14.2.1 Client Intake Process
Client Intake is the first step in any attorney-client relationship. For Cyber Law cases, it is crucial to gather complete and accurate technical and legal information from the beginning.
Initial Contact
- Phone/Email: First point of contact is usually phone or email
- Brief Description: Understand the nature of the problem
- Urgency Assessment: Assess if immediate action is required
- Appointment: Schedule detailed consultation
Client Intake Information
| Category | Information |
|---|---|
| Personal Details | Name, Address, Phone, Email, Aadhaar/PAN |
| Incident Details | Date, Time, Platform, URL, Screenshots |
| Financial Loss | Amount, Bank Details, Transaction IDs |
| Prior Actions | Police Complaint, Bank Complaint, Other Lawyers |
| Evidence | Screenshots, Emails, Chat Logs, Call Records |
14.2.2 Conflict Check
Why Conflict Check?
As per BCI Rules, an advocate cannot represent conflicting interests. Before accepting a case, this check is necessary:
- Opposing Party: Check if opposing party is an existing client
- Related Matters: Check for matters connected to this case
- Former Clients: Check for related matters of former clients
- Personal Interest: Check for personal financial/other interests
An advocate cannot represent opposing parties in the same case. Violation can result in disciplinary action.
Conflict Check Process
- Step 1: Take names of all parties in the case
- Step 2: Search in client database
- Step 3: Check related companies/individuals
- Step 4: Document "No Conflict" or "Conflict Found"
14.2.3 Engagement Letter
What is an Engagement Letter?
An Engagement Letter is a formal contract between lawyer and client that defines the terms of the engagement.
Essential Elements
- Scope of Work: Clear description of what services will be provided
- Fee Structure: Fixed, hourly, or retainer basis
- Payment Terms: Advance, milestones, timeline
- Confidentiality: Privacy clause
- Termination: How either party can terminate
- Limitation of Liability: What is not covered
Always get written engagement agreement. Verbal agreements can lead to disputes regarding fees and scope.
14.2.4 Documentation
File Organization
- Physical File: Case file with all original documents
- Digital Copy: Scanned copies on secure cloud
- Index: Proper index for each file
- Chronology: Timeline of events and actions
Evidence Preservation
In Cyber cases, evidence preservation is very important:
| Evidence Type | Preservation Method |
|---|---|
| Websites/Social Media | Screenshots with timestamp, Wayback Machine, Notarized printout |
| Emails | Full headers save, PST/EML export |
| Chat Messages | Screen recording, export feature, forensic copy |
| Financial Transactions | Bank statements, UPI screenshots |
| Call Records | CDR from service provider |
For electronic evidence to be admissible in court, Section 65B(4) Certificate is mandatory. Take care of this while preserving evidence.
14.2.5 Client Communication
Communication Channels
- Email: Best for formal communications and records
- Phone: For urgent matters, follow up with email
- WhatsApp: Acceptable but maintain professionalism
- In-Person: For important updates and strategy discussions
Update Frequency
| Case Stage | Update Frequency |
|---|---|
| Initial/Filing Stage | Every 2-3 days |
| Hearing Pending | Before and after every hearing |
| Investigation Stage | Weekly or significant developments |
| Dormant Period | Monthly status update |
Setting Expectations
From the beginning, set clear expectations with clients:
- Timeline: Realistic duration of case
- Outcomes: Possible outcomes and likelihood
- Costs: Expected total costs including court fees
- Client's Role: What client needs to provide/do
14.2.6 Confidentiality
Attorney-Client Privilege
Attorney-client communications are privileged. This is protected under Section 126 of Indian Evidence Act, 1872.
- Scope: All communications during professional relationship
- Exceptions: Crime/fraud planning disclosure is not protected
- Duration: Continues even after engagement ends
- Waiver: Only client can waive privilege
In Cyber Law practice, client data security is paramount. Use encrypted storage, secure passwords, and avoid public WiFi for sensitive work.
Confidentiality Obligations
- Staff Training: Train all staff on confidentiality
- Clean Desk: No client files visible to visitors
- Secure Disposal: Shred documents, secure delete digital files
- Third Party: NDA with all third party service providers
Key Takeaways
- Intake: Thorough client intake with complete documentation
- Conflict Check: Mandatory before accepting any case
- Engagement: Written engagement agreement with clear terms
- Documentation: Both physical and digital with proper index
- Communication: Regular updates, professional channels
- Confidentiality: Strict data security and privilege protection
