investigations. India has MLATs with 42+ countries including USA, UK, UAE, Singapore, and most EU nations. Requests flow through the Ministry of Home Affairs (Central Authority).

The MLAT Process

Step 1
Investigation Agency Identifies Need
IO identifies that evidence (emails, server logs, bank records) or accused is located in foreign jurisdiction. Documents specific requirements.
Timeline: During investigation
Step 2
Letter Rogatory / MLAT Request Drafted
Prosecution prepares detailed request specifying: nature of offence, evidence sought, relevance to case, applicable Indian law provisions. Must meet receiving country's requirements.
Timeline: 2-4 weeks
Step 3
Court Authorization
For Letter Rogatory: Application to Court under Section 166-A CrPC / Section 182 BNSS. Court issues LR if satisfied. For direct MLAT: MHA may process without court order in some cases.
Timeline: 2-6 weeks
Step 4
Transmission via Central Authority
Request transmitted through Ministry of Home Affairs (India's Central Authority) to the foreign country's Central Authority via diplomatic channels.
Timeline: 2-4 weeks
Step 5
Foreign Country Execution
Receiving country processes request per their domestic law. May involve their courts, law enforcement, or regulatory authorities. This is often the longest step.
Timeline: 3-18 months (!)
Step 6
Evidence Transmitted Back
Evidence/information transmitted back through same channels. May require authentication for Indian court admissibility.
Timeline: 2-4 weeks
⚠️Reality Check: MLAT Timelines

MLAT requests typically take 6-24 months for completion. For USA-based evidence (most Big Tech companies), expect 12-18 months. Set client expectations accordingly. Consider alternative approaches (direct platform cooperation, voluntary disclosure) where available.

Alternative: Direct Platform Cooperation

Platform Cooperation Mechanism Typical Timeline
Google Law Enforcement Request System (LERS) 2-4 weeks (emergency: 24-48 hrs)
Meta (FB/Insta/WA) Law Enforcement Online Requests 2-4 weeks (emergency: 24-48 hrs)
Microsoft Digital Crimes Unit portal 2-4 weeks
Twitter/X Law Enforcement Guidelines portal 2-6 weeks
Indian Platforms Direct notice under IT Rules 2021 72 hours (statutory)
βš–οΈPractice Tip

For emergency preservation (prevent evidence deletion), most platforms offer 90-day preservation requests without formal legal process. Indian law enforcement can request preservation while MLAT/LR is being processed. Always send preservation request immediately upon identifying foreign-hosted evidence.

4.5 Jurisdiction Scenarios & Solutions

Let's apply jurisdictional principles to real-world scenarios. These patterns repeat frequently in cyber practice β€” master them and you'll handle most jurisdictional challenges confidently.

Scenario 1: Cross-State Phishing Attack

πŸ“§Scenario

Facts: Victim in Delhi receives phishing email, clicks link, enters bank credentials. Money debited from Delhi bank account, transferred to accounts in Jharkhand and West Bengal. Accused later traced to Jharkhand.

Jurisdictional Analysis:

  • Delhi: βœ… Victim's location, where harm occurred, where deception took effect
  • Jharkhand: βœ… Accused's location, where money received
  • West Bengal: βœ… Where part of proceeds transferred

Recommended Strategy: File Zero FIR at Delhi Cyber Cell (well-equipped, victim accessible). Investigation can proceed in Delhi; accused can be summoned/arrested from Jharkhand. If accused challenges jurisdiction, Delhi courts will likely retain given "effects" are in Delhi.

Scenario 2: International Ransomware Attack

πŸ”Scenario

Facts: Indian hospital's servers (located in Mumbai) encrypted by ransomware. Demand for Bitcoin payment sent from email traced to Russian IP. No India-Russia MLAT exists for cyber crimes.

Jurisdictional Analysis:

  • Section 75 IT Act: βœ… Applies β€” computer system (hospital server) located in India
  • Indian Jurisdiction: βœ… FIR can be registered; investigation can proceed
  • Accused in Russia: ⚠️ Practical enforcement difficult without treaty

Recommended Strategy: Register FIR under S.66 (hacking), S.66F (cyber terrorism if critical infrastructure), S.43 (damage), S.308 BNS (extortion). Focus investigation on: (1) Tracing Bitcoin wallet; (2) Identifying any India-based accomplices; (3) Preserving evidence for future prosecution if accused travels to treaty country.

Scenario 3: Defamatory Post β€” Foreign Platform

πŸ“±Scenario

Facts: Defamatory content about Indian businessman posted on US-based social media platform by anonymous account. Platform refuses to disclose user identity without US court order.

Jurisdictional Analysis:

  • India: βœ… S.356 BNS (defamation) β€” effects felt in India
  • Takedown: IT Rules 2021 β€” platform must have India Grievance Officer
  • Unmasking: Requires MLAT/LR to USA for subscriber info

Recommended Strategy: (1) File complaint with platform's India Grievance Officer for takedown (72-hr timeline under IT Rules); (2) Register FIR under S.356 BNS against "unknown persons"; (3) Initiate MLAT request for subscriber details; (4) Consider civil suit for injunction simultaneously.

Jurisdiction Decision Tree β€” Quick Reference
β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚                  JURISDICTION QUICK DECISION TREE                   β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

                        CYBERCRIME OCCURS
                              β”‚
           β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”΄β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
           β”‚                                      β”‚
     Accused in                            Accused outside
       INDIA                                   INDIA
           β”‚                                      β”‚
           β–Ό                                      β–Ό
  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”                   β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
  β”‚ File FIR at:    β”‚                   β”‚ Is computer/system  β”‚
  β”‚ β€’ Victim's PS   β”‚                   β”‚ located in INDIA?   β”‚
  β”‚ β€’ Where money   β”‚                   β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
  β”‚   transferred   β”‚                        β”‚           β”‚
  β”‚ β€’ Accused's PS  β”‚                       YES         NO
  β”‚ β€’ Cyber Cell    β”‚                        β”‚           β”‚
  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜                        β–Ό           β–Ό
           β”‚                           β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
           β”‚                           β”‚ S.75 IT  β”‚ β”‚ Limited    β”‚
           β”‚                           β”‚ Act      β”‚ β”‚ options:   β”‚
           β”‚                           β”‚ applies  β”‚ β”‚ β€’ BNS      β”‚
           β”‚                           β”‚          β”‚ β”‚   nationalityβ”‚
           β”‚                           β”‚ File FIR β”‚ β”‚   principleβ”‚
           β”‚                           β”‚ in India β”‚ β”‚ β€’ Civil    β”‚
           β”‚                           β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜ β”‚   remedies β”‚
           β”‚                                β”‚       β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
           β”‚                                β”‚
           β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
                            β”‚
                            β–Ό
              β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
              β”‚ ALWAYS: Use Zero FIR if PS    β”‚
              β”‚ refuses. File at Cyber Cell. β”‚
              β”‚ Preserve evidence. Act fast. β”‚
              β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
                    

🎯 Key Takeaways

  • Section 75 IT Act β€” extraterritorial jurisdiction if "computer located in India" is involved
  • Zero FIR (BNSS S.173) β€” mandatory registration at any PS; 15-day transfer
  • Forum selection is strategic β€” file where cyber cell is equipped, not just convenient
  • Multiple jurisdictions are often valid β€” "effects doctrine" allows filing where harm occurred
  • MLAT takes 6-24 months β€” use direct platform cooperation where possible
  • Preservation requests β€” send immediately to prevent evidence deletion (90 days)
  • Golden 1930 β€” for financial frauds, report within the "golden hour" for best recovery chances

πŸ“ Part 4 Assessment Quiz

Test your understanding of cyber jurisdiction and territorial reach.

Question 1 of 10
Section 75 of the IT Act provides jurisdiction over offences committed outside India when:
Explanation

Section 75 IT Act's nexus requirement is that a computer, computer system, or computer network located in India must be involved in the offence. Nationality of accused or victim is not the determining factor.

Question 2 of 10
Under BNSS Section 173, what is the maximum time for Zero FIR transfer to the jurisdictional police station?
Explanation

BNSS Section 173 mandates that Zero FIR must be transferred to the police station having territorial jurisdiction within 15 days.

Question 3 of 10
Scenario
A hacker in Nigeria targets an Indian e-commerce company's server located in Mumbai, stealing customer data.
Does Indian jurisdiction apply?
Explanation

Section 75 IT Act applies "irrespective of nationality". Since the server (computer system) is located in India (Mumbai), Indian jurisdiction attaches. The Nigerian hacker can be prosecuted under Indian law; enforcement is a separate practical challenge.

Question 4 of 10
Which of the following is India's Central Authority for MLAT requests?
Explanation

The Ministry of Home Affairs (MHA) is India's Central Authority for processing MLAT requests. Requests from Indian agencies and foreign countries are channeled through MHA.

Question 5 of 10
The "effects doctrine" in cyber jurisdiction means:
Explanation

The effects doctrine establishes jurisdiction in the place where the effects (harm/consequences) of an offence are felt. This is the primary basis for Section 75 IT Act and allows victims to file cases where they suffered harm.

Question 6 of 10
Scenario
Victim in Chennai suffers financial fraud. Money transferred to accounts in Jamtara (Jharkhand). Victim wants to file FIR in Chennai but police say "go to Jharkhand."
What is the correct legal position?
Explanation

Under BNSS S.173, police must register Zero FIR at any police station. They cannot refuse citing territorial jurisdiction. The FIR can be transferred to appropriate jurisdiction within 15 days, but registration cannot be refused.

Question 7 of 10
Typical timeline for MLAT request completion (to USA for Big Tech data) is:
Explanation

MLAT requests to the USA (where most Big Tech companies are headquartered) typically take 12-18 months for completion. This is why direct platform cooperation and emergency preservation requests are preferred alternatives where available.

Question 8 of 10
For immediate cyber fraud reporting and potential fund recovery, which number should be called?
Explanation

1930 is the National Cyber Crime Helpline. For financial frauds, reporting within the "golden hour" via 1930 or cybercrime.gov.in significantly increases chances of freezing fraudulent accounts and recovering funds.

Question 9 of 10
Preservation requests to foreign platforms (to prevent evidence deletion) are typically valid for:
Explanation

Most major platforms (Google, Meta, Microsoft) offer 90-day preservation upon law enforcement request. This preserves evidence while formal MLAT/legal process is initiated. Extensions are often possible.

Question 10 of 10
Scenario
Defence counsel wants to challenge jurisdiction where FIR was filed at Mumbai Cyber Cell for a defamation case, when accused resides in Kolkata and the defamatory post was made from Kolkata.
What is the strongest defence argument?
Explanation

While multiple jurisdictions may be technically valid (Mumbai where victim is, Kolkata where accused and post originated), defence can argue accused's right to fair trial includes access to a convenient forum. A transfer petition under BNSS can seek moving the case to Kolkata where accused resides and evidence (devices) are located.

out of 10 correct