A Comprehensive Analysis of Proving Digital Documents Under the Bharatiya Sakshya Adhiniyam 2023

0
3



 The digital transformation of Indian society has fundamentally altered the evidentiary landscape in judicial proceedings, requiring courts to adapt their evaluation frameworks to accommodate the complexities of electronic evidence authentication. The Bharatiya Sakshya Adhiniyam 2023 represents a paradigmatic shift in how Indian courts approach the admissibility and proof of electronic documents, moving beyond the colonial-era constraints of the Indian Evidence Act 1872 to establish a comprehensive framework specifically designed for the digital age. This transformation has particular significance for courts dealing with increasingly prevalent forms of electronic evidence, including WhatsApp communications, CCTV footage, digital camera photographs, and various forms of digital pictures that have become central to modern litigation. The judicial system’s approach to these digital records requires a nuanced understanding of both legal requirements and technological realities, as courts must balance procedural rigor with practical considerations to ensure that justice is not compromised by overly technical requirements.

Evolution of Electronic Evidence Framework: IEA 1872 vs BSA 2023

The Evolutionary Framework: From Secondary to Primary Evidence Classification

The most significant transformation introduced by the BSA 2023 lies in the fundamental reclassification of electronic records from secondary evidence under the Indian Evidence Act to primary evidence under the new framework. This paradigmatic shift has profound implications for how courts evaluate electronic evidence, as it eliminates the presumptive hierarchy that previously placed electronic records in a subordinate position to traditional documentary evidence. Under Section 57 of the BSA 2023, electronic or digital records stored simultaneously or sequentially in multiple files are explicitly recognized as primary evidence, with each stored copy considered equivalent to an original document when produced from proper custody. This reclassification reflects a judicial recognition that electronic records are not merely copies of some theoretical “original” but are themselves authentic manifestations of digital information that deserve equal evidentiary weight.


The practical implications of this reclassification are substantial for courts, as it fundamentally alters the burden of proof and authentication requirements. When courts encounter electronic evidence presented as primary evidence, they no longer need to justify its admission through the complex secondary evidence framework that previously required extensive procedural compliance. However, this enhanced status comes with corresponding responsibilities, as courts must now apply more rigorous authentication standards to ensure that the elevated evidentiary status is not abused through the presentation of manipulated or unreliable digital records. The judicial system has responded to this challenge by developing enhanced technical verification procedures that rely heavily on expert testimony and sophisticated authentication mechanisms.

Comprehensive Judicial Evaluation Framework Under BSA 2023

Courts operating under the BSA 2023 framework follow a systematic evaluation process that begins with the initial submission and classification of electronic evidence. The judicial evaluation framework requires courts to first determine whether the evidence being presented constitutes primary or secondary evidence, a determination that has significant implications for the subsequent authentication requirements. When the original electronic device containing the evidence is physically produced in court, courts can treat the evidence as primary evidence, potentially eliminating the need for the Section 63(4) certificate that is mandatory for secondary evidence. This distinction requires courts to carefully examine the nature of the evidence presentation and make informed decisions about the appropriate evidentiary classification.

Court’s Electronic Evidence Evaluation Framework under BSA 2023

The certificate verification process under Section 63(4) represents one of the most critical aspects of the judicial evaluation framework, requiring courts to scrutinize both the administrative and technical components of the dual-signature requirement. Courts must verify that Part A of the certificate, completed by the responsible person, contains comprehensive details about the electronic device or record source, including technical specifications and ownership information. Simultaneously, courts must evaluate Part B of the certificate, completed by an expert, to ensure that the technical verification meets the required standards for hash value calculation and integrity assessment. This dual verification process places significant responsibility on courts to assess the credibility and qualifications of both the responsible person and the technical expert.

Authentication Standards for WhatsApp Messages and Social Media Communications

WhatsApp messages and social media communications present unique challenges for courts due to their ubiquitous nature and the ease with which they can be manipulated or taken out of context. Courts have developed specific protocols for evaluating WhatsApp evidence that focus on both technical authentication and contextual verification. The judicial approach to WhatsApp evidence requires courts to examine not only the technical aspects of message extraction and preservation but also the communicative context that gives meaning to the digital exchanges. Recent judicial decisions have emphasized that WhatsApp conversations cannot be admitted as evidence without proper certification under Section 63(4), reinforcing the mandatory nature of technical authentication even for seemingly straightforward digital communications.


The authentication process for WhatsApp evidence requires courts to evaluate multiple layers of verification, including device ownership, message integrity, and the reliability of extraction methods. Courts must assess whether the messages were obtained through legitimate means, such as chat exports or forensically sound device imaging, rather than potentially unreliable methods like screenshots that can be easily manipulated. The blue tick feature in WhatsApp can serve as additional corroborative evidence of message delivery and reading, but courts must be careful not to overstate its probative value or treat it as conclusive proof of communication authenticity. The judicial evaluation also extends to examining the broader context of the conversation, including the identity verification of participants and the chronological consistency of the message exchange.

CCTV footage represents one of the most technically complex forms of electronic evidence that courts regularly encounter, requiring judicial evaluation of both technical and evidential aspects. Courts must apply a multi-factor analysis that examines the quality of the footage, the reliability of the recording system, and the chain of custody from the moment of recording to presentation in court. The judicial approach to CCTV evidence has evolved to recognize that while perfect image quality is not always achievable, the footage must be of sufficient clarity to support the inferences being drawn from it. Courts have established that CCTV footage can serve as the sole basis for conviction in appropriate cases, provided that the technical authentication requirements are met and the footage clearly depicts the relevant events.


The authentication requirements for CCTV footage under BSA 2023 require courts to scrutinize both the technical specifications of the recording system and the operational procedures followed during the relevant time period. Courts must verify that the CCTV system was functioning properly during the material time, that the footage has not been altered or tampered with, and that the extraction and preservation methods maintain the integrity of the original recording. The mandatory Section 63(4) certificate for CCTV footage must include detailed technical information about the recording equipment, storage systems, and the manner in which the footage was extracted for presentation. Courts have emphasized that failure to produce this certificate renders CCTV footage inadmissible, highlighting the critical importance of proper procedural compliance.

Digital Photography and Image Authentication in Judicial Proceedings

Digital photographs and images require courts to apply sophisticated authentication standards that address both the technical integrity of the image files and the reliability of the capture process. The judicial approach to digital photography has evolved to incorporate a comprehensive six-factor test that examines the reliability of the recording equipment, the qualifications of the operators, the proper implementation of input/output procedures, the reliability of the software utilized, the correct programming and operation of the equipment, and the proper identification of the output. This multi-factor analysis requires courts to engage with technical details that may be beyond the traditional scope of judicial expertise, necessitating greater reliance on expert testimony and technical verification.


The hash value requirements introduced by BSA 2023 have particular significance for digital photography authentication, as they provide courts with a reliable mechanism for detecting tampering or alteration. Courts must verify that the hash values calculated at the time of evidence collection match those presented at trial, with any discrepancy indicating potential manipulation that could render the evidence inadmissible. The authentication process also requires courts to examine metadata associated with digital images, including EXIF data that can provide crucial information about the camera settings, date and time of capture, and potentially the geographic location where the photograph was taken. However, courts must also be aware that metadata can be manipulated, requiring additional verification through expert analysis and technical authentication.

Expert Authentication and Technical Verification Requirements

The BSA 2023’s introduction of mandatory expert authentication represents a significant enhancement in the judicial evaluation of electronic evidence, requiring courts to carefully assess the qualifications and credibility of technical experts. Courts must evaluate whether the proposed expert possesses the necessary technical knowledge and experience to provide reliable testimony about the specific type of electronic evidence being presented. The dual-signature requirement under Section 63(4) places particular emphasis on the expert’s role in verifying technical aspects such as hash value calculation, file integrity assessment, and the detection of potential tampering or alteration. This enhanced reliance on expert testimony requires courts to develop greater sophistication in evaluating technical evidence and understanding the limitations and capabilities of various authentication methods.


The judicial assessment of expert qualifications has become increasingly important as the complexity of electronic evidence continues to evolve. Courts must determine whether an expert’s background in areas such as digital forensics, computer science, or specific technical domains qualifies them to provide reliable testimony about particular types of electronic evidence. The expert authentication process also requires courts to evaluate the methodologies employed by experts in their analysis, ensuring that the technical procedures followed meet accepted standards for digital evidence examination. Courts have recognized that the rapidly evolving nature of digital technology may require ongoing education and adaptation of expert qualification standards.


Implementation Challenges and Practical Considerations

Courts face significant practical challenges in implementing the enhanced electronic evidence framework under BSA 2023, particularly in terms of technical infrastructure and judicial training. The requirement for hash value verification and technical authentication places new demands on court systems that may lack the necessary technological resources or technical expertise. Courts must develop procedures for handling and verifying electronic evidence that ensure both security and accessibility, while also maintaining the traditional requirements of judicial transparency and public access. The implementation challenges are particularly acute in smaller jurisdictions where technical resources and expert witnesses may be limited.


The volume and complexity of electronic evidence present additional challenges for court management and case processing. Digital devices can contain vast amounts of data, requiring courts to develop efficient procedures for reviewing and evaluating relevant evidence while avoiding unnecessary delays. Courts must also address privacy concerns that arise when electronic evidence contains personal information beyond what is directly relevant to the case. The judicial system’s adaptation to these challenges requires ongoing collaboration between the legal and technical communities to develop best practices that serve the interests of justice while respecting individual rights and maintaining procedural efficiency.

Summarizing key points

Under the Bharatiya Sakshya Adhiniyam (BSA) 2023, proving electronic evidence including WhatsApp posts, CCTV footage, digital camera photographs, and digital pictures requires strict compliance with Sections 62 and 63.

Legal Framework

Section 62 of BSA establishes that the contents of electronic records may be proved in accordance with the provisions of Section 63. Section 63 provides the comprehensive framework for admissibility of electronic records, treating them as documents if specific conditions are satisfied.

Mandatory Certification Requirement

Section 63(4) of BSA mandates a certification process similar to the old Section 65B(4) of the Indian Evidence Act, with added safeguards requiring production of the electronic record along with the certificate. The certificate consists of two parts:

  • Part A: To be filled by the party producing the evidence

  • Part B: To be filled by an expert

Conditions for Admissibility

Under Section 63(2) of BSA, electronic records must satisfy these conditions:

  • The computer output was produced during regular use for specific activities by the person having lawful control

  • Information was regularly fed into the device in the ordinary course of activities

  • The device was operating properly throughout the material period

  • The electronic record accurately reproduces the original information

Specific Evidence Types

WhatsApp Posts

Recent judicial precedents confirm that WhatsApp conversations cannot be considered admissible evidence without proper certification. The Delhi High Court has repeatedly held that “WhatsApp conversations cannot be read as evidence without there being a proper certificate as mandated under the Evidence Act”. The blue tick indicating message delivery can serve as proof of receipt, but the underlying message still requires Section 63 certification.

CCTV Footage

CCTV footage can be admitted as evidence with proper certification under Section 63. The certificate should include:

  • Details of the recording system (DVR model, serial number, software)

  • Storage capacity and recording duration capabilities

  • Confirmation of continuous operation and automatic recording features

  • Statement about the system’s ability to delete older recordings when memory is full

Digital Camera Photographs

Digital photographs require certification by the person who handled the camera and transferred the data. The certificate must demonstrate compliance with Section 63 conditions, including:

  • Proper functioning of the digital camera during the relevant period

  • Regular use of the device for photography purposes

  • Accurate transfer and storage of image data

  • Maintenance of image integrity throughout the process

Digital Pictures

All digital images, regardless of source, must meet the same certification requirements. Courts apply a six-factor authentication test for computer-generated evidence:

  • Standard and competent equipment in good working order

  • Qualified operators

  • Proper input/output procedures

  • Reliable software programs

  • Correct programming and operation

  • Proper identification of the output

Practical Steps for Compliance

  1. Obtain proper certification under Section 63(4) from both the party and an expert

  2. Document the chain of custody showing how the electronic evidence was created, stored, and transferred

  3. Ensure device authenticity by providing technical specifications and operational details

  4. Maintain original formats where possible, as secondary evidence requires stricter certification

  5. Engage qualified experts to complete Part B of the certification process

The BSA has strengthened electronic evidence requirements by expanding coverage to “any communication device” and semiconductor memories, while maintaining the fundamental principle that electronic records have “the same legal effect, validity, and enforceability as other documents” when properly certified.

 Here are the electronic evidence
requirements organized into multiple focused tables for better readability:

Authentication Requirements

Evidence Type

Primary Evidence Requirements

Expert Authentication Required

WhatsApp
Messages/Posts

Original mobile device with messages

Digital forensics specialist or IT professional

CCTV
Footage

Original DVR/recording system

CCTV system technician or video forensics expert

Digital
Camera Photographs

Original camera/memory card

Digital imaging specialist or forensics expert

Digital
Pictures (General)

Original storage device

Computer forensics professional

Email
Communications

Original email server/device

Email system administrator or cyber forensics expert

Social
Media Posts

Original device with posts

Social media forensics expert

 

Key Authentication Factors

Evidence Type

Authentication Factors

WhatsApp
Messages/Posts

Blue tick confirmation, chat export integrity, device
ownership

CCTV
Footage

Camera quality, storage chain, system operational status

Digital
Camera Photographs

EXIF data, hash values, device settings, timestamp

Digital
Pictures (General)

File format integrity, creation timestamp, source device

Email
Communications

Email headers, server logs, transmission route

Social
Media Posts

Platform metadata, user authentication, post integrity

 

Technical Specifications

Evidence Type

Secondary Evidence Certificate

Hash Algorithm Requirements

WhatsApp
Messages/Posts

Section 63(4) mandatory with device details, IMEI, hash
value

SHA-256 preferred (MD5, SHA-1 acceptable)

CCTV
Footage

Section 63(4) mandatory with DVR specs, recording details

SHA-256 preferred (MD5, SHA-1 acceptable)

Digital
Camera Photographs

Section 63(4) mandatory with camera specs, metadata

SHA-256 preferred (MD5, SHA-1 acceptable)

Digital
Pictures (General)

Section 63(4) mandatory with file details, creation info

SHA-256 preferred (MD5, SHA-1 acceptable)

Email
Communications

Section 63(4) mandatory with server details, transmission
log

SHA-256 preferred (MD5, SHA-1 acceptable)

Social
Media Posts

Section 63(4) mandatory with platform details, timestamp

SHA-256 preferred (MD5, SHA-1 acceptable)

 

Common Challenges & Legal
Considerations

Evidence Type

Common Challenges

Judicial Considerations

WhatsApp
Messages/Posts

Device accessibility, message deletion, third-party
storage

Probative value vs prejudicial effect, corroborative use

CCTV
Footage

System downtime, footage quality, storage overwrite cycles

Quality sufficient for identification, chain of custody

Digital
Camera Photographs

Metadata tampering, file compression, device malfunction

Technical authentication standards, manipulation detection

Digital
Pictures (General)

Format compatibility, file corruption, editing history

File integrity verification, source authentication

Email
Communications

Server access, email forwarding, header manipulation

Transmission reliability, content authenticity

Social
Media Posts

Platform policies, account access, content modification

Platform verification, user identity confirmation

Print Page



Source link

LEAVE A REPLY

Please enter your comment!
Please enter your name here