Part 14.9 / 9

Practical Tools and Checklists

Client Intake Forms, FIR Drafting Checklist, Evidence Preservation Guide, Case Management Tools - Ready-to-use resources for Cyber Law Practice.

14.9.1 Client Intake Checklist

Use this checklist for every new cyber crime client to ensure complete information gathering from the first meeting.

Client Intake - Cyber Crime Cases

  • Personal Details: Full name, address, Aadhaar, PAN, phone, email
  • Incident Date/Time: When did the incident occur?
  • Discovery Date: When did client first learn about it?
  • Platform/Website: Which website, app, or platform?
  • URLs: Specific links, profiles, pages involved
  • Accused Details: Name, phone, email, profile (if known)
  • Financial Loss: Amount lost, transaction IDs, bank details
  • Non-Financial Harm: Reputation, emotional distress, etc.
  • Prior Complaints: Any complaint to police, bank, platform?
  • Screenshots: Has client preserved screenshots?
  • Emails/Messages: Relevant communications
  • Call Records: Phone call history with accused
  • Witnesses: Anyone who saw/knew about the incident
  • Conflict Check: Check for conflicts completed
  • Engagement Letter: Signed engagement agreement

14.9.2 FIR Drafting Checklist

Before Filing FIR

  • Jurisdiction: Identify correct Police Station
  • Sections: Research applicable IT Act/BNS sections
  • Cognizable: Confirm offence is cognizable
  • Limitation: Check if within limitation period
  • Complaint Draft: Prepare detailed written complaint

FIR Content

  • 5 Ws: Who, What, When, Where, Why clearly stated
  • Chronology: Events in chronological order
  • Technical Details: URLs, IPs, platform names
  • Financial Details: Transaction IDs, amounts, accounts
  • Evidence List: Annexures listed
  • Prayer: What action is being requested

After Filing FIR

  • FIR Copy: Obtained free copy of FIR
  • Verification: Verified FIR contents are accurate
  • IO Details: Noted Investigation Officer name/contact
  • Follow-up Plan: Scheduled follow-up dates

14.9.3 Evidence Preservation Checklist

Digital Evidence Preservation

  • Screenshot: Full page with URL bar visible
  • Timestamp: Date/time visible in screenshot
  • Multiple Formats: Save as image and PDF
  • Wayback Machine: Archive URL if public website
  • Screen Recording: For dynamic content
  • Email Headers: Full headers saved, not just body
  • Hash Value: Calculate MD5/SHA256 of files
  • Notarization: Get notarized printout if critical
  • 65B Certificate: Prepare certificate template
  • Chain of Custody: Document who handled evidence

Section 65B Certificate Elements

RequirementWhat to Include
IdentityName, designation, address of person giving certificate
Computer IdentificationDescribe computer/device used
Regular UseStatement that computer was regularly used
Proper OperationComputer was operating properly during relevant period
SourceElectronic record derived from computer in normal course
Signature & DateSigned by person in charge of computer

14.9.4 Important Contact Resources

Emergency Helplines

ServiceNumber/PortalUse For
Cyber Crime Helpline1930Financial fraud - immediate
NCRP Portalcybercrime.gov.inOnline complaint filing
Women Helpline181Cyber harassment of women
Child Helpline1098Online child abuse
Police Emergency112General emergency

Important Portals

PortalURLPurpose
NCRPcybercrime.gov.inCyber crime complaints
eCourtsecourts.gov.inCase status, e-filing
CERT-Incert-in.org.inSecurity incidents
RBI Ombudsmanrbi.org.inBanking fraud complaints
TRAI DNDtrai.gov.inSpam/fraud calls

Tech Company Law Enforcement Portals

CompanyPortal
Googlesupport.google.com/legal
Meta/Facebookfacebook.com/records
WhatsAppfaq.whatsapp.com/general/law-enforcement
Twitter/Xhelp.twitter.com/forms/lawenforcement
Microsoftmicrosoft.com/legal

14.9.5 Case Management Tools

Recommended Software

CategoryToolCost
Case ManagementClio, MyCase, PracticePantherPaid (subscription)
Indian OptionsCaseMinister, LegalDeskPaid
Free OptionGoogle Sheets/Notion templateFree
Document ManagementGoogle Drive, DropboxFree/Paid
Time TrackingToggl, ClockifyFree/Paid
BillingZoho Invoice, TallyPaid

Case File Organization

  • Folder Structure: Year > Client Name > Matter Name > Documents
  • Naming Convention: YYYY-MM-DD_DocumentType_Description
  • Version Control: Add v1, v2 for drafts
  • Backup: Regular backup to external drive + cloud
Pro Tip

Create template folders for common matter types (FIR filing, bail application, civil suit) with pre-populated checklists and document templates.

14.9.6 Quick Reference Card

Common IT Act Sections

SectionOffencePunishment
66Computer related offences3 yrs + 5L
66CIdentity theft3 yrs + 1L
66DCheating by personation3 yrs + 1L
66EPrivacy violation3 yrs + 2L
67Obscene material5 yrs + 10L
67ASexually explicit7 yrs + 10L
67BChild pornography7 yrs + 10L
66FCyber terrorismLife

Key BNSS Sections

BNSSEarlier CrPCPurpose
173154FIR registration
175156Investigation by police
9493Search warrant
3570Arrest warrant
480439Bail

Key Takeaways

  • Checklists: Use standardized checklists for consistency
  • Evidence: Preserve evidence with timestamp, hash, 65B certificate
  • 1930: First call for any financial cyber fraud
  • NCRP: Use cybercrime.gov.in for online complaints
  • Organization: Maintain proper folder structure and naming
  • Templates: Create reusable templates for common matters