📧 admissions@cyberlawacademy.com | 📞 +91-XXXXXXXXXX
⚡ Part 5 of 5

Practical Application

Theory meets practice. Work through real case studies, master client advisory protocols, learn FIR drafting, bail applications, and courtroom strategies. This is where you become a practising cyber lawyer.

⏱️ ~120 minutes 📋 3 Case Studies 📝 5 Templates ❓ 15 FAQs

5.1 Case Study: Corporate Phishing Attack

This case study walks you through a sophisticated phishing attack on a corporate entity — from initial client contact through FIR registration, investigation support, and eventual prosecution. Follow along and learn the practitioner's approach.

CASE STUDY #1

The CFO Impersonation Attack

Facts

ABC Pharmaceuticals Ltd. (Mumbai) receives an email appearing to be from their CFO instructing the accounts team to urgently transfer ₹2.5 crores to a "new vendor" for "time-sensitive equipment." The email address was "cfo@abc-pharma.co" (note the hyphen) instead of the legitimate "cfo@abcpharma.co". The accounts manager, under pressure, processed the transfer. The money was distributed across 12 accounts in Jharkhand and West Bengal within hours.

Initial Client Meeting — What to Ask

  • Timeline: Exact date/time of email receipt, when transfer was made, when fraud discovered
  • Email Headers: Request full email with headers (not just screenshot)
  • Banking Details: Beneficiary account numbers, bank names, IFSC codes
  • Internal Actions: What has company already done? (Critical for evidence preservation)
  • IT Infrastructure: Email provider, any security logs, authentication records
  • Employee Statements: Who received/processed the email, any witnesses

Immediate Actions (First 24 Hours)

  1. Call 1930 immediately — Report to National Cyber Crime Helpline for potential fund freeze
  2. Bank complaint — Written complaint to company's bank requesting recall of funds
  3. Preserve evidence — Screenshot emails, export with headers, preserve server logs
  4. Internal memo — Instruct IT to preserve all relevant logs (do NOT investigate internally yet)
  5. Draft FIR complaint — Prepare detailed complaint for police filing

Applicable Provisions

OffenceProvisionPunishment
Cheating by personation using computerS.66D IT Act3 years + ₹1 lakh
Identity theftS.66C IT Act3 years + ₹1 lakh
CheatingS.318 BNS7 years + fine
Forgery (fake email domain)S.336 BNS2 years / 7 years
Criminal conspiracyS.61 BNSSame as substantive offence

Forum Selection Analysis

Options: Mumbai (victim company HQ), Jharkhand/West Bengal (where money went), or wherever accused is traced.

Recommendation: File Zero FIR at Mumbai Cyber Cell (BKC). Mumbai has well-equipped cyber infrastructure, proximity to client for coordination, and jurisdiction is proper as "effects" occurred in Mumbai. If investigation reveals accused in Jharkhand, case can be transferred or parallel investigation coordinated.

📄 FIR Complaint Template — Phishing/BEC Editable Template
To, The Station House Officer, Cyber Police Station, [City] Subject: Complaint for registration of FIR — Cyber Fraud / Phishing Attack Respected Sir/Madam, I, [Name], [Designation] of [Company Name], having registered office at [Address], do hereby lodge the following complaint: 1. BRIEF FACTS: On [Date] at approximately [Time], an employee of our company received an email purportedly from [Impersonated Person/Designation]. The email appeared to originate from [Fake Email ID], which closely resembled our legitimate domain [Real Domain]. 2. MODUS OPERANDI: The fraudulent email instructed [Brief description of instructions]. Acting on these instructions, our accounts department transferred a sum of Rs. [Amount in words] (₹[Amount in figures]) to the following bank account(s): Account 1: [Account Number], [Bank Name], [Branch], IFSC: [IFSC] 3. DISCOVERY OF FRAUD: The fraud was discovered on [Date] when [How discovered]. 4. IMMEDIATE ACTIONS TAKEN: (a) Reported to 1930 Cyber Crime Helpline on [Date/Time] (b) Complaint to our bank dated [Date] (c) Internal evidence preservation initiated 5. OFFENCES COMMITTED: The above acts constitute offences punishable under: - Section 66C of IT Act, 2000 (Identity Theft) - Section 66D of IT Act, 2000 (Cheating by Personation) - Section 318 of Bharatiya Nyaya Sanhita, 2023 (Cheating) - Section 336/338 of BNS, 2023 (Forgery) 6. PRAYER: It is therefore prayed that an FIR may kindly be registered against unknown person(s) and investigation be conducted. Place: [City] Date: [Date] [Signature] [Name & Designation]

5.2 Case Study: Data Breach Response

Data breaches require rapid, coordinated legal response across multiple fronts — criminal law, regulatory compliance (DPDPA), contractual obligations, and reputation management. This case study demonstrates the multi-track approach.

CASE STUDY #2

E-Commerce Platform Data Breach

Facts

ShopEasy (a mid-size e-commerce platform with 2 million users) discovers that their customer database has been compromised. A threat actor accessed customer names, emails, phone numbers, addresses, and partial payment card data. The breach was discovered when a security researcher notified them that data was being sold on the dark web.

Track 1: Criminal Law Response

🚔 Criminal Track Checklist
  • Register FIR at Cyber Cell — S.43 (damage to computer system), S.66 (hacking)
  • Preserve server logs, access records, vulnerability assessment reports
  • Engage forensic expert for S.63 BSA compliant evidence collection
  • Prepare S.63(4) BSA certificate for all electronic evidence
  • Coordinate with CERT-In if critical information infrastructure affected

Track 2: DPDPA Compliance (Regulatory)

WITHIN 72 HOURS
Notify Data Protection Board
Under DPDP Rules 2025, notify the Data Protection Board of the breach. Include: nature of breach, approximate number affected, categories of personal data, likely consequences, mitigation measures.
WITHOUT UNDUE DELAY
Notify Affected Data Principals
Inform affected users in clear, plain language about: what data was compromised, what they should do (change passwords, monitor accounts), company contact for queries.
WITHIN 7 DAYS
Complete Internal Assessment
Document root cause, remediation steps, and enhanced security measures. This will be required for regulatory inquiries and potential litigation defence.
ONGOING
Cooperate with DPB Investigation
Respond to queries, provide documentation, implement any directions issued. Non-cooperation can result in enhanced penalties.
⚠️DPDPA Penalty Risk

Under DPDPA 2023, failure to notify breach can result in penalties up to ₹200 crores. Even if unsure about breach scope, err on the side of notification. Late notification is better than no notification, but timely notification is best.

5.3 Defence Practice: Bail in Cyber Cases

Securing bail in cyber cases requires understanding both general bail jurisprudence and cyber-specific considerations. This section provides a framework for bail applications across different cyber offences.

Bail Classification in Cyber Offences

OffenceProvisionMax PunishmentBail Type
Hacking (S.66)IT Act3 yearsBailable
Identity Theft (S.66C)IT Act3 yearsBailable
Cheating by Personation (S.66D)IT Act3 yearsBailable
Cyber Terrorism (S.66F)IT ActLifeNon-Bailable
Obscenity (S.67)IT Act3/5 yearsBailable / Non-Bailable
CSAM (S.67B)IT Act + POCSO5/7 years + POCSONon-Bailable
Cheating (S.318 BNS)BNS7 yearsNon-Bailable
Key Defence Arguments
  • No flight risk: Accused has deep roots, family, employment in jurisdiction
  • No tampering risk: All electronic evidence already seized/mirrored; accused cannot tamper with what's in police custody
  • Bailable offence: Most IT Act offences (S.66, 66C, 66D, 67) are bailable — bail is matter of right
  • Long incarceration: If trial unlikely to complete soon, bail should be granted

5.4 Frequently Asked Questions

These FAQs address common questions that arise in cyber law practice. Use these as ready references when advising clients or preparing for court.

Can police refuse to register FIR citing "not our jurisdiction" for cyber crimes?

+

No. Under BNSS Section 173, police must register a Zero FIR at any police station. They cannot refuse citing territorial jurisdiction. The FIR must be transferred to the appropriate jurisdiction within 15 days.

Is Section 66A still being used for FIRs? What should I do?

+

Section 66A was struck down by the Supreme Court in Shreya Singhal v. Union of India (2015). Any FIR citing S.66A is a nullity and should be immediately challenged via quashing petition under Section 528 BNSS.

What is the "golden hour" for cyber fraud reporting?

+

The "golden hour" refers to the critical first few hours after a financial cyber fraud when funds can potentially be frozen before being withdrawn. Reporting to 1930 helpline or cybercrime.gov.in within 1-2 hours significantly increases recovery chances.

Do I need a Section 65B/63 certificate for WhatsApp screenshots?

+

Yes. Per Anvar P.V. v. P.K. Basheer (2014), electronic evidence requires a Section 65B (now Section 63 BSA) certificate for admissibility. The only exception is if you produce the original device before the court.

How long does MLAT/LR process take for US-based evidence?

+

MLAT requests to USA typically take 12-18 months. For faster alternatives: (a) Direct Law Enforcement Requests to platforms (2-4 weeks); (b) Emergency Disclosure Requests for imminent threats (24-48 hours); (c) Preservation requests (immediate, valid 90 days).

5.5 Courtroom Strategies & Ethics

Effective cyber law practice requires not just legal knowledge but strategic courtroom skills. This section provides practical tips for arguing cyber cases.

Cross-Examination of Technical Witnesses

🎯 Technical Witness Cross-Exam Points
  • Verify qualifications — are they certified forensic examiners? (CFCE, EnCE, etc.)
  • Challenge chain of custody — was device sealed? Hash values verified?
  • Question methodology — which forensic tool used? Is it court-accepted?
  • IP attribution — does IP address conclusively identify the person (not just device)?
  • Alternative explanations — malware, unauthorized access, shared network?
  • Section 63 BSA compliance — is certificate proper? Who signed it?

Common Defence Strategies

StrategyWhen to UseKey Arguments
Identity ChallengeIP-based attribution casesIP identifies device/connection, not person; shared networks; VPN/proxy
Authorization DefenceHacking charges (S.66)Accused had legitimate access; exceeded authorization vs. no authorization
Evidence ExclusionImproperly collected evidenceNo S.63 certificate; chain of custody broken; illegal search
Constitutional ChallengeSpeech/expression casesS.66A (struck down); Art.19(1)(a) protection; Puttaswamy privacy
"The cyber lawyer stands at the intersection of technology and justice. Our duty is not merely to win cases, but to ensure that the digital rights of individuals are protected while holding genuine wrongdoers accountable." Adv. (Dr.) Prashant Mali

🎯 Key Takeaways

  • Golden Hour: Report financial fraud within 1-2 hours via 1930 for best recovery chances
  • Evidence First: Preserve before investigating — forensic images, logs, emails with headers
  • 72-Hour Rule: DPDPA requires breach notification to DPB within 72 hours
  • Bail Strategy: Most IT Act offences are bailable; emphasize evidence already seized
  • S.63 Certificate: Challenge missing/defective certificates — evidence becomes inadmissible
  • Cross-Exam Focus: Chain of custody, hash values, IP ≠ person, alternative explanations

📝 Part 5 Assessment Quiz

Test your practical application skills in cyber law.

Question 1 of 10
Scenario
Your client just discovered ₹15 lakhs was transferred from their account via a phishing attack 30 minutes ago.
What is the FIRST action you should advise?
Explanation

In the "golden hour" after financial fraud, the priority is to freeze funds before they're withdrawn. 1930 helpline can coordinate with banks to freeze recipient accounts.

Question 2 of 10
Under DPDPA 2023, within what timeframe must a Data Fiduciary notify the Data Protection Board of a personal data breach?
Explanation

Under DPDP Rules 2025, Data Fiduciaries must notify the Data Protection Board of personal data breaches within 72 hours of becoming aware.

Question 3 of 10
Which IT Act offence is BAILABLE (bail as matter of right)?
Explanation

Section 66 (hacking) is punishable with maximum 3 years imprisonment, making it a bailable offence.

Question 4 of 10
Scenario
Prosecution produces WhatsApp chat screenshots but has no Section 63(4) BSA certificate.
As defence counsel, what should you argue?
Explanation

Per Anvar P.V. v. P.K. Basheer, electronic evidence without Section 65B/63 certificate is inadmissible.

Question 5 of 10
In cross-examining a forensic expert, which is the MOST effective challenge to IP-based attribution?
Explanation

The strongest challenge is that IP identifies the device/connection, not the person. Multiple people may use the same network; devices may be compromised.

Question 6 of 10
Scenario
A company discovers a data breach. The CISO wants to "investigate internally first" before reporting.
What is the correct legal advice?
Explanation

The 72-hour notification deadline under DPDPA starts from discovery. Waiting may cause missed deadlines and penalties up to ₹200 crores.

Question 7 of 10
For a Business Email Compromise (BEC) / CEO fraud, which combination of sections should be included in the FIR?
Explanation

BEC fraud involves: S.66C (identity theft), S.66D (cheating by personation), S.318 BNS (cheating), and S.336 BNS (forgery). S.66A is struck down.

Question 8 of 10
When arguing bail for a client charged under S.66 IT Act, which is the STRONGEST argument?
Explanation

For bailable offences, bail is a matter of right. Once electronic evidence is seized and forensically imaged, the accused cannot tamper with it.

Question 9 of 10
Section 79 IT Act safe harbour for intermediaries requires which of the following?
Explanation

Per Shreya Singhal, S.79(3)(b) "actual knowledge" requires a court order — not mere user complaint.

Question 10 of 10
Scenario
Client is accused of posting defamatory content. FIR includes Section 66A IT Act among other charges.
What is the immediate legal remedy?
Explanation

Section 66A was struck down in Shreya Singhal (2015). File quashing petition under S.528 BNSS immediately.

out of 10 correct

🎉 Congratulations! You've Completed Module 1

You have successfully completed all 5 parts of the Foundations of Cyber Law Practice module. Take the comprehensive module quiz to test your mastery and earn your certificate.

Take Module Quiz (50 Questions) Review Module