Upgrad
LCI Learning

Share on Facebook

Share on Twitter

Share on LinkedIn

Share on Email

Share More

Anil (salesman)     15 September 2013

Email is a valid evidence in family court

whether e mail is a valid evidence in family to court to prove certain thing or how can i prove that if the sender says that he has not send this e mail  help me 



Learning

 11 Replies

rajiv_lodha (zz)     15 September 2013

Email is an admissible evidence.

Burden of proof lies wid u to prove that its sent by opp party from his/her id

T. Kalaiselvan, Advocate (Advocate)     16 September 2013

Email is not a reliable evidence despite your strong proof

Dr. Jyothi Vishwanath (Associate Professor of Law)     16 September 2013

E-mail evidence needs to be corroborated by other strong evidence to support it. No relief can be granted only on the basis of email proof.


(Guest)

Corroborate with cyber crime branch.  They will get the IP match verified for you.

Vivek (manager)     17 September 2013

In one of the case, i have seen, wife's brother sent mail saying husband used some words like "f**k u" to his wife.  Later when it came to court and divorce, he started arguing that he never sent any such mails.

Vivek (manager)     17 September 2013

Also, mails sent/received very long back, are difficult to prove though it is admissable

Ms.Nirmala P.Rao (CEO)     17 September 2013

Dear Client,

 

               According to the amended rules of Evidence act now electronic evidence such SMSes and emails  erc would validly constitute evidence and admissible in a court of law to prove or disprove something.

 

Ms.Nirmala P.Rao

Legal Expert

 

 

 


(Guest)

Dear Anil,

 

The contents of electronic records may be proved in accordance with the provisions of section 65B Indian Evidence ACT 1872.

 

Plz do read the following 65B Indian Evidence Act 1872 which is as follow:


 

65B. Admissibility of electronic records

(1) Notwithstanding anything contained in this Act, any information contained in an electronic record which is printed on a paper, stored, recorded or copied in optical or magnetic media produced by a computer (hereinafter referred to as the computer output) shall be deemed to be also a document, if the conditions mentioned in this section are satisfied in relation to the information and computer in question and shall be admissible in any proceedings, without further proof or production of the original, as evidence of any contents of the original or of any fact stated therein or which direct evidence would be admissible.

 

(2) The conditions referred to in sub-section (1) in respect of a computer output shall be the following, namely :-

 

(a) the computer output containing the information was produced by the computer during the period over which the computer was used regularly to store or process information for the purposes of any activities regularly carried on over that period by the person having lawful control over the use of the computer;

 

(b) during the said period, information of the kind contained in the electronic record or of the kind from which the information so contained is derived was regularly fed into the computer in the ordinary course of the said activities;

 

(c) throughout the materiel part of the said period, the computer was operating properly or, if not, then in respect of any period in which it was not operating properly or was out of operation during that part of the period, was not such as to affect the electronic record or the accuracy of its contents; and

 

(d) the information contained in the electronic record reproduces or is derived from such information fed into the computer in the ordinary course of the said activities.

 

(3) Where over any period, the functions of storing or processing information for the purposes of any activities of any regularly carried on over that period as mentioned in clause (a) of sub-section (2) was regularly performed by computer, whether-

 

(a) by a combination of computers operating over that period; or

 

(b) by different computers operating in succession over that period; or

 

(c) by different combinations of computers operating in succession over that period; or

 

(d) in any other manner involving the successive operation over that period, in whatever order, of one or more computers and one or more combinations of computers.

 

all the computers used for that purpose during that period shall be treated for the purposes of this section as constituting a single computer; and references in this section to a computer shall be construed accordingly.

 

(4) In any proceedings where it is desired to give a statement in evidence by virtue of this section, a certificate doing any of the following things, that is to say,-

 

(a) identifying the electronic record containing the statement and describing the manner in which it was produced;

 

(b) giving such particulars of any device involved in the production of that electronic record as may be appropriate for the purpose of showing that the electronic record was produced by a computer;

 

(c) dealing with any of the matters to which the conditions mentioned in sub-section (2) relate, and purporting to be signed by a person occupying a responsible official position in relation to the operation of the relevant device or the management of the relevant activities (whichever is appropriate) shall be evidence of any matter stated in the certificate; and for the purpose of this sub-section it shall be sufficient for a matter to be stated to the best of the knowledge and belief of the person stating it.

 

(5) For the purposes of this section,-

 

(a) information shall be taken to be supplied to a computer if it is supplied thereto in any appropriate form and whether it is so supplied directly or (with or without human intervention) by means of any appropriate equipment;

 

(b) whether in the course of activities carried on by any official, information is supplied with a view to its being stored or processed for the purposes of those activities by a computer operated otherwise than in the course of those activities, that information, if duly supplied to that computer, shall be taken to be supplied to it in the course of those activities;

 

(c) a computer output shall be taken to have been produced by a computer whether it was produced by it directly or (with or without human intervention) by means of any appropriate equipment.

 

Explanation.- For the purposes of this section any reference to information being derived from other information shall be a reference to its being derived there from by calculation, comparison or any other process.]

 

 

I hope all above information's would be higly informative and useful for you in your case.


Thank's & regard's.

 

A sufferer...

A.VIVEK ADVOCATE (ADVOCATE)     19 September 2013

IT CAN BE USED AS A VALID  DOCUMENTARY EVIDENCE 

stanley (Freedom)     20 September 2013

Email although accepted is difficult to prove since technology has over taken law hence I disagree with Dr. vishwanathan Jyothi Asst professor of law , Nirmala P.Rao   legal experts . After going through the article below i wish for our legal experts to clarify their stand on the subject matter that they have stated .

Just reading the law and farting in terms of law does not hold good .

Now One would state that headers have to be submitted along with the email , along with the Ip address etc etc . 

Now my question is where are  emails stored ?can the above two stated experts clarify their stand ?

Now how many judges are competent to understand the evidence of emails in india when as of date although emails are acceptable . Do the judges accept summons being sent by emails in india is my point of view when as of date electronic evidence is accepted .  ;)

 

 Email was a particularly powerful one as it provided an instant variant of the older posted mails (now called snail mail), and facilities such as attachments and chat have only served to make it more and more powerful. Soon after the advent of email, its quick and efficient nature began to be used by criminals for planning and conducting various crimes. Even terrorist activities are nowadays planned over the internet, making this facility, once intended to be a convenience, a highly capable and dangerous means to ensure the planning and execution of various nefarious activities that may be planned. In when the first cases came to courts all over the world in relation to criminal activities being conducted by terrorists, it was found- much to the horror of the courts- that there were no existing laws that could deal with the issue of email being a source of evidence. Even if various terms that were used in the law were interpreted in the context of electronic evidence, admissibility remained a major issue. Similar problems were also faced by courts and judges in India, who were finding it difficult to fit email (or indeed any electronic evidence) into the ambit of the existing evidentiary framework. In order to combat such an eventuality, the Information Technology Act was passed in 2000 and certain changes were brought about to the existing criminal justice framework to ensure that the future was secure. Specifically, certain sections of the Procedure codes were amended, as were certain provisions of the Indian Evidence Act. As stated earlier, this paper aims to look at the effect that such amendments have had on the law relating to email as evidence in India, and aims to point out any loopholes that may exist in the law as it exists currently. Further, it will look at the current status of the law with respect to other countries and traces out certain improvements that may be made to the law. THE LAW IN INDIA AND ITS ASPECTS A number of amendments were made to the Evidence Act in 2000 in order to bring it up to date with trends in electronic evidence. These changes were made along with the passing of the Information Technology Act, 2000, which created an entirely new set of crimes in India known as cyber crimes. The provisions of the IT Act were to be bolstered by the Evidence Act. The changes made to the Evidence Act relevant in application to emails are as follows: (1) Definition of Evidence: The definition of Documentary evidence was expanded to include electronic records. (2) Definition of Admission: was expanded to include admissions in form of electronic documents. (3) Addition of S.22-A: It was added to limit the relevance of oral admissions as to the contents of electronic records to when the genuineness of the electronic record is questioned. (4) Addition of S.65-A and S.65-B: Section 65-A refers to the provisions of S.65-B for the proving of electronic records. Section 65-B talks about the admissibility of electronic records. The conditions for admissibility of information are as follows: (1) The computer was regularly used by a person having lawful control over the use of the computer. (2) The information required or derived was regularly fed into the computer in the ordinary course of the said activities. (3) The Computer was operating properly, or if not, the defect did not affect the electronic record or the accuracy of the contents. The information contained in the electronic record reproduces or is derived from such information on a computer in the ordinary course of nature. The section also goes on to assume that transactions in multiple computers can be considered to be from one computer for the purpose of investigation. Further, the computer output once taken out must be certified by a person occupying a responsible official position in relation to the managing of such electronic evidence.[1] (1) Section 85-B (a): This sub-section lays down the presumption that a court shall presume that a secure electronic record is secure since the time when it was first secured. (2) Section 88-A: This is the only section that directly deals with emails as such. It states that the presumption that exists in the court is that an email first sent by the originator is presumed to be the same as the one that is received. However, the courts will not make any presumptions as to who sent the message. One major problem that exists with the amended provisions is that there is great emphasis in the substantive provisions on the computer itself and not the data that is retrieved from it. For example, there is only one substantive provision that deals directly with email or other media such as chat which are not stored on the computer of entry of data but on the server. Further, now that torrents have come into being, the data only exists in the internet, not on any specific computer. This shows how technology is moving ahead and law is falling behind. The second major problem that exists is treating email as analogous to ordinary mail. While physical evidence has been well understood by the all parties in the court process for centuries, email is non-physical electronic concept whose public perception can be measured in less than two decades. It is human nature to draw analogies between new concepts and old as an aid to understanding. This is true of email in the legal process where it is explained and examined in terms of its similarity with conventional mail[2]. There is 1

always a danger with this approach that the analogy can be stretched beyond the point where it truly relates to the newer concept. To demonstrate this point, consider the following scenarios that are eminently possible in the email world, but beyond comprehension in the world of conventional mail[3]: (1) Mail is not stolen, diverted or lost but simply spontaneously deletes itself due to viruses; (2) Between one letter and the next, the sorting off ice relocates itself to another country (and therefore jurisdiction); (3) A mail is altered, its envelope changed, the postmark tampered with and no physical evidence is produced, as the IP Address may vary from place to place; (4) A single letter is simultaneously delivered to multiple recipients; and (5) The same mail appears visually different to two different viewers. These are merely a few of the reasons why email should not be treated evidentially in the same manner as real mail. The that precedes Mail may be a small one, but its effect is huge. The lack of reference to email except in Section 88-A causes a number of problems. With respect to admissibility, it leaves room for a defence counsel to argue that the material is not admissible simply because the section dealing with the admissibility of electronic records For instance, Sections 65-B (2) (a) says that a condition for admissibility is that the data was entered regularly. This may be true in the case of a plan being made on the computer on software, but sending the plan itself, which will constitute conclusive proof of conspiracy, does not require regular use or even use in the ordinary course of the said activities (as in 65-B (2) (b) or (d)). Further, Section 65-B (2) (c) talks about the computer not working properly, and that making the electronic evidence inadmissible in case the information is affected. The lack of such a section in case of email is problematic. Not making the evidence inadmissible when the email server is inaccessible can create problems in court. The problem of hacking or viruses destroying the emails has not been dealt with in India[4]. In Section 39, the onus is on the court to decide what part of the series of letters (emails) is necessary. This is not an equitable way, as both parties might separately have important information which supports their cause. In such a situation, it would be best to allow both parties to choose their relevant parts separately and then ask the court to look into the relevance of statements. This way, the court will not miss out on any revelation that might be made by the parties in either case, and will be able to meet the stated purpose of the section i.e. to grasp the full understanding of the nature and effect of the statement, and of the circumstances under which it was made. Focus entirely on the computer and not on other media such as emails and chat which are not stored in the computer but on a server, which is not the computer in which the data is entered. The definition of computer may be extended to include server, as it is not necessarily the computer in which the entry is being made. But this has not been done. The term computer itself is not defined in Section 3 of the Evidence Act. This is a major loophole. Further, nowadays, it is not only computers but also phones and Personal Digital Assistants (PDAs) which can send emails and perform functions as computers. Whether they can be considered to be computers is difficult to imagine, especially with the lack of any amendments whatsoever[5]. Further, no express reference to emails as such or other electronic media such as chat can be problematic, as criminals may be exempted purely on the basis of the fact that phones/PDAs dont fall into the ambit of computers. The Parliament Attack case[6] - State vs Navjot Sandhu @ Afsan Guru and Shaukat Hussain Guru vs State- had Justices Reddy and Naolekar recognizing cell phone messages as admissible evidence. That itself is laudable, as Sections 65-A and B were bought in to consider the electronic evidence, but whether this extends to emails sent from phones remains to be seen. Another approach that was taken by the court was to take the aid of the Information Technology Act 2000. SMSs were considered in the Shivani Bhatnagar case[7] for the first time to be electronic records as per Section 2 (t)[8] of the IT Act. However, this again is problematic for email, as electronic records do not necessarily have to mean electronic records that exist in a machine. Further, even Section 44 of the POTA Act has recently made electronic evidence admissible[9] One approach that the court could take in this case is to not consider Section 65-B and other associated Sections is to consider email produced as real evidence. It involves not seeing what the computer produces but simply what is attained out of it to see whether or not there is evidence[10]]. This approach was seen in the case of R. vs Wood[11], in which the court said that the computer being used as a calculator could make it admissible. Similarly, a cellphone or PDA being used as a forwarding device as opposed to a creator of the email could be grounds for including it as evidence. Another such case was Castle vs Cross[12], in which the prosecution sought to rely on a print-out of an automatic breath-testing device, which was considered to be a computer. However, just because a particular email is admissible doesnt make it the best possible evidence. Gopal Subhramaniam stated in his submissions in the Parliament Attack case that admissibility and credibility are two distinct aspects, as pointed out by Mr. Gopal Subramanium. So, even if it is admitted doesnt automatically mean that it is considered as valid evidence. Material admitted must be relevant and must not be hearsay evidence as it is inadmissible in most cases in India. However, it may be repelled on grounds of the mail being more prejudicial to the cause of the defendant than probative in nature, in which case the value of the email as evidence will be severely dented[13]. It may also be called prejudicial if it releases too much personal information about the defendant without enough substantive evidence being seen[14]. There has been no litigation in India laying down the line between prejudicial and probative. In the UK however, that case of People vs Miller[15] laid down that email messages between a wife and a husband are not prejudicial merely because they are s*xually explicit. 2

IMPROVMENTS FROM FOREIGN CASES The law in India needs to be more regimented in a number of ways. For instance, in the United States, the standard for admissibility was well set for computer technology in civil litigation on the following grounds[16]: (1) Whether the evidence is relevant, material and competent; (2) Whether the evidence is best evidence; (3) Whether the evidence is hearsay/not hearsay; and (4) Whether or not the evidence is authentic. There has been a lot of litigation in deciding the authenticity of emails. In India, for the checking of the computer and authenticating of any electronic evidence, the computer is usually sent to the National Informatics Center in Nagpur- a process which stalls litigation at the expense of distance, time, lack of expertise and overall cost[17]. As a result of this, documents, let alone emails are not properly authenticated. In the Forbes Patvolk[18] case, a Chennai Tax Tribunal rejected an email saying it was not signed by authority. In the Ridhi Sidhi Furniture case[19], an email was rejected on the grounds that the name of the sender of the email was blocked in copies supplied to the importer and the address of the person sending the quotation was not known as well. Grounds of challenge of relevance have also been clearly defined in the United States in the case of Strauss vs Microsoft Corporation[20] as follows: (a) Integrity of the data (b) Integrity of the hardware/software (c) Security of the system Though the court did not mention this, computer emails can be challenged on grounds of it being hearsay evidence as well[21]. But such use in India has not yet been identified. Deletion of emails is another problem which the Indian Courts havent dealt with yet which has been seen abroad. There is a possibility that the deletion of mails has not yet been noticed as well. It has been held that the remnants of a deleted email remain on the hard disk and the email account itself[22]. Sophisticated technologies do exist that could make recovery possible even when a computers hard disk has been formatted completely[23]. Hidden and deleted files were in fact recovered and admitted to the court in the Canadian case of Commonwealth vs Copenhefer[24]. However, that is not a hard and fast rule. Until such time as the majority of international software developers agree new protocols that enforce different rules, investigators and legal practitioners must accept that sometimes logs and audit trails are not kept, and that almost nothing in the email world can be taken for granted. There is no recognition in India of such problems. The British Standards Institution, in their 1999 Code of Practice for Legal Admissibility and Evidential Weight of Information Stored Electronically, have this to say with respect to audit trail data[25]: When preparing information for use as evidence, it is often necessary to provide further supporting information. This information may include details such as date of storage of the information, details of the movement of information from medium to medium and evidence of the controlled operation of the system. These details are known as audit trail information. The audit trail as defined for the Code consists of the aggregate of the information necessary to provide a historical record of all significant events associated with stored information and the information management system. Intent and knowledge is also specifically recognized abroad in case of emails. In the case of State vs Branbury[26], emails were recovered which stated that drug dealers did not want the police to find out about their drug trade. This was held as adequate evidence. A similar parallel has been seen in the yet undecided case of Binayak Sen[27]. No provision or recognition yet exists either in the Evidence Act or by the court about emails forming proof of evidence of character, as in S.140[28], as it only talks about a Witness to Character, and not Proof of Character. However, in the United States, there are express provisions talking about discovery of the character of a person through email. This is bound to face challenge in India on grounds of probative and prejudicial evidence[29][29]. There are three categories laid down abroad, which are as follows: (1) Character of Accused (2) Character of alleged victim (3) Character of witness. CONCLUSION It is evident that email as evidence in India has not reached or been used to its full potential just yet. The government and the courts have chosen to ignore the obvious possibilities that email offers as evidence and have elected to stick to the straight and narrow. Further, the amended sections of the Evidence Act are poorly worded and difficult to understand without muddling up their true intent and as a result, are difficult to interpret as well. The gulf between the legal and technical worlds needs to the bridged, as was done very well in the case of R. vs Rowe[30][30]. The evidence in India may be considered not adequate as the courts might find it too difficult to understand[31][31] due to the lack of competence of judges. It is obvious that the sections of the Evidence Act need to be amended to properly include within their ambit all the possibilities that email offers as evidence such as its immortality as well as its potential as smoking gun evidence, which is something that is increasingly common for all computer based evidence[32][32]. As has been stressed by this paper, there is a huge problem in India regarding the very approach to electronic evidence, as the law relies more on the device producing the data than the data itself, which is hugely problematic with chat and email as they neednt exist in a computer but in the internet itself.

Ms.Nirmala P.Rao (CEO)     20 September 2013

Dear Client,

 

                 In US(Federal rules of Civil procedure are amended) and UK and several other jurisdictions evidence law is amended  to include electronic evidence such as emails and files etc for the purpose of e discovery as electronic documents are difficult to completely get destroyed  and they are admissible as relevant   and   full proof of  documentary evidence,   and of course without compromising on their integrity.. I strongly advocate that  India also amend our evidence law to make electronic evidence such as emails  through e  discovery as  full proof documentary evidence as in the above jurisdictions for the purpose of e discovery. or discovery process in general

 

Ms.Nirmala P.Rao

Legal Expert


Leave a reply

Your are not logged in . Please login to post replies

Click here to Login / Register