14.9.1 Client Intake Checklist
Use this checklist for every new cyber crime client to ensure complete information gathering from the first meeting.
Client Intake - Cyber Crime Cases
- Personal Details: Full name, address, Aadhaar, PAN, phone, email
- Incident Date/Time: When did the incident occur?
- Discovery Date: When did client first learn about it?
- Platform/Website: Which website, app, or platform?
- URLs: Specific links, profiles, pages involved
- Accused Details: Name, phone, email, profile (if known)
- Financial Loss: Amount lost, transaction IDs, bank details
- Non-Financial Harm: Reputation, emotional distress, etc.
- Prior Complaints: Any complaint to police, bank, platform?
- Screenshots: Has client preserved screenshots?
- Emails/Messages: Relevant communications
- Call Records: Phone call history with accused
- Witnesses: Anyone who saw/knew about the incident
- Conflict Check: Check for conflicts completed
- Engagement Letter: Signed engagement agreement
14.9.2 FIR Drafting Checklist
Before Filing FIR
- Jurisdiction: Identify correct Police Station
- Sections: Research applicable IT Act/BNS sections
- Cognizable: Confirm offence is cognizable
- Limitation: Check if within limitation period
- Complaint Draft: Prepare detailed written complaint
FIR Content
- 5 Ws: Who, What, When, Where, Why clearly stated
- Chronology: Events in chronological order
- Technical Details: URLs, IPs, platform names
- Financial Details: Transaction IDs, amounts, accounts
- Evidence List: Annexures listed
- Prayer: What action is being requested
After Filing FIR
- FIR Copy: Obtained free copy of FIR
- Verification: Verified FIR contents are accurate
- IO Details: Noted Investigation Officer name/contact
- Follow-up Plan: Scheduled follow-up dates
14.9.3 Evidence Preservation Checklist
Digital Evidence Preservation
- Screenshot: Full page with URL bar visible
- Timestamp: Date/time visible in screenshot
- Multiple Formats: Save as image and PDF
- Wayback Machine: Archive URL if public website
- Screen Recording: For dynamic content
- Email Headers: Full headers saved, not just body
- Hash Value: Calculate MD5/SHA256 of files
- Notarization: Get notarized printout if critical
- 65B Certificate: Prepare certificate template
- Chain of Custody: Document who handled evidence
Section 65B Certificate Elements
| Requirement | What to Include |
|---|---|
| Identity | Name, designation, address of person giving certificate |
| Computer Identification | Describe computer/device used |
| Regular Use | Statement that computer was regularly used |
| Proper Operation | Computer was operating properly during relevant period |
| Source | Electronic record derived from computer in normal course |
| Signature & Date | Signed by person in charge of computer |
14.9.4 Important Contact Resources
Emergency Helplines
| Service | Number/Portal | Use For |
|---|---|---|
| Cyber Crime Helpline | 1930 | Financial fraud - immediate |
| NCRP Portal | cybercrime.gov.in | Online complaint filing |
| Women Helpline | 181 | Cyber harassment of women |
| Child Helpline | 1098 | Online child abuse |
| Police Emergency | 112 | General emergency |
Important Portals
| Portal | URL | Purpose |
|---|---|---|
| NCRP | cybercrime.gov.in | Cyber crime complaints |
| eCourts | ecourts.gov.in | Case status, e-filing |
| CERT-In | cert-in.org.in | Security incidents |
| RBI Ombudsman | rbi.org.in | Banking fraud complaints |
| TRAI DND | trai.gov.in | Spam/fraud calls |
Tech Company Law Enforcement Portals
| Company | Portal |
|---|---|
| support.google.com/legal | |
| Meta/Facebook | facebook.com/records |
| faq.whatsapp.com/general/law-enforcement | |
| Twitter/X | help.twitter.com/forms/lawenforcement |
| Microsoft | microsoft.com/legal |
14.9.5 Case Management Tools
Recommended Software
| Category | Tool | Cost |
|---|---|---|
| Case Management | Clio, MyCase, PracticePanther | Paid (subscription) |
| Indian Options | CaseMinister, LegalDesk | Paid |
| Free Option | Google Sheets/Notion template | Free |
| Document Management | Google Drive, Dropbox | Free/Paid |
| Time Tracking | Toggl, Clockify | Free/Paid |
| Billing | Zoho Invoice, Tally | Paid |
Case File Organization
- Folder Structure: Year > Client Name > Matter Name > Documents
- Naming Convention: YYYY-MM-DD_DocumentType_Description
- Version Control: Add v1, v2 for drafts
- Backup: Regular backup to external drive + cloud
Pro Tip
Create template folders for common matter types (FIR filing, bail application, civil suit) with pre-populated checklists and document templates.
14.9.6 Quick Reference Card
Common IT Act Sections
| Section | Offence | Punishment |
|---|---|---|
| 66 | Computer related offences | 3 yrs + 5L |
| 66C | Identity theft | 3 yrs + 1L |
| 66D | Cheating by personation | 3 yrs + 1L |
| 66E | Privacy violation | 3 yrs + 2L |
| 67 | Obscene material | 5 yrs + 10L |
| 67A | Sexually explicit | 7 yrs + 10L |
| 67B | Child pornography | 7 yrs + 10L |
| 66F | Cyber terrorism | Life |
Key BNSS Sections
| BNSS | Earlier CrPC | Purpose |
|---|---|---|
| 173 | 154 | FIR registration |
| 175 | 156 | Investigation by police |
| 94 | 93 | Search warrant |
| 35 | 70 | Arrest warrant |
| 480 | 439 | Bail |
Key Takeaways
- Checklists: Use standardized checklists for consistency
- Evidence: Preserve evidence with timestamp, hash, 65B certificate
- 1930: First call for any financial cyber fraud
- NCRP: Use cybercrime.gov.in for online complaints
- Organization: Maintain proper folder structure and naming
- Templates: Create reusable templates for common matters
