CyberLaw Academy
📝 Module 5 Assessment

Cyber Trial, Cross-Examination & Court Craft

50 Questions • 60 Minutes • 70% Passing

50
Questions
60
Minutes
70%
Passing
5
Parts

Part 5.1 — Framing of Charges

1Charge framing in Sessions Court:
BNSS S.230 governs charge framing in Sessions Court.
2Prima facie standard:
Prima facie = "ground for presuming" — sift, don't weigh.
3UPI fraud charges:
IT Act (identity/personation) + BNS (cheating) combination.
4Discharge application:
S.227 BNSS provides for discharge.
5Bazee.com defence:
S.79 safe harbor — CEO not liable without knowledge.
6Valid charge includes:
All elements for accused to prepare defence.
7IT+BNS combined because:
IT for cyber elements; BNS for higher punishment.
8At charge stage court:
Court sifts at charge stage — if material, proceed.
9Ransomware critical infra:
S.66 hacking + S.66F cyber terrorism + S.308 extortion.
10Defence challenges if:
Technical deficiencies are valid discharge grounds.

Part 5.2 — Cross-Examining IOs

11Effective IO cross uses:
Factual questions trap; "why" lets IO explain.
12Hash at seizure proves:
Hash is fingerprint — matching proves no tampering.
13S.63 certificate by:
S.63 requires person in charge to sign.
14Chain break matters:
Gap = tampering opportunity = doubt.
15Device ON — IO should:
Live system has volatile data lost on shutdown.
16Police witness problem:
BNSS S.105-106 requires independent witnesses.
17IP alone proves:
IP identifies connection, not individual.
18Arjun Panditrao held:
SC: certificate mandatory, can produce at trial.
19Long seizure-FSL gap:
Extended custody = tampering opportunity.
20Best cross strategy:
Surgical focus on few critical points.

Part 5.3 — Technical Witnesses

21Forensic expert challenged:
BSA S.45 requires special knowledge.
22CDR proves:
CDR shows SIM activity; anyone can use SIM.
23Social media IP retained:
Most platforms ~90 days retention.
24Key bank question:
Different number = SIM swap indicator.
25Dynamic IP means:
Dynamic IP reassigned to different users.
26Cell tower proves:
Tower coverage often several km.
27Forensics standard:
ISO 27037 evidence; NIST 800-86 forensics.
28Email verification proves:
Email verification = access, not identity.
29Malware check rules out:
Malware check rules out remote planting.
30Bank delay relevant:
RBI quick action — delay = negligence.

Part 5.4 — Argument Structure

31Opening should:
Opening sets stage and previews evidence.
32Hash analogy for judge:
Hash = fingerprint, unique, changes completely if altered.
33Evidence starts with:
Start complainant — establish crime occurred.
34Defence closing emphasizes:
Defence: burden, doubt, unexplored alternatives.
35Best fraud visual:
Money flow shows account movement visually.
36IP analogy:
IP = postal address, identifies connection.
37After evidence, prosecution:
Prosecution addresses defence arguments.
38Technical simplification:
Judges legal experts — translation aids justice.
39Defence opening:
Defence opening plants doubt.
40Documents should be:
Organization shows preparation.

Part 5.5 — Judgments & Literature

41Arjun Panditrao S.65B:
Mandatory but producible at trial.
42Shreya Singhal struck:
S.66A struck — vague, overbroad.
43ISO 27037 covers:
ISO 27037 = digital evidence handling.
44Expert opinion under:
BSA S.45 governs expert opinion.
45Puttaswamy established:
9-judge: privacy fundamental under Art.21.
46NIST 800-86 for:
NIST 800-86 = forensic techniques.
47Private expert needs:
Certifications establish expertise.
48Bazee.com established:
S.79 safe harbor — CEO not liable without knowledge.
49Foreign judgments:
Persuasive for novel cyber issues.
50RFC 3227 covers:
RFC 3227 = evidence collection, volatile data.
0%
Calculating...
Part 5.1
0/10
Part 5.2
0/10
Part 5.3
0/10
Part 5.4
0/10
Part 5.5
0/10
🔒 Protected