If you're a victim of cyber crime, capturing evidence correctly is crucial. Indian courts have specific requirements for digital evidence under the Information Technology Act, 2000 and the Indian Evidence Act.
Section 65B — The Key Provision
Section 65B of the Indian Evidence Act governs the admissibility of electronic records. For digital evidence to be accepted:
1. Certificate Required: A certificate under Section 65B(4) must accompany the evidence
2. Integrity Preserved: The evidence must not have been tampered with
3. Chain of Custody: Clear documentation of who handled the evidence and when
4. Hash Verification: Cryptographic hash to prove the evidence hasn't been modified
Common mistakes that make evidence inadmissible
How Cyber Rakshak Solves This
SHA-256 Hash Verification
Every piece of evidence captured in Cyber Rakshak is immediately hashed with SHA-256. This creates a unique digital fingerprint that proves the evidence hasn't been tampered with.
AES-256 Encryption
Evidence is encrypted at rest with AES-256 encryption, ensuring it cannot be accessed or modified without authorization.
Complete Metadata
Cyber Rakshak automatically captures: timestamp, GPS coordinates, device information, network state, and user identity.
Audit Trail
Every action on evidence is logged: creation, access, export, and verification — creating a complete chain of custody.
Court-Ready Export
Export evidence as a PDF report with all metadata, hash values, and chain of custody — ready for submission to police or courts.
Don't let poor evidence handling prevent justice. Use Cyber Rakshak's Evidence Vault.