SlideShare uma empresa Scribd logo
1 de 21
Appreciation of
Digital Evidence
in Sri Lankan Law
BY

TALWANT SINGH
ADDL. DISTRICT & SESSIONS JUDGE
DELHI DISTRICT COURTS, INDIA
Appreciation of Digital Evidence
• ICT related evidence may be computer
generated or computer related evidence and
could be even without any human intervention.
• Some countries tried to interpret computer
evidence as Documentary Evidence or Real
Evidence as in case of India.
• Then it should be governed under Rules of
Primary and Secondary evidence and it
shows that computer evidence is not easy to
consider as `documentary evidence.'
Appreciation of Digital Evidence
• Prior to the introduction of Evidence
(Special Provisions) Act, 1995 in Sri
Lanka, there was no provision under Law
of Evidence to admit Computer Evidence.
• The Evidence (Special Provisions) Act
has been introduced to manage computerbased evidence efficiently and legally in
civil and criminal proceedings before
courts.
Appreciation of Digital Evidence
• Computer' is defined in section 12 of the Act and
it means any device the functions of which
includes storing and processing of information.
• By this definition, even a Smart Phone is a
Computer.
• 'Digital evidence' or electronic evidence is any
probative information stored or transmitted in
digital form that a party to a court case may use
at trial.
Appreciation of Digital Evidence
• Computer Evidence has been specified under
section 5(1) of the Act as:
• In any proceedings where direct oral evidence of
a fact would be admissible any information
contained in any statement produced by a
computer and tending to establish the same fact
shall be admissible as evidence of that fact
subject to the conditions expressed in the same
section such as;
• The statement produced or reproduced, is
capable of being perceived by the senses;
•

Cont...
Appreciation of Digital Evidence
Cont..

• At all material times the computer producing
the statement was operating properly or, if it
was not, any respect in which it was not
operating properly or out of operation, was
not of such a nature as to affect the
production of the statement of the accuracy
of the information contained therein;
• The information supplied to the computer was
accurate and the information contained in the
statement reproduces or is derived from, the
information so supplied to the computer.
Appreciation of Digital Evidence
• It shall be sufficient to show that:
(a) during the said period there was regularly
supplied to the computer, in the ordinary course
of such activity, information of the kind
contained in the statement or of the kind from
which the information so contained is derived ;
and
(b) the information contained in the statement
reproduces, or is derived from, information
regularly supplied to the computer in the
ordinary course of such activity.
Appreciation of Digital Evidence
• Where any statement referred to in sub-section 5(1)
of the Act,
(a) It cannot be played, displayed, or reproduced in
such a manner as to make it capable of being
perceived by the senses;
(b) It is capable of being so perceived but the same
is unintelligible to a person not conversant in a
specific science; or
(c) Same is of such a nature it is not convenient to
perceive and receive in evidence, in its original
form,
• Then a transcript, translation, conversion or
transformation, as the case may be, of the same,
which is intelligible and is capable of being
perceived by the senses are admissible as
Appreciation of Digital Evidence
• Section 7 of the Act provides provisions regarding
Notices to have access to inspect evidence sought
to be produced, machine, device, or computer, any
records relating to the production of the evidence
or the system used in such production, and the
steps to be taken by the other party.
• The court may presume the accuracy of any
recording, reproduction or statement produced by,
or by use of a machine, device or computer which
is in common use where the court draws such
presumption with respect to any recording,
reproduction or statement, and in the absence of
any evidence to the contrary.
Appreciation of Digital Evidence
• As per Electronic Transactions Act No.19 of 2006, If
any information is contained in a data message,
electronic document, electronic record or other
communication made by a person who is dead or who
by reason of his bodily or mental condition is unfit to
attend as a witness;
• Or who is outside Sri Lanka and where reasonable
steps have been taken to find such person and he
cannot be found;
• Or who does not wish to give oral evidence through
fear; or who is prevented from so giving evidence,
• Then any evidence relating to such information shall, if
available, be admissible.
Appreciation of Digital Evidence
• The Courts shall, unless the contrary is proved,
presume the truth of information contained in a
data message, or in any electronic document or
electronic record or other communication; and
• In the case of any data message, electronic
document,
electronic
record
or
other
communication made by a person, that it was
made by the person who is purported to have
made it; and
• Similarly, shall presume the genuineness of any
electronic signature or distinctive identification
mark therein.
Appreciation of Digital Evidence
• The burden of proof of the genuineness of
such document has been virtually shifted
from proposing party to the opposing
party.
• There is no applicability of the Evidence
(Special Provisions) Act in relation to
any data message, electronic document,
electronic record or other document to
which the provisions of
Electronic
Transactions Act applies.
Appreciation of Digital Evidence
• Section 16 of the Payment Devices Frauds Act
deals with matters relating to evidence under the
same Act. Accordingly, a certified copy of an entry
relating to a payment device located in Sri Lanka or
outside Sri Lanka, kept by an Issuer or acquirer in
the ordinary course of business of such Issuer or
acquirer, whether kept in written form or stored by
electronic, magnetic, optical or any other means in
an information system or computer or payment
device shall be admissible in evidence in relation to
a prosecution in respect of an offence under section
3 of the Act, and shall be prima facie evidence of
the facts stated therein.
Appreciation of Digital Evidence
• Discovery of evidence is the most
essential part to prove a case and various
jurisdictions have faced common and
different types of difficulties unique to
relevant legal systems due to its own
nature (of laws), procedures etc.
• When the subject matter is discussed with
`Computer or electronic evidence', it will
be a more complicated issue compared to
discovery of non electronic evidence.
Appreciation of Digital Evidence
• With development of technology, evidence takes
a new form.
• E-mail, chat room transcripts, databases,
spreadsheets, web browser history files,
information through system backup tapes have
been replacing conventional paper documents.
• Computer evidence may be stored in hidden
files as there is a great deal of left over data
stored on their disk drives of a computer. Some
institutions may store their data at a distant
server, different website etc.
Appreciation of Digital Evidence
•
•
•
•
•
•
•
•

Digital Evidence can be found in:
e-mails
digital photographs
ATM transaction logs
word processing documents
instant message histories
files saved from accounting programs
spreadsheets
internet browser histories
Appreciation of Digital Evidence
Cont...

•
•
•
•
•
•
•

databases
Contents of computer memory
Computer backups
Computer printouts
Global Positioning System tracks
Logs from a hotel’s electronic door locks
Digital video or audio files
Appreciation of Digital Evidence
• Digital discovery tends to be voluminous, as
electronic data are cheaper and easier to copy,
archive and distribute.
• Electronic
data,
unlike
their
conventional
counterparts, do not disappear easily and difficult to
delete (or destroy) of an electronic document.
• Unlike a paper document, digital document has
increased the number of locations where potentially
discoverable documents may be found.
• Cost factor relating to digital discovery is a serious
problem due to its nature.
Appreciation of Digital Evidence
• Digital Evidence:
>tends to be more voluminous
>more difficult to destroy
>easily modified
>easily duplicated
>potentially more expressive, and
>more readily available
Appreciation of Digital Evidence
• Privacy issues will be another aspect under Digital
discovery since courts can allow access to email,
records of Web sites visited, transcripts of chat
room discussions etc. to discover such evidence.
• Standard of knowledge and competence of
investigators and their ability to explain the
relevance of electronic forensic analysing tools
used for discovery of electronic evidence also might
open doors for different level of acceptability of
such evidence in Court trials.
• It is the duty of the Forensic experts to ensure that
nothing has been added to or deleted from
electronic evidence recovered from crime scene.
Appreciation of
Digital Evidence
under Sri Lankan Law

THANKS
TALWANT SINGH
ADDL. DISTRICT & SESSIONS JUDGE
DELHI DISTRICT COURTS, INDIA

Mais conteúdo relacionado

Mais procurados

Validity of marriage formal validity
Validity of marriage  formal validityValidity of marriage  formal validity
Validity of marriage formal validityKanchan40
 
Law of Trust, Constitution of trust (short notes)
Law of Trust, Constitution of trust (short notes)Law of Trust, Constitution of trust (short notes)
Law of Trust, Constitution of trust (short notes)Ikram Abdul Sattar
 
Code of civil procedure 1908 res subjudice and res judicata
Code of civil procedure 1908 res subjudice and res judicataCode of civil procedure 1908 res subjudice and res judicata
Code of civil procedure 1908 res subjudice and res judicataDr. Vikas Khakare
 
Laches and acquiescence
Laches and acquiescenceLaches and acquiescence
Laches and acquiescenceAltacit Global
 
Maxims of Equity and Their Applications in Bangladesh
Maxims of Equity and Their Applications in BangladeshMaxims of Equity and Their Applications in Bangladesh
Maxims of Equity and Their Applications in BangladeshPreeti Sikder
 
Cpc learning module 2 jurisdiction
Cpc learning module 2 jurisdictionCpc learning module 2 jurisdiction
Cpc learning module 2 jurisdictionDr. Vikas Khakare
 
(9) similar fact evidence
(9) similar fact evidence(9) similar fact evidence
(9) similar fact evidenceHafizul Mukhlis
 
Equitable doctrines
Equitable doctrinesEquitable doctrines
Equitable doctrinesFAROUQ
 
Donatio Mortis Causa
Donatio Mortis CausaDonatio Mortis Causa
Donatio Mortis CausaSnj SNj
 

Mais procurados (20)

Law of evidence
Law of evidenceLaw of evidence
Law of evidence
 
Burden of proof ppt
Burden of proof pptBurden of proof ppt
Burden of proof ppt
 
(1) evidence (overview)
(1) evidence (overview)(1) evidence (overview)
(1) evidence (overview)
 
Private caveat
Private caveatPrivate caveat
Private caveat
 
Validity of marriage formal validity
Validity of marriage  formal validityValidity of marriage  formal validity
Validity of marriage formal validity
 
Law of Trust, Constitution of trust (short notes)
Law of Trust, Constitution of trust (short notes)Law of Trust, Constitution of trust (short notes)
Law of Trust, Constitution of trust (short notes)
 
Code of civil procedure 1908 res subjudice and res judicata
Code of civil procedure 1908 res subjudice and res judicataCode of civil procedure 1908 res subjudice and res judicata
Code of civil procedure 1908 res subjudice and res judicata
 
Laches and acquiescence
Laches and acquiescenceLaches and acquiescence
Laches and acquiescence
 
Maxims of Equity and Their Applications in Bangladesh
Maxims of Equity and Their Applications in BangladeshMaxims of Equity and Their Applications in Bangladesh
Maxims of Equity and Their Applications in Bangladesh
 
Law of evidence
Law of evidenceLaw of evidence
Law of evidence
 
Section 11
Section 11Section 11
Section 11
 
Cpc learning module 2 jurisdiction
Cpc learning module 2 jurisdictionCpc learning module 2 jurisdiction
Cpc learning module 2 jurisdiction
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Injunction i slide
Injunction i   slideInjunction i   slide
Injunction i slide
 
PRESUMPTION AND JUDICIAL NOTICE
PRESUMPTION AND JUDICIAL NOTICEPRESUMPTION AND JUDICIAL NOTICE
PRESUMPTION AND JUDICIAL NOTICE
 
(9) similar fact evidence
(9) similar fact evidence(9) similar fact evidence
(9) similar fact evidence
 
Equitable doctrines
Equitable doctrinesEquitable doctrines
Equitable doctrines
 
transfer of cases
transfer of casestransfer of cases
transfer of cases
 
Donatio Mortis Causa
Donatio Mortis CausaDonatio Mortis Causa
Donatio Mortis Causa
 
Examination of witness
Examination of witnessExamination of witness
Examination of witness
 

Destaque

Introduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaIntroduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaMaxwell Ranasinghe
 
Intellectual Property in Sri Lanka
Intellectual Property in Sri LankaIntellectual Property in Sri Lanka
Intellectual Property in Sri LankaSLINTEC
 
Law relating to intellectual property
Law relating to intellectual property Law relating to intellectual property
Law relating to intellectual property Maxwell Ranasinghe
 
Intellectual Property, Sri Lanka and Copyrights
Intellectual Property, Sri Lanka and CopyrightsIntellectual Property, Sri Lanka and Copyrights
Intellectual Property, Sri Lanka and CopyrightsUpekha Vandebona
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaEvan Pathiratne
 
Presentation on cyber crime in european union
Presentation on cyber crime in european unionPresentation on cyber crime in european union
Presentation on cyber crime in european unionSaini Heena
 
Introduction to ICTA - Org Study Presentation
Introduction to ICTA - Org Study Presentation  Introduction to ICTA - Org Study Presentation
Introduction to ICTA - Org Study Presentation Jackseen Jeyaluck
 
RBI Cyber Security Guidelines- FixNix GRC
RBI Cyber Security Guidelines- FixNix GRCRBI Cyber Security Guidelines- FixNix GRC
RBI Cyber Security Guidelines- FixNix GRCFixNix Inc.,
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernandosegughana
 
Law relating to sale of goods in Sri Lanka
 Law relating to sale of goods in Sri Lanka Law relating to sale of goods in Sri Lanka
Law relating to sale of goods in Sri LankaMaxwell Ranasinghe
 
Kerberos : An Authentication Application
Kerberos : An Authentication ApplicationKerberos : An Authentication Application
Kerberos : An Authentication ApplicationVidulatiwari
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewShankar Subramaniyan
 
What is law and introduction to law in Sri Lanka
What is law and introduction to law in Sri LankaWhat is law and introduction to law in Sri Lanka
What is law and introduction to law in Sri LankaMaxwell Ranasinghe
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber lawhimanshumunjal
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rightsharshhanu
 

Destaque (19)

Ict act in sri lanka
Ict act in sri lankaIct act in sri lanka
Ict act in sri lanka
 
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaIntroduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
 
Intellectual Property in Sri Lanka
Intellectual Property in Sri LankaIntellectual Property in Sri Lanka
Intellectual Property in Sri Lanka
 
Law relating to intellectual property
Law relating to intellectual property Law relating to intellectual property
Law relating to intellectual property
 
Intellectual Property, Sri Lanka and Copyrights
Intellectual Property, Sri Lanka and CopyrightsIntellectual Property, Sri Lanka and Copyrights
Intellectual Property, Sri Lanka and Copyrights
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri Lanka
 
3 handouts section3-9
3 handouts section3-93 handouts section3-9
3 handouts section3-9
 
Presentation on cyber crime in european union
Presentation on cyber crime in european unionPresentation on cyber crime in european union
Presentation on cyber crime in european union
 
Act9 e
Act9 eAct9 e
Act9 e
 
Introduction to ICTA - Org Study Presentation
Introduction to ICTA - Org Study Presentation  Introduction to ICTA - Org Study Presentation
Introduction to ICTA - Org Study Presentation
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
 
RBI Cyber Security Guidelines- FixNix GRC
RBI Cyber Security Guidelines- FixNix GRCRBI Cyber Security Guidelines- FixNix GRC
RBI Cyber Security Guidelines- FixNix GRC
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernando
 
Law relating to sale of goods in Sri Lanka
 Law relating to sale of goods in Sri Lanka Law relating to sale of goods in Sri Lanka
Law relating to sale of goods in Sri Lanka
 
Kerberos : An Authentication Application
Kerberos : An Authentication ApplicationKerberos : An Authentication Application
Kerberos : An Authentication Application
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process Overview
 
What is law and introduction to law in Sri Lanka
What is law and introduction to law in Sri LankaWhat is law and introduction to law in Sri Lanka
What is law and introduction to law in Sri Lanka
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
 

Semelhante a Appreciation of Digital Evidence in Sri Lankan Law

Electronic Evidence fraud conference
Electronic Evidence   fraud conferenceElectronic Evidence   fraud conference
Electronic Evidence fraud conferenceAdv Prashant Mali
 
Computer Forensics (1).pptx
Computer Forensics (1).pptxComputer Forensics (1).pptx
Computer Forensics (1).pptxGautam708801
 
Gautam 046.pptx on evidence law related to electronic evidence
Gautam 046.pptx on evidence law related to electronic evidenceGautam 046.pptx on evidence law related to electronic evidence
Gautam 046.pptx on evidence law related to electronic evidenceGautamShaurya
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxSanjith261
 
The Cyber Law Regime in India
The Cyber Law Regime in IndiaThe Cyber Law Regime in India
The Cyber Law Regime in IndiaDr. Prashant Vats
 
Digital Evidence Admissibility for Legal Proceedings in Malaysia
Digital Evidence Admissibility for Legal Proceedings in MalaysiaDigital Evidence Admissibility for Legal Proceedings in Malaysia
Digital Evidence Admissibility for Legal Proceedings in Malaysia Selvakumar Balakrishnan
 
Digital Task Force’s Digital Magazine on Electronic Evidence and Hash Value -...
Digital Task Force’s Digital Magazine on Electronic Evidence and Hash Value -...Digital Task Force’s Digital Magazine on Electronic Evidence and Hash Value -...
Digital Task Force’s Digital Magazine on Electronic Evidence and Hash Value -...Rohan Nyayadhish
 
Relavancy and Admissibility ppt.pptx
Relavancy and Admissibility ppt.pptxRelavancy and Admissibility ppt.pptx
Relavancy and Admissibility ppt.pptxadiljamalullaily
 
Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...
Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...
Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...manumelwin
 
Cyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection toolsCyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection toolsN.Jagadish Kumar
 
IT ACT 2000.ppt
IT ACT 2000.pptIT ACT 2000.ppt
IT ACT 2000.pptreenu40
 
IEA Presentation - Electronic Records & Electronic Evidence: Section 65B
IEA Presentation - Electronic Records & Electronic Evidence: Section 65BIEA Presentation - Electronic Records & Electronic Evidence: Section 65B
IEA Presentation - Electronic Records & Electronic Evidence: Section 65Bbanerjeerohit
 
Digital forensic
Digital forensicDigital forensic
Digital forensicChandan Sah
 
Most promising cyber forensic solution providers from india forn sec solut...
Most promising cyber forensic solution providers  from india   forn sec solut...Most promising cyber forensic solution providers  from india   forn sec solut...
Most promising cyber forensic solution providers from india forn sec solut...FORnSECSolutions
 
Enhancing System Security Using PKI
Enhancing System Security Using PKIEnhancing System Security Using PKI
Enhancing System Security Using PKIChin Wan Lim
 
E Contracts E Transactions.pptx
E Contracts  E Transactions.pptxE Contracts  E Transactions.pptx
E Contracts E Transactions.pptxshrutiganpule74
 

Semelhante a Appreciation of Digital Evidence in Sri Lankan Law (20)

Electronic Evidence fraud conference
Electronic Evidence   fraud conferenceElectronic Evidence   fraud conference
Electronic Evidence fraud conference
 
Computer Forensics (1).pptx
Computer Forensics (1).pptxComputer Forensics (1).pptx
Computer Forensics (1).pptx
 
Gautam 046.pptx on evidence law related to electronic evidence
Gautam 046.pptx on evidence law related to electronic evidenceGautam 046.pptx on evidence law related to electronic evidence
Gautam 046.pptx on evidence law related to electronic evidence
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptx
 
Cyber Security
Cyber Security Cyber Security
Cyber Security
 
The Cyber Law Regime in India
The Cyber Law Regime in IndiaThe Cyber Law Regime in India
The Cyber Law Regime in India
 
Cyber law/Business law
Cyber law/Business lawCyber law/Business law
Cyber law/Business law
 
Cyber
CyberCyber
Cyber
 
Digital Evidence Admissibility for Legal Proceedings in Malaysia
Digital Evidence Admissibility for Legal Proceedings in MalaysiaDigital Evidence Admissibility for Legal Proceedings in Malaysia
Digital Evidence Admissibility for Legal Proceedings in Malaysia
 
Digital Task Force’s Digital Magazine on Electronic Evidence and Hash Value -...
Digital Task Force’s Digital Magazine on Electronic Evidence and Hash Value -...Digital Task Force’s Digital Magazine on Electronic Evidence and Hash Value -...
Digital Task Force’s Digital Magazine on Electronic Evidence and Hash Value -...
 
Relavancy and Admissibility ppt.pptx
Relavancy and Admissibility ppt.pptxRelavancy and Admissibility ppt.pptx
Relavancy and Admissibility ppt.pptx
 
Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...
Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...
Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...
 
Cyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection toolsCyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection tools
 
IT ACT 2000.ppt
IT ACT 2000.pptIT ACT 2000.ppt
IT ACT 2000.ppt
 
IEA Presentation - Electronic Records & Electronic Evidence: Section 65B
IEA Presentation - Electronic Records & Electronic Evidence: Section 65BIEA Presentation - Electronic Records & Electronic Evidence: Section 65B
IEA Presentation - Electronic Records & Electronic Evidence: Section 65B
 
Digital forensic
Digital forensicDigital forensic
Digital forensic
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
 
Most promising cyber forensic solution providers from india forn sec solut...
Most promising cyber forensic solution providers  from india   forn sec solut...Most promising cyber forensic solution providers  from india   forn sec solut...
Most promising cyber forensic solution providers from india forn sec solut...
 
Enhancing System Security Using PKI
Enhancing System Security Using PKIEnhancing System Security Using PKI
Enhancing System Security Using PKI
 
E Contracts E Transactions.pptx
E Contracts  E Transactions.pptxE Contracts  E Transactions.pptx
E Contracts E Transactions.pptx
 

Mais de Talwant Singh

ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018Talwant Singh
 
Judicial Appreciation of Digital Evidence 2016
Judicial Appreciation of Digital Evidence 2016Judicial Appreciation of Digital Evidence 2016
Judicial Appreciation of Digital Evidence 2016Talwant Singh
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & PrecautionsTalwant Singh
 
Role of Training and Development in Courts
Role of Training and Development in CourtsRole of Training and Development in Courts
Role of Training and Development in CourtsTalwant Singh
 
Change Management in Judiciary
Change Management in JudiciaryChange Management in Judiciary
Change Management in JudiciaryTalwant Singh
 
HRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARYHRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARYTalwant Singh
 
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYTalwant Singh
 
Cyberwar threat to national security
Cyberwar  threat to national securityCyberwar  threat to national security
Cyberwar threat to national securityTalwant Singh
 
E-Justice: The Road Map
E-Justice: The Road MapE-Justice: The Road Map
E-Justice: The Road MapTalwant Singh
 
Safe harbour protection_for_mobile_service_pro
Safe harbour protection_for_mobile_service_proSafe harbour protection_for_mobile_service_pro
Safe harbour protection_for_mobile_service_proTalwant Singh
 
RULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARRULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARTalwant Singh
 
Ict in the district courts
Ict in the district courtsIct in the district courts
Ict in the district courtsTalwant Singh
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technologyTalwant Singh
 
Recent trends in use of ict in courts
Recent trends in use of ict in courtsRecent trends in use of ict in courts
Recent trends in use of ict in courtsTalwant Singh
 
Jurisdictional Issues In Internet Disputes
Jurisdictional Issues  In Internet DisputesJurisdictional Issues  In Internet Disputes
Jurisdictional Issues In Internet DisputesTalwant Singh
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An OverviewTalwant Singh
 
Impact Of ICT on Justice Delivery System
Impact Of ICT on Justice Delivery SystemImpact Of ICT on Justice Delivery System
Impact Of ICT on Justice Delivery SystemTalwant Singh
 
Indian Legal System An Introduction
Indian Legal System  An IntroductionIndian Legal System  An Introduction
Indian Legal System An IntroductionTalwant Singh
 
Legal Education & ICT
Legal Education & ICTLegal Education & ICT
Legal Education & ICTTalwant Singh
 

Mais de Talwant Singh (20)

ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
 
Judicial Appreciation of Digital Evidence 2016
Judicial Appreciation of Digital Evidence 2016Judicial Appreciation of Digital Evidence 2016
Judicial Appreciation of Digital Evidence 2016
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & Precautions
 
Role of Training and Development in Courts
Role of Training and Development in CourtsRole of Training and Development in Courts
Role of Training and Development in Courts
 
Change Management in Judiciary
Change Management in JudiciaryChange Management in Judiciary
Change Management in Judiciary
 
HRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARYHRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARY
 
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
 
Cyberwar threat to national security
Cyberwar  threat to national securityCyberwar  threat to national security
Cyberwar threat to national security
 
E-Justice: The Road Map
E-Justice: The Road MapE-Justice: The Road Map
E-Justice: The Road Map
 
Safe harbour protection_for_mobile_service_pro
Safe harbour protection_for_mobile_service_proSafe harbour protection_for_mobile_service_pro
Safe harbour protection_for_mobile_service_pro
 
RULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARRULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWAR
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
 
Ict in the district courts
Ict in the district courtsIct in the district courts
Ict in the district courts
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 
Recent trends in use of ict in courts
Recent trends in use of ict in courtsRecent trends in use of ict in courts
Recent trends in use of ict in courts
 
Jurisdictional Issues In Internet Disputes
Jurisdictional Issues  In Internet DisputesJurisdictional Issues  In Internet Disputes
Jurisdictional Issues In Internet Disputes
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Impact Of ICT on Justice Delivery System
Impact Of ICT on Justice Delivery SystemImpact Of ICT on Justice Delivery System
Impact Of ICT on Justice Delivery System
 
Indian Legal System An Introduction
Indian Legal System  An IntroductionIndian Legal System  An Introduction
Indian Legal System An Introduction
 
Legal Education & ICT
Legal Education & ICTLegal Education & ICT
Legal Education & ICT
 

Último

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Último (20)

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

Appreciation of Digital Evidence in Sri Lankan Law

  • 1. Appreciation of Digital Evidence in Sri Lankan Law BY TALWANT SINGH ADDL. DISTRICT & SESSIONS JUDGE DELHI DISTRICT COURTS, INDIA
  • 2. Appreciation of Digital Evidence • ICT related evidence may be computer generated or computer related evidence and could be even without any human intervention. • Some countries tried to interpret computer evidence as Documentary Evidence or Real Evidence as in case of India. • Then it should be governed under Rules of Primary and Secondary evidence and it shows that computer evidence is not easy to consider as `documentary evidence.'
  • 3. Appreciation of Digital Evidence • Prior to the introduction of Evidence (Special Provisions) Act, 1995 in Sri Lanka, there was no provision under Law of Evidence to admit Computer Evidence. • The Evidence (Special Provisions) Act has been introduced to manage computerbased evidence efficiently and legally in civil and criminal proceedings before courts.
  • 4. Appreciation of Digital Evidence • Computer' is defined in section 12 of the Act and it means any device the functions of which includes storing and processing of information. • By this definition, even a Smart Phone is a Computer. • 'Digital evidence' or electronic evidence is any probative information stored or transmitted in digital form that a party to a court case may use at trial.
  • 5. Appreciation of Digital Evidence • Computer Evidence has been specified under section 5(1) of the Act as: • In any proceedings where direct oral evidence of a fact would be admissible any information contained in any statement produced by a computer and tending to establish the same fact shall be admissible as evidence of that fact subject to the conditions expressed in the same section such as; • The statement produced or reproduced, is capable of being perceived by the senses; • Cont...
  • 6. Appreciation of Digital Evidence Cont.. • At all material times the computer producing the statement was operating properly or, if it was not, any respect in which it was not operating properly or out of operation, was not of such a nature as to affect the production of the statement of the accuracy of the information contained therein; • The information supplied to the computer was accurate and the information contained in the statement reproduces or is derived from, the information so supplied to the computer.
  • 7. Appreciation of Digital Evidence • It shall be sufficient to show that: (a) during the said period there was regularly supplied to the computer, in the ordinary course of such activity, information of the kind contained in the statement or of the kind from which the information so contained is derived ; and (b) the information contained in the statement reproduces, or is derived from, information regularly supplied to the computer in the ordinary course of such activity.
  • 8. Appreciation of Digital Evidence • Where any statement referred to in sub-section 5(1) of the Act, (a) It cannot be played, displayed, or reproduced in such a manner as to make it capable of being perceived by the senses; (b) It is capable of being so perceived but the same is unintelligible to a person not conversant in a specific science; or (c) Same is of such a nature it is not convenient to perceive and receive in evidence, in its original form, • Then a transcript, translation, conversion or transformation, as the case may be, of the same, which is intelligible and is capable of being perceived by the senses are admissible as
  • 9. Appreciation of Digital Evidence • Section 7 of the Act provides provisions regarding Notices to have access to inspect evidence sought to be produced, machine, device, or computer, any records relating to the production of the evidence or the system used in such production, and the steps to be taken by the other party. • The court may presume the accuracy of any recording, reproduction or statement produced by, or by use of a machine, device or computer which is in common use where the court draws such presumption with respect to any recording, reproduction or statement, and in the absence of any evidence to the contrary.
  • 10. Appreciation of Digital Evidence • As per Electronic Transactions Act No.19 of 2006, If any information is contained in a data message, electronic document, electronic record or other communication made by a person who is dead or who by reason of his bodily or mental condition is unfit to attend as a witness; • Or who is outside Sri Lanka and where reasonable steps have been taken to find such person and he cannot be found; • Or who does not wish to give oral evidence through fear; or who is prevented from so giving evidence, • Then any evidence relating to such information shall, if available, be admissible.
  • 11. Appreciation of Digital Evidence • The Courts shall, unless the contrary is proved, presume the truth of information contained in a data message, or in any electronic document or electronic record or other communication; and • In the case of any data message, electronic document, electronic record or other communication made by a person, that it was made by the person who is purported to have made it; and • Similarly, shall presume the genuineness of any electronic signature or distinctive identification mark therein.
  • 12. Appreciation of Digital Evidence • The burden of proof of the genuineness of such document has been virtually shifted from proposing party to the opposing party. • There is no applicability of the Evidence (Special Provisions) Act in relation to any data message, electronic document, electronic record or other document to which the provisions of Electronic Transactions Act applies.
  • 13. Appreciation of Digital Evidence • Section 16 of the Payment Devices Frauds Act deals with matters relating to evidence under the same Act. Accordingly, a certified copy of an entry relating to a payment device located in Sri Lanka or outside Sri Lanka, kept by an Issuer or acquirer in the ordinary course of business of such Issuer or acquirer, whether kept in written form or stored by electronic, magnetic, optical or any other means in an information system or computer or payment device shall be admissible in evidence in relation to a prosecution in respect of an offence under section 3 of the Act, and shall be prima facie evidence of the facts stated therein.
  • 14. Appreciation of Digital Evidence • Discovery of evidence is the most essential part to prove a case and various jurisdictions have faced common and different types of difficulties unique to relevant legal systems due to its own nature (of laws), procedures etc. • When the subject matter is discussed with `Computer or electronic evidence', it will be a more complicated issue compared to discovery of non electronic evidence.
  • 15. Appreciation of Digital Evidence • With development of technology, evidence takes a new form. • E-mail, chat room transcripts, databases, spreadsheets, web browser history files, information through system backup tapes have been replacing conventional paper documents. • Computer evidence may be stored in hidden files as there is a great deal of left over data stored on their disk drives of a computer. Some institutions may store their data at a distant server, different website etc.
  • 16. Appreciation of Digital Evidence • • • • • • • • Digital Evidence can be found in: e-mails digital photographs ATM transaction logs word processing documents instant message histories files saved from accounting programs spreadsheets internet browser histories
  • 17. Appreciation of Digital Evidence Cont... • • • • • • • databases Contents of computer memory Computer backups Computer printouts Global Positioning System tracks Logs from a hotel’s electronic door locks Digital video or audio files
  • 18. Appreciation of Digital Evidence • Digital discovery tends to be voluminous, as electronic data are cheaper and easier to copy, archive and distribute. • Electronic data, unlike their conventional counterparts, do not disappear easily and difficult to delete (or destroy) of an electronic document. • Unlike a paper document, digital document has increased the number of locations where potentially discoverable documents may be found. • Cost factor relating to digital discovery is a serious problem due to its nature.
  • 19. Appreciation of Digital Evidence • Digital Evidence: >tends to be more voluminous >more difficult to destroy >easily modified >easily duplicated >potentially more expressive, and >more readily available
  • 20. Appreciation of Digital Evidence • Privacy issues will be another aspect under Digital discovery since courts can allow access to email, records of Web sites visited, transcripts of chat room discussions etc. to discover such evidence. • Standard of knowledge and competence of investigators and their ability to explain the relevance of electronic forensic analysing tools used for discovery of electronic evidence also might open doors for different level of acceptability of such evidence in Court trials. • It is the duty of the Forensic experts to ensure that nothing has been added to or deleted from electronic evidence recovered from crime scene.
  • 21. Appreciation of Digital Evidence under Sri Lankan Law THANKS TALWANT SINGH ADDL. DISTRICT & SESSIONS JUDGE DELHI DISTRICT COURTS, INDIA