IFSL-22_11
IFSL-22_11
IFSL-22_11
1. Section 3: Defines key terms like "evidence," "fact," "relevant fact," and others.
2. Types of Evidence:
○ Oral Evidence (Section 60): Must be direct.
○ Documentary Evidence: Includes primary and secondary evidence.
○ Circumstantial Evidence: Relies on a series of facts to infer a conclusion.
○ Direct Evidence: Directly proves a fact without inference.
3. Expert Opinions (Sections 45 & 46):
○ Section 45: Expert testimony is admissible in fields like science, handwriting, or
foreign law.
○ Section 46: Facts supporting or contradicting an expert opinion are relevant.
4. Dying Declaration (Section 32): Statements made by a dying person are considered
reliable, given the assumption they would not lie in their final moments.
5. Judicial Notice (Section 57): Courts take judicial notice of certain facts without
requiring proof (e.g., general laws, government notifications).
6. Handwriting Comparison (Section 73): Courts can compare disputed handwriting or
signatures.
7. Witness Examination (Sections 137 & 138):
○ Section 137: Defines examination-in-chief, cross-examination, and
re-examination.
○ Section 138: Prescribes the order and rules of witness examination.
8. Leading Questions (Section 141): Questions prompting a particular answer are
controlled during examination.
General Observations:
Electronic evidence refers to information stored in or transmitted via electronic devices (e.g.,
emails, social media posts, digital records).
Challenges:
● Section 292 (IPC): Focuses on obscene materials (books, images, etc.) and may extend
to digital files.
● Section 293 (CrPC): Allows certain government experts to submit their findings without
requiring additional proof unless challenged.
● Role of Expert Cross-Examination: The opposing party can question the accuracy of
expert findings, such as error rates in equipment used or bias in data analysis.
The Information Technology Act, 2000 is the key legislation in India for governing online
activities.
Concerns:
● Biometric Data & Aadhaar: Government programs like Aadhaar store sensitive data,
which, if mishandled, can pose privacy risks.
● Unauthorized Access: Applications sometimes collect data without user consent,
violating privacy.
Social media platforms often host user-generated content that may infringe on personal rights or
facilitate crimes.
Issues:
● Misuse of Images/Content:
○ Pictures can be downloaded and misused.
○ AI-generated "deepfakes" have made identity theft and defamation easier.
● Lack of Regulation:
○ Platforms often fail to curb harmful content, like hate speech or fake news.
IT Rules, 2021:
● Regulates intermediaries like Facebook, Instagram, and Twitter.
● Requires faster responses to takedown requests and greater accountability.
Study Focus:
● Concentrate on high-yield sections like Sections 65B (Evidence Act), 66, 67, 69, and 72
(IT Act).
● Familiarize yourself with real-life case studies such as:
○ Cambridge Analytica Scandal: Misuse of personal data for influencing
elections.
○ Blue Whale Challenge: Online coercion leading to child suicides.
Writing Answers:
Protection Strategies:
● Secure Your Devices: Install reliable antivirus software and keep systems updated.
● Be Cautious About Permissions: Apps requesting unnecessary permissions (e.g., a
calculator app asking for access to your photos) may be malicious.
● Avoid Sharing Sensitive Data: Minimize the amount of personal information you share
online.
Parental Guidance:
Practical Recommendations
For the Government:
For Individuals: