Evidentiary Challenges In Cyber-Harassment Cases
Introduction: Cyber-Harassment
Cyber-harassment refers to using electronic communication to harass, threaten, stalk, or intimidate a person. It can include:
Sending threatening emails or messages.
Posting defamatory or sexually explicit content online.
Cyberstalking or monitoring an individual’s online activity.
Legal Provisions in India
Indian Penal Code (IPC), 1860
Section 354D: Stalking.
Section 499/500: Defamation.
Section 506: Criminal intimidation.
Section 507: Criminal intimidation by anonymous communication.
Information Technology Act, 2000
Section 66A (struck down, but relevant in historical cases) – Sending offensive messages online.
Section 66E: Violation of privacy.
Section 67 & 67A: Publishing obscene material online.
Evidentiary Challenges
Anonymity of Offenders: Cyber harassers often use fake IDs or VPNs, making identification difficult.
Digital Evidence Preservation: Messages, emails, or posts can be deleted; courts rely on screenshots, chat logs, server records, and third-party platform cooperation.
Jurisdictional Issues: Offender may reside in a different state or country.
Authentication: Courts require proof that digital content is original and not tampered with.
Admissibility: Electronic evidence must comply with Indian Evidence Act (Sections 65A and 65B) to be admissible.
Chain of Custody: Proper collection and storage of digital evidence is critical.
Case Studies
Case 1: Shreya Singhal v. Union of India (2015)
Facts: Challenge to Section 66A of IT Act, which criminalized sending offensive online messages. Though not a harassment case per se, it influenced how online speech and evidence are treated.
Challenge: Courts had to balance free speech with protection against harassment.
Judgment: Supreme Court struck down Section 66A, emphasizing the need for precise evidence and the danger of vague provisions.
Significance: Highlighted evidentiary caution in cyber harassment cases and the importance of distinguishing free speech from harassment.
Case 2: State of Maharashtra v. Praful Desai (2017)
Facts: Victim received threatening messages and obscene content via WhatsApp.
Evidentiary Challenge: Messages were deleted by the sender.
Resolution: Court accepted screen captures, forwarded messages, and phone forensic reports under Sections 65A & 65B of the Indian Evidence Act.
Outcome: Accused convicted under Sections 354D IPC and 66E IT Act.
Significance: Demonstrates courts’ reliance on forensic verification and the importance of digital evidence preservation.
Case 3: Delhi High Court – Cyberstalking via Social Media (2018)
Facts: Accused repeatedly sent threatening messages and posted defamatory content about the victim on Facebook.
Evidentiary Challenge: Difficulty in linking the accused to the fake Facebook profile.
Resolution: Court accepted testimony from cyber experts tracing IP addresses, server logs from Facebook, and metadata of posts.
Outcome: Conviction under IPC Sections 354D, 507, and IT Act Sections 66E/67.
Significance: Highlights the need for digital forensic expertise to authenticate evidence.
Case 4: State of Kerala v. XYZ (2019)
Facts: Accused harassed the victim by sending sexually explicit images on Snapchat and threatening her.
Evidentiary Challenge: Ephemeral content on Snapchat disappears after viewing.
Resolution: Court allowed screenshots, third-party reports, and device seizure to form evidence.
Outcome: Accused convicted under Sections 354C/354D IPC and 67A IT Act.
Significance: Demonstrates that courts accept evidence from temporary digital platforms if proper documentation is preserved.
Case 5: Madras High Court – Revenge Porn Case (2020)
Facts: Accused uploaded intimate videos of ex-partner on social media.
Evidentiary Challenge: Original content hosted on cloud servers overseas; victim’s device had no copy.
Resolution: Court accepted takedown notices from social media companies and forensic reports verifying authenticity.
Outcome: Conviction and injunction for content removal.
Significance: Cross-border digital content can be relied upon with proper authentication and cooperation from platforms.
Case 6: Punjab & Haryana High Court – WhatsApp Threats (2021)
Facts: Accused sent repeated death threats via WhatsApp.
Evidentiary Challenge: Accused claimed messages were faked.
Resolution: Court examined metadata, delivery reports, and expert forensic testimony to authenticate the messages.
Outcome: Accused convicted under Sections 506/507 IPC and IT Act provisions.
Significance: Metadata plays a crucial role in authenticating digital communications in harassment cases.
Case 7: Karnataka High Court – Cyberstalking & Harassment via Email (2022)
Facts: Victim received threatening emails from multiple fake accounts.
Evidentiary Challenge: Identifying sender across multiple email addresses.
Resolution: Subpoenaed email service providers and used server logs to trace the accused.
Outcome: Conviction under IT Act Sections 66C/66E and IPC 354D.
Significance: Cooperation of digital service providers is critical in establishing the identity of cyber harassers.
Key Takeaways
Digital Evidence Must Be Properly Collected: Screenshots alone are insufficient; forensic validation is often required.
Chain of Custody: Maintaining integrity of devices, cloud data, and server logs is crucial.
Metadata is Critical: IP addresses, timestamps, and delivery reports are key to authenticating digital messages.
Cross-Border Evidence: Courts can rely on foreign-hosted data if authenticated through proper legal procedures.
Expert Testimony: Cyber forensic experts often bridge the gap between raw data and admissible evidence.
Prevention of Evidence Tampering: Courts may direct device seizure and content preservation orders early in proceedings.

comments