Introduction to Section 63 BSA
Section 63 of the Bharatiya Sakshya Adhiniyam (BSA) 2023 governs the admissibility of electronic records in Indian courts. This section, which replaced Section 65B of the Indian Evidence Act, is fundamental to presenting digital evidence. This advanced module provides comprehensive guidance on drafting bulletproof certificates and preparing for cross-examination.
Section 63 provides that any information contained in an electronic record which is printed on paper, stored, recorded or copied in optical or magnetic media produced by a computer shall be deemed to be a document and admissible as evidence of any contents of the original or any fact stated therein of which direct evidence would be admissible, if the conditions specified in sub-section (2) are satisfied.
Key Changes from Section 65B IEA
- Terminology Updates: Language modernized to reflect current technology
- Expanded Scope: Broader coverage of electronic records and devices
- Certification Requirements: Similar structure but with updated provisions
- Continued Mandatory Nature: Certificate remains mandatory per Arjun Panditrao judgment
The Four Mandatory Conditions
Section 63(2) BSA specifies four conditions that must be satisfied for electronic evidence to be admissible. Understanding these conditions deeply is essential for drafting effective certificates.
Condition 1: Regular Use of Computer
"The computer output containing the information was produced by the computer during the period over which the computer was used regularly to store or process information for the purposes of any activities regularly carried on over that period by the person having lawful control over the use of the computer."
What this means in practice:
- The computer was used for regular business/personal activities
- The person producing the evidence had lawful control
- The output was generated during this regular use period
Condition 2: Regular Feeding of Information
"During the said period, information of the kind contained in the electronic record or of the kind from which the information so contained is derived was regularly fed into the computer in the ordinary course of the said activities."
What this means in practice:
- Information was input as part of regular operations
- Data entry followed normal business processes
- Not specifically created for litigation purposes
Condition 3: Proper Operation
"Throughout the material part of the said period, the computer was operating properly or, if not, that any respect in which it was not operating properly or was out of operation during that part of that period was not such as to affect the electronic record or the accuracy of its contents."
What this means in practice:
- The computer was functioning correctly during relevant period
- If there were any malfunctions, they did not affect the relevant data
- The system's integrity was maintained
Condition 4: Accurate Reproduction
"The information contained in the electronic record reproduces or is derived from such information fed into the computer in the ordinary course of the said activities."
What this means in practice:
- The output accurately represents the original information
- No unauthorized modifications have been made
- The data integrity is preserved
Comprehensive Certificate Template
The following template incorporates all required elements and best practices for Indian courts.
I, the undersigned, being a person occupying a responsible official position in relation to the operation of the relevant device and the management of the relevant activities, hereby certify that:
I further certify that:
- The electronic record has not been altered, modified, or tampered with since its creation/acquisition.
- The hash values stated above were calculated at the time of acquisition and can be independently verified.
- Appropriate measures were taken to preserve the integrity of the electronic record.
I make this certificate based on my personal knowledge and/or examination of the relevant computer system and records. I understand that any false statement in this certificate may constitute perjury and result in legal consequences.
Common Mistakes to Avoid
Understanding common errors helps you create certificates that will withstand judicial scrutiny and cross-examination.
- Wrong Certifier: Certificate signed by someone without relevant position or knowledge
- Vague Device Description: Generic descriptions without specific identifiers
- Missing Hash Values: No cryptographic verification of data integrity
- Incomplete Conditions: Failing to address all four conditions explicitly
- Late Filing: Certificate produced after court challenge instead of with evidence
- Boilerplate Language: Using generic language without case-specific details
- Undated Certificate: Missing date or date after evidence production
- No Relevance Link: Failing to connect certificate to specific evidence items
Mistake Analysis: Case Examples
Complex Certification Scenarios
Scenario 1: Multi-Device Evidence
When evidence comes from multiple computers or a network system:
- Identify each device separately with full specifications
- Explain how devices are interconnected (if applicable)
- Address all four conditions for each device or for the system as a whole
- Consider using multiple certificates if devices are controlled by different persons
Scenario 2: Cloud-Based Evidence
For data stored on cloud services (Google Drive, AWS, Azure, etc.):
- Identify the cloud service provider and account details
- Describe the user's lawful control and access rights
- Note that the physical computer may be unknown but the service operates properly
- Request service provider certificate if possible
- Include access logs and authentication records
Scenario 3: Third-Party System Evidence
When evidence comes from a system not under your control (bank records, telecom records):
- Certificate must be issued by the custodian of that system
- Coordinate with the third party to obtain proper certification
- Ensure the third party understands Section 63 requirements
- Obtain supporting documentation (service agreements, SLAs)
Scenario 4: Email Evidence
- Include complete email headers (not just From/To/Subject)
- Identify the email server that stored the message
- For web-based email, note the service provider
- Calculate hash of the email in its native format (EML/MSG)
- Document the email extraction method used
Cross-Examination Preparation
Defence counsel will attempt to challenge your certificate. Preparation is essential for maintaining credibility.
Anticipated Questions and Responses
Cross-Examination Survival Tips
- Stay within your knowledge: Only testify to facts you personally know
- Don't speculate: Say "I don't know" rather than guess
- Be precise: Avoid absolute statements unless certain
- Refer to documentation: Support answers with contemporaneous records
- Remain calm: Don't become defensive or argumentative
- Ask for clarification: If a question is unclear, ask for clarification
Key Indian Judgments on Section 63/65B
| Case | Year | Key Holding |
|---|---|---|
| Anvar P.V. v. P.K. Basheer | 2014 | Section 65B certificate is mandatory; electronic evidence without it is inadmissible |
| Shafhi Mohammad v. State of H.P. | 2018 | Court can relax certificate requirement in specific circumstances (later limited) |
| Arjun Panditrao Khotkar v. Kailash Kushanrao Gorantyal | 2020 | Certificate is mandatory; Anvar P.V. position reaffirmed; Shafhi Mohammad interpretation clarified |
| Tomaso Bruno v. State of U.P. | 2015 | Call records without Section 65B certificate are inadmissible |
| State (NCT of Delhi) v. Navjot Sandhu | 2005 | Early recognition of electronic evidence requirements (pre-Anvar) |
The Supreme Court's 2020 judgment in Arjun Panditrao definitively established that the Section 65B (now Section 63 BSA) certificate is MANDATORY, not directory. The three-judge bench overruled any interpretation suggesting certificates could be dispensed with. This judgment remains the controlling precedent under BSA 2023.
- Section 63 BSA certificate is MANDATORY for electronic evidence admissibility (per Arjun Panditrao)
- All four conditions must be explicitly addressed in the certificate
- Device identification must be specific: make, model, serial number, location
- Hash values (MD5 and SHA-256) are essential for integrity verification
- The certifier must have relevant position and knowledge - not just any employee
- Certificate should be produced along with evidence, not as an afterthought
- Prepare for cross-examination with documented evidence and clear explanations
- Complex scenarios (cloud, multi-device, third-party) require special handling